permanent storage as in read only memory (ROM)
Give this one a try later!
Non-volatile
,a technology that facilities making telephone calls across the internet instead of using
conventional telephone lines
Give this one a try later!
VoIP
a type of malware that's downloaded onto your computer and that tries to convince
you that your computer is infected with a virus or other type of malware
Give this one a try later!
scareware
are the rules of behavior that are considered acceptable in a group or society.
Give this one a try later!
social norms
a device for transmitting data on a network. A switch makes decisions, based on the
media access control address of the data, as to where the data is to be sent
Give this one a try later!
, Switch
most programs capable of displaying images
Give this one a try later!
.jpg ( joint photographic experts group image)
the set of programs that enables a computer's hardware devices and applications
software to work together; it includes the operating system and utility programs
Give this one a try later!
system sw
a virtual communications gateway or path that enables a computer to organize
requests for information from other networks or computers
Give this one a try later!
logical ports
a computer that's intended for use at a single location. A desktop computer that
consists of a case that houses the main components of the computer, plus peripheral
devices.
, Give this one a try later!
desktop computer
a hacker who uses his or her knowledge to destroy info or for illegal gain
Give this one a try later!
black hat hacker
a type of wireless technology that uses radio waves to transmit data over short
distances often used to connect peripherals such as printers and keyboards to
computers or headsets to cell phones.
Give this one a try later!
bluetooth technology
the process of connecting to a wireless network without the permission of the owner
of the network
Give this one a try later!
Piggybacking
Give this one a try later!
Non-volatile
,a technology that facilities making telephone calls across the internet instead of using
conventional telephone lines
Give this one a try later!
VoIP
a type of malware that's downloaded onto your computer and that tries to convince
you that your computer is infected with a virus or other type of malware
Give this one a try later!
scareware
are the rules of behavior that are considered acceptable in a group or society.
Give this one a try later!
social norms
a device for transmitting data on a network. A switch makes decisions, based on the
media access control address of the data, as to where the data is to be sent
Give this one a try later!
, Switch
most programs capable of displaying images
Give this one a try later!
.jpg ( joint photographic experts group image)
the set of programs that enables a computer's hardware devices and applications
software to work together; it includes the operating system and utility programs
Give this one a try later!
system sw
a virtual communications gateway or path that enables a computer to organize
requests for information from other networks or computers
Give this one a try later!
logical ports
a computer that's intended for use at a single location. A desktop computer that
consists of a case that houses the main components of the computer, plus peripheral
devices.
, Give this one a try later!
desktop computer
a hacker who uses his or her knowledge to destroy info or for illegal gain
Give this one a try later!
black hat hacker
a type of wireless technology that uses radio waves to transmit data over short
distances often used to connect peripherals such as printers and keyboards to
computers or headsets to cell phones.
Give this one a try later!
bluetooth technology
the process of connecting to a wireless network without the permission of the owner
of the network
Give this one a try later!
Piggybacking