Comp A+ Definitions Flashcards
802.11
A family of specifications for wireless LAN Communication
802.11a
A fast, secure, relatively expensive wireless communication. speeds up to 54 Mbps in the 5 Ghz Frequency
802.11ac
wireless data throughput at a rate of up to 2 Gbps in the 5 GHz range
802.11b
It is least expensive wireless network protocol used to transfer data 11 Mbps transfer rate in the 2.4 GHz Frequency
802.11g
wireless data throughput at the rate of up to 54 Mbps in the 2.4 GHz band, replacement for 802.11b
802.11n
A specification for wireless data throughput at a rate of up to 600 Mbps in the 2.4 GHz or 5 GHz range. Released in 2009
Accelerometer
Mobile tech determine the orientation and acceleration of a device
ACL- Access Control List
A set of data (use names, passwords, time and date, IP addresses, MAC addresses, etc) used to control access to a resource such as a computer, file, or network.
Activity Light
An indicator on a network adapter that flickers when packets are received or sent.
Ad hoc mode
A method for wireless devices to communicate directly with each other without the use of an AP.
Administrative Share
A hidden share created by default on every Windows system. If deleted, by default, the system recreates them when it restarts.
Adware
Unwanted software, purpose of presenting commercial advertisements to the user.
Aero
A color scheme available in Windows Vista and Windows 7
AES- Advanced Encryption Standard
A symmetric 128-192-, or 256- bit block cipher
AIO MFD- All-in-one multi-function device
A small sized MFD for home users
Algorithm
In encryption, the rule, system, or mechanism used to encrypt data.
Analog Transmission
The transfer of information in the form of a continuous wave.
Android
An OS for mobile devices
Anti-spyware software
Software that is specifically designed to protect systems against spyware attacks.
Antivirus Software
An application that scans files for executable code that matches patterns known to be common to viruses, and monitors systems for activity associated with viruses.
AP- Access Point
A device or software that facilitates communication and provides enhanced security to wireless devices
APIPA- Automatic Private IP Addressing
DHCP client computer to configure itself automatically with a random IP address in the range of 169.254.0.1 to 169.254.255.254 if no DHCP server available
Argument
A file name or directory name that indicates the files on which a command will operate.
ARP- Address Resolution Protocol
A protocol that maps IP addresses to MAC addresses
Aspect Ratio
A characteristic of display devices that indicates the ratio of width to height
Attack
A technique that is used to exploit a vulnerability without the authorization to do so
ATX
introduced by Intel in 1995 to provide better I/O support, lower cost, easier use, and better processor support than even earlier form factors
AUP- Acceptable use Policy
A Policy that includes the practices and guidelines that should be followed by employees
Authentication Server
determines whether or not access credentials supplied by a user should enable them to access resources
Authenticator App
generates single-use security tokens, used as part of two-step verification/ multi-factor authentication
Auto Negotiation
Negotiates a speed that is compatible with the network router or switch.
Backlight
The typical form of illumination used in a full sized LCD display
Badge
identification card or token, used to swipe through an identification system
Baseband
A transmission scheme where a single signal sends data using the entire bandwidth of the transmission media.
Baseband RTOS- Baseband Real Time Operating System
Firmware
Baseline
A subset of a security profile, and a document that outlines the minimum level of security required for a system, device, network, or premises.
Beamforming
A feature of 802.11ac that transmits radio signals directly at a specific device using smart antennas.
Biometric Lock
A lock that is activated by biometric features, such as a fingerprint, voice, retina, or signature.
Biometrics
recognizing a person based on a physiological or behavioral characteristic unique to the individual
BIOS- Basic Input/ Output System
instructions that is stored in ROM and used to start the most basic services of a computer system.
BIOS Memory
Special memory that keeps track of its data even when the power is turned off, and is stored in EEPROM’s
BitLocker
A security feature in Windows 7 and Windows server 2008 that provides full disk encryption protection for your OS as well as all the data stored on the OS volume.
Blackout
A compete loss of electrical power
Bluetooth
A wireless radio technology that facilitates short-range (usually less than 30 feet) wireless communication
BNC- Bayonet Neill-Concelman
A twist lock connector on Coaxial cable
Boot Camp
An OS X app that lets you install Microsoft Windows and then switch between OS X and the Windows OS.
Boot Process
sequential steps on start up with the final result being OS is loaded components are functional.
Bootrec
A command line tool during Windows Recovery Environment to troubleshoot or repair startup issues.
Botnet
A set of devices that has been infected by a control program called a bot that enables attackers to exploit them and mount attacks.
Bridge
A software-based network device that has the same functionality as a switch.
Brightness
The amount of light emitted from a display device, as measured in lumens.
Broadband Communication
A category of network transmission technologies that provide high throughput by splitting communications pathways into multiple channels transmitted simultaneously over the network media.
Brownout
A temporary power reduction that is used by electrical power companies to deal with high power demands.
Brute-force Attack
uses password-cracking software to attempt every possible alphanumeric password combination.
BSOD- Blue Screen of Death
A system error that is severe enough to stop all processes and shut the OS down without warning.
Bus
In a computer system, a group of wires that connect components. They provide a pathway for data transfer.
BYOD- Bring Your Own Device
An organizational policy that enables employees to use their personal devices for work purposes.
Cable
Transmissions that use a cable television connection and a specialized interface device known as a cable modem to provide high-speed Internet access to homes and small businesses.
Cable Modem
A hardware device that connects a subscriber’s device to a service provider’s cable systems.
Cable Stripper
A device that enables you to remove the protective coating from wiring to facilitate installing a media connector.
Cache Memory
High-speed memory that the CPU can access directly.
CCFO- Cold Cathode Fluorescent Lamp
A light source that uses electrodes and mercury vapor to create ultraviolet light.
CDFS- Compact Disc File System
A file system standard for optical disc media that is supported by multiple OS types.
Cellular
Uses radio signals to transmit network data over the cellular telephone system.
Chain of Custody
The record of evidence history from collection. To presentation in court, to disposal.
Chipset
The set of chips on the system board that support the CPU and other basic functions.
CIDR- Classless Inter Domain Routing
A sub netting method that selects a subnet mask that meets an individual network’s networking and node requirements and then treats the mask like a 32-bit binary word.
CIFS- Common Internet File System
A file and resource sharing protocol that is related to SMB.
Cipher
A method for concealing the meaning of text.
Ciphertext
Data that has been encoded with a cipher and is unreadable.
Clear text
The unencrypted form of data. Also called plaintext.
Client
A computer that makes use of the services and resources of other computers.
Client-side Virtualization
Takes place at the end points and separates the elements of a user’s logical desktop environment- the applications, OS, programs, etc.-and divides them from each other and from the physical machine.
Client/server Network
A network in which some computers act as servers to provide special services for other client computers.
CMDLET
A lightweight command that runs in the Windows PowerShell Environment.
CMOS- Complimentary Metal-oxide semiconductor
An old style of static memory that was used to store information about the computer set up that the system bios refers to each time the computer started
Coax
common abbreviation for co-axial cable
Coaxial Cable
a type of cable that features a central conductor surrounded by braided or foil shielding. a dialectric insulator separates the conductor in shield and the entire packages wrapped in an insulating layer called a jacket the outer shielding serves to reduce electromagnetic interference
Collate
document Collection and combining of pages in their proper order
Command Line Interpreter (CLI)
a program that implements the commands in the text interface
Command Prompt
in a CLI the area of the screen where users enter commands to interact with the operating system
Component Services
in administrative tool that is used to deploy component applications and configure behaviors of components and applications on the system
Component/ RGB
a type analog video information that is transmitted or stored as two or more separate signals
Composite Video
the format of an analog or picture only signal before it is combined with the sound signal and modulated onto the radio frequency carrier
Computer Case
The enclosure that holds all of the components of a PC
Computer Connection
A hardware component that enables a PC to communicate with internal or external devices
Computer Forensics
collecting and analyzing data from storage devices Computer systems networks and wireless communications and presenting this information as a form of evidence in a court of law
Computer management
the primary administrative tool used to manage and configure the system.
Content filtering
a method of setting limits on user browser sessions
Cooling System
a system unit component that prevents damage to computer parts by dissipating the heat generated
Corporate Owned Personally Enabled (COPE)
an organizational policy that enables employees to use company own devices for personal use
Corona
an assembly within a laser printer that contains a wire the Corona wire which is responsible for charging the paper
CPU
the main chip on the system board, the CPU performs software instructions and mathematical and logical calculations. Also referred to as the microprocessor or processor
Cryptography
the science of hiding information to protect sensitive information and communications from unauthorized access
Data Backup
System maintenance task that enables you to store copies of critical files and folders on another medium for safekeeping
Data Container
on a mobile device a scheme for isolating business data from personal data
Data Restoration
assistant recovery task that enables you to access the backed up data
Data Sources
an administrative tool that uses open database connectivity or ODBC to move data between different types of databases on the system
Data synchronization
the process of automatically merging and updating common data that is stored on multiple devices
Data Wiping
a method used to remove any sensitive data from a mobile device and prematurely delete it
Daughter Board
any circuit board that plugs into another circuit board
dd
A Linux command that copies and converts files to enable them to be transferred from one type of media to another
DDos- Distributed Denial of Service
a type of denial of service attack that uses multiple devices on disparate networks to launch the court is attacked from many simultaneous resources
Dead Pixels
Pixels that do not display light as expected and will show up as small black dots
Deciphering
the process of reversing a cipher
Default Gateway
An IP address of the router that routes remote traffic from the devices local subnet to remote subnets
Defender
the anti-spyware software that is included with windows XP Vista and seven installations
Definition
a coded pattern that identifies of virus also called a signature
DEFRAG
utility available in all versions of Windows that scans and analyzes how file fragments are arranged and access on the hard disk
Device Manager
in windows in administrative tool that is used to manage and configure system devices in a hardware profile
DHCP- Dynamic Host Configuration Protocol
A network service that provides automatic assignments of I people addresses and other TCP/IP configuration information on the network systems that are configured as a DHCP client
Dial-up Line
loop phone connections that use modems and standard telephone technology
Dictionary attack
an attack that automates password guessing by comparing encrypted passwords against a predetermined list of possible password values
Digital transmission
the transfer of information in a signal that comprises only ones in zeros
Digitizer
on touchscreen displays a layer of sensors between the LCD display and a layer of glass that enables the translation of the analog touch signal to a digital signal
DIMM- Dual In-Line Memory Module
A RAM form factor that is found in most systems and that has a 64 bit data path
Direct thermal printer
a thermal printer that uses heated pins to form images directly onto specifically coded thermal paper
Directory
a component in a filesystem hierarchy that provides a container to organize files and other directories or folders
Directory service
on a network, a centralized database that includes objects such as servers, clients, usernames, and passwords, and provide centralized administration and authentication
Discovery mode
a device mode that will transmit a friendly signal to another device in close proximity
Disc controller
circuitry that manages the transfer of data to and from a disk drive whether it is a hard disk drive or an optical disk drive. The disk controller provides a communication path between the CPU and the disk drive
Disc duplexing
disk near mirroring in which the two drives in the mirror each have a dedicated disk controller
Disk maintenance
the process of monitoring and adjusting the configuration of HDD’s and the file systems contained on those HDD’s.
Disk partition
in isolated section of a desk that functions like a separate physical drive
Display device
a personal computer component that enables users to view the text and graphical data output from a computer
Display port
a digital display standard that aims to replace DVI and VGA standards
Dissipative material
a conductor but with high resistance that loses its electrical charge slowly
Distro
a complete Linux implementation including Col. show applications and utilities that is packaged distributed and supported by a software vendor
DLP- Data Loss Prevention
software or a software suite that helps protect data from being stolen while the data is moving across the network
DMZ- Demilitarized Zone
a small section of a private network that is located between two firewalls and made available for public access
DNS- Domain Name System
the primary name resolution service on the network that maps computer names to their associated IP addresses
Dock
a bar along the bottom or side of the screen that contains icons for apps that come with the Macintosh computer
Docking station
Desktop devices that connect portable computers to standard desktop career frills without the need to connect and disconnect the peripherals themselves when a user switches from stationary to mobile use
Domain
a Microsoft network model that and administrator implements by grouping computers together the purpose of sharing a centralized user account database Sharing this user account database enables users to use these accounts to log onto any computer in the domain
Domain controller
a server that stores the user account database for the domain and is responsible for authenticating users when they log on to the domain
Dongle
a small hardware component that when attached to the computing device the additional functionality such as wireless connectivity
Dot-Matrix Printer
an impact printer that forms images out of dots on paper by using a set of pins to strike an inked ribbon
DPI- Dots Per Inch
a measure of the ink density in a printed document. Higher DPI measures tended to provide clearer and more distinct output
Drive rails
Metal strips that can be screwed onto an internal drive before installation
DRM- Digital Rights Management
A way to control access to copyrighted content that is presented in digital format
DSL- Digital Subscriber Line
a broadband technology that transmits digital signals over existing phone lines
Dump file
the file that stores the contents of a memory dump
Dump E2FS
A Linux utility that manages extended filesystems
Duplex scanning
a feature that scans both sides of a document automatically
DVI- Digital Video Interface
a video standard for transferring both analog and digital video signals
Dynamic addressing
a method used to assign addresses using the DHCP Service
E-reader
a mobile digital device designed primarily for reading digital publications such as E-books in digital periodicals
EAS- Exchange AcitveSync
that enables mobile devices to connect to exchange server to access mail, calendar, and contacts.
Easy transfer
a bill-in Data migration utility in Windows Vista in Windows 7 that helps transfer files, data, and settings from one personal computer to another.
Eavesdropping attack
an attack that uses special monitoring software to intersect private network communications, either to steal the content of the communication itself or to obtain usernames and passwords for future software attacks.
ECC- Error Correcting Code
an error correction method that uses several bits of error-checking
EEPROM- electronically erasable programmable read-only memory
A ROM chip that can be reprogrammed by using software from the bios or Chip manufacturer through the flashing process
EFS- Encrypting File System
a file-encryption tool available on Windows systems that have partitions formatted with NT file system.
EIA- Electronic Industries Alliance
a standards And trades organization that developed industry standards for technologies such as network cabling. The EIA ceased operations in February 2011
Electrical interference
a general term for unwanted signals on the network media that can interfere with network transmissions.
EMI- Electromagnetic Interference
the degradation of signal that occurs when a magnetic field around one electrical circuit interferes with the signal being carried on and in adjacent circuit.
eMMC- Embedded Multi-Media Controller
a storage component that contains flash memory and a flash memory controller integrated onto the same silicone die.
Emulator
the software installed that allows the computer to virtually run another operating system, or another instance of the same operating system.
Enciphering
the process of applying a cipher.
Encryption
the process of converting data into a form that is not easily recognized or understood by unauthorized entities.
Entry control roster
A document for all visitors to sign in and out when entering and leaving the building.
EP Drum- Electrostatic Photographic drum
the component in a laser printer that carries electrical charge to attract toner and then to transfer the toner to the paper.
ERD- Emergency Repair Disk
a windows XP troubleshooting tool that stores the contents of the\ windows\ repair folder.
eSATA- External Serial Advanced Technology Attachment
an external interface for SATA connections, enabling you to connect external SATA drives to PC’s.
ESD- Electrostatic Discharge
the phenomenon that occurs when electrons rush from one body was static electrical charge to another with an equal charge, following the path of least resistance.
Ethernet
a family of networking technologies that provide connectivity by using ethernet network adapters, contention-based media access, and twisted pair, coax, or fiber media.
Event viewer
in administrative tool that is used to view the contents of event logs, which contain information about significant events that occur on your computer.
Expansion card
A printed circuit board that is installed in the slot on the system board to provide special functions for customizing or extending A computers capabilities. Also referred to as adapter card, I\O card, add-in, add-on, or bored.
Express card
a mobile expansion card design by the PCMCIA to replace traditional PC cards to provide PCI Express and USB 2.0 connectivity.
ext2
a native Linux filesystem.
ext3
a native Linux file system that improves on the data recovery and integrity measures provided with ext2.
ext4
a native Linux filesystem that offers backwards compatibility, journaling, in support for extremely large volumes, in addition to all the features of ext3.
External device
a personal computer component that provides alternative input or output methods or additional storage.
External enclosure
a plastic barrier that protects the inner workings of a hard drive.
F-connector
a coaxial Cable connector used to connect TV and FM antennas.
FC Face Contact
connectors that use a heavy duty ferrule in the center for more mechanical stability than SMA or ST connectors.
Fdisk
a Menu-driven utility program that is used for creating, modifying, or deleting partitions on a disk drive.
Fiber
a method used to connect devices to the Internet using fiber optic cable
Fiber optic cable
a type of cable in which one or more glass or plastic strands, Plus additional fiber strands or wraps, are surrounded by a protective outer jacket. Light pulses carry the signal through fiber-optic cable.
File attribute
a characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users.
File recovery software
software that can recover deleted files from your computer system.
File serve
the computer that stores programs and files that are intended to be shared among network users.
Filesystem
a method that is used by operating system to store, retrieve, organize, and manage files and directories on mass storage devices
Filesystem integrity
the degree of correctness and validity of the filesystem.
Finder
the file and folder management app that is included with OS X.
Firewall
a software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic.
Firmware
software stored in memory chips retains data whether or not power the computer is on.
First response
refers to the individual and immediate actions that follow an incident.
Fixboot
a command line tool used to create a new partition boot sector to a hard drive partition.
Fix MBR
a command line tool used to repair the masturbator recovery record of the boot partition.
Flashing
updating firmware electronically.
Form factor
the size and shape of a given component. Often used in terms of motherboard and drive characteristics.
Formed-Character printer
any type of impact printer that functions like a typewriter, By pressing preformed characters against the ink ribbon to deposit the ink on the page.
Frequency
the number of complete cycles per second in an analog wave or a radio wave.
Front light
a form of lighting devices from the front of the display.
fsck
A Linux command that checks the integrity of the filesystem.
stab
a configuration file that stores information about storage devices and partitions and where and how the partitions should be mounted.
Full duplex
permits simultaneous two-way Communication
Fuser assembly
a component in a laser printer that uses two rollers to heat toner particles, melting them onto the paper.
Gadget
a mini application in Windows that can’t perform an information display task.
Gaming PC
A computer that comes equipped with powerful graphics capabilities, fast processing capabilities, in a large amount of memory, and that is intended for use in computer gaming environments.
GAN- Global Area Network
any worldwide network
Gateway
a device, software, or system that converts data between incompatible systems.
gdisk
A Linux partition management utility for partitions in the globally unique identifier partition table format.
Generator
a power protection device that creates its own the electricity through use of motors.
Gestures
finger movements on a track pad or mouse that enable the user to scroll, Zoom, in navigate desktop, document, application content.
Ghost cursor
a cursor that jumps around on The screen randomly, or moves too slow, or opens windows in menus on its own.
GNU parted
A Linux partition management utility for new hard disks.
GPRS
(General Packet Radio Service) A standard for wireless communications that runs at speeds up to 115 kbps and that supports a wide range of bandwidths.
GPS device
(global positioning system device) A mobile digital device that provides navigational directions to reach specified destinations.
GPU
(graphics processing unit) An electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images intended for display output
GRUB2
(GRand Unified Bootloader 2) A program used in Linux distributions that loads operating system kernels.
GUI
(graphical user interface) A collection of icons, windows, and other screen elements that help users interact with an operating system.
guideline
A subset of a security profile, and a document that outlines best practices and recommendations to help conform to policies.
half duplex
Permits two-way communication, but only in one direction at a time.
HDD
(hard disk drive) A personal computer storage device that uses fixed media and magnetic data storage.
HDMI
(High Definition Multimedia Interface) A proprietary audio/video interface for transferring uncompressed video data and compressed or uncompressed digital audio data from a display controller to a compatible peripheral device over a single HDMI cable.
heat sink
A passive heat exchanger that dissipates heat from a source such as a CPU and transfers it, normally via an enlarged surface area, to another medium such as air or water.
heavy-duty MFD
A large network-enabled MFD capable of handling the documentation needs of an entire office.
hertz
A unit of measurement that indicates cycles or occurrences per second.
Hibernate
A power option available in Windows environments in which the computer will store whatever is currently in memory on the hard disk and shut down, and then return to the state it was in upon hibernation when it is awakened.
high-level formatting
See standard formatting.
hoax
Any message containing incorrect or misleading information that is disseminated to multiple users through unofficial channels.
host firewall
A firewall installed on a single or home computer.
HTPC
(home theater PC) A computer that is dedicated and configured to store and stream digital movies, either from the local hard drive or through an online subscription such as Netflix.
hub
A networking device used to connect the drops in a physical star topology network into a logical bus topology. Also called a multiport repeater.
hypervisor
In virtualization technology, an application that is installed on the host machine and is used to configure and manage the VMs running on the host.
IANA
(Internet Assigned Numbers Authority) An international agency that manages port assignments.
iCloud
A cloud storage solution that is accessed by using the user’s Apple ID.
IDS
(intrusion detection system) Software or hardware, or a combination of both, that scans, audits, and monitors the security infrastructure for signs of attacks in progress and automates the intrusion detection process.
IEEE
(Institute of Electrical and Electronic Engineers) Pronounced “I-triple-E.” An organization of scientists, engineers, and students of electronics and related fields whose technical and standards committees develop, publish, and revise computing and telecommunications standards.
IEEE 1394 connection
A PC connection that provides a high-speed interface for peripheral devices that are designed to use the Institute of Electrical and Electronic Engineers (IEEE) 1394 standard.
ifconfig
A Linux command for configuring network interfaces for Linux servers and workstations
IMAP4
(Internet Mail Access Protocol) A protocol used to retrieve email messages and folders from a mail server.
IMEI number
(International Mobile Equipment Identity) A number that uniquely identifies a mobile device.
impact printer
Any type of printer that strikes a component directly against the paper or ink to create characters on the paper
impersonation
An approach in which an attacker pretends to be someone they are not, typically an average user in distress, or a help-desk representative.
IMSI number
(International Mobile Subscriber Identity) A number that uniquely identifies a mobile subscriber.
in-place upgrade
The process of installing a newer version of an operating system without first removing the existing operating system that is currently installed on the computer.
in-rush
A surge or spike that is caused when a device that uses a large amount of current is started
incident management
A set of practices and procedures that govern how an organization will respond to an incident in progress.
incident report
A record of any instance where a person is injured or computer equipment is damaged due to environmental issues. Also, a record of accidents involving hazardous materials, such as chemical spills, that could have an impact on the environment itself.
infrastructure mode
A method for wireless devices to communicate with other devices by first connecting to an AP.
inkjet printer
A printer that forms images by spraying ink on the paper.
input device
A personal computer component that enables users to enter data or instructions into a computer.
interface
The point at which two devices connect and communicate with each other.
Internet appliance
A relatively inexpensive PC that enables Internet access and a specific activity.
inverter
A laptop component that converts DC power to AC power for the display.
iOS
The operating system designed for Apple devices. It is the base software that allows all other applications to run on an iPhone, iPod touch, or iPad.
IP
(Internet Protocol) A group of rules for sending data across a network. Communication on the Internet is based on the IP protocol.