click below
click below
Normal Size Small Size show me how
Ch. 6
Week 6 Terms
| Term | Definition |
|---|---|
| Trojan Horse | A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. |
| Spam | An inappropriate attempt to use a mailing list, or USENET or other networked communications facility as if it was a broadcast medium (which it is not) by sending the same message to a large number of people who didn’t ask for it. |
| Worm | is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; |
| Virus | A chunk of computer programming code that makes copies of itself without any conscious human intervention |
| URL | An address for s resource available on the Internet. |
| WAN | Any internet or network that covers an area larger than a single building or campus. |
| T-1 | A leased-line connection capable of carrying data at 1,544,000 bits-per-second. At maximum theoretical capacity, a____ line could move a megabyte in less than 10 seconds. |
| T-3 | A leased-line connection capable of carrying data at 44,736,000 bits-per-second. This is more than enough to do full-screen, full-motionvideo. |
| Spyware | A somewhat vague term generally referring to software that is secretly installed on a users computer and that monitors use of the computer in some way without the users' knowledge or consent. |
| Wi-Fi | A popular term for a form of wireless data communication |