Es lo mínimo que puede requerirse para realizar una actividad, para desarrollar un emprendimiento, para capacitarse, para armar una cosa. Groupware: A system that allows users in a local network (LAN) to use resources like shared programs; access to Internet, intranet or other areas; e-mail;. Update of sites about open source groupware php .. source groupware phop openoffice groupware ssrtech definicion de groupware taskware.

Author: Grokasa Mizilkree
Country: Malta
Language: English (Spanish)
Genre: History
Published (Last): 21 September 2007
Pages: 443
PDF File Size: 6.18 Mb
ePub File Size: 18.92 Mb
ISBN: 770-7-34261-268-8
Downloads: 18659
Price: Free* [*Free Regsitration Required]
Uploader: Zuluktilar

Both the client and server could communicate over any of these links, allowing a user to move from office to home and have access to the same server.

A programming language that offers dynamic characteristics e. This generally refers to the country where the first incidence of virus was first recorded. This program groupsare publish the list, allowing third-parties to use the data to the detriment of the affected user.

Definición by Abisag Sanchez Martinez on Prezi

An organisation which has created a test to evaluate the performance of antivirus programs, known as the EICAR test. This is a function used by programs to interact with operating systems and other programs. A sequence of characters numbers, letters, etc.

Often, the first indication a user has of this activity is an extremely expensive phone bill. Client detinicion is supported on Windows. Some viruses may have similar names and characteristics. The US Government began using truly collaborative applications in the early s. This is a section of a disk that defines the structure and organization of the disk itself. Compromised computers would be left vulnerableallowing the attacker to control them to carry out this action.


This is an official list drawn up every month of the viruses reported causing incidents. An IP address is a code that identifies each computer.

The next year would see many other key team members voluntarily move on to new challenges. From Wikipedia, the free encyclopedia. Views Read Edit View history. A browser is the program that lets users view Internet pages. This is a type of virus that modifies the address where a file is stored, replacing it with the address of the virus instead of the original gfoupware.

This is the integrated electronic groupwage of a computer or IT system e. In this way, one connection can be shared by various users to connect to an Internet server. The danger lies precisely in the customized nature of the attack, which is designed especially to trick potential victims.


Please improve it by verifying the claims made and adding inline citations. According to the company, the product is used at over 3, organizations and grpupware 9 million users worldwide. IT system computer that offers certain services and resources communication, applications, files, etc. Set of additional files applied to a software program or application to resolve certain problems, vulnerabilities or flaws. A virus that affects macros in Word documents, Excel spreadsheets, PowerPoint presentations, etc.

MTAs also transfer messages to other groupwrae servers.

Trabajo Cooperativo Asistido por Computadora

This is a Microsoft server Internet Information Serverdesigned for publishing and maintaining web pages and portals. Collaboration, with respect to information technology, seems to have several definitions.


A network of interconnected computers over a large geographical area, connected groupwae telephone, radio or satellite. A service for determining names associated with computers in a network and allowing access to them.

This term is used to refer to all programs that contain malicious code MAL icious soft WAREcontain malicious code, whether it is a virus, Trojan or worm. A peripheral device, also known as MOdulator DEModulator, used to transmit electronic signals analogical and digital.

Thanks Oct 22 A network or group of zombie computers controlled by the owner of the bots. This is used to store information about other users such as e-mail addresses etc. This is a characteristic of a particular type of sophisticated virus, which infects computers by using a combination of techniques used by other viruses. This is a file that defines a set of initial characteristics that a document should have before starting to work with it.

In the early s the first commercial groupware products were delivered, and big companies such as Boeing and IBM started using electronic meeting systems for key internal projects.