IT support glossary Flashcards
learn terminology
What is ABSTRACTION?
To take a relatively complex system and simplify it for our use.
What is an ALGORITHYM?
A series of steps that solves specific problems.
What is ACII, why is it important?
The oldest character encoding standard used, representing the English alphabet, digits, and punctuation marks.
What is a BINARY SYSTEM?
The communication that a computer uses, also known as the “base-2” numeral system.
What does the term BYTE mean, why is it crucial in encoding?
A group of 8 BITS.
Character encoding: Used to assign binary values to characters so that we as humans can read them.
What does a COMPUTER do and mean, in IT?
A device that stores and processes data by performing calculations.
What is CRYPTOGRAPHY?
The practice of coding and hiding messages from third parties.
What is a DECIMAL FORM BASE 10 SYSTEM?
In the decimal system, there are 10 possible numbers ranging from zero to nine.
What is the Digital Divide?
The growing skills gap between people with and without digital literacy skills.
What is INFORMATION TECHNOLOGY?
The use of digital technology, like computers and the internet, to store and process data into useful information.
What is LINUX OS?
One of the largest open-source operating systems used heavily in business infrastructure and the consumer space.
What are LOGIC GATES?
Allow transistors to perform more complex tasks, like deciding where to send electrical signals depending on logical conditions.
What does OPEN SOURCE mean?
Developers share, modify, and distribute their software for free.
What does PDA stand for
PDA (Personal Digital Assistant): Allows computing to go mobile.
404 NOT FOUND
An error message you might see on websites that have been moved or deleted.
802.1X
It is the IEEE standard for encapsulating EAP or Extensible Authentication Protocol traffic over the 802 networks.
802.1X with EAP-TLS
Offers arguably the best security available, assuming proper and secure handling of the PKI aspects of it.
AAA (authentication, authorisation, accounting)
The services that the directory services provide to all the computers within a company or organisation.
ABSOLUTE PATH
It is one that starts from the main directory.
ACCESS CONTROL ENTRIES
The individual access permissions per object that make up the ACL
ACCESS CONTROL LIST (ACL)
It is a way of defining permissions or authorizations for objects
ACCOUNTING
Keeping records of what resources and services your users access or what they did when they were using your systems
ACL
Access control lists
ACK FLAG
One of the TCP control flags.
What is ACK short for?
Acknowledge. A value of one in this field means that the acknowledgment number field should be examined.
ACKNOWLEDGEMENT NUMBER
The number of the next expected segment in a TCP sequence
ACTIVATION THRESHOLD
Triggers a pre-configured action when it is reached and will typically block the identified attack traffic for a specific amount of time
ACTIVE DIRECTORY USERS AND COMPUTERS (ADUC)
The client tools that are used for accessing and administering a directory server
ADDRESS BUS
Connects the CPU to the MCC and sends over the location of the data, but not the data itself.
ADDRESS RESOLUTION PROTOCOL (ARP)
A protocol used to discover the hardware address of a node with a certain IP address
ADDRESS CLASS SYSTEM
A system which defines how the global IP address space is split up.
AD-HOC NETWORK
A network configuration without supporting network infrastructure. Every device involved with THE NETWORK communicates with every other device within range, and all nodes help pass along messages
ADMINISTRATOR
A user that has complete control over a machine
ADVANCED ENCRYPTION STANDARD (AES)
The first and only public cipher that’s approved for use with top secret information by the United States National Security Agency
ADVANCED GROUP POLICY MANAGEMENT (AGPM)
A set of add-on tools from Microsoft that gives some added provision control abilities in GPMC
ADWARE
Software that displays advertisements and collects data
ALIAS
A nickname for common commands
ANALYSING LOGS
The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them
ANDROID
A mobile operating system based on LINUX
ANTIVIRUS SOFTWARE
It monitors and analyse things like new files being created or being modified on the system in order to watch for any behaviour that matches a known malware signature
ANYCAST
A technique that’s used to route traffic to different destinations depending on factors like location, congestion, or link health.
APPENDING FLAGS
A way to add the data of the file without erasing existing data
APPLICATION
A computer program designed for a specific use
APPLICATION LAYER
The layer that allows network applications to communicate in a way they understand
APPLICATION LAYER PAYLOAD
The entire contents of whatever data applications want to send to each other
APPLICATION SOFTWARE
Any software created to fulfil a specific need, like a text, editor ,web browser, or graphics editor
APPLICATION POLICIES
Defines boundaries of what applications are permitted or not, but they also help teach how to use software more securely
APP STORE APPS
A package manager that acts as a repository
APP STORE REPOSITORY
A app store service that also as a repository
APP STORES
A central managed marketplace for app developers to publish and sell mobile apps
ARCHIVE
An archive is cp,[rosed of one or more files that are compressed into a single file for verb agreement
A RECORD
The most common resource record, used to point a certain domain name at a certain IPv4 IP address
APPX
An APPX is another way to package contents of a file to act like a unit of distribution
ARPANET
The earliest version of the Internet that we see today, created by the US government project DARPA in the 1960s
ARP TABLE
A list of IP addresses and the MAC addresses associated with them
ASii
the oldest character encoding the standard. It represents the English alphabet, digits, and punctuation marks
ATTACK VECTOR
Method or mechanism by which an attacker or malware gains access to a network or system
ASN
AUTONOMOUS SYSTEM NUMBER is a number assigned to an individual AUTONOMOUS SYSTEM
ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL)
A device that establishes data connections across phone lines and different speeds for uploading and downloading data
ATTACK
An actual attempt at causing harm to a system
ATA
The most common interface that hard drives use to connect to our system
ASYMMETRIC ENCRYPTION
Systems where different keys are used to encrypt and decrypt
ATTACK SURFACE
It’s the sum of all the different attack vectors in a given system
ATX
(ADVANCED TECHNOLOGY EXTENDED) the most common form factor for motherboards
AUDITING
It involves reviewing records to ensure that nothing is out of the ordinary
AUTHENTICATION
A crucial application for cryptographic hash functions
AUTHENICATION SERVER (AS)
It includes the user ID of the authenticating user
AUTHORISATION
It describes to what the user account has access to or doesn’t have access to
AUTOMATIC ALLOCATION
A range of IP addresses is set aside for assignment purposes
ASSEMBLY LANGUAGE
A language that allowed computer scientists to use human readable instructions, assembled into code that the machines could understand
AUTOMATION
It makes processes work automatically
What is AUTOSCALING
A system that allows the service to increase or reduce capacity as needed, while the service owner only pays for the cost of the machines that are in use at any given time
BACKDOOR
A way to get into a system if the other methods to get in a system aren’t allowed it’s a secret entryway for attackers
BACKGROUND PROCESSES/DAEMON PROCESSES
Processes that run or take place in the background