Glossary Flashcards
Vocabulary
AAA
Authentication, Authorization, and Accounting
Example sentence: The AAA framework is commonly used in network security.
AC
Alternating Current
Additional information: AC is the type of current used in most household electrical systems.
ACL
Access Control List
Example sentence: The ACL determines who can access certain files on the network.
ADF
Automatic Document Feeder
Additional information: The ADF on a printer allows for automatic scanning or copying of multiple pages.
AES
Advanced Encryption Standard
Example sentence: AES is a widely used encryption algorithm for securing data.
AP
Access Point
Additional information: An AP is a device that allows wireless devices to connect to a wired network.
APFS
Apple File System
Example sentence: APFS is the default file system used in Apple’s macOS High Sierra and later.
APIPA
Automatic Private Internet Protocol Addressing
Additional information: APIPA assigns IP addresses automatically in the absence of a DHCP server.
APK
Android Package
Example sentence: APK files are used to install applications on Android devices.
ARM
Advanced RISC [Reduced Instruction Set Computer] Machine
Additional information: ARM is a type of processor architecture commonly used in mobile devices.
ARP
Address Resolution Protocol
Example sentence: ARP is used to map IP addresses to MAC addresses on a network.
ATA
Advanced Technology Attachment
Additional information: ATA is a standard interface for connecting storage devices to a computer.
ATM
Asynchronous Transfer Mode
Example sentence: ATM is a high-speed networking technology used for transferring data.
ATX
Advanced Technology Extended
Additional information: ATX is a motherboard form factor standard used in PCs.
AUP
Acceptable Use Policy
Example sentence: Employees must adhere to the AUP when using company resources.
BIOS
Basic Input/Output System
Additional information: BIOS is firmware that initializes hardware components during bootup.
BSOD
Blue Screen of Death
Example sentence: The BSOD is a common error screen in Windows operating systems.
BYOD
Bring Your Own Device
Additional information: BYOD policies allow employees to use their personal devices for work purposes.
CAD
Computer-aided Design
Example sentence: CAD software is used by engineers to create detailed designs.
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
Additional information: CAPTCHA is used to prevent automated bots from accessing websites.
CD
Compact Disc
Example sentence: CDs were popular for storing music and data before digital formats became prevalent.
CDFS
Compact Disc File System
Additional information: CDFS is the file system used on compact discs for storing data.
CDMA
Code-Division Multiple Access
Example sentence: CDMA is a technology used in mobile communication networks for multiple users to share the same frequency.
CERT
Computer Emergency Response Team
Additional information: CERTs are organizations that respond to cybersecurity incidents.
CIFS
Common Internet File System
Example sentence: CIFS allows for file sharing and access over a network.
CMD
Command Prompt
Additional information: CMD is a command-line interpreter in Windows operating systems.
CMOS
Complementary Metal-Oxide Semiconductor
Example sentence: CMOS batteries power the BIOS settings on a computer motherboard.
CPU
Central Processing Unit
Additional information: The CPU is the main component responsible for executing instructions in a computer.
CRL
Certificate Revocation List
Example sentence: CRLs are used to revoke digital certificates that are no longer valid.
DC
Direct Current
Additional information: DC is the type of current that flows in one direction without reversing.
DDoS
Distributed Denial of Service
Example sentence: DDoS attacks overwhelm a system with a flood of traffic, causing it to become inaccessible.
DDR
Double Data Rate
Additional information: DDR is a type of memory that transfers data on both the rising and falling edges of the clock signal.
DHCP
Dynamic Host Configuration Protocol
Example sentence: DHCP automatically assigns IP addresses to devices on a network.
DIMM
Dual Inline Memory Module
Additional information: DIMMs are used to add RAM to a computer motherboard.
DKIM
DomainKeys Identified Mail
Example sentence: DKIM is an email authentication method that helps prevent email spoofing.
DMA
Direct Memory Access
Additional information: DMA allows data to be transferred directly between memory and I/O devices without involving the CPU.
DMARC
Domain-based Message Authentication, Reporting, and Conformance
Example sentence: DMARC helps prevent email impersonation and phishing attacks.
DNS
Domain Name System
Additional information: DNS translates domain names into IP addresses to locate resources on the internet.
DoS
Denial of Service
Example sentence: A DoS attack disrupts services or resources to legitimate users.
DRAM
Dynamic Random-Access Memory
Additional information: DRAM is volatile memory used for storing data that needs to be accessed quickly.
DRM
Digital Rights Management
Example sentence: DRM protects digital content by controlling access and distribution rights.
DSL
Digital Subscriber Line
Additional information: DSL provides high-speed internet access over traditional copper telephone lines.
DVI
Digital Visual Interface
Example sentence: DVI is a video interface used to connect a computer to a monitor.
DVI-D
Digital Visual Interface-Digital
Additional information: DVI-D is a type of DVI connector that supports digital signals only.
ECC
Error Correcting Code
Example sentence: ECC memory can detect and correct errors in data.
EFS
Encrypting File System
Additional information: EFS is a feature in Windows that allows files and folders to be encrypted.
EMI
Electromagnetic Interference
Example sentence: EMI can disrupt electronic devices and communication signals.
EOL
End-of-Life
Additional information: EOL refers to the end of product support or availability.
eSATA
External Serial Advanced Technology Attachment
Example sentence: eSATA provides a fast external connection for storage devices.
ESD
Electrostatic Discharge
Additional information: ESD can damage electronic components through sudden discharge of static electricity.
EULA
End-User License Agreement
Example sentence: Users must accept the EULA before installing software.
exFAT
Extensible File Allocation Table
Additional information: exFAT is a file system optimized for flash drives and large files.
ext
Extended File System
Example sentence: ext is a Linux file system used on many distributions.
FAT
File Allocation Table
Additional information: FAT is a file system used by early versions of Windows.
FAT12
12-bit File Allocation Table
Example sentence: FAT12 was used in early floppy disks and limited storage capacity.
FAT16
16-bit File Allocation Table
Additional information: FAT16 increased the storage capacity and file size limit over FAT12.
FAT32
32-bit File Allocation Table
Example sentence: FAT32 is still used on some USB drives and memory cards.
FSB
Front-Side Bus
Additional information: The FSB connects the CPU to other components on a computer motherboard.
FTP
File Transfer Protocol
Example sentence: FTP is used to transfer files between a client and a server over a network.
GFS
Grandfather-Father-Son
Additional information: GFS is a backup rotation scheme that keeps multiple generations of data.
GPS
Global Positioning System
Example sentence: GPS uses satellite signals to determine location and navigation.
GPT
GUID [Globally Unique Identifier] Partition Table
Additional information: GPT is a modern partitioning scheme used on UEFI systems.
GPU
Graphics Processing Unit
Example sentence: GPUs are specialized processors used for rendering graphics and images.
GSM
Global System for Mobile Communications
Additional information: GSM is a standard for mobile networks used by many carriers worldwide.
GUI
Graphical User Interface
Example sentence: GUIs provide visual elements for interacting with software applications.
GUID
Globally Unique Identifier
Additional information: GUIDs are unique identifiers used in software applications and systems.