CSC Test Crossword
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
                                                          
 
 
Down: 2) Transmission Control Protocol/Internet Protocol used as the main protocol for the Internet that connects different types of networks and computer systems 3) Wired Equivalent Privacy, encryption security for wireless networks similar to Ethernet security 4) unintentional errors caused by a computer user or computer system itself 5) ensuring that information is not accessed by unauthorized persons 6) Long-distance wireless protocol for network (Internet) access 7) The precursor to the Internet, ARPANET was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA). 10) technology that enables users to exchange messages with other users in real-time 11) A testing-ground networking environment where universities, companies, and government laboratories work together and develop advanced Internet technologies such as telemedicine, digital libraries and virtual laboratories 12) A device connected to a network, in the case of WAN, each LAN is considered a node 13) Wide Area Network, where computers are long distances away, made up of several LANs and MANs 14) ensuring that the originators of messages cannot deny that they in fact sent the messages 15) Global Positioning System, a DoD system with 24 satellites that can pinpoint any location on earth 16) ensuring that individuals maintain the right to control what information is collected about them, how it is used, who has used it, who maintains it, and the purpose for which it is used 17) used to identify one or more IP addresses 24) Standard of LANs that use either bus or star topology, supports transfer rates of 10 Mbps, and retransits of data in the event of a collision 25) the process of exchanging data between organizations, companies, or individuals through electronic communications devices 26) Hypertext Markup Language the authoring language used to create documents on the World Wide Web 28) ensuring that users access only those resources and services that they are entitled to access and that qualified users are not denied access to services that they legitimately expect to receive 29) overcomes differences in the operating systems of mobile devices allowing them to communication with each other 31) The shape of a LAN or communication system, can be physical or logical 32) the quantity of information that can be transmitted through a communications medium in a given amount of time 34) All computers can request and send information equally 38) Internet Service Provider a business that provides its customers with access to the Internet, along with other services 39) the likelihood that a computer system or system resource would be attacked, exploited, or otherwise compromised due to a pending threat or vulnerability 40) the process of developing, executing, and supervising, plans, policies, programs, and practices, that control, protect, deliver, and enhance data and information resources 44) A single document on the Web made up of text and images, interlinked with other documents 45) the process of taking samples or a sample of real world objects and converting it into electronic form (a form the computer can use) 46) Wireless technology that allows multiple devices to connect to a LAN through a nearby station base 47) term used to describe Web sites that make it easy for individuals to connect with friends, family, or meet new people around common interests, creating online communities 51) Local Area Network, where computers are close in proximity about 30 feet 52) A massive network of networks used to connect millions of computers around the globe so they can communicate and share information 53) taking steps to implement safeguards or other protecting mechanisms 54) Type of broadband connection that uses coaxial cables that deliver TV signals 59) rules for data exchange over telecommunications media 60) communication between nodes done via radio waves or microwaves 61) The term given to describe a second generation of the World Wide Web that is focused on the ability for people to collaborate and share information online. 62) A item that acts as a button enabling users to explore the Web with mouse clicks 68) The computer that stores or provides information Across: 1) specification that defines the fifth major revision of the Hypertext Markup Language (HTML 8) the use of mechanisms that will monitor and alert of an attack in progress or pending 9) ensuring that a system is operational and functional at a given moment, usually provided through redundancy; loss of availability is often referred to as "denial-of-service" 18) take steps to prevent the exploitation of a system weakness or vulnerability 19) the process of data being retained in some electronic media/medium for use at some point of time 20) Hypertext Transfer Protocol the Internet protocol used to transfer web pages 21) Internet connection that offers higher bandwidth, therefore faster transmission than standard modem connections 22) reduce threats to computer systems using fear or intimidation 23) program for locating information on the Web 27) Metropolitan Area Network, where computers are in the same geographic location, 30 miles or less 30) ensuring that users are the persons they claim to be 33) the process of changing the appearance, form, or results of data (processing, formatting, conversion) 35) Where every node has a connection with every other node in the network 36) WiFi Protected Access, improves the security features of WEP 37) Type of broadband connection that uses satelite dishes used to provide television channels 41) the process of visually presenting data by specially designed electromagnetic devices (devices to produce hard copy output are not considered) 42) Web site designed as a Web entry station offering quick access to a variety of services 43) any force of nature or event having catastrophic consequences that directly caused the destruction or damage of computer resouces 48) form of communication where Internet users send messages, data files, and other information to other Internet users 49) software used to develop web pages 50) Third generation of mobile telecommunications promising increase bandwidth whether the device is stationary or in motion 55) the process of changing the location of data 56) the process of sending data via cables, satellite, or radio frequency (wireless) 57) any object, person, or other entity that represents a constant danger to a computer system 58) the process of receiving data from an outside source through electronic communication devices 63) weakness in a computer system where mechanisms designed to protect or control the system is either not present or no longer effective 64) ensuring that information is not altered by unauthorized persons in a way that is not detectable by authorized users 65) deliberate attempt to circumvent or defeat a computer systems protection mechanism or exploit the weakness in the protection mechanism 66) Part of the Internet, collection of multimedia documents linked together in a hypertext Web 67) Digital Subscriber Line, type of broadband connection to the Internet offered by phone companies 69) A system that connects two or more devices and allows them to share resources and communicate with each other 70) Type of grid computing where resources are distributed across the Internet rather than confined to a single machine 71) procedures used to restore loss or damaged system resources 72) the process of granting permissions to access data (grant, revoke, deny) 73) A program that provides navigable windows into the Web, Explorer, Chrome, Safari, FireFox 74) the process of sending data from one device to another electronically 75) The computer that requests information 76) Hardware device that route messages as they travel along telecommuncations media 77) Fourth generation developed for broadband mobile telecommuncations allowing IP-voice, data, and multimedia at higher rates of speed
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type