Code Cracker

123456789101112131415161718
Across
  1. 2. A computer network enables two or more computers to share _______.
  2. 5. refers to being aware of the ethical practices and behaving responsibly and appropriately while using the internet.
  3. 6. refers to an illegal intrusion into a computer system on network.
  4. 8. is an act of harming,harassing or targetting a person using the internet in a deliberate manner.
  5. 10. footprint is an impression or information about a person that exist on the Internet because of his online act activity.
  6. 11. refers to a set of procedures,moral principles and ethical practices that regular the use of a computer and the internet.
  7. 14. refers to unwanted bulk emails that come from unknown sources.
  8. 15. In a network modification or upgradation of the software data is done at ________only.
  9. 16. A network maintained without using wires is called______.
  10. 17. The simplest way to prevent plagiarism is throw proper __________.
  11. 18. means protecting the data and resources from any unauthorised access.
Down
  1. 1. grants the inventors the sole right to make,use,and sell their invention for an unlimited period.
  2. 2. dossier A digital footprint is also known as _________.
  3. 3. is a computer network created for an individual person.
  4. 4. is the process of transforming data into an unreadable code.
  5. 7. is used to connect a computer to the available internet connection over the existing telephone lines.
  6. 9. The computer that communicate with each are called ______.
  7. 11. is a legal right granted by law to the creator for his original work.
  8. 12. is the largest among all types of network.
  9. 13. _______can handle a large volume of data traffic.