Networking concept and cyber ethics

1234567891011121314151617
Across
  1. 3. The simplest way to prevent plagiarism is through proper
  2. 5. When software is copied and distributed illegally.
  3. 6. The computers that communicate with each other
  4. 8. It is an illegal intrusion into a computer system or network.
  5. 9. It is a device that connects two different types of network with each other
  6. 11. It refers to criminal activities that involves use of computers and network
  7. 13. Each node is connected to every other node in the network
  8. 14. A computer network that is mainly created for an individual person
  9. 15. A network maintained without using wires
  10. 16. It is the unwanted bulk emails that comes from unknown sources.
  11. 17. An act of harming, harrassing or targetting a person using the internet in a deliberate manner
Down
  1. 1. All the nodes in the network are connected in a circular manner
  2. 2. This topology uses a single communication line or one main cable to which all the nodes are directly connected.
  3. 4. A digital footprint is also known as
  4. 7. It is the process of transforming data into an unreadable code.
  5. 10. It is a network device that is used to connect all the computers in a network with each other.
  6. 12. It is a larger network then LAN and is spread across a city.