Ishaan Singhs puzzle

12345678910111213141516
Across
  1. 2. This topology uses a single communication line to which all the nodes are directly connected
  2. 4. Security system that prevents unauthorized people from entering your system or network
  3. 5. unwanted bulk emails that come from unknown sources
  4. 11. Converts the encrypted information into a readable form
  5. 12. Spam attackers send bulk mails till the mail server gets full
  6. 15. Means of communication that uses low powered radio waves to transmit the data between devices
  7. 16. Purchase of a single licensed copy of the software and load it onto several computers contrary to the licenses terms
Down
  1. 1. Criminal activities that involve the use of computer ,networks ,and the internet connections with the intent to cause harm to individuals or their digital devices
  2. 3. Transmits the message from the source computer to the destination computer using only the physical address
  3. 6. The act of imitating the language or using thoughts of another person as ones own work
  4. 7. 2 or more computers are connected at distant places
  5. 8. Used to connect all computers in a network with each other
  6. 9. Enables you to connect you to your computer to the available internet connection over the existing telephone lines
  7. 10. Illegal illustration of a computer system or network
  8. 13. 2 or more computers are connected within a small area
  9. 14. Device that connects 2 different networks with each other