Home > Preview
The flashcards below were created by user
on FreezingBlue Flashcards.
denial of service attacks, viruses, trojan horses, worms, rootkits, zombies and bots, ransomware and keylogger attacks
a virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. deviant program that can cause unexpected and often undesirable effects such as destroying or corrupting data
communications signals or info represented in a discontinous two-state (binary) way using electronic or electromagnetic signals. the basis of computer based communications
peer to peer networks
type of network in which all computers on the network communicate directly with one another rather than relying on a server, as client/server network do.
also called communications protocol; set of conventions governing the exchange of data between hardware and/or software components in a communications network
devices that joins multipe wired and wireless networks. routers have specific software and hardware designed for routing and forwarding info
a computer that acts like a disk drive, storing the programs and data files shared by users on LAN; data depository
metropolitan area network; communications network covering a city or suburb
also called communications network; system of interconnected computers, telephones, or other communications devices that can communicate with one another and share applications data
What would you like to do?
Home > Flashcards > Print Preview