Across
- 2. This refers to an act of stealing and misusing someone's personal information.
- 3. It enables you to connect your computer to the available internet connection over the existing telephone lines.
- 7. This is a network device that is used to connect all the computers in a network with each other.
- 8. A user is given a unique login name and password.
- 10. This is also known as digital footprint.
- 12. It is used to physically attach a computer to a network so that it can participate in network communication
- 13. This topology uses a single communication line or one main cable to which all the nodes are directly connected.
- 14. It refers to the act of using or imitating the language and thoughts of another person as one's original work.
- 15. The simplest way to prevent plagiarism is through this process.
Down
- 1. It refers to being aware of the ethical practices, and behaving responsibly and appropriately while using the internet.
- 4. it can be refer as the legal rules and restrictions imposed on online users.
- 5. A device that connects two different types of networks with each other,for example,a LAN with WAN.
- 6. This is a computer network that is mainly created for an individual person.
- 9. It refers to an illegal intrusion into a computer system or network.
- 11. This is the process of transforming data into unreadable code.
