![]() |
Главная Случайная страница Контакты | Мы поможем в написании вашей работы! | |
|
Users have to enter a p … to gain access to a network.
1. You can download a lot of f … or public domain programs from the net.
2. Hundreds of h … break into computer systems every year.
3. A computer v … can infect your files and corrupt your hard disk.
4. The process of encoding data so that unauthorized users can't read the data is known as e ….
5. A f … is a device which allows limited access to an internal network from the Internet.
6. You can include an a … as part of your e-mail message.
7. This company uses d … techniques to decode (or decipher) secret data.
Дата публикования: 2015-09-17; Прочитано: 1499 | Нарушение авторского права страницы | Мы поможем в написании вашей работы!