510 likes | 650 Views
Inter, Intra, Extra-NET. Networks. Careers. Privacy. Protecting. 100 pt. 100 pt. 100 pt. 100 pt. 100 pt. 200 pt. 200 pt. 200pt. 200 pt. 200 pt. 300 pt. 300 pt. 300 pt. 300 pt. 300 pt. 400 pt. 400 pt. 400 pt. 400 pt. 400 pt. 500 pt. 500 pt. 500 pt. 500 pt. 500 pt.
E N D
Inter, Intra, Extra-NET Networks Careers Privacy Protecting 100 pt 100 pt 100 pt 100 pt 100 pt 200 pt 200 pt 200pt 200 pt 200 pt 300 pt 300 pt 300 pt 300 pt 300 pt 400 pt 400 pt 400 pt 400 pt 400 pt 500 pt 500 pt 500 pt 500 pt 500 pt
A network used by a single organization and only accessible by authorized users?
Conventional modem, DSL, Cable Modem, Leased/Dedicated Lines, or ISDN?
An extended intranet that provides various levels of access to authorized members of the public?
A device that can connect different network technologies together?
A combination of hardware and software that allows computers to exchange data and share software and devices?
Computers and other devices in a LAN each contain an expansion card?
A network used to connect devices within a small area such as a building or a campus?
Uses high frequency radio waves or infrared signals instead of cables to transmit data?
Designing and creating web pages and maintaining the web site?
Computer arts, computer engineering, and computer animation?
Collection of data about consumers visiting a website is a marketing technique?
A text file created by the server, computer when the user enters information into a website?
Tiny transparent graphics located on web pages or in e-mail messages?
The process of copying a file from a website to the user’s computer?
A legally binding document that explains how any personal information will be used?
A program or series of instruction that can replicate without the user’s knowledge?
A program that appears as something else, usually a program that looks trustworthy?
The act of sending an e-mail to a user falsely claiming to be a legit business in attempt to trick user into revealing personal information?
Someone who gains access to computer system to perform acts of vandalism?
A combination of hardware and software to help prevent unauthorized access?