Across
- 1. - Each device is connected to a central computer using a point‑to‑point connection (Star Topology)
- 3. Bombing - Spam attackers repeatedly sending bulk mail until the mail server gets full
- 5. Hacking - Hacking done for good causes, such as national security
- 10. - Installing a single licensed copy of software onto multiple computers against license terms
- 11. - A single communication line or one main cable to which all the nodes are directly connected (Bus Topology)
- 12. - Enables you to connect your computer to the internet over a telephone line
- 13. - The process of transforming data into unreadable code
- 15. - A network device used to connect all computers in a network with each other
- 16. - Each node is connected to every other node in the network (Mesh Topology)
- 17. - A group of computers and other peripheral devices linked together for the purpose of sharing data and hardware resources
- 18. - Unwanted bulk email from unknown sources
Down
- 1. Piracy - Copying and distributing software illegally
- 2. - Using or imitating another person's work as one's own
- 4. - The process of converting encrypted information back into readable form
- 6. - Illegal intrusion into a computer system or network
- 7. - All the nodes in the network are connected in a circular manner (Ring Topology)
- 8. - A wireless technology used to interconnect mobile phones, computers, and printers using short‑range wireless connection
- 9. - A device that connects two different types of networks with each other
- 14. - Criminal activities using computer, network, or internet to cause harm to individuals or devices
- 17. - Each computer in a network
