Computer

123456789101112131415161718
Across
  1. 1. - Each device is connected to a central computer using a point‑to‑point connection (Star Topology)
  2. 3. Bombing - Spam attackers repeatedly sending bulk mail until the mail server gets full
  3. 5. Hacking - Hacking done for good causes, such as national security
  4. 10. - Installing a single licensed copy of software onto multiple computers against license terms
  5. 11. - A single communication line or one main cable to which all the nodes are directly connected (Bus Topology)
  6. 12. - Enables you to connect your computer to the internet over a telephone line
  7. 13. - The process of transforming data into unreadable code
  8. 15. - A network device used to connect all computers in a network with each other
  9. 16. - Each node is connected to every other node in the network (Mesh Topology)
  10. 17. - A group of computers and other peripheral devices linked together for the purpose of sharing data and hardware resources
  11. 18. - Unwanted bulk email from unknown sources
Down
  1. 1. Piracy - Copying and distributing software illegally
  2. 2. - Using or imitating another person's work as one's own
  3. 4. - The process of converting encrypted information back into readable form
  4. 6. - Illegal intrusion into a computer system or network
  5. 7. - All the nodes in the network are connected in a circular manner (Ring Topology)
  6. 8. - A wireless technology used to interconnect mobile phones, computers, and printers using short‑range wireless connection
  7. 9. - A device that connects two different types of networks with each other
  8. 14. - Criminal activities using computer, network, or internet to cause harm to individuals or devices
  9. 17. - Each computer in a network