My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Week 5 Quiz 2b

Across
The way a network is designed to communicate is known as this.
Microsoft and Google have created large networks known as these to provide low-cost Internet access to area residents.
This refers to following a predesignated procedure to remove yourself from marketing lists.
A generic term that refers to any type of malicious software.
This kind of network uses a central cable to which all network devices connect.
This kind of encryption is also called symmetric key encryption.
All of the following frequencies are noted in the text as unlicensed except this one.
A company network that is accessible to authorized outsiders is called this.
Wireless networks usually use these kind of signals to send data.
This Act implements regulations for unsolicited email messages.
When a hackers computer sends several simultaneous requests but supplies false return information.
Down
This kind of tag is a label applied to a piece of hardware that identifies the owner, and is either indestructible or tamper-evident.
Maliciously altering the content of a competitors commercial website is an example of this, an act of malicious destruction to a computer or computer resource.
According to FBI statistics, the recovery rate of a lost or stolen personal computer is about this percent.
Most Internet connections use this kind of transmission.
The use of a fraudulent email message to trick the recipient into revealing sensitive personal information.
A group of zombie computers controlled by an individual, working together in a coordinated fashion, is called this.
The most common example of this kind of switched network is the conventional telephone system.
This law protects individuals from cyberstalking in the United States.
This creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
With this type of network transmission, data is sent one bit at a time.
This determines how devices on a network communicate.
A network consisting of a persons portable computer, mobile phone, and digital camera would be considered this.
This is a secure, private path across a public network that is set up to allow authorized users private, secure access to the company network.