Comp A+ Definitions Flashcards

1
Q

802.11

A

A family of specifications for wireless LAN Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11a

A

A fast, secure, relatively expensive wireless communication. speeds up to 54 Mbps in the 5 Ghz Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11ac

A

wireless data throughput at a rate of up to 2 Gbps in the 5 GHz range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11b

A

It is least expensive wireless network protocol used to transfer data 11 Mbps transfer rate in the 2.4 GHz Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11g

A

wireless data throughput at the rate of up to 54 Mbps in the 2.4 GHz band, replacement for 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.11n

A

A specification for wireless data throughput at a rate of up to 600 Mbps in the 2.4 GHz or 5 GHz range. Released in 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accelerometer

A

Mobile tech determine the orientation and acceleration of a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ACL- Access Control List

A

A set of data (use names, passwords, time and date, IP addresses, MAC addresses, etc) used to control access to a resource such as a computer, file, or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Activity Light

A

An indicator on a network adapter that flickers when packets are received or sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ad hoc mode

A

A method for wireless devices to communicate directly with each other without the use of an AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Administrative Share

A

A hidden share created by default on every Windows system. If deleted, by default, the system recreates them when it restarts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adware

A

Unwanted software, purpose of presenting commercial advertisements to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Aero

A

A color scheme available in Windows Vista and Windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES- Advanced Encryption Standard

A

A symmetric 128-192-, or 256- bit block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AIO MFD- All-in-one multi-function device

A

A small sized MFD for home users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Algorithm

A

In encryption, the rule, system, or mechanism used to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Analog Transmission

A

The transfer of information in the form of a continuous wave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Android

A

An OS for mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Anti-spyware software

A

Software that is specifically designed to protect systems against spyware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Antivirus Software

A

An application that scans files for executable code that matches patterns known to be common to viruses, and monitors systems for activity associated with viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AP- Access Point

A

A device or software that facilitates communication and provides enhanced security to wireless devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

APIPA- Automatic Private IP Addressing

A

DHCP client computer to configure itself automatically with a random IP address in the range of 169.254.0.1 to 169.254.255.254 if no DHCP server available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Argument

A

A file name or directory name that indicates the files on which a command will operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ARP- Address Resolution Protocol

A

A protocol that maps IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Aspect Ratio

A

A characteristic of display devices that indicates the ratio of width to height

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Attack

A

A technique that is used to exploit a vulnerability without the authorization to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ATX

A

introduced by Intel in 1995 to provide better I/O support, lower cost, easier use, and better processor support than even earlier form factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

AUP- Acceptable use Policy

A

A Policy that includes the practices and guidelines that should be followed by employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Authentication Server

A

determines whether or not access credentials supplied by a user should enable them to access resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Authenticator App

A

generates single-use security tokens, used as part of two-step verification/ multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Auto Negotiation

A

Negotiates a speed that is compatible with the network router or switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Backlight

A

The typical form of illumination used in a full sized LCD display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Badge

A

identification card or token, used to swipe through an identification system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Baseband

A

A transmission scheme where a single signal sends data using the entire bandwidth of the transmission media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Baseband RTOS- Baseband Real Time Operating System

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Baseline

A

A subset of a security profile, and a document that outlines the minimum level of security required for a system, device, network, or premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Beamforming

A

A feature of 802.11ac that transmits radio signals directly at a specific device using smart antennas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Biometric Lock

A

A lock that is activated by biometric features, such as a fingerprint, voice, retina, or signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Biometrics

A

recognizing a person based on a physiological or behavioral characteristic unique to the individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

BIOS- Basic Input/ Output System

A

instructions that is stored in ROM and used to start the most basic services of a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

BIOS Memory

A

Special memory that keeps track of its data even when the power is turned off, and is stored in EEPROM’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

BitLocker

A

A security feature in Windows 7 and Windows server 2008 that provides full disk encryption protection for your OS as well as all the data stored on the OS volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Blackout

A

A compete loss of electrical power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Bluetooth

A

A wireless radio technology that facilitates short-range (usually less than 30 feet) wireless communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

BNC- Bayonet Neill-Concelman

A

A twist lock connector on Coaxial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Boot Camp

A

An OS X app that lets you install Microsoft Windows and then switch between OS X and the Windows OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Boot Process

A

sequential steps on start up with the final result being OS is loaded components are functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Bootrec

A

A command line tool during Windows Recovery Environment to troubleshoot or repair startup issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Botnet

A

A set of devices that has been infected by a control program called a bot that enables attackers to exploit them and mount attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Bridge

A

A software-based network device that has the same functionality as a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Brightness

A

The amount of light emitted from a display device, as measured in lumens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Broadband Communication

A

A category of network transmission technologies that provide high throughput by splitting communications pathways into multiple channels transmitted simultaneously over the network media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Brownout

A

A temporary power reduction that is used by electrical power companies to deal with high power demands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Brute-force Attack

A

uses password-cracking software to attempt every possible alphanumeric password combination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

BSOD- Blue Screen of Death

A

A system error that is severe enough to stop all processes and shut the OS down without warning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Bus

A

In a computer system, a group of wires that connect components. They provide a pathway for data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

BYOD- Bring Your Own Device

A

An organizational policy that enables employees to use their personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Cable

A

Transmissions that use a cable television connection and a specialized interface device known as a cable modem to provide high-speed Internet access to homes and small businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cable Modem

A

A hardware device that connects a subscriber’s device to a service provider’s cable systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Cable Stripper

A

A device that enables you to remove the protective coating from wiring to facilitate installing a media connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Cache Memory

A

High-speed memory that the CPU can access directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

CCFO- Cold Cathode Fluorescent Lamp

A

A light source that uses electrodes and mercury vapor to create ultraviolet light.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

CDFS- Compact Disc File System

A

A file system standard for optical disc media that is supported by multiple OS types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Cellular

A

Uses radio signals to transmit network data over the cellular telephone system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Chain of Custody

A

The record of evidence history from collection. To presentation in court, to disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Chipset

A

The set of chips on the system board that support the CPU and other basic functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

CIDR- Classless Inter Domain Routing

A

A sub netting method that selects a subnet mask that meets an individual network’s networking and node requirements and then treats the mask like a 32-bit binary word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

CIFS- Common Internet File System

A

A file and resource sharing protocol that is related to SMB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Cipher

A

A method for concealing the meaning of text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Ciphertext

A

Data that has been encoded with a cipher and is unreadable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Clear text

A

The unencrypted form of data. Also called plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Client

A

A computer that makes use of the services and resources of other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Client-side Virtualization

A

Takes place at the end points and separates the elements of a user’s logical desktop environment- the applications, OS, programs, etc.-and divides them from each other and from the physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Client/server Network

A

A network in which some computers act as servers to provide special services for other client computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

CMDLET

A

A lightweight command that runs in the Windows PowerShell Environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

CMOS- Complimentary Metal-oxide semiconductor

A

An old style of static memory that was used to store information about the computer set up that the system bios refers to each time the computer started

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Coax

A

common abbreviation for co-axial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Coaxial Cable

A

a type of cable that features a central conductor surrounded by braided or foil shielding. a dialectric insulator separates the conductor in shield and the entire packages wrapped in an insulating layer called a jacket the outer shielding serves to reduce electromagnetic interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Collate

A

document Collection and combining of pages in their proper order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Command Line Interpreter (CLI)

A

a program that implements the commands in the text interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Command Prompt

A

in a CLI the area of the screen where users enter commands to interact with the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Component Services

A

in administrative tool that is used to deploy component applications and configure behaviors of components and applications on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Component/ RGB

A

a type analog video information that is transmitted or stored as two or more separate signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Composite Video

A

the format of an analog or picture only signal before it is combined with the sound signal and modulated onto the radio frequency carrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Computer Case

A

The enclosure that holds all of the components of a PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Computer Connection

A

A hardware component that enables a PC to communicate with internal or external devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Computer Forensics

A

collecting and analyzing data from storage devices Computer systems networks and wireless communications and presenting this information as a form of evidence in a court of law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Computer management

A

the primary administrative tool used to manage and configure the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Content filtering

A

a method of setting limits on user browser sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Cooling System

A

a system unit component that prevents damage to computer parts by dissipating the heat generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Corporate Owned Personally Enabled (COPE)

A

an organizational policy that enables employees to use company own devices for personal use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Corona

A

an assembly within a laser printer that contains a wire the Corona wire which is responsible for charging the paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

CPU

A

the main chip on the system board, the CPU performs software instructions and mathematical and logical calculations. Also referred to as the microprocessor or processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Cryptography

A

the science of hiding information to protect sensitive information and communications from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Data Backup

A

System maintenance task that enables you to store copies of critical files and folders on another medium for safekeeping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Data Container

A

on a mobile device a scheme for isolating business data from personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Data Restoration

A

assistant recovery task that enables you to access the backed up data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Data Sources

A

an administrative tool that uses open database connectivity or ODBC to move data between different types of databases on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Data synchronization

A

the process of automatically merging and updating common data that is stored on multiple devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Data Wiping

A

a method used to remove any sensitive data from a mobile device and prematurely delete it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Daughter Board

A

any circuit board that plugs into another circuit board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

dd

A

A Linux command that copies and converts files to enable them to be transferred from one type of media to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

DDos- Distributed Denial of Service

A

a type of denial of service attack that uses multiple devices on disparate networks to launch the court is attacked from many simultaneous resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Dead Pixels

A

Pixels that do not display light as expected and will show up as small black dots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Deciphering

A

the process of reversing a cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Default Gateway

A

An IP address of the router that routes remote traffic from the devices local subnet to remote subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Defender

A

the anti-spyware software that is included with windows XP Vista and seven installations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Definition

A

a coded pattern that identifies of virus also called a signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

DEFRAG

A

utility available in all versions of Windows that scans and analyzes how file fragments are arranged and access on the hard disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Device Manager

A

in windows in administrative tool that is used to manage and configure system devices in a hardware profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

DHCP- Dynamic Host Configuration Protocol

A

A network service that provides automatic assignments of I people addresses and other TCP/IP configuration information on the network systems that are configured as a DHCP client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Dial-up Line

A

loop phone connections that use modems and standard telephone technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Dictionary attack

A

an attack that automates password guessing by comparing encrypted passwords against a predetermined list of possible password values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Digital transmission

A

the transfer of information in a signal that comprises only ones in zeros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Digitizer

A

on touchscreen displays a layer of sensors between the LCD display and a layer of glass that enables the translation of the analog touch signal to a digital signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

DIMM- Dual In-Line Memory Module

A

A RAM form factor that is found in most systems and that has a 64 bit data path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Direct thermal printer

A

a thermal printer that uses heated pins to form images directly onto specifically coded thermal paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Directory

A

a component in a filesystem hierarchy that provides a container to organize files and other directories or folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Directory service

A

on a network, a centralized database that includes objects such as servers, clients, usernames, and passwords, and provide centralized administration and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Discovery mode

A

a device mode that will transmit a friendly signal to another device in close proximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Disc controller

A

circuitry that manages the transfer of data to and from a disk drive whether it is a hard disk drive or an optical disk drive. The disk controller provides a communication path between the CPU and the disk drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Disc duplexing

A

disk near mirroring in which the two drives in the mirror each have a dedicated disk controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Disk maintenance

A

the process of monitoring and adjusting the configuration of HDD’s and the file systems contained on those HDD’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Disk partition

A

in isolated section of a desk that functions like a separate physical drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Display device

A

a personal computer component that enables users to view the text and graphical data output from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Display port

A

a digital display standard that aims to replace DVI and VGA standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Dissipative material

A

a conductor but with high resistance that loses its electrical charge slowly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Distro

A

a complete Linux implementation including Col. show applications and utilities that is packaged distributed and supported by a software vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

DLP- Data Loss Prevention

A

software or a software suite that helps protect data from being stolen while the data is moving across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

DMZ- Demilitarized Zone

A

a small section of a private network that is located between two firewalls and made available for public access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

DNS- Domain Name System

A

the primary name resolution service on the network that maps computer names to their associated IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Dock

A

a bar along the bottom or side of the screen that contains icons for apps that come with the Macintosh computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Docking station

A

Desktop devices that connect portable computers to standard desktop career frills without the need to connect and disconnect the peripherals themselves when a user switches from stationary to mobile use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Domain

A

a Microsoft network model that and administrator implements by grouping computers together the purpose of sharing a centralized user account database Sharing this user account database enables users to use these accounts to log onto any computer in the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Domain controller

A

a server that stores the user account database for the domain and is responsible for authenticating users when they log on to the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Dongle

A

a small hardware component that when attached to the computing device the additional functionality such as wireless connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Dot-Matrix Printer

A

an impact printer that forms images out of dots on paper by using a set of pins to strike an inked ribbon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

DPI- Dots Per Inch

A

a measure of the ink density in a printed document. Higher DPI measures tended to provide clearer and more distinct output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Drive rails

A

Metal strips that can be screwed onto an internal drive before installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

DRM- Digital Rights Management

A

A way to control access to copyrighted content that is presented in digital format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

DSL- Digital Subscriber Line

A

a broadband technology that transmits digital signals over existing phone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Dump file

A

the file that stores the contents of a memory dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Dump E2FS

A

A Linux utility that manages extended filesystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Duplex scanning

A

a feature that scans both sides of a document automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

DVI- Digital Video Interface

A

a video standard for transferring both analog and digital video signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Dynamic addressing

A

a method used to assign addresses using the DHCP Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

E-reader

A

a mobile digital device designed primarily for reading digital publications such as E-books in digital periodicals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

EAS- Exchange AcitveSync

A

that enables mobile devices to connect to exchange server to access mail, calendar, and contacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Easy transfer

A

a bill-in Data migration utility in Windows Vista in Windows 7 that helps transfer files, data, and settings from one personal computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Eavesdropping attack

A

an attack that uses special monitoring software to intersect private network communications, either to steal the content of the communication itself or to obtain usernames and passwords for future software attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

ECC- Error Correcting Code

A

an error correction method that uses several bits of error-checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

EEPROM- electronically erasable programmable read-only memory

A

A ROM chip that can be reprogrammed by using software from the bios or Chip manufacturer through the flashing process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

EFS- Encrypting File System

A

a file-encryption tool available on Windows systems that have partitions formatted with NT file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

EIA- Electronic Industries Alliance

A

a standards And trades organization that developed industry standards for technologies such as network cabling. The EIA ceased operations in February 2011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Electrical interference

A

a general term for unwanted signals on the network media that can interfere with network transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

EMI- Electromagnetic Interference

A

the degradation of signal that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on and in adjacent circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

eMMC- Embedded Multi-Media Controller

A

a storage component that contains flash memory and a flash memory controller integrated onto the same silicone die.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Emulator

A

the software installed that allows the computer to virtually run another operating system, or another instance of the same operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Enciphering

A

the process of applying a cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Encryption

A

the process of converting data into a form that is not easily recognized or understood by unauthorized entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Entry control roster

A

A document for all visitors to sign in and out when entering and leaving the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

EP Drum- Electrostatic Photographic drum

A

the component in a laser printer that carries electrical charge to attract toner and then to transfer the toner to the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

ERD- Emergency Repair Disk

A

a windows XP troubleshooting tool that stores the contents of the\ windows\ repair folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

eSATA- External Serial Advanced Technology Attachment

A

an external interface for SATA connections, enabling you to connect external SATA drives to PC’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

ESD- Electrostatic Discharge

A

the phenomenon that occurs when electrons rush from one body was static electrical charge to another with an equal charge, following the path of least resistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Ethernet

A

a family of networking technologies that provide connectivity by using ethernet network adapters, contention-based media access, and twisted pair, coax, or fiber media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Event viewer

A

in administrative tool that is used to view the contents of event logs, which contain information about significant events that occur on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Expansion card

A

A printed circuit board that is installed in the slot on the system board to provide special functions for customizing or extending A computers capabilities. Also referred to as adapter card, I\O card, add-in, add-on, or bored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Express card

A

a mobile expansion card design by the PCMCIA to replace traditional PC cards to provide PCI Express and USB 2.0 connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

ext2

A

a native Linux filesystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

ext3

A

a native Linux file system that improves on the data recovery and integrity measures provided with ext2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

ext4

A

a native Linux filesystem that offers backwards compatibility, journaling, in support for extremely large volumes, in addition to all the features of ext3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

External device

A

a personal computer component that provides alternative input or output methods or additional storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

External enclosure

A

a plastic barrier that protects the inner workings of a hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

F-connector

A

a coaxial Cable connector used to connect TV and FM antennas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

FC Face Contact

A

connectors that use a heavy duty ferrule in the center for more mechanical stability than SMA or ST connectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Fdisk

A

a Menu-driven utility program that is used for creating, modifying, or deleting partitions on a disk drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Fiber

A

a method used to connect devices to the Internet using fiber optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Fiber optic cable

A

a type of cable in which one or more glass or plastic strands, Plus additional fiber strands or wraps, are surrounded by a protective outer jacket. Light pulses carry the signal through fiber-optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

File attribute

A

a characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

File recovery software

A

software that can recover deleted files from your computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

File serve

A

the computer that stores programs and files that are intended to be shared among network users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Filesystem

A

a method that is used by operating system to store, retrieve, organize, and manage files and directories on mass storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Filesystem integrity

A

the degree of correctness and validity of the filesystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Finder

A

the file and folder management app that is included with OS X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Firewall

A

a software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Firmware

A

software stored in memory chips retains data whether or not power the computer is on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

First response

A

refers to the individual and immediate actions that follow an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Fixboot

A

a command line tool used to create a new partition boot sector to a hard drive partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Fix MBR

A

a command line tool used to repair the masturbator recovery record of the boot partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Flashing

A

updating firmware electronically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

Form factor

A

the size and shape of a given component. Often used in terms of motherboard and drive characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Formed-Character printer

A

any type of impact printer that functions like a typewriter, By pressing preformed characters against the ink ribbon to deposit the ink on the page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Frequency

A

the number of complete cycles per second in an analog wave or a radio wave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

Front light

A

a form of lighting devices from the front of the display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

fsck

A

A Linux command that checks the integrity of the filesystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

stab

A

a configuration file that stores information about storage devices and partitions and where and how the partitions should be mounted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Full duplex

A

permits simultaneous two-way Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Fuser assembly

A

a component in a laser printer that uses two rollers to heat toner particles, melting them onto the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Gadget

A

a mini application in Windows that can’t perform an information display task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

Gaming PC

A

A computer that comes equipped with powerful graphics capabilities, fast processing capabilities, in a large amount of memory, and that is intended for use in computer gaming environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

GAN- Global Area Network

A

any worldwide network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

Gateway

A

a device, software, or system that converts data between incompatible systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

gdisk

A

A Linux partition management utility for partitions in the globally unique identifier partition table format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

Generator

A

a power protection device that creates its own the electricity through use of motors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

Gestures

A

finger movements on a track pad or mouse that enable the user to scroll, Zoom, in navigate desktop, document, application content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

Ghost cursor

A

a cursor that jumps around on The screen randomly, or moves too slow, or opens windows in menus on its own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

GNU parted

A

A Linux partition management utility for new hard disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

GPRS

A

(General Packet Radio Service) A standard for wireless communications that runs at speeds up to 115 kbps and that supports a wide range of bandwidths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

GPS device

A

(global positioning system device) A mobile digital device that provides navigational directions to reach specified destinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

GPU

A

(graphics processing unit) An electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images intended for display output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

GRUB2

A

(GRand Unified Bootloader 2) A program used in Linux distributions that loads operating system kernels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

GUI

A

(graphical user interface) A collection of icons, windows, and other screen elements that help users interact with an operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

guideline

A

A subset of a security profile, and a document that outlines best practices and recommendations to help conform to policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

half duplex

A

Permits two-way communication, but only in one direction at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

HDD

A

(hard disk drive) A personal computer storage device that uses fixed media and magnetic data storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

HDMI

A

(High Definition Multimedia Interface) A proprietary audio/video interface for transferring uncompressed video data and compressed or uncompressed digital audio data from a display controller to a compatible peripheral device over a single HDMI cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

heat sink

A

A passive heat exchanger that dissipates heat from a source such as a CPU and transfers it, normally via an enlarged surface area, to another medium such as air or water.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

heavy-duty MFD

A

A large network-enabled MFD capable of handling the documentation needs of an entire office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

hertz

A

A unit of measurement that indicates cycles or occurrences per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

Hibernate

A

A power option available in Windows environments in which the computer will store whatever is currently in memory on the hard disk and shut down, and then return to the state it was in upon hibernation when it is awakened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

high-level formatting

A

See standard formatting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

hoax

A

Any message containing incorrect or misleading information that is disseminated to multiple users through unofficial channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

host firewall

A

A firewall installed on a single or home computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

HTPC

A

(home theater PC) A computer that is dedicated and configured to store and stream digital movies, either from the local hard drive or through an online subscription such as Netflix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

hub

A

A networking device used to connect the drops in a physical star topology network into a logical bus topology. Also called a multiport repeater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

hypervisor

A

In virtualization technology, an application that is installed on the host machine and is used to configure and manage the VMs running on the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

IANA

A

(Internet Assigned Numbers Authority) An international agency that manages port assignments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

iCloud

A

A cloud storage solution that is accessed by using the user’s Apple ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

IDS

A

(intrusion detection system) Software or hardware, or a combination of both, that scans, audits, and monitors the security infrastructure for signs of attacks in progress and automates the intrusion detection process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

IEEE

A

(Institute of Electrical and Electronic Engineers) Pronounced “I-triple-E.” An organization of scientists, engineers, and students of electronics and related fields whose technical and standards committees develop, publish, and revise computing and telecommunications standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

IEEE 1394 connection

A

A PC connection that provides a high-speed interface for peripheral devices that are designed to use the Institute of Electrical and Electronic Engineers (IEEE) 1394 standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

ifconfig

A

A Linux command for configuring network interfaces for Linux servers and workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

IMAP4

A

(Internet Mail Access Protocol) A protocol used to retrieve email messages and folders from a mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

IMEI number

A

(International Mobile Equipment Identity) A number that uniquely identifies a mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

impact printer

A

Any type of printer that strikes a component directly against the paper or ink to create characters on the paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

impersonation

A

An approach in which an attacker pretends to be someone they are not, typically an average user in distress, or a help-desk representative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

IMSI number

A

(International Mobile Subscriber Identity) A number that uniquely identifies a mobile subscriber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

in-place upgrade

A

The process of installing a newer version of an operating system without first removing the existing operating system that is currently installed on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

in-rush

A

A surge or spike that is caused when a device that uses a large amount of current is started

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

incident management

A

A set of practices and procedures that govern how an organization will respond to an incident in progress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

incident report

A

A record of any instance where a person is injured or computer equipment is damaged due to environmental issues. Also, a record of accidents involving hazardous materials, such as chemical spills, that could have an impact on the environment itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

infrastructure mode

A

A method for wireless devices to communicate with other devices by first connecting to an AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

inkjet printer

A

A printer that forms images by spraying ink on the paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

input device

A

A personal computer component that enables users to enter data or instructions into a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

interface

A

The point at which two devices connect and communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

Internet appliance

A

A relatively inexpensive PC that enables Internet access and a specific activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

inverter

A

A laptop component that converts DC power to AC power for the display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

iOS

A

The operating system designed for Apple devices. It is the base software that allows all other applications to run on an iPhone, iPod touch, or iPad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

IP

A

(Internet Protocol) A group of rules for sending data across a network. Communication on the Internet is based on the IP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

IPS

A

(in-plane switching) An LCD panel technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction.

252
Q

IPv4 address

A

A 32-bit binary number assigned to a computer on a TCP/IP network.

253
Q

IPv6

A

An Internet standard that increases the available pool of IP addresses by implementing a 128-bit binary address space

254
Q

IPv6 address

A

The unique 128 bit identification assigned to an interface on the IPv6 Internet.

255
Q

IR

A

(infrared) A form of wireless transmission in which signals are sent via pulses of infrared light.

256
Q

IR waves

A

(infrared waves) Electromagnetic waves with frequencies ranging from 300 GHz to 400 THz.

257
Q

ISDN

A

A digital transmission technology that carries both voice and data over digital phone lines or PSTN wires

258
Q

ISO 9660

A

A filesystem found on CDs and DVDs.

259
Q

ISP

A

(Internet Service Provider) A company that provides access to the Internet.

260
Q

iwconfig

A

A Linux command for configuring wireless network interfaces for Linux servers and workstations.

261
Q

JFS

A

A 64-bit journaling filesystem that is fast and reliable.

262
Q

key fob

A

A security device small enough to attach to a key chain that contains identification information used to gain access to a physical entryway.

263
Q

Keychain

A

A password management system included with OS X.

264
Q

KVM switch

A

(keyboard, video, mouse) A device that enables a computer user to control multiple computers with a single keyboard and mouse, with the display sent to a single monitor.

265
Q

LAN

A

(local area network) A self-contained network that spans a small area, such as a single building, floor, or room.

266
Q

landscape

A

In printing, a page orientation that is wider than it is tall.

267
Q

laptop

A

A complete computer system that is small, compact, lightweight, and portable.

268
Q

laser printer

A

A type of printer that forms high-quality images on one page of paper at a time, by using a laser beam, toner, and an electrophotographic drum

269
Q

LC

A

(Local Connector) A small form factor ceramic ferrule connector for both single-mode and multimode fiber.

270
Q

LCD

A

(Liquid Crystal Display) A type of flat-panel display that uses Cold Cathode Fluorescent Lamps as the source of backlight and that comes in large-screen sizes of 17 inches and more, with high screen resolution and high color depth.

271
Q

LDAP

A

(Lightweight Directory Access Protocol) A communications protocol that defines how a client can access information, perform operations, and share directory data on a directory server.

272
Q

least privilege

A

The principle that establishes that users and software should only have the minimal level of access that is necessary for them to perform the duties required of them.

273
Q

LED printer

A

A type of printer that uses LEDs to print.

274
Q

line noise

A

A power problem that is caused by a fluctuation in electrical current.

275
Q

line printer

A

A type of impact printer that can print a full line of text at a time, rather than printing character by character.

276
Q

link light

A

An indicator on a network adapter that lights up when a network signal is detected

277
Q

Linux

A

An open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds.

278
Q

Linux distribution

A

A complete Linux implementation, including kernel, shell, applications, and utilities, that is packaged, distributed, and supported by a software vendor

279
Q

Linux rescue environment

A

A standalone Linux program for troubleshooting a corrupt Linux installation.

280
Q

liquid-based cooling

A

Cooling methods that circulate a liquid or liquefied gas, such as water or freon, past the CPU to keep it cool.

281
Q

Local Area Connection

A

A Windows troubleshooting tool used to verify that the computer is connected to the network and able to send and receive data.

282
Q

local printer

A

A logical printer that is managed by the local computer, where the print device is generally directly attached.

283
Q

Local Security Policy

A

An administrative tool that is used to view and edit the security settings for group policies.

284
Q

local share

A

A folders that is created on the local network by an individual user and then shared with other network users via shared folder permissions.

285
Q

Local snapshot

A

In OS X, a copy of altered files that is stored on the startup drive until the Time Machine backup drive is available.

286
Q

Local Users and Groups

A

An administrative tool that is used to manage user accounts on the local system.

287
Q

lockup error

A

An error condition that causes the system or an application to stop responding to user input.

288
Q

logic bomb

A

A piece of code that sits dormant on a user’s computer until it is triggered by a specific event, such as a specific date. Once the code is triggered, the logic bomb “detonates,” erasing and corrupting data on the user’s computer.

289
Q

loopback plug

A

A special connector used for diagnosing network transmission problems that redirects electrical signals back to the transmitting system.

290
Q

LOS

A

(Line-of-Sight) Wireless signals that travel over a direct visual path from a transmitter to a receiver.

291
Q

low-level formatting

A

The process of writing track sector markings on a hard disk.

292
Q

LTFS

A

(Linear Tape File Systems) An IBM specification that enables data stored on magnetic tapes to be accessed in a file format

293
Q

lumen

A

The unit of measurement for visible light that is being emitted from a light source.

294
Q

MAC address

A

(Media Access Control address) Same as the physical address.

295
Q

mail server

A

A computer that stores incoming email messages and forwards outgoing email messages.

296
Q

malicious software

A

Any unwanted software that has the potential to damage a system or create a nuisance condition.

297
Q

malware

A

Any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition.

298
Q

MAN

A

(metropolitan area network) A network that covers an area equivalent to a city or other municipality.

299
Q

man-in-the-middle attack

A

A form of eavesdropping where the attacker makes an independent connection between two victims and relays information between the victims as if they are directly talking to each other over a closed connection, when in reality the attacker is controlling the information that travels between the victims.

300
Q

mantrap

A

Two sets of interlocking doors inside a small space, where the first set of doors must close before the second set opens.

301
Q

manual pages

A

A series of pages that contain the complete documentation specific to every Linux command. Also referred to as man pages.

302
Q

MBR

A

(Master Boot Record) The first sector of a partitioned storage device, used for booting the computer and often a target of malware.

303
Q

memory

A

A personal computer component that provides temporary workspace for the processor.

304
Q

memory dump

A

The process of writing the contents of system memory at the time of a stop error to a file on the hard disk prior to system shutdown.

305
Q

memory module

A

A system unit component that holds a group of memory chips that act as a single memory chip.

306
Q

MFD

A

(multi-function device) A piece of office equipment that performs the functions of a number of other specialized devices.

307
Q

microATX

A

Introduced in late 1997, and is often referred to as μATX, and has a maximum size of 9.6 inches by 9.6 inches.

308
Q

MicroDIMM

A

(Micro Dual Inline Memory Module) A memory module standard used in some laptops.

309
Q

Mini-ATX

A

A smaller version of the full ATX board with a maximum size of 11.2 inches by 8.2 inches.

310
Q

Mini-BNC

A

A bayonet-style connector using the traditional BNC connection method.

311
Q

Mini-HDMI

A

(Mini High-Definition Multimedia Interface) A smaller version of the full size HDMI connector, except that it is specified for use with portable devices.

312
Q

mini-ITX

A

A small compact board that fit the same form factor as the ATX, and the micro-ATX boards. They have a maximum size of 6.7 inches by 6.6 inches.

313
Q

Mini-PCIe

A

(PCI Express Mini Card) An extremely small expansion card, often just a few centimeters in length, used to increase communication abilities by providing network adapters or modems and supports various connections and buses.

314
Q

mirroring

A

A disk fault-tolerance method in which data from an entire partition is copied onto a second drive.

315
Q

Mission Control

A

A feature of OS X that allows users to use multiple Spaces as if they were multiple desktops.

316
Q

mkfs

A

A command used to build a Linux filesystem on a device such as a hard disk partition.

317
Q

mobile digital device

A

An electronic device that provides computing power in a portable format.

318
Q

modem

A

A device that converts digital data to an analog signal that can be sent over a telephone line.

319
Q

motherboard

A

The main circuit board in a computer that acts as the backbone for the entire computer system. Also referred to as the system board

320
Q

MSCONFIG

A

A system utility that is specifically used to troubleshoot any issues with the system startup process.

321
Q

MSDS

A

(Material Safety Data Sheet) A technical bulletin designed to give users and emergency personnel information about the proper procedures of storage and handling of a hazardous substance.

322
Q

MT-RJ

A

(Mechanical Transfer Registered Jack) Also called a Fiber Jack connector, is a compact snap-to-lock connector used with multimode fiber.

323
Q

multi-factor authentication

A

Any authentication scheme that requires validation of at least two of the possible authentication factors.

324
Q

multimedia device

A

A computer peripheral or internal component that transfers sound, images, or both to or from a PC.

325
Q

multimeter

A

An electronic instrument used to measure voltage, current, and resistance.

326
Q

multitouch

A

The technology used on the surface of the touch screen on tablets and other mobile devices that can recognize more than one contact on the surface at once.

327
Q

mutual authentication

A

A security mechanism that requires that each party in a communication verifies its identity.

328
Q

Napier’s Bones

A

A set of rectangular rods with numbers etched on them that let users do multiplication by adding the numbers on properly positioned rods. A precursor to the slide rule.

329
Q

NAT

A

(Network Address Translation) A simple form of Internet connection and security that conceals internal addressing schemes from the public Internet.

330
Q

native resolution

A

The fixed resolution for LCD or other flat panel display devices.

331
Q

network

A

A group of computers that are connected together to communicate and share resources.

332
Q

network-based firewall

A

A hardware/software combination that protects all the computers on a network behind the firewall.

333
Q

network-based printer

A

A shared print device managed by a network print server. It’s represented as a logical printer object on the client computer that accesses the server.

334
Q

network-connected printer

A

Any print device than can connect directly to the network with a network adapter rather than using a physical cable to connect to a local computer or print server device

335
Q

NFC

A

(near field communications) A wireless communication method that enables wireless devices to establish radio communications by touching them together or by bringing them into close proximity with each other, typically within 10 cm or less.

336
Q

NIC

A

(network interface card) An expansion card that enables a PC to connect to a LAN. Also referred to as a network adapter.

337
Q

non-compliant system

A

Any system that tries to connect to an organization’s network and that doesn’t meet the minimum requirements of the organizational network, as defined by corporate security policies.

338
Q

Northbridge

A

A component of the chipset that controls the system memory and the AGP video ports, and sometimes the cache memory.

339
Q

OLED display

A

(organic light emitting diode) A type of LED flat panel display device that uses organic compounds that emit light when subjected to an electric current.

340
Q

Open Handset Alliance

A

An association of 84 firms for developing open standards for mobile devices.

341
Q

OpenSSH

A

An open source implementation of the SSH protocol that is included with most Linux distributions. See SSH

342
Q

optical disc

A

A personal computer storage device that stores data optically, rather than magnetically.

343
Q

optical drive

A

A computer drive that is either internal or external to a computer system that reads and writes data to an optical disc.

344
Q

organizational policy

A

A document that conveys the corporate guidelines and philosophy to employees.

345
Q

orientation

A

In printing, the position of the page and the direction of the content printed on the page.

346
Q

OS X

A

The proprietary operating system developed by Apple® Computing, Inc. and deployed on all Apple computers.

347
Q

overvoltage

A

A power condition where the voltage in a circuit is raised above the circuit’s upper voltage limit.

348
Q

page

A

A section of memory addresses in which a unit of data can be stored.

349
Q

page fault

A

An interrupt generated when an application requests data that is no longer present in its virtual memory location.

350
Q

pagefile

A

In a virtual-memory system, the section of the hard disk used to store memory contents that have been swapped out of physical RAM. In Windows systems, the pagefile is called Pagefile.sys.

351
Q

pairing

A

The process two devices use to establish a wireless connection through Bluetooth

352
Q

PAN

A

(personal area network) A network of devices used by a single individual.

353
Q

parity

A

An error correction method for electronic communications.

354
Q

partition management

A

The process of creating, destroying, and manipulating partitions to optimize system performance.

355
Q

partitioning

A

The process of dividing a single hard disk into isolated sections that function as separate physical hard drives, called partitions.

356
Q

partprobe

A

A Linux program that updates the kernel with partition table changes.

357
Q

patch

A

A fix or update for a software program or application, designed to eliminate known bugs or vulnerabilities and improve performance.

358
Q

patch management

A

The practice of monitoring for, evaluating, testing, and installing software patches and updates.

359
Q

PCI

A

(Peripheral Component Interconnect) See PCI bus.

360
Q

PCI bus

A

(Peripheral Component Interconnect bus) A peripheral bus commonly used in PCs that provides a high-speed data path between the
CPU and peripheral devices.

361
Q

PCI Express

A

(Peripheral Component Interconnect Express) A video adapter bus that is based on the PCI computer bus. PCIe supports significantly enhanced performance over that of AGP.

362
Q

PCIe

A

(Peripheral Component Interconnect Express) See PCI Express.

363
Q

peer-to-peer network

A

A network in which resource sharing, processing, and communications control are completely decentralized.

364
Q

Performance Monitor

A

An administrative tool that monitors the state of services or daemons, processes, and resources on a system.

365
Q

peripheral device

A

See external device.

366
Q

permissions

A

In Windows, security settings that control access to individual objects, such as files.

367
Q

personal firewall

A

See host firewall

368
Q

phablet

A

A mobile digital device that is larger than a standard sized smartphone and smaller than a tablet.

369
Q

pharming

A

Similar to phishing, this type of social engineering attack redirects a request for a website, typically an e-commerce site, to a similar-looking, but fake, website.

370
Q

phishing

A

A type of email-based social engineering attack in which the attacker sends email from a spoofed source, such as a bank, to try to elicit private information from the victim.

371
Q

physical address

A

For network adapter cards, a globally unique hexadecimal number burned into every adapter by the manufacturer.

372
Q

physical security

A

The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.

373
Q

piconet

A

A network of two to eight Bluetooth-enabled devices.

374
Q

PictBridge

A

A technology that allows images to be printed directly on a printer from digital cameras.

375
Q

PII

A

(personally identifiable information) Any information that can be used by itself or in combination with additional information as a way to identify, contact, or find a single person, or to identify a particular individual by using the various pieces of information together to determine the person’s identity.

376
Q

pixel

A

The smallest discrete element on a display. A single pixel is composed of a red, a blue, and a green dot.

377
Q

plaintext

A

Unencoded data. Also called cleartext.

378
Q

plasma display

A

A type of flat panel that uses a gas mixture placed between two sheets of glass that have electrodes attached to their surfaces.

379
Q

plastics

A

The hard surfaces that protect the internal components of a laptop.

380
Q

plenum cable

A

A grade of cable that does not give off noxious or poisonous gases when burned. Unlike PVC cable, plenum cable can be run through the plenum and firebreak walls.

381
Q

PoE

A

(Power-over-Ethernet) An emerging technology standard that enables both power and data to be transmitted over an Ethernet cable.

382
Q

pointer drift

A

A situation where the mouse pointer moves across the screen without the user touching the touchpad or mouse.

383
Q

policy

A

A subset of a security profile, and a document that outlines the specific requirements and rules everyone must meet

384
Q

pop-up

A

Windows or frames that load and appear automatically when a user connects to a particular web page.

385
Q

POP3

A

(Post Office Protocol version 3) A protocol used to retrieve email from a mailbox on the mail server.

386
Q

port

A

A hardware connection interface on a personal computer that enables devices to be connected to the computer, or the endpoint of a logical connection that client computers use to connect to specific server programs.

387
Q

port filtering

A

A technique of selectively enabling or disabling TCP and UDP ports on computers or network devices. It ensures that no traffic, except for the protocol that the administrator has chosen to allow, can pass through an open port

388
Q

port replicator

A

A scaled-down version of a docking station with only the standard ports available.

389
Q

portrait

A

In printing, a page orientation that is taller than it is wide.

390
Q

POST

A

(Power-On Self Test) A built-in diagnostic program that is run every time a personal computer starts up.

391
Q

POST card

A

(Power-On Self Test card) A card that can be plugged directly into the motherboard in an available expansion card slot that can read and display any error codes that get generated during the POST process of a computer.

392
Q

power sag

A

See sag.

393
Q

power supply

A

An internal computer component that converts line voltage AC power from an electrical outlet to the low-voltage DC power needed by system components.

394
Q

power supply tester

A

A tool that connects to the power supply’s 24- pin connector that tests the functionality of the unit.

395
Q

pre-installation environment

A

A lighter version of Windows or Windows Server that can be installed in either 32- or 64- bit versions.

396
Q

prestaging

A

The process of creating computer accounts in Windows Active Directory before joining the computers to the domain

397
Q

PRI

A

(Preferred Roaming Index) An index that works with the PRL to provide the best data/ voice quality to a phone while roaming.

398
Q

Print Management

A

An administrative tool that is used to view and manage all of the printers and print servers installed on a network.

399
Q

print quality

A

A combination of parameters that define the appearance of the printed output.

400
Q

print queue

A

A list of print jobs waiting to print.

401
Q

print server

A

A computer that enables network users to share printers.

402
Q

printer

A

An output device that produces text and images from electronic content onto physical media such as paper or transparency film.

403
Q

privacy filter

A

A cover for a device’s screen, making it difficult for anyone to read the screen who is not positioned directly in front of the screen.

404
Q

private IP address

A

Addresses used by organizations for nodes that require IP connectivity within their enterprise network, but do not require external connections to the global Internet

405
Q

PRL

A

(Preferred Roaming List) A database built by CDMA service carriers to indicate which radio bands should be used when connecting to a cell tower.

406
Q

procedure

A

A subset of a security profile, and a document that provides detailed information about specific devices and technologies that support policies.

407
Q

process table

A

A record that summarizes the current running processes on a system.

408
Q

proxy

A

A system that acts as an intermediary for requests for resources.

409
Q

proxy server

A

A computer or application that isolates internal clients from external servers by downloading and storing files on behalf of the clients.

410
Q

PSTN

A

(Public Switched Telephone Network) An international telephone system that carries analog voice data.

411
Q

public IP addresses

A

Addresses that can be used by organizations that can also be shared with external networks.

412
Q

punch down tool

A

A tool used in a wiring closet to connect cable wires directly to a patch panel.

413
Q

PVC

A

(polyvinyl chloride) A flexible rubber-like plastic used to surround some twisted pair cabling. It is flexible and inexpensive, but gives off noxious or poisonous gases when burned

414
Q

QoS

A

(Quality of Service) A set of parameters that controls the level of quality provided to different types of network traffic.

415
Q

radio firmware

A

In a mobile device, memory that contains an operating system that is separate from the end- user operating system (for example, Android or iOS) and that controls all of the low-level timing-dependent functions of the mobile device.

416
Q

radio networking

A

A form of wireless communication in which signals are sent via RF waves, in the 10 KHz to 1 GHz range, to wireless antennas.

417
Q

RAID

A

(Redundant Array of Independent or Inexpensive Disks) A set of vendor- independent specifications for fault-tolerant configurations on multiple-disk systems.

418
Q

RAM

A

(Random Access Memory) A computer storage method that functions as a computer’s main memory.

419
Q

RAM module

A

See RAM chip.

420
Q

rapid elasticity

A

A cloud computing feature that provides seamless, scalable provisioning.

421
Q

RCA

A

(Radio Corporation of America) A cable and connector that is used to carry audio and video transmissions to and from a variety of devices such as TVs, digital cameras, and gaming systems.

422
Q

ReadyBoost

A

A performance enhancer, available on Windows Vista and Windows 7, that allows the user to supplement the computer’s memory with an external storage device like a flash drive.

423
Q

recovery image

A

A file used by Windows to refresh your PC.

424
Q

refresh rate

A

The number of times per second that the monitor is “refreshed,” or scanned to illuminate the pixels.

425
Q

Registry

A

The central configuration database where Windows stores and retrieves startup settings, hardware and software configuration information, and information for local user accounts.

426
Q

regsvr32

A

A troubleshooting utility that registers and unregisters OLE controls such as DLL and ActiveX files

427
Q

ReiserFS

A

A filesystem that handles small files more efficiently and faster than ext2 and ext3.

428
Q

Remote Desktop

A

A software application that operates a Windows computer from a remote location.

429
Q

Remote Disc

A

A feature of OS X that enables users to access external drives or share discs from another computer.

430
Q

resolution

A

The number of pixels that make up the dimension of a display, represented in a ratio value as the number of horizontal pixels by vertical pixels.

431
Q

RF

A

(radio frequency) Any of the electromagnetic wave frequencies that lie in the range extending from around 3 kHz to 300 GHz, which include those frequencies used for communications or radar signals. Commonly used as a synonym for wireless communication.

432
Q

RF

A

(radio frequency) A frequency in which network or other communications take place using radio waves in the 10 KHz to 1 GHz range.

433
Q

RFI

A

(radio frequency interference) See EMI.

434
Q

RFID badge

A

A security card that contains a tag that reacts with the radio frequency of the identification system to allow or deny access.

435
Q

RIMM

A

(Rambus Inline Memory Modules) A RAM form factor that has a metal cover that acts as a heat sink. Although they have the same number of pins, RIMMs have different pin settings and are not interchangeable with DIMMs and SDRAM

436
Q

riser card

A

A board that is plugged into the system board and provides additional slots for adapter cards

437
Q

ROM

A

(Read-Only Memory) Memory that saves and stores system data without a constant power source.

438
Q

rootkit

A

Malicious code that is designed to hide the existence of processes or programs from normal detection methods and to gain continuous privileged access to a computer system.

439
Q

rotation method

A

The schedule that determines how many backup tapes or other media sets are needed, and the sequence in which they are used and reused.

440
Q

router

A

A networking device that connects multiple networks that use the same protocol.

441
Q

RPM

A

(Red Hat Package Manager) A tool that provides a standard software installation mechanism, information about installed software packages, and a method for uninstalling and upgrading existing software packages.

442
Q

RSA token

A

A small device that includes cryptographic keys, a digital signature, or even biometric information that is verified against an identification system to allow or deny access to a physical location, system, or network location.

443
Q

S-Video

A

An analog video signal that carries the video data as two separate signals (brightness and color). S-Video works in 480i or 576i resolution.

444
Q

Safe Mode

A

A Windows system startup method that loads only a minimal set of drivers and services and that is used in troubleshooting Windows computers.

445
Q

sag

A

A momentary low-voltage power failure.

446
Q

SATA

A

(Serial Advanced Technology Attachment) A type of hard drive that requires a serial data channel to connect the drive controller and the disk drives.

447
Q

SATA connection

A

(Serial Advanced Technology Attachment connection) A drive connection standard that provides a serial data channel between the drive controller and the disk drives.

448
Q

satellite

A

Provides extremely long-range wireless network transmissions to relay network signals from the network service provider to individual customers.

449
Q

SC

A

(Subscriber Connector or Standard
Connector ) Box-shaped connectors that snap into a receptacle. SC connectors are often used in a duplex configuration where two fibers are terminated into two SC connectors that are molded together.

450
Q

SCSI ID

A

Identifiers assigned to each SCSI device connected to the bus. The ID numbers range from 1 to 15.

451
Q

security control

A

A safeguard or prevention method to avoid, counteract, or minimize security risks relating to personal or company property.

452
Q

security incident

A

A specific instance of a risk event occurring, whether or not it causes damage.

453
Q

security incident report

A

Documentation of a security incident, including the type and severity of the incident, personnel involved in the incident, a description of the incident, and any mitigation actions taken.

454
Q

security policy

A

A formalized statement that defines how security will be implemented within a particular organization.

455
Q

security profile

A

A large, comprehensive document that describes the security measures for an organization.

456
Q

server

A

A computer that provides services and resources on the network.

457
Q

server virtualization

A

Takes place centrally on a server and utilizes one logical device, typically the server, to act as the host machine for the “guest” machines that virtually use the applications and programs provided by the host.

458
Q

server-side virtualization

A

See server virtualization.

459
Q

Service Pack

A

Comprehensive software update that generally includes all prior patches and updates, but which can also include important new features and functions.

460
Q

set-top box

A

A device that converts video content to a format that can be viewed on a television. Also referred to as streaming players or media players.

461
Q

sfc

A

(System File Checker) A command line tool used to verify system files and replace them, if needed.

462
Q

sfdisk

A

A Linux partition management utility.

463
Q

Shadow Copy

A

A feature available on Windows XP and newer operating systems that creates backup copies or snapshots of the system’s data and stores them locally or to an external location, either manually or at regularly scheduled intervals.

464
Q

share

A

A network resource, such as a disk, folder, or printer, that is available to other computer users on the network.

465
Q

shell

A

A component that interacts directly with users and functions as the command interpreter for the Linux operating system.

466
Q

shoulder surfing

A

A human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.

467
Q

Sidebar

A

A designated area of the Windows 7 and Windows Vista desktop, displayed vertically along the side of the desktop, where users can add gadgets of their choice to provide information and access to frequently used tools or programs.

468
Q

signal loss

A

The weakening of a radio signal from a cell tower such that your phone cannot connect to the network.

469
Q

signature

A

A code pattern that identifies a virus. Also called a definition

470
Q

SIMM

A

(Single In-line Memory Modules) A RAM form factor with a 32-bit data path.

471
Q

SLA

A

(Service Level Agreement) An agreement entered into by the transmitter, or ISP, and the receiver, or subscriber.

472
Q

Sleep

A

A power option available in Windows Vista, Windows 7, Windows Server 2008, and Apple OSs, in which the computer conserves as much energy as possible by cutting off power to the parts of the machine that are not necessary to function, excluding RAM.

473
Q

SMA

A

(Sub Multi Assembly or Sub Miniature type A) Connectors that use a threaded ferrule on the outside to lock the connector in place.

474
Q

SMART

A

(Self-Monitoring, Analysis, and Reporting Technology) A monitoring system that can help anticipate storage drive failures due to excess heat, excess noise, damaged sectors, or read/write errors.

475
Q

smart camera

A

A digital camera that includes a processor, memory, cellular and Wi-Fi support, and a mobile operating system.

476
Q

smart card

A

A device similar to a credit card that can store authentication information, such as a user’s private key, on an embedded microchip

477
Q

smart TV

A

A hybrid device that is basically a television set with web and Internet features built into it.

478
Q

smart watch

A

A multipurpose device that runs computing applications and that is worn on a person’s wrist.

479
Q

smartphone

A

A mobile digital device that combines the functionality of a portable phone with that of media players, GPS navigation units, personal digital assistants, and cameras

480
Q

SMB

A

(Server Message Block) A protocol that works on the Application layer and is used to share files, serial ports, printers, and communications
devices, including mail slots and named pipes, between computers.

481
Q

snapshot printer

A

A printer that produces snapshot-sized images of acceptable photographic quality.

482
Q

sniffing attack

A

See eavesdropping attack.

483
Q

SNMP

A

(Simple Network Management Protocol) An Application-layer protocol used to exchange information between network devices.

484
Q

social engineering attack

A

A type of attack where the goal is to obtain sensitive data, including user names and passwords, from network users through deception and trickery.

485
Q

SODIMM

A

(Small Outline Dual In-line Memory Module) Memory that is half the size of DIMMs, are available in 32- or 64-bit data paths, and are commonly found in laptops and iMac systems.

486
Q

software diagnostic tool

A

A computer repair program that can analyze hardware and software components and test them for problems. Also referred to as software diagnostic utility.

487
Q

SOHO MFD

A

(small office/home office multi-function device) A medium-sized network-enabled MFD suitable for small and home offices with enhanced printing, scanning, copying, and faxing functions.

488
Q

SOHO network

A

(small office/home office) A small network that provides connectivity and resource sharing for a small office or home office.

489
Q

soldered

A

A means of securing electronic components to a circuit board by using a combination of lead, tin, and silver (solder) and a tool called a soldering iron.

490
Q

solid ink printer

A

A type of printer that uses ink from melted solid-ink sticks.

491
Q

Southbridge

A

A component of the chipset that controls input/output functions, the system clock, drives and buses, APM power management, and various other devices.

492
Q

space

A

In OS X, a virtual desktop consisting of a collection of related windows, as created and managed by Mission Control.

493
Q

spam

A

Originally, frequent and repetitive postings in electronic bulletin boards; more commonly, unsolicited or distasteful commercial email from anonymous sources.

494
Q

SPDIF

A

(Sony Phillips Digital Interconnect Format) A digital format signal used to connect audio devices to output audio signals over a short distance.

495
Q

spear phishing

A

See whaling.

496
Q

speed light

A

An indicator on a network adapter that shows whether the adapter is operating at 10 Mbps, 100 Mbps, or 1,000 Mbps.

497
Q

spike

A

A very short increase in the electrical supply voltage or current carried on any wire such as a power line, phone lines, and network lines. Usually lasts only a few miliseconds.

498
Q

spim

A

An IM-based attack similar to spam that is propagated through instant messaging instead of through email.

499
Q

spoofing

A

A human-based or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment. Spoofing can occur in IP addresses, MAC addresses, and email.

500
Q

Spot Light

A

A feature of OS X that enables users to search for apps, documents, images, and other files

501
Q

spyware

A

Unwanted software that collects personal user data from a system and transmits it to a third party.

502
Q

SSD

A

(solid state drive) A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.

503
Q

SSH

A

(Secure Shell) A protocol that enables a user or application to log on to another computer over a network, execute commands, and manage files.

504
Q

SSHD

A

(solid state hybrid drive) A personal computer storage device that offers the best features of solid state and magnetic data storage by combining the traditional rotating platters of a magnetic HDD and a small amount of high- speed flash memory on a single drive.

505
Q

SSID

A

(Service Set Identifier) A 32-bit alphanumeric string that identifies a wireless access point and all devices that connect to it.

506
Q

SSL

A

(Secure Sockets Layer) A security protocol that uses certificates for authentication and encryption to protect web communication.

507
Q

ST

A

(Straight Tip) Connects multimode fiber. ST connectors look like BNC connectors.

508
Q

standard

A

A subset of a security profile, and a tactical document that specifies processes to follow to meet policy requirements.

509
Q

standard formatting

A

An operating system function that builds file systems on drives and partitions.

510
Q

standby

A

A power-saving mode where the computer cuts power to the hard drive and peripherals while storing current data in RAM.

511
Q

static addressing

A

Configuring TCP/IP statically on a network. Requires that an administrator visit each node to manually enter IP address information for that node.

512
Q

static electricity

A

The buildup of stationary electrical charge on any object.

513
Q

stop error

A

A system error severe enough to stop all processes and shut the system down without warning. Often referred to as “blue-screen errors” in Windows because they generate an error message screen with a blue background.

514
Q

storage device

A

A computer component that enables users to save data for reuse at a later time, even after the personal computer is shut down and restarted.

515
Q

Storage Spaces

A

The Windows 8/8.1 implementation of RAID.

516
Q

striping

A

A disk-performance-enhancement feature in which data is spread across multiple drives to improve read and write access speeds.

517
Q

strong password

A

A password that meets the complexity requirements that are set by a system administrator and documented in a security policy or a password policy.

518
Q

stuck pixels

A

Pixels that only show one color of light, so they appear out of place when the display is on.

519
Q

subnet mask

A

A 32-bit number that is assigned to each host to divide the 32-bit binary IP address into network and node portions.

520
Q

sudo

A

(super user do) A Linux command that enables users to run programs with the security privileges of the root user.

521
Q

surge

A

A sudden sharp increase in voltage or current that can last up to 50 microseconds.

522
Q

surge suppressor

A

A power protection device that provides power protection circuits that can reduce or eliminate the impact of surges and spikes.

523
Q

Suspend

A

A power option available in Linux, in which the computer conserves as much energy as possible by cutting off power to the parts of the machine that are not necessary to function, excluding RAM.

524
Q

swap

A

A portion of the hard disk that is used in situations when Linux runs out of physical memory and needs more of it.

525
Q

swapping

A

In a virtual memory system, the process of moving data back and forth from physical RAM to the pagefile. Also called paging.

526
Q

switch

A

A smart network hardware device that joins multiple network segments together.

527
Q

system BIOS

A

The BIOS that sets the computer’s configuration and environment when the system is powered on.

528
Q

system board

A

The same as motherboard.

529
Q

system bus

A

The primary communication pathway between a CPU and other parts of the chipset. The system bus enables data transfer between the CPU, BIOS, memory, and the other buses in the computer. Also referred to as frontside bus or local bus.

530
Q

System Configuration

A

An administrative tool that is used to identify and manage issues that may be causing the system to run improperly at startup.

531
Q

system files

A

The files necessary for the operating system to function properly.

532
Q

system image

A

A copy of Windows, applications, system settings, and data files that is stored in a separate location than where the originals of these items are stored.

533
Q

System Restore

A

A utility available in Windows XP, Windows Vista, and Windows 7 that monitors the system for changes to core system files, drivers, and the Registry, and creates restore points to be used to help restore the system if a failure occurs.

534
Q

system restore point

A

A snapshot of the system configuration at a given moment in time that contains information about any changes to these components and is stored on the computer’s hard disk. Restore points can be used to restore system settings to an earlier state without affecting changes in user data since that time.

535
Q

system unit

A

A personal computer component that includes other devices necessary for the computer to function, including the chassis, power supply, cooling system, system board, microprocessor, memory chips, disk drives, adapter cards, and ports for connecting external devices. Often referred to as a box, main unit, or base unit.

536
Q

tablet

A

A mobile device that includes an integrated touch screen display, virtual onscreen keyboard, and flash memory for data storage.

537
Q

tape drive

A

A personal computer storage device that stores data magnetically on a removable tape.

538
Q

Task Manager

A

A basic system-diagnostic and performance- monitoring tool included with the Windows operating system.

539
Q

Task Scheduler

A

An administrative tool that allows the user to create and manage certain system tasks that will be automatically carried out by the computer at predetermined times.

540
Q

TCP

A

(Transmission Control Protocol) A connection-oriented, guaranteed-delivery protocol used to send data packets between computers over a network such as the Internet.

541
Q

TCP/IP

A

(Transmission Control Protocol/Internet Protocol) A nonproprietary, routable network protocol suite that enables computers to communicate over a network, including the Internet.

542
Q

termination

A

Adding a resistor to the end of a coax network segment to prevent reflections that would interfere with the proper reception of network signals.

543
Q

TFT

A

(thin film transistor) A display type commonly used in laptops.

544
Q

thermal dye transfer printer

A

A sophisticated type of color printer that uses heat to diffuse dye from color ribbons onto special paper or transparency blanks to produce continuous-tone output similar in quality to a photographic print. Also called dye sublimation printer.

545
Q

thermal paper

A

Paper that contains a chemical designed to react with the heating element of a thermal printer to create images on paper.

546
Q

thermal paste

A

A paste that is used to connect a heat sink to a CPU to provide a liquid thermally conductive compound gel that fills any gaps between the CPU and the heat sink to permit a more efficient transference of heat from the processor to the heat sink.

547
Q

thermal printer

A

Any printer that uses heat to create the image on the paper with dye or ink from ribbons or with heated pins.

548
Q

thermal wax transfer printer

A

A printer that uses a thermal printhead to melt wax-based ink from a transfer ribbon onto the paper.

549
Q

thick client

A

A business computer that performs most or all computing functions on its own. Also referred to as a fat client.

550
Q

thin client

A

A business computer that relies heavily on another system, typically a server, to run most of its programs, processes, and services.

551
Q

Thunderbolt connection

A

A hardware interface that supports connecting a wide variety of peripheral devices to PCs and that can use optical fiber or copper wire to transmit signals.

552
Q

TIA

A

(Telecommunication Industry Association) A standards and trades organization that develops industry standards for technologies such as network cabling.

553
Q

Time Machine

A

An OS X application that provides automated file backups.

554
Q

TKIP

A

(Temporal Key Integrity Protocol ) A security protocol created by the IEEE 802.11i task group to replace WEP.

555
Q

TLS

A

(Transport Layer Security) A security protocol that protects sensitive communication from eavesdropping and tampering by using a secure, encrypted, and authenticated channel over a TCP/IP connection.

556
Q

TN

A

(twisted nematic) An LCD panel technology where the panel is black when no electric current is running through the liquid crystal cells because the cells align themselves in a twisted state. When an electric current is applied, the liquid crystal cells untwist, allowing light to pass through, resulting in a white display screen.

557
Q

token

A

A physical or virtual object that stores authentication information.

558
Q

tone generator

A

An electronic device that sends an electrical signal through one set of UTP cables.

559
Q

tone locator

A

An electronic device that emits an audible tone when it detects a signal in a set of wires.

560
Q

toner

A

An electrostatic-sensitive dry ink substance used in laser printers.

561
Q

traces

A

Wires etched on to the motherboard to provide electrical pathways.

562
Q

trackpoint

A

A small button found on some laptops that enables you to move the mouse pointer when no mouse is connected to the computer.

563
Q

transistors

A

Switches that are etched on one sliver of a semiconductor that can be opened or closed when conducting electricity.

564
Q

triboelectric generation

A

The use of friction to create a static charge.

565
Q

Trojan horse

A

Malicious code that masquerades as a harmless file. When a user executes it, thinking it is a harmless application, it destroys and corrupts data on the user’s hard drive.

566
Q

twisted pair

A

A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating outer jacket.

567
Q

User Account Control (UAC)

A

An enhanced security feature of Windows Vista and Windows 7 that aims to limit the privileges of a standard user unless a computer administrator decides otherwise.

568
Q

User Datagram Protocol (UDP)

A

connectionless, best-effort delivery protocol used to send data packets between computers over a network

569
Q

Unified Extensible Firmware Interface (UEFI)

A

standard firmware interface for PCs that was designed to improve software interoperability and address the limitations in BIOSs.

570
Q

UNIX

A

A family of operating systems originally developed at Bell Laboratories and characterized by portability, multiuser support, and built-in multitasking and networking functions.

571
Q

Universal Plug and Play (UPnP)

A

feature found in wireless routers to enable computers, printers, and other Wi-Fi-enabled devices to be easily discoverable by the router.

572
Q

Uninterruptible Power Supply (UPS)

A

device that continues to provide power to connected circuits when the main source of power becomes unavailable

573
Q

Universal Serial Bus (USB)

A

hardware interface standard designed to provide connections for numerous peripherals.

574
Q

USB connection

A

A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.

575
Q

user account

A

A collection of credentials and important information about a person with access to the system

576
Q

user authentication

A

A security measure in which a computer user proves its identity in order to gain access to resources.

577
Q

User State Migration Tool (USMT)

A

command-line utility that copies files and settings from one Microsoft Windows computer to another.

578
Q

Unified Threat Management (UTM)

A

The concept of combining the features of a firewall, gateway antivirus, and IDS/IPS into a single device.

579
Q

vfat

A

A 32-bit filesystem that supports long file names and is compatible with the FAT filesystem found in older versions of Microsoft Windows.

580
Q

Video Graphics Array (VGA)

A

display standard that is implemented with a 15-pin DB-15 connector.

581
Q

virtual memory

A

The allocation by the computer system of a portion of the hard disk as if it was physical RAM.

582
Q

virtual printer

A

A software-based alternative to a physical printer that enables you to print to a file.

583
Q

virtualization

A

The technological process of creating a virtual version of a computer environment by separating the elements of the computing environment from each other and from the physical hardware it runs on via an additional software layer.

584
Q

virtualization workstation

A

A computer that uses both hardware virtualization and client virtualization resources to provide a comprehensive virtual workstation for users.

585
Q

virus

A

A piece of code that spreads from one computer to another by attaching itself to other files.

586
Q

Fishing

A

A human-based attack where the goal is to extract personal, financial, or confidential information from the victim by using services such as the telephone system .

587
Q

visual artifact

A

An error or anomaly in the visual display of a picture.

588
Q

Virtual Memory Manager (VMM)

A

Windows system component responsible for managing physical-to-virtual memory mappings and virtual memory assignments.

589
Q

Virtual Network Computing (VNC)

A

platform- independent system through which a user can control a remote system

590
Q

Virtual Private Network (VPN)

A

private network that protects communications sent through a public network such as the Internet.

591
Q

Wide Area Network (WAN)

A

network that spans multiple geographic locations, connecting multiple LANs using long-range transmission media.

592
Q

Wireless Access Point (WAP)

A

device that provides connection between wireless devices and can connect to wired networks.

593
Q

waveform

A

The shape of an analog signal when plotted on an oscilloscope or graph.

594
Q

wearable technology

A

Small mobile computing devices that are designed to be worn under, with, or on top of a person’s clothing.

595
Q

web server

A

A computer that provides access to personal, corporate, or educational website content.

596
Q

Wired Equivalent Privacy (WEP)

A

Provides 64-bit, 128-bit, and 256-bit encryption for wireless communication that uses the 802.11a and 802.11b protocols.

597
Q

whaling

A

A form of phishing that targets wealthy

598
Q

Wi-Fi

A

The popular implementation of the 802.11b wireless standard.

599
Q

Wi-Fi locator

A

A utility that can be installed on computing devices to locate wireless networks within range of the device.

600
Q

Worldwide Interoperability for Microwave Access (WiMAX)

A

A packet-based wireless technology that provides wireless broadband access over long distances.

601
Q

Windows Defender

A

The anti-spyware software that is included with Windows Vista and Windows 7 installations.

602
Q

Windows Firewall with Advanced Security

A

An administrative tool that is used to manage advanced firewall settings for the computer and any remote computers connected to the network.

603
Q

Windows Memory Diagnostic

A

An administrative tool that is used to check the RAM on the system

604
Q

Windows security policies

A

Configuration settings within Windows operating systems that control the overall security behavior of the system.

605
Q

Windows pre-installation environment (WinPE)

A

A lightweight version of Windows or Windows Server that can be used for deployment of the full version of the OS or for troubleshooting OS problems.

606
Q

wire crimper

A

A tool that attaches media connectors to the ends of cables.

607
Q

wire stripper

A

A tool that is often incorporated into a wire crimper and that enables the user to remove the protective coating from electrical wires.

608
Q

wireless connection

A

A network connection that transmits signals without using physical network media.

609
Q

wireless encryption

A

The process of concealing and protecting data during wireless transmissions.

610
Q

wireless locator

A

See wireless tester

611
Q

Wireless Network Connection

A

A Windows troubleshooting tool used to verify that a computer or other wireless device is connected to the network and able to send and receive data.

612
Q

wireless security

A

Any method of securing your wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.

613
Q

wireless tester

A

A Wi-Fi spectrum analyzer used to detect devices and points of interference

614
Q

Wake-on-LAN (WOL)

A

Turn on a device by a message through NIC Circuitry

615
Q

workgroup

A

A peer-to-peer Microsoft network model that groups computers together for organizational purposes, often deployed in homes and small offices.

616
Q

worm

A

A piece of code that spreads from one computer to another on its own, not by attaching itself to another file.

617
Q

Wi-Fi Protected Access (WPA)

A

A strong authentication security protocol to address some of the shortcomings in the WEP protocol during the pending development of the 802.11i IEEE standard.

618
Q

Wi-Fi Protected Access version 2 (WPA2)

A

A complete wireless standard that adds strong encryption and authentication security to 802.11 and relies on 802.1x as the authentication mechanism.

619
Q

Wireless Personal Area Network (WPAN)

A

A network that connects devices in very close proximity but not through a wireless access point.

620
Q

Wireless Wide Area Network (WWAN)

A

Uses wireless network technology to allow users to check email, surf the web, and connect to corporate resources accessible within the cellular network boundaries.

621
Q

X forwarding

A

A Mechanism by which programs are run on one machine and the X window output is displayed to another machine

622
Q

XFS

A

A 64-bit, high-performance journaling File System that provides fast recovery and can handle large files efficiently

623
Q

XP Mode

A

A downloadable add-on for Windows 7 that allows Windows XP-compatible software and programs directly on their desktops.

624
Q

Zero Day Attack

A

An attack that exploits a previously unknown vulnerability in an application or operating system.

625
Q

Zombie

A

Unauthorized software that directs the devices to launch a DDoS attack.