Comp A+ Definitions Flashcards

1
Q

802.11

A

A family of specifications for wireless LAN Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11a

A

A fast, secure, relatively expensive wireless communication. speeds up to 54 Mbps in the 5 Ghz Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11ac

A

wireless data throughput at a rate of up to 2 Gbps in the 5 GHz range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11b

A

It is least expensive wireless network protocol used to transfer data 11 Mbps transfer rate in the 2.4 GHz Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11g

A

wireless data throughput at the rate of up to 54 Mbps in the 2.4 GHz band, replacement for 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.11n

A

A specification for wireless data throughput at a rate of up to 600 Mbps in the 2.4 GHz or 5 GHz range. Released in 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accelerometer

A

Mobile tech determine the orientation and acceleration of a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ACL- Access Control List

A

A set of data (use names, passwords, time and date, IP addresses, MAC addresses, etc) used to control access to a resource such as a computer, file, or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Activity Light

A

An indicator on a network adapter that flickers when packets are received or sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ad hoc mode

A

A method for wireless devices to communicate directly with each other without the use of an AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Administrative Share

A

A hidden share created by default on every Windows system. If deleted, by default, the system recreates them when it restarts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adware

A

Unwanted software, purpose of presenting commercial advertisements to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Aero

A

A color scheme available in Windows Vista and Windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES- Advanced Encryption Standard

A

A symmetric 128-192-, or 256- bit block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AIO MFD- All-in-one multi-function device

A

A small sized MFD for home users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Algorithm

A

In encryption, the rule, system, or mechanism used to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Analog Transmission

A

The transfer of information in the form of a continuous wave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Android

A

An OS for mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Anti-spyware software

A

Software that is specifically designed to protect systems against spyware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Antivirus Software

A

An application that scans files for executable code that matches patterns known to be common to viruses, and monitors systems for activity associated with viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AP- Access Point

A

A device or software that facilitates communication and provides enhanced security to wireless devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

APIPA- Automatic Private IP Addressing

A

DHCP client computer to configure itself automatically with a random IP address in the range of 169.254.0.1 to 169.254.255.254 if no DHCP server available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Argument

A

A file name or directory name that indicates the files on which a command will operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ARP- Address Resolution Protocol

A

A protocol that maps IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Aspect Ratio
A characteristic of display devices that indicates the ratio of width to height
26
Attack
A technique that is used to exploit a vulnerability without the authorization to do so
27
ATX
introduced by Intel in 1995 to provide better I/O support, lower cost, easier use, and better processor support than even earlier form factors
28
AUP- Acceptable use Policy
A Policy that includes the practices and guidelines that should be followed by employees
29
Authentication Server
determines whether or not access credentials supplied by a user should enable them to access resources
30
Authenticator App
generates single-use security tokens, used as part of two-step verification/ multi-factor authentication
31
Auto Negotiation
Negotiates a speed that is compatible with the network router or switch.
32
Backlight
The typical form of illumination used in a full sized LCD display
33
Badge
identification card or token, used to swipe through an identification system
34
Baseband
A transmission scheme where a single signal sends data using the entire bandwidth of the transmission media.
35
Baseband RTOS- Baseband Real Time Operating System
Firmware
36
Baseline
A subset of a security profile, and a document that outlines the minimum level of security required for a system, device, network, or premises.
37
Beamforming
A feature of 802.11ac that transmits radio signals directly at a specific device using smart antennas.
38
Biometric Lock
A lock that is activated by biometric features, such as a fingerprint, voice, retina, or signature.
39
Biometrics
recognizing a person based on a physiological or behavioral characteristic unique to the individual
40
BIOS- Basic Input/ Output System
instructions that is stored in ROM and used to start the most basic services of a computer system.
41
BIOS Memory
Special memory that keeps track of its data even when the power is turned off, and is stored in EEPROM's
42
BitLocker
A security feature in Windows 7 and Windows server 2008 that provides full disk encryption protection for your OS as well as all the data stored on the OS volume.
43
Blackout
A compete loss of electrical power
44
Bluetooth
A wireless radio technology that facilitates short-range (usually less than 30 feet) wireless communication
45
BNC- Bayonet Neill-Concelman
A twist lock connector on Coaxial cable
46
Boot Camp
An OS X app that lets you install Microsoft Windows and then switch between OS X and the Windows OS.
47
Boot Process
sequential steps on start up with the final result being OS is loaded components are functional.
48
Bootrec
A command line tool during Windows Recovery Environment to troubleshoot or repair startup issues.
49
Botnet
A set of devices that has been infected by a control program called a bot that enables attackers to exploit them and mount attacks.
50
Bridge
A software-based network device that has the same functionality as a switch.
51
Brightness
The amount of light emitted from a display device, as measured in lumens.
52
Broadband Communication
A category of network transmission technologies that provide high throughput by splitting communications pathways into multiple channels transmitted simultaneously over the network media.
53
Brownout
A temporary power reduction that is used by electrical power companies to deal with high power demands.
54
Brute-force Attack
uses password-cracking software to attempt every possible alphanumeric password combination.
55
BSOD- Blue Screen of Death
A system error that is severe enough to stop all processes and shut the OS down without warning.
56
Bus
In a computer system, a group of wires that connect components. They provide a pathway for data transfer.
57
BYOD- Bring Your Own Device
An organizational policy that enables employees to use their personal devices for work purposes.
58
Cable
Transmissions that use a cable television connection and a specialized interface device known as a cable modem to provide high-speed Internet access to homes and small businesses.
59
Cable Modem
A hardware device that connects a subscriber's device to a service provider's cable systems.
60
Cable Stripper
A device that enables you to remove the protective coating from wiring to facilitate installing a media connector.
61
Cache Memory
High-speed memory that the CPU can access directly.
62
CCFO- Cold Cathode Fluorescent Lamp
A light source that uses electrodes and mercury vapor to create ultraviolet light.
63
CDFS- Compact Disc File System
A file system standard for optical disc media that is supported by multiple OS types.
64
Cellular
Uses radio signals to transmit network data over the cellular telephone system.
65
Chain of Custody
The record of evidence history from collection. To presentation in court, to disposal.
66
Chipset
The set of chips on the system board that support the CPU and other basic functions.
67
CIDR- Classless Inter Domain Routing
A sub netting method that selects a subnet mask that meets an individual network's networking and node requirements and then treats the mask like a 32-bit binary word.
68
CIFS- Common Internet File System
A file and resource sharing protocol that is related to SMB.
69
Cipher
A method for concealing the meaning of text.
70
Ciphertext
Data that has been encoded with a cipher and is unreadable.
71
Clear text
The unencrypted form of data. Also called plaintext.
72
Client
A computer that makes use of the services and resources of other computers.
73
Client-side Virtualization
Takes place at the end points and separates the elements of a user's logical desktop environment- the applications, OS, programs, etc.-and divides them from each other and from the physical machine.
74
Client/server Network
A network in which some computers act as servers to provide special services for other client computers.
75
CMDLET
A lightweight command that runs in the Windows PowerShell Environment.
76
CMOS- Complimentary Metal-oxide semiconductor
An old style of static memory that was used to store information about the computer set up that the system bios refers to each time the computer started
77
Coax
common abbreviation for co-axial cable
78
Coaxial Cable
a type of cable that features a central conductor surrounded by braided or foil shielding. a dialectric insulator separates the conductor in shield and the entire packages wrapped in an insulating layer called a jacket the outer shielding serves to reduce electromagnetic interference
79
Collate
document Collection and combining of pages in their proper order
80
Command Line Interpreter (CLI)
a program that implements the commands in the text interface
81
Command Prompt
in a CLI the area of the screen where users enter commands to interact with the operating system
82
Component Services
in administrative tool that is used to deploy component applications and configure behaviors of components and applications on the system
83
Component/ RGB
a type analog video information that is transmitted or stored as two or more separate signals
84
Composite Video
the format of an analog or picture only signal before it is combined with the sound signal and modulated onto the radio frequency carrier
85
Computer Case
The enclosure that holds all of the components of a PC
86
Computer Connection
A hardware component that enables a PC to communicate with internal or external devices
87
Computer Forensics
collecting and analyzing data from storage devices Computer systems networks and wireless communications and presenting this information as a form of evidence in a court of law
88
Computer management
the primary administrative tool used to manage and configure the system.
89
Content filtering
a method of setting limits on user browser sessions
90
Cooling System
a system unit component that prevents damage to computer parts by dissipating the heat generated
91
Corporate Owned Personally Enabled (COPE)
an organizational policy that enables employees to use company own devices for personal use
92
Corona
an assembly within a laser printer that contains a wire the Corona wire which is responsible for charging the paper
93
CPU
the main chip on the system board, the CPU performs software instructions and mathematical and logical calculations. Also referred to as the microprocessor or processor
94
Cryptography
the science of hiding information to protect sensitive information and communications from unauthorized access
95
Data Backup
System maintenance task that enables you to store copies of critical files and folders on another medium for safekeeping
96
Data Container
on a mobile device a scheme for isolating business data from personal data
97
Data Restoration
assistant recovery task that enables you to access the backed up data
98
Data Sources
an administrative tool that uses open database connectivity or ODBC to move data between different types of databases on the system
99
Data synchronization
the process of automatically merging and updating common data that is stored on multiple devices
100
Data Wiping
a method used to remove any sensitive data from a mobile device and prematurely delete it
101
Daughter Board
any circuit board that plugs into another circuit board
102
dd
A Linux command that copies and converts files to enable them to be transferred from one type of media to another
103
DDos- Distributed Denial of Service
a type of denial of service attack that uses multiple devices on disparate networks to launch the court is attacked from many simultaneous resources
104
Dead Pixels
Pixels that do not display light as expected and will show up as small black dots
105
Deciphering
the process of reversing a cipher
106
Default Gateway
An IP address of the router that routes remote traffic from the devices local subnet to remote subnets
107
Defender
the anti-spyware software that is included with windows XP Vista and seven installations
108
Definition
a coded pattern that identifies of virus also called a signature
109
DEFRAG
utility available in all versions of Windows that scans and analyzes how file fragments are arranged and access on the hard disk
110
Device Manager
in windows in administrative tool that is used to manage and configure system devices in a hardware profile
111
DHCP- Dynamic Host Configuration Protocol
A network service that provides automatic assignments of I people addresses and other TCP/IP configuration information on the network systems that are configured as a DHCP client
112
Dial-up Line
loop phone connections that use modems and standard telephone technology
113
Dictionary attack
an attack that automates password guessing by comparing encrypted passwords against a predetermined list of possible password values
114
Digital transmission
the transfer of information in a signal that comprises only ones in zeros
115
Digitizer
on touchscreen displays a layer of sensors between the LCD display and a layer of glass that enables the translation of the analog touch signal to a digital signal
116
DIMM- Dual In-Line Memory Module
A RAM form factor that is found in most systems and that has a 64 bit data path
117
Direct thermal printer
a thermal printer that uses heated pins to form images directly onto specifically coded thermal paper
118
Directory
a component in a filesystem hierarchy that provides a container to organize files and other directories or folders
119
Directory service
on a network, a centralized database that includes objects such as servers, clients, usernames, and passwords, and provide centralized administration and authentication
120
Discovery mode
a device mode that will transmit a friendly signal to another device in close proximity
121
Disc controller
circuitry that manages the transfer of data to and from a disk drive whether it is a hard disk drive or an optical disk drive. The disk controller provides a communication path between the CPU and the disk drive
122
Disc duplexing
disk near mirroring in which the two drives in the mirror each have a dedicated disk controller
123
Disk maintenance
the process of monitoring and adjusting the configuration of HDD's and the file systems contained on those HDD's.
124
Disk partition
in isolated section of a desk that functions like a separate physical drive
125
Display device
a personal computer component that enables users to view the text and graphical data output from a computer
126
Display port
a digital display standard that aims to replace DVI and VGA standards
127
Dissipative material
a conductor but with high resistance that loses its electrical charge slowly
128
Distro
a complete Linux implementation including Col. show applications and utilities that is packaged distributed and supported by a software vendor
129
DLP- Data Loss Prevention
software or a software suite that helps protect data from being stolen while the data is moving across the network
130
DMZ- Demilitarized Zone
a small section of a private network that is located between two firewalls and made available for public access
131
DNS- Domain Name System
the primary name resolution service on the network that maps computer names to their associated IP addresses
132
Dock
a bar along the bottom or side of the screen that contains icons for apps that come with the Macintosh computer
133
Docking station
Desktop devices that connect portable computers to standard desktop career frills without the need to connect and disconnect the peripherals themselves when a user switches from stationary to mobile use
134
Domain
a Microsoft network model that and administrator implements by grouping computers together the purpose of sharing a centralized user account database Sharing this user account database enables users to use these accounts to log onto any computer in the domain
135
Domain controller
a server that stores the user account database for the domain and is responsible for authenticating users when they log on to the domain
136
Dongle
a small hardware component that when attached to the computing device the additional functionality such as wireless connectivity
137
Dot-Matrix Printer
an impact printer that forms images out of dots on paper by using a set of pins to strike an inked ribbon
138
DPI- Dots Per Inch
a measure of the ink density in a printed document. Higher DPI measures tended to provide clearer and more distinct output
139
Drive rails
Metal strips that can be screwed onto an internal drive before installation
140
DRM- Digital Rights Management
A way to control access to copyrighted content that is presented in digital format
141
DSL- Digital Subscriber Line
a broadband technology that transmits digital signals over existing phone lines
142
Dump file
the file that stores the contents of a memory dump
143
Dump E2FS
A Linux utility that manages extended filesystems
144
Duplex scanning
a feature that scans both sides of a document automatically
145
DVI- Digital Video Interface
a video standard for transferring both analog and digital video signals
146
Dynamic addressing
a method used to assign addresses using the DHCP Service
147
E-reader
a mobile digital device designed primarily for reading digital publications such as E-books in digital periodicals
148
EAS- Exchange AcitveSync
that enables mobile devices to connect to exchange server to access mail, calendar, and contacts.
149
Easy transfer
a bill-in Data migration utility in Windows Vista in Windows 7 that helps transfer files, data, and settings from one personal computer to another.
150
Eavesdropping attack
an attack that uses special monitoring software to intersect private network communications, either to steal the content of the communication itself or to obtain usernames and passwords for future software attacks.
151
ECC- Error Correcting Code
an error correction method that uses several bits of error-checking
152
EEPROM- electronically erasable programmable read-only memory
A ROM chip that can be reprogrammed by using software from the bios or Chip manufacturer through the flashing process
153
EFS- Encrypting File System
a file-encryption tool available on Windows systems that have partitions formatted with NT file system.
154
EIA- Electronic Industries Alliance
a standards And trades organization that developed industry standards for technologies such as network cabling. The EIA ceased operations in February 2011
155
Electrical interference
a general term for unwanted signals on the network media that can interfere with network transmissions.
156
EMI- Electromagnetic Interference
the degradation of signal that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on and in adjacent circuit.
157
eMMC- Embedded Multi-Media Controller
a storage component that contains flash memory and a flash memory controller integrated onto the same silicone die.
158
Emulator
the software installed that allows the computer to virtually run another operating system, or another instance of the same operating system.
159
Enciphering
the process of applying a cipher.
160
Encryption
the process of converting data into a form that is not easily recognized or understood by unauthorized entities.
161
Entry control roster
A document for all visitors to sign in and out when entering and leaving the building.
162
EP Drum- Electrostatic Photographic drum
the component in a laser printer that carries electrical charge to attract toner and then to transfer the toner to the paper.
163
ERD- Emergency Repair Disk
a windows XP troubleshooting tool that stores the contents of the\ windows\ repair folder.
164
eSATA- External Serial Advanced Technology Attachment
an external interface for SATA connections, enabling you to connect external SATA drives to PC’s.
165
ESD- Electrostatic Discharge
the phenomenon that occurs when electrons rush from one body was static electrical charge to another with an equal charge, following the path of least resistance.
166
Ethernet
a family of networking technologies that provide connectivity by using ethernet network adapters, contention-based media access, and twisted pair, coax, or fiber media.
167
Event viewer
in administrative tool that is used to view the contents of event logs, which contain information about significant events that occur on your computer.
168
Expansion card
A printed circuit board that is installed in the slot on the system board to provide special functions for customizing or extending A computers capabilities. Also referred to as adapter card, I\O card, add-in, add-on, or bored.
169
Express card
a mobile expansion card design by the PCMCIA to replace traditional PC cards to provide PCI Express and USB 2.0 connectivity.
170
ext2
a native Linux filesystem.
171
ext3
a native Linux file system that improves on the data recovery and integrity measures provided with ext2.
172
ext4
a native Linux filesystem that offers backwards compatibility, journaling, in support for extremely large volumes, in addition to all the features of ext3.
173
External device
a personal computer component that provides alternative input or output methods or additional storage.
174
External enclosure
a plastic barrier that protects the inner workings of a hard drive.
175
F-connector
a coaxial Cable connector used to connect TV and FM antennas.
176
FC Face Contact
connectors that use a heavy duty ferrule in the center for more mechanical stability than SMA or ST connectors.
177
Fdisk
a Menu-driven utility program that is used for creating, modifying, or deleting partitions on a disk drive.
178
Fiber
a method used to connect devices to the Internet using fiber optic cable
179
Fiber optic cable
a type of cable in which one or more glass or plastic strands, Plus additional fiber strands or wraps, are surrounded by a protective outer jacket. Light pulses carry the signal through fiber-optic cable.
180
File attribute
a characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users.
181
File recovery software
software that can recover deleted files from your computer system.
182
File serve
the computer that stores programs and files that are intended to be shared among network users.
183
Filesystem
a method that is used by operating system to store, retrieve, organize, and manage files and directories on mass storage devices
184
Filesystem integrity
the degree of correctness and validity of the filesystem.
185
Finder
the file and folder management app that is included with OS X.
186
Firewall
a software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic.
187
Firmware
software stored in memory chips retains data whether or not power the computer is on.
188
First response
refers to the individual and immediate actions that follow an incident.
189
Fixboot
a command line tool used to create a new partition boot sector to a hard drive partition.
190
Fix MBR
a command line tool used to repair the masturbator recovery record of the boot partition.
191
Flashing
updating firmware electronically.
192
Form factor
the size and shape of a given component. Often used in terms of motherboard and drive characteristics.
193
Formed-Character printer
any type of impact printer that functions like a typewriter, By pressing preformed characters against the ink ribbon to deposit the ink on the page.
194
Frequency
the number of complete cycles per second in an analog wave or a radio wave.
195
Front light
a form of lighting devices from the front of the display.
196
fsck
A Linux command that checks the integrity of the filesystem.
197
stab
a configuration file that stores information about storage devices and partitions and where and how the partitions should be mounted.
198
Full duplex
permits simultaneous two-way Communication
199
Fuser assembly
a component in a laser printer that uses two rollers to heat toner particles, melting them onto the paper.
200
Gadget
a mini application in Windows that can't perform an information display task.
201
Gaming PC
A computer that comes equipped with powerful graphics capabilities, fast processing capabilities, in a large amount of memory, and that is intended for use in computer gaming environments.
202
GAN- Global Area Network
any worldwide network
203
Gateway
a device, software, or system that converts data between incompatible systems.
204
gdisk
A Linux partition management utility for partitions in the globally unique identifier partition table format.
205
Generator
a power protection device that creates its own the electricity through use of motors.
206
Gestures
finger movements on a track pad or mouse that enable the user to scroll, Zoom, in navigate desktop, document, application content.
207
Ghost cursor
a cursor that jumps around on The screen randomly, or moves too slow, or opens windows in menus on its own.
208
GNU parted
A Linux partition management utility for new hard disks.
209
GPRS
(General Packet Radio Service) A standard for wireless communications that runs at speeds up to 115 kbps and that supports a wide range of bandwidths.
210
GPS device
(global positioning system device) A mobile digital device that provides navigational directions to reach specified destinations.
211
GPU
(graphics processing unit) An electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images intended for display output
212
GRUB2
(GRand Unified Bootloader 2) A program used in Linux distributions that loads operating system kernels.
213
GUI
(graphical user interface) A collection of icons, windows, and other screen elements that help users interact with an operating system.
214
guideline
A subset of a security profile, and a document that outlines best practices and recommendations to help conform to policies.
215
half duplex
Permits two-way communication, but only in one direction at a time.
216
HDD
(hard disk drive) A personal computer storage device that uses fixed media and magnetic data storage.
217
HDMI
(High Definition Multimedia Interface) A proprietary audio/video interface for transferring uncompressed video data and compressed or uncompressed digital audio data from a display controller to a compatible peripheral device over a single HDMI cable.
218
heat sink
A passive heat exchanger that dissipates heat from a source such as a CPU and transfers it, normally via an enlarged surface area, to another medium such as air or water.
219
heavy-duty MFD
A large network-enabled MFD capable of handling the documentation needs of an entire office.
220
hertz
A unit of measurement that indicates cycles or occurrences per second.
221
Hibernate
A power option available in Windows environments in which the computer will store whatever is currently in memory on the hard disk and shut down, and then return to the state it was in upon hibernation when it is awakened.
222
high-level formatting
See standard formatting.
223
hoax
Any message containing incorrect or misleading information that is disseminated to multiple users through unofficial channels.
224
host firewall
A firewall installed on a single or home computer.
225
HTPC
(home theater PC) A computer that is dedicated and configured to store and stream digital movies, either from the local hard drive or through an online subscription such as Netflix.
226
hub
A networking device used to connect the drops in a physical star topology network into a logical bus topology. Also called a multiport repeater.
227
hypervisor
In virtualization technology, an application that is installed on the host machine and is used to configure and manage the VMs running on the host.
228
IANA
(Internet Assigned Numbers Authority) An international agency that manages port assignments.
229
iCloud
A cloud storage solution that is accessed by using the user's Apple ID.
230
IDS
(intrusion detection system) Software or hardware, or a combination of both, that scans, audits, and monitors the security infrastructure for signs of attacks in progress and automates the intrusion detection process.
231
IEEE
(Institute of Electrical and Electronic Engineers) Pronounced "I-triple-E." An organization of scientists, engineers, and students of electronics and related fields whose technical and standards committees develop, publish, and revise computing and telecommunications standards.
232
IEEE 1394 connection
A PC connection that provides a high-speed interface for peripheral devices that are designed to use the Institute of Electrical and Electronic Engineers (IEEE) 1394 standard.
233
ifconfig
A Linux command for configuring network interfaces for Linux servers and workstations
234
IMAP4
(Internet Mail Access Protocol) A protocol used to retrieve email messages and folders from a mail server.
235
IMEI number
(International Mobile Equipment Identity) A number that uniquely identifies a mobile device.
236
impact printer
Any type of printer that strikes a component directly against the paper or ink to create characters on the paper
237
impersonation
An approach in which an attacker pretends to be someone they are not, typically an average user in distress, or a help-desk representative.
238
IMSI number
(International Mobile Subscriber Identity) A number that uniquely identifies a mobile subscriber.
239
in-place upgrade
The process of installing a newer version of an operating system without first removing the existing operating system that is currently installed on the computer.
240
in-rush
A surge or spike that is caused when a device that uses a large amount of current is started
241
incident management
A set of practices and procedures that govern how an organization will respond to an incident in progress.
242
incident report
A record of any instance where a person is injured or computer equipment is damaged due to environmental issues. Also, a record of accidents involving hazardous materials, such as chemical spills, that could have an impact on the environment itself.
243
infrastructure mode
A method for wireless devices to communicate with other devices by first connecting to an AP.
244
inkjet printer
A printer that forms images by spraying ink on the paper.
245
input device
A personal computer component that enables users to enter data or instructions into a computer.
246
interface
The point at which two devices connect and communicate with each other.
247
Internet appliance
A relatively inexpensive PC that enables Internet access and a specific activity.
248
inverter
A laptop component that converts DC power to AC power for the display.
249
iOS
The operating system designed for Apple devices. It is the base software that allows all other applications to run on an iPhone, iPod touch, or iPad.
250
IP
(Internet Protocol) A group of rules for sending data across a network. Communication on the Internet is based on the IP protocol.
251
IPS
(in-plane switching) An LCD panel technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction.
252
IPv4 address
A 32-bit binary number assigned to a computer on a TCP/IP network.
253
IPv6
An Internet standard that increases the available pool of IP addresses by implementing a 128-bit binary address space
254
IPv6 address
The unique 128 bit identification assigned to an interface on the IPv6 Internet.
255
IR
(infrared) A form of wireless transmission in which signals are sent via pulses of infrared light.
256
IR waves
(infrared waves) Electromagnetic waves with frequencies ranging from 300 GHz to 400 THz.
257
ISDN
A digital transmission technology that carries both voice and data over digital phone lines or PSTN wires
258
ISO 9660
A filesystem found on CDs and DVDs.
259
ISP
(Internet Service Provider) A company that provides access to the Internet.
260
iwconfig
A Linux command for configuring wireless network interfaces for Linux servers and workstations.
261
JFS
A 64-bit journaling filesystem that is fast and reliable.
262
key fob
A security device small enough to attach to a key chain that contains identification information used to gain access to a physical entryway.
263
Keychain
A password management system included with OS X.
264
KVM switch
(keyboard, video, mouse) A device that enables a computer user to control multiple computers with a single keyboard and mouse, with the display sent to a single monitor.
265
LAN
(local area network) A self-contained network that spans a small area, such as a single building, floor, or room.
266
landscape
In printing, a page orientation that is wider than it is tall.
267
laptop
A complete computer system that is small, compact, lightweight, and portable.
268
laser printer
A type of printer that forms high-quality images on one page of paper at a time, by using a laser beam, toner, and an electrophotographic drum
269
LC
(Local Connector) A small form factor ceramic ferrule connector for both single-mode and multimode fiber.
270
LCD
(Liquid Crystal Display) A type of flat-panel display that uses Cold Cathode Fluorescent Lamps as the source of backlight and that comes in large-screen sizes of 17 inches and more, with high screen resolution and high color depth.
271
LDAP
(Lightweight Directory Access Protocol) A communications protocol that defines how a client can access information, perform operations, and share directory data on a directory server.
272
least privilege
The principle that establishes that users and software should only have the minimal level of access that is necessary for them to perform the duties required of them.
273
LED printer
A type of printer that uses LEDs to print.
274
line noise
A power problem that is caused by a fluctuation in electrical current.
275
line printer
A type of impact printer that can print a full line of text at a time, rather than printing character by character.
276
link light
An indicator on a network adapter that lights up when a network signal is detected
277
Linux
An open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds.
278
Linux distribution
A complete Linux implementation, including kernel, shell, applications, and utilities, that is packaged, distributed, and supported by a software vendor
279
Linux rescue environment
A standalone Linux program for troubleshooting a corrupt Linux installation.
280
liquid-based cooling
Cooling methods that circulate a liquid or liquefied gas, such as water or freon, past the CPU to keep it cool.
281
Local Area Connection
A Windows troubleshooting tool used to verify that the computer is connected to the network and able to send and receive data.
282
local printer
A logical printer that is managed by the local computer, where the print device is generally directly attached.
283
Local Security Policy
An administrative tool that is used to view and edit the security settings for group policies.
284
local share
A folders that is created on the local network by an individual user and then shared with other network users via shared folder permissions.
285
Local snapshot
In OS X, a copy of altered files that is stored on the startup drive until the Time Machine backup drive is available.
286
Local Users and Groups
An administrative tool that is used to manage user accounts on the local system.
287
lockup error
An error condition that causes the system or an application to stop responding to user input.
288
logic bomb
A piece of code that sits dormant on a user's computer until it is triggered by a specific event, such as a specific date. Once the code is triggered, the logic bomb "detonates," erasing and corrupting data on the user's computer.
289
loopback plug
A special connector used for diagnosing network transmission problems that redirects electrical signals back to the transmitting system.
290
LOS
(Line-of-Sight) Wireless signals that travel over a direct visual path from a transmitter to a receiver.
291
low-level formatting
The process of writing track sector markings on a hard disk.
292
LTFS
(Linear Tape File Systems) An IBM specification that enables data stored on magnetic tapes to be accessed in a file format
293
lumen
The unit of measurement for visible light that is being emitted from a light source.
294
MAC address
(Media Access Control address) Same as the physical address.
295
mail server
A computer that stores incoming email messages and forwards outgoing email messages.
296
malicious software
Any unwanted software that has the potential to damage a system or create a nuisance condition.
297
malware
Any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition.
298
MAN
(metropolitan area network) A network that covers an area equivalent to a city or other municipality.
299
man-in-the-middle attack
A form of eavesdropping where the attacker makes an independent connection between two victims and relays information between the victims as if they are directly talking to each other over a closed connection, when in reality the attacker is controlling the information that travels between the victims.
300
mantrap
Two sets of interlocking doors inside a small space, where the first set of doors must close before the second set opens.
301
manual pages
A series of pages that contain the complete documentation specific to every Linux command. Also referred to as man pages.
302
MBR
(Master Boot Record) The first sector of a partitioned storage device, used for booting the computer and often a target of malware.
303
memory
A personal computer component that provides temporary workspace for the processor.
304
memory dump
The process of writing the contents of system memory at the time of a stop error to a file on the hard disk prior to system shutdown.
305
memory module
A system unit component that holds a group of memory chips that act as a single memory chip.
306
MFD
(multi-function device) A piece of office equipment that performs the functions of a number of other specialized devices.
307
microATX
Introduced in late 1997, and is often referred to as μATX, and has a maximum size of 9.6 inches by 9.6 inches.
308
MicroDIMM
(Micro Dual Inline Memory Module) A memory module standard used in some laptops.
309
Mini-ATX
A smaller version of the full ATX board with a maximum size of 11.2 inches by 8.2 inches.
310
Mini-BNC
A bayonet-style connector using the traditional BNC connection method.
311
Mini-HDMI
(Mini High-Definition Multimedia Interface) A smaller version of the full size HDMI connector, except that it is specified for use with portable devices.
312
mini-ITX
A small compact board that fit the same form factor as the ATX, and the micro-ATX boards. They have a maximum size of 6.7 inches by 6.6 inches.
313
Mini-PCIe
(PCI Express Mini Card) An extremely small expansion card, often just a few centimeters in length, used to increase communication abilities by providing network adapters or modems and supports various connections and buses.
314
mirroring
A disk fault-tolerance method in which data from an entire partition is copied onto a second drive.
315
Mission Control
A feature of OS X that allows users to use multiple Spaces as if they were multiple desktops.
316
mkfs
A command used to build a Linux filesystem on a device such as a hard disk partition.
317
mobile digital device
An electronic device that provides computing power in a portable format.
318
modem
A device that converts digital data to an analog signal that can be sent over a telephone line.
319
motherboard
The main circuit board in a computer that acts as the backbone for the entire computer system. Also referred to as the system board
320
MSCONFIG
A system utility that is specifically used to troubleshoot any issues with the system startup process.
321
MSDS
(Material Safety Data Sheet) A technical bulletin designed to give users and emergency personnel information about the proper procedures of storage and handling of a hazardous substance.
322
MT-RJ
(Mechanical Transfer Registered Jack) Also called a Fiber Jack connector, is a compact snap-to-lock connector used with multimode fiber.
323
multi-factor authentication
Any authentication scheme that requires validation of at least two of the possible authentication factors.
324
multimedia device
A computer peripheral or internal component that transfers sound, images, or both to or from a PC.
325
multimeter
An electronic instrument used to measure voltage, current, and resistance.
326
multitouch
The technology used on the surface of the touch screen on tablets and other mobile devices that can recognize more than one contact on the surface at once.
327
mutual authentication
A security mechanism that requires that each party in a communication verifies its identity.
328
Napier's Bones
A set of rectangular rods with numbers etched on them that let users do multiplication by adding the numbers on properly positioned rods. A precursor to the slide rule.
329
NAT
(Network Address Translation) A simple form of Internet connection and security that conceals internal addressing schemes from the public Internet.
330
native resolution
The fixed resolution for LCD or other flat panel display devices.
331
network
A group of computers that are connected together to communicate and share resources.
332
network-based firewall
A hardware/software combination that protects all the computers on a network behind the firewall.
333
network-based printer
A shared print device managed by a network print server. It's represented as a logical printer object on the client computer that accesses the server.
334
network-connected printer
Any print device than can connect directly to the network with a network adapter rather than using a physical cable to connect to a local computer or print server device
335
NFC
(near field communications) A wireless communication method that enables wireless devices to establish radio communications by touching them together or by bringing them into close proximity with each other, typically within 10 cm or less.
336
NIC
(network interface card) An expansion card that enables a PC to connect to a LAN. Also referred to as a network adapter.
337
non-compliant system
Any system that tries to connect to an organization's network and that doesn't meet the minimum requirements of the organizational network, as defined by corporate security policies.
338
Northbridge
A component of the chipset that controls the system memory and the AGP video ports, and sometimes the cache memory.
339
OLED display
(organic light emitting diode) A type of LED flat panel display device that uses organic compounds that emit light when subjected to an electric current.
340
Open Handset Alliance
An association of 84 firms for developing open standards for mobile devices.
341
OpenSSH
An open source implementation of the SSH protocol that is included with most Linux distributions. See SSH
342
optical disc
A personal computer storage device that stores data optically, rather than magnetically.
343
optical drive
A computer drive that is either internal or external to a computer system that reads and writes data to an optical disc.
344
organizational policy
A document that conveys the corporate guidelines and philosophy to employees.
345
orientation
In printing, the position of the page and the direction of the content printed on the page.
346
OS X
The proprietary operating system developed by Apple® Computing, Inc. and deployed on all Apple computers.
347
overvoltage
A power condition where the voltage in a circuit is raised above the circuit’s upper voltage limit.
348
page
A section of memory addresses in which a unit of data can be stored.
349
page fault
An interrupt generated when an application requests data that is no longer present in its virtual memory location.
350
pagefile
In a virtual-memory system, the section of the hard disk used to store memory contents that have been swapped out of physical RAM. In Windows systems, the pagefile is called Pagefile.sys.
351
pairing
The process two devices use to establish a wireless connection through Bluetooth
352
PAN
(personal area network) A network of devices used by a single individual.
353
parity
An error correction method for electronic communications.
354
partition management
The process of creating, destroying, and manipulating partitions to optimize system performance.
355
partitioning
The process of dividing a single hard disk into isolated sections that function as separate physical hard drives, called partitions.
356
partprobe
A Linux program that updates the kernel with partition table changes.
357
patch
A fix or update for a software program or application, designed to eliminate known bugs or vulnerabilities and improve performance.
358
patch management
The practice of monitoring for, evaluating, testing, and installing software patches and updates.
359
PCI
(Peripheral Component Interconnect) See PCI bus.
360
PCI bus
(Peripheral Component Interconnect bus) A peripheral bus commonly used in PCs that provides a high-speed data path between the CPU and peripheral devices.
361
PCI Express
(Peripheral Component Interconnect Express) A video adapter bus that is based on the PCI computer bus. PCIe supports significantly enhanced performance over that of AGP.
362
PCIe
(Peripheral Component Interconnect Express) See PCI Express.
363
peer-to-peer network
A network in which resource sharing, processing, and communications control are completely decentralized.
364
Performance Monitor
An administrative tool that monitors the state of services or daemons, processes, and resources on a system.
365
peripheral device
See external device.
366
permissions
In Windows, security settings that control access to individual objects, such as files.
367
personal firewall
See host firewall
368
phablet
A mobile digital device that is larger than a standard sized smartphone and smaller than a tablet.
369
pharming
Similar to phishing, this type of social engineering attack redirects a request for a website, typically an e-commerce site, to a similar-looking, but fake, website.
370
phishing
A type of email-based social engineering attack in which the attacker sends email from a spoofed source, such as a bank, to try to elicit private information from the victim.
371
physical address
For network adapter cards, a globally unique hexadecimal number burned into every adapter by the manufacturer.
372
physical security
The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.
373
piconet
A network of two to eight Bluetooth-enabled devices.
374
PictBridge
A technology that allows images to be printed directly on a printer from digital cameras.
375
PII
(personally identifiable information) Any information that can be used by itself or in combination with additional information as a way to identify, contact, or find a single person, or to identify a particular individual by using the various pieces of information together to determine the person's identity.
376
pixel
The smallest discrete element on a display. A single pixel is composed of a red, a blue, and a green dot.
377
plaintext
Unencoded data. Also called cleartext.
378
plasma display
A type of flat panel that uses a gas mixture placed between two sheets of glass that have electrodes attached to their surfaces.
379
plastics
The hard surfaces that protect the internal components of a laptop.
380
plenum cable
A grade of cable that does not give off noxious or poisonous gases when burned. Unlike PVC cable, plenum cable can be run through the plenum and firebreak walls.
381
PoE
(Power-over-Ethernet) An emerging technology standard that enables both power and data to be transmitted over an Ethernet cable.
382
pointer drift
A situation where the mouse pointer moves across the screen without the user touching the touchpad or mouse.
383
policy
A subset of a security profile, and a document that outlines the specific requirements and rules everyone must meet
384
pop-up
Windows or frames that load and appear automatically when a user connects to a particular web page.
385
POP3
(Post Office Protocol version 3) A protocol used to retrieve email from a mailbox on the mail server.
386
port
A hardware connection interface on a personal computer that enables devices to be connected to the computer, or the endpoint of a logical connection that client computers use to connect to specific server programs.
387
port filtering
A technique of selectively enabling or disabling TCP and UDP ports on computers or network devices. It ensures that no traffic, except for the protocol that the administrator has chosen to allow, can pass through an open port
388
port replicator
A scaled-down version of a docking station with only the standard ports available.
389
portrait
In printing, a page orientation that is taller than it is wide.
390
POST
(Power-On Self Test) A built-in diagnostic program that is run every time a personal computer starts up.
391
POST card
(Power-On Self Test card) A card that can be plugged directly into the motherboard in an available expansion card slot that can read and display any error codes that get generated during the POST process of a computer.
392
power sag
See sag.
393
power supply
An internal computer component that converts line voltage AC power from an electrical outlet to the low-voltage DC power needed by system components.
394
power supply tester
A tool that connects to the power supply's 24- pin connector that tests the functionality of the unit.
395
pre-installation environment
A lighter version of Windows or Windows Server that can be installed in either 32- or 64- bit versions.
396
prestaging
The process of creating computer accounts in Windows Active Directory before joining the computers to the domain
397
PRI
(Preferred Roaming Index) An index that works with the PRL to provide the best data/ voice quality to a phone while roaming.
398
Print Management
An administrative tool that is used to view and manage all of the printers and print servers installed on a network.
399
print quality
A combination of parameters that define the appearance of the printed output.
400
print queue
A list of print jobs waiting to print.
401
print server
A computer that enables network users to share printers.
402
printer
An output device that produces text and images from electronic content onto physical media such as paper or transparency film.
403
privacy filter
A cover for a device's screen, making it difficult for anyone to read the screen who is not positioned directly in front of the screen.
404
private IP address
Addresses used by organizations for nodes that require IP connectivity within their enterprise network, but do not require external connections to the global Internet
405
PRL
(Preferred Roaming List) A database built by CDMA service carriers to indicate which radio bands should be used when connecting to a cell tower.
406
procedure
A subset of a security profile, and a document that provides detailed information about specific devices and technologies that support policies.
407
process table
A record that summarizes the current running processes on a system.
408
proxy
A system that acts as an intermediary for requests for resources.
409
proxy server
A computer or application that isolates internal clients from external servers by downloading and storing files on behalf of the clients.
410
PSTN
(Public Switched Telephone Network) An international telephone system that carries analog voice data.
411
public IP addresses
Addresses that can be used by organizations that can also be shared with external networks.
412
punch down tool
A tool used in a wiring closet to connect cable wires directly to a patch panel.
413
PVC
(polyvinyl chloride) A flexible rubber-like plastic used to surround some twisted pair cabling. It is flexible and inexpensive, but gives off noxious or poisonous gases when burned
414
QoS
(Quality of Service) A set of parameters that controls the level of quality provided to different types of network traffic.
415
radio firmware
In a mobile device, memory that contains an operating system that is separate from the end- user operating system (for example, Android or iOS) and that controls all of the low-level timing-dependent functions of the mobile device.
416
radio networking
A form of wireless communication in which signals are sent via RF waves, in the 10 KHz to 1 GHz range, to wireless antennas.
417
RAID
(Redundant Array of Independent or Inexpensive Disks) A set of vendor- independent specifications for fault-tolerant configurations on multiple-disk systems.
418
RAM
(Random Access Memory) A computer storage method that functions as a computer's main memory.
419
RAM module
See RAM chip.
420
rapid elasticity
A cloud computing feature that provides seamless, scalable provisioning.
421
RCA
(Radio Corporation of America) A cable and connector that is used to carry audio and video transmissions to and from a variety of devices such as TVs, digital cameras, and gaming systems.
422
ReadyBoost
A performance enhancer, available on Windows Vista and Windows 7, that allows the user to supplement the computer's memory with an external storage device like a flash drive.
423
recovery image
A file used by Windows to refresh your PC.
424
refresh rate
The number of times per second that the monitor is “refreshed,” or scanned to illuminate the pixels.
425
Registry
The central configuration database where Windows stores and retrieves startup settings, hardware and software configuration information, and information for local user accounts.
426
regsvr32
A troubleshooting utility that registers and unregisters OLE controls such as DLL and ActiveX files
427
ReiserFS
A filesystem that handles small files more efficiently and faster than ext2 and ext3.
428
Remote Desktop
A software application that operates a Windows computer from a remote location.
429
Remote Disc
A feature of OS X that enables users to access external drives or share discs from another computer.
430
resolution
The number of pixels that make up the dimension of a display, represented in a ratio value as the number of horizontal pixels by vertical pixels.
431
RF
(radio frequency) Any of the electromagnetic wave frequencies that lie in the range extending from around 3 kHz to 300 GHz, which include those frequencies used for communications or radar signals. Commonly used as a synonym for wireless communication.
432
RF
(radio frequency) A frequency in which network or other communications take place using radio waves in the 10 KHz to 1 GHz range.
433
RFI
(radio frequency interference) See EMI.
434
RFID badge
A security card that contains a tag that reacts with the radio frequency of the identification system to allow or deny access.
435
RIMM
(Rambus Inline Memory Modules) A RAM form factor that has a metal cover that acts as a heat sink. Although they have the same number of pins, RIMMs have different pin settings and are not interchangeable with DIMMs and SDRAM
436
riser card
A board that is plugged into the system board and provides additional slots for adapter cards
437
ROM
(Read-Only Memory) Memory that saves and stores system data without a constant power source.
438
rootkit
Malicious code that is designed to hide the existence of processes or programs from normal detection methods and to gain continuous privileged access to a computer system.
439
rotation method
The schedule that determines how many backup tapes or other media sets are needed, and the sequence in which they are used and reused.
440
router
A networking device that connects multiple networks that use the same protocol.
441
RPM
(Red Hat Package Manager) A tool that provides a standard software installation mechanism, information about installed software packages, and a method for uninstalling and upgrading existing software packages.
442
RSA token
A small device that includes cryptographic keys, a digital signature, or even biometric information that is verified against an identification system to allow or deny access to a physical location, system, or network location.
443
S-Video
An analog video signal that carries the video data as two separate signals (brightness and color). S-Video works in 480i or 576i resolution.
444
Safe Mode
A Windows system startup method that loads only a minimal set of drivers and services and that is used in troubleshooting Windows computers.
445
sag
A momentary low-voltage power failure.
446
SATA
(Serial Advanced Technology Attachment) A type of hard drive that requires a serial data channel to connect the drive controller and the disk drives.
447
SATA connection
(Serial Advanced Technology Attachment connection) A drive connection standard that provides a serial data channel between the drive controller and the disk drives.
448
satellite
Provides extremely long-range wireless network transmissions to relay network signals from the network service provider to individual customers.
449
SC
(Subscriber Connector or Standard Connector ) Box-shaped connectors that snap into a receptacle. SC connectors are often used in a duplex configuration where two fibers are terminated into two SC connectors that are molded together.
450
SCSI ID
Identifiers assigned to each SCSI device connected to the bus. The ID numbers range from 1 to 15.
451
security control
A safeguard or prevention method to avoid, counteract, or minimize security risks relating to personal or company property.
452
security incident
A specific instance of a risk event occurring, whether or not it causes damage.
453
security incident report
Documentation of a security incident, including the type and severity of the incident, personnel involved in the incident, a description of the incident, and any mitigation actions taken.
454
security policy
A formalized statement that defines how security will be implemented within a particular organization.
455
security profile
A large, comprehensive document that describes the security measures for an organization.
456
server
A computer that provides services and resources on the network.
457
server virtualization
Takes place centrally on a server and utilizes one logical device, typically the server, to act as the host machine for the “guest” machines that virtually use the applications and programs provided by the host.
458
server-side virtualization
See server virtualization.
459
Service Pack
Comprehensive software update that generally includes all prior patches and updates, but which can also include important new features and functions.
460
set-top box
A device that converts video content to a format that can be viewed on a television. Also referred to as streaming players or media players.
461
sfc
(System File Checker) A command line tool used to verify system files and replace them, if needed.
462
sfdisk
A Linux partition management utility.
463
Shadow Copy
A feature available on Windows XP and newer operating systems that creates backup copies or snapshots of the system's data and stores them locally or to an external location, either manually or at regularly scheduled intervals.
464
share
A network resource, such as a disk, folder, or printer, that is available to other computer users on the network.
465
shell
A component that interacts directly with users and functions as the command interpreter for the Linux operating system.
466
shoulder surfing
A human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.
467
Sidebar
A designated area of the Windows 7 and Windows Vista desktop, displayed vertically along the side of the desktop, where users can add gadgets of their choice to provide information and access to frequently used tools or programs.
468
signal loss
The weakening of a radio signal from a cell tower such that your phone cannot connect to the network.
469
signature
A code pattern that identifies a virus. Also called a definition
470
SIMM
(Single In-line Memory Modules) A RAM form factor with a 32-bit data path.
471
SLA
(Service Level Agreement) An agreement entered into by the transmitter, or ISP, and the receiver, or subscriber.
472
Sleep
A power option available in Windows Vista, Windows 7, Windows Server 2008, and Apple OSs, in which the computer conserves as much energy as possible by cutting off power to the parts of the machine that are not necessary to function, excluding RAM.
473
SMA
(Sub Multi Assembly or Sub Miniature type A) Connectors that use a threaded ferrule on the outside to lock the connector in place.
474
SMART
(Self-Monitoring, Analysis, and Reporting Technology) A monitoring system that can help anticipate storage drive failures due to excess heat, excess noise, damaged sectors, or read/write errors.
475
smart camera
A digital camera that includes a processor, memory, cellular and Wi-Fi support, and a mobile operating system.
476
smart card
A device similar to a credit card that can store authentication information, such as a user's private key, on an embedded microchip
477
smart TV
A hybrid device that is basically a television set with web and Internet features built into it.
478
smart watch
A multipurpose device that runs computing applications and that is worn on a person's wrist.
479
smartphone
A mobile digital device that combines the functionality of a portable phone with that of media players, GPS navigation units, personal digital assistants, and cameras
480
SMB
(Server Message Block) A protocol that works on the Application layer and is used to share files, serial ports, printers, and communications devices, including mail slots and named pipes, between computers.
481
snapshot printer
A printer that produces snapshot-sized images of acceptable photographic quality.
482
sniffing attack
See eavesdropping attack.
483
SNMP
(Simple Network Management Protocol) An Application-layer protocol used to exchange information between network devices.
484
social engineering attack
A type of attack where the goal is to obtain sensitive data, including user names and passwords, from network users through deception and trickery.
485
SODIMM
(Small Outline Dual In-line Memory Module) Memory that is half the size of DIMMs, are available in 32- or 64-bit data paths, and are commonly found in laptops and iMac systems.
486
software diagnostic tool
A computer repair program that can analyze hardware and software components and test them for problems. Also referred to as software diagnostic utility.
487
SOHO MFD
(small office/home office multi-function device) A medium-sized network-enabled MFD suitable for small and home offices with enhanced printing, scanning, copying, and faxing functions.
488
SOHO network
(small office/home office) A small network that provides connectivity and resource sharing for a small office or home office.
489
soldered
A means of securing electronic components to a circuit board by using a combination of lead, tin, and silver (solder) and a tool called a soldering iron.
490
solid ink printer
A type of printer that uses ink from melted solid-ink sticks.
491
Southbridge
A component of the chipset that controls input/output functions, the system clock, drives and buses, APM power management, and various other devices.
492
space
In OS X, a virtual desktop consisting of a collection of related windows, as created and managed by Mission Control.
493
spam
Originally, frequent and repetitive postings in electronic bulletin boards; more commonly, unsolicited or distasteful commercial email from anonymous sources.
494
SPDIF
(Sony Phillips Digital Interconnect Format) A digital format signal used to connect audio devices to output audio signals over a short distance.
495
spear phishing
See whaling.
496
speed light
An indicator on a network adapter that shows whether the adapter is operating at 10 Mbps, 100 Mbps, or 1,000 Mbps.
497
spike
A very short increase in the electrical supply voltage or current carried on any wire such as a power line, phone lines, and network lines. Usually lasts only a few miliseconds.
498
spim
An IM-based attack similar to spam that is propagated through instant messaging instead of through email.
499
spoofing
A human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment. Spoofing can occur in IP addresses, MAC addresses, and email.
500
Spot Light
A feature of OS X that enables users to search for apps, documents, images, and other files
501
spyware
Unwanted software that collects personal user data from a system and transmits it to a third party.
502
SSD
(solid state drive) A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
503
SSH
(Secure Shell) A protocol that enables a user or application to log on to another computer over a network, execute commands, and manage files.
504
SSHD
(solid state hybrid drive) A personal computer storage device that offers the best features of solid state and magnetic data storage by combining the traditional rotating platters of a magnetic HDD and a small amount of high- speed flash memory on a single drive.
505
SSID
(Service Set Identifier) A 32-bit alphanumeric string that identifies a wireless access point and all devices that connect to it.
506
SSL
(Secure Sockets Layer) A security protocol that uses certificates for authentication and encryption to protect web communication.
507
ST
(Straight Tip) Connects multimode fiber. ST connectors look like BNC connectors.
508
standard
A subset of a security profile, and a tactical document that specifies processes to follow to meet policy requirements.
509
standard formatting
An operating system function that builds file systems on drives and partitions.
510
standby
A power-saving mode where the computer cuts power to the hard drive and peripherals while storing current data in RAM.
511
static addressing
Configuring TCP/IP statically on a network. Requires that an administrator visit each node to manually enter IP address information for that node.
512
static electricity
The buildup of stationary electrical charge on any object.
513
stop error
A system error severe enough to stop all processes and shut the system down without warning. Often referred to as "blue-screen errors" in Windows because they generate an error message screen with a blue background.
514
storage device
A computer component that enables users to save data for reuse at a later time, even after the personal computer is shut down and restarted.
515
Storage Spaces
The Windows 8/8.1 implementation of RAID.
516
striping
A disk-performance-enhancement feature in which data is spread across multiple drives to improve read and write access speeds.
517
strong password
A password that meets the complexity requirements that are set by a system administrator and documented in a security policy or a password policy.
518
stuck pixels
Pixels that only show one color of light, so they appear out of place when the display is on.
519
subnet mask
A 32-bit number that is assigned to each host to divide the 32-bit binary IP address into network and node portions.
520
sudo
(super user do) A Linux command that enables users to run programs with the security privileges of the root user.
521
surge
A sudden sharp increase in voltage or current that can last up to 50 microseconds.
522
surge suppressor
A power protection device that provides power protection circuits that can reduce or eliminate the impact of surges and spikes.
523
Suspend
A power option available in Linux, in which the computer conserves as much energy as possible by cutting off power to the parts of the machine that are not necessary to function, excluding RAM.
524
swap
A portion of the hard disk that is used in situations when Linux runs out of physical memory and needs more of it.
525
swapping
In a virtual memory system, the process of moving data back and forth from physical RAM to the pagefile. Also called paging.
526
switch
A smart network hardware device that joins multiple network segments together.
527
system BIOS
The BIOS that sets the computer’s configuration and environment when the system is powered on.
528
system board
The same as motherboard.
529
system bus
The primary communication pathway between a CPU and other parts of the chipset. The system bus enables data transfer between the CPU, BIOS, memory, and the other buses in the computer. Also referred to as frontside bus or local bus.
530
System Configuration
An administrative tool that is used to identify and manage issues that may be causing the system to run improperly at startup.
531
system files
The files necessary for the operating system to function properly.
532
system image
A copy of Windows, applications, system settings, and data files that is stored in a separate location than where the originals of these items are stored.
533
System Restore
A utility available in Windows XP, Windows Vista, and Windows 7 that monitors the system for changes to core system files, drivers, and the Registry, and creates restore points to be used to help restore the system if a failure occurs.
534
system restore point
A snapshot of the system configuration at a given moment in time that contains information about any changes to these components and is stored on the computer's hard disk. Restore points can be used to restore system settings to an earlier state without affecting changes in user data since that time.
535
system unit
A personal computer component that includes other devices necessary for the computer to function, including the chassis, power supply, cooling system, system board, microprocessor, memory chips, disk drives, adapter cards, and ports for connecting external devices. Often referred to as a box, main unit, or base unit.
536
tablet
A mobile device that includes an integrated touch screen display, virtual onscreen keyboard, and flash memory for data storage.
537
tape drive
A personal computer storage device that stores data magnetically on a removable tape.
538
Task Manager
A basic system-diagnostic and performance- monitoring tool included with the Windows operating system.
539
Task Scheduler
An administrative tool that allows the user to create and manage certain system tasks that will be automatically carried out by the computer at predetermined times.
540
TCP
(Transmission Control Protocol) A connection-oriented, guaranteed-delivery protocol used to send data packets between computers over a network such as the Internet.
541
TCP/IP
(Transmission Control Protocol/Internet Protocol) A nonproprietary, routable network protocol suite that enables computers to communicate over a network, including the Internet.
542
termination
Adding a resistor to the end of a coax network segment to prevent reflections that would interfere with the proper reception of network signals.
543
TFT
(thin film transistor) A display type commonly used in laptops.
544
thermal dye transfer printer
A sophisticated type of color printer that uses heat to diffuse dye from color ribbons onto special paper or transparency blanks to produce continuous-tone output similar in quality to a photographic print. Also called dye sublimation printer.
545
thermal paper
Paper that contains a chemical designed to react with the heating element of a thermal printer to create images on paper.
546
thermal paste
A paste that is used to connect a heat sink to a CPU to provide a liquid thermally conductive compound gel that fills any gaps between the CPU and the heat sink to permit a more efficient transference of heat from the processor to the heat sink.
547
thermal printer
Any printer that uses heat to create the image on the paper with dye or ink from ribbons or with heated pins.
548
thermal wax transfer printer
A printer that uses a thermal printhead to melt wax-based ink from a transfer ribbon onto the paper.
549
thick client
A business computer that performs most or all computing functions on its own. Also referred to as a fat client.
550
thin client
A business computer that relies heavily on another system, typically a server, to run most of its programs, processes, and services.
551
Thunderbolt connection
A hardware interface that supports connecting a wide variety of peripheral devices to PCs and that can use optical fiber or copper wire to transmit signals.
552
TIA
(Telecommunication Industry Association) A standards and trades organization that develops industry standards for technologies such as network cabling.
553
Time Machine
An OS X application that provides automated file backups.
554
TKIP
(Temporal Key Integrity Protocol ) A security protocol created by the IEEE 802.11i task group to replace WEP.
555
TLS
(Transport Layer Security) A security protocol that protects sensitive communication from eavesdropping and tampering by using a secure, encrypted, and authenticated channel over a TCP/IP connection.
556
TN
(twisted nematic) An LCD panel technology where the panel is black when no electric current is running through the liquid crystal cells because the cells align themselves in a twisted state. When an electric current is applied, the liquid crystal cells untwist, allowing light to pass through, resulting in a white display screen.
557
token
A physical or virtual object that stores authentication information.
558
tone generator
An electronic device that sends an electrical signal through one set of UTP cables.
559
tone locator
An electronic device that emits an audible tone when it detects a signal in a set of wires.
560
toner
An electrostatic-sensitive dry ink substance used in laser printers.
561
traces
Wires etched on to the motherboard to provide electrical pathways.
562
trackpoint
A small button found on some laptops that enables you to move the mouse pointer when no mouse is connected to the computer.
563
transistors
Switches that are etched on one sliver of a semiconductor that can be opened or closed when conducting electricity.
564
triboelectric generation
The use of friction to create a static charge.
565
Trojan horse
Malicious code that masquerades as a harmless file. When a user executes it, thinking it is a harmless application, it destroys and corrupts data on the user's hard drive.
566
twisted pair
A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating outer jacket.
567
User Account Control (UAC)
An enhanced security feature of Windows Vista and Windows 7 that aims to limit the privileges of a standard user unless a computer administrator decides otherwise.
568
User Datagram Protocol (UDP)
connectionless, best-effort delivery protocol used to send data packets between computers over a network
569
Unified Extensible Firmware Interface (UEFI)
standard firmware interface for PCs that was designed to improve software interoperability and address the limitations in BIOSs.
570
UNIX
A family of operating systems originally developed at Bell Laboratories and characterized by portability, multiuser support, and built-in multitasking and networking functions.
571
Universal Plug and Play (UPnP)
feature found in wireless routers to enable computers, printers, and other Wi-Fi-enabled devices to be easily discoverable by the router.
572
Uninterruptible Power Supply (UPS)
device that continues to provide power to connected circuits when the main source of power becomes unavailable
573
Universal Serial Bus (USB)
hardware interface standard designed to provide connections for numerous peripherals.
574
USB connection
A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.
575
user account
A collection of credentials and important information about a person with access to the system
576
user authentication
A security measure in which a computer user proves its identity in order to gain access to resources.
577
User State Migration Tool (USMT)
command-line utility that copies files and settings from one Microsoft Windows computer to another.
578
Unified Threat Management (UTM)
The concept of combining the features of a firewall, gateway antivirus, and IDS/IPS into a single device.
579
vfat
A 32-bit filesystem that supports long file names and is compatible with the FAT filesystem found in older versions of Microsoft Windows.
580
Video Graphics Array (VGA)
display standard that is implemented with a 15-pin DB-15 connector.
581
virtual memory
The allocation by the computer system of a portion of the hard disk as if it was physical RAM.
582
virtual printer
A software-based alternative to a physical printer that enables you to print to a file.
583
virtualization
The technological process of creating a virtual version of a computer environment by separating the elements of the computing environment from each other and from the physical hardware it runs on via an additional software layer.
584
virtualization workstation
A computer that uses both hardware virtualization and client virtualization resources to provide a comprehensive virtual workstation for users.
585
virus
A piece of code that spreads from one computer to another by attaching itself to other files.
586
Fishing
A human-based attack where the goal is to extract personal, financial, or confidential information from the victim by using services such as the telephone system .
587
visual artifact
An error or anomaly in the visual display of a picture.
588
Virtual Memory Manager (VMM)
Windows system component responsible for managing physical-to-virtual memory mappings and virtual memory assignments.
589
Virtual Network Computing (VNC)
platform- independent system through which a user can control a remote system
590
Virtual Private Network (VPN)
private network that protects communications sent through a public network such as the Internet.
591
Wide Area Network (WAN)
network that spans multiple geographic locations, connecting multiple LANs using long-range transmission media.
592
Wireless Access Point (WAP)
device that provides connection between wireless devices and can connect to wired networks.
593
waveform
The shape of an analog signal when plotted on an oscilloscope or graph.
594
wearable technology
Small mobile computing devices that are designed to be worn under, with, or on top of a person's clothing.
595
web server
A computer that provides access to personal, corporate, or educational website content.
596
Wired Equivalent Privacy (WEP)
Provides 64-bit, 128-bit, and 256-bit encryption for wireless communication that uses the 802.11a and 802.11b protocols.
597
whaling
A form of phishing that targets wealthy
598
Wi-Fi
The popular implementation of the 802.11b wireless standard.
599
Wi-Fi locator
A utility that can be installed on computing devices to locate wireless networks within range of the device.
600
Worldwide Interoperability for Microwave Access (WiMAX)
A packet-based wireless technology that provides wireless broadband access over long distances.
601
Windows Defender
The anti-spyware software that is included with Windows Vista and Windows 7 installations.
602
Windows Firewall with Advanced Security
An administrative tool that is used to manage advanced firewall settings for the computer and any remote computers connected to the network.
603
Windows Memory Diagnostic
An administrative tool that is used to check the RAM on the system
604
Windows security policies
Configuration settings within Windows operating systems that control the overall security behavior of the system.
605
Windows pre-installation environment (WinPE)
A lightweight version of Windows or Windows Server that can be used for deployment of the full version of the OS or for troubleshooting OS problems.
606
wire crimper
A tool that attaches media connectors to the ends of cables.
607
wire stripper
A tool that is often incorporated into a wire crimper and that enables the user to remove the protective coating from electrical wires.
608
wireless connection
A network connection that transmits signals without using physical network media.
609
wireless encryption
The process of concealing and protecting data during wireless transmissions.
610
wireless locator
See wireless tester
611
Wireless Network Connection
A Windows troubleshooting tool used to verify that a computer or other wireless device is connected to the network and able to send and receive data.
612
wireless security
Any method of securing your wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.
613
wireless tester
A Wi-Fi spectrum analyzer used to detect devices and points of interference
614
Wake-on-LAN (WOL)
Turn on a device by a message through NIC Circuitry
615
workgroup
A peer-to-peer Microsoft network model that groups computers together for organizational purposes, often deployed in homes and small offices.
616
worm
A piece of code that spreads from one computer to another on its own, not by attaching itself to another file.
617
Wi-Fi Protected Access (WPA)
A strong authentication security protocol to address some of the shortcomings in the WEP protocol during the pending development of the 802.11i IEEE standard.
618
Wi-Fi Protected Access version 2 (WPA2)
A complete wireless standard that adds strong encryption and authentication security to 802.11 and relies on 802.1x as the authentication mechanism.
619
Wireless Personal Area Network (WPAN)
A network that connects devices in very close proximity but not through a wireless access point.
620
Wireless Wide Area Network (WWAN)
Uses wireless network technology to allow users to check email, surf the web, and connect to corporate resources accessible within the cellular network boundaries.
621
X forwarding
A Mechanism by which programs are run on one machine and the X window output is displayed to another machine
622
XFS
A 64-bit, high-performance journaling File System that provides fast recovery and can handle large files efficiently
623
XP Mode
A downloadable add-on for Windows 7 that allows Windows XP-compatible software and programs directly on their desktops.
624
Zero Day Attack
An attack that exploits a previously unknown vulnerability in an application or operating system.
625
Zombie
Unauthorized software that directs the devices to launch a DDoS attack.