Networking concept and Cyber Ethics

123456789101112131415161718
Across
  1. 1. The unwanted bulk emails that come from unknown sources are called.
  2. 5. A computer ion a network.
  3. 6. Equivalent form of Hacking.
  4. 7. simplest way to prevent plagiarism.
  5. 8. Program that disrupts the normal functioning of a computer.
  6. 9. It is wireless technology.
  7. 12. Protecting the data and resources from any unauthorized access.
  8. 13. Refers to criminal activities that involve the use of computer, network and internet.
  9. 14. Group of computers or other peripheral devices.
  10. 15. Refers to an illegal intrusion in a computer system or a network.
  11. 16. It is a legal right granted by law to the creator for his original work.
  12. 17. Is used to connect a computer to the available internet connection over the existing telephone line.
Down
  1. 2. Certain sets of rule determine how data should be transferred over networks and so on.
  2. 3. Refers to being aware of the ethical practices and behaving responsibly appropriately while using the internet.
  3. 4. Ranges less than 10 meters.
  4. 6. It is a malicious technique of tricking a web user into clicking on something different from what the user perceive he/she is clicking on.
  5. 10. Refers to computer network restricted to a organization.
  6. 11. Group of star figured workstations connected to a linear backbone cable.
  7. 15. It is a network device that is used to connect all computers to a network.
  8. 18. Metropolitan Area Network.