skip to main | skip to sidebar
Tec11

Tuesday, January 12, 2010

Key terms jan 12

1-sabotage:
A malicious attack on work, tools, or business.
-reliability,sucurity,authenticity

2- malware
Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.

3-
macro virusesViruses that attach to and are transmitted through macros embedded in documents; usually spread via email.
-authenticity,sucurity,people and machines
4-
wormsPrograms that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.
-securtiy,authenticity
-education,busines
Posted by Unknown at 11:22 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ▼  2010 (30)
    • ►  April (9)
    • ►  March (3)
    • ►  February (6)
    • ▼  January (12)
      • DQ's 4-6 page 380
      • Review Questions page 379 10-11
      • Discussion Questions Page 375-376
      • Review Questions
      • Words
      • Computer security technique proposal
      • Review questions pg 397
      • Key terms jan 12
      • Criterion H
      • What are the different levels of access to the int...
      • questions
      • 1-network A group of interconnected computers, inc...
  • ►  2009 (46)
    • ►  December (12)
    • ►  November (2)
    • ►  October (12)
    • ►  September (9)
    • ►  August (11)