Across
- 2. _________ topology is connected in circular path .
- 4. ______ refers to unwanted bulk email .
- 7. A digital footprint is also known as .
- 11. Each computer in a network is called a .
- 12. ________ spam filtering / blocking software .
- 14. A _____ is a network device that is used to connect all the computers in a network with each other .
- 17. Hacking , which is done for a good ~cause , such as national security , is known as .
- 18. A computer ___________ can be as a group of computers .
Down
- 1. ___________ refers to criminal activities .
- 3. _____________ refers to an illegal intrusion into a computer system or network .
- 5. Use ____________ marks around the quoted words of another person to avoid plagiarism .
- 6. A network maintained without using wires is called a ___________ network .
- 8. What is the short form of Local Area Network ?
- 9. A ________ is a device that connects two different types of networks with each other .
- 10. To _________ plagiarism , one can rephrase the material .
- 13. A __________ similar to a hub .
- 15. _____ is a network created for an individual person .
- 16. What is the short form of Information and communication technology ?
