Computer Science Unit 5

?
L J W H M Q A F U M F E A K L Y X N S E F
L P A X V V B R G N I U U R P J O E G D M
O I Y P Q N B U W K X L T O E B T T Y D E
C S O N M O Q M P O V W H W R U H W K A L
A P B S S I Y A Y O A J E T S S J O X H U
L V I O I T N K W M A T N E O S E R W D H
A O N Y A P F R H E E R T N N E P K A B P
R E H T M Y Y T R M D A I A A R O I P N O
E G W R N R M I A T Q N C E L D Q N P L S
A H Q E N C C G S Y P S A R A D Y T L R G
N W H E F N T Q K K E P T A R A P E I D A
E Q T J D E Q C X B S O I E E C F R C P R
T L O Q A E Q B L S J R O D A A D F A C K
W V O J L B Y A X T S T N I N M H A T Q T
O L T I E B J Y A L F K X W E W Y C I C F
R Y E A P A C G Y A F D L P T G I E O R G
K R U R J I D U S K D L O S W I Y C N B W
D X L T B B N W V U I C R K O G E A N S H
G W B W R M W I E U U X Y Y R Q D R R L O
U E C B K K F E I S X W B G K S R D R J Y
P L C M S U P D V S R Y R T F X R C O X Y

Clues

  • collection of computers and networks connected together using resources supplied by a third party (4, 4, 7)
  • common kind of technology used in a wireless PAN (9)
  • first layer (11)
  • LAN (5, 4, 7)
  • method used to maintain network security (14)
  • method used to maintain network security (3, 7)
  • method used to maintain network security (10)
  • NIC (7, 9, 4)
  • PAN (8, 4, 7)
  • second layer (9)

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »