CompTia Study Cards Flashcards
ACL
access control list (ACL) contains rules that grant or deny access to certain digital environments. There are two types of ACLs: Filesystem ACLs filter access to files and/or directories. Filesystem ACLs tell operating systems which users can access the system, and what privileges the users are allowed.
AES
Advanced Encryption Standard AES is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for government computer security, cybersecurity and electronic data protection.
AIO
All-in-One PCs (AIO PCs) are streamlined desktop computers that integrate all of the components of a traditional desktop computer, except for the keyboard and mouse, into one single unit. … Many AIO PCs have integrated touch screen monitors, touch-pads, and solid-state disk drives and memory.
APIPA
APIPA stands for Automatic Private IP Addressing (APIPA). It is a feature or characteristic in operating systems (eg. Windows) which enables computers to self-configure an IP address and subnet mask automatically when their DHCP(Dynamic Host Configuration Protocol) server isn’t reachable.
ARM
Advanced RISC Machine and originally Acorn RISC Machine) is a family of reduced instruction set computing. ARM makes 32-bit and 64-bit RISC multi-core processors.
ARP
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address. This mapping is a critical function in the Internet protocol suite.
ASCll
American Standard Code for Information Interchange: a standard code, consisting of 128 7-bit combinations, for characters stored in a computer or to be transmitted between computers. Uses numeric codes to represent characters.
CAD
Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis, or optimization of a design. The term CADD (for Computer Aided Design and Drafting) is also used. Its use in designing electronic systems is known as electronic design automation (EDA).
CAM
Computer Aided Manufacturing (CAM) is the use of software and computer-controlled machinery to automate a manufacturing process.
CRUD
create, read, update, and delete
In computer programming, create, read, update, and delete (CRUD) are the four basic functions of persistent storage. Alternate words are sometimes used when defining the four basic functions of CRUD, such as retrieve instead of read, modify instead of update, or destroy instead of delete.
CSS
CSS is the acronym of “Cascading Style Sheets”. CSS is a computer language for laying out and structuring web pages (HTML or XML). This language contains coding elements and is composed of these “cascading style sheets” which are equally called CSS files (. css).
DDL
“Data Definition Language.” A DDL is a language used to define data structures and modify data. For example, DDL commands can be used to add, remove, or modify tables within in a database. DDLs used in database applications are considered a subset of SQL, the Structured Query Language.
DDoS
A DDoS is a cyberattack on a server, service, website, or network floods it with Internet traffic. If the traffic overwhelms the target, its server, service, website, or network is rendered inoperable. Network connections on the Internet consist of different layers of the Open Systems Interconnection (OS) model.
DDR
“Double Data Rate.” It is an advanced version of SDRAM, a type of computer memory. DDR-SDRAM, sometimes called “SDRAM II,” can transfer data twice as fast as regular SDRAM chips. This is because DDR memory can send and receive signals twice per clock cycle.
DHCP
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP.
DIMM
DIMM stands for Dual In-Line Memory Module, a type of computer memory that is natively 64 bits, enabling fast data transfer. This enables a single DIMM to transfer data twice as fast as a single SIMM. DIMM memory chips are dynamic random access memory (DRAM), the most common type of primary memory.
DLL
Dynamic Link Library, a file containing code for commonly used program functions on personal computers (PCs) that run the Microsoft Corporation’s Windows operating system. DLL. Operating system. Computer program.
DDoS
DDoS is a cyberattack on a server, service, website, or network floods it with Internet traffic. If the traffic overwhelms the target, its server, service, website, or network is rendered inoperable. Network connections on the Internet consist of different layers of the Open Systems Interconnection (OS) model.
DDR
“Double Data Rate.” It is an advanced version of SDRAM, a type of computer memory. DDR-SDRAM, sometimes called “SDRAM II,” can transfer data twice as fast as regular SDRAM chips. This is because DDR memory can send and receive signals twice per clock cycle.
DHCP
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP.
DIMM
Dual In-Line Memory Module, a type of computer memory that is natively 64 bits, enabling fast data transfer. This enables a single DIMM to transfer data twice as fast as a single SIMM. DIMM memory chips are dynamic random access memory (DRAM), the most common type of primary memory.
DLL
Dynamic Link library, a file containing code for commonly used program functions on personal computers (PCs) that run the Microsoft Corporation’s Windows operating system. DLL. Operating system. Computer program.
DLP
Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. Also provides reporting to meet compliance and auditing requirements and identify areas of weakness and anomalies for forensics and incident response.
DML
Data Manipulation Language is a computer programming language used for adding (inserting), deleting, and modifying (updating) data in a database. A DML is often a sublanguage of a broader database language such as SQL, with the DML comprising some of the operators in the language.