Networks

Edit Answers
XHARYAASPSEBWENJEGHDATATKLEJEI RNWMRXFOEGDIGBJFHADYYUULUCJLKA JOJPCXUADQRGGXDKOWFUTBDTADPDRY UIKKGRHCJIYMLUCRNNAUKVPSLKLCOF ATROUTERSGLGIJKOYNFNTMEIKRXZWK UAJQHYTNJPRJFBYWSOLPHDMNEDFWTR RCTOGLBHIPYURWNTFIUWTZLTPAMZEO WIUSAZAVKKIWDZSEUTZHDDZESTODNW FTOINZYSYOSVANNNBPAEIOARJADPAT FNNTWBWHXDFQYRADGYCOWVENECVOEE JEWRVETHERNETWEUCRVKDYVEROSJRN DHCXTCPFFQUAMZLOSCHWNDZTAMKGAR LTWLONIRZIBMASJLPNUHALBOWPJTLE PUIZIKPQKZSZUSECIEEEBFXFLRCPAE HARIIETLXJKPIIXRKMTKOKSTAEMECP IREECENFOWXDAQBPVRBJXQYHMSUIOO SOLRPFJTJCLHPFHOOEQAWAUIZSQWLT HTEAIARWSQOIINVZPGRWIFINHIIOHR ICSWDLSPHEDTNBCDTYOMPAHGVOCEKE NASMXPXMXLREOOMGGFOTRVGSLNWYME GFNOFXGXJLOVDREAAUEIUTEAQUJPRP ZIESNDLDVAHHEGPMXNYKETOOKVEJQN ZTTNXPQVSWZQERMKRIMVCTFRRIMOFD RLWAWGKPWECIBCNERDPEIZBIONLNXG MUORFVSEIRQYMQTEFOALDOVUWZDNKK EMRKNVQMTIXJVNMYTKWLSOOVTBLNAV VJKOPACECFCQIAVPQWDTUUMVEORFXW ANSOMAPMHFBWHJSRGEOVERGUNDFNAZ QHCBAVWVSPKEYEGPGSIRINXNODIXJE NQCOFXHPNUEPHXGCXHRRKNRDKIGEPP
1.
This is the smallest type of network and consists of the connected devices that are in close proximity to an individual.
2.
A series of interconnected nodes (connection points) that are able to transmit, receive and exchange data.
3.
This is a group of computers or devices that are connected on a single site.
4.
This is a network that covers a larger geographical area.
5.
The largest WAN accessible to the public.
6.
Use of wireless technologies to connect the different nodes to form a network.
7.
Incorporate some or all of the network capabilities on a public or private cloud platform.
8.
A type of network where data is stored centrally on a server and access is given to each device (client) connected to the network.
9.
A network can be configured so that there is a decentralized method of storing data.
10.
The maximum amount of data that can be transmitted over a network connection in a given time. It is usually measured in Mbps or Gbps.
11.
A wired networking technology that uses cables to connect devices in a Local Area Network (LAN).
12.
Address A unique numerical identifier assigned to each device on a network so that it can be identified and communicate with other devices.
13.
A device that connects a local network to the Internet Service Provider (ISP) by converting signals between digital and analog forms.
14.
A device that directs data packets between different networks and allows multiple devices to share an Internet connection.
15.
A device that connects multiple devices within a LAN and forwards data only to the intended destination device.
16.
A powerful computer or system that provides services, data, or resources to other devices (clients) on the network.
17.
A wireless networking technology that allows devices to connect to a network using radio waves instead of cables.
18.
A company that provides Internet access to homes, schools, and businesses.
19.
Malware that blocks access to a system or files and demands payment (a ransom) to restore access.
20.
A cyberattack where attackers pretend to be a trustworthy organization (for example through email or messages) to trick users into revealing passwords or personal information.
21.
A general term for any software designed to harm or exploit devices or networks, including viruses, worms, trojans, and ransomware.
22.
Software that secretly collects information about a user or organization without their consent.
23.
of Service An attack where a network or server is flooded with too many requests, causing it to slow down or stop working.
24.
Breach An incident where unauthorized people gain access to confidential information such as passwords or personal data.
25.
A security system that monitors and controls network traffic, allowing safe data to pass and blocking suspicious activity.
26.
A process that converts data into a coded form so that only authorized users can read it.
27.
A device that creates a wireless local area network to improve coverage throughout a building.
28.
is a set of agreed rules that state how to format, send and receive data.
29.
Is a process that reduces the size of a file by reencoding it to use fewer bits of storage than the original file.
30.
which provides greater security as multiple methods of authentication are used to verify a user’s identity for a log in or transaction.
31.
refers to all of the devices that are connected to the internet.