The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Computer Science Networking

KEY VOCABULARY
Across
is a protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person. The tag, called a transponder, consists of an antenna and a memory chip that contains the information to be transmitted via radio waves.
Disguises itself as or hides itself in a legitimate file and then causes damage to programs and data when opened
A navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receiver’s geographic location.
The method by which computers and devices are physically arranged on a network.
Devices communicating with one another over a short range (usually less than 30 feet/9 meters)
Network architecture in which one or more computers act as a server, and the other computers on the network request resources from the server.
All devices interconnect with one another. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route.
connects personal digital devices within a range of approximately 30 feet, such as a smartwatch that connects to your cell phone. Devices on a personal area network typically are connected via Bluetooth, which can facilitate communication at a range of 30 feet/9 meters or less.
Tracks and transmits personal information from your computer or device without your knowledge
Sends signals and data through cables to connect to other network devices; tend to be more secure and transmit data faster than wireless networks.
is a private network similar to an intranet, but typically open to external parties, such as business partners, suppliers, key customers, etc. The main purpose of an extranet is to allow users to exchange data and applications, and share information.
Displays unwanted advertisements on your computer
are private networks where all the users are known. This is incredibly empowering for everyone on an ______ network. They can trust in the information that they are receiving, while also knowing that whoever views the information they share is controlled.
Down
connects computers and devices in a limited area, such as a home, a school, or a small office complex
A communications device that sends and receives data and information to and from a digital line. Also called a broadband modem.
Locks you out of programs and data on your computer until you pay a ransom to regain access
When cyberthieves exploit Bluetooth devices that have been paired.
The most common network standard for wired networks.
Sends signals through airwaves, and usually do not require cables; tend to be more convenient and easier to set up than wired networks, but can be less secure.
can help distribute this signal to multiple devices within an established network, allowing all of them to connect to the Internet simultaneously.
Specifies that amount of data a user’s provider offers per month.
Damages data on your computer or device or changes system settings
is a public network that anyone can access
is a network that connects devices in a large geographic region, such as a multinational company or national retail chain. The Internet is classified as a WAN.
Spreads throughout a computer and/or network without requiring user interaction
is a form of personal area network that consists of small, lightweight biosensors implanted in the body. These biosensors can monitor an individual’s health or activity, and report statistics and results to a medical professional.