Computer - Networking Concepts and Cyber Ethics

12345678910111213
Across
  1. 3. topology These nodes in the network are connected in a circular manner.
  2. 5. topology This is a topology that is connected to a central computer using a point connection.
  3. 7. topology This is a topology that has each node connected to every other node in the network.
  4. 8. This is a type of criminal activity that involves the use of computers, network and Internet connections.
  5. 9. This is an unwanted bulk email that comes from unknown sources.
  6. 12. This is referred to the act of using or imitating the language and thoughts of another person as once original work.
  7. 13. to point This is the simplest form of network structure in which two nodes are directly connected with each other.
Down
  1. 1. area network(WAN)This requires public communication media to transfer data.
  2. 2. topology This requires only a single communication line or one main cable in which all the nodes are directly connected.
  3. 4. This is referred to as an illegal intrusion into a computer system or network.
  4. 6. topology This is one of the most common network set ups that consist of a group of star workstations connected to the linear bus backbone cable.
  5. 7. area network(MAN)This is a larger network, then LAN and is spread across the country.
  6. 9. privacy This is when software is copied and distributed illegally.
  7. 10. area network(LAN)This is usually connected within a small area and two or more computers and peripheral devices are connected.
  8. 11. area network(PAN)This is mainly created for individual person