Across
- 2. This topology uses a single communication line to which all the nodes are directly connected
- 4. Security system that prevents unauthorized people from entering your system or network
- 5. unwanted bulk emails that come from unknown sources
- 11. Converts the encrypted information into a readable form
- 12. Spam attackers send bulk mails till the mail server gets full
- 15. Means of communication that uses low powered radio waves to transmit the data between devices
- 16. Purchase of a single licensed copy of the software and load it onto several computers contrary to the licenses terms
Down
- 1. Criminal activities that involve the use of computer ,networks ,and the internet connections with the intent to cause harm to individuals or their digital devices
- 3. Transmits the message from the source computer to the destination computer using only the physical address
- 6. The act of imitating the language or using thoughts of another person as ones own work
- 7. 2 or more computers are connected at distant places
- 8. Used to connect all computers in a network with each other
- 9. Enables you to connect you to your computer to the available internet connection over the existing telephone lines
- 10. Illegal illustration of a computer system or network
- 13. 2 or more computers are connected within a small area
- 14. Device that connects 2 different networks with each other
