nasca 2007 100 200 300 400 500 internet networking and security viruses

21
Nasca 2007 100 100 100 100 200 200 200 200 300 300 300 300 400 400 400 400 500 500 500 500 Internet Internet Networking and Security viruses

Post on 21-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Nasca 2007

100 100 100 100

200 200 200 200

300 300 300 300

400 400 400 400

500 500 500 500

Internet Internet Networking and Security

viruses

The __________ is a worldwide computer network.

internet

Specially formatted pieces of text, called __________, enable a user to

jump for one place to another on the Web.

hyperlinks

A Web site that anyone can update is known as a(n)

__________.

wiki

A continuous feed of a video file to your browser that allows you to view the video as it is being downloaded is called

__________ video.

streaming

__________ is a broad term used to refer to software, such as viruses,

worms, or Trojan horses, that has a malicious intent.

malware

Internet Explorer is an example of a Web __________.

browser

The Internet is a(n) __________ / server network.

client

If you want to share your Internet connection with more than one computer, you will need a(n)

__________.

router

A company that offers Internet connections is called a(n)

__________.

ISP

For security reasons, you should be extremely wary of

opening e-mail __________ such as Word files.

attachments

__________ receive data packets and send them to the node for which they

are intended.

switches

__________ software identifies known viruses effectively.

Antivirus

A(n) __________ network is one in which each computer can

communicate directly with each other, instead of having a separate device exercise central control over

the entire network.

Peer-to-peer

A(n) __________ network uses radio waves as its transmission

medium.

wireless

A(n) __________ on a network can be a peripheral, such as

a printer or scanner.

node

Viruses triggered by the passage of time or on a certain date

Time bombs

Viruses triggered when certain conditions are met

Logic bombs

A virus that travels between systems through network

connections to spread their infections by infecting a host

file.

worm

Viruses that temporarily erase their code from the files

where they reside and hide in the active memory of the

computer

Stealth viruses

Program that appears to be something useful or desirable but at the same time does something

malicious in the background without your knowledge

Trojan horse