ICT Glossary for 14-16 year olds (James Abela)
Completion requirements
Browse the glossary using this index
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | सभी
T |
---|
TBTerabyte or 1024 gigabytes. | |
Teleworking | |
Test buddy | |
Third generation (3G) | |
Third-party payment processor | |
Timeline storyboard | |
TrojanA program that appears legitimate but which performs some harmful activity when it is run. It may be used to locate password information, or make the system more vulnerable to future entry, or simply destroy programs or data on the hard disk drive. A trojan is similar to a virus except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game. | |