Welding System User Manual

connection. Because spyware is using memory and system
resources, the applications running in the background can
lead to system crashes or general system instability.
Startup items Any files placed in this folder will open when the computer
starts. For example, a startup screen, a sound file to be
played when the computer first starts, a reminder calendar,
or application programs can be startup items. Normally, an
alias of a file is placed in this folder rather than the file itself.
System tray Introduced with Windows 95, the system tray is located in
the Windows taskbar (usually at the bottom next to the clock)
and contains miniature icons for easy access to system
functions such as fax, printer, modem, volume, and more.
Double click or right click an icon to view and access the
details and controls.
TCP/IP Transmission Control Protocol/Internet Protocol - A set of
networking protocols widely used on the Internet that
provides communications across interconnected networks
of computers with diverse hardware architectures and various
operating systems. TCP/IP includes standards for how com-
puters communicate and conventions for connecting net-
works and routing traffic.
Trojan A destructive program that masquerades as a benign applic-
ation. Unlike viruses, Trojan horses do not replicate them-
selves but they can be just as destructive. One of the most
insidious types of Trojan horse is a program that claims to
rid your computer of viruses but instead introduces viruses
onto your computer.
The term comes from a story in Homer's Iliad, in which the
Greeks give a giant wooden horse to their foes, the Trojans,
ostensibly as a peace offering. But after the Trojans drag the
horse inside their city walls, Greek soldiers sneak out of the
horse's hollow belly and open the city gates, allowing their
compatriots to pour in and capture Troy.
Update A new version of a software or hardware product designed
to replace an older version of the same product. In addition,
107
Glossary