Name - Definition Flashcards
Authentication, Authorization, and Accounting
A framework for intelligently controlling access to computer resources, enforcing policies, and auditing usage.
Alternating Current
An electric current which periodically reverses direction, in contrast to direct current (DC) which flows only in one direction.
Access Control List
A table that tells a computer operating system which access rights each user has to a particular system object, like a file directory or individual file.
Automatic Document Feeder
A feature in printers, photocopies, fax machines, or scanners wherein a stack of paper can be place and then automatically fed into the machine.
Advanced Encryption Standard
A symmetric block cipher chosen by the US government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.
Access Point
A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
Apple File System
The proprietary file system of Apple Inc. designed to replace HFS+, offering improvements in scalability, encryption, and reliability.
Automatic Private Internet Protocol Addressing
A method of IP address assignment that occurs when a DHCP server fails to provide an IP address.
Android Package
A package file format used by the Android operating system for distribution and installation of mobile apps.
Advanced RISC Machine
A family of RISC architectures for computer processors, configured for various environments.
Address Resolution Protocol
A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
Advanced Technology Attachment
A standard physical interface for connecting storage devices like hard drives and optical drives to a computer.
Asynchronous Transfer Mode
A networking technology that uses short fixed-sized packets called cells to transport data across all network types.
Advanced Technology Extended
A motherboard and power supply configuration specification developed to improve on previous de facto standards like the AT design.
Acceptable Use Policy
A policy that sets out acceptable uses of an organization’s information technology resources.
Basic Input/Output System
Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.
Blue Screen of Death
A stop error screen displayed on a Windows computer system after a fatal system error.
Bring Your Own Device
A policy allowing employees to bring personally owned devices (laptops, tablets, smartphones) to their workplace and to use those devices to access privileged company information and applications.
Computer-aided Design
Software used by architects, engineers, drafters, artists, and other to create precision drawings or technical illustrations.
Completely Automated Public Turing test to tell Computers and Humans Apart
A type of challenge response test used in computing to determine whether the user is human.
Compact Disc
An optical disc used to store digital data, originally developed for storing digital audio.
Compact Disc File System
A file system for digital audio CDs and other disc formats that allows them to be accessed on a computer.
Code-Division Multiple Access
A channel access method used by various radio communication technologies, notable for its use in cellular networks.
Computer Emergency Response Team
A group that handles computer security incidents.
Common Internet File System
A protocol that allows programs to request files and services from network servers, commonly used in Windows operating systems.
Command Prompt
A command line interpreter application available in most Windows operating systems.
Copper Metal-Oxide Semiconductor
The small battery-powered memory chip that stores BIOS settings.
Central Processing Unit
The primary component of a computer that performs most of the processing inside.
Certificate Revocation List
A list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date.
Direct Current
An electric current flowing in one direction only, often used in battery-powered devices.
Distributed Denial of Service
An attack aimed at disrupting the normal traffic of a targeted server, service, or network by overwhelming the target with a flood of Internet traffic.
Double Data Rate
A type of SDRAM that can transfer data on both the rising and falling edges of the clock signal.
Dynamic Host Configuration Protocol
A network management protocol used on IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on the network.
Dual Inline Memory Module
A series of random-access memory integrated circuits mounted on a printed circuit board and used in computers.
DomainKeys Identified Mail
An email authentication method designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is authorized by that domain’s administrators.
Direct Memory Access
A feature of computer systems that allows certain hardware subsystems to access main system memory independently of the central processing unit.
Domain-based Message Authentication, Reporting, and Conformance
An email authentication protocol that defines how to handle SPF/DKIM failures, provides reports
Domain Name System
The system by which Internet domain names and addresses are tracked and regulated.
Denial of Service
An attack that prevents legitimate users from accessing information or services by targeting a system, thereby disrupting service to users.
Dynamic Random-Access Memory
A type of random access memory that is slower, needs constant refreshing, cheaper, and is used as general system memory.
Digital Rights Management
Technology used by publishers and copyright holders to control access to digital content and devices, often to restrict copying of digital media.
Digital Subscriber Line
A family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.
Digital Visual Interface
A video display interface developed to maximize the visual quality of digital display devices such as flat panel LCD computer displays and digital projectors.
Digital Visual Interface-Digital
A version of DVI that is meant for digital signals only, typically used for connecting a video sources to a display device.
Error Correcting Code
A type of memory that can detect and correct the more common kinds of internal data corruption, often used in high-end computing applications.
Encrypting File System
A feature of Windows that provides filesystem-level encryption, helping to protect data stored on disk.
Electromagnetic Interference
Disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.
End-of-Life
Refers to the point in time when a hardware or software product is no longer supported by the company that made it.
External Serial Advanced Technology Attachment
A variation of the SATA interface designed for external storage devices, offering optimized data transfer speeds and easy connectivity.
Electrostatic Discharge
The sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown, often damaging electronic components.
End-User License Agreement
The contract between a software application author or publisher and the software user, defining how the software can be used and any rights the consumer has.
Extensible File Allocation Table
A file system introduced by Microsoft optimized for flash drives like USB memory sticks and SD cards.
Extended File System
A series of filesystems developed specifically for the Linux kernel, providing advanced storage features and improved performance.
File Allocation Table
An older type of file system that is simple and robust, commonly used in various electronic devices due to its simplicity.
FAT12, FAT16, FAT32
Variants of the FAT filesystem, with the numbers indicating the bit size of the file allocation tables, affecting the maximum disk size they support.
Front Side Bus
The bus that carries data between the CPU and a memory controller hub, known as the northbridge.
File Transfer Protocol
A standard network protocol used for the transfer of computer files between a client and server on a computer network.
Grandfather-Father-Son
A common rotational backup scheme that provides a convenient way to manage backup data, ensuring that data is not overwritten too quickly.
Global Positioning System
A satellite-based radionavigation system owned by the US government that provides geolocation and time information to a GPS receiver anywhere on or near the Earth.
GUID Partition Table
A standard for the layout of the partition table on a physical storage device used in a desktop or server PC, such as a HDD or SSD, using globally unique indentifiers.
Graphics Processing Unit
A specialized processor primarily designed to accelerate graphics rendering.
Global System for Mobile Communications
A standard eeveloped to describe the protocols for second-generation digital cellular networks used by mobile pones.
Graphical User Interface
A user interface that includes graphical elements, such as windows, icons, and buttons, making it easier for users to interact with electronic devices.
Globally Unique Identifier
A unique reference number used as an identifier in computer software, providing a way to uniquely identify information in various systems.
Hardware Abstraction Layer
A software layer that allows a computer operating system to interact with a hardware device at a general or abstract or abstract level rather than at a detailed hardware level.
Hardware-assisted Virtualization
Virtualization technology that helps improve the performance of software that is running in a virtual environment by using processor features built into the hardware.
Hardware Compatibility List
A list maintained by software developers, especially for operating systems, that details the computer hardware that has been tested and is confirmed to work with their software.
High-bandwidth Digital Content Protection
A form of digital copy protection developed by Intel to prevent copying of digital audio and video content as it travels across connections.
Hard Disk Drive
A data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks coasted with magnetic material.
High-Definition Multimedia Interface
A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device to a compatible computer monitor, video projector, digital television, or digital audio device.
Hardware Security Module
A physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.
Hypertext Markup Language
The standard markup language used to create web pages.
Hypertext Transfer Protocol
An application protocol used for transmitting hypermedia documents, such as HTML, which is the foundation of data communication for the World Wide Web.
Hypertext Transfer Protocol Secure
An extension of HTTP that is used for secure communication over a computer network and is widely used on the Internet.
Input/Output
Refers to any program, operation, or device that transfers data to or from a computer and to or from a peripheral device.
Infrastructure as a Service
A form of cloud computing that provides virtualized computing resources over the internet.
Intelligent Character Recognition
Technology that allows computer software to recognize and translate handwritten characters and styles into machine-readable characters.
Integrated Drive Electronics
An interface standard for connecting storage devices, and it refers to the integration of the driver controller onto the drive itself, rather than being housed on the motherboard.
Intrusion Detection System
A device or software application that monitors a network or systems for malicious activity or policy violations.
Institute of Electrical and Electronics Engineers
A professional association with its corporate office in New York City that is dedicated to advancing technological innovation and excellence for the benefit of humanity.
Internet Mail Access Protocol
An Internet standard protocol used by email clients to retrieve messages from a mail server over a TCP/IP connection.
Input/Output Operations Per Second
A common performance measurement used to benchmark computer storage devices like hard disk drives, solid-state drives, and storage area networks.
Internet of Things
The network of devices such as vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect, interact exchange data.
Internet Protocol
The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
Intrusion Prevention System
A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
In-Plane Switching
A screen technology used for liquid crystal displays which involves arranging and switching the orientation of the molecules of the liquid crystal layer between the glass substrates.
Internet Protocol Security
A suite of protocols for securing Internet Protocol communications by authenticating and encrypting each IP packet of a communication session.