CSC Test Crossword
Down:
2) Transmission Control Protocol/Internet Protocol used as the main protocol for the Internet that connects different types of networks and computer systems
3) Wired Equivalent Privacy, encryption security for wireless networks similar to Ethernet security
4) unintentional errors caused by a computer user or computer system itself
5) ensuring that information is not accessed by unauthorized persons
6) Long-distance wireless protocol for network (Internet) access
7) The precursor to the Internet, ARPANET was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA).
10) technology that enables users to exchange messages with other users in real-time
11) A testing-ground networking environment where universities, companies, and government laboratories work together and develop advanced Internet technologies such as telemedicine, digital libraries and virtual laboratories
12) A device connected to a network, in the case of WAN, each LAN is considered a node
13) Wide Area Network, where computers are long distances away, made up of several LANs and MANs
14) ensuring that the originators of messages cannot deny that they in fact sent the messages
15) Global Positioning System, a DoD system with 24 satellites that can pinpoint any location on earth
16) ensuring that individuals maintain the right to control what information is collected about them, how it is used, who has used it, who maintains it, and the purpose for which it is used
17) used to identify one or more IP addresses
24) Standard of LANs that use either bus or star topology, supports transfer rates of 10 Mbps, and retransits of data in the event of a collision
25) the process of exchanging data between organizations, companies, or individuals through electronic communications devices
26) Hypertext Markup Language the authoring language used to create documents on the World Wide Web
28) ensuring that users access only those resources and services that they are entitled to access and that qualified users are not denied access to services that they legitimately expect to receive
29) overcomes differences in the operating systems of mobile devices allowing them to communication with each other
31) The shape of a LAN or communication system, can be physical or logical
32) the quantity of information that can be transmitted through a communications medium in a given amount of time
34) All computers can request and send information equally
38) Internet Service Provider a business that provides its customers with access to the Internet, along with other services
39) the likelihood that a computer system or system resource would be attacked, exploited, or otherwise compromised due to a pending threat or vulnerability
40) the process of developing, executing, and supervising, plans, policies, programs, and practices, that control, protect, deliver, and enhance data and information resources
44) A single document on the Web made up of text and images, interlinked with other documents
45) the process of taking samples or a sample of real world objects and converting it into electronic form (a form the computer can use)
46) Wireless technology that allows multiple devices to connect to a LAN through a nearby station base
47) term used to describe Web sites that make it easy for individuals to connect with friends, family, or meet new people around common interests, creating online communities
51) Local Area Network, where computers are close in proximity about 30 feet
52) A massive network of networks used to connect millions of computers around the globe so they can communicate and share information
53) taking steps to implement safeguards or other protecting mechanisms
54) Type of broadband connection that uses coaxial cables that deliver TV signals
59) rules for data exchange over telecommunications media
60) communication between nodes done via radio waves or microwaves
61) The term given to describe a second generation of the World Wide Web that is focused on the ability for people to collaborate and share information online.
62) A item that acts as a button enabling users to explore the Web with mouse clicks
68) The computer that stores or provides information
|
Across:
1) specification that defines the fifth major revision of the Hypertext Markup Language (HTML
8) the use of mechanisms that will monitor and alert of an attack in progress or pending
9) ensuring that a system is operational and functional at a given moment, usually provided through redundancy; loss of availability is often referred to as "denial-of-service"
18) take steps to prevent the exploitation of a system weakness or vulnerability
19) the process of data being retained in some electronic media/medium for use at some point of time
20) Hypertext Transfer Protocol the Internet protocol used to transfer web pages
21) Internet connection that offers higher bandwidth, therefore faster transmission than standard modem connections
22) reduce threats to computer systems using fear or intimidation
23) program for locating information on the Web
27) Metropolitan Area Network, where computers are in the same geographic location, 30 miles or less
30) ensuring that users are the persons they claim to be
33) the process of changing the appearance, form, or results of data (processing, formatting, conversion)
35) Where every node has a connection with every other node in the network
36) WiFi Protected Access, improves the security features of WEP
37) Type of broadband connection that uses satelite dishes used to provide television channels
41) the process of visually presenting data by specially designed electromagnetic devices (devices to produce hard copy output are not considered)
42) Web site designed as a Web entry station offering quick access to a variety of services
43) any force of nature or event having catastrophic consequences that directly caused the destruction or damage of computer resouces
48) form of communication where Internet users send messages, data files, and other information to other Internet users
49) software used to develop web pages
50) Third generation of mobile telecommunications promising increase bandwidth whether the device is stationary or in motion
55) the process of changing the location of data
56) the process of sending data via cables, satellite, or radio frequency (wireless)
57) any object, person, or other entity that represents a constant danger to a computer system
58) the process of receiving data from an outside source through electronic communication devices
63) weakness in a computer system where mechanisms designed to protect or control the system is either not present or no longer effective
64) ensuring that information is not altered by unauthorized persons in a way that is not detectable by authorized users
65) deliberate attempt to circumvent or defeat a computer systems protection mechanism or exploit the weakness in the protection mechanism
66) Part of the Internet, collection of multimedia documents linked together in a hypertext Web
67) Digital Subscriber Line, type of broadband connection to the Internet offered by phone companies
69) A system that connects two or more devices and allows them to share resources and communicate with each other
70) Type of grid computing where resources are distributed across the Internet rather than confined to a single machine
71) procedures used to restore loss or damaged system resources
72) the process of granting permissions to access data (grant, revoke, deny)
73) A program that provides navigable windows into the Web, Explorer, Chrome, Safari, FireFox
74) the process of sending data from one device to another electronically
75) The computer that requests information
76) Hardware device that route messages as they travel along telecommuncations media
77) Fourth generation developed for broadband mobile telecommuncations allowing IP-voice, data, and multimedia at higher rates of speed
|
 |
 |
|