|
|
Allows users on different switch ports to participate in their own network separate from, but still connected to, the other stations on the same or connected switch.
Links created by using a switch to limit network traffic.
Using the public Internet as a backbone for a private interconnection (network) between locations.
A program intended to damage a computer system. Sophisticated viruses encrypt and hide in a computer and may not appear until the user performs a certain action or until a certain date. See also antivirus.
Loudness of a sound, or the portion of a hard disk that functions as if it were a separate hard disk.
See Virtual Private Network.
|
|