Computer - Networking Concepts and Cyber Ethics
Across
- 3. topology These nodes in the network are connected in a circular manner.
- 5. topology This is a topology that is connected to a central computer using a point connection.
- 7. topology This is a topology that has each node connected to every other node in the network.
- 8. This is a type of criminal activity that involves the use of computers, network and Internet connections.
- 9. This is an unwanted bulk email that comes from unknown sources.
- 12. This is referred to the act of using or imitating the language and thoughts of another person as once original work.
- 13. to point This is the simplest form of network structure in which two nodes are directly connected with each other.
Down
- 1. area network(WAN)This requires public communication media to transfer data.
- 2. topology This requires only a single communication line or one main cable in which all the nodes are directly connected.
- 4. This is referred to as an illegal intrusion into a computer system or network.
- 6. topology This is one of the most common network set ups that consist of a group of star workstations connected to the linear bus backbone cable.
- 7. area network(MAN)This is a larger network, then LAN and is spread across the country.
- 9. privacy This is when software is copied and distributed illegally.
- 10. area network(LAN)This is usually connected within a small area and two or more computers and peripheral devices are connected.
- 11. area network(PAN)This is mainly created for individual person