NETWORKING CONCEPTS AND CYBER ETHICS .
Across
- 3. ________ spam filtering / blocking software .
- 5. ___________ refers to criminal activities .
- 6. A _____ is a network device that is used to connect all the computers in a network with each other .
- 9. Use ____________ marks around the quoted words of another person to avoid plagiarism .
- 10. A computer ___________ can be as a group of computers .
- 12. _____________ refers to an illegal intrusion into a computer system or network .
- 15. A network maintained without using wires is called a ___________ network .
- 16. A digital footprint is also known as .
- 18. What is the short form of Local Area Network ?
Down
- 1. _________ topology is connected in circular path .
- 2. Hacking , which is done for a good ~cause , such as national security , is known as .
- 4. What is the short form of Information and communication technology ?
- 7. _____ is a network created for an individual person .
- 8. A ________ is a device that connects two different types of networks with each other .
- 11. A __________ similar to a hub .
- 13. To _________ plagiarism , one can rephrase the material .
- 14. Each computer in a network is called a .
- 17. ______ refers to unwanted bulk email .