Networking and Cyber Ethics

123456789101112131415
Across
  1. 5. The computer that communicated with each other.
  2. 7. Most commonly used network card.
  3. 9. Network which generally cover a range of less than 10 metres (30 feet).
  4. 10. Law, that can be defined as the legal rules and restriction imposed on online users.
  5. 12. Wireless technology used to interconnect mobile phones, computers and printers using short-range connection.
  6. 13. The network that requires a public telecommunication media to transfer data.
  7. 14. Spam attackers keep sending bulk mails till the mail server gets full.
  8. 15. The topology which have all the nodes in the network are connected in a circular manner.
Down
  1. 1. A process of transforming data into unreadable code.
  2. 2. Act of harming, harassing,or targetting a person by using internet.
  3. 3. Security system the prevent unauthorised people from accessing your system and network.
  4. 4. A wireless antenna, which increases the communication range of the radio signals.
  5. 6. Hacking, which is due for a good cause, such as national security.
  6. 8. Simplest way to prevent plagiarism.
  7. 9. Sets of rules that determine how data should be transferred over networks, compressed, presented on the screen.
  8. 11. An illegal intrusion into a computer system or network.