Untitled

1234567891011121314151617181920
Across
  1. 3. A propreitary suite of networking protocols developed by Apple Inc.
  2. 6. a structure carrying a road, path, railway etc. across a river, road or other obstacle
  3. 7. a group or system of interconnected people or things
  4. 9. a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
  5. 10. ________ is the most efective way to achieve data security
  6. 14. a computer network in which the computers connected may be far apart, generally having a radius of more than 1 km.
  7. 15. a device that connects printers to client computers over a network. It accepts print jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally to accommodate the fact that work may arrive more quickly than the printer can actually handle
  8. 17. any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way. Other examples of peripherals are image scanners, tape drives, microphones, loudspeakers, webcams, and digital cameras.
  9. 18. a device used to connect two different networks
  10. 19. a computer or computer program which manages access to a centralized resource or service in a network
  11. 20. a common connection point for devices ina network
Down
  1. 1. a range of frequencies within a given band, in particular that used for transmitting a signal.
  2. 2. allowing the transmission of signals in both directions but not simultaneously
  3. 4. a person or thing that repeats something
  4. 5. decryption is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can understand
  5. 7. a point in a network or diagram at which lines or pathways intersect or branch
  6. 8. the process of backing up the operating system, files and system-specific useful/essential data.
  7. 11. a desktop computer or workstation that is capable of obtaining information and applications from a server
  8. 12. as the transmission of messages over communications networks
  9. 13. a computer or computer program which manages access to a centralized resource or service in a network.
  10. 16. a _________ protects a network or system from unauthorized access
  11. 19. a device for making and breaking the connection in an electric circuit.