Terms and Concepts Flashcards
Common Terms and concepts within the IT department
A set of rules governing data transfer over the internet, assigning unique addresses to devices.
Internet Protocol (IP)
A unique numerical label assigned to a device on a network, allowing communication between computers.
Internet Protocol Address (IP Address)
The foundational communication protocol of the internet that ensures data is sent and received correctly.
Transmission Control Protocol (TCP)
A system that translates human-readable domain names (e.g., google.com) into IP addresses.
Domain Name System (DNS)
A protocol for transmitting web pages from servers to browsers.
HyperText Transfer Protocol (HTTP)
A secure version of HTTP that encrypts data using SSL/TLS to protect user information.
HyperText Transfer Protocol Secure (HTTPS)
A secure connection that encrypts internet traffic, providing privacy by masking a user’s IP address.
Virtual Private Network (VPN)
A software-based simulation of a computer system that runs an operating system independently from the host machine.
Virtual Machine (VM)
A set of rules that allow different software applications to communicate with each other.
Application Programming Interface (API)
A visual interface that allows users to interact with computers using icons and windows instead of text commands.
Graphical User Interface (GUI)
A text-based interface used to interact with a computer by typing commands.
Command Line Interface (CLI)
A subset of AI that enables computers to learn from data and improve performance without explicit programming.
Machine Learning (ML)
The simulation of human intelligence in machines, enabling them to perform tasks such as problem-solving, speech recognition, and decision-making.
Artificial Intelligence (AI)
Large and complex datasets that require specialized tools and techniques for processing and analysis.
Big Data
A network of interconnected devices that collect and share data over the internet (e.g., smart home devices).
Internet of Things (IoT)
A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
Firewall
A system that monitors network traffic for suspicious activity and potential threats.
Intrusion Detection System (IDS)
An advanced security system that detects and actively blocks cyber threats.
Intrusion Prevention System (IPS)
A system that manages encryption and digital certificates to secure communications online.
Public Key Infrastructure (PKI)
A security process that requires users to verify their identity using two forms of authentication, such as a password and a code sent to a mobile device.
Two-Factor Authentication (2FA)
The delivery of computing services (e.g., storage, processing power) over the internet instead of local servers.
Cloud Computing
A decentralized, digital ledger used to record transactions securely and transparently.
Blockchain
The practice of securing information by converting it into a coded format using encryption techniques.
Cryptography
Self-executing contracts stored on a blockchain that automatically enforce agreements without intermediaries.
Smart Contracts
A technology that overlays digital content onto the real world (e.g., Pokémon GO).
Augmented Reality (AR)
A fully immersive digital environment that users can interact with using special devices like VR headsets.
Virtual Reality (VR)
A field of computing that uses quantum mechanics to perform complex calculations much faster than traditional computers.
Quantum Computing