Download presentation
Presentation is loading. Please wait.
2
Nasca 2007 100 200 300 400 500 Internet Networking and Security viruses
3
The __________ is a worldwide computer network. internet
4
Specially formatted pieces of text, called __________, enable a user to jump for one place to another on the Web. hyperlinks
5
A Web site that anyone can update is known as a(n) __________. wiki
6
A continuous feed of a video file to your browser that allows you to view the video as it is being downloaded is called __________ video. streaming
7
__________ is a broad term used to refer to software, such as viruses, worms, or Trojan horses, that has a malicious intent. malware
8
Internet Explorer is an example of a Web __________. browser
9
The Internet is a(n) __________ / server network. client
10
If you want to share your Internet connection with more than one computer, you will need a(n) __________. router
11
A company that offers Internet connections is called a(n) __________. ISP
12
For security reasons, you should be extremely wary of opening e- mail __________ such as Word files. attachments
13
__________ receive data packets and send them to the node for which they are intended. switches
14
__________ software identifies known viruses effectively. Antivirus
15
A(n) __________ network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network. Peer-to-peer
16
A(n) __________ network uses radio waves as its transmission medium. wireless
17
A(n) __________ on a network can be a peripheral, such as a printer or scanner. node
18
Viruses triggered by the passage of time or on a certain date Time bombs
19
Viruses triggered when certain conditions are met Logic bombs
20
A virus that travels between systems through network connections to spread their infections by infecting a host file. worm
21
Viruses that temporarily erase their code from the files where they reside and hide in the active memory of the computer Stealth viruses
22
Program that appears to be something useful or desirable but at the same time does something malicious in the background without your knowledge Trojan horse
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.