Computer - Networking Concepts and Cyber Ethics

1234567891011121314151617
Across
  1. 6. This requires only a single communication line or one main cable in which all the nodes are directly connected.
  2. 7. This requires public communication media to transfer data.
  3. 10. This is usually connected within a small area and two or more computers and peripheral devices are connected.
  4. 12. This is an unwanted bulk email that comes from unknown sources.
  5. 13. This is a type of criminal activity that involves the use of computers, network and Internet connections.
  6. 16. This is the simplest form of network structure in which two nodes are directly connected with each other.
  7. 17. This is a topology that is connected to a central computer using a point connection.
Down
  1. 1. This an impression or information about a person that exist on the Internet because of his/her online activity.
  2. 2. This is one of the most common network set ups that consist of a group of star workstations connected to the linear bus backbone cable.
  3. 3. This refers to being aware of the ethical practices and behaving responsibly as well as appropriately while using the internet.
  4. 4. This is when software is copied and distributed illegally.
  5. 5. This is mainly created for individual person
  6. 8. This is referred to the act of using or imitating the language and thoughts of another person as once original work.
  7. 9. This is referred to as an illegal intrusion into a computer system or network.
  8. 11. This is a topology that has each node connected to every other node in the network.
  9. 14. These nodes in the network are connected in a circular manner.
  10. 15. This is a larger network, then LAN and is spread across the country.