Unformatted text preview: gating attachments before opening them are useful ways to protect your computer. Internet Service Providers (ISPs) are often proactive in their attempt to prevent viruses and DoS attacks and install firewalls that foster security. Although no system is impenetrable, steps can be taken to improve the security of computer systems and networks. Key Terms Absolute path pg. 362 Binary file pg. 353 Direct file access pg. 357 Directory pg. 352 Directory tree pg. 359 Disk scheduling pg. 365 File pg. 352 File extension pg. 354 File System pg. 352 File type pg. 354 Path pg. 362 Relative path pg. 362 Root directory pg. 359 Sequential file access pg. 357 Text file pg. 353 Working directory pg. 361 Exercises 1. What is a file? 2. Distinguish between a file and a directory. 3. Distinguish between a file and a file system. 4. Why is a file a generic concept and not a technical one? 5. Name and describe the two basic classifications of files....
View Full Document
- Fall '10
- pg, DOS Attacks, file access pg, directory pg, file pg