Across
- 3. The simplest way to prevent plagiarism is through proper
- 5. When software is copied and distributed illegally.
- 6. The computers that communicate with each other
- 8. It is an illegal intrusion into a computer system or network.
- 9. It is a device that connects two different types of network with each other
- 11. It refers to criminal activities that involves use of computers and network
- 13. Each node is connected to every other node in the network
- 14. A computer network that is mainly created for an individual person
- 15. A network maintained without using wires
- 16. It is the unwanted bulk emails that comes from unknown sources.
- 17. An act of harming, harrassing or targetting a person using the internet in a deliberate manner
Down
- 1. All the nodes in the network are connected in a circular manner
- 2. This topology uses a single communication line or one main cable to which all the nodes are directly connected.
- 4. A digital footprint is also known as
- 7. It is the process of transforming data into an unreadable code.
- 10. It is a network device that is used to connect all the computers in a network with each other.
- 12. It is a larger network then LAN and is spread across a city.
