Across
- 1. works similar to a hub but doesn't broadcast the message
- 4. the unwanted bulk emails that come from unknown source are called.
- 5. ranges less than ten meters
- 8. it is a malicious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking one
- 10. is the process of transforming data into unreadable codes
- 12. simplest way to prevent Plagiarism
- 13. is used to connect a computer to the available internet connection over the existing telephone lines
- 15. refers to the layout in which various components of a network like nodes, links, etc are connected and communicates with each other
Down
- 2. equivalent term to hacking
- 3. and illegal intrusion in a computer system
- 6. wireless fidelity
- 7. local area network
- 9. the criminal practice of using social influence over the telephone system most often using features facilitated by voice over ip to gain access to sensitive information
- 11. prefers to be aware of the ethical practices and behaving responsibly and appropriately while using the internet
- 14. it is a wireless technology
