Name - Definition Flashcards

1
Q

Authentication, Authorization, and Accounting

A

A framework for intelligently controlling access to computer resources, enforcing policies, and auditing usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Alternating Current

A

An electric current which periodically reverses direction, in contrast to direct current (DC) which flows only in one direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control List

A

A table that tells a computer operating system which access rights each user has to a particular system object, like a file directory or individual file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Automatic Document Feeder

A

A feature in printers, photocopies, fax machines, or scanners wherein a stack of paper can be place and then automatically fed into the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced Encryption Standard

A

A symmetric block cipher chosen by the US government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Point

A

A networking hardware device that allows other Wi-Fi devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Apple File System

A

The proprietary file system of Apple Inc. designed to replace HFS+, offering improvements in scalability, encryption, and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Automatic Private Internet Protocol Addressing

A

A method of IP address assignment that occurs when a DHCP server fails to provide an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Android Package

A

A package file format used by the Android operating system for distribution and installation of mobile apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advanced RISC Machine

A

A family of RISC architectures for computer processors, configured for various environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Address Resolution Protocol

A

A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advanced Technology Attachment

A

A standard physical interface for connecting storage devices like hard drives and optical drives to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asynchronous Transfer Mode

A

A networking technology that uses short fixed-sized packets called cells to transport data across all network types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advanced Technology Extended

A

A motherboard and power supply configuration specification developed to improve on previous de facto standards like the AT design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Acceptable Use Policy

A

A policy that sets out acceptable uses of an organization’s information technology resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Basic Input/Output System

A

Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Blue Screen of Death

A

A stop error screen displayed on a Windows computer system after a fatal system error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bring Your Own Device

A

A policy allowing employees to bring personally owned devices (laptops, tablets, smartphones) to their workplace and to use those devices to access privileged company information and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Computer-aided Design

A

Software used by architects, engineers, drafters, artists, and other to create precision drawings or technical illustrations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Completely Automated Public Turing test to tell Computers and Humans Apart

A

A type of challenge response test used in computing to determine whether the user is human.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Compact Disc

A

An optical disc used to store digital data, originally developed for storing digital audio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Compact Disc File System

A

A file system for digital audio CDs and other disc formats that allows them to be accessed on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Code-Division Multiple Access

A

A channel access method used by various radio communication technologies, notable for its use in cellular networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Computer Emergency Response Team

A

A group that handles computer security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Common Internet File System

A

A protocol that allows programs to request files and services from network servers, commonly used in Windows operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Command Prompt

A

A command line interpreter application available in most Windows operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Copper Metal-Oxide Semiconductor

A

The small battery-powered memory chip that stores BIOS settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Central Processing Unit

A

The primary component of a computer that performs most of the processing inside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Certificate Revocation List

A

A list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Direct Current

A

An electric current flowing in one direction only, often used in battery-powered devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Distributed Denial of Service

A

An attack aimed at disrupting the normal traffic of a targeted server, service, or network by overwhelming the target with a flood of Internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Double Data Rate

A

A type of SDRAM that can transfer data on both the rising and falling edges of the clock signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Dynamic Host Configuration Protocol

A

A network management protocol used on IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Dual Inline Memory Module

A

A series of random-access memory integrated circuits mounted on a printed circuit board and used in computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

DomainKeys Identified Mail

A

An email authentication method designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is authorized by that domain’s administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Direct Memory Access

A

A feature of computer systems that allows certain hardware subsystems to access main system memory independently of the central processing unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Domain-based Message Authentication, Reporting, and Conformance

A

An email authentication protocol designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Domain System Name

A

The system by which Internet domain names and addresses are tracked and regulated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Denial of Service

A

An attack that prevents legitimate users from accessing information or services by targeting a system, thereby disrupting service to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Dynamic Random-Access Memory

A

A type of random access semiconductor memory that stores each bit of data in a separate tiny capacitor within an integrated circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Digital Rights Management

A

Technology used by publishers and copyright holders to control access to digital content and devices, often to restrict copying of digital media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Digital Subscriber Line

A

A family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Digital Visual Interface

A

A video display interface developed to maximize the visual quality of digital display devices such as flat panel LCD computer displays and digital projectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Digital Visual Interface-Digital

A

A version of DVI that is meant for digital signals only, typically used for connecting a video sources to a display device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Error Connecting Code

A

A type of memory that can detect and correct the more common kinds of internal data corruption, often used in high-end computing applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Encrypting File System

A

A feature of Windows that provides filesystem-level encryption, helping to protect data stored on disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Electromagnetic Interference

A

Disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

End-of-Life

A

Refers to the point in time when a hardware or software product is no longer supported by the company that made it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

External Serial Advanced Technology Attachment

A

A variation of the SATA interface designed for external storage devices, offering optimized data transfer speeds and easy connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Electrostatic Discharge

A

The sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown, often damaging electronic components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

End-User License Agreement

A

The contract between a software application author or publisher and the software user, defining how the software can be used and any rights the consumer has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Extensible File Allocation Table

A

A file system introduced by Microsoft optimized for flash drives like USB memory sticks and SD cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Extended File System

A

A series of filesystems developed specifically for the Linux kernel, providing advanced storage features and improved performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

File Allocation Table

A

An older type of file system that is simple and robust, commonly used in various electronic devices due to its simplicity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

FAT12, FAT16, FAT32

A

Variants of the FAT filesystem, with the numbers indicating the bit size of the file allocation tables, affecting the maximum disk size they support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Front Side Bus

A

The bus that carries data between the CPU and a memory controller hub, known as the northbridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

File Transfer Protocol

A

A standard network protocol used for the transfer of computer files between a client and server on a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Grandfather-Father-Son

A

A common rotational backup scheme that provides a convenient way to manage backup data, ensuring that data is not overwritten too quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Global Positioning System

A

A satellite-based radionavigation system owned by the US government that provides geolocation and time information to a GPS receiver anywhere on or near the Earth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

GUID Partition Table

A

A standard for the layout of the partition table on a physical sotrage device used in a desktop or server PC, such as a HDD or SSD, using globally unique indentifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Graphics Processing Unit

A

A specialized processor primarily designed to accelerate graphics rendering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Global System for Mobile Communications

A

A standard eeveloped to describe the protocols for second-generation digital cellular networks used by mobile pones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Graphical User Interface

A

A user interface that includes graphical elements, such as windows, icons, and buttons, making it easier for users to interact with electronic devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Globally Unique Identifier

A

A unique reference number used as an identifier in computer software, providing a way to uniquely identify information in various systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Hardware Abstraction Layer

A

A software layer that allows a computer operating system to interact with a hardware device at a general or abstract or abstract level rather than at a detailed hardware level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Hardware-assisted Virtualization

A

Virtualization technology that helps improve the performance of software that is running in a virtual environment by using processor features built into the hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Hardware Compatibility List

A

A list maintained by software developers, especially for operating systems, that details the computer hardware that has been tested and is confirmed to work with their software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

High-bandwidth Digital Content Protection

A

A form of digital copy protection developed by Intel to prevent copying of digital audio and video content as it travels across connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Hard Disk Drive

A

A data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks coasted with magnetic material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

High-Definition Multimedia Interface

A

A proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device to a compatible computer monitor, video projector, digital television, or digital audio device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Hardware Security Module

A

A physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Hypertext Markup Language

A

The standard markup language used to create web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Hypertext Transfer Protocol

A

An application protocol used for transmitting hypermedia documents, such as HTML, which is the foundation of data communication for the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Hypertext Transfer Protocol Secure

A

An extension of HTTP that is used for secure communication over a computer network and is widely used on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Input/Output

A

Refers to any program, operation, or device that transfers data to or from a computer and to or from a peripheral device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Infrastructure as a Service

A

A form of cloud computing that provides virtualized computing resources over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Intelligent Character Recognition

A

Technology that allows computer software to recognize and translate handwritten characters and styles into machine-readable characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Integrated Drive Electronics

A

An interface standard for connecting storage devices, and it refers to the integration of the driver controller onto the drive itself, rather than being housed on the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Intrusion Detection System

A

A device or software application that monitors a network or systems for malicious activity or policy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Institute of Electrical and Electronics Engineers

A

A professional association with its corporate office in New York City that is dedicated to advancing technological innovation and excellence for the benefit of humanity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Internet Mail Access Protocol

A

An Internet standard protocol used by email clients to retrieve messages from a mail server over a TCP/IP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Input/Output Operations Per Second

A

A common performance measurement used to benchmark computer storage devices like hard disk drives, solid-state drives, and storage area networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Internet of Things

A

The network of devices such as vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect, interact exchange data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Internet Protocol

A

The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Intrusion Prevention System

A

A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

In-Plane Switching

A

A screen technology used for liquid crystal displays which involves arranging and switching the orientation of the molecules of the liquid crystal layer between the glass substrates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Internet Protocol Security

A

A suite of protocols for securing Internet Protocol communications by authenticating and encrypting each IP packet of a communication session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Infrared

A

Electromagnetic energy at a wavelength or wavelengths somewhat longer than those of red light.

89
Q

Infrared Data Association

A

An old standard for infrared communications between devices.

90
Q

Incident Response Plan

A

A documented, structured approach that describes the processes to be followed during a cybersecurity incident or breach.

91
Q

International Organization for Standardization

A

An independent, non-governmental international organization with a membership of 165 national standards bodies that develops and publishes a wide range of proprietary, industrial, and commercial standards.

92
Q

Internet Service Provider

A

A company that provides individuals and organizations access to the Internet and related services.

93
Q

Information Technology eXtended

A

A series of small form factor specifications for computer motherboards, designed to minimize the physical space required by a computer.

94
Q

Knowledge Based

A

A technology used to store complex structured and unstructured information used by a computer system.

95
Q

Keyboard-Video-Mouse

A

A device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mice.

96
Q

Local Area Network

A

A network that connects computers within a limited area such as a residence, school, or office building.

97
Q

Lucent Connector

A

A type of small form-factor fiber optic connector typically used for high-density connections and known for its convenient latching mechanism.

98
Q

Liquid Crystal Display

A

A type of display used in digital watches and many portable computers, which uses two sheets of polarizing material with a liquid crystal solution between them.

99
Q

Lightweight Directory Access Protocol

A

A protocol used to access and maintain distributed directory information services over an Internet Protocol network.

100
Q

Light-emitting Diode

A

A semiconductor light source that emits light when current flows through it.

101
Q

Media Access Control

A

A unique identifier assigned to a network interface for communications at the data link layer of a network segment.

102
Q

Mobile Application Management

A

Refers to the workflow for security, governance, and distribution of mobile apps in the enterprise, particularly those that are brought in through BYOD.

103
Q

Metropolitan Area Network

A

A network that spans a larger geographic area than a LAN but smaller than a WAN, such as a city.

104
Q

Master Boot Record

A

A type of boot sector at the beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.

105
Q

Mobile Device Management

A

Software that allows IT administrators to control, secure, and enforce polices on smartphones, tablets, and other endpoints.

106
Q

Multifactor Authentication

A

A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction.

107
Q

Multifunction Device

A

A device that incorporates several functions such as printing, scanning, faxing, and copying.

108
Q

Multifunction Printer

A

A printer that also performs other tasks such as scanning, copying, and faxing.

109
Q

Microsoft Management Console

A

A framework that provides a common user interface for programmatic access to underlying administrative functions in Windows.

110
Q

Memorandum of Unerstanding

A

An agreement between two or more parties outlined in a formal document.

111
Q

Material Safety Data Sheet

A

A document that lists information relating to occupational safety and health for the use of various substances and products.

112
Q

Microsoft Remote Assistance

A

A feature of Windows that allows users to temporarily take control of a remote Windows sessions over a network to resolve issues.

113
Q

Mail Exchange

A

A type of resource record in DNS that specifies a mail server responsible for accepting email messages on behalf of a recipient’s domain.

114
Q

Network Access Control

A

A security method that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.

115
Q

Network Address Translation

A

A method of remapping one IP address space into another by modifying network address information in the IP header of packets while that are in transit across a traffic routing device.

116
Q

Non-disclosure Agreement

A

A legally binding contract that establishes a confidential material, knowledge, or information that the parties wish to share with out another for specific purposes but wish to restrict access to or by third parties.

117
Q

NetBIOS

A

A program that allows applications on different computers to communicate within a local area network.

118
Q

NetBT

A

A network protocol that allows legacy computer applications relying on the NetBIOS API to be used on modern TCP/IP networks.

119
Q

Near-field Communications

A

A set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4cm of each other.

120
Q

Network File System

A

A client/server application that allows a user to view, store, and update files on a remote computer as though they were on the user’s own computer.

121
Q

Network Interface Card

A

A computer hardware component that connects a computer to a computer network.

122
Q

New Technology File System

A

The standard file system starting with Windows NT.

123
Q

Non-volatile Memory Express

A

A specification for accessing solid-state drives attached through the PCIe bus, with the protocol capitalizing on the low latency and parallelism of SSDs.

124
Q

Optical Character Recognition

A

The mechanical or electronic conversion of images of typed, handwritten, or printed text into machine-encoded text.

125
Q

Organic Light-emitting Diode

A

A type of LED in which the emissive electroluminescent layer is a film of organic compound that emits light in response to an electric current.

126
Q

Optical Network Terminal

A

A device commonly used in fiber-optic based telecommunications networks, which converts optical signals into electrical signals and vice versa.

127
Q

Operating System

A

Software that manages computer hardware, software resources, and provides common services for computer programs.

128
Q

Platform as a Service

A

A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.

129
Q

Personal Area Network

A

A network for interconnecting devices centered around an individual person’s workspace, involving connections between devices such as computers, phones, tablets, and personal digital assistants.

130
Q

Personal Computer

A

A multi-purpose computer whose size, capabilities, and price make it feasible for individual use.

131
Q

Peripheral Component Interconnect Express

A

A high-speed serial computer expansion bus standard, designed to replace the older PCI, PCI-X, and AGP bus standards.

132
Q

Printer Command Language

A

A language developed by HP that has become a de facto industry standard for controlling printing operations in many office environments.

133
Q

Preinstallation Environment

A

A lightweight version of Windows used to deploy workstations, servers, and troubleshoot an operating system while it is offline.

134
Q

Personally Identifiable Information

A

Information that can be used on its own or with other information to identify an individual in context.

135
Q

Personal Identification Number

A

A numeric or alphanumeric password used in the process of authenticating a user accessing a system.

136
Q

Public Key Infrastructure

A

A set of roles, polices, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

137
Q

Power over Ethernet

A

A system to pass electric power along with data on Ethernet cabling, allowing a single cable to provide both data connection and electrical power to devices.

138
Q

Post Office Protocol 3

A

An internet standard protocol used by local email clients to retrieve email from a remote server over a TCP/IP connection.

139
Q

Power-on Self-Test

A

A process performed by firmware or software routines immediately after a computer or other digital electronic device is powered on.

140
Q

Point-to-Point Protocol

A

A data link protocol commonly used in establishing a direct connection between two networking nodes.

141
Q

Preferred Roaming List

A

A database residing in a wireless (mobile) device that contains information used during the system selection and acquisition process.

142
Q

Power Supply Unit

A

A hardware component that provides power to a device or set of devices, converting mains AC to low-voltage regulated DC power for the internal components of a computer.

143
Q

Preboot Execution Environment

A

A protocol that enables a computer to boot without the need for a hard drive or an operating system, using the network.

144
Q

Remote Authentication Dial-In User Service

A

A networking protocol that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service.

145
Q

Redundant Array of Independent Disks

A

A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

146
Q

Random Access Memory

A

A type of computer memory that can be accessed randomly, which means that any byte of memory can be accessed without touching the preceding bytes.

147
Q

Remote Desktop Protocol

A

A proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.

148
Q

Radio Frequency

A

Any of the elctromagnetic wave frequences that lie in the range extending from around 20kHz to 300GHz, which include those frequencies used for communications or radar signals.

149
Q

Radio Frequency Interference

A

Disturbance generated in an electrical circuit by electromagnetic radiation emitted from external sources.

150
Q

Radio Frequency Identification

A

A form of wireless communication that uses radio waves to identify and track objects.

151
Q

Registered Jack Function 11

A

A standard connector primarily used to connect telephone equipment.

152
Q

Registered Jack Function 45

A

A common type of connector for network cables used in wired network.

153
Q

Remote Monitoring and Management

A

A type of software designed to help managed IT service providers remotely and proactively monitor client endpoints, networks, and computers.

154
Q

Recovery Time Objective

A

The targeted duration of time and a service level within which a business process must be restored after a disaster or disruption to avoid unacceptable consequences associated with a break in business continuity.

155
Q

Software as a Service

A

A software distribution model in which applications are hosted by a third-party provider and made available to customers over the Internet.

156
Q

Storage Area Network

A

A network which provides access to consolidated, block-level data storage.

157
Q

Serial Attached SCSI

A

A point-to-point serial protocol that moves data to and from computer storage devices such as hard drives and tape drives.

158
Q

Serial Advanced Technology Attachment

A

A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.

159
Q

Subscriber Connector

A

A type of fiber optic connector with a push-pull latching mechanism that provides quick insertion and removal while also delivering excellent optical performance.

160
Q

Supervisory Control and Data Acquisition

A

A system of software and hardware elements that allows industrial organizations to control industrial processes locally or at remote locations, monitor, gather, and process real-time data.

161
Q

Secure Copy Protocol

A

A network protocol, based on BSD RCP, that supports file transfers between hosts on a network and uses SSH for data transfer and authentication to ensure security.

162
Q

Small Computer System Interface

A

A set of standards for physically connecting and transferring data between computers and peripheral devices.

163
Q

Software-defined Networking

A

An approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring.

164
Q

Secure File Transfer Protocol

A

A network protocol that provides file access, file transfer, and file management functionalities over any reliable data stream.

165
Q

Subscriber Identity Module

A

A removable smart card for mobile phones that securely stores the service-subscriber key used to identify a subscriber on mobile telephony devices.

166
Q

Single Inline Memory Module

A

A type of memory module containing random-access memory used in computers from the late 1980s to the late 1990s.

167
Q

Self-monitoring, Analysis, and Reporting Technology

A

A monitoring system included in computer HDDs, SDDs, and eMMC drives that detects and reports on various indicators of drive reliability.

168
Q

Server Message Block

A

A network file sharing protocol that allows applications on a computer to read and write to files to request services from server programs in a computer network.

169
Q

Short Message Service

A

A text messaging service component of most telephone, internet, and mobile device systems that uses standardized communication protocols to enable mobile devices to exchange short text messages.

170
Q

Simple Mail Transfer Protocol

A

The standard protocol used for sending emails across the internet.

171
Q

Simple Network Management Protocol

A

An Internet Standard protocol developed to manage nodes (servers, workstations, routers, switches, and hubs) on an IP network.

172
Q

Simple Network Time Protocol

A

A simplified version of Network Time Protocol (NTP), used for time synchronization with computer clocks over packet-switched, variable-latency data networks.

173
Q

Small Outline Dual Inline Memory Module

A

A smaller alternative to a DIMM, being roughly half the size of regular DIMMs, used in systems with limited space like laptops.

174
Q

Small Office/Home Office

A

The category of business or cottage industry that involves 1 to 10 workers, often located in private homes.

175
Q

Sender Policy Framework

A

An email authentication method designed to detect forging sender addresses during the delivery of the email.

176
Q

Structured Query Language

A

A domain-specific language used in programming and designed for managing data held in a relational database management system.

177
Q

Static Random-Access Memory

A

A type of semiconductor memory that uses bistable latching circuitry circuitry to store each bit and is used as cache memory.

178
Q

Solid-State Drive

A

A type of mass storage device similar to a hard disk drive but using flas memory to store data instead of spinning disks.

179
Q

Secure Shell

A

A cryptographic network protocol for operating network services securely over an unsecured network.

180
Q

Service Set Identifier

A

The name associated with and 802.11 wireless local area network including home networks and public hotspots.

181
Q

Secure Sockets Layer

A

The standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private.

182
Q

Single Sign-On

A

A property of access control of multiple related, yet independent, software systems whereby a user logs in once and gains access to all systems without being prompted to log in again.

183
Q

Straight Tip

A

A type of fiber optic connector known for its high-performance fiber optic interfacing.

184
Q

Shielded Twisted Pair

A

A type of twisted pair cable encased in a shield, typically metal, that protects the transmission of data from electromagnetic interference.

185
Q

Terminal Access Controller Access-Control System

A

A family of related protocols handling remote authentication and related services for networked access control through a centralized server.

186
Q

Transmission Control Protocol

A

One of the main protocols of the Internet Protocol suite, it originates and terminates connections between hosts and manages data transfer between those hosts.

187
Q

Transmission Control Protocol/Internet Protocol

A

The suite of communications protocols used to connect hosts on the Internet. TCP/IP specifies how data is exchanged over the network by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed, and received at the destination.

188
Q

Trivial File Transfer Protocol

A

A simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.

189
Q

Temporal Key Integrity Protocol

A

An encryption protocol included as part of IEEE 802.11i standard for wireless LANs that provides data encryption more secure than WEP.

190
Q

Transport Layer Security

A

A cryptographic protocol designed to provide communications security over a computer network.

191
Q

Twisted Nematic

A

A type of LCD that uses the twisted nematic effect to produce images.

192
Q

Trusted Platform Module

A

A secure crypto-processor that is designed to secure hardware through integrated cryptographic keys.

193
Q

User Account Control

A

A technology and security infrastructure introduced with Windows Vista and Windows Server 2008 operating systems, with a goal to improve the security of these systems by limiting application software to standard user privileges until an administrator authorizes an increase or elevation.

194
Q

User Datagram Protocol

A

One of the core members of the Internet protocol suite. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an IP network without requiring prior communications to set up special transmission channels or data paths.

195
Q

Unified Extensible Firmware Interface

A

A specification that defines a software interface between an operating system and platform firmware, replacing the legacy BIOS firmware interface.

196
Q

Universal Naming Convention

A

A standard for identifying servers, printers, and other resources in a network.

197
Q

Universal Plug and Play

A

A set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points, and mobile devices to seamlessly discover each other’s presences on the network and establish functional network services.

198
Q

Uninterruptible Power Supply

A

A device that provides battery backup when the electrical power fails or drops to an unacceptable voltage level, allowing for safe, orderly shutdown of equipment.

199
Q

Universal Serial Bus

A

An industry standard that establishes specifications for cables, connectors, and protocols for connection, communication, and power supply between personal computers and their peripheral devices.

200
Q

Unified Threat Management

A

A comprehensive solution that has evolved from the traditional firewall into an all-inclusive security product capable of performing multiple security functions within one single system: network firewalling, network intrusion detection and prevention, gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing, data leakage prevention, and on-appliance reporting.

201
Q

Unshielded Twisted Pair

A

A popular type of cable used in computer networking that consists of two unshielded wires twisted around each other.

202
Q

Vertical Alignment

A

A type of LCD technology that blocks light more effectively by aligning the liquid crystals in a vertical position.

203
Q

Virtual Desktop Infrastructure

A

A desktop virtualization technology that hosts a desktop operating system on a centralized server in a data center.

204
Q

Video Graphics Array

A

A graphics standard for video display controller introduced in 1987, subsequently becoming a widespread standard.

205
Q

Virtual Local Access Network

A

A group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments.

206
Q

Virtual Machine

A

A software computer that, like a physical computer, runs an operating system and applications.

207
Q

Virtual Network Computing

A

A graphical desktop-sharing system that uses the Remote Frame Buffer protocol to remotely control another computer.

208
Q

Voice over Internet Protocol

A

A methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet.

209
Q

Virtual Private Network

A

A network that extends a private network across a public network, enabling users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

210
Q

Video Random Access Memory

A

A type of RAM used to store the image data that a computer displays; it acts as a buffer between the CPU and the video card.

211
Q

Wide Area Network

A

A telecommunications network that extends over a large geographical area for the primary purpose of computer networking.

212
Q

Wired Equivalent Privacy

A

A security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.

213
Q

Wireless Internet Service Provider

A

A type of Internet service provider that allows subscribers to connect to a server at designated hot spots or access points using a wireless connection such as Wi-Fi.

214
Q

Wireless Local Area Network

A

A wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.

215
Q

Wireless Mesh Network

A

A communications network made up of radio nodes organized in a mesh topology that can relay data for the network.

216
Q

WiFi Protected Access

A

A security protocol developed by the Wi-Fi Alliance to secure wireless computer networks.

217
Q

Wireless Wide Area Network

A

A form of wireless network that covers large areas such as towns and cities, typically using cellular network technology.

218
Q

Cross-site Scripting

A

A type of security vulnerability typically found in web applications that enables attackers to inject client-side scripts into web pages viewed by other users.