Across
- 6. It is a law under which the owners are granted certain exclusive rights to ensure that the creator's hardwork is safe and protected from unauthorized copying and piracy.
- 7. It is a wireless technology used to interconnect mobile phones, computers and printers.
- 8. It refers to an illegal intrusion into a computer system or network.
- 10. It is a combination of two terms, net and etiquette.
- 12. You purchased a single licensed copy of the software and load it into several computers contrary to the license's terms.
- 13. It refers to unwanted bulk emails that come from unknown sources.
- 14. It connects two or more computers located at distant places.
- 15. It is the criminal practice of using social influences over the telephone system, most often using VoIP.
Down
- 1. This device connects two different types of networks with each other.
- 2. It refers to criminal activities that involve the use of computers, networks and the internet connection with the intent to cause harm to individuals or their digital devices.
- 3. It refers to a computer network restricted to an organization.
- 4. These are unethical people who are experts in breaking into systems to steal important data.
- 5. It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc. are connected and communicate with each other.
- 9. It refers to the act of using or imitating the language and thoughts of another person as one's original work.
- 11. It enables you to connect your computer to the available internet connection over the existing telephone lines.
