NETWORKING CONCEPT AND CYBER ETHICS

123456789101112131415161718
Across
  1. 2. _________ topology is connected in circular path .
  2. 4. ______ refers to unwanted bulk email .
  3. 7. A digital footprint is also known as .
  4. 11. Each computer in a network is called a .
  5. 12. ________ spam filtering / blocking software .
  6. 14. A _____ is a network device that is used to connect all the computers in a network with each other .
  7. 17. Hacking , which is done for a good ~cause , such as national security , is known as .
  8. 18. A computer ___________ can be as a group of computers .
Down
  1. 1. ___________ refers to criminal activities .
  2. 3. _____________ refers to an illegal intrusion into a computer system or network .
  3. 5. Use ____________ marks around the quoted words of another person to avoid plagiarism .
  4. 6. A network maintained without using wires is called a ___________ network .
  5. 8. What is the short form of Local Area Network ?
  6. 9. A ________ is a device that connects two different types of networks with each other .
  7. 10. To _________ plagiarism , one can rephrase the material .
  8. 13. A __________ similar to a hub .
  9. 15. _____ is a network created for an individual person .
  10. 16. What is the short form of Information and communication technology ?