{"id":1459,"date":"2018-07-05T13:38:27","date_gmt":"2018-07-05T13:38:27","guid":{"rendered":"http:\/\/academist.elated-themes.com\/?page_id=1459"},"modified":"2020-10-27T18:13:06","modified_gmt":"2020-10-27T18:13:06","slug":"faq","status":"publish","type":"page","link":"https:\/\/webssti.lcred.net\/en\/faq\/","title":{"rendered":"FAQ"},"content":{"rendered":"<div class=\"eltdf-row-grid-section-wrapper\"  ><div class=\"eltdf-row-grid-section\"><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1531746048175\" ><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"eltdf-accordion-holder eltdf-ac-default  eltdf-toggle eltdf-ac-boxed  clearfix\">\n\t<h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 1. What is a computer virus?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"margin-top: 0px;\">A computer virus is a malware that, when executed, replicates by reproducing it self or infecting other programs by modifying them. Infecting computer programs can include as well, data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be infected. Viruses often perform some type of harmful activity on infected hosts, such as acquisition of hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 2. What is broadband?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>In the context of Internet access broadband is used much more loosely to mean any high-speed Internet access that is always on and faster than traditional dial-up access; the original Internet access technology, which was limited to 56 kbit\/s, this meaning is only distantly related to its original technical meaning. Broadband Internet service is now effectively treated or managed as a public utility by net neutrality rules. Bandwidth has historically been very unequally distributed worldwide, with increasing concentration in the digital age, is now effectively treated or managed as a public utility by net neutrality rules.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 3. What is an e-mail?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Electronic mail is a method of exchanging digital messages between computer users; such messaging first entered substantial use in the 1960s and by the 1970s had taken the form now recognised as email. Email operates across computer networks, now primarily the Internet. Some early email systems required the author and the recipient to both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 4. What is the World Wide Web (WWW)?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"items-row cols-1 row-3 row-fluid\">\n<div class=\"span12\">\n<article class=\"item column-1 visible visible-first\">\n<div class=\"item_introtext\">\n<p>The World Wide Web (WWW) is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet.It has become known simply as the Web. The World Wide Web was central to the development of the Information Age and is the primary tool billions of people use to interact on the Internet. Website content can largely be provided by the publisher, or interactive where users contribute content or the content depends upon the user or their actions. Websites may be mostly informative, primarily for entertainment, or largely for commercial purposes.<\/p>\n<div class=\"attachmentsContainer\">\n<div id=\"attachmentsList_com_content_default_54\" class=\"attachmentsList\"><\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"items-row cols-1 row-4 row-fluid\">\n<div class=\"span12\"><\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 5. What is a FAQ?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"items-row cols-1 row-3 row-fluid\">\n<div class=\"span12\">\n<article class=\"item column-1 visible visible-first\">\n<div class=\"item_introtext\">\n<p>Frequently asked questions (FAQ) or Questions and Answers (QA), are listed questions and answers, all supposed to be commonly asked in some context, and pertaining to a particular topic. The format is commonly used on email mailing lists and other online forums, where certain common questions tend to recur. Web page designers often label a single list of questions as a FAQ, such as on Google.com, while using FAQs to denote multiple lists of questions such as on United States Treasury sites.<\/p>\n<div class=\"attachmentsContainer\">\n<div id=\"attachmentsList_com_content_default_54\" class=\"attachmentsList\"><\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"items-row cols-1 row-4 row-fluid\">\n<div class=\"span12\"><\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 6. What is a Hacker?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"items-row cols-1 row-3 row-fluid\">\n<div class=\"span12\">\n<article class=\"item column-1 visible visible-first\">\n<div class=\"item_introtext\">\n<p>In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground. There is a longstanding controversy about the term's true meaning. In this controversy, the term hacker is reclaimed by computer programmers who argue that it refers simply to someone with an advanced understanding of computers.<\/p>\n<div class=\"attachmentsContainer\">\n<div id=\"attachmentsList_com_content_default_54\" class=\"attachmentsList\"><\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"items-row cols-1 row-4 row-fluid\">\n<div class=\"span12\"><\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 7. How can computer be infected with virus through internet?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"items-row cols-1 row-3 row-fluid\">\n<div class=\"span12\">\n<article class=\"item column-1 visible visible-first\">\n<div class=\"item_introtext\">\n<p>Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit and manipulate security bugs (security defects) in a system or application software to spread and infect. Software development strategies that produce large numbers of bugs will generally also produce potential exploits. The vast majority of viruses target systems running Microsoft Windows. This is due to Microsoft's large market share of desktop users, the diversity of software systems on a network limits the destructive potential of viruses and malware.<\/p>\n<div class=\"attachmentsContainer\">\n<div id=\"attachmentsList_com_content_default_54\" class=\"attachmentsList\"><\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"items-row cols-1 row-4 row-fluid\">\n<div class=\"span12\"><\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 8. What is a ping?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"items-row cols-1 row-3 row-fluid\">\n<div class=\"span12\">\n<article class=\"item column-1 visible visible-first\">\n<div class=\"item_introtext\">\n<p>Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network, and to measure the round-trip time for messages sent from the originating host to a destination computer and echoed back to the source. The program measures the round-trip time from transmission to reception, reporting errors and packet loss, and also usually including a statistical summary of the results, including the minimum, maximum, the mean round-trip times, and usually standard deviation of the mean.<\/p>\n<div class=\"attachmentsContainer\">\n<div id=\"attachmentsList_com_content_default_54\" class=\"attachmentsList\"><\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"items-row cols-1 row-4 row-fluid\">\n<div class=\"span12\"><\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 9. What is web search engine?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"items-row cols-1 row-3 row-fluid\">\n<div class=\"span12\">\n<article class=\"item column-1 visible visible-first\">\n<div class=\"item_introtext\">\n<p>A web search engine is a software system that is designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as search engine results pages (SERPs). The information may be a mix of web pages, images, and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler.<\/p>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 10. What is a spam?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"items-row cols-1 row-3 row-fluid\">\n<div class=\"span12\">\n<article class=\"item column-1 visible visible-first\">\n<div class=\"item_introtext\">\n<p>Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender. Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses.<\/p>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><h5 class=\"eltdf-accordion-title\">\n\t<span class=\"eltdf-tab-title\">Question 11. What is a chat?<\/span>\n<\/h5>\n<div class=\"eltdf-accordion-content\">\n\t<div class=\"eltdf-accordion-content-inner\">\n\t\t\n\t<div class=\"wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"items-row cols-1 row-3 row-fluid\">\n<div class=\"span12\">\n<article class=\"item column-1 visible visible-first\">\n<div class=\"item_introtext\">\n<p>Chat may refer to any kind of communication over the Internet that offers a real-time transmission of text messages from sender to receiver. Chat messages are generally short in order to enable other participants to respond quickly. Thereby, a feeling similar to a spoken conversation is created, which distinguishes chatting from other text-based online communication forms such as Internet forums and email. Online chat may address point-to-point communications as well as multicast communications from one sender to many receivers and voice and video chat.<\/p>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Pregunta 1. \u00bfDe d\u00f3nde viene el nombre de virus troyano? De los virus inform\u00e1ticos (como los biol\u00f3gicos), una vez instalados en el equipo de computo, [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"footnotes":""},"class_list":["post-1459","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FAQ | SSTI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webssti.lcred.net\/en\/faq\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FAQ | SSTI\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webssti.lcred.net\/en\/faq\/\" \/>\n<meta property=\"og:site_name\" content=\"SSTI\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-27T18:13:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/12\/fb-ssti.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webssti.lcred.net\/faq\/\",\"url\":\"https:\/\/webssti.lcred.net\/faq\/\",\"name\":\"FAQ | SSTI\",\"isPartOf\":{\"@id\":\"https:\/\/webssti.lcred.net\/#website\"},\"datePublished\":\"2018-07-05T13:38:27+00:00\",\"dateModified\":\"2020-10-27T18:13:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/webssti.lcred.net\/faq\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webssti.lcred.net\/faq\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webssti.lcred.net\/faq\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/webssti.lcred.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FAQ\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webssti.lcred.net\/#website\",\"url\":\"https:\/\/webssti.lcred.net\/\",\"name\":\"SSTI\",\"description\":\"Contamos con un grupo de expertos\",\"publisher\":{\"@id\":\"https:\/\/webssti.lcred.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webssti.lcred.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webssti.lcred.net\/#organization\",\"name\":\"SSTI\",\"url\":\"https:\/\/webssti.lcred.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png\",\"contentUrl\":\"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png\",\"width\":171,\"height\":50,\"caption\":\"SSTI\"},\"image\":{\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FAQ | SSTI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webssti.lcred.net\/en\/faq\/","og_locale":"en_US","og_type":"article","og_title":"FAQ | SSTI","og_url":"https:\/\/webssti.lcred.net\/en\/faq\/","og_site_name":"SSTI","article_modified_time":"2020-10-27T18:13:06+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/12\/fb-ssti.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/webssti.lcred.net\/faq\/","url":"https:\/\/webssti.lcred.net\/faq\/","name":"FAQ | SSTI","isPartOf":{"@id":"https:\/\/webssti.lcred.net\/#website"},"datePublished":"2018-07-05T13:38:27+00:00","dateModified":"2020-10-27T18:13:06+00:00","breadcrumb":{"@id":"https:\/\/webssti.lcred.net\/faq\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webssti.lcred.net\/faq\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/webssti.lcred.net\/faq\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/webssti.lcred.net\/"},{"@type":"ListItem","position":2,"name":"FAQ"}]},{"@type":"WebSite","@id":"https:\/\/webssti.lcred.net\/#website","url":"https:\/\/webssti.lcred.net\/","name":"SSTI","description":"Contamos con un grupo de expertos","publisher":{"@id":"https:\/\/webssti.lcred.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webssti.lcred.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webssti.lcred.net\/#organization","name":"SSTI","url":"https:\/\/webssti.lcred.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/","url":"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png","contentUrl":"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png","width":171,"height":50,"caption":"SSTI"},"image":{"@id":"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/pages\/1459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/comments?post=1459"}],"version-history":[{"count":0,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/pages\/1459\/revisions"}],"wp:attachment":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/media?parent=1459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}