NETWORKING CONCEPTS AND CYBER ETHICS .

123456789101112131415161718
Across
  1. 3. ________ spam filtering / blocking software .
  2. 5. ___________ refers to criminal activities .
  3. 6. A _____ is a network device that is used to connect all the computers in a network with each other .
  4. 9. Use ____________ marks around the quoted words of another person to avoid plagiarism .
  5. 10. A computer ___________ can be as a group of computers .
  6. 12. _____________ refers to an illegal intrusion into a computer system or network .
  7. 15. A network maintained without using wires is called a ___________ network .
  8. 16. A digital footprint is also known as .
  9. 18. What is the short form of Local Area Network ?
Down
  1. 1. _________ topology is connected in circular path .
  2. 2. Hacking , which is done for a good ~cause , such as national security , is known as .
  3. 4. What is the short form of Information and communication technology ?
  4. 7. _____ is a network created for an individual person .
  5. 8. A ________ is a device that connects two different types of networks with each other .
  6. 11. A __________ similar to a hub .
  7. 13. To _________ plagiarism , one can rephrase the material .
  8. 14. Each computer in a network is called a .
  9. 17. ______ refers to unwanted bulk email .