Computer Science Unit 5
- Created by: jorjahague
- Created on: 05-05-21 11:38
L | J | W | H | M | Q | A | F | U | M | F | E | A | K | L | Y | X | N | S | E | F |
L | P | A | X | V | V | B | R | G | N | I | U | U | R | P | J | O | E | G | D | M |
O | I | Y | P | Q | N | B | U | W | K | X | L | T | O | E | B | T | T | Y | D | E |
C | S | O | N | M | O | Q | M | P | O | V | W | H | W | R | U | H | W | K | A | L |
A | P | B | S | S | I | Y | A | Y | O | A | J | E | T | S | S | J | O | X | H | U |
L | V | I | O | I | T | N | K | W | M | A | T | N | E | O | S | E | R | W | D | H |
A | O | N | Y | A | P | F | R | H | E | E | R | T | N | N | E | P | K | A | B | P |
R | E | H | T | M | Y | Y | T | R | M | D | A | I | A | A | R | O | I | P | N | O |
E | G | W | R | N | R | M | I | A | T | Q | N | C | E | L | D | Q | N | P | L | S |
A | H | Q | E | N | C | C | G | S | Y | P | S | A | R | A | D | Y | T | L | R | G |
N | W | H | E | F | N | T | Q | K | K | E | P | T | A | R | A | P | E | I | D | A |
E | Q | T | J | D | E | Q | C | X | B | S | O | I | E | E | C | F | R | C | P | R |
T | L | O | Q | A | E | Q | B | L | S | J | R | O | D | A | A | D | F | A | C | K |
W | V | O | J | L | B | Y | A | X | T | S | T | N | I | N | M | H | A | T | Q | T |
O | L | T | I | E | B | J | Y | A | L | F | K | X | W | E | W | Y | C | I | C | F |
R | Y | E | A | P | A | C | G | Y | A | F | D | L | P | T | G | I | E | O | R | G |
K | R | U | R | J | I | D | U | S | K | D | L | O | S | W | I | Y | C | N | B | W |
D | X | L | T | B | B | N | W | V | U | I | C | R | K | O | G | E | A | N | S | H |
G | W | B | W | R | M | W | I | E | U | U | X | Y | Y | R | Q | D | R | R | L | O |
U | E | C | B | K | K | F | E | I | S | X | W | B | G | K | S | R | D | R | J | Y |
P | L | C | M | S | U | P | D | V | S | R | Y | R | T | F | X | R | C | O | X | Y |
Clues
- collection of computers and networks connected together using resources supplied by a third party (4, 4, 7)
- common kind of technology used in a wireless PAN (9)
- first layer (11)
- LAN (5, 4, 7)
- method used to maintain network security (14)
- method used to maintain network security (3, 7)
- method used to maintain network security (10)
- NIC (7, 9, 4)
- PAN (8, 4, 7)
- second layer (9)
Comments
No comments have yet been made