Networking concepts and cyber ethics

123456789101112131415
Across
  1. 1. works similar to a hub but doesn't broadcast the message
  2. 4. the unwanted bulk emails that come from unknown source are called.
  3. 5. ranges less than ten meters
  4. 8. it is a malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking one
  5. 10. is the process of transforming data into unreadable codes
  6. 12. simplest way to prevent Plagiarism
  7. 13. is used to connect a computer to the available internet connection over the existing telephone lines
  8. 15. refers to the layout in which various components of a network like nodes, links, etc are connected and communicates with each other
Down
  1. 2. equivalent term to hacking
  2. 3. and illegal intrusion in a computer system
  3. 6. wireless fidelity
  4. 7. local area network
  5. 9. the criminal practice of using social influence over the telephone system most often using features facilitated by voice over ip to gain access to sensitive information
  6. 11. prefers to be aware of the ethical practices and behaving responsibly and appropriately while using the internet
  7. 14. it is a wireless technology