Comptia A+ 1001 Vocab Flashcards
Tethering
the linking of a computer or other device to a smartphone in order to connect to the internet.
WPA encryption
Wi-Fi Protected Access (WPA) is a security standard for computing devices equipped with wireless internet connections.
WPA2 encryption
WPA2 (Wi-Fi Protected Access 2) is an encrypted security protocol that protects internet traffic on wireless networks. The second-generation of the Wi-Fi Protected Access security protocol, WPA2 addresses earlier flaws and offers more powerful encryption.
UPnP
Universal Plug and Play
Universal Plug and Play (UPnP) is a standard that lets network devices automatically find, communicate with and control each other. It is used by routers, computers, printers, game consoles and IoT devices. It uses industry standard protocols such as IP, HTTP and Extensible Markup Language. It is designed for home use.
MAC filtering
MAC address filtering allows you to block traffic coming from certain known machines or devices. The router uses the MAC address of a computer or device on the network to identify it and block or permit the access. Traffic coming in from a specified MAC address will be filtered depending upon the policy.
blocklisting
A blocklist (also known as a blacklist) is a list of items in a set that are not accepted. In computer security, a blocklist may be used to exclude which set to detect, quarantine, block, or perform security scans on. This list is exclusionary, confirming that the item being analyzed is not acceptable.
Infrastructure mode
Infrastructure mode is a wireless network framework that has a central WLAN access point / router at the heart of the network. In infrastructure mode, wireless devices communicate with each other through an WLAN access point/router.
QoS
Quality of service (QoS) is the use of mechanisms or technologies that work on a network to control traffic and ensure the performance of critical applications with limited network capacity. It enables organizations to adjust their overall network traffic by prioritizing specific high-performance applications.
NFC
Near Field Communication (NFC) is a set of short-range wireless technologies, typically requiring a distance of 4 cm or less to initiate a connection. NFC lets you share small payloads of data between an NFC tag and an Android-powered device, or between two Android-powered devices.
IR
Information retrieval, the science of searching for information in or as documents or databases.
LTE
LTE stands for Long Term Evolution and is sometimes referred to as 4G LTE. It’s a standard for wireless data transmission that allows you to download your favorite music, websites, and video really fast—much faster than you could with the previous technology, 3G.
PCIe
What is PCIe or PCI Express? PCIe is short for “peripheral component interconnect express” and it’s primarily used as a standardized interface for motherboard components including graphics, memory, and storage.
ISA
An Instruction Set Architecture (ISA) is part of the abstract model of a computer that defines how the CPU is controlled by the software. The ISA acts as an interface between the hardware and the software, specifying both what the processor is capable of doing as well as how it gets done.
AGP
Accelerated Graphics Port (AGP) is defined as a hardware interface designed to connect a graphics card, video card, or 3D accelerator to a computer system to speed up 3D video output. This article explains the fundamentals of AGP, its key characteristics, uses, and advantages.
Cloud file services
Cloud file storage is a method for storing data in the cloud that provides servers and applications access to data through shared file systems. This compatibility makes cloud file storage ideal for workloads that rely on shared file systems and provides simple integration without code changes.
Virtual desktop
A virtual desktop is a preconfigured image of operating systems and applications in which the desktop environment is separated from the physical device used to access it. Users can access their virtual desktops remotely over a network.
Off-site email
Offsite email services are services provided by those that specialize in email systems such as Office365, GSuite and Microsoft Exchange. They can be used with any of EPhost’s plans whether it be Windows or Linux hosting.
Resource pooling
In resource management, pooling is the grouping together of resources (assets, equipment, personnel, effort, etc.) for the purposes of maximizing advantage or minimizing risk to the users. The term is used in finance, computing and equipment management.
BSOD
A BSOD is a full system failure at the Windows kernel level due to an issue with Windows drivers and/or hardware
ipconfig
Internet Protocol CONFIGuration) A command line utility that is used to display and manage the IP address assigned to the machine. In Windows, typing ipconfig without any parameters displays the computer’s currently assigned IP, subnet mask and default gateway addresses.
IP address
a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
subnet mask
A subnet mask is a number that distinguishes the network address and the host address within an IP address. A subnet is a smaller network within a network that requires a subnet mask. Subnetting is the process of dividing a network into two or more subnets.
Default gateway
The default gateway is the path used to pass information when the device doesn’t know where the destination is. More directly, a default gateway is a router that connects your host to remote network segments. It’s the exit point for all the packets in your network that have destinations outside your network.
netstat -nbt
The netstat command is used to show network status. Traditionally, it is used more for problem determination than for performance measurement. However, the netstat command can be used to determine the amount of traffic on the network to ascertain whether performance problems are due to network congestion.
netsh int ip reset
These registry keys are used by the TCP/IP protocol stack; running the netsh int ip reset command is essentially equivalent to removing and reinstalling the TCP/IP stack. By the way, you could save the output of the reset command to a file using the netsh int ip reset > d:\ip_reset_log. txt command.
ipconfig /flushdns
ipconfig /flushdns will flush the local computer cache. And dnscmd /clearcache will clear the dns server cache. With the former you will clear the “local” cache of the server you work on.
nslookup
Nslookup is the name of a program that lets users enter a host name and find out the corresponding IP address or domain name system (DNS) record. Users can also enter a command in nslookup to do a reverse DNS lookup and find the host name for a specified IP address.