Computer - Networking Concepts and Cyber Ethics
Across
- 6. This requires only a single communication line or one main cable in which all the nodes are directly connected.
- 7. This requires public communication media to transfer data.
- 10. This is usually connected within a small area and two or more computers and peripheral devices are connected.
- 12. This is an unwanted bulk email that comes from unknown sources.
- 13. This is a type of criminal activity that involves the use of computers, network and Internet connections.
- 16. This is the simplest form of network structure in which two nodes are directly connected with each other.
- 17. This is a topology that is connected to a central computer using a point connection.
Down
- 1. This an impression or information about a person that exist on the Internet because of his/her online activity.
- 2. This is one of the most common network set ups that consist of a group of star workstations connected to the linear bus backbone cable.
- 3. This refers to being aware of the ethical practices and behaving responsibly as well as appropriately while using the internet.
- 4. This is when software is copied and distributed illegally.
- 5. This is mainly created for individual person
- 8. This is referred to the act of using or imitating the language and thoughts of another person as once original work.
- 9. This is referred to as an illegal intrusion into a computer system or network.
- 11. This is a topology that has each node connected to every other node in the network.
- 14. These nodes in the network are connected in a circular manner.
- 15. This is a larger network, then LAN and is spread across the country.