IT Fundamentals Flashcards
32-bit versus 64-bit
32-bit versus 64-bit refers to the maximum size of an instruction the CPU can process.
8.3 Filenames
The 8.3 filenames file-naming standard began with Microsoft DOS in 1981 and consisted of an eight-character ASCII name followed by a three-character file extension. Modern operating systems support long filenames, but MS Windows can also generate a short filename based on DOS 8.3 naming rules for compatibility with much older applications.
Access Control List (ACL)
The ACL specifies the user accounts and hosts IP addresses that can access a site and the privileges allowed for the account or program accessing the site.
Access Point (AP)
An AP, such as a router, connects wireless devices and a cabled network. Access points that provide Internet connectivity in grocery stores, shops, restaurants, libraries, airports, and medical facilities are often referred to as hotspots.
Active Partition
The primary partition is the active, bootable partition.
Adapter Card
Adapter card circuit boards provide additional video, sound, and communication.
Android
Android is an open-source operating system built for mobile devices developed by the Open Handset Alliance and primarily sponsored by Google.
Antivirus Software
Antivirus software aims to detect and remove virus infections and most malware. Antivirus software identifies malware code (signatures) and detects suspicious behavior (heuristics). Antivirus software requires frequent updating.
Apple
Apple is a company that manufactures desktops, laptops, all-in-ones, tablets, phones, and other related peripheral devices and software. Apple computers use macOS, built on UNIX, and use Apple-native or third-party developer apps built to run on the macOS platform.
Audio Card
Audio cards are adapter cards that enable computers to record and play sound.
Audio Port
Audio ports, usually located at the edge of the motherboard, provide a connection to the cable to support audio in, speaker out, microphone input, and headphones.
Authentication
Authentication is a method for users to prove who they are. Methods include specifying a username and password, smart cards, biometrics, and additional techniques such as two-factor authentication.
Availability
Availability is the balance of implementing security measures that protect resources from loss, damage, or DoS attacks and providing users with methods to recover access to their devices.
Backup
A backup is a copy of data stored for use in case of a system failure. Backups help prevent loss of work.
Battery
A battery is a power source for computing devices, typically rechargeable Lithium-ion (Li-ion) batteries of differing capacities. Computers use coin cell batteries to power their CMOS RAM.
Binary
The binary is a notational system with two values per digit, zero and one.
Biometric
Biometric identification is physically identifying features as security authentication to access a device, software application, or website.
Bit
A bit, the smallest measurable computer value is a single digit with two values, zero and one.
Bits per Second (bps)
Bits per second is a data rate measurement used to describe data transfer speeds.
Bluetooth
Bluetooth is a short-range, radio-based technology that works up to 10 m (30 feet) at up to 1 Mbps connecting computing devices with peripherals.
Blu-ray
Blu-ray is optical drive technology with a disc capacity of 25 GB per layer. Transfer rates are measured in multiples of 36 MBps.