1 14 17 18
2 19
12
3
4
15
5
6
7
16
8
13 9
10
11

Crossword: Networks & the internet

Across

1. A system or architecture where a central server or authority controls and manages all resources and communication.

2. A type of malware that self-replicates and infects other files or systems.

3. A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network.

4. A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server.

5. A mode of communication that allows the NIC to send and receive data simultaneously.

6. IP lease refers to the period of time for which an IP address is assigned to a device using DHCP.

7. Units of data transmission in transport layer protocols, such as TCP.

8. A type of server where all the physical resources are exclusively allocated to a single user or organization.

9. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.

10. The transmission of information between devices without the use of physical connections or cables.

11. Computer networks utilize physical cables or wires to transmit data and establish connections between devices.

Down

12. The power level of a wireless signal, indicating the quality of communication between devices.

13. A public IP address is an IP address that is used to identify a device on the public internet.

14. The process of selecting the best path for data packets to travel from source to destination in a network.

15. A network device that modulates and demodulates signals to establish and maintain a connection with an ISP

16. A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations.

17. A network where processing and data storage tasks are spread across multiple computers or servers.

18. A type of network topology in which all the nodes are connected to a single cable called a bus.

19. The practice of restricting and managing user access to network resources based on predetermined security policies.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓