Across
- 1. The unwanted bulk emails that come from unknown sources are called.
- 5. A computer ion a network.
- 6. Equivalent form of Hacking.
- 7. simplest way to prevent plagiarism.
- 8. Program that disrupts the normal functioning of a computer.
- 9. It is wireless technology.
- 12. Protecting the data and resources from any unauthorized access.
- 13. Refers to criminal activities that involve the use of computer, network and internet.
- 14. Group of computers or other peripheral devices.
- 15. Refers to an illegal intrusion in a computer system or a network.
- 16. It is a legal right granted by law to the creator for his original work.
- 17. Is used to connect a computer to the available internet connection over the existing telephone line.
Down
- 2. Certain sets of rule determine how data should be transferred over networks and so on.
- 3. Refers to being aware of the ethical practices and behaving responsibly appropriately while using the internet.
- 4. Ranges less than 10 meters.
- 6. It is a malicious technique of tricking a web user into clicking on something different from what the user perceive he/she is clicking on.
- 10. Refers to computer network restricted to a organization.
- 11. Group of star figured workstations connected to a linear backbone cable.
- 15. It is a network device that is used to connect all computers to a network.
- 18. Metropolitan Area Network.
