Name - Definition Flashcards
Authentication, Authorization, and Accounting
A framework for intelligently controlling access to computer resources, enforcing policies, and auditing usage.
Alternating Current
An electric current which periodically reverses direction, in contrast to direct current (DC) which flows only in one direction.
Access Control List
A table that tells a computer operating system which access rights each user has to a particular system object, like a file directory or individual file.
Automatic Document Feeder
A feature in printers, photocopies, fax machines, or scanners wherein a stack of paper can be place and then automatically fed into the machine.
Advanced Encryption Standard
A symmetric block cipher chosen by the US government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.
Access Point
A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
Apple File System
The proprietary file system of Apple Inc. designed to replace HFS+, offering improvements in scalability, encryption, and reliability.
Automatic Private Internet Protocol Addressing
A method of IP address assignment that occurs when a DHCP server fails to provide an IP address.
Android Package
A package file format used by the Android operating system for distribution and installation of mobile apps.
Advanced RISC Machine
A family of RISC architectures for computer processors, configured for various environments.
Address Resolution Protocol
A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
Advanced Technology Attachment
A standard physical interface for connecting storage devices like hard drives and optical drives to a computer.
Asynchronous Transfer Mode
A networking technology that uses short fixed-sized packets called cells to transport data across all network types.
Advanced Technology Extended
A motherboard and power supply configuration specification developed to improve on previous de facto standards like the AT design.
Acceptable Use Policy
A policy that sets out acceptable uses of an organization’s information technology resources.
Basic Input/Output System
Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.
Blue Screen of Death
A stop error screen displayed on a Windows computer system after a fatal system error.
Bring Your Own Device
A policy allowing employees to bring personally owned devices (laptops, tablets, smartphones) to their workplace and to use those devices to access privileged company information and applications.
Computer-aided Design
Software used by architects, engineers, drafters, artists, and other to create precision drawings or technical illustrations.
Completely Automated Public Turing test to tell Computers and Humans Apart
A type of challenge response test used in computing to determine whether the user is human.
Compact Disc
An optical disc used to store digital data, originally developed for storing digital audio.
Compact Disc File System
A file system for digital audio CDs and other disc formats that allows them to be accessed on a computer.
Code-Division Multiple Access
A channel access method used by various radio communication technologies, notable for its use in cellular networks.
Computer Emergency Response Team
A group that handles computer security incidents.
Common Internet File System
A protocol that allows programs to request files and services from network servers, commonly used in Windows operating systems.
Command Prompt
A command line interpreter application available in most Windows operating systems.
Copper Metal-Oxide Semiconductor
The small battery-powered memory chip that stores BIOS settings.
Central Processing Unit
The primary component of a computer that performs most of the processing inside.
Certificate Revocation List
A list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date.
Direct Current
An electric current flowing in one direction only, often used in battery-powered devices.
Distributed Denial of Service
An attack aimed at disrupting the normal traffic of a targeted server, service, or network by overwhelming the target with a flood of Internet traffic.
Double Data Rate
A type of SDRAM that can transfer data on both the rising and falling edges of the clock signal.
Dynamic Host Configuration Protocol
A network management protocol used on IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on the network.
Dual Inline Memory Module
A series of random-access memory integrated circuits mounted on a printed circuit board and used in computers.
DomainKeys Identified Mail
An email authentication method designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is authorized by that domain’s administrators.
Direct Memory Access
A feature of computer systems that allows certain hardware subsystems to access main system memory independently of the central processing unit.
Domain-based Message Authentication, Reporting, and Conformance
An email authentication protocol that defines how to handle SPF/DKIM failures, provides reports
Domain Name System
The system by which Internet domain names and addresses are tracked and regulated.
Denial of Service
An attack that prevents legitimate users from accessing information or services by targeting a system, thereby disrupting service to users.
Dynamic Random-Access Memory
A type of random access memory that is slower, needs constant refreshing, cheaper, and is used as general system memory.
Digital Rights Management
Technology used by publishers and copyright holders to control access to digital content and devices, often to restrict copying of digital media.
Digital Subscriber Line
A family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.
Digital Visual Interface
A video display interface developed to maximize the visual quality of digital display devices such as flat panel LCD computer displays and digital projectors.
Digital Visual Interface-Digital
A version of DVI that is meant for digital signals only, typically used for connecting a video sources to a display device.
Error Correcting Code
A type of memory that can detect and correct the more common kinds of internal data corruption, often used in high-end computing applications.
Encrypting File System
A feature of Windows that provides filesystem-level encryption, helping to protect data stored on disk.
Electromagnetic Interference
Disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.
End-of-Life
Refers to the point in time when a hardware or software product is no longer supported by the company that made it.
External Serial Advanced Technology Attachment
A variation of the SATA interface designed for external storage devices, offering optimized data transfer speeds and easy connectivity.
Electrostatic Discharge
The sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown, often damaging electronic components.
End-User License Agreement
The contract between a software application author or publisher and the software user, defining how the software can be used and any rights the consumer has.
Extensible File Allocation Table
A file system introduced by Microsoft optimized for flash drives like USB memory sticks and SD cards.
Extended File System
A series of filesystems developed specifically for the Linux kernel, providing advanced storage features and improved performance.
File Allocation Table
An older type of file system that is simple and robust, commonly used in various electronic devices due to its simplicity.
FAT12, FAT16, FAT32
Variants of the FAT filesystem, with the numbers indicating the bit size of the file allocation tables, affecting the maximum disk size they support.
Front Side Bus
The bus that carries data between the CPU and a memory controller hub, known as the northbridge.
File Transfer Protocol
A standard network protocol used for the transfer of computer files between a client and server on a computer network.
Grandfather-Father-Son
A common rotational backup scheme that provides a convenient way to manage backup data, ensuring that data is not overwritten too quickly.
Global Positioning System
A satellite-based radionavigation system owned by the US government that provides geolocation and time information to a GPS receiver anywhere on or near the Earth.
GUID Partition Table
A standard for the layout of the partition table on a physical storage device used in a desktop or server PC, such as a HDD or SSD, using globally unique indentifiers.
Graphics Processing Unit
A specialized processor primarily designed to accelerate graphics rendering.
Global System for Mobile Communications
A standard eeveloped to describe the protocols for second-generation digital cellular networks used by mobile pones.
Graphical User Interface
A user interface that includes graphical elements, such as windows, icons, and buttons, making it easier for users to interact with electronic devices.
Globally Unique Identifier
A unique reference number used as an identifier in computer software, providing a way to uniquely identify information in various systems.
Hardware Abstraction Layer
A software layer that allows a computer operating system to interact with a hardware device at a general or abstract or abstract level rather than at a detailed hardware level.
Hardware-assisted Virtualization
Virtualization technology that helps improve the performance of software that is running in a virtual environment by using processor features built into the hardware.
Hardware Compatibility List
A list maintained by software developers, especially for operating systems, that details the computer hardware that has been tested and is confirmed to work with their software.
High-bandwidth Digital Content Protection
A form of digital copy protection developed by Intel to prevent copying of digital audio and video content as it travels across connections.
Hard Disk Drive
A data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks coasted with magnetic material.
High-Definition Multimedia Interface
A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device to a compatible computer monitor, video projector, digital television, or digital audio device.
Hardware Security Module
A physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.
Hypertext Markup Language
The standard markup language used to create web pages.
Hypertext Transfer Protocol
An application protocol used for transmitting hypermedia documents, such as HTML, which is the foundation of data communication for the World Wide Web.
Hypertext Transfer Protocol Secure
An extension of HTTP that is used for secure communication over a computer network and is widely used on the Internet.
Input/Output
Refers to any program, operation, or device that transfers data to or from a computer and to or from a peripheral device.
Infrastructure as a Service
A form of cloud computing that provides virtualized computing resources over the internet.
Intelligent Character Recognition
Technology that allows computer software to recognize and translate handwritten characters and styles into machine-readable characters.
Integrated Drive Electronics
An interface standard for connecting storage devices, and it refers to the integration of the driver controller onto the drive itself, rather than being housed on the motherboard.
Intrusion Detection System
A device or software application that monitors a network or systems for malicious activity or policy violations.
Institute of Electrical and Electronics Engineers
A professional association with its corporate office in New York City that is dedicated to advancing technological innovation and excellence for the benefit of humanity.
Internet Mail Access Protocol
An Internet standard protocol used by email clients to retrieve messages from a mail server over a TCP/IP connection.
Input/Output Operations Per Second
A common performance measurement used to benchmark computer storage devices like hard disk drives, solid-state drives, and storage area networks.
Internet of Things
The network of devices such as vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect, interact exchange data.
Internet Protocol
The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
Intrusion Prevention System
A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
In-Plane Switching
A screen technology used for liquid crystal displays which involves arranging and switching the orientation of the molecules of the liquid crystal layer between the glass substrates.
Internet Protocol Security
A suite of protocols for securing Internet Protocol communications by authenticating and encrypting each IP packet of a communication session.
Infrared
Electromagnetic energy at a wavelength or wavelengths somewhat longer than those of red light.
Infrared Data Association
An old standard for infrared communications between devices.
Incident Response Plan
A documented, structured approach that describes the processes to be followed during a cybersecurity incident or breach.
International Organization for Standardization
An independent, non-governmental international organization with a membership of 165 national standards bodies that develops and publishes a wide range of proprietary, industrial, and commercial standards.
Internet Service Provider
A company that provides individuals and organizations access to the Internet and related services.
Information Technology eXtended
A series of small form factor specifications for computer motherboards, designed to minimize the physical space required by a computer.
Knowledge Based
A technology used to store complex structured and unstructured information used by a computer system.
Keyboard-Video-Mouse
A device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mice.
Local Area Network
A network that connects computers within a limited area such as a residence, school, or office building.
Lucent Connector
A type of small form-factor fiber optic connector typically used for high-density connections and known for its convenient latching mechanism.
Liquid Crystal Display
A type of display used in digital watches and many portable computers, which uses two sheets of polarizing material with a liquid crystal solution between them.
Lightweight Directory Access Protocol
A protocol used to access and maintain distributed directory information services over an Internet Protocol network.
Light-emitting Diode
A semiconductor light source that emits light when current flows through it.
Media Access Control
A unique identifier assigned to a network interface for communications at the data link layer of a network segment.
Mobile Application Management
Refers to the workflow for security, governance, and distribution of mobile apps in the enterprise, particularly those that are brought in through BYOD.
Metropolitan Area Network
A network that spans a larger geographic area than a LAN but smaller than a WAN, such as a city.
Master Boot Record
A type of boot sector at the beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.
Mobile Device Management
Software that allows IT administrators to control, secure, and enforce polices on smartphones, tablets, and other endpoints.
Multifactor Authentication
A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction.
Multifunction Device
A device that incorporates several functions such as printing, scanning, faxing, and copying.
Multifunction Printer
A printer that also performs other tasks such as scanning, copying, and faxing.
Microsoft Management Console
A framework that provides a common user interface for programmatic access to underlying administrative functions in Windows.
Memorandum of Unerstanding
An agreement between two or more parties outlined in a formal document.
Material Safety Data Sheet
A document that lists information relating to occupational safety and health for the use of various substances and products.
Microsoft Remote Assistance
A feature of Windows that allows users to temporarily take control of a remote Windows sessions over a network to resolve issues.
Mail Exchange
A type of resource record in DNS that specifies a mail server responsible for accepting email messages on behalf of a recipient’s domain.
Network Access Control
A security method that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.
Network Address Translation
A method of remapping one IP address space into another by modifying network address information in the IP header of packets while that are in transit across a traffic routing device.
Non-disclosure Agreement
A legally binding contract that establishes a confidential material, knowledge, or information that the parties wish to share with out another for specific purposes but wish to restrict access to or by third parties.
NetBIOS
A program that allows applications on different computers to communicate within a local area network.
NetBT
A network protocol that allows legacy computer applications relying on the NetBIOS API to be used on modern TCP/IP networks.
Near-field Communications
A set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4cm of each other.
Network File System
A client/server application that allows a user to view, store, and update files on a remote computer as though they were on the user’s own computer.
Network Interface Card
A computer hardware component that connects a computer to a computer network.
New Technology File System
The standard file system starting with Windows NT.
Non-volatile Memory Express
A specification for accessing solid-state drives attached through the PCIe bus, with the protocol capitalizing on the low latency and parallelism of SSDs.
Optical Character Recognition
The mechanical or electronic conversion of images of typed, handwritten, or printed text into machine-encoded text.
Organic Light-emitting Diode
A type of LED in which the emissive electroluminescent layer is a film of organic compound that emits light in response to an electric current.
Optical Network Terminal
A device commonly used in fiber-optic based telecommunications networks, which converts optical signals into electrical signals and vice versa.
Operating System
Software that manages computer hardware, software resources, and provides common services for computer programs.
Platform as a Service
A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
Personal Area Network
A network for interconnecting devices centered around an individual person’s workspace, involving connections between devices such as computers, phones, tablets, and personal digital assistants.
Personal Computer
A multi-purpose computer whose size, capabilities, and price make it feasible for individual use.
Peripheral Component Interconnect Express
A high-speed serial computer expansion bus standard, designed to replace the older PCI, PCI-X, and AGP bus standards.
Printer Command Language
A language developed by HP that has become a de facto industry standard for controlling printing operations in many office environments.
Preinstallation Environment
A lightweight version of Windows used to deploy workstations, servers, and troubleshoot an operating system while it is offline.
Personally Identifiable Information
Information that can be used on its own or with other information to identify an individual in context.
Personal Identification Number
A numeric or alphanumeric password used in the process of authenticating a user accessing a system.
Public Key Infrastructure
A set of roles, polices, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Power over Ethernet
A system to pass electric power along with data on Ethernet cabling, allowing a single cable to provide both data connection and electrical power to devices.
Post Office Protocol 3
An internet standard protocol used by local email clients to retrieve email from a remote server over a TCP/IP connection.
Power-on Self-Test
A process performed by firmware or software routines immediately after a computer or other digital electronic device is powered on.
Point-to-Point Protocol
A data link protocol commonly used in establishing a direct connection between two networking nodes.
Preferred Roaming List
A database residing in a wireless (mobile) device that contains information used during the system selection and acquisition process.
Power Supply Unit
A hardware component that provides power to a device or set of devices, converting mains AC to low-voltage regulated DC power for the internal components of a computer.
Preboot Execution Environment
A protocol that enables a computer to boot without the need for a hard drive or an operating system, using the network.
Remote Authentication Dial-In User Service
A networking protocol that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service.
Redundant Array of Independent Disks
A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
Random Access Memory
A type of computer memory that can be accessed randomly, which means that any byte of memory can be accessed without touching the preceding bytes.
Remote Desktop Protocol
A proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.
Radio Frequency
Any of the elctromagnetic wave frequences that lie in the range extending from around 20kHz to 300GHz, which include those frequencies used for communications or radar signals.
Radio Frequency Interference
Disturbance generated in an electrical circuit by electromagnetic radiation emitted from external sources.
Radio Frequency Identification
A form of wireless communication that uses radio waves to identify and track objects.
Registered Jack Function 11
A standard connector primarily used to connect telephone equipment.
Registered Jack Function 45
A common type of connector for network cables used in wired network.
Remote Monitoring and Management
A type of software designed to help managed IT service providers remotely and proactively monitor client endpoints, networks, and computers.
Recovery Time Objective
The targeted duration of time and a service level within which a business process must be restored after a disaster or disruption to avoid unacceptable consequences associated with a break in business continuity.
Software as a Service
A software distribution model in which applications are hosted by a third-party provider and made available to customers over the Internet.
Storage Area Network
A network which provides access to consolidated, block-level data storage.
Serial Attached SCSI
A point-to-point serial protocol that moves data to and from computer storage devices such as hard drives and tape drives.
Serial Advanced Technology Attachment
A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
Subscriber Connector
A type of fiber optic connector with a push-pull latching mechanism that provides quick insertion and removal while also delivering excellent optical performance.
Supervisory Control and Data Acquisition
A system of software and hardware elements that allows industrial organizations to control industrial processes locally or at remote locations, monitor, gather, and process real-time data.
Secure Copy Protocol
A network protocol, based on BSD RCP, that supports file transfers between hosts on a network and uses SSH for data transfer and authentication to ensure security.
Small Computer System Interface
A set of standards for physically connecting and transferring data between computers and peripheral devices.
Software-defined Networking
An approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring.
Secure File Transfer Protocol
A network protocol that provides file access, file transfer, and file management functionalities over any reliable data stream.
Subscriber Identity Module
A removable smart card for mobile phones that securely stores the service-subscriber key used to identify a subscriber on mobile telephony devices.
Single Inline Memory Module
A type of memory module containing random-access memory used in computers from the late 1980s to the late 1990s.
Self-monitoring, Analysis, and Reporting Technology
A monitoring system included in computer HDDs, SDDs, and eMMC drives that detects and reports on various indicators of drive reliability.
Server Message Block
A network file sharing protocol that allows applications on a computer to read and write to files to request services from server programs in a computer network.
Short Message Service
A text messaging service component of most telephone, internet, and mobile device systems that uses standardized communication protocols to enable mobile devices to exchange short text messages.
Simple Mail Transfer Protocol
The standard protocol used for sending emails across the internet.
Simple Network Management Protocol
An Internet Standard protocol developed to manage nodes (servers, workstations, routers, switches, and hubs) on an IP network.
Simple Network Time Protocol
A simplified version of Network Time Protocol (NTP), used for time synchronization with computer clocks over packet-switched, variable-latency data networks.
Small Outline Dual Inline Memory Module
A smaller alternative to a DIMM, being roughly half the size of regular DIMMs, used in systems with limited space like laptops.
Small Office/Home Office
The category of business or cottage industry that involves 1 to 10 workers, often located in private homes.
Sender Policy Framework
An email authentication method designed to detect forging sender addresses during the delivery of the email.
Structured Query Language
A domain-specific language used in programming and designed for managing data held in a relational database management system.
Static Random-Access Memory
A type of semiconductor memory that uses bistable latching circuitry circuitry to store each bit and is used as cache memory.
Solid-State Drive
A type of mass storage device similar to a hard disk drive but using flas memory to store data instead of spinning disks.
Secure Shell
A cryptographic network protocol for operating network services securely over an unsecured network.
Service Set Identifier
The name associated with and 802.11 wireless local area network including home networks and public hotspots.
Secure Sockets Layer
The standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private.
Single Sign-On
A property of access control of multiple related, yet independent, software systems whereby a user logs in once and gains access to all systems without being prompted to log in again.
Straight Tip
A type of fiber optic connector known for its high-performance fiber optic interfacing.
Shielded Twisted Pair
A type of twisted pair cable encased in a shield, typically metal, that protects the transmission of data from electromagnetic interference.
Terminal Access Controller Access-Control System
A family of related protocols handling remote authentication and related services for networked access control through a centralized server.
Transmission Control Protocol
One of the main protocols of the Internet Protocol suite, it originates and terminates connections between hosts and manages data transfer between those hosts.
Transmission Control Protocol/Internet Protocol
The suite of communications protocols used to connect hosts on the Internet. TCP/IP specifies how data is exchanged over the network by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed, and received at the destination.
Trivial File Transfer Protocol
A simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.
Temporal Key Integrity Protocol
An encryption protocol included as part of IEEE 802.11i standard for wireless LANs that provides data encryption more secure than WEP.
Transport Layer Security
A cryptographic protocol designed to provide communications security over a computer network.
Twisted Nematic
A type of LCD that uses the twisted nematic effect to produce images.
Trusted Platform Module
A secure crypto-processor that is designed to secure hardware through integrated cryptographic keys.
User Account Control
A technology and security infrastructure introduced with Windows Vista and Windows Server 2008 operating systems, with a goal to improve the security of these systems by limiting application software to standard user privileges until an administrator authorizes an increase or elevation.
User Datagram Protocol
One of the core members of the Internet protocol suite. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an IP network without requiring prior communications to set up special transmission channels or data paths.
Unified Extensible Firmware Interface
A specification that defines a software interface between an operating system and platform firmware, replacing the legacy BIOS firmware interface.
Universal Naming Convention
A standard for identifying servers, printers, and other resources in a network.
Universal Plug and Play
A set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points, and mobile devices to seamlessly discover each other’s presences on the network and establish functional network services.
Uninterruptible Power Supply
A device that provides battery backup when the electrical power fails or drops to an unacceptable voltage level, allowing for safe, orderly shutdown of equipment.
Universal Serial Bus
An industry standard that establishes specifications for cables, connectors, and protocols for connection, communication, and power supply between personal computers and their peripheral devices.
Unified Threat Management
A comprehensive solution that has evolved from the traditional firewall into an all-inclusive security product capable of performing multiple security functions within one single system: network firewalling, network intrusion detection and prevention, gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing, data leakage prevention, and on-appliance reporting.
Unshielded Twisted Pair
A popular type of cable used in computer networking that consists of two unshielded wires twisted around each other.
Vertical Alignment
A type of LCD technology that blocks light more effectively by aligning the liquid crystals in a vertical position.
Virtual Desktop Infrastructure
A desktop virtualization technology that hosts a desktop operating system on a centralized server in a data center.
Video Graphics Array
A graphics standard for video display controller introduced in 1987, subsequently becoming a widespread standard.
Virtual Local Access Network
A group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments.
Virtual Machine
A software computer that, like a physical computer, runs an operating system and applications.
Virtual Network Computing
A graphical desktop-sharing system that uses the Remote Frame Buffer protocol to remotely control another computer.
Voice over Internet Protocol
A methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet.
Virtual Private Network
A network that extends a private network across a public network, enabling users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Video Random Access Memory
A type of RAM used to store the image data that a computer displays; it acts as a buffer between the CPU and the video card.
Wide Area Network
A telecommunications network that extends over a large geographical area for the primary purpose of computer networking.
Wired Equivalent Privacy
A security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.
Wireless Internet Service Provider
A type of Internet service provider that allows subscribers to connect to a server at designated hot spots or access points using a wireless connection such as Wi-Fi.
Wireless Local Area Network
A wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.
Wireless Mesh Network
A communications network made up of radio nodes organized in a mesh topology that can relay data for the network.
WiFi Protected Access
A security protocol developed by the Wi-Fi Alliance to secure wireless computer networks.
Wireless Wide Area Network
A form of wireless network that covers large areas such as towns and cities, typically using cellular network technology.
Cross-site Scripting
A type of security vulnerability typically found in web applications that enables attackers to inject client-side scripts into web pages viewed by other users.