Type
Word Search
Description

PDM
SPF
Bellman Ford Algorithm
Supernet Route
Network Route
Ultimate Route
Linke State Packet
Dijkstra Algorithm
Triggered Update
Child Route
Parent Route
Autonomous System
Legacy Protocol
Exterior Gateway Protocol
Interior Gateway Protocol
PeriodicUpdate
Datastructures
Adjaceny
Neighbor
Vector
Distance
Splithorizon
Algorithm
Metric

Computer Networks Crossword

Type
Crossword
Description

the network topology which has a server in the middle star
this usually connects LAN together Ethernet
Three or more devices share a link in ________ connection Multipoint
The structure or format of data is called Syntax
Communication between a computer and a keyboard involves ______________ transmission? Simplex
The first Network is? ARPANET
A __________ is a device that forwards packets between networks by processing the routing information included in the packet. router
computer network is built on the top of another network? overlay network
The IETF standards documents are called RFC
A set of rules that governs data communication? Protocols
In _________ resources are allocated on demand. packet switching
The packet of information at the application layer is called __________ Message
Application layer offers _______ service End to end
To deliver a message to the correct application program running on a host, the _______ address must be consulted. Port
Electronic mail uses which Application layer protocol? SMTP
The time taken by a packet to travel from client to server and then back to the client is called __________ RTT

CHAPTER 2 : THE OPEN SYSTEMS INTERCONNECTION (OSI) MODEL AND NETWORK PROTOCOLS Crossword

Type
Crossword
Description

How many OSI layers are there? seven
At which layer do router devices operate? Network Layer
Name a protocol that operates at the Transport Layer. TCP
Which layer manages the reliable transfer of data from host to host (or end to end)? Transport Layer
What is the name of the layer that selects the best path for data to be transmitted? Network Layer
The data link layer uses ___ to route frames MAC addresses
The network layer uses ___ to route packets. IP addresses
Which of the following is not an important area of focus while troubleshooting DNS problems? DNS protocols
The original IEEE 802 MAC address comes from________ Ethernet address
MAC stands for _______? Media Access Control

Computer Terminology Crossword

Type
Crossword
Description

Pieces of related information that are transferred through a network. Connection
The most basic unit of data transferred across a network. Packet
Any software interface for networking hardware. Network Interface
A network not publicly accessible by the greater internet. Local Area Network
Large, dispersed networks, often meaning the Internet in general. Wide Area Network
Rules and Standards set to define the language devices use to communicate. Protocols
An address on a single machine, tied to a specific piece of software. Port
A program regulating traffic to and from a server. Firewall
A way to translate incoming requests in a routing server to devices in the connected LAN Net Address Translation
The means of connecting separate LAN's through the internet while maintaining privacy Virtual Private Network

System Software Crossword

Type
Crossword
Description

Output that is used to make changes to input or processing. Feedback
Data that is shaped into a meaningful manner and is used in decision-making. Information
Raw facts that occur in the physical environment or organisation Data
System software that helps the user in the creation, controlling development, usage and maintenance of the databases of computer systems. DBMS
Software consists of the programs for data/ information processing Software
A network that crosses metropolitan, regional or national boundaries WAN
A set of programs controlling the computer hardware and acting as an interface with the application programs. Operating System
Telecommunication device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing Router
A standard set of rules and procedures for the control of communications in a network. Protocol
Involves translating what a user wants to accomplish into a code that the computer can understand and execute. Programming
Converting/ transforming of data into useful outputs Processing
Hardware components that enable a computer system to communicate information to humans or other machines so that it can be used. Output Devices
Transactions that are accumulated and processed later as a group or in a batch. Batch Processing
Telecommunication device that connects one local area network to another one that uses the same telecommunications protocol. Bridge
A hidden program that inserts itself into a computer’s systems Computer Virus
Can be compared with the human brain. It obtains instructions from memory, interprets them and notifies the other components to perform them CPU
The ability to confer with a group of people simultaneously using telephone or e-mail group communication software Teleconferencing
A formal collection of people and other resources assembled together in order to establish a set of goals. Organisation
Telecommunication device that serves as an entrance to another network Gateway
Data is processed immediately after being captured OLTP

Geometry terms Word Search

Type
Word Search
Description

obtuse angle
Vertex
triangle
transversal line
Theorem
Remote intetior angles
Regular polygon
Pythagorean theorem
Proof
Scalene
Acute angle
Angle
Petpendicular lines
Parallel proof
Paragraph proof
Linear pair
Legs
Interior angles
Inductive reasoning
Hypotenuse
Alternate exterior angles
Alternate interior angles
Corresponding angles
Deductive reasoning
Distance formula
Equiangular
Exterior angle
Complementary angle
Supplementary angle
Congruent
Right angle

Puzzle Of Angles Word Search

Type
Word Search
Description

Triangle
Scalene
Acute Angles
Angle
Perpendicular Lines
Parallel Lines
Paragraph Proof
Linear Pair
Legs
Interior Angles
Inductive Reasoning
Hypotenuse
Congruent
Right Angles
Supplementary Angles
Complementary Angles
Exterior Angles
Equiangular
Distance Formula
Deductive Reasoning
Corresponding Angles
Alternate Interior Angles
Alternate Exterior Angles

COMPUTER NETWORK BASICS Crossword

Type
Crossword
Description

Combination of two or more networks are called? Internetwork
Which topology covers security, robust and eliminating traffic factor? Mesh
National Internet Service Provider (ISP) networks are connected to one another by private switching stations called Peering Points
Multipoint topology is Bus
A communication path way that transfers data from one point to another is called LINK
Network providing a high speed connectivity is MAN
Synonymous of rule is PROTOCOL
Elapsed time between an inquiry and a response is called RESPONSE TIME
Bus, ring and star topologies are mostly used in the LAN
Difficult reconnection and fault isolation are disadvantages of BUS TOPOLOGY
The packet of information at the application layer is called __________ Message
To deliver a message to the correct application program running on a host, the _______ address must be consulted. Port
Electronic mail uses which Application layer protocol? SMTP
FTP is built on _____ architecture Client-server
The password is sent to the server using ________ command PASS
If you have to send multimedia data over SMTP it has to be encoded into ASCII

THE ANGLES OF GEOMETRY Word Search

Type
Word Search
Description

ACUTE ANGLE
ALTERNATE EXTERIOR ANGLES
ALTERNATE INTERIOR ANGLES
ANGLE
COMPLEMENTARY ANGLES
CONGRUENT
CORRESPONDING ANGLES
DEDUCTIVE REASONING
DISTANCE FORMULA
EQUIANGULAR
EXTERIOR ANGLES
HYPOTENUSE
INDUCTIVE REASONING
INTERIOR ANGLES
ISOSCELES
LEGS
LINEAR PAIR
PARALLEL LINES
PERPENDICULAR LINES
PROOF
REGULAR POLYGON
RIGHT ANGLE
SCALENE
SUPPLEMENTARY ANGLE
THEOREM
TRANSVERSAL LINE
TWO COLUMN PROOF

geometry terms Word Search

Type
Word Search
Description

vertical
theorm
square
slope
segment
roots
ray
proof
probability
polygon
point
plane
origin
ordered pairs
line
length
interior
inductive reasoning
formula
exterior
distance
diagonals
cooridnate
consecutive
congruent
angle

Cyber Security Crossword

Type
Crossword
Description

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus