Nt1310 Unit 1 Research Paper

Words: 954
Pages: 4

Unit Two questions/project – set ii
Short Answer
What do you call a piece of code that attaches to an application program and secretly spreads when the application program is executed? Viruses are codes that attach to an application program and secretly spread themselves when the application program is executed.
What do you call a program that performs a useful task while at the same time carrying out some secret destructive act?
A Trojan horse is a program that performs a useful task while at the same time carrying out some secret destructive act.
Why is it hard to determine how big the Internet is today? Give several reasons. It is hard to determine how big the Internet is today because no one entity has complete control over the Internet, the Internet had billions of new users every year, the Internet is decentralized, and there exist no hard boundaries in regard to the Internet.
Why are TCP/IP protocols so important to the functioning of the Internet? What do they do?

Transmission Control Protocol and Internet Protocol (TPC/IP) are so important to the functioning of the Internet because they are the language of the internet and they enable cross-network communication. TCP is a
…show more content…
For example, a computer criminal could send users phishing emails claiming that they were randomly chosen to win a prize and to enter their personal information to receive that prize. Another example would be for computer criminal to create an unsecure website or link that would attach a virus to a user’s computer when they click on the malicious link or file. Social media networks, such as Facebook, also possess links and ads that would download malware to one’s computer network. In addition, a computer criminal can pretend to be someone you know and a respectable individual to spoof you and gather information or money from