COMPUTER

123456789101112131415
Across
  1. 5. PROCESS OF TRANSFORMING DATA INTO UNREADABLE CODE
  2. 7. PROCESS OF TRANSFORMING ENCRYPTED INFORMATION INTO READABLE FORM
  3. 8. NETWORK DEVICE USED TO CONNECT ALL COMPUTERS IN A NETWORK WITH EACH OTHER
  4. 9. PROGRAM THAT DISRUPTS NORMAL FUNCTIONING OF COMPUTER
  5. 11. ACT OF USING OR IMITATING THE LANGUAGE AND THOUGHTS OF ANOTHER PERSON AS ONE'S ORIGINAL WORK
  6. 12. IT CONVERTS DIGITAL SIGNALS OF A COMPUTER INTO ANALOG SIGNALS TO ENABLE THEIR TRANSMISSION VIA PHONE LINES
  7. 14. SECURITY SYSTEM THAT PREVENTS UNAUTHORISED PEOPLE FROM ACCESSING YOUR SYSTEM AND NETWORK
  8. 15. ACT OF SENDING AN EMAIL TO USER, MISLEADING HIM TO BELIEVE THAT IT IS FROM A TRUSTED PERSON OR ORGANISATION
Down
  1. 1. EACH COMPUTER IN A NETWORK
  2. 2. IT PROVIDES A DIRECT CONNECTION BETWEEN SOURCE AND DESTINATION
  3. 3. ILLEGAL INTRUSION INTO COMPUTER SYSTEM OR NETWORK
  4. 4. DEVICE THAT CONNECTS TWO DIFFERENT TYPES OF NETWORKS WITH EACH OTHER
  5. 6. ACT OF HARMING OR HARRASSING A PERSON THROUGH INFORMATION TECHNOLOGY
  6. 10. UNWANTED BULK EMAILS COMING FROM UNKNOWN SOURCES
  7. 13. COMPUTER NETWORK MAINLY CREATED FOR INDIVIDUAL PERSON