![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/2/99/29986ebe-94d4-4829-b392-665295b4ec71/29986ebe-94d4-4829-b392-665295b4ec71-bg77.png)
Glossary
ActiveX ActiveX isa model forwriting programs sothat other programs
and the operating system can call them. ActiveX technology
is used with Microsoft Internet Explorer to make interactive
Webpages that lookand behave likecomputer programs,rather
than static pages. With ActiveX, users can ask or answer
questions, use push buttons, and interact in other ways with
the Web page. ActiveX controls are often written using Visual
Basic.
Active X is notable for a complete lack of security controls;
computer security experts discourage its use over the Internet.
Adware Adware is often combined with a host application that is
provided at no charge as long as the user agrees to accept the
adware. Becauseadware applications areusually installed after
the user has agreed to a licensing agreement that states the
purpose of the application, no offense is committed.
However, pop-up advertisements can become an annoyance,
and in some cases degrade system performance. Also, the in-
formation that some of these applications collect may cause
privacy concerns for users who were not fully aware of the
terms in the license agreement.
Archive A disk, tape, or directory that contains files that have been
backed up.
A file that contains one or more files in a compressed format.
Backdoor A hole in the security of a system deliberately left in place by
designers or maintainers. The motivation for such holes is not
always sinister; some operating systems, for example, come
out of the box with privileged accounts intended for use by
field service techniciansor the vendor'smaintenance program-
mers.
Boot sector A sector at the beginning of each disk that identifies the disk's
architecture (sector size, cluster size, and so on). For startup
119
Glossary