Jarvis Puzzle

123456789101112131415
Across
  1. 1. Security A user is given a unique login name or
  2. 3. Footprints An impression about a person that exists on the internet because of his online activity.
  3. 5. Unwanted bulk emails that comes from unknown sources.
  4. 8. An act of harming or harassing a person through internet in a deliberate manner.
  5. 9. A device that connects two different types of network with each other.
  6. 10. Illegal intrusion into a computer system or network.
  7. 13. Topology Each device is connected to a central computer using a point-to-point connection.
  8. 14. hacking Hacking which is done for a good cause, such as national security.
  9. 15. privacy when software is copied and distributed illegally.
Down
  1. 2. Theft An act of stealing or misusing someone's personal information.
  2. 4. Program or a set of programs that disrupts the normal functioning of a computer.
  3. 6. Computer network that is mainly created for a individual person.
  4. 7. cable These wires are arranged in a special order and an Rj-45 connector is crimped at both the ends of the cable.
  5. 11. Being aware of the ethical practices, and behaving responsibly while using the internet.
  6. 12. The act of using the thought of another person as one's original work.