Jarvis Puzzle
Across
- 1. Security A user is given a unique login name or
- 3. Footprints An impression about a person that exists on the internet because of his online activity.
- 5. Unwanted bulk emails that comes from unknown sources.
- 8. An act of harming or harassing a person through internet in a deliberate manner.
- 9. A device that connects two different types of network with each other.
- 10. Illegal intrusion into a computer system or network.
- 13. Topology Each device is connected to a central computer using a point-to-point connection.
- 14. hacking Hacking which is done for a good cause, such as national security.
- 15. privacy when software is copied and distributed illegally.
Down
- 2. Theft An act of stealing or misusing someone's personal information.
- 4. Program or a set of programs that disrupts the normal functioning of a computer.
- 6. Computer network that is mainly created for a individual person.
- 7. cable These wires are arranged in a special order and an Rj-45 connector is crimped at both the ends of the cable.
- 11. Being aware of the ethical practices, and behaving responsibly while using the internet.
- 12. The act of using the thought of another person as one's original work.