Across
- 2. Each computer in a network.
- 5. Wireless technology used to interconnect mobile phones, computers and printers using short-range wireless connection.
- 7. Criminal practice of using social influence over the telephone system to gain access to sensitive information.
- 9. Malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- 10. Being aware of the ethical practices, and behaving responsibly and appropriately while using the internet.
- 11. Illegal intrusion into a computer system or network.
- 12. Device that connects two different types of networks with each other.
- 13. Enables to connect the computer to the available internet connection over the existing telephone lines.
Down
- 1. Purchasing a single licensed copy of the software and loading it on several computers contrary to the licenses terms.
- 3. Certain sets or rules determining how data should be transferred, compressed, and so on.
- 4. Computer network allowing controlled access to an information source.
- 6. Computer network restricted to an organization.
- 8. Unwanted bulk emails coming from unknown sources.
- 9. Criminal activities involving computers, internet connections, networks with intent to cause harm.
- 11. Network device used to connect all the computers in a network with each other.
