Networking concepts and cyber ethics

123456789101112131415
Across
  1. 2. This refers to an act of stealing and misusing someone's personal information.
  2. 3. It enables you to connect your computer to the available internet connection over the existing telephone lines.
  3. 7. This is a network device that is used to connect all the computers in a network with each other.
  4. 8. A user is given a unique login name and password.
  5. 10. This is also known as digital footprint.
  6. 12. It is used to physically attach a computer to a network so that it can participate in network communication
  7. 13. This topology uses a single communication line or one main cable to which all the nodes are directly connected.
  8. 14. It refers to the act of using or imitating the language and thoughts of another person as one's original work.
  9. 15. The simplest way to prevent plagiarism is through this process.
Down
  1. 1. It refers to being aware of the ethical practices, and behaving responsibly and appropriately while using the internet.
  2. 4. it can be refer as the legal rules and restrictions imposed on online users.
  3. 5. A device that connects two different types of networks with each other,for example,a LAN with WAN.
  4. 6. This is a computer network that is mainly created for an individual person.
  5. 9. It refers to an illegal intrusion into a computer system or network.
  6. 11. This is the process of transforming data into unreadable code.