Across
- 3. (6,4,8,8) this is used to transmit email to a server from a client or from email server to email server, acronym SMTP
- 4. the shortened form of binary digit it is the smallest component of data represented as either a 0 or a 1
- 5. a test of end to end connectivity which times the return of an ICMP packet between two hosts, this is measured in milliseconds.
- 6. a device or program that compresses data for faster transmission
- 7. (5,4,2) allows business and individuals to make financial savings by routing traditional phone calls over an IP network including the Internet instead of using traditional phone lines acronym VoIP
- 9. (5-4,8,8) is a networking protocol for distributed, collaborative, hypermedia information systems. It is the foundation of data communication for the World Wide Web and functions as a request-response protocol in the client-server computing model.
- 12. (8,7,6,8) This is used to access email on a remote email server by a mail client however this type of transfer leaves the message on the server as opposed to POP3 which downloads and then deletes it acronym IMAP
Down
- 1. (5-4,6,8) is the set of markup symbols or codes inserted into a file intended for display on the Internet. The markup tells web browsers how to display a web page's words and images.
- 2. (4,6,8)is used to retrieve email from a server by an email client (app) on a digital device such as Mozilla Thunderbird or Microsoft Outlook. The message is deleted once downloaded to the client, acronym is POP3
- 5. means the speed at which instructions and data are processed together with the quality of the outcome
- 8. (5,11) is used for example in cameras and overwrites any previous formatting this can reduce the audio or visual clarity of applications files MP3 WMA jpg AAC are all examples of this type of compression
- 10. the delay experienced while communicating online for example when playing online games this can be the cause of poor performance
- 11. this is the period of time when the digital devices or networks are out of action such as when the Internet is unavailable.
- 13. is used to convert data into code to avoid it being accessed by unauthorized users normally through the use of specialist software and protocols
