Across
- 3. a single binary digit that can have either value 0 or 1.
- 4. When you do this, you give information (usually a login and password) to obtain access to a computer system or other restricted area.
- 5. thirty-two bits
- 6. to refuse
- 8. four bits
- 10. a popular protocol for network management. It is used for collecting information from, and configuring, network devices such as servers, printers, hubs, etc.
- 12. sixteen bits
- 14. This device is used to connect segments of a LAN. It contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
- 15. an Internet standard for electronic mail transmission.
- 16. sixty-four bits
- 17. This is a policy where an existing customer receives electronic communications without providing express permission.
- 18. This is a policy that requires a potential customer to self-select the services they wish to subscribe to, and how any information they provide is used.
Down
- 1. a set of rules governing the format of data sent over the Internet or other network.
- 2. This is the brain of the computer
- 7. a standard protocol for accessing e-mail from your local server. It's a client/server protocol in which e-mail is received and held for you by your Internet server.
- 9. to authorize
- 10. When you do this, you subscribe to a new service and you setup a new account with a new login and password.
- 11. an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection (its acronym is POP).
- 13. eight bits
