Across
- 1. It is one of the most common network setups that consists of a group of star figured workstations .
- 4. It is a malicious technique of tricking a web user into clicking on something what user perceives.
- 5. It is a device that connects two different types of networks with each other.
- 9. It is a topology uses a single communication line to which all the nodes are directly connected.
- 10. Each computer in a network.
- 11. It refers to being aware of the ethical practices and behaving responsibly while using the internet.
- 13. It refers to a computer network restricted to an organisation .
- 14. It is an act of sending email to an user misleading him to believe that is a trusted person .
- 16. It refers to an illegal intrusion into a computer system.
- 17. It is a set of programs that disrupts the normal functioning of a computer.
- 19. It is a topology that is connected to a central computer using a point to point connection.
- 20. It is a type of security system .
Down
- 2. It is the process of transforming data into unreadable code.
- 3. It is a wireless technology used to interconnect mobile phones,etc.
- 6. It refers to criminal activity that involve the use of computer,networks.
- 7. It enables you to connect your computer to the available internet connection over the existing telephone lines.
- 8. It is a larger network than LAN .
- 12. It stands for Wireless Fidelity.
- 14. It refers to the act of using the language and thoughts of another person as ones original work.
- 15. It is a network device that is used to connect all the computers.
- 18. Purchasing a single licensed copy of a software and load on to several computers.
