Networking Concepts and Cyber Ethics

1234567891011121314151617181920
Across
  1. 1. It is one of the most common network setups that consists of a group of star figured workstations .
  2. 4. It is a malicious technique of tricking a web user into clicking on something what user perceives.
  3. 5. It is a device that connects two different types of networks with each other.
  4. 9. It is a topology uses a single communication line to which all the nodes are directly connected.
  5. 10. Each computer in a network.
  6. 11. It refers to being aware of the ethical practices and behaving responsibly while using the internet.
  7. 13. It refers to a computer network restricted to an organisation .
  8. 14. It is an act of sending email to an user misleading him to believe that is a trusted person .
  9. 16. It refers to an illegal intrusion into a computer system.
  10. 17. It is a set of programs that disrupts the normal functioning of a computer.
  11. 19. It is a topology that is connected to a central computer using a point to point connection.
  12. 20. It is a type of security system .
Down
  1. 2. It is the process of transforming data into unreadable code.
  2. 3. It is a wireless technology used to interconnect mobile phones,etc.
  3. 6. It refers to criminal activity that involve the use of computer,networks.
  4. 7. It enables you to connect your computer to the available internet connection over the existing telephone lines.
  5. 8. It is a larger network than LAN .
  6. 12. It stands for Wireless Fidelity.
  7. 14. It refers to the act of using the language and thoughts of another person as ones original work.
  8. 15. It is a network device that is used to connect all the computers.
  9. 18. Purchasing a single licensed copy of a software and load on to several computers.