terms Flashcards

(338 cards)

1
Q

10BaseT

A

Ethernet cabling system designed to run at 10 Mbps on twisted pair cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

100 BaseT

A

Ethernet cabling system designed to run at 100 Mbps on twisted pair cabling. Also called Fast Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1000 BaseT

A

Ethernet cabling system designed to run at 1000 Mbps on twister pair cabling. Also called Gigabit Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

10-Gigabit Ethernet (10GbE)

A

Ethernet standard that supports speeds of up to 10 Gbps and is common on server-to-server connections. Requires Cat 6 or better twisted pair or fiber optic cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

110 block

A

The most common connection used with structured cabling, connecting horizontal cable runs with patch panels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.5 Gbps

A

SATA drive variety with maximum throughput of 150 MBps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2.1 speaker system

A

Speaker setup consisting of two stereo speakers combined with a subwoofer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2-in-1

A

Portable devices that attempt to serve as both a laptop and a tablet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 Gbps

A

SATA drive variety with maximum throughput of 300 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3-D graphics

A

Video technology that attempts to create images with the same depth and texture as objects seen in the real world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3-D printer

A

Device that creates (or “prints”) three-dimensional objects, typically by melting material (such as plastic filament) and reassembling it in layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3G

A

Third-generation cellular data technologies (such as EV-DO, UTMS, HSPA+, and HSDPA) with real-world speeds under 10 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

40-pin ribbon cable

A

PATA cable used to attach EIDE devices (such as hard drives) or ATAPI devices (such as optical drives) to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

4G

A

The 4th generation of cellular data technologies. Most popularly implemented as Long Term Evolution (LTE), a wireless data standard with theoretical download speeds of 1 Gbps and upload speeds of 100 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

5.1 speaker system

A

Speaker setup consisting of four satellite speakers plus a center speaker and a subwoofer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5G

A

The fifth generation of cellular data technologies. Technologies in this wave are still cutting their teeth, with development just getting underway in 2019.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

g6 Gbps

A

SATA drive variety with maximum throughput of 600 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

64-bit processing

A

A type of processing that can run a compatible 64-bit operating system, such as Windows 7, 8, 8.1, or 10, and 64-bit applications. 64-bit PCs have a 64 bit wide address bus, enabling them to use more than 4 GB of RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

7.1 speaker system

A

Speaker setup consisting of six satellite speakers (two front, two side, two rear) plus a center speaker and a subwoofer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

802.11a

A

Wireless networking standard that operates in the 5-GHz band with a theoretical maximum throughput of 54 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

802.11ac

A

Wireless networking standard that operates in the 5-GHz band and uses multiple in/ multiple out (MIMO) and multi-user MIMO (MU-MIMO) to achieve a theoretical maximum throughput of 1+ Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

802.11b

A

Wireless networking standard that operates in the 2.4-GHz bandwith a theoretical maximum throughput of 11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

802.11g

A

Wireless networking standard that operates in the 2.4-GHz band
with a theoretical maximum throughput of 54 Mbps and is backward
compatible with 802.11b.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

802.11n

A

Wireless networking standard that can operate in both the 2.4-GHz
and 5-GHz bands and uses multiple in/multiple out (MIMO) to achieve a
theoretical maximum throughput of 100+ Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
AC (alternating current)
Type of electricity in which the flow of electrons | alternates direction, back and forth, in a circuit.
26
accelerated processing unit (APU)
AMD product that consolidates the | GPU and CPU into a single chip.
27
accelerometer
Feature in smartphones and tablets that rotates the screen | when the device is physically rotated.
28
access control
Security concept using physical security, authentication, | users and groups, and security policies.
29
access control list (ACL)
A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
30
account recovery
A process enabling users to regain account access, | typically by resetting a lost or forgotten password.
31
ACPI (Advanced Configuration and Power Interface)
Power management specification that far surpasses its predecessor, APM, by providing support for hot-swappable devices and better control of power modes.
32
Action Center
A one-page aggregation of event messages, warnings, and | maintenance messages in Windows 7.
33
activation (software)
``` Process of confirming that an installed copy of a Microsoft product (most commonly Windows or a Microsoft Officeapplication) is legitimate. Usually done at the end of software installation. ```
34
activation (virus)
See virus
35
active matrix
Type of liquid crystal display (LCD) that replaced the passive matrix technology used in most portable computer displays. Also called TFT (thin film transistor)
36
active partition
On a hard drive, primary partition that contains an | operating system.
37
active PFC (power factor correction)
Circuitry built into PC power | supplies to reduce harmonics.
38
actively listen
Part of respectful communication involving listening and | taking notes without interrupting.
39
activity light
An LED on a NIC, hub, or switch that blinks rapidly to show | data transfers over the network.
40
ad hoc mode
Decentralized wireless network mode, otherwise known as peer-to-peer mode, where each wireless node is in meshed contact with every other node.
41
address bus
Set of wires leading from the CPU to the memory controller chip (traditionally the northbridge) that enables the CPU to address RAM. Also used by the CPU for I/O addressing. On current CPUs with built-in memory controllers, the address bus refers to the internal electronic channel from the microprocessor to RAM, along which the addresses of memory storage locations are transmitted. Like a post office box, each memory location has a distinct number or address; the address bus provides the means by which the microprocessor can access every location in memory.
42
address space
Total amount of memory addresses that an address bus can | contain.
43
administrative shares
Administrator tool to give local admins access to | hard drives and system root folders.
44
Administrative Tools
Group of Control Panel applets, including Computer | Management, Event Viewer, Performance Monitor, and Task Scheduler.
45
administrator account
User account, created when the OS is first installed, | that is allowed complete, unfettered access to the system without restriction.
46
administrator password
Credentials for the system administrator account.
47
Administrators group
List of members with complete administrator | privileges.
48
ADSL (asymmetric digital subscriber line)
Fully digital, dedicated connection to the telephone system that provides average download speeds of 3–15 Mbps and upload speeds of 384 Kbps to 15 Mbps. Asymmetric identifies that upload and download speeds are different, with download usually being significantly faster than upload.
49
Advanced Encryption Standard (AES)
A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.
50
Advanced Host Controller Interface (AHCI)
An efficient way for motherboards to work with SATA host bus adapters. Using AHCI unlocks some of the advanced features of SATA, such as hot-swapping and native command queuing (NCQ).
51
Advanced Startup Options menu
Windows 7 menu that can be reached during the boot process that offers advanced OS startup options, such as to boot to Safe Mode or boot into Last Known Good Configuration
52
adware
Type of malicious program that downloads ads to a user’s | computer, generating undesirable network traffic.
53
Aero
The Windows 7 desktop environment. Often used as a shorthand for one of its more obvious aesthetic effects: a window transparency feature called Aero Glass.
54
AGP (Accelerated Graphics Port)
A 32/64-bit expansion slot designed by Intel specifically for video that ran at 66 MHz and yielded a throughput of at least 254 Mbps. Later versions (2×, 4×, 8×) gave substantially higher throughput.
55
air filter mask
A mask designed to keep users from inhaling particulate | matter, as when cutting drywall.
56
airplane mode
Mode for mobile devices that disables all wireless and | cellular communication for use on airplanes.
57
algorithm
Set of rules for solving a problem in a given number of steps.
58
ALU (arithmetic logic unit)
CPU logic circuits that perform basic | arithmetic (add, subtract, multiply, and divide)
59
AMD (Advanced Micro Devices)
CPU and chipset manufacturer that competes with Intel. Produces FX, A-Series, Ryzen, and Opteron CPUs and APUs. Also produces video card processors under its ATI brand.
60
amperage
See current.
61
amperes (amps or A)
Unit of measure for amperage, or electrical current.
62
analog
Device that uses a physical quantity, such as length or voltage, to represent the value of a number. By contrast, digital storage relies on a coding system of numeric units.
63
AnandTech (anandtech.com)
Computer hardware, technology, and | Internet news and information site.
64
Android
Smartphone and tablet OS created by Google.
65
Android application package (APK)
Installation software for Android | apps.
66
ANSI/TIA
The Telecommunication Industry Association (TIA) establishes the UTP categories under the ANSI/TIA 568 specification. The American National Standards Institute (ANSI) accredits TIA standards to ensure compatibility of industry and international standards. See also UTP.
67
anti-aliasing
In computer imaging, blending effect that smooths sharp contrasts between two regions—e.g., jagged lines or different colors. Reduces jagged edges of text or objects. In voice signal processing, process of removing or smoothing out spurious frequencies from waveforms produced by converting digital signals back to analog.
68
anti-malware program
Software designed to identify and block or remove malware. Typically powered by frequently updated definition files containing the signatures of known malware.
69
antistatic bag
Bag made of antistatic plastic into which electronics are placed for temporary or long-term storage. Used to protect components from electrostatic discharge.
70
antistatic mat
Special surface on which to lay electronics. These mats come with a grounding connection designed to equalize electrical potential between a workbench and one or more electronic devices. Used to prevent electrostatic discharge.
71
antistatic wrist strap
Special device worn around the wrist with a grounding connection designed to equalize electrical potential between a technician and an electronic device. Used to prevent electrostatic discharge.
72
antivirus program
Software designed to combat viruses by either seeking | out and destroying them or passively guarding against them.
73
AOL
You’ve got mail!
74
API (application programming interface)
A library of related commands available for programmers to use. OpenGL and DirectX, for example, are two well-known 3-D graphics APIs that make it easier to build 3-D games.
75
APIPA (Automatic Private IP Addressing)
Feature of Windows that automatically assigns an IP address to the system when the client cannot obtain an IP address automatically.
76
APM (Advanced Power Management)
``` BIOS routines (developed by Intel in 1992 and upgraded over time) that enable the CPU to turn on and off selected peripherals. In 1996, APM was supplanted by Advanced Configuration and Power Interface (ACPI). ```
77
app
A program for a tablet or smartphone. Also, a program written for the Windows 8 Metro interface.
78
App history
Tab added to Task Manager in Windows 8 to collect stats such | as CPU time and network usage on programs that have run recently.
79
app scanner
Program that scans apps installed on a device to highlight risks posed by apps and what actions they have permission to take.
80
App Store
Apple’s mobile software storefront, where you can purchase | apps for your smartphone, tablet, or other Apple products.
81
Apple Filing Protocol (AFP)
Enables sharing between Macs. Also used by macOS Time Machine for backing up macOS over the network. Uses TCP port 548.
82
Apple Pay
Apple’s technology and service for making secure credit card | payments in stores and apps via the iPhone and Apple Watch.
83
applet
Generic term for a program in the Windows Control Panel.
84
application
A program that enables you to perform a specific task on a | computer, such as write a document or play a game.
85
application manager
Mobile device interface for removing and managing | apps running on the device.
86
application programming interface
See API.
87
Applications
Tab in Task Manager that lists running applications.
88
Apps & Features
Area of the Windows 10 Settings app that enables users | to add and remove programs and Windows features.
89
apt-get
Linux command for installing or updating a program using the | advanced packaging tool.
90
augmented reality (AR)
Using some form of hardware (such as a smartphone or an AR headset) to enhance the wearer’s experience of the world by adding an interface layer. The interface layer presents information such as the time or navigation instructions and may also support interaction
91
AR headset
A non-immersive headset (such as a set of glasses) that places an interface between the wearer and the world. See also augmented reality.
92
ARM
Energy-efficient processor design frequently used in mobile devices.
93
ARP (Address Resolution Protocol)
Protocol in the TCP/IP suite used with the command-line utility of the same name (arp) to determine the MAC address that corresponds to a particular IP address.
94
Ars Technica (arstechnica.com)
Internet technology news site.
95
ASCII (American Standard Code for Information | Interchange)
Industry-standard 8-bit characters used to define text characters, consisting of 96 upper- and lowercase letters, plus 32 nonprinting control characters, each of which is numbered. These numbers were designed to achieve uniformity among computer devices for printing and the exchange of simple text documents.
96
aspect ratio
Ratio of width to height of a display. Wide-screen displays such as modern TVs, desktop computer monitors, portable computer displays, and even smartphones commonly use 16:9 or 16:10, but you can find devices with many other aspect ratios.
97
assertive communication
Means of communication that is not pushy or bossy but is also not soft. Useful in dealing with upset customers as it both defuses their anger and gives them confidence that you know what you’re doing.
98
asset tag
Inventory tracking tags (which may be simple barcodes or use wireless networking protocols such as RFID) that help an organization track items such as equipment.
99
AT (Advanced Technology)
Model name of the second-generation, 80286-based IBM computer. Many aspects of the AT, such as the BIOS, CMOS, and expansion bus, became de facto standards in the PC industry. Though now obsolete, this physical organization of the components on the motherboard is called the AT form factor.
100
ATA (AT Attachment)
A series of hard drive standards defining both the older parallel ATA (PATA) and modern serial ATA (SATA) drives. See also PATA and SATA.
101
ATAPI (ATA Packet Interface)
Series of standards that enables mass storage devices other than hard drives to use the IDE/ATA controllers. Popular with optical drives. See also EIDE
102
attack vector
The route or methods used by a given attack (including | malware).
103
attributes
Values in a file that determine the hidden, read-only, system, and archive status of the file.
104
ATX (Advanced Technology Extended)
Popular motherboard form factor | that generally replaced the AT form factor.
105
audio editing workstation
A computer workstation for editing audio needs a fast multicore CPU, lots of RAM, and a large monitor. It also needs large, fast hard drives and a high-quality audio interface, and may make use of specialized input devices for mixing audio.
106
audio interface
High-end external sound device used by audio engineers | and recording artists.
107
audio jack
Very popular connector used to transmit two audio signals; perfect for stereo sound. Confusingly, you can find the diameter described as both 1/8 inch and 3.5 mm.
108
augmented reality
See AR
109
AUP (Acceptable Use Policy)
Defines what actions employees may or may not perform on company equipment, including computers, phones, printers,and even the network itself. This policy defines the handling of passwords, email, and many other issues
110
authentication
The process of identifying and granting access to some user | trying to access a system.
111
authentication factor
A thing that can be used to identify an individual, such as something they know (password), something they have (smartcard), or something they are (fingerprint).
112
authorization
The process that defines what resources an authenticated user may access and what he or she may do with those resources.
113
auto-brightness
Feature on modern mobile devices that attempts to use a camera or other light sensor to adjust screen brightness based on how light or dark it is.
114
autodetection
Process through which new disks are automatically | recognized by the BIOS.
115
automatic document feeder (ADF)
``` A tray (usually on top) of a scanner or multifunction device that holds a document and enables the device to grab and scan each page automatically for easier scanning, copying, or faxing of long documents. ```
116
AutoPlay
A Windows feature that opens a dialog box when removable media is inserted into the computer, providing options based on what Windows finds on the drive, including starting the Autorun application.
117
Autorun
A feature that enables Windows to look for and read a file called autorun.inf immediately after a removable media device (optical disc or thumb drive) is inserted and automatically run whatever program the file lists.
118
autorun.inf
File included on some media. Lists which program or | installation routine Autorun should run.
119
backlight
A component used in LCDs to illuminate an image. In older | LCDs this was a CCFL; current LCDs use LEDs. See also CCFL, direct LED backlighting, and edge LED backlighting
120
backout plan
In case a change doesn’t go as planned, a set of steps necessary to undo the change and restore the infrastructure to its previous state.
121
backside bus
On older CPUs, a set of wires that connected the CPU to Level 2 cache. First appeared in the Intel Pentium Pro. See also frontside bus and external data bus
122
Backup and Restore
Windows 7’s backup utility. It offers two options: create a backup or restore from a backup. Windows 10 still supports restoring these backups, which it calls Backup and Restore (Windows 7). See also File History.
123
backup testing
The process of ensuring that file or system backups have | produced backups from which you can restore usable systems and files.
124
bandwidth
The capacity of a network to transmit a given amount of data | during a given period.
125
bank
Total number of DIMMs that can be accessed simultaneously by the chipset. The “width” of the external data bus divided by the “width” of the DIMM sticks. Specific DIMM slots must be populated to activate dual-, triple-, or quad-channel memory.
126
barcode
A scannable, read-only binary code often used to mark items for inventory tracking.
127
bash
Default command shell on macOS and most Linux distributions. See shell.
128
basic disk
Hard drive partitioned in the “classic” way with a master boot record (MBR) and partition table. See also dynamic disks.
129
battery charger
Plugs into a power source and directly charges a device battery. Most convenient with a spare battery, since it requires removing the battery to charge it
130
baud
One analog cycle on a telephone line. In the early days of telephone data transmission, the baud rate was often analogous to bits per second. Due to advanced modulation of baud cycles as well as data compression, this is no longer true.
131
bcdedit
Command-line tool that enables you to view the BCD store, which lists the Windows boot options.
132
BD-R (Blu-ray Disc-Recordable)
Blu-ray Disc format that enables writing | data to blank discs.
133
BD-RE (Blu-ray Disc-REwritable)
Blu-ray Disc equivalent of the rewritable DVD, allows writing and rewriting several times on the same BD. See Blu-ray Disc.
134
BD-ROM (Blu-ray Disc-Read Only Media)
Blu-ray Disc equivalent of a | DVD-ROM or CD-ROM. See Blu-ray Disc.
135
beep codes
Series of audible tones produced by a motherboard during the POST. These tones identify whether the POST has completed successfully or whether some piece of system hardware is not working properly. Consult the manual for your particular motherboard for a specific list of beep codes.
136
binary numbers
Number system with a base of 2, unlike the number systems most of us use that have bases of 10 (decimal numbers), 12 (measurement in feet and inches), and 60 (time). Binary numbers are preferred for computers for precision and economy. An electronic circuit that can detect the difference between two states (on–off, 0–1) is easier and more inexpensive to build than one that could detect the differences among ten states (0–9).
137
biometric authentication
Authentication process using biometric data such | as voice, fingerprints, or retinal scans.
138
biometric device
Hardware device used to support authentication; works by scanning and remembering a unique aspect of a user’s various body parts (e.g., retina, iris, face, or fingerprint) by using some form of sensing device such as a retinal scanner.
139
BIOS (basic input/output services) (basic input/output | system)
Classically, software routines burned onto the system ROM of a PC. More commonly seen as firmware that directly controls a particular piece of hardware. This firmware handles startup operations and low-level control of hardware such as disk drives, the keyboard, and monitor.
140
bit
Single binary digit. Also, any device that can be in an on or off state.
141
bit depth
Indicates the number of signal characteristics a device can capture or produce, or the number recorded in a file. Greater bit depths mean more characteristics can be captured, stored, and reproduced. Often used to describe the quality of audio or video signals.
142
BitLocker Drive Encryption
Drive encryption software offered in highend versions of Windows. BitLocker requires a special chip to validate hardware status and to ensure that the computer hasn’t been hacked
143
BitTorrent
Peer-to-peer file-sharing program.
144
Bluetooth
Wireless technology designed to create small wireless networks preconfigured to do specific jobs, but not meant to replace full-function networks or Wi-Fi.
145
Blu-ray Disc (BD)
Optical disc format that stores up to 100 GB of data, | designed as a replacement media for DVD. Competed with HD DVD.
146
BNC
Uncommon coax connector secured with a quarter twist
147
boot
To initiate an automatic routine that clears the memory, loads the operating system, and prepares the computer for use. Term is derived from “pull yourself up by your bootstraps.” Necessary because RAM doesn’t retain program instructions when power is turned off.
148
Boot Camp
Apple tool used to install and boot to versions of Windows on a macOS computer.
149
Boot Configuration Data (BCD) file
File that contains information about | the various operating systems installed on the system as well as instructionsfor how to actually load (bootstrap) them.
150
boot method
Media a computer uses to initiate the booting process. Includes optical media, removable drives, or a networked location. For the related CMOS setting, see boot sequence
151
boot options
Settings in the system setup program that define which devices the system will attempt to boot from (and in what order).
152
boot sector
First sector on a storage drive. The boot-up software in ROM tells the computer to load whatever program is found there. If a system disk is read, the program in the boot record directs the computer to the root directory to load the operating system.
153
boot sequence
List containing information telling the bootstrap loader in which order to check the available storage devices for an OS. Configurable in CMOS setup.
154
bootable disk
Any storage device with a self-starting operating system.
155
bootmgr
Windows Boot Manager. Manages the boot process using | information from the Boot Configuration Data (BCD) file.
156
bootrec
A Windows Recovery Environment troubleshooting and repair tool that repairs the master boot record, boot sector, or BCD store. It replaces the fixboot and fixmbr Recovery Console commands used in Windows XP and earlier operating systems.
157
bootstrap loader
Segment of code in a system’s BIOS that scans for an operating system, looks specifically for a valid boot sector, and, when one is found, hands control over to the boot sector; then the bootstrap loader removes itself from memory.
158
botnet
Network of computers infected with malware that can be controlled to do the bidding of the malware developers, or anyone who pays them. A common use is carrying out distributed denial of service (DDoS) attacks.
159
bridge
A device that connects dissimilar network technologies that transmit the same signal.
160
brightness control
Mobile device feature controlling screen brightness. Can | be set to automatically adjust to ambient light or be manually changed.
161
broadband
Commonly understood as a reference to high-speed, always-on communication links that can move large files much more quickly than a regular phone line.
162
broadcast
A network transmission addressed for every node on the | network.
163
broadcast domain
Group of computers connected by one or more switches––that is, a group of computers that receive broadcast frames from each other.
164
browser
Program specifically designed to retrieve, interpret, and display Web pages.
165
brute force
Simple attack that attempts to guess credentials or identify | vulnerabilities by trying many possibilities.
166
BSoD (Blue Screen of Death)
Infamous error screen that appears when | Windows encounters an unrecoverable error.
167
buffered/registered RAM
Usually seen in motherboards supporting more than four sticks of RAM; used to address interference issues caused by the additional sticks. It accomplishes this with a small register installed on some memory modules to act as a buffer between the DIMM and the memory controller.
168
bug
Programming error that causes a program or a computer system to perform erratically, produce incorrect results, or crash. The term was coined when a real bug was found in one of the circuits of one of the first ENIAC computers.
169
burn
Process of writing data to a writable optical disc, such as a DVD-R.
170
burn-in failure
Critical failure usually associated with manufacturing defects.
171
bus
Series of wires connecting two or more separate electronic devices, enabling those devices to communicate. Also, a network topology where computers all connect to a main line called a bus cable.
172
BYOD (bring your own device)
An arrangement in some companies’ IT departments where employees are permitted to use their own phones or other mobile devices instead of company-issued ones. Also, a feature of some wireless carriers where you can buy an unsubsidized device and use it to get cheaper wireless rates.
173
byte
Unit of 8 bits; fundamental data unit of personal computers. Storing the equivalent of one character, the byte is also the basic unit of measurement for computer storage.
174
cable Internet
Fast Internet connection from a cable TV provider via RG-6 | or RG-59 cable and a cable modem.
175
cable lock
Simple anti-theft device for securing a laptop to a nearby object.
176
cable tester
Device for verifying that the connectors and wires in a cable (such as UTP) are in good order.
177
cache (disk)
Special area of RAM that stores the data most frequently accessed from the hard drive. Cache memory can optimize the use of your systems
178
cache (L1, L2, L3, etc.)
Special section of fast memory, usually built into the CPU, used by the onboard logic to store information most frequently accessed by the CPU.
179
CAD/CAM design workstation
See graphics workstation.
180
calibration
Process of matching the print output of a printer to the visual output of a monitor.
181
camcorder
Portable device for recording audio and video. While camcorders originally recorded to tape (first analog, and later digital), mostmodern digital camcorders record to flash media.
182
camera
Device that captures visible light to preserve images in analog (film) or digital format. See digital camera.
183
CAPTCHA (Completely Automated Public Turing Test to tell | Computers and Humans Apart)
Authentication challenge using images, videos, sounds, or other media to be identified by a user. Computers have a much more difficult time discerning the content of these tests than humans, making the challenge useful in determining if a human or a computer is attempting access.
184
card reader
Device with which you can read data from one of several types of flash memory.
185
Cat 5
Category 5 wire; an ANSI/TIA standard for UTP wiring that can operate at up to 100 Mbps
186
Cat 5e
Category 5e wire; ANSI/TIA standard for UTP wiring that can | operate at up to 1 Gbps.
187
Cat 6
Category 6 wire; ANSI/TIA standard for UTP wiring that can operate at up to 10 Gbps.
188
Cat 6a
Category 6a wire; augmented Cat 6 UTP wiring that supports 10- Gbps networks at the full 100-meter distance between a node and a switch.
189
Cat 7
Supports 10-Gbps networks at 100-meter segments; shielding for individual wire pairs reduces crosstalk and noise problems. Cat 7 is not an ANSI/TIA standard.
190
IaaS (Infrastructure as a Service)
Cloud-hosted provider of virtualized | servers and networks. Cloud-based services, pay-as-you-go for services such as storage, networking, and virtualization.
191
PaaS (Platform as a Service)
Cloud-based virtual server(s) combined with a platform that gives programmers tools needed to deploy, administer, and maintain a Web application. Hardware and software tools available over the internet
192
SaaS (Software as a Service)
Cloud-based service to store, distribute, and update programs and applications. The SaaS model provides access to necessary applications wherever you have an Internet connection, often without having to carry data with you or regularly update software. At the enterprise level, the subscription model of many SaaS providers makes it easier to budget and keep hundreds or thousands of computers up to date. Software that’s available via a third-party over the internet.
193
On-premise
software that’s installed in the same building as your business.
194
malware recovery tips
1. Identify and research malware symptoms. 2. Quarantine the infected systems. 3. Disable System Restore (in Windows). 4. Remediate the infected systems. A. Update the anti-malware software. B. Scan and use removal techniques (Safe Mode, Preinstallation Environment). 5. Schedule scans and run updates. 6. Enable System Restore and create a restore point (in Windows). 7. Educate the end user.
195
catastrophic failure
A failure in which a component or whole system will not boot; usually related to a manufacturing defect of a component. Could also be caused by overheating and physical damage to computer components.
196
CCFL (cold cathode fluorescent lamp)
Light technology used in older LCDs and flatbed scanners. CCFLs use relatively little power for the amount of light they provide
197
cd
Command-line utility for changing the focus of the command prompt from one directory to another. Shorthand for “change directory.”
198
CD (compact disc)
Originally designed as the replacement for vinyl records, but (along with other optical media) is also useful for long-term storage of music and data.
199
CD quality
Audio quality that has a sample rate of 44.4 KHz and a bit rate of 128 bits.
200
CDDA (CD-Digital Audio)
Special format used for early CD-ROMs and all audio CDs; divides data into variable-length tracks. A good format to use for audio tracks but terrible for data because of lack of error checking.
201
CDFS (Compact Disc File System)
Generic name for ISO-9660. File structure, rules, and conventions used when organizing and storing files and data on a CD.
202
CD-R (CD-recordable)
CD technology that accepts a single “burn” but | cannot be erased after that one burn.
203
CD-ROM (compact disc/read-only memory)
Read-only compact storage disc for audio or video data. CD-ROMs are read by using CD-ROM drives and optical drives with backward compatibility, such as DVD and Blu-ray Disc drives.
204
CD-RW (CD-rewritable)
CD technology that accepts multiple reads/writes | like a hard drive.
205
Celeron
Lower-cost brand of Intel CPUs
206
cell tower analyzer
Program, app, or device to scan and analyze the properties of nearby cellular signals. Can be used to diagnose signal quality issues or identify security threats such as tower spoofing.
207
cellular card
``` A cellular modem on an expansion card designed for older laptop expansion slots. Current add-on cellular modems are typically attached via USB (and called USB modems by cellular service providers) ```
208
cellular wireless networks
Networks that enable cell phones, smartphones, | and other mobile devices to connect to the Internet.
209
certificate authority (CA)
Trusted entity that signs digital certificates to guarantee that the certificate was signed by the Web site in question (and not forged).
210
certification
License that demonstrates competency in some specialized | skill.
211
Certified Cisco Network Associate (CCNA)
One of the certifications | demonstrating a knowledge of Cisco networking products.
212
CFS (Central File System)
Method to unify all storage devices within a network or organization to facilitate a single management point and to provide user access to any file or data within the organization.
213
chain of custody
A documented history of who has been in possession of a | system.
214
change
Modify configuration or status of a system, such as updating an NTFS permission or modifying a password.
215
change board
A group of representatives from around the organization who | review and approve change proposals.
216
change documentation
Collected documentation for all aspects of a change process, including plans leading up to the change as well as receipts, overtime documents, an inventory of changed systems, a list of created users, and signed end-user acceptance forms.
217
change management
A well-defined process composed of many planning and execution steps that enables organizations to change their IT infrastructure in a safe, cost-effective manner.
218
channel
Used in a common method for numbering boot devices; the first boot device is channel 1, the second is channel 2, and so on.
219
charms
In Windows 8 and 8.1, tools located in the hidden Charms bar, such as a search function, a sharing tool, a settings tool, and more.
220
Charms bar
The location in Windows 8 and 8.1 of the charms tools. | Accessed by moving the cursor to the upper-right corner of the screen.
221
chassis intrusion detection
Feature offered in some chassis that trips a | switch when the chassis is opened.
222
checkpoint
Also known as a snapshot. Saves changes to a virtual machine’s state. Checkpoints are great for performing maintenance with a safety net, but they aren’t a complete backup, and many snapshots can slow a VM down. Get rid of them when the danger has passed.
223
checksum
Value generated from some data, like a file, and saved for comparing to other checksums later. Can be used to identify identical data, such as files on a user’s system that match known viruses. Checksums can also be used to monitor whether a program is changing itself over time, which is a strong warning sign that it may be malware that evolves to avoid detection
224
chipset
Electronic chips, specially designed to work together, that handle all of the low-level functions of a PC. In the original PC, the chipset consisted of close to 30 different chips. For most of the 1990s and 2000s, chipsets usually consisted of one, two, or three separate chips embedded into a motherboard. Today’s CPUs have controllers built in, such as the memory and display controllers. Almost all chipsets are now a single chip.
225
chkdsk (checkdisk)
Hard drive error detection and, to a certain extent, correction utility in Windows, launched from the command-line interface. Originally a DOS command (chkdsk.exe); also the executable for the graphical Error checking tool.
226
chmod
Linux command used to change permissions.
227
chown
Linux command used to change the owner and the group to which a file or folder is associated.
228
Chrome OS
Google’s Linux-based operating system designed to connect users via the Internet into Google applications, such as Gmail, Google Docs, and more. Chrome OS comes preinstalled on purpose-built hardware such as the Chromebook portable computers.
229
Chromebook
Strictly, any portable computer running Google’s Chrome OS. Chromebooks offer an experience focused on Web applications by making use of virtually unlimited data storage in the cloud and software as a service (SaaS) applications available over the Web. Because they offload so much work, Chromebooks have a reputation for being cheap and light, but premium Chromebooks are increasingly common.
230
CIFS (Common Internet File System)
A dialect of the Server Message | Block (SMB) protocol. Currently deprecated but still widely supported.
231
Classless Inter-Domain Routing (CIDR)
``` Current system for creating and notating IPv4 subnets; replaced the older, less flexible three-class system. ```
232
clean installation
Installing an operating system on a fresh drive, following a reformat of that drive. Often it’s the only way to correct a problem with a system when many of the crucial operating system files have become corrupted
233
client
Computer program that uses the services of another computer program. Also, software that extracts information from a server; your autodial phone is a client, and the phone company is its server. Also, a machine that accesses shared resources on a server.
234
client/server
Relationship in which client software obtains services from a server on behalf of a person.
235
client-side virtualization
Using a hypervisor installed on a client machine to run a virtual machine. The VM may be created and stored on the client machine or accessed over the network.
236
clock cycle
Single charge to the clock wire (CLK) of a CPU, informing the CPU that another piece of information is waiting to be processed.
237
clock speed
The maximum number of clock cycles that a CPU can handle in a given period of time, measured in MHz or GHz. In modern CPUs, the internal speed is a multiple of the external speed. See also clock-multiplying CPU.
238
clock wire (CLK)
A special wire that, when charged, tells the CPU that | another piece of information is waiting to be processed.
239
clock-multiplying CPU
CPU that takes the incoming clock signal and | multiples it inside the CPU to let the internal circuitry of the CPU run faster.
240
closed source
Describes a product for which the plans, schematics, recipes, or other information used to create it are solely controlled by its creator or distributor. Most commonly applied to software.
241
closed source software
Software for which the source code is kept secret.
242
cloud computing
A model for enabling and accessing computing storage and other shared (or not shared) resources on-demand. The “cloud” is based on servicing models that include IaaS, PaaS, and SaaS, or hybrid mixtures of these services.
243
cloud file storage services
Internet-based shared file storage spaces that enable users to save, edit, share, and collaborate on stored files, as well as synchronize files among multiple devices and users.
244
CLRTC
See CMOS clear
245
cluster
To overcome some limitations in addressing inherent in each file system, Windows file systems organize data into groups called clusters. Cluster size varies by file system and partition size.
246
CMOS (complementary metal-oxide semiconductor)
Originally, computer systems had a standalone CMOS chip—a tiny bit RAM hooked up to a small battery that enabled it to hold system settings for the BIOS firmware even with the computer off. This has long since been incorporated into the chipset. CMOS is often informally used to refer to the CMOS setup program or system setup utility
247
CMOS battery
A coin cell lithium-ion battery that maintains power to the CMOS memory chip when the computer is otherwise unpowered. The usual battery size is CR2032.
248
CMOS clear
A jumper setting or button on the motherboard that, when set, will revert CMOS settings to the factory defaults.
249
CMOS setup program
Program enabling you to access and update CMOS data. Also referred to as the system setup utility, BIOS setup utility, UEFI/BIOS setup, and similar names.
250
CNR (communications and networking riser)
Proprietary slot used on some motherboards to provide a connection for modems, sound cards, and NICs that is free from sound interference.
251
coaxial cable
Cabling in which an internal conductor is surrounded by | another, outer conductor, thus sharing the same axis.
252
code
Set of symbols representing characters (e.g., ASCII code) or instructions in a computer program (a programmer writes source code, which must be translated into executable or machine code for the computer to use).
253
code names
Names that keep track of different variations within CPU | models.
254
codec (compressor/decompressor)
Software that compresses or | decompresses media streams.
255
color depth (display)
The number of bits (the bit depth) necessary to represent the number of colors in a graphics mode. Common color bit depths are 16-bit and 32-bit, representing 65,536 colors and 16.7 million colors (plus an 8-bit alpha channel for transparency levels), respectively.
256
color depth (scanner)
Term to define a scanner’s ability to produce color, | hue, and shade.
257
color space
The portion of all possible colors that a device (such as an LCD display or camera) is able to display or save.
258
COM port(s)
Serial communications ports once common on computers. COMx is used to designate a uniquely numbered COM port such as COM1, COM2, etc.
259
command
A request, typed from a terminal or embedded in a file, to | perform an operation or to execute a particular program.
260
command mode
One of two modes (along with insert mode) used in vi. | Enables inputting commands such as copy or paste. See vi.
261
command prompt
Text prompt for entering commands
262
command-line interface (CLI)
Text user interface. Users input text commands and receive text output. CLI commands, which are more flexible and often faster (or use fewer resources) than a graphical equivalent, are also easy to compose into scripts for performing frequent tasks.
263
comment
Annotation text included in scripts, programs, and configuration files, which may be used to describe what the code or setting does and how or why it does it. Most scripting, programming, and configuration languages specify how to mark comment text.
264
community cloud
Cloud network that serves a community or group with | shared needs and interests, such as hospitals or defense contractors.
265
CompactFlash (CF)
The oldest, most complex, and physically largest of all | removable flash media cards.
266
compatibility modes
Feature of Windows to enable software written for | previous versions of Windows to operate in newer operating systems.
267
compliance
Concept that members of an organization must abide by the rules created by and applying to that organization (including government regulations). For a technician, this often defines what software can or cannot be installed on an organization’s computers.
268
component failure
Occurs when a system device fails due to a | manufacturing or some other type of defect.
269
Component Services
Programming tools in Windows for the sharing of | data objects between programs.
270
compression
Process of squeezing data to eliminate redundancies, allowing files to use less space when stored or transmitted.
271
computer
An electronic device that can perform calculations.
272
Computer
Commonly used interface for Windows Explorer that displays | hard drives and devices with removable storage.
273
Computer Management
Applet in Windows’ Administrative Tools that | contains several useful snap-ins, such as Device Manager and Disk Management.
274
computing process
Four parts of a computer’s operation: input, processing, | output, and storage.
275
conditionals
Functions that enable a script or program to perform different actions under different conditions. For example, a backup script might “run” every hour, but only create a new backup if the system is idle and if it has been at least a day since the last backup was created.
276
connector
Small receptacle used to attach a cable to a device or system. Common types of connector include USB, PS/2, RJ-45, VGA, HDMI, DVI, HD15, DisplayPort, and Thunderbolt.
277
consumables
Materials used up by printers, including paper, ink, ribbons, and toner cartridges.
278
container file
File containing two or more separate, compressed tracks, typically an audio track and a moving-picture track. Also known as a wrapper.
279
content filtering
Gating access to insecure or objectionable sites using | certificates or parental control tools.
280
context menu
Small menu brought up by right-clicking on objects in | Windows.
281
contrast ratio
Difference in intensity between the lightest and the darkest spot that a device can display (in the case of a monitor) or capture (in the case of a camera or scanner).
282
control construct
Loops and conditional statements (such as the “if” statement) are examples of control constructs, which enable programmers to control the conditions under which certain sections of code will run.
283
Control Panel
Collection of Windows applets, or small programs, that can | be used to configure various pieces of hardware and software in a system.
284
controller card
Card adapter that connects devices, such as a drive, to the | main computer bus/motherboard.
285
convertible
A subset of 2-in-1 portables that use a hinge or latch | mechanism to convert between laptop and tablet modes.
286
copy command
Command-line tool used to make a copy of a file and paste | it in another location.
287
Core
Name used for the family of Intel CPUs that succeeded the Pentium 4, such as the Core i3, Core i5, and Core i7.
288
counter
Used to track data about a particular object when using | Performance Monitor.
289
cp
Copy command in Linux.
290
CPU (central processing unit)
“Brain” of the computer. Microprocessor that handles primary calculations for the computer. CPUs are known by names such as Core i7 and Opteron.
291
CRC (cyclic redundancy check)
Very accurate mathematical method used to check for errors in long streams of transmitted data. Before data is sent, the main computer uses the data to calculate a CRC value from the data’s contents. If the receiver calculates from the received data a different CRC value, the data was corrupted during transmission and is re-sent. Ethernet packets use the CRC algorithm in the FCS portion of the frame.
292
Credential Manager
A Windows Control Panel applet which manages | saved logon information for Web sites, applications, and networks.
293
credit card reader
Device that can be attached to mobile phones and | tablets to take credit card payments.
294
crimper
A specialized tool for connecting twisted pair wires to an RJ-45 connector. Also called a crimping tool.
295
cron
Tool used by many Linux distributions for automatically running tasks based on a schedule.
296
crossover cable
A standard UTP cable with one RJ-45 connector using the T568A standard and the other using the T568B standard. This reverses the signal between sending and receiving wires and thus simulates the connection to a switch.
297
CRT (cathode ray tube)
Tube of a monitor in which rays of electrons are beamed onto a phosphorescent screen to produce images. Also, a shorthand way to describe a monitor that uses CRT rather than LCD technology.
298
CSMA/CA (carrier sense multiple access/collision | avoidance)
Networking scheme used by wireless devices to transmit data while avoiding data collisions, which wireless nodes have difficulty detecting.
299
CSMA/CD (carrier sense multiple access/collision detection)
Networking scheme used by Ethernet devices to transmit data and resend data after detection of data collisions.
300
current
Amount of electrons moving past a certain point on a wire, | measured in units called amperes. Also called amperage.
301
DAC (discretionary access control)
Authorization method based on the idea that there is an owner of a resource who may at his or her discretion assign access to that resource. DAC is considered much more flexible than mandatory access control (MAC).
302
data classification
System of organizing data according to its sensitivity. | Common classifications include public, highly confidential, and top secret.
303
Data Collector Sets
Windows log repository that accepts log entries from | other Windows computers.
304
data roaming
A feature of cellular data systems that enables the signal to jump from cell tower to cell tower and from your provider to another provider without obvious notice.
305
data storage
Saving a permanent copy of your work so that you can come | back to it later.
306
data structure
Scheme that directs how an OS stores and retrieves data on and off a drive. Used interchangeably with the term file system. See also file system.
307
data usage limit
Restrictions on how much data a user may consume. Once the user exceeds the limit, data may be blocked entirely or bandwidth may be throttled.
308
DB connectors
D-shaped connectors once used for a variety of connections in the PC and networking world. Can be male (with prongs) or female (with holes) and have a varying number of pins or sockets. Also called D-sub, D-subminiature, or D-shell connectors. They are still reasonably common, but rarely used.
309
DB-9
A two-row DB connector (male) used to connect the computer’s serial port to a serial-communication device such as a modem or a console port on a managed switch.
310
DC (direct current)
Type of electricity in which the flow of electrons is in | a complete circle in one direction.
311
dd
Linux command for copying entire block volumes.
312
DDOS (distributed denial of service)
An attack on a computer or network device in which multiple computers send data and requests to the device in an attempt to overwhelm it so that it cannot perform normal operations.
313
DDR SDRAM (double data rate SDRAM)
Type of DRAM that makes | two processes for every clock cycle. See also DRAM. 184 pins.
314
DDR2 SDRAM
Type of SDRAM that sends 4 bits of data in every clock | cycle. 240 pins
315
DDR3 SDRAM
Type of SDRAM that transfers data at twice the rate ofDDR2 SDRAM. 240 pins
316
DDR3L
Low-voltage version of DDR3. Provides cost savings in large | deployments, such as a data center.
317
DDR3U
Ultra-low-voltage version of DDR3.
318
DDR4 SDRAM
Type of SDRAM that offers higher density and lower voltages than DDR3, and can handle faster data transfer rates. Maximum theoretical capacity of DDR4 DIMMs is up to 512 GB. 288 pins
319
DE (desktop environment)
Name for the various user interfaces found in | Linux distributions.
320
debug
To detect, trace, and eliminate errors in computer programs
321
decibel
Unit of measurement typically associated with sound. The higher the number of decibels, the louder the sound.
322
decrypt
To pass decryption keys and encrypted data through the appropriate decryption algorithm in order to retrieve the original unencrypted data. See encryption.
323
dedicated server
Machine that is not used for any client functions, only | server functions.
324
default gateway
In a TCP/IP network, the nearest router to a particular host. This router’s IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.
325
default user accounts/groups
Users or groups that are enabled by default. | Some, such as the guest account, represent a security risk.
326
definition file
Files that enable anti-malware programs to identify viruses on your system and clean them. These files should be updated often. Also called signature files.
327
defragmentation (defrag)
Procedure in which all the files on a hard disk drive are rewritten on disk so that all parts of each file reside in contiguous clusters. The result is an improvement in disk speed during retrieval operations.
328
degaussing
Data destruction procedure used to reduce or remove the | electromagnetic fields that store data on magnetic hard drives
329
del (erase)
Command-line tool used to delete/erase files
330
Desktop
User’s primary interface to the Windows operating system.
331
destination port
In port triggering, the port that the router opens to receive a response after the router sends outbound traffic on the trigger port. See trigger port.
332
Details
Tab added to Task Manager in Windows 8 to collect much of the detail from the older Processes tab, including executable names, PIDs, status, executing user, a description, and present resource use. Many more columns can be enabled as well.
333
device charger
Plugs into a power source and charges a device through one of its ports, such as USB or Lightning. Convenient for charging while the device stays on.
334
device driver
Program used by the operating system to control | communications between the computer and peripherals.
335
Device Manager
Utility that enables techs to examine and configure all the | hardware and drivers in a Windows PC.
336
DFS (distributed file system)
A storage environment where shared files are | accessed from storage devices within multiple servers, clients, and peer hosts.
337
DHCP (Dynamic Host Configuration Protocol)
Protocol that enables client hosts to request and receive TCP/IP settings automatically from an appropriately configured server. Uses UDP ports 67 and 68.
338
diagnostics menu
Hidden mobile device menu that contains tests and | diagnostics for verifying the functionality of various device hardware.