Al's A+ Cards for CompTIA A+

¡Supera tus tareas y exámenes ahora con Quizwiz!

EPD (Electronic Paper Display)

A low-power display using e-ink to create a display that mimics the look of text on paper without using a backlight or glossy surface.

developer roller (see also developer unit)

A magnetized roller to which toner adheres during the printing process.

Trojan Horse

A malicious software program hidden within an innocuous-seeming piece of software. Usually the Trojan is used to try to compromise the security of the target computer.

semiconductor

A material that can act as both a conductor and an insulator, which provides switch-like functionality, where a circuit can be opened and closed, used to represent binary (on/off) digits.

insulator

A material that does not conduct electricity, such as rubber or plastic.

conductor

A material that is good at conducting electricity, such a gold, copper, or tin. These are used for wires and contacts.

FPU (Floating Point Unit)

A math co-process or built into the CPU that performs calculations on floating point numbers.

calibration (printer)

The process by which the printer determines the appropriate print density or color balance, or how much toner to use.

onboarding

The process in which MDM software logs use of a device on the network and determines whether to allow it to connector not, based on administrator-set parameters.

reference machine

The process of Windows deployment to multiple computers by using disk imaging software to clone an installation from one PC to the rest.

geotagging

The process of adding geographic location metadata to captured media such as pictures or videos.

UPS sizing

The process of determining the appropriate size UPS to protect the load from a given system.

forensics

The process of gathering and submitting computer evidence to trial. Digital evidence is latent, meaning that it must be interpreted. This means that great care must be taken to prove that the evidence has not been tampered with or falsified. The key points in collecting evidence are to record every step and action, to gather appropriate evidence, and to bag evidence. To preserve evidence correctly, it should be stored securely. Any investigation should be done on a copy of the digital files, not the originals. Each piece of evidence must be accompanied by a chain of custody form, detailing when, where, and how it was collected, where it has been stored, and who has handled it subsequently to collection.

geolocation

The process of identifying the real-world geographic location of an object, often by associating a location such as a street address with an IP address, hardware address, Wi-Fi positioning system, GPS coordinates, or some other form of information.

charms

commands displayed in a vertical bar on the right side of a Windows 8 Start Screen. The3 commands are Search, Share, Start, Devices, and Settings.

LoJack tracking software

"Rootkit"-style software that enables a stolen laptop to be traced or remotely locked down or wiped in the event of theft.

mutual authentication for multiple services (federated identity management)

(SSO [Single Sign On]) One service accepts the credentials from another service.

dotted decimal notation

32 bit addresses displayed in human readable format using base-10 numbering.

octet32 .

32 bit addresses subdivided into four groups of 8 bits (1 byte).

EPS specification (Entry-level Power Supply specification)

8-pin +12 V connectors developed initially for server-class hardware.

low level format

A "proper" low level format creates cylinders and sectors on the disk. This can generally only be done at the factory. The disk utilities just clean data from each sector; they don't re-create the sector layout.

SLS (selective laser sintering)

A 3D printing method which fuses layers together using a pulse laser, creating the object from aplastic or metal powder with the model being lowered into a tank as each layer is added.

FFF (fused filament fabrication)

A 3D printing method which lays down each layer of filament at high temperature, and as layers are extruded, adjacent layers are allowed to cool and bond together before additional layers are added to the object.

SLA (stereolithography)

A 3D printing method which uses a resin or photopolymer to create objects which are cured using an ultraviolet laser.

LGA (Land Grid Array)

A CPU form factor used by Intel where the pins that connect the CPU and socket are located on the socket.

PGA(Pin Grid Array)

A CPU socket form factor where pins are located on the bottom of the processor to fit in the matching holes in the motherboard socket. PGA-type sockets are still used by AMD but Intel has switched to Land Grid Array (LGA), where the pins are located on the socket rather than the chip.

DDoS (Distributed Denial of Service)

A DoS attack that uses multiple compromised computers (a "botnet" of "zombies") to launch the attack.

folder redirection

A Microsoft Windows technology that allows an administrative user to redirect the path of a local folder (such as the user's home folder) to a folder on a network share, making the data available to the user when they log into any computer on the network where the network share is located.

roaming profile

A Microsoft Windows technology that redirects user profiles to a network share so that the information is available when the user logs into any computer on the network where the network share is located.

File Explorer

A Microsoft Windows tool that offers a single view of all the resources and information that you can access from a computer.

Standard User account

A Microsoft Windows user account recommended for day-to-day operations, which has much more limited capabilities than the Administrator account, and is able to run installed programs.

Administrator account

A Microsoft Windows user account that can perform all tasks on the computer, including installing and uninstalling apps, setting up other users, and configuring hardware and software.

Child account

A Microsoft Windows user account that is a standard user account with the Family Safety Settings enabled.

Guest account

A Microsoft Windows user account with limited capabilities, no privacy, and is disabled by default.

HTPC (Home Theater PC)

A PC used in place of consumer appliances such as Personal Video Recorders (PVRs) to watch and record TV broadcasts and play movies and music.

input voltage

A PSU setting to set North American power supplies to 115 V and UK power supplies to 240 V.

QC (Quick Charge)

A Qualcomm fast charging technology that also has a second chip for power management that allows higher wattage than is allowed by the USB standard without overheating.

host-hinted mode

A SATA standard (version 3.2) that defines a set of commands to allow the host computer to specify how the cache should be used.

USB On the Go (OTG)

A USB standard that allows a port to function as either a host or as a device.

USB 2.0 (HighSpeed) standard

A USB standard that operates at up to 480Mbps.

bridge

A ________________________ can be used to divide an overloaded network in separate segments. Intrasegment traffic (traffic between devices on the same segment) remains within this segment and cannot affect the other segments. A _________ works most efficiently if the amount of intersegment traffic (traffic between devices on different segments) is kept low. Segments on either side of a _________ are in separate collision domains but the same broadcast domain. The function of ____________ is now typically performed by switches.

Type 1 hypervisor

A bare metal hypervisor in which you install directly on the server's hardware.

CMOS battery (complementary metal oxide semiconductor battery)

A battery designed to last 5 to 10 years to maintain CMOS settings.

standard client (thick client or a fat client.)

A business computer that performs most or all computing functions on its own.

IDF (Intermediate Distribution Frame)

A cable rack that interconnects the telecommunications wiring between an MDF and any end-user devices.

compressed air blaster

A can of air packaged under pressure that is used to remove dust and debris from inside printers and other computing devices.

smart card

A card with a chip containing data on it. Smart cards are typically used for authentication, with the chip storing authentication data such as a digital certificate.

rootkit

A class of malware that modifies system files, often at the kernel level, to conceal its presence.

app scanner

A class of security software designed to monitor the permissions allocated to apps and how they are using (or abusing) them.

walled garden

A closed software system in which the user's access to content and services is controlled by the user's mobile carrier or by a service provider.

subtractive color printing

A color printing method that uses the reflective properties of inks.

prosumer

A combination of the words professional and consumer, typically referring to an amateur user who uses professional level devices.

interpreted

A command language in which the commands in a script file are performed without being compiled into a machine-level set of instructions. In interpreted languages, the code must be read and evaluated each time the script is run, making it slower than compiled instructions.

gpresult

A command line tool that displays the RSoP for a computer and user account.

IRQ (Interrupt Request)

A communications channel between a hardware device and the system processor. Originally, when hardware was added to the computer it had to be manually configured with a unique interrupt number (between 0 and15). Plug-and-Play compatible systems configure resources automatically. The PCI bus introduced IRQ steering, which allowed IRQs to be shared. Modern computers use programmable interrupt controllers, allowing for hundreds of interrupts.

logical operator

A comparison of more than one condition at the same time by using AND, OR, or XOR.

blackout

A complete loss of electrical power.

gaming rig

A computer used for standalone or online gaming, often connected to surround sound speakers or headphones, sometimes integrated with virtual reality goggles. May use specialized gaming equipment such as gaming controllers, joysticks, gaming mouse, and keyboard.

VR (Virtual Reality)

A computer-generated, simulated environment experienced via a headset connected to a PC or powered by a smartphone.

desktop computer

A computing device designed to be placed on or near a user's desk.

BSOD (Blue Screen of Death)

A condition that indicates an error from which the system cannot recover (also called a stop error). _____________ are usually caused by bad driver software or hardware faults (memory or disk).

false negative

A condition where a system denies entry when it should have granted it.

false positive

A condition where a system grants entry when it should have denied it.

SMP (symmetric multiprocessing)

A condition where two or more physical CPUs that share a common OS and memory execute instructions simultaneously.

failed login attempts

A configurable value that specifies how many incorrect login attempts can be used before the device is locked for a specified length of time.

ADSL (Asymmetrical DSL)

A consumer version of DSL that provides a fast downlink but a slow uplink. The upstream rate is between64 Kbps and 1 Mbps and the down stream rate it 500 Kbps to 8 Mbps.

enclosure

A container with its own air filters and fans to protect computers or other devices in dirty or dusty environments.

game pad

A controller containing multiple buttons and toggles, each of which controls a different action in a video game or program, typically held and manipulated with two hands.

SHA (Secure Hash Algorithm)

A cryptographic hashing algorithm created to address possible weaknesses in MDA. The earlierSHA-1 has been superseded by SHA-2.

objects

A data structure in Windows that represents system resources.

PRL (Preferred Roaming List)

A database built by CDMA service carriers to indicate which radio bands should be used when connecting to a cell tower.

EIR database (Equipment Identity Register database)

A database where IMEI numbers are stored. A lost or stolen device IMEI is marked as invalid.

tower case

A desktop computer designed to sit vertically on a surface so that it is taller than it is wide. Tower cases come in four basic sizes: full, mid, mini, and slim line.

all-in-one unit

A desktop computer in which all the computer components, except the keyboard and mouse, are contained within the monitor case.

ebook

A digital book that can be read on an electronic device such as an e-reader, smartphone, tablet, or computer.

DSLR (Digital Single Lens Reflex)

A digital camera that replicates the features of compact35mm film cameras, preserving the traditional viewfinder method of picture composition and supporting replace able lenses and manual adjustments.

e-magazine

A digital magazine that can be read on an electronic device such as an e-reader, smartphone, tablet, or computer.

e-newspaper

A digital newspaper that can be read on an electronic device such as an e-reader, smartphone, tablet, or computer.

parent directory

A directory that is one level above your current working directory.

Disaster Recovery Plan

A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents. The recovery plan may also provide for practice exercises or drills for testing and to familiarize staff with procedures. As well as facilitating a smooth transition in the event of disaster, plans must stress the importance of maintaining secure systems.

diagram

A drawing that captures the relationships between network elements and identifying the location of items on the network.

hybrid drive

A drive in which a portion is SSD, which functions as a large cache, containing frequently accessed data and a magnetic disk portion which is only spun up when non-cached data is accessed.

fast charge

A general technology for quickly charging mobile devices using varying voltages to speed up charging times.

DOCSIS (Data Over Cable Service Interface Specification)

A global telecommunications standard that enables data to be sent over cable modems in a CATV system.

plenum cable

A grade of cable that does not give off noxious or poisonous gases when burned. Unlike PVC cable, plenum cable can be run through the plenum and firebreak walls.

integrated GPU(integrated graphics processing unit)

A graphics adapter built into the motherboard or the CPU.

domain network

A group of computers which share a common accounts database, referred to as the directory.

hacker collective

A group of hackers, working together, to target an organization as part of a cyberwarfare campaign.

VM (Virtual Machine)

A guest operating system installed on a host computer using virtualization software (a hypervisor), such as Microsoft Hyper-V or VMware.

social engineering

A hacking technique, widely publicized by Kevin Mitnick in his book "The Art of Deception," whereby the hacker gains useful information about an organization by deceiving its users or by exploiting their unsecure working practices. Typical social engineering methods include impersonation, domination, and charm.

POST (Power-On Self-Test)

A hardware checking routine built into the PC firmware. This test sequentially monitors the state of the memory chips, the processor, system clock, display, and firmware itself. Errors that occur within vital components such as these are signified by beep codes emitted by the internal speaker of the computer. Further tests are then performed and any errors displayed as on-screen error codes and messages.

host controller

A hardware component of the USB subsystem responsible for recognizing when a USB device is attached or removed from the system, monitors the device status, provides power to the USB devices, and controls the flow of data between the USB host and USB devices.

port (physical)

A hardware connection interface on a personal computer that enables devices to be connected to the computer.

cryptographic hash

A hashed value from which it is impossible to recover the original data.

VR headset (Virtual Reality headset)

A headset worn like goggles to interact with images displayed in the headset.

VDSL (Very High Bitrate DSL)

A high speed version of DSL with an upstream rate between 1.5 Mbps and 2.5 Mbps and a downstream rate between 50 Mbps and55 Mbps.

page description language (PDL)

A high-level computer language used to describe the contents and the layout of the information to be printed on a page through PDL commands.

S/PDIF (Sony/Phillips Digital Interface)

A high-quality audio port that uses coax cabling with RCA connectors or fiber optic cabling and connectors. S/PDIF supports surround sound speakers.

Type 2 hypervisor

A host-based hypervisor in which you install the host operating system first, then install the hypervisor.

hotfix

A hotfix is a software update designed and released to particular customers only, though they may be included in later Service Packs.

literal

A match to the exact string.

configuration management

A means of identifying all components of the information and communications technology infrastructure, including hardware, software, and procedures, and the properties of those terms.

problem management

A method of identifying, prioritizing, and establishing ownership of incidents.

RDPRA Mode(RDP Restricted Admin Mode) A method of mitigating the risk of using Remote Desktop.

A method of mitigating the risk of using Remote Desktop.

ad hoc network

A peer-to-peer network created for the current print session.

lockout policy

A policy designed to restrict failed login attempts.

memory module

A printed circuit board that holds a group of memory chips that act as a single unit.

locally installed printer

A printer that Windows communicates with directly over the relevant port.

TCP (Transmission Control Protocol)

A protocol in the TCP/IP suite operating at the transport layer to provide connection-oriented, guaranteed delivery of packets. Hosts establish a session to exchange data and confirm delivery of packets using acknowledgements. This overhead means the system is relatively slow.

UDP (User Datagram Protocol)

A protocol in the TCP/IP suite operating at the transport layer to provide connectionless, non-guaranteed communication with no sequencing or flow control. Faster than TCP, but does not provide reliability.

MIME (Multi-purpose Internet Mail Extensions)

A protocol specifying Internet mail message formats and attachments.

SMB (Server Message Block)

A protocol used for requesting files from Windows servers and delivering them to clients. SMB allows machines to share files and printers, thus making them available for other machines to use. SMB client software is available for UNIX-based systems. Samba software allows UNIX and Linux servers or NAS appliances to run SMB services for Windows clients.

FTP (File Transfer Protocol)

A protocol used to transfer files across the Internet. Variants include S(ecure) FTP, FTP with SSL (FTPS and FTPES), and T(rivial) FTP. FTP utilizes ports 20 and 21.

BLE (Bluetooth Low Energy)

A radio-based technology designed for small battery-powered devices that transmit small amounts of data infrequently. _________ is not backwards-compatible with "classic" Bluetooth, though a device can support both standards simultaneously.

bookmark

A record of a website or web page that you visited.

proper documentation

A record of what will be done so that the customer knows what to expect in terms of items that are supported, how long incidents may take to resolve, when they can expect an item to be replaced instead of repaired, and so on.

contact

A record with fields for name, address, email address(es), phone numbers, notes, and other information related to the entity defined in the record.

GNU

A recursive acronym standing for "GNU is Not UNIX."

comparison operator

A relationship evaluation between two variables to determine whether they are equal, not equal, less than, greater than, less than or equal to, or greater than or equal to each other.

SSH (Secure Shell)

A remote administration and file copy program that is flexible enough to support VPNs too (using port forwarding).SSH runs on TCP port 22.

backdoor

A remote administration utility providing a means of configuring a computer. Remote admin software may be installed intentionally, in which case it must be properly secured. ____________ may also be installed by malware.

NFS (Network File System) .

A remote file access protocol used principally on UNIX and Linux networks.

dial-up

A remote network access method that utilizes the local telephone line (Plain Old Telephone System [POTS]) to establish a connection between two computers fitted with modems. Dial-up is a legacy method of Internet access. It may still be deployed for special administrative purposes or as an emergency backup connection method. Configuration is generally a case of setting the telephone number, username, and password.

separation roller

A roller in a paper tray that pushes the stack of paper back, allowing only a single sheet of paper to be fed into the printer.

sag

A sag can occur when the power supply entering a computer's components dips briefly below that which is required. Sags are commonly caused when heavy machinery or other high power appliances are started.

sheet-fed scanner

A scanner in which the paper is passed over a fixed scan head.

3D scanner

A scanner that can gather data about the shape and appearance of a physical object and save that information to a computer.

schematic

A schematic is a simplified representation of a system. Physical network diagrams or schematics can show the general location of components and their identification. Logical network diagrams show the organization of the network into subnets and zones.

MBR (Master Boot Record)

A sector on a hard disk storing information about partitions configured on the disk.

VPN (Virtual Private Network)

A secure tunnel created between two endpoints connected via an unsecure network (typically the Internet). VPNs are typically created using SSL/TLS or IPsec. Encryption software is used to ensure privacy of data as messages transit through the public network.

SSL (Secure Sockets Layer)

A security protocol developed by Netscape to provide privacy and authentication over the Internet. It is application independent (working at layer5 [Session]) and can be used with a variety of protocols, such as HTTP or FTP. Client and server set up a secure connection through PKI (X.509) certificates (optionally, both client and server can authenticate to one another). The protocol is now being developed as Transport Layer Security (TLS).

TLS (Transport Layer Security)

A security protocol that protects sensitive communication from eavesdropping and tampering by using a secure, encrypted, and authenticated channel over a TCP/IP connection.

UAC (User Account Control)

A security system in Windows designed to restrict abuse of accounts with administrator privileges. Actions such as installing hardware and software can be performed without changing accounts but the user must authorize the use of administrative rights by clicking a prompt or re-entering user credentials.

secure boot

A security system offered by UEFI that is designed to prevent a computer from being hijacked by malware.

hardening

A security technique in which the default configuration of a system is altered to protect the system against attacks.

tethered VR headset (tethered Virtual Reality headset)

A self-contained VR device.

RS-232 (see also serial port)

A serial port that uses a 25-pin male D connector.

IEEE 802.11

A series of Wi-Fi standards used to implement Wireless Local Area Networks.

file extension

A series of characters at the end of a filename; used by an OS to identify the software application that is associated with a file.

CA (Certificate Authority)

A server that can issue digital certificates and the associated public/ private key pairs.

proxy server

A server that mediates the communications between a client and another server. The proxy server can filter and often modify communications as well as provide caching services to improve performance.

Local Security Policy

A set of policies relating to log on, passwords, and other security issues that can be enforced or disabled on the local machine. On domains, security policy is configured centrally using Group Policy Objects (GPO).

profile of security requirements

A set of policies to apply for different employees and different site areas within a site.

incident management

A set of practices and procedures that govern how an organization will respond to an incident in progress.

maintenance kit

A set of replacement feed rollers, new transfer roller, and a new fuser unit for a laser printer.

SDK (Software Development Kit)

A set of resources provided by a platform vendor for programmers to use when creating software to work with the vendor's platform.

RAID (Redundant Array of Independent/Inexpensive Disks)

A set of vendor-independent specifications for fault-tolerant configurations on multiple-disk systems.

IC (integrated circuit)

A silicon chip embedded on a ceramic plate.

cache

A small block of high-speed memory that enhances performance by pre-loading (_________ing) code and data from relatively slow system memory and passing it to the CPU on demand.

SIM (Subscriber Identity Module)

A small chipcard that identifies the user and phone number of a mobile device via an International Mobile Subscriber Identity(ISMI). A SIM card also provides a limited amount of local storage for contacts.

mini-ITX

A small compact board that fits the same form factor as the ATX and the micro-ATX boards. They have a maximum size of 6.7 inches by 6.6 inches.

workgroup

A small group of computers on a network that share resources in a peer-to-peer fashion. No one computer provides a centralized directory.

SOHO network (small office/home office network)

A small network that provides connectivity and resource sharing for a small office or home office.

device driver

A small piece of code that is loaded during the boot sequence of an operating system. This code, usually provided by the hardware vendor, provides access to a device, or hardware, from the OS kernel. Under Windows, a signing system is in place for drivers to ensure that they do not make the OS unstable.

jumper

A small plastic clip containing a metal conductor that fits over two contacts to complete a circuit that configures the motherboard or adapter card one way or another.

virtual switch

A software application that enables communication between VMs.

unattended installation

A software or operating system installation where the configuration information is derived from an input file.

attended installation

A software or operating system installation where the installer inputs the configuration information in response to prompts from a setup program.

operating system

A software package that enables a computer to function. It performs basic tasks, such as recognizing the input from a keyboard, sending the output to a display screen or monitor, and controlling peripheral devices such as disk drives and printers.

storage bus

A special type of expansion bus dedicated to communicating with storage devices.

encryption key

A specific piece of information that is used with an algorithm to perform encryption and decryption in cryptography.

TPM (Trusted Platform Module)

A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information. Essentially, it functions as a smart card embedded on a motherboard.

ATX

A standard PC case, motherboard, and power supply specification. Mini-, Micro-, and Flex-_________ specify smaller board designs.

disk thrashing

A state in which the main memory is filled up, pages are swapped in and out of virtual memory—which needs to be written to the hard disk—in rapid succession, leading to possible early drive failure.

separation pad

A stationary pad in a paper tray that pushes the stack of paper back, allowing only a single sheet of paper to be fed into the printer.

removable storage

A storage device that can be removed from the computer, or the removable media that can be inserted in a drive, to store portable data.

environment variable

A storage location in the environment of the operating system's command shell.

KVM switch (Keyboard Video Mouse switch)

A switch supporting a single set of input and output devices controlling a number of PCs. KVM are more typically used with servers but 2-port versions allow a single keyboard, mouse, and display to be used with two PCs.

XML (eXtensible Markup Language)

A system for structuring documents so that they are human- and machine-readable. Information within the document is placed within tags, which describe how information within the document is structured.

direct thermal printer

A thermal printer that uses heated pins to form images directly onto specially coated thermal paper.

asset

A thing of economic value. For accounting purposes, _________ are classified in different ways, such as tangible and intangible or short term and long term.

airplane mode

A toggle found on mobile devices enabling the user to disable and enable wireless functionality quickly.

rpm (Red Hat Package Manager)

A tool for maintaining packages in Red Hat Linux systems.

apt

A tool for maintaining packages on Debian-based Linux systems

yum

A tool for maintaining packages on Fedora-based Linux systems.

multitouch

A touchscreen or touchpad capable of interpreting gestures, such as pinching or swiping.

tunneling

A tunneling (or encapsulation) protocol wraps up data from one protocol for transfer over a different type of network. For example, PPP can carry TCP/IP data over a dial-up line, enabling a remote computer to communicate with the LAN.

crossover table

A twisted pair cable wired as T568A on one end and as T568B on the other end.

T568B

A twisted pair standard that defines the standards for preferred cable types that provide the minimum acceptable performance levels for home-based networks.

OLED display (organic light emitting diode display)

A type of LED flat panel display device that uses organic compounds that emit light when subjected to an electric current.

on-access

A type of antivirus scan where the AV software intercepts OS calls to open files, so that it can scan the file before allowing or preventing the file from being opened.

CIS (Contact Image Sensor)

A type of digital imaging sensor. An array of LEDs strobing between red, blue, and green light are used to illuminate an object. The reflected light is captured through a lens onto an image sensor.

CMOS (complementary metal oxide semiconductor)

A type of integrated circuit with a wide range of applications, including static RAM (for firmware and flash memory) and imaging sensors.

CCFL (Cold Cathode Fluorescent Lamp)

A type of lamp providing a bright, clear light source. __________ are used for LCD backlights and scanners.

ransomware

A type of malware that tries to extort money from the victim, by appearing to lock their computer or by encrypting their files, for instance.

volatile

A type of memory where data cannot bestored without power being supplied.

power supply tester

A type of meter designed to test PC Power Supply Units.

CCD (Charge Couple Device)

A type of microchip widely used as a digital image sensor. Each element in a _________ converts light captured by a photodiode into a proportional electric charge, which is the amplified, sampled, and stored as a digital value. The number of elements determines the resolution.

GPU (Graphics Processing Unit)

A type of microprocessor used on dedicated video adapter cards or within a CPU with integrated graphics capability.

laser printer

A type of printer that develops an image on a drum using electrical charges to attract special toner then applying it to paper. The toner is then fixed to the paper using a high-heat and pressure roller (fuser). The process can be used with black toner only or four color toner cartridges(Cyan, Magenta, Yellow, and Black) to create full-color prints. Monochrome laser printers are the "workhorses" of office printing solutions.

LED printer (light emitting diode printer)

A type of printer that uses LEDs to print.

thermal printer

A type of printer that uses a thermal (high heat) print head to fuse or transfer wax-based ink onto paper or selectively heats specially treated paper to form the image. Most thermal printers are handheld devices used for printing labels or receipts.

flatbed scanner

A type of scanner where the object is placed on a glass faceplate and the scan head moved underneath it.

UEFI (Unified Extensible Firmware Interface)

A type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security.

worm

A type of virus that spreads through memory and network connections rather than infecting files.

DRAM (Dynamic Random Access Memory)

A type of volatile memory that stores each bit of data as a charge within a single transistor. Each transistor must be refreshed periodically. Standard DRAM is the lowest common denominator of the DRAM types. Modern PCs use a DRAM derivative to store data (Double Data Rate SDRAM).

distinguished name

A unique identifier for any given resource within the LDAP directory.

MAC address

A unique physical hardware address for each Ethernet network adapter that is composed of 12 hexadecimal digits.

SVGA (Super VGA)

A variant of the VGA standard that supported 800x600 pixel resolution with 4-bit or 8-bit color.

SDRAM (Synchronous Dynamic Random Access Memory)

A variant on the DRAM chip designed to run at the speed of the system clock, thus accelerating the periodic refresh cycle times. SDRAM can run at much higher clock speeds than previous types of DRAM. Basic SDRAM is now obsolete and has been replaced by DDR/DDR2/3 SDRAM.

jitter

A variation in the time it takes for a signal to reach the recipient. Jitter manifests itself as an inconsistent rate of packet delivery. If packet loss or delay is excessive, then noticeable audio or video problems (artifacts) are experienced by users.

digital camera

A version of a 35mm film camera where the film is replaced by light-sensitive diodes (an array of CCDs [Charge Coupled Devices]) and electronic storage media(typically a flash memory card). The sensitivity of the array determines the maximum resolution of the image, measured in megapixels.

pipe symbol

A vertical bar typed between commands to pipe or redirect the results or output of one command as the input to another command.

DVI (Digital Video Interface)

A video adapter designed to replace the VGA port used by CRT monitors. The DVI interface supports digital only or digital and analog signaling.

VDE (Virtual Desktop Environment)

A virtual environment in which users can customize and update the environment as if it was a physical environment.

rogue VM (rogue virtual machine)

A virtual machine that has been installed without authorization.

container virtualization

A virtualization method that doesn't use a hypervisor and instead enforces resources separate at the operating system level with isolated containers for each user instance to run in with its own allocated CPU and memory resources, but all processes are run through the native OS kernel.

digital assistant

A voice interface designed to respond to natural language commands and queries.

webcam

A webcam can be used to stream and record video. There are many types, from devices built into laptops to standalone units. While early devices were only capable of low resolutions, most webcams are now HD-capable.

wiki

A website that is configured so users can view, enter, and share information about a subject.

critical update

A widely released, non-security update to fix a critical issue.

LoS (Line of Sight)

A wireless connection method using ground-based microwave antennas aligned with one another.

WoWLAN (Wake-on-Wireless LAN)

A wireless version of WoL that is not widely implemented.

IMAP (Internet Message Access Protocol)

ATCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server. Unlike POP3, messages persist on the server after the client has downloaded them. IMAP also supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. IMAP4 utilizes TCP port number 143.

CATV (Cable Access TV)

Access to television stations over a coaxial cable connected to a TV, set-top box, or computer.

link-local address

Addresses used by IPv6 for network housekeeping traffic. Link-local addresses span a single subnet (they are not forwarded by routers).

DB-9 (see also serial port)

Although the original serial port used a 25-pin male D connector, most PCs today use a male DB-9 (9-pin) port.

notification shade

An Android feature that is accessed by swiping down from the top of the display to access Android OS feature settings.

force stop

An Android option to close an unresponsive app.

Android Auto

An Android phone feature that allows users to interact with their phone using voice commands and a vehicle's built-in display.

add-on card

An adapter card installed in a PCIe slot.

Control Center

An iOS feature that is accessed by swiping up from the bottom of the display to access iOS feature settings.

BIOS setup (basic input/output system setup) (CMOS setup or UEFI setup)

Another name for the setup program used to configure system firmware settings.

CMOS setup (complementary metal oxide semiconductor setup)(BIOS setup or UEFI setup)

Another name for the setup program used to configure system firmware settings.

UEFI setup (Unified Extensible Firmware Interface setup) (BIOS setup)

Another name for the setup program used to configure system firmware settings.

accident

Any instance where a person is injured or computer equipment is damaged.

trip hazard

Any object placed in pathways where people walk.

developer unit

Assembly that applies toner to areas of the photoconductor where charge has been removed by the laser. The main components are a toner hopper, transfer roller, waste toner hopper, a screw or blade to stir the toner, and a doctor blade to ensure the correct level of toner on the developer roller.

PKI(Public Key Infrastructure)

Asymmetric encryption provides a solution to the problem of secure key distribution for symmetric encryption. The main problem is making a link between a particular public-private key pair and a specific user. One way of solving this problem is through PKI. Under this system, keys are issued as digital certificates by a Certificate Authority (CA). The CA acts as a guarantor that the user is who he or she says he or she is. Under this model, it is necessary to establish trust relationships between users and CAs. In order to build trust, CAs must publish and comply with Certificate Policies and Certificate Practice Statements.

serial port

Asynchronous serial transmission (RS-232) is one of the oldest PC bus standards. A serial port is a legacy port that can be used to connect devices such as modems, mice, and Uninterruptible Power Supplies (UPS).Serial ports transmit data bit-by-bit using a single data line at a speed of up to about115 Kbps. Although the original serial port used a 25-pin male D connector, most PCs today use a male DB9 (9-pin) port. The serial port is now little used but does provide an "out-of-band" means of configuring network appliances such as switches and routers.

image level backup

Backup of a virtual machine which captures all of the information required to run the VM.

Extended Service Set

Basic service sets can be grouped into an extended service set.

ST Connector (Straight Tip Connector)

Bayonet-style twist-and-lock connector for fiber optic cabling.

HCL (Hardware Compatibility List)

Before installing an OS, it is vital to check that all the PC components have been tested for compatibility with the OS (that they are on the Hardware Compatibility List [HCL] or Windows Logo'd Product List).Incompatible hardware may not work or may even prevent the installation from completing successfully.

cultural sensitivity

Being aware of customs and habits used by other people.

superscalar architecture

CPUs process multiple instructions at the same time (for example, while one instruction is fetched, another is being decoded, another is being executed, and another is being written back to memory).

chip creep

Cards can work free from a slot over time, though this is not common.

iCloud

Cloud storage service operated by Apple and closely integrated with macOS and iOS.

CD-RW

Compact disks containing a heat sensitive compound whose properties can be changed between crystalline and amorphous by a special laser.

CD-R

Compact disks containing a layer with photosensitive dye in which a laser transforms the dye to mimic the pits and lands of a premastered CD.

power management

Computers and hardware supporting a power management specification such as ACPI (Advanced Configuration Power Interface) can enter power-saving or standby modes that can be reactivated from the host.

defense-in-depth

Configuring security controls on hosts (endpoints) as well as providing network (perimeter) security, physical security, and administrative controls.

cellular data

Connecting to the Internet via the device's cell phone radio and the handset's cellular network provider.

expansion slots

Connection slots on the motherboard in which adapter cards can be installed to extend the range of functions the computer can perform.

logical security

Controls implemented in software to create an access control system.

mobile device synchronization

Copying data back and forth between a mobile device and another device such as another mobile device, tablet, laptop, PC, or cloud service to keep the information up-to-date on all of the devices.

slicing

Creating horizontal layers to use in 3D modeling and 3D printers.

remnant removal

Data that has nominally been deleted from a disk by the user can often be recovered using special tools. The best way to shred data without physically destroying a disk is to ensure that each writable location has been overwritten in a random pattern.

geotracking

Determining the location of a person or object using the GPS data from a GPS-enabled device.

SAS (Serial Attached SCSI)

Developed from parallel SCSI, SAS represents the highest performing hard disk interface available.

NIST (National Institute of Standards and Technology)

Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.

Factory Recovery Partition

Disk partition accessible via the startup sequence that contains an image of the system partition as produced by the PC vendor. This can be used to recover the PC to its factory state by performing a repair install, but will erase any user data or installed programs.

WIA (Windows Image Acquisition)

Driver model and API (Application Programming Interface) for interfacing scanner hardware with applications software on Windows PCs.

microsegmentation

Each switch port is a separate collision domain. In effect, the switch establishes a point-to-point link called a virtual circuit between any two network nodes.

user account

Each user who wishes to access a Windows computer will need a logon ID, referred to as a user account. Each user will normally have a local profile, containing settings and user-created files. Profiles are stored in the "Users" folder or can be redirected to a network folder.

home server PC

Either a home theater PC (HTPC)with a slightly expanded role or a repurposed desktop or low-end PC server used primarily for file storage, media streaming, and printer sharing.

PGP (Pretty Good Privacy)

Email encryption product providing message confidentiality and integrity using web of trust PGP certificates.

S/MIME (Secure Multipurpose Internet Mail Extensions)

Email encryption standard(Cryptographic Message Standard) using PKI (X.509) certificates for confidentiality(digital envelopes) and integrity (digital signatures). S/MIME provides extensions for standard MIME headers.

CMTS (Cable Modem Termination System)

Equipment used by cable companies to allow computers to send and receive IP packets by inserting the packets into MPEG frames over an RF signal and reverses the process for data coming from a cable modem.

unified file system

Everything available to the Linux OS is represented as a file in the file system, including devices.

degaussing

Exposing the disk to a powerful electromagnet to disrupt the magnetic pattern that stores data on the disk surface.

Endpoint Management Server

Facilitates the defense in depth process by identifying computing devices running on the network and ensuring that they are securely configured. This can include applying OS and antivirus updates automatically, cataloging software applications installed on each device, applying security policies, retrieving and analyzing log files, and monitoring performance and other status alerts.

bus mastering

Feature of a bus allowing devices to communicate with one another without going through the CPU. _______________________ is supported by most bus types, including PCI, SCSI, and ATA (in "Ultra DMA" modes).

Spotlight

File system search feature in macOS.

offline files

Files (or folders) from a network share that are cached locally. The Offline Folders tool handles synchronization between the local and remote copies.

gestures

Finger movements on a trackpad or mouse that enable a user to scroll, zoom, and navigate desktop, document, and application content.

flash memory

Flash RAM is similar to a ROM chip in that it retains information even when power is removed, but it adds flexibility in that it can be reprogrammed with new contents quickly. Flash memory is used in USB thumb drives and memory cards for removable storage and in Solid State Drives (SSDs), designed to replicate the function of hard drives.

backlight

Fluorescent lamp illuminating the image on a flat panel (LCD) screen. If the ___________ or inverter fails, the screen image will go very, very dark.

scalable fonts

Fonts that are vector based.

RSSI (Received Signal Strength Indicator)

For a wireless signal, an index level calculated from the signal strength level.

Electrostatic discharge (see ESD)

GOOGLE LATER

defragmentation (see disk defragmentation)

GOOGLE LATER

erase lamp (see cleaning unit)

GOOGLE LATER

host firewall (see personal firewall)

GOOGLE LATER

rooting

Gaining privileged level or root level access to an Android device to enable modifying code or installing software not intended for the device.

unauthorized location tracking

Giving away too much sensitive information to third parties.

Explorer (See File Explorer)

Google Later

Fair Use Policy (see AUP)

Google Later

shredding

Grinding a disk into little pieces.

Administrative Templates

Group Policy files for registry-based policy management. The files have the .ADM file extension.

web server

HTTP servers host websites. A basic website consists of static HTML pages but many sites are developed as front-end applications for databases. Web servers are popular targets for attack, particularly DoS, spoofing, and software exploits. Many companies use hosted web servers but if not, the server should be located in a DMZ. Web servers are also commonly used for intranet services, especially on Microsoft networks.

3D printer

Hardware device capable of small scale manufacturing. ____________ use a variety of filament media (typically plastic) with different properties.

firewall

Hardware or software that filters traffic passing into or out of a network. A basic packet-filtering firewall works at Layer 3(Network). Packets can be filtered depending on several criteria (inbound or outbound, IP address, and port number). More advanced firewalls (proxy and stateful inspection) can examine higher layer information, to provide enhanced security.

IXPs (Internet eXchange Points)

High bandwidth trunks that connect to the Internet backbone.

HDMI (High Definition Multimedia Interface)

High-specification digital connector for audio-video equipment.

VDI (Virtual Desktop Infrastructure)

Hosting user desktops as virtual machines on a centralized server or cloud infrastructure. The desktop OS plus applications software is delivered to the client device (often a thin client) over the network as an image.

ICM (information content management)

ICM(information content management) The process of managing information over its lifecycle, from creation to destruction.

Wi-Fi

IEEE standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has five main iterations (a, b, g, n, and ac), describing different modulation techniques, supported distances, and data rates.

filament

In 3D printing, the spool of plastic or other material used to create the three-dimensional object.

reserve

In DHCP servers, particular IP addresses are set aside for and assigned to specific devices so that those devices receive the same IP address each time.

insert mode

In Linux vi editor, the mode that allows users to insert text by typing.

command mode

In Linux vi editor, the mode that allows users to perform different editing actions using single keystrokes.

burning

In optical discs, the process of using a special laser used to transform the dye to mimic the pits and lands of a premastered CD.

lands

In optical storage media, raised areas on the disk.

pits

In optical storage media, recessed a reason the disk.

default mask

In the early days of IP addressing, the network ID was determined automatically from the first octet of the address. When subnet masks were introduced, the "default" masks (255.0.0.0, 255.255.0.0,and 255.255.255.0) that corresponded to treating the first octet as classful were commonly described as "class A", "class B", and "class C" masks. The Internet no longer uses classful addressing but many LANs use the private IP address ranges and the default masks.

touchpad

Input device used on most laptops to replace the mouse. The touchpad allows the user to control the cursor by moving a finger over the pad's surface. There are usually buttons too but the pad may also recognize "tap" events and have scroll areas.

multiboot system

Installing multiple operating systems on a single computer. Each OS must normally be installed to a separate partition.

Machine to Machine (M2M)

Internet of Things feature that allows objects to communicate and pass data between themselves and other traditional systems like computer servers.

PCI bus (Peripheral Component Interconnect bus)

Introduced in 1995 with the Pentium processor, it connects the CPU, memory, and peripherals to a 32-bit working at 33MHz. PCI supports bus mastering, IRQ steering, and Plug-and-Play. Later versions defined 64-bit operation and 66 MHz clock but were not widely adopted on desktop PCs.

microATX

Introduced in late 1997, and is often referred to as μATX, and has a maximum size of 9.6 inches by 9.6 inches.

environmental power problems

Issues affecting power including surges, brownouts, and blackouts caused by failures in the building power supply.

TB (Thunderbolt)

It can be used as a display interface (like DisplayPort) and as a general peripheral interface (like USB 3).The latest version uses USB-C connectors.

CAL (Client Access Licenses)

Licenses required for clients accessing software services from a server, purchased per server (with a limited number of simultaneous users) or per seat (specifying each unique device or user).

system firmware

Low-level code to allow the computer components to be initialized and load the main operating system software.

audio subsystem

Made up of a sound card and on or more audio input and output devices.

VM escaping (virtual machine escaping)

Malware running on a guest OS jumping to another guest or to the host.

Control Panel

Management interface for configuring Windows settings. In Windows 8 and later, the touch-enabled app PC Settings/ Windows Settings is used for many options previously configured via Control Panel.

GPS (Global Positioning System)

Means of determining a receiver's position on the Earth based on information received from GPS satellites. The receiver must have line-of-sight to the GPS satellites.

WPS (Wi-Fi Protected Setup)

Mechanism for auto-configuring a WLAN securely for home users. On compatible equipment, users just have to push a button on the access point and connecting adapters to associate them securely.

TKIP (Temporal Key Integrity Protocol)

Mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

dual-channel memory

Memory controller with two pathways through the bus to the CPU so that 128bits of data can be transferred per transaction.

SODIMM (Small Outline Dual In-line Memory Module)

Memory that is half the size of DIMMs, are available in 32- or 64-bit data paths, and are commonly found in laptops and iMac systems.

firewall apps

Mobile device firewall app that can monitor app activity and prevent connections to particular ports or IP addresses.

NetBT (NetBIOS over TCP/IP)

NetBIOS that was re-engineered to work over the TCP and UDP protocols.

PSE (Power Sourcing Equipment)

Networks witches that provide power through the Ethernet cable to connected devices.

mass storage device

Non-volatile storage devices that are able to hold data when the system is powered off.

recovery disc

OEM recovery media enabling the user to reset the system to its factory configuration.

fragmentation

Occurs when a data file is not saved to contiguous sectors on a disk. This decreases performance by making the disk read/write heads move between fragments.

paper jam

Occurs when paper does not feed through the printer properly, resulting in pages that are stuck within the paper feed mechanism, often crumpled or torn.

Negative Acknowledgement (NACK)

On a TCP/IP network, when using TCP and the data is delivered in a damaged state, a NACK packet is sent back to the sender to force retransmission of the data.

open source

Open source means that the programming code used to design the software is freely available.

macOS

Operating system designed by Apple for their range of iMac computers, Mac workstations, and MacBook portables. macOS (previously called OS X) is based on the BSD version of UNIX. macOS is well supported by application vendors, especially in the design industry.

MAC flooding

Overloading the switch's MAC cache using a tool such as Dsniff or Ettercap to prevent genuine devices from connecting and potentially forcing the switch into hub or flooding mode.

PCI DSS (Payment Card Industry Data Security Standard)

PCI DSS(Payment Card Industry Data Security Standard) Information security standard for organizations that process credit or bank card payments.

thermal paper

Paper that contains a chemical designed to react with the heating element of a thermal printer to create images on paper.

POTS (Plain Old Telephone System)

Parts of a telephone network "local loop" using voice-grade cabling. Analog data transfer over POTS using dial-up modems is slow(33.3 Kbps). DSL technologies make better use of the bandwidth available, but are not accessible over all of the network.

channels

Paths between PATA drives and motherboard, called IDE1 and IDE2, or primary (PRI IDE) and secondary (SEC IDE).

surround sound

Placement of multiple speakers positioned around the listener to provide a cinematic audio experience.

802.3af

PoE powered devices can draw up to about 13 W over the link. Power is supplied as 350mA@48V and limited to 15.4 W, but the voltage drop over the maximum 100 feet of cable results in usable power of around 13 W.

802.3at (PoE+)

PoE powered devices can draw up to about 25 W. PoE+ allows for a broader range of devices to be powered such as cameras with pan/tilt/zoom capabilities, door controllers, and thin client computers.

link

Point-to-point connections in PCIe.

health policy

Policies or profiles describing a minimum security configuration that devices must meet to be granted network access.

air or dust filters

Polyester sheets that cover fan inlets to trap dust on their surface, preventing the dust from getting into a computer or other device.

Incident Response Policy

Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents. The stages will generally be notification, investigation, remediation, and follow-up. Incident response is often handled by a special group—the Computer Security Incident Response Team—made up of staff with both technical skills and decision-making authority.

SMT (Simultaneous Multithreading)

Processing of multiple threads simultaneously.

Lightning ports

Proprietary connector and interface for Apple devices.

AFP (Apple Filing Protocol)

Protocol supporting file sharing on macOS networks. __________ works over TCP port 548.

video card

Provides the interface between the graphics components of the computer and the display device. A number of connectors may be provided for the display, including VGA, DVI, and HDMI. Most adapters come with their own processor (Graphics Processing Unit[GPU]) and onboard memory.

SC (Subscriber Connector)

Push/pull connector used with fiber optic cabling.

challenge question

Questions asked, usually through software but sometimes from a help desk staff member, that only the end-user can answer. A feature of multifactor authentication or for account recovery.

open questions

Questions that guide the customer to telling you what will be most helpful in resolving their issue.

RF (Radio Frequency)

Radio waves propagate at different frequencies and wavelengths. Wi-Fi network products work at 2.4 GHz or5 GHz.

backup

Recovery of data can be provided through the use of a ____________ system. Most ____________ systems provide support for tape devices. This provides a reasonably reliable and quick mechanism for copying critical data. Different ___________ types (full, incremental, or differential) balance media capacity, time required to backup, and time required to restore.

register

Registers are temporary storage areas in the CPU that can hold data prior to processing by the Arithmetic Logic Unit(ALU) and other components of the processor. A CPU can incorporate a number of different registers, but the most important are the General Purpose(GP) registers.

GP registers (General Purpose registers)

Registers that store data from the CPU's basic instruction set. 32-bit processors have 32-bit GP registers for the x86/IA-32 instruction set;64-bit processors are so-called because they have 64-bit GP registers. CPUs also support larger registers to optimize graphics processing.

electrostatic latent image

Representation of the image to be printed created as a series of raster lines with charge/no-charge areas.

registration roller

Roller equipped with a sensor that feeds paper into the print engine.

pickup roller

Roller that turns above a stack of paper to feed a sheet into the feed roller.

feed roller

Roller that works with a separation roller or pad to feed just one sheet of paper (or other media) into the printer mechanism.

transfer unit

Roller, corona wire, or belt assembly that applies a charge to the media (paper) so that it attracts toner from the photoconductor. A detac strip then removes the charge to prevent paper curl. On a color laser printer, the transfer unit is usually a belt.

vector graphics

Scalable images that are created from vectors which describe how a line should be drawn.

BYOD (Bring Your Own Device)

Security framework and tools to facilitate use of personally owned devices to access corporate networks and data.

feature updates

Semi-annual updates to the Windows operating system that include enhanced features that are installed in multiple phases, requiring a reboot after each phase of the update installation. Compare with quality updates.

light sensors

Sensors in a mobile device used to dim and brighten the display based on ambient conditions.

factory default reset

Setting a mobile device back to the original factor settings, creating a clean OS, removing all data and apps, and resetting any configuration done by the user

security template

Settings for services and policy configuration for a server operating in a particular application role (web server, mail server, file/print server, and so on). In Windows, the current configuration can be compared to the baseline defined in a security template using the Security Configuration and Analysis tool.

LC (Lucent Connector)

Small Form Factor version of the SC push-pull fiber optic connector; available in simplex and duplex versions.

regex (regular expressions)

Strings of characters that denote a word, a set of words, or a sentence.

DTLS (Datagram Transport Layer Security)

TLS used with UDP applications, such as some VPN solutions.

haptic feedback

Tactile response on a touchscreen device, typically a slight vibration of the surface, although the entire device can vibrate in certain responses.

professionalism

Taking pride in one's work and in treating people fairly.

CIRT/ CSIRT (Cyber Incident Response Team/ Computer Security Incident Response Team)

Team with responsibility for incident response. The ____________ must have expertise across a number of business domains (IT, HR, legal, and marketing, for instance).

BSSID (Basic Service Set Identifier)

The MAC address of the access point.

MD5 (Message Digest Algorithm v5)

The Message Digest Algorithm was designed in1990 by Ronald Rivest, one of the "fathers" of modern cryptography. The most widely used version is MD5, released in 1991,which uses a 128-bit hash value.

PPPoA (PPP over ATM)

The PPP protocol is used with the ATM transport protocol by DSL providers.

Task Scheduler

The Task Scheduler is a Windows program that enables the user to perform an action(such as running a program or a script)automatically at a pre-set time or in response to some sort of trigger.

vCard

The digital equivalent of a business card.

cron table

The file (crontab) in Linux that contains instructions defining the tasks to be executed by a cron.

x86-32

The instruction set used by IBM PC compatible CPUs.

local bus

The internal bus that links components directly to the processor, resulting in the highest possible data speed as required by components such as the video display.

Process ID (PID)

The number assigned to a process.

port number

The number between 0 and 65535 assigned to each type of network application so that the transport layer can identify it.

resolution (digital camera)

The number of megapixels a digital camera is capable of producing.

frame rate

The number of times the image in a video stream changes per second. This can be expressed in Hertz or Frames per Second (fps).

keyboard

The oldest PC input device and still fundamental to operating a computer. There are many different designs and layouts for different countries. Some keyboards feature special keys.

App Store

The online site where Apple users can purchase or get free apps have been submitted to and approved by Apple before they are released to users.

relative path

The path relative to the current working directory.

SMTP (Simple Mail Transfer Protocol)

The protocol used to send mail between hosts on the Internet. Messages are sent over TCP port 25.

WYSIWYG (What You See Is What You Get)

The screen and print output are supposed to be the same.

MAC address table

The table on a switch keeping track of MAC addresses associated with each port. As the switch uses a type of memory called Content Addressable Memory (CAM), this is sometimes called the CAM table.

hash (hash value or message digest)

The value that results from hashing encryption as a short representation of data.

frequency response

The volume that can be produced at different frequencies.

installation boot method

The way in which the installation program and settings are loaded onto the PC.

data type

The way the data is intended to be used in a program such as character or string, integer, real number, logical, or Boolean.

firmware

This refers to software instructions stored semi-permanently (embedded) on a hardware device. Modern types of firmware are stored in flash memory and can be updated more easily than legacy programmable Read Only Memory (ROM) types.

pattern lock

To access a locked device, the user must trace a predetermined pattern on screen, or join the dots.

rainbow table

Tool for speeding up attacks against Windows passwords by precomputing possible hashes.

network mapping

Tools used to gather information about the way the network is built and configured and the current status of hosts.

root directory

Top of the file directory structure on a drive.

PSU (Power Supply Unit)

Transformer that converts AC mains power into 3.3 V, 5 V, and 12 V DC to power components on the motherboard. The type of PSU must match the case and motherboard form factor.

respect

Treating others and their property as you would like to be treated.

dual heat pipe

Two heat pipe tubes to provide better cooling.

EFS (Encrypting File System)

Under NTFS, files and folders can be encrypted to ensure privacy of the data. Only the user who encrypted the file can subsequently open it.

updates

Updates are made freely available by the software manufacturer to fix problems in a particular software version, including any security vulnerabilities. Updates can be classified as hotfixes (available only to selected customers and for a limited problem), patches (generally available),and service packs (installable collections of patches and software improvements).

guideline

Used for areas of policy where there are no procedures either because the situation has not been fully assessed or because the decision making process is too complex and subject to variables to capture it in a procedure.

branch

Used to control the flow within a computer program or script, usually based on some type of logic condition. Often implemented with If or Goto statements.

voltage regulators

Voltage Regulator Modules ensure that the motherboard delivers the voltage required by the CPU. When CPUs changed from 5 V to 3.3 V operation, VRMs were provided as plug-in modules. Most modern CPUs use around 1.5 - 2 V and the voltage regulators are built into the motherboard.

EAPoL (Extensible Authentication Protocol over LAN)

What is another term for EAP?

PAT (port address translation)

What is another term for NAT overloading or NAPT?

virtual assistant

What is another term for a digital assistant?

kill switch

What is another term for remote wipe?

x86-64

What is another term for the AMD64 instruction set?

superuser

What is another term for the root user?

swipe lock

What is another term for unlocking a device by tracing a predetermined on screen pattern or joining dots on screen?

WoL (Wake on LAN)

Where a host has a compatible network card, a network server can be configured to transmit a "magic packet" that causes the host to power up.

infrastructure mode

Wi-Fi network configuration in which each client device or station is configured to connect to the network via an access point.

pseudocode

Writing out a program sequence using code blocks but without using the specific syntax of a particular programming language.

blaster (see IR)

_____________ was a computer worm that spread on computers running operating systems Windows XP and Windows 2000 during August 2003. The worm was first noticed and started spreading on August 11, 2003. The rate that it spread increased until the number of infections peaked on August 13, 2003.

AMD64

______________-bit instruction set that was also adopted by Intel for its 64-bit desktop and mobile line. Intel refers to it as EM64T or Intel 64.

UNIX

________________ is a family of more than 20 related operating systems that are produced by various companies. It can run on a wide variety of platforms. ________________ offers a multitude of file systems in addition to its native system. UNIX remains widely deployed in enterprise data centers to run mission critical applications and infrastructure.

NetBIOS (see also NetBEUI)

________________ is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks. WINS provides NetBIOS name resolution.

Keychain

macOS app for managing passwords cached by the OS and supported browser/web applications.

dock

macOS feature for managing applications from the desktop, similar to the Windows taskbar.

chassis (see system case)

the outer structural framework of a piece of audio, radio, or computer equipment.

Quick Response codes (see QR codes)

Google Later!!

imaging drum (see EP drum)

Google Later!!

ink jet printer (see ink dispersion printer)

Google Later!!

message digest (see MD5)

Google Later!!

mobile hotspot (see tethering)

Google Later!!

processor (see CPU)

Google Later!!

static eliminator (see detac corona)

Google Later!!

working directory (see current working directory)

Google Later!!

x64 (see x86-64)

Google Later!!

pagefile (see virtual memory)

Google it later!!

primary charge roller (see cleaning unit)

Google it later!!

range extender (see wireless range extender)

Google it later!!

relational operators (see comparison operator)

Google it later!!

mobo (see motherboard)

Google it!

multiport repeater (see hub)

Google it!!

rescue disk (see recovery disc)

Google it!!

spear whaling (see whaling)

Google it!!

sideload (see Android application package)

Google later

transfer roller (see transfer unit)

Google later!

SOP (Standard Operating Procedure) (see procedure)

Google later!!

main board (see motherboard)

Google later!!

switches (see options)

Google later!!

system board (see motherboard)

Google later!!

system restore (see restore points)

Google later!!

thrashed (see disk thrashing)

Google later!!

threat actor (see threat agent)

Google later!!

rotational latency

The time it takes for the read/write head to find a sector location.

HTTPS (HTTP Secure)

) A protocol that provides for encrypted transfers, using SSL/TLS and port 443.

FTTP (Fiber to the Premises

A fiber optic solution which places the connection inside the premises.

Windows Resource Protection

A Windows feature that prevents essential system files, folders, and registry keys from being replaced to help prevent application and operating system failure.

VGA Connector (Video Graphics Array connector)

A 15-pinHD connector has been used to connect the graphics adapter to a monitor since1987. The use of digital flat-panel displays rather than CRTs means that as an analog connector, it is fast becoming obsolete.

QR codes (Quick Response codes)

A 2D barcode created of black and white squares used to store information that can be read using a barcode scanner or the camera on a smartphone that has a barcode scanning app installed.

passive cooling device

A CPU generates a large amount of heat that must be dissipated to prevent damage to the chip. Generally, a CPU will be fitted with a heatsink (a metal block with fins) and fan. Thermal compound is used at the contact point between the chip and the heatsink to ensure good heat transfer. The PSU also incorporates a fan to expel warm air from the system. Modern motherboards have temperature sensors that provide warning of overheating before damage can occur. Very high performance or overclocked systems or systems designed for quiet operation may require more sophisticated cooling systems, such as liquid cooling. Cooling systems that work without electricity are described as passive; those requiring a power source are classed as active.

Gov Cloud

A Google cloud service that can be used by branches of the U.S. government, but is not available to other consumers or businesses.

iCloud Keychain

A Keychain feature that makes the same passwords securely available across all macOS and iOS devices.

distro (see distribution)

A Linux distribution (often abbreviated as distro) is an operating system made from a software collection that is based upon the Linux kernel and, often, a package management system.

shell script

A Linux file that contains a list of commands to be read and executed by the shell.

cron

A Linux/ Unix daemon that runs in the background and executes specified tasks at a designated time or date.

Family Safety Settings

A Microsoft Windows setting that helps protect children by limiting their access to functions and features.

NFC (Near Field Communications)

A Standard for peer-to-peer (2-way) radiocommunications over very short (around4") distances, facilitating contactless payment and similar technologies. NFC is based on RFID.

backup power generator

A Standby Power Supply fueled by diesel or propane. In the vent of a power outage, a UPS must provide transitionary power, as a backup generator cannot be cut-in fast enough.

POP 3 (Post Office Protocol)

A TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server. The server usually deletes messages once the client has downloaded them. POP3 utilizes TCP port 110.

mobile VPN

A VPN that can maintain the VPN link across multiple carrier networks, where the IP address assigned to the mobile device may change often.

mobile VR headset (mobile Virtual Reality headset)

A VR device designed to be used with specific smartphones.

Wi-Fi analyzer

A Wi-Fi spectrum analyzer used to detect devices and points of interference, as well as analyze and troubleshoot network issues on a WLAN or other wireless networks.

onboard adapter

A low-end adapter included with the motherboard or as part of the CPU itself.

NTFS (NT File System)

A Windows file system that supports a 64-bit address space and is able to provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.

MAPI (Message Application Programming Interface)

A Windows messaging interface used primarily by the email client software Outlook to communicate with an Exchange mail server.

Remote Assistance

A Windows remote support feature allowing a user to invite a technical support professional to help them over a network using chat. The user can also grant the support professional control over their desktop. Remote Assistance uses the same RDP protocol as Remote Desktop.

boot sector (see Volume Boot Record (VBR))

A ______________ is the sector of a persistent data storage device (e.g., hard disk, floppy disk, optical disc, etc.) which contains machine code to be loaded into random-access memory (RAM) and then executed by a computer system's built-in firmware (e.g., the BIOS).

brownout

A __________________ occurs when the power that is supplied by the electrical wall socket is insufficient to allow the computer to function correctly. _________________ are long sags in power output that are often caused by overloaded or faulty mains distribution circuits or by a failure in the supply route from electrical power station to a building.

file attribute

A characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users.

kernel

A low-level piece of code responsible for controlling the rest of the operating system.

RFID (Radio Frequency Identification)

A chip allowing data to be read wirelessly. RFID tags are used in barcodes and smart cards.

barcode scanner

A barcode reader is a handheld r pen-shaped device designed to scan barcodes. A barcode is a pattern of different sized parallel bars, typically representing a product number, such as an ISBN, EAN, or UPC. The reader uses a sensor mechanism (typically either a photo diode, laser, or CCD) to read the intensity of light reflected back by the barcode. The reader then reports the number back to application software, which links it to a product database.

FAT (File Allocation Table)

A basic disk format allowing the OS to write data as files on a disk. The original 16-bit version (FAT16, but often simply called FAT) was replaced by a32-bit version that is almost universally supported by different operating systems and devices. A 64-bit version (exFAT) was introduced with Windows 7 and is also supported by XP SP3 and Vista SP1 and some versions of Linux and macOS. There is also a 12-bit version used to format floppy disks.

clock battery (see RTC battery)

A battery that maintains the time, date, hard disk and other configuration settings in the CMOS memory.

face lock

A biometric authentication mechanism in which the hash is computed from a picture of the user's face.

raster (see also Raster Image Processing)

A bitmap image of a page for printing.

thick client (standard client or a fat client)

A business computer that performs most or all computing functions on its own.

thin client

A business computer that relies heavily on another system, typically a server, to run most of its programs, processes, and services.

HFC Cable (Hybrid Fiber Coax cable)

A cable Internet connection is usually available along with a cable telephone/television service (Cable Access TV [CATV]). These networks are often described as Hybrid Fiber Coax (HFC)as they combine a fiber optic core network with coax links to consumer premises equipment, but are more simply just described as "cable." Consumers interface with the service via a cable "modem"(actually functioning more like a bridge).

MDF(Main Distribution Frame)

A cable rack that interconnects external communication cables and the cables that comprise the internal network.

Windows LPL catalog (Windows Logo'd Product List catalog)

A catalog of devices and drivers that have been tested to ensure they are compatible with the Windows 7 operating system.

MMF (Multimode Fiber)

A category of fiber optic cable. Compared to SMF, MMF is cheaper(using LED optics rather than lasers), but supports shorter distances (up to about 500 m).

SMF (Single Mode Fiber)

A category of fiber optic cable. SMF is more expensive than MMF (using high quality cable and optics)and supports much longer distances (up to about 70 km).

escape character

A character used to allow alternate use of a reserved character within a particular programming language. The escape characters vary between programming languages. Often used to allow use of a reserved character within a string.

aspect ratio

A characteristic of display devices that indicates the ratio of width to height.

key fob

A chip implanted in a plastic fob. The chip can store authentication data (such as a digital certificate) that can be read when put in proximity to a suitable scanner. Another use for fobs is to generate a One Time Password, valid for a couple of minutes only and mathematically linked to a code generated on a server.

daughter board

A circuit board that connects to the motherboard to provide extra expansion slots or connectors. Typically, these are used in slimline case designs so that adapter cards can be installed parallel to the motherboard, reducing the height of the case.

fuse

A circuit breaker designed to protect the device and users of the device from faulty wiring or supply of power (over current protection).

ALU (Arithmetic Logic Unit)

A circuit in the CPU that performs integer-based calculations and performs bit-wise logical calculations.

PRI (Primary Rate Interface)

A class of ISDN service that provides either T1 or E1capacity levels (23B or 30B) channels, depending on location in the world, and one 64 Kbps D channel.

BRI (Basic Rate Interface)

A class of ISDN service that provides two 64 Kbps (B channels) for data and one 16 Kbps (D channel) for link management control signals.

IaaS (Infrastructure as a Service)

A cloud computing service that enables a consumer to outsource computing equipment purchases and running their own data center.

SaaS (Software as a Service)

A cloud computing service that enables a service provider to make applications available over the Internet.

PaaS (Platform as a Service)

A cloud computing service that enables consumers to rent fully configured systems that are set up for specific purposes.

resource pooling

A cloud provider's data center hardware is not dedicated or reserved for a particular customer account, allowing the provider to provision more resources through management software rather than physically altering hardware to allocate or deallocate resources for a customer.

cloud-based network controller

A cloud-based management system that enables registering and monitoring all of the organization's networks, clients, and servers.

protocol suite

A collection of several protocols used for networking are designed to work together.

security group

A collection of user accounts that can be assigned permissions in the same way as a single user object.

additive color printing

A color printing method that combines differently colored transmitted light to form different shades.

gpupdate

A command line tool to apply a new or changed policy immediately. When used with the /force option, it causes all policies(new and old) to be reapplied.

distribution

A complete Linux implementation, including kernel, shell, applications, and utilities, that is packaged, distributed, and supported by a software vendor.

HBA (host bus adapter)

A component allowing storage devices to exchange data with a computer system using a particular interface (PATA, SATA, SCSI, and so on).Motherboards will come with built-in host adapters and more can be added as expansion cards if necessary.

cellular radio

A component in a mobile device that is capable of switching frequencies automatically when moving between network cells without losing the connection.

resistor

A component that opposes the flow of current without blocking it completely and is used to manage electronic circuits.

digital display

A computer monitor that accepts a digital signal. Flat-panel monitors use digital signals and only support lower resolutions by interpolating the image, which can make it appear fuzzy.

analog display

A computer monitor that accepts continuously varying signals. CRT monitors use analog signals and are capable of supporting several output resolutions without losing quality.

identifier

A computer programming component used to access program elements such as a stored value, class, method, or interface.

embedded system

A computer system that is designed to perform a specific, dedicated function, such as a microcontroller in a medical drip or components in a control system managing a water treatment plant.

legacy system

A computer system that is no longer supported by its vendor and so no longer provided with security updates and patches.

media center

A computer used for media streaming, often connected to surround sound speakers, and capable of recording TV shows.

corporate mail gateway

A connection between mail servers that use different communications protocols or between two networks that use the same or different protocols.

RJ connector (Registered Jack connector)

A connector used for twisted pair cabling. 4-pairnetwork cabling uses the larger RJ-45connector. Modem/telephone 2-paircabling uses the RJ-11 connector.

recovery image

A custom image that contains the current state of the operating system files, plus all of the desktop applications installed to the boot partition.

I/O port

A device connection through which data can be sent and received.

memory card reader

A device containing one or more slots to accommodate reading (and writing) memory cards.

PDU (power distribution unit)

A device designed to provide power to devices that require power, and may or may not support remote monitoring and access.

FTTH(Fiber to the Home)

A fiber optic solution which places the connection inside the home or residence.

HDD (Hard Disk Drive)

A device providing persistent mass storage for a PC (saving data when the computer is turned off).Data is stored using platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors). A HDD installed within a PC is referred to as the fixed disk. HDDs are often used with enclosures as portable storage or as Network Attached Storage (NAS).

line conditioner

A device that adjusts voltages in under-voltage and over-voltage conditions to maintain a 120 V output.

hot swappable

A device that can be added or removed without having to restart the operating system.

headset

A device that combines headphones and microphone in a single device.

USB hub

A device that connects to a USB port to allow additional USB devices to be connected to the PC, essentially increasing the number of USB ports available.

duplexing assembly

A device that enables a printer or scanner to use both sides of a page automatically.

AP (Access Point)

A device that provides connectivity between wireless devices and a cabled network. APs with Internet connectivity located in public buildings(cafes, libraries, and airports, for instance)are often referred to as hotspots.

distribution frame

A device that terminates cables and enables connections with other devices.

smart card reader

A device, either built-in or attached as a peripheral, that uses a slot or NFC to interact with a smart card.

fingerprint sensor

A device, usually integrated into a mobile device, that reads the user's fingerprint to determine whether to grant access to the device.

ISDN (Integrated Services Digital Network)

A digital phone/fax/data service used to provide Internet connectivity. There are two classes of ISDN: Basic Rate Interface(BRI) provides two 64 Kbps (B channels) for data and one 16 Kbps (D channel) for link management control signals; Primary Rate Interface (PRI) provides either T1 or E1capacity levels (23B or 30B) channels, depending on location in the world, and one 64 Kbps D channel.

home directory

A directory where you are placed when you log in to a Linux system. It is typically represented by the ~ symbol.

slipstreamed media

A disc-based installation that has all of the various updates, patches, and drivers included along with the original installation files.

disk striping

A disk array access pattern where data is written in stripes to two or more disks sequentially, improving performance. Note that a RAID 0 striped volume provides no redundancy, and if any of the physical disks in the set fails, the whole volume will be lost.

gloss coating

A display coating that helps the display appear richer, but reflects more light, which can cause problems with screen glare and reflections of background objects. Compare with matte coating.

matte coating

A display coating that is best suited to office work. Compare with gloss coating.

antiglare cover

A display cover to deal with ambient lighting issues on the display.

touchscreen

A display screen combined with a digitizer that is responsive to touch input.

LCD panel (Liquid Crystal Display panel)

A display technology where the image is made up of liquid crystal cells controlled using electrical charges. LCD panels are used on laptops and have replaced CRT monitors as the main type of computer display screen.

image

A duplicate of an operating system installation (including installed software, settings, and user data) stored on removable media. Windows makes use of image-based backups and they are also used for deploying Windows to multiple PCs rapidly.

power redundancy

A duplicate power source to be used incase one power source is unavailable.

mask

A face covering, usually made of cloth, plastic, or rubber, that fits over your mouth and nose should be worn when you are using a compressed air canister, working around toner spills, or working in an otherwise dusty environment. A mask minimizes the risk of inhaling damaging airborne particles.

Ethernet

A family of networking technologies that provide connectivity by using Ethernet network adapters, contention-based media access, and twisted pair, coax, or fiber media.

tab completion

A feature in Linux that facilitates autocompletion of commands and file names by pressing Tab.

PXE (Preboot Execution Environment)

A feature of a network adapter that allows the computer to boot by contacting a suitably configured server over the network (rather than using a local hard disk).

SLAT (Second Level Address Translation)

A feature of virtualization software designed to improve the management of virtual(paged) memory.

multiple desktops (see Mission Control)

A feature that enables users to set up one or more desktops with different sets of apps, backgrounds, and so on.

FTTC (Fiber to the Curb/Cabinet)

A fiber optic solution which places the connection on a pole or cabinet at the curb, then coax or twisted pair cables carry the signal from this point to the home or business.

FTTN(Fiber to the Node)

A fiber optic solution which places the connection within one mile of customers with the final connections made using existing phone or cable lines.

XPS (XML Print Specification)

A file format based on XML that describes one or more pages and how the information should appear on the page.

CSV (Comma Separated Values)

A file format in which data is stored using commas or another character to separate fields in the data. Typically, data has been exported from a spreadsheet or a database.

exFAT

A file system designed for flash memory cards and memory sticks.

ISO file

A file that contains all of the contents from an optical disc in a single file which can be mounted to the file system as though it were a physical optical drive.

privacy filter

A filter to fit over a display screen so that it can only be viewed straight-on.

privacy screen

A filter to fit over a display screen so that it can only be viewed straight-on.

personal firewall

A firewall implemented as applications software running on the host. Personal software firewalls can provide sophisticated filtering of network traffic and also block processes at the application level. However, as a user-mode application they are more vulnerable to attack and evasion than kernel mode firewalls or network firewall appliances.

network firewall

A firewall placed inline in the network that inspects all traffic that passes through it.

patch

A fix or update for a software program or application, designed to eliminate known bugs or vulnerabilities and improve performance.

vector font

A font that consists of a description of how each character should be drawn that can be scaled up or down to different font sizes.

whaling

A form of phishing that targets individuals who are known or are believed to be wealthy.

shoulder surfing

A human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN.

barcode label

A label containing a UPC code. Can be affixed to tangible assets for identification in an asset management system.

video projector

A large format display in which the image is projected onto a screen or wall using a lens system.

WWAN (Wireless Wide Area Network)

A large wireless network, such as a cellular data network or line-of-sight microwave transmission.

virtual file system

A layer that sits between the actual filesystem and the kernel. It identifies the location of the persistent root partition from the appropriate storage device and loads the file system stored on the disk.

SCSI (Small Computer System Interface)

A legacy expansion bus standard allowing for the connection of internal and external devices. SCSI 1 defines the original 8-bitbus with a transfer rate of 5 MBps. SCSI 2features a 16-bit data bus implementation(Wide SCSI) and a faster transfer rate (Fast SCSI) while maintaining backward compatibility with most of the original devices. SCSI 3 introduces further data rate enhancements (Ultra SCSI) and a serial SCSI standard (Firewire). Each device on a SCSI bus must be allocated a unique ID. The bus must also be terminated at both ends.

T568A

A legacy twisted pair standard that was used in commercial buildings and cabling systems that support data networks, voice, and video. It further defines cable performance and technical requirements.

back haul

A link or transit arrangement with another ISP to connect each Point of Presence to their core network infrastructure and one or more IXPs.

Local Security Accounts database

A local (non-network) database where local system account information is stored. In Windows systems, this is the SAM database, and in Linux systems the information is stored in the /etc/passwdor /etc/shadow file.

network drive

A local share that has been assigned a drive letter.

hotspot

A location served by some sort of device offering Internet access via Wi-Fi.

NVMHCI (Non-Volatile Memory Host Controller Interface Specification)

A logical interface used by PCIe-based SSD drives to communicate with the bus.

AHCI (Advanced Host Controller Interface)

A logical interface used by SATA drives to communicate with the bus.

VLAN (Virtual LAN)

A logically separate network, created using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate.

APIPA (Automatic Private IP Addressing)

A means for Windows clients configured to obtain an address automatically that could not contact a DHCP server to communicate on the local subnet. The host randomly selects an address from the range 169.254.x.y. This is also called a link-local address.

authentication

A means for a user to prove their identity to a computer system. _______________________________ is implemented as either something you know (a username and password),something you have (a smart card or key fob), or something you are (biometric information). Often, more than one method is employed (2-factor ________________________).

NAC (Network Access Control)

A means of ensuring endpoint security—ensuring that all devices connecting to the network conform to a "health" policy (patch level, antivirus/firewall configuration, and so on).NAC can work on the basis of pre- or post-admission control. The core components are an agent running on the client, policy enforcers (network connection devices such as switches and access points), and policy decision points (NAC policy server and AAA/RADIUS server).

change management

A means of putting policies in place to reduce the risk that changes to information and communications technology infrastructure components could cause service disruption.

standard

A measure by which to evaluate compliance with a policy.

external transfer rate

A measure of how fast data can be transferred to the CPU across the bus.

internal transfer rate (data or disk transfer rate)

A measure of how fast read/write operations are performed on the disk platters.

resolution

A measure of the number of picture elements (pixels) that an imaging device can use to sample or display the image, measured in pixels per inch (ppi). On a digital printer, the resolution is the number of toner or ink dots that the print engine can put on paper (measured in dots per inch [dpi]). Note that sometimes dpi is used interchangeably with ppi to describe scanner or monitor resolution, but image pixels and printer dots are note quivalent, as multiple print dots are required to represent a single image pixel accurately.

contrast ratio

A measure of the ratio of luminance (brightness) of whites to blacks, indicating the color performance of a display or scanner. A device supporting a higher ___________________ is able to display a wider range of colors and deliver "true" black.

WEP (Wired Equivalent Privacy)

A mechanism for encrypting data sent over a wireless connection. WEP is considered flawed (that is, a determined and well-resourced attack could probably break the encryption).Apart from problems with the cipher, the use and distribution of a pre-shared key(effectively a password) depends on good user practice. WEP has been replaced by WPA.

contention (competitive media access)

A media access method in which nodes compete or cooperate among themselves for media access time.

early-life failure rate

A method of calculating how quickly a device will fail through accelerated testing.

hardware RAID solution

A method of creating volumes from an array of physical disks by using a plug-in controller card or the motherboard, independently of the installed OS.

Remote Credential Guard

A method of mitigating the risk of using Remote Desktop.

VSAT (Very Small Aperture Terminal)

A microwave antenna aligned to an orbital satellite that can either relay signals between sites directly or via another satellite.

GPT (GUID Partition Table)

A modern disk partitioning system allowing large numbers of partitions and very large partition sizes.

Denial of Service (DoS)

A network attack that aims to disrupt a service, usually by overloading it.

intranet

A network designed for information processing within a company or organization. An intranet uses the same technologies as the Internet but is owned and managed by a company or organization.

DSLAM (DSL Access Multiplier)

A network device at the telecommunications central office that connects subscribers with the Internet.

modem (modulator/ demodulator)

A network device that is used to interface a computer with the telephone network for data and fax communications, modulating digital data for transmission as an analog signal and demodulating incoming analog transmissions. Broadband modems are used to transmit signals over telephone(DSL) or cable TV networks.

router

A network device that links dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic loads, and cost. A router works at layer 3(Network) of the OSI model. Routers form the basic connections of the Internet. They allow data to take multiple paths to reach a destination (reducing the likelihood of transmission failure). Routers can access source and destination addresses within packets and can keep track of multiple active paths within a given source and destination network. TCP/IP routers on a LAN can also be used to divide the network into logical subnets.

LAN (Local Area Network)

A network in which all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media.

botnet

A network of computers that have been compromised by Trojan, rootkit, or worm malware. Providing the _________ can also subvert any firewalls between the controller (or herder) and the compromised computers (zombies), so that they can be remotely controlled and monitored using covert channels.

extranet

A network of semi-trusted hosts, typically representing business partners, suppliers, or customers. Hosts must authenticate to join the extranet.

Windows Server

A network operating system typically used for private network servers and Internet servers running web, email, and social networking apps.

NAT (Network Address Translation)

A network service provided by router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is most commonly implemented as Network Address Port Translation (NAPT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations.

DNS (Domain Name System)

A network service that provides names to IP address mapping services on the Internet and large intranets. DNS name servers host the database for domains for which they are authoritative. Root servers hold details of the top-level domains. DNS resolvers perform queries or lookups to service client requests. The DNS protocol utilizes TCP/UDP port 53.

WAN (Wide Area Network)

A network that spans multiple geographic locations.

closed network

A network where the elements of the network are all known to the system vendor and there is no connectivity to wider computer data networks.

DHCP Server(Dynamic Host Configuration Protocol server)

A networking service that allows a client to request an appropriate IP configuration from a server. The server is configured with a range of addresses to lease. Hosts can be allocated an IP address dynamically or be assigned a reserved IP address, based on the host's MAC address. The server can also provide other configuration information, such as the location of DNS servers. DHCP utilizes UDP ports 67 and 68. It is important to monitor the network to ensure that only valid DHCP servers are running on the network.

eSATAp

A non-standard powered port used by some vendors that is compatible with both USB and SATA (with an eSATAp cable).

MEID (Mobile Equipment ID)

A number that uniquely identifies a mobile device on a CDMA network.

IMEI number (International Mobile Equipment Identity number)

A number that uniquely identifies a mobile device on a GSM network.

IMSI number (International Mobile Subscriber Identity number)

A number that uniquely identifies a mobile subscriber.

antistatic bag

A packaging material containing anti-ESD shielding or dissipative materials to protect components from ESD damage.

unicast addressing

A packet addressed to a single host. If the host is not on the local subnet, the packet must be sent via one or more routers.

LTE (Long Term Evolution)

A packet data communications specification providing an upgrade path for both GSM andCDMA2000 cellular networks. LTE Advanced is designed to provide 4Gstandard network access.

broadcast address

A packet sent to all hosts on the local network (or subnet). Routers do not ordinarily forward broadcast traffic. The _________________________ of IP is one where the host bits are all set to 1; at the MAC layer, it is the address ff:fff:ff:ff:ff:ff.

mount point

A partition or volume mapped to a folder in another file system rather than allocated a drive letter.

heat sink

A passive heat exchanger that dissipates heat from a source such as a CPU and transfers it, normally via an enlarged surface area, to another medium such as air or water.

OTP (one time password)

A password that is generated for use in one specific session and becomes invalid after the session ends.

thermal paste

A paste that is used to connect a heat sink to a CPU to provide a liquid thermally conductive compound gel that fills any gaps between the CPU and the heat sink to permit a more efficient transference of heat from the processor to the heat sink.

pointing device

A peripheral used to move a cursor to select and manipulate objects on the screen.

threat agent

A person or event that triggers a vulnerability accidentally or exploits it intentionally.

SSD (solid state drive)

A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.

joystick

A pivoting stick or lever attached to a base that is used to control movement on a device.

bitmap image data

A pixel-by-pixel image sent to a printer to print a file.

backout plan

A plan defined ahead of making any moves, adds, or changes so that in case unforeseen problems arise when the change is made, there is a plan to put things back as they were before making the change.

system case

A plastic and metal box that houses components such as the motherboard, Central Processing Unit (CPU), memory, adapter cards, disk drives, and power supply unit. System units are also often referred to as boxes, main units, or base units.

AUP (Acceptable Use Policy)

A policy that governs employees' use of company equipment and Internet services. ISPs may also apply _______ to their customers.

photopolymer

A polymer material that is sensitive to light, and changes its properties when exposed to a light source.

Gnome

A popular Linux GUI desktop.

female port

A port that has hole connectors.

male port

A port that has pin connectors.

keyed port

A port with physical attributes that prevent a connector from being inserted into the port the wrong way around.

laptop

A portable computer offering similar functionality to a desktop computer. Laptops come with built-in LCD screens and input devices (keyboard and touchpad), and can be powered from building power (via an AC adapter) or by a battery.

RFID tag

A tag containing an RFID chip programmed with asset data.

swap partition

A portion of the hard disk that is formatted with a minimal kind of file system and used in situations when Linux runs out of physical memory and needs more of it. It can only be used by the memory manager and not for storage of ordinary data files.

Molex connector

A power connector that is used to supply power to Parallel Advanced Technology Attachment (PATA) drives, optical drives, and SCSI drives.

OCP (Overcurrent Protection)

A power supply rail safety feature that cuts the circuit if the power exceeds a safe limit.

dual rail

A power supply with two +12 V rails.

uncollated

A print job where all copies of page 1 are printed first, followed by all copies of page2, and so on.

Collated

A print job where all pages of the first copy are printed, followed by all pages of the next copy.

expansion cards

A printed circuit board that is installed in a slot on a system board to provide special functions for customizing or extending a computer's capabilities. Also referred to as adapter card, I/O card, add-in, add-on, or board.

thermal wax transfer printer

A printer that uses a thermal printhead to melt wax-based ink from a transfer ribbon onto the paper.

3D print process

A printing process that builds a solid object from successive layers of material.

DMZ (Demilitarized Zone)

A private network connected to the Internet must be protected against intrusion from the Internet. However, certain services may need to be made publicly accessible from the Internet (web and email, for instance).One solution is to put such servers in a DMZ. The idea of a DMZ is that traffic cannot pass through it. If communication is required between hosts on either side of a DMZ, a host within the DMZ acts as a proxy. It takes the request and checks it. If the request is valid, it re-transmits it to the destination. External hosts have no idea about what (if anything) is behind the DMZ. A DMZ is implemented using either two firewalls (screened subnet) or a single three-legged firewall (one with three network ports).

home folder

A private network storage area located in a shared network server folder in which users can store personal files.

backed up print queue

A problem situation where there are lots of jobs pending but not printing.

agent

A process running on an SNMP compatible network device that sends information to an SNMP manager.

background

A process that runs without a window and does not require any sort of user interaction.

ZIF socket (Zero Insertion Force socket)

A processor socket type allowing the chip to be placed in the socket with as little risk of damaging the pins on the processor chip as possible.

microprocessor

A programmable integrated circuit (IC).

IDE (Integrated Development Environment)

A programming environment that typically includes a code editor containing an autocomplete feature to help you write code, a debugger to help you find coding errors, and an interpreter that translates the script file code into machine readable code the computer can execute.

scripting language

A programming language that is interpreted rather than compiled.

NetBEUI

A proprietary Microsoft network transport protocol typically found in non-routed networks. Fast and efficient, but not widely supported by third parties. Largely forgotten in these days of TCP/IP.

SNMP (Simple Network Management Protocol)

A protocol for monitoring and managing network devices. A management system collates data sent by agents running on each device. The agents maintain a Management Information Base of configuration and usage data. An agent can also generate a trap, alerting the management system of some notable event (such as a printer being out of paper). SNMP works over UDP ports 161and 162 by default.

UPnP (Universal Plug-and-Play)

A protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

measured service

A provider's ability to control and bill a customer's use of resources such as CPU, memory, disk, and network bandwidth through metering.

ticket

A record created when an incident occurs, or move, add, or change is requested, so that progress on resolving or completing the task can be documented.

MACs (Moves, adds, changes)

A record of any requested moves, adds, or changes to computers, devices, users, or related policies.

repeater

A repeater is a layer 1 device that takes a signal and repeats it to the devices that are connected to it. Repeaters can be used to maintain signal integrity and amplitude across a connection or a network.

Wi-Fi Direct

Technology that enables two mobile devices to connect to each other without a wireless access point.

heat pipe

A sealed tube containing water or ethanol coolant. The liquid close to the heat source evaporates then condenses at a cooler point in the pipe and flows back towards the heat source.

Windows Certified Products List

A searchable database of hardware devices that have been tested to ensure they are compatible with the Windows 10operating system.

KB (Knowledge Base)

A searchable database of product FAQs (Frequently Asked Questions), advice, and known troubleshooting issues. The Microsoft KB is found at support.microsoft.com.

routine

A section of code within a program to be used repeatedly for a specific task and is usually independent from the rest of the code within the program.

mantrap

A secure entry system with two gateways, only one of which is open at any one time.

surge protector

A simple device intended to protect electrical devices against the damaging effects of a power spike.

port replicator

A simple device to extend the range of ports (for example, USB, DVI, HDMI, Thunderbolt, network, and so on) available for a laptop computer when it is used at a desk.

RJ-11 connector

A six-position connector that uses just one pair of wires. It is used in telephone system connections.

dumpster diving

A social engineering technique of discovering things about an organization (or person) based on what it throws away.

undocumented feature

A software feature or function that is not included in the official documentation and is typically unsupported, and can be removed or modified without users' knowledge. Also used as a derogatory term for a software bug.

anti-malware software

A software program that scans a device or network for known viruses, Trojans, worms, and other malicious software.

server-side virtualization

A solution in which one or more virtual servers are created on a physical server in which each virtual server acts like it was a separate computer.

thermal dye transfer printer

A sophisticated type of color printer that uses heat to diffuse dye from color ribbons onto special paper or transparency blanks to produce continuous-tone output similar in quality to a photographic print. Also called dye sublimation printer.

docking station

A sophisticated type of port replicator designed to provide additional ports (such as network or USB) and functionality (such as expansion slots and drives) to a portable computer when used at a desk.

DAC (Digital-to-Analog Converter)

A sound card component that converts the digital signals generated by the CPU to an analog electrical signal that can drive the speakers.

THD (Total Harmonic Distortion)

A sound measurement that is expressed as a percentage that compares input and output audio signals, which indicates the amount of distortion in the output signal.

SNR (Signal-to-Noise Ratio)

A sound measurement that is expressed in decibels that compares the signal power with the noise power.

sample

A sound pattern stored in a wave table.

trusted app source

A source for apps that is managed by a service provider.

riser card

A space-saving feature of some motherboards, a riser card puts the PC's expansion slots on a separate board installed at right-angles to the main board. This allows the system components to fit within a slimline case.

wildcard

A special character that is used to substitute characters in a string.

loopback plug

A special connector used for diagnosing network transmission problems that redirects electrical signals back to the transmitting system.

spike

A spike can occur when electrical devices are turned off or when electrical storms are happening. Normally, spikes and surges are not sufficient to cause problems but occasionally big fluctuations may lead to the system crashing or hanging.

DDR SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory)

A standard for SDRAM where data is transferred twice per clock cycle (making the maximum data rate 64x the bus speed in bps). DDR2/DDR3/DDR4 SDRAM uses lower voltage chips and higher bus speeds.

VGA (Video Graphics Array)

A standard for there solution and color depth of computer displays. VGA specifies a resolution of640x480 with 16 colors (4-bit color) at 60Hz.

NAS (Network Attached Storage)

A storage device with an embedded OS that supports typical network file access protocols (TCP/IP and SMB, for instance).These may be subject to exploit attacks(though using an embedded OS is often thought of as more secure as it exposes a smaller attack "footprint"). The unauthorized connection of such devices to the network is also a concern.

thread

A stream of instructions generated by a software application. Most applications run a single process in a single thread.

detac corona

A strop that removes the charge to prevent paper curl in a laser printer.

policy

A subset of a security profile, and a document that outlines the specific requirements and rules everyone must meet.

data backup

A system maintenance task that enables you to store copies of critical data for safekeeping as protection against loss of data due to disasters such as file corruption or hardware failure.

data restoration

A system recovery task that enables you to access and restore the backed-up data.

end of life system

A system that is no longer supported by the developer or vendor.

e-reader

A tablet-sized device designed for reading rather than general-purpose computing.

DSL (Digital Subscriber Line)

A technology for transferring data over voice-grade telephone lines. DSL uses the higher frequencies available in a copper telephone line as a communications channel. The use of a filter prevents this from contaminating voice traffic with noise. There are various "flavors" of DSL, notably S(ymmetric) DSL, A(symmetric) DSL, and V(ery HIgh Bit Rate) DSL.

security control

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the Confidentiality, Integrity, and Availability (CIA) of information. Control types are often classed in different ways, such as technical, operational, and management.

ad-hoc mode

A temporary network mode in which devices connect to each other directly without an intermediary networking device.

script file

A text file containing commands or instructions that are performed by a program on the computer rather than by the computer itself.

logon script

A text file that runs when the user logs on. The file contains commands and settings to configure a user's environment.

CLI (Command Line Interface)

A textual interface based on the operating system, where a user typically enters commands at the command prompt to instruct the computer to perform a specific task.

packet filtering

A type of firewall that inspects the headers of IP packets and can perform filtering on IP address, protocol type, and port numbers.

dot matrix printer

A type of impact printer that uses a set of pins to strike the ribbon to create printed characters and images using combinations of dots.

STP (Shielded Twisted Pair cabling)

A type of network cabling used where protection from interference is required. Insulation is installed around all four pairs of twisted cables.

scanner

A type of photocopier that can convert the image of a physical object into an electronic data file. The two main components of a scanner are the lamp, which illuminates the object, and the recording device, an array of CCDs (Charge Coupled Devices). There are flatbed and sheet-fed versions, with sheet-fed versions typically being incorporated with a printer and fax machine into a multifunction device. Scanners can output images directly to a printer or to a suitable file format (such as JPEG, PNG, or TIFF).Scanners can also interface with applications software using one of several interfaces (TWAIN, WIA, SANE, or ISIS).

megapixels

A unit of measure for the number of pixels a digital camera is capable of producing.

Apple ID

A user account on an Apple device based on the sign-in email address that is used to sign-in to the App Store, access iCloud, and other Apple features and functions.

root user

A user who has access rights to all files and resources on the system and is the default administrative account on a Linux system.

diode

A valve, allowing current to flow in one direction only. These are used in a computer's power supply and as protection for components.

declared variable

A variable for which the data type, possibly the size, and optionally an initial value have been specified within the script or program file.

hash function

A variable length string (text) is taken as input to produce a fixed length value as output.

undeclared variable

A variable that is used without first identifying the data type.

silicon chip

A wafer of purified silicon doped with a metal oxide (typically copper or aluminum).

screen lock

A way to prevent unauthorized access to a computer or mobile device. Configuring a screen lock requires the user to enter a passphrase, complete a pattern, or enter a PIN to access the device.

password policy

A weakness of password-based authentication systems is when users demonstrate poor password practice. Examples include choosing a password that is too simple, reusing passwords for different tasks, writing a password down, and not changing a password regularly. Some of these poor practices can be addressed by system policies; others are better approached by education.

inventory management

An inventory is a list of things, usually stored in a database. Inventories are usually compiled for assets.

UTM (Unified Threat Management)

All-in-one security appliances and technologies that combine the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, Data Loss Prevention, content filtering, and so on.

MIDI (Musical Instrument Digital Interface)

Allows a computer with a sound card to drive MIDI compatible musical instruments, such as synthesizers, samplers, and drum machines (or [vice versa] for a synthesizer to drive a computer audio application [such as a sampler]).

Magic Mouse

An Apple mouse with a touchpad surface that supports gestures.

Magic Trackpad

An Apple trackpad with a larger worksurface than the Magic Mouse.

RFID badge (Radio Frequency Identification badge)

An ID badge containing a chip allowing data to be read wirelessly.

PNAC (Port-based Network Access Control)

An IEEE 802.1X standard in which the switch(or router) performs some sort of authentication of the attached device before activating the port.

subnet mask

An IP address consists of a Network ID and a Host ID. The subnet mask is used in IPv4to distinguish these two components within a single IP address. The typical format for a mask is 255.255.0.0. Classless network addresses can also be expressed in the format 169.254.0.0/16, where /16 is the number of bits in the mask. IPv6 uses the same /nn notation to indicate the length of the network prefix.

WISP (Wireless Internet Service Provider)

An ISP offering Internet access over ground-based Line of Sight (LoS) microwave transmitters.

ITIL (IT Infrastructure Library)

An IT best practice framework, emphasizing the alignment of IT Service Management(ITSM) with business needs. ITIL was first developed in 1989 by the UK government and the ITIL v3 2011 edition is now marketed by AXELOS.

IPS (in-plane switching)

An LCD panel technology designed to resolve the quality issues inherent in TN panel technology, including strong viewing angle dependence and low-quality color reproduction.

TN (Twisted Nematic)

An LCD panel technology where the panel is black when no electric current is running through the liquid crystal cells because the cells align themselves in a twisted state. When an electric current is applied, the liquid crystal cells untwist, allowing light to passthrough, resulting in a white display screen.

shell

An OS component that interacts directly with users and functions as the command interpreter for operating systems.

RTOS (real-time operating system)

An OS that is optimized for use in embedded or real-time apps.

hub

An OSI layer 1 (Physical) network device used to implement a star network topology on legacy Ethernet networks. Hubs may also be known as "multiport repeaters" or concentrators. They are the central points of connection for segments and act like repeaters so that every segment receives signals sent from any other segment.

NLA (Network Level Authentication)

An RDP technology requiring users to authenticate before a server session is created.

virtual memory

An area on the hard disk allocated to contain pages of memory. When the operating system doesn't have sufficient physical memory (RAM) to perform a task, pages of memory are swapped to the paging file. This frees physical RAM to enable the task to be completed. When the paged RAM is needed again, it is re-read into memory.

corona

An assembly within a laser printer that contains a wire (the corona wire), which is responsible for charging the paper.

digitizer

As part of a touchscreen assembly, the digitizer is a touch-sensitive glass panel covering the LCD. The panel converts touch events to digital signals that can be interpreted as different types of input.

digital certificate

An X.509 digital certificate is issued by a Certificate Authority (CA) as a guarantee that a public key it has issued to an organization to encrypt messages sent to it genuinely belongs to that organization. Both parties must trust the CA. The public key can be used to encrypt messages but not to decrypt them. A message can only be decrypted by the private key, which is mathematically linked to the public key but not derivable from it. This is referred to as asymmetric encryption. Part of the CA's responsibility is ensuring that this private key is known only to the organization owning the certificate. This arrangement is referred to a Public Key Infrastructure(PKI).

answer file

An XML text file that contains all of the instructions that the Windows Setup program will need to install and configure the OS without any administrator intervention, including the product key.

surge

An abrupt but brief change in the value of the voltage, lasting from a few billionths of a second (a transient) to a few thousandths of a second.

Samsung account

An account created for Samsung Android devices used to access the Samsung devices and related online services.

Google account

An account from Google used to access an Android device and related online services.

local account

An account that is only associated with the computer on which it was created.

FRU(field replaceable unit)

An adapter or other component that can be replaced by a technician on-site. Most PC and laptop components are FRUs, while the components of smartphones are not.

sound card

An add-on card or built-in adapter to process audio signals and provide interfaces for connecting audio devices.

blacklisting

An address added to the ____________ list is prohibited from connecting to any port.

whitelisting

An address added to the white list is permitted to connect to any port.

federated identity management

An agreement between enterprises to allow users to authenticate using the same information to all networks within the agreed upon group.

plenum

An air handling space, including ducts and other parts of the HVAC system in a building.

UPS (Uninterruptible Power Supply)

An alternative AC power supply in the event of power failure. A UPS requires an array of batteries, a charging circuit, an inverter to convert DC to AC current, a circuit to allow the system to take over from a failing power supply, and some degree of spike, surge, or brownout protection (possibly including a line conditioner).

TACACS+ (Terminal Access Controller Access Control System)

An alternative to RADIUS developed by Cisco. The version in current use is TACACS+; TACACS and XTACACS are legacy protocols.

locator applications

An app installed on mobile devices that identifies the device location to help locate a lost or stolen device.

authenticator application

An app that requires, when using a new computer or device to access a services, a code to be sent in the form of a one time password.

DTP (Desktop Publishing)

An application similar to word processing but with more emphasis on the formatting and layout of documents than on editing the text.

URL (Uniform Resource Locator/Identifier)

An application-level addressing scheme for TCP/IP, allowing for human-readable resource addressing. For example:protocol://server/file, where "protocol" is the type of resource (HTTP, FTP), "server" is the name of the computer (www.microsoft.com), and "file" is the name of the resource you wish to access.

impersonation

An approach in which an attacker pretends to be someone they are not, typically an average user in distress, or a help-desk representative.

zero day exploit

An attack that exploits a vulnerability in software that is unknown to the software vendor and users. Most vulnerabilities are discovered by security researchers and the vendor will have time to create a patch and distribute it to users before exploits can be developed, so zero day exploits have the potential to be very destructive.

three-factor authentication

An authentication scheme that requires validation of three authentication factors.

two-factor authentication

An authentication scheme that requires validation of two authentication factors.

GUI (Graphical User Interface)

An easy to use, intuitive interface for a computer operating system. Most GUIs require a pointing device, such as a mouse, to operate efficiently. One of the world's first GUI-based operating systems was the Apple Mac OS, released in 1984.Thereafter, Microsoft produced their Windows family of products based around their GUI. In fact, recognizing that GUI covers a whole range of designs, the Windows interface is better described as a WIMP (Windows, Icons, Menus, Pointing[device]) interface.

RJ-45 connector

An eight-position connector that uses all four pairs of wires. It is usually used for network connectivity.

capapcitor

An electrical component that stores electrical energy and is often used to regulate voltages. It can hold a charge after the power is removed.

multimeter

An electrical meter capable of measuring voltage, resistance, and current. Voltage readings can be used to determine whether, for example, a power supply unit is functioning correctly. Resistance readings can be used to determine whether a fuse or network cable is functioning correctly.

grounded

An equipment ground provides a safe path for electrical current to flow away in the event that a device or cable is faulty. Self-grounding removes any static potential difference between a technician's clothes and body and a device they are handling, reducing the risk of damaging the component through Electrostatic Discharge (ESD).

parity checking

An error checking method where each byte of data in memory is accompanied by a ninth bit used to check for corrupted data.

PCIe (PCI Express)

An expansion bus standard using serial communications. Each device on the bus can create a point-to-point link with the I/O controller or another device. The link comprises one or more lanes (x1,x2, x4, x8, x12, x16, or x32). Each lane supports a full-duplex transfer rate of 250MBps (v1.0), 500 MBps (v2.0), or 1 GBps (v3.0). The standard is software compatible with PCI, allowing for motherboards with both types of connectors.

NIC (Network interface Card)(network adapter)

An expansion card that enables a PC to connect to a LAN.

TA (Terminal Adapter)

An external appliance or a plug-in card for a PC or compatible router that facilitates an ISDN connection.

drive enclosure

An external case that holds one or more disks and typically connects to the computer through USB or Thunderbolt ports.

eSATA (external Serial Advanced Technology Attachment)

An external interface for SATA connections, enabling you to connect external SATA drives to PCs.

AC adapter

An external power supply used to power laptops and other portable devices.

Apple CarPlay

An iPhone feature that allows users to interact with their phone using voice commands and a vehicle's built-in display.

CAC (Common Access Card)

An identity and authentication smart card produced for Department of Defense employees and contractors in response to a Homeland Security Directive.

tractor feed

An impact printer mechanism that uses pairs of wheels with pins evenly spaced around the circumference at a set spacing to feed continuous roll paper with matching holes that fit over the pins.

friction feed

An impact printer mechanism that uses two rolls placed one on top of the other to force individual cut sheets of paper or envelopes through the paper path.

WPA (Wi-Fi Protected Access)

An improved encryption scheme for protecting Wi-Fi communications, designed to replace WEP. The original version of WPA was subsequently updated (to WPA2) following the completion of the 802.11i security standard. WPA features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher, replacing TKIP and RC4.

PRI (Preferred Roaming Index)

An index that works with the PRL to provide the best data/voice quality to a phone while roaming.

procedure

An inflexible, step-by-step listing of the actions that must be completed for any given task.

footprinting

An information gathering threat, in which the attacker attempts to learn about the configuration of the network and security systems through social engineering attacks or software-based tools.

thermal shock

An ink delivery system where the ink is heated to form a bubble that bursts through the nozzles.

Linux processes

An instance of a running program that performs a data processing task.

compiled program

An instruction set in which the programming instructions are performed by the computer processor.

NVMe (Non-volatile Memory Express)

An interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI.

IP scale (ingress protection)

An international standard to determine how well electrical enclosures are sealed against dust, water, moisture, and other intrusive materials from entering the enclosure. The ratings scale is defined in the BritishEN60529:1992 and European IEC60509:1989 standards.

Snort

An intrusion detection program.

Suricata

An intrusion detection program.

Windows Media Center

An obsolete program included with Windows Vista and Windows 7 that included a broadcast TV schedule that allowed computers equipped with a TV tuner card to view and record TV programs. It also acted as a playback interface for optical discs.

online social lives

An online way to interact with other people using sites such as Facebook, Twitter, and Instagram.

ACPI (Advanced Configuration and Power Management Interface)

An open standard to communicate between the operating system and hardware to enable power management features.

Android

An open-source operating system supported by a wide range of hardware and software vendors.

Linux

An open-source operating system supported by a wide range of hardware and software vendors.

radio firmware

An operating system that is separate from the end-user operating system in a mobile device.

CD drive

An optical drive consisting of a spindle motor to spin the disc, a laser and lens to read the disc, and a tracking system to move the laser and lens assembly.

Blu-ray drive

An optical drive for reading, and if so equipped, writing to Blu-ray disc media. Most drives can also read CD and DVD discs.

DVD drive

An optical drive similar to a CD drive, but with a different encoding method and a shorter wavelength laser. Typically can read and burn CD and DVD media.

DVD (Digital Video/ Versatile Disk)

An optical storage technology. DVDs offer higher capacities (4.7 GB per layer) than the preceding CD-ROM format. As with CDs, recordable and re-writable forms of DVD exist, though there are numerous competing formats (notably ±R and ±RW and DVD-RAM).

CD-ROM (Compact Disc - Read Only Memory)

An optical storage technology. The discs can normally hold 700 MB of data or 80minutes of audio data. Recordable and re-writable CDs (and DVDs) are a popular backup solution for home users. They are also useful for archiving material. Unlike magnetic media, the data on the disc cannot be changed (assuming that the disc is closed to prevent further rewriting in the case of RW media). This makes them useful for preserving tamper-proof records.

EDR (Enhanced Data Rate)

An option in the Bluetooth specification that allows faster data rates and potentially better battery life.

ISP (Internet Service Provider)

An organization that provides a connection to the Internet and other web- and email-related services. A connection to the ISP's Internet routing equipment can be made using a variety of methods.

printer

An output device that produces text and images from electronic content onto physical media such as paper or transparency film.

*aaS (Something as a Service)

An ownership model for cloud services where the "something" can refer to infrastructure, network, platform, or software.

rogue access point

An unauthorized wireless access point on a corporate or private network, which allows unauthorized individuals to connect to the network.

CIFS (Common Internet File System)

Another term for SMB.

Adult account

Any Microsoft Windows user account that is not configured as a Child account.

member server

Any Windows-based server computer configured into a domain but not maintaining the Active Directory database(authenticating users) is referred to as a member server. Servers in a workgroup are referred to as standalone servers.

domain controller

Any Windows-based server that provides domain authentication services (logon services) is referred to as a domain controller (DC). Domain controllers maintain a master copy of the database of network resources.

SSO (Single Sign-On)

Any authentication technology that allows a user to authenticate once and receive authorizations for multiple services. Kerberos is a typical example of an authentication technology providing SSO.

MFD (multifunction device)

Any device that performs more than one function. This typically refers to either SOHO Internet routers/access points or print devices that can also scan and fax.

cloud computing

Any environment where software(Software as a Service and Platform as a Service) or computer/network resources(Infrastructure as a Service and Network as a Service) are provided to an end user who has no knowledge of or responsibility for how the service is provided. Cloud services provide elasticity of resources and pay-per-use charging models. Cloud access arrangements can be public, hosted private, or private (this type of cloud could be onsite or offsite relative to the other business units).

threat

Any potential violation of security policies or procedures.

client-side virtualization

Any solution designed to run on desktops or workstations in which the user interacts with the virtualization host directly.

solid state storage

Any type of persistent digital storage technology that does not use mechanical parts.

vulnerability

Any weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

Time Machine

App facilitating backup operations in macOS.

Mission Control

App facilitating multiple desktops in macOS.

Xcode

Apple's SDK for macOS and iOS software development.

Swift

Apple's programming language for developing mobile apps.

SDN (Software Defined Networking)

Application Programming Interfaces (API) and compatible hardware allowing for programmable network appliances and systems.

MAC filtering (media access control filtering)

Applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it.

RTC battery (real time clock battery)

The battery that powers the chipset that keeps track of date and time for the system.

HFS+ (Extended Hierarchical File System)

The filesystem used by Apple Mac workstations and laptops.

ink dispersion printer

Better known as inkjets, this is a type of printer where colored ink is sprayed onto the paper using microscopic nozzles in the print head. There are two main types of ink dispersion system: thermal shock(heating the ink to form a bubble that bursts through the nozzles) and piezoelectric (using a tiny element that changes shape to act as a pump).

seek time

The time it takes for the read/write head to locate a particular track position.

coaxial cable

Cable type using two separate conductors that share a common axis (hence the term co-axial). ______________________ are categorized using the Radio Grade (RG) "standard". Coax is considered obsolete in terms of LAN applications but is still widely used for CCTV networks and as drop cables forcable TV (CATV).

distended capacitors

Capacitors that are swollen or bulging or emitting residue indicates that they have been damaged or could have failed due to a manufacturing defect.

execute

Carry out the command entered by a user or as read from a script file.

trickle charge

Charging a device that has been fully charged at the rate at which the charge discharges, keeping the device fully charged without overcharging the battery.

adapter card

Circuit board providing additional functionality to the computer system (video, sound, networking, modem, and soon). An ________________________ fits a slot on the PC's expansion bus and often provides ports through slots cut into the back of the PC case. Different cards are designed for different slots (PCI or PCIe).

workstation

Client devices connecting to the network represent one of the most vulnerable points as they are usually harder to monitor than centrally located equipment, such as servers and switches. As well as secure configuration of the OS and applications, workstations should be protected with anti-malware software. Users should be trained in security best practices and educated about common threats.

PAN (Personal Area Network)

Close range networking (usually based on Bluetooth or NFC) allowing communications between personal devices, such as smartphones, laptops, and printers/peripheral devices.

virus

Code designed to infect computer files (or disks) when it is activated. A virus may also be programmed to carry out other malicious actions, such as deleting files or changing system settings.

accelerometer/gyroscope

Components used in mobile devices to detect motion (_____________________) and rotation (______________________). As well as switching screen orientation, this can be used as a control mechanism (for example, a driving game could allow the tablet itself to function as a steering wheel).

desktop style

Computers designed for stationary use come in various styles including tower, slimline, and all-in-one.

DRM (Digital Rights Management)

Copyright protection technologies for digital media. DRM solutions usually try to restrict the number of devices allowed for playback of a licensed digital file, such as a music track or ebook.

response rate

The time taken for a pixel to change color, measured in milliseconds (ms).

FDM (fused deposition modeling) (see FFF)

Google Later

Windows Explorer (see File Explorer)

Google Later

metadata

Data about data, typically one set of data summarizes information about the original set of data.

PII (Personally Identifiable Information)

Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them). A Social Security number is a good example of PII. Others include names, date of birth, email address, telephone number, street address, biometric data, and so on.

Boolean values

Data type supporting 1-bit storage, representing FALSE and TRUE. ______________ logic is a statement that resolves to a true or false condition and underpins the branching and looping features of computer code.

character

Data type supporting storage of a single character.

string

Data type supporting storage of a variable length series of characters.

floating point numbers

Data type supporting storage of floating point numbers (decimal fractions).

integer

Data type supporting storage of whole numbers.

Wireless Range Extender

Designed to repeat the signal from an access point to extend the range of a WLAN.

work instruction

Detailed documents that contain step-by-step tasks needed to perform a specific task.

ADF (Automatic Document Feeder)

Device that feeds media automatically into a scanner or printer.

PPP (Point-to-Point Protocol)

Dial-up protocol working at layer 2 (Data Link) used to connect devices remotely to networks. Often used to connect to an ISP's routers and out to the Internet. PPPoE (PPP over Ethernet) or PPPoA (PPP over ATM) are used to provide broadband connections(over DSL or cable Internet, for instance).

DisplayPort

Digital A/V interface developed by VESA. _____________________ supports some cross-compatibility with DVI and HDMI devices.

disk mirroring (see mirroring)

Disk mirroring is a technique used to protect a computer system from loss of data and other potential losses due to disk failures. In this technique, the data is duplicated by being written to two or more identical hard drives, all of which are connected to one disk controller card. If one hard drive fails, the data can be retrieved from the other mirrored hard drives. Disk mirroring if often referred to as RAID 1 or RAID Level 1. (Google search)

clusters

Disk sectors are grouped in clusters of 2, 4, 6, 8, or more. The smaller the cluster size, the lower the data overhead in terms of wasted space, but larger clusters can improve performance.

OSD (on-screen display)

Display configuration menus that show up on the monitor and that you interact with by using buttons on the monitor case.

chain of custody

Documentation attached to evidence from a crime scene detailing when, where, and how it was collected, where it has been stored, and who has handled it subsequently to collection.

airborne particles

Dust and other small items that can be blown about and carried on air currents, that if they get inside computers, can prevent effective heat dissipation.

dye sublimation printer (see thermal dye transfer printer)

Dye-sublimation printing (or dye-sub printing) is a computer printing technique which uses heat to transfer dye onto materials such as a plastic, card, paper, or fabric. (Google search)

generator (see backup power generator)

Google Later

color depth

Each pixel in a digital image can be one of a number of colors. The range of colors available for each pixel is referred to as the color depth. Providing a greater range of colors requires more memory. If 1-bit is allowed for color depth, two colors (white and black) are allowed. A VGA video system supports 4-bit color (16 possible colors). SVGA supports 8-bit (256 colors),16-bit (65,536 colors), 24-bit (16,777,216colors), and 32-bit (deep color).

switch

Ethernet switches are at the heart of most local networks. A switch receives incoming data into a buffer, then the destination MAC address is compared with an address table. The data is then only sent out to the port with the corresponding MAC address. In a switched network, each port is in a separate collision domain(microsegmentation). Advanced switches perform routing at layers 3 (IP), 4 (TCP), or7 (Application). Switches routing at layer4/7 are referred to as load balancers and content switches.

latent

Evidence that cannot be seen with the naked eye and instead must be interpreted using a machine or process.

incineration

Exposing the disk to high heat to melt its components.

graphics adapter (see video card)

Google Later

IA-32 (see x86-32)

Google Later!!

AMD-V

Extensions in AMD-based systems that allow hardware virtualization.

VT-x

Extensions in Intel-based systems that allow hardware virtualization.

BIOS (Basic Input/ Output System)

Firmware that contains programs and information relating to the basic operation of PC components such as drives, keyboard, video display, and ports. It also contains specific routines to allow set-up configuration to be viewed and edited and it contains the self-diagnostic Power-On Self-Test (POST) program used to detect fundamental faults in PC components. ____________ can also be used to secure components not protected by the OS by specifying a supervisor password (to prevent tampering with ___________ settings) and a user password (to boot the PC).

ODBC Data Sources (see Data Sources)

Google Later!!

PID (see Process ID)

Google Later!!

Plug and Play (see UPnP)

Google Later!!

memory card

Flash drives typically used for digital cameras and smartphones; typically small and flat.

disk defragmentation

Fragmentation occurs when a data file is not saved to contiguous sectors on a disk. This decreases performance by making the disk read/write heads move between fragments. Defragmentation is a software routine that compacts files back into contiguous areas of the disk. The process can be run from a command-line using the defrag utility, but it is more often run from Windows.

EAP (Extensible Authentication Protocol)

Framework for negotiating authentication methods, supporting a range of authentication devices. EAP-TLS uses PKI certificates, Protected EAP (PEAP) creates a TLS-protected tunnel between the supplicant and authenticator to secure the user authentication method, and Lightweight EAP (LEAP) is a password-based mechanism used by Cisco.

private address

IP addresses in ranges defined by RFC1928 which are not allowed to route traffic over the Internet, with those addressed being confined to private LANs.

ICMP (Internet Control Message Protocol)

IP-level protocol for reporting errors and status information supporting the function of troubleshooting utilities such as ping.

variable

Identifier for a value that can change during program execution. Variables are usually declared with a particular datatype. Q

constant

Identifier for a value that is fixed before program execution and does not change.

SSID (Service Set ID)

Identifies a particular Wireless LAN (WLAN). This "network name" can be used to connect to the correct network. When multiple APs are configured with the same SSID, this is referred to as an E(xtended) SSID.

biometrics

Identifying features stored as digital data can be used to authenticate a user. Typical features used include facial pattern, iris, retina, or fingerprint pattern, and signature recognition. This requires the relevant scanning device, such as a fingerprint reader, and a database of _____________ information (template).

Patch Management

Identifying, testing, and deploying OS and application updates. Patches are often classified as critical, security-critical, recommended, and optional.

terminal window

In Linux, a computer interface for text entry and display, where information is displayed as an array of preselected characters.

file system hierarchy

In Linux, the directory structure starting with the root directory (/) with directories and subdirectories below it to store files.

effective group ID

In Linux, the group ID used by the kernel in determining the group permissions a process has when accessing files and shared resources.

current working directory

In Linux, the location on the file system that you are accessing at any point in time.

primary group

In Linux, users can be members of one primary group and multiple supplemental groups.

boot partition

In Microsoft terminology, the partition that contains the operating system (that is, the \WINDOWS folder) is referred to as the boot partition. This is typically a different partition to the system partition (the partition containing the boot files).

system partition

In Microsoft terminology, the system partition is the bootable partition on the hard disk. This is usually, but not always, separate to the boot partition, which contains the operating system. The system partition is usually hidden from File Explorer (no drive letter is assigned to it).

lanes

In PCIe, two wire pairs (four wires in total)using low voltage differential signaling, with one pair used to transmit and the other pair to receive (bi-directional).

port (logical)

In TCP and UDP applications, a port is a unique number assigned to a particular application protocol (such as HTTP or SMTP). The port number (with the IP address) forms a socket between client and server. A socket is a bi-directional pipe for the exchange of data. For security, it is important to allow only the ports required to be open (ports can be blocked using a firewall).

OU (Organizational Unit)

In Windows Active Directory, a way of dividing the domain up into different administrative realms.

RSoP (Resultant Set of Policies)

In Windows systems, a Group Policy report showing all of the GPO settings and how they affect the network. It can also be used to show how GPOs affect user and computer combinations with the local security policyin effect.

WPF (Windows Presentation Foundation)

In Windows, handles the display and print functions for compatible applications.

print monitor

In Windows, the print monitor is a process that checks the print queue (%SystemRoot%\System32\Spool\Printers\) for print jobs. When they arrive, they are processed, if necessary, then passed via a print port to the print device.

head unit

In a car, the unified hardware interface for the audio system and related components.

transfer belt

In a color printer, combining colors to print in one pass.

domain user account

In a corporate environment, an account that is part of a domain, so the user account settings are controlled by the domain administrator.

print head

In a dot matrix printer, pins that are fired by solenoids are secured to a moving carriage that sweeps across the paper and the pins make contact with the ribbon to press it against the paper to create images. In an inkjet printer, the print head is typically contained in the ink cartridge although Epson inkjet printers include the printhead as part of the printer instead.

formatter board

In a laser printer, the unit that exposes and processes all of the data received from the computer and coordinates the steps needed to produce the finished page.

media guides

In a paper tray, the movable components that can be adjusted to hold the paper in the proper position for feeding through the printer.

feed assembly

In a thermal printer, a stepper motor turns a rubber-coated roller to feed the paper through the print mechanism using friction feed.

heating element

In a thermal printer, the component within the printer that is heated to react to chemicals in thermal paper to change color, creating images on the thermal paper.

network ID

In an IP address, the portion of the address that is common to all hosts on the same IP network.

host ID

In an IP address, the portion of the address that uniquely identifies a host on a particular IP network

global address

In an IPv6 address, an address that is unique on the Internet (equivalent to public addresses in IPv4).

relative distinguished name

In an LDAP directory, the most specific attribute in the distinguished name that uniquely identifies the object within the context of successive (parent) attribute values.

evil twin

In an evil twin attack, the attacker creates a malicious wireless access point masquerading as a genuine one, enabling the attacker to harvest confidential information as users connect via the AP.

ribbon

In an impact printer, the inked medium against which pins press to create the image.

ink cartridge

In an inkjet printer, a cartridge containing an ink reservoir and sensors to detect the amount of remaining ink, typically with separate cartridges for cyan, magenta, yellow, and black ink. Most ink cartridges also contain the print head for the printer.

load roller

In an inkjet printer, a roller that turns against the paper stack to move the top sheet, while a separation roller prevents more than one sheet from entering the printer.

ASF (AutoSheet Feeder)

In an inkjet printer, the paper pickup mechanism to feed paper into the printer.

CI (configuration item)

In change management, an asset that requires specific management procedures for it to be used to deliver the service. Each _________ is identified with a label and defined by its attributes and stored in a CMDB.

CMDB (Configuration Management Database)

In change management, the database in which configuration items are stored, identified using a label and defined by their attributes.

RFC (Request for Change)

In change management, the formal document submitted to the CAB that has the details of the proposed alteration.

CAB (Change Advisory Board)

In change management, the team responsible for approving or denying RFCs.

transistor

In computers, semiconductor switches used to create logic devices.

peer-to-peer networkrces onhis/her machine.

In peer-to-peer networks there is no dedicated server, but instead, each computer connected to the network acts as both a server and client (each computer is a peer of the other computers). These types of networks were originally developed as a low-cost alternative to server-based systems for use in smaller companies and organizations where there are up to about ten users. A major drawback to this type of network is a comparative lack of security whereby each user must control access to resources on his/her machine.

authorization

In security terms, the process of determining what rights and privileges a particular entity has.

accounting (auditing)

In security terms, the process of tracking and recording system activities and resource access.

Top Level Domains (TLD)

In the DNS hierarchy, the level immediately below the root.

Application protocols layer

In the TCP/IP suite, numerous protocols used for network configuration, management, and services reside at this level. Application protocols use a TCP or UDP port to connect the client and server.

Network Interface layer

In the TCP/IP suite, the layer responsible for putting frames onto the physical network.

PAT (portable appliance testing)

In the UK, Australia, and New Zealand, the process for inspecting and testing electrical equipment to ensure its safety.

jamming

In wireless networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals used by computing devices and other network devices.

MSDS (Materials Safety Data Sheet)

Information sheet accompanying hazardous products or substances explaining the proper procedures for handling and disposal.

PHI (Protected Health Information)

Information that identifies someone as the subject of medical and insurance records, plus associated hospital and laboratory test results.

authentication factor

Information used to identify a user from one of several categories (something the user knows, has, or "is," or the user's location).

IR (Infrared)

Infrared Data Association (IrDA)was a wireless networking standard supporting speeds up to about 4 Mbps. Infrared (IR) sensors are used in mobile devices and with IR blasters to control appliances.

ARP poisoning (Address Resolution Protocol poisoning)

Injecting a false IP:MAC lookup into the victim's ARP cache. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.

piezoelectric printing

Ink delivery system in an inkjet printer that uses a tiny element that changes shape to act as a pump used in Epson printers.

thermal inkjet print method

Ink delivery system in an inkjet printer that uses thermal shock.

I/O addresses (Input/ Output addresses)

Input/output peripherals have a special area of memory in the range 0000-FFFF set aside to allow data reading and writing functions. This is normally configured by Plug-and-Play but can be set manually using Device Manager.

apps

Installable programs that extend the functionality of the mobile device, that must be written and compiled for a particular mobile operating system (Apple iOS, Android, or Windows).

in-place upgrade

Installing the OS on top of an existing version of the OS, retaining applications, user settings, and data files.

clean install

Installing the OS to a new computer or completely replacing the OS software on an existing computer, and in the process, deleting existing applications, user settings, and data files.

HAV (Hardware Assisted Virtualization)

Instruction set extensions (Intel VT-x and AMD-V) that facilitate the operation of virtual machines.

HT (HyperThreading)

Intel CPU architecture implemented on many Pentium 4 models.HT exposes two or more logical processors to the OS, delivering performance benefits similar to SMP.

HTT( HyperThreading technology)

Intel's term for HyperThreading.

spam

Junk messages sent over email (or instant messaging [SPIM]). Filters and blacklists are available to block spam and known spam servers. It is also important to ensure that any mail servers you operate are not open relays, allowing a spammer to leverage your server to distribute spam and making it likely that it will be blacklisted.

virtual application streaming

Just enough of an application is installed on the end user device for the system to recognize that the application is available to the user, and when the user accesses the application, additional portions of the code are downloaded to the device.

LTE-A (LTE Advanced)

LTE Advanced is designed to provide 4G standard network access.

gloves

Latex hand coverings to protect the technician when they are working around a toner spill.

IPSec (Internet Protocol Security)

Layer 3 protocol suite providing security for TCP/IP. It can be used in two modes(transport, where only the data payload is encrypted, and tunnel, where the entire IP packet is encrypted and a new IP header added). IPsec can provide confidentiality and/or integrity. Encryption can be applied using a number of hash (MD5 or SHA) and symmetric (DES or AES) algorithms. Key exchange and security associations are handled by the Internet Key Exchange Protocol. Hosts can be authenticated by a shared secret, PKI, or Kerberos.

loop

Like a branch, a loop deviates from the initial program path to some sort of logic condition. In a loop, the computer repeats the task until a condition is met. Often implemented with For or While statements.

VBR (Volume Boot Record)

Loads the boot manager, which for Windows isbootmgr.exe.

execution control

Logical security technologies designed to prevent malicious software from running on a host and establish a security system that does not entirely depend on the good behavior of individual users.

Zigbee

Low-power wireless communications opensource protocol used primarily for home automation. Zigbee uses radio frequencies in the 2.4 GHz band and a mesh topology.

Z-Wave

Low-power wireless communications protocol used primarily for home automation. Z-Wave uses radiofrequencies in the high 800 to low 900MHz range and a mesh topology.

self-grounding

Manual dissipation of static buildup by touching a grounded object prior to touching any electronic equipment.

overclocking.

Manually setting the CPU and chipset to run at a faster speed than advised by the manufacturer. Some CPUs are better suited to overclocking than others and the system will generally need a better cooling system to cope with the increased thermal output.

single-channel memory

Memory with one 64-bit bus between the CPU and RAM.

blanking plate

Metal strips that cover unused adapter slots in the case so that proper air flow is maintained with the system case.

CDMA (Code Division Multiple Access)

Method of multiplexing a communications channel using a code to key the modulation of a particular signal. _________ is associated with Sprint and Verizon cellular phone networks.

e-ink (electrophoretic ink)

Micro-encapsulated black and white particles, electronically manipulated to create images and text on an e-reader.

Exchange

Microsoft Exchange is a client-based email system that allows mobile devices to sync with the server.

DCOM (distributed COM)

Microsoft's interface that allows a client program object to request services from server program objects.

COM+ (Component Object Model plus) (see also Component Services)

Microsoft's object-oriented programming architecture and operating system services for developing applications.

Component Object Model (COM)

Microsoft's object-oriented programming model specification.

ActiveX

Microsoft's software framework for browser plug-ins that allow users to run software components accessed from the Internet.

EAS (Exchange ActiveSync)

Microsoft's synchronization protocol that enables mobile devices to connect to an Exchange Server to access mail, calendar, and contacts.

DLP (video) (Digital Light Processing)

Mirror-based projector technology developed by Texas Instruments.

mirroring

Mirroring is a type of RAID (RAID 1) using two hard disks, providing the simplest way of protecting a single disk against failure. Data is written to both disks and can be read from either disk.

iOS

Mobile OS developed by Apple for its iPhone and iPad devices.

gyroscope (See also accelerometer/gyroscope)

Mobile device technology that can determine the rotation of a device with a sensor that measures the rotation of the device.

accelerometer

Mobile technology that can determine the orientation of a device with a sensor that measures the acceleration of the device direction.

AES (Advanced Encryption Standard)

Modern encryption suite providing symmetric encryption (the same key is used to encrypt and decrypt). __________ is a very strong cipher with many applications, including being part of the WPA2 Wi-Fi encryption scheme.

baseband update

Modification of the firmware of a cellular modem.

heuristic

Monitoring technique that allows dynamic pattern matching based on past experience rather than relying on pre-loaded signatures.

SFF (Small Form Factor)

Motherboards and connectors that are designed to take up less space.

multimedia

Multimedia refers to PC components that can playback and record sound and video(or to sound and video files). There are numerous sound and video file formats, including legacy Windows-specific formats such as WAV (for audio) or AVI (for video and audio). The preferred file format for Windows Media Player is ASF (Advanced Systems Format), which is usually compressed (WMA or WMV). Other file formats include those used for Apple's QuickTime player (MOV and QT), Apple's iTunes format (AIFF), and RealNetworks player (RA or RAM). The most popular standards-based format is MPEG.

CMP (chip-level multiprocessing)

Multiple processors combined on the same die.

PSTN (Public Switched Telephone Network)

National telecommunications systems have evolved and combined over the years to create a global (and indeed extra-terrestrial) communications network This is referred to as the Public Switched Telephone Network (PSTN) but it is capable of carrying more than simply voice-call services. The basis of PSTN is a circuit-switched network, but the infrastructure can also carry packet-switched data services.

phishing

Obtaining user authentication or financial information through a fraudulent request for information. Phishing is specifically associated with emailing users with a link to a faked site (or some other malware that steals the information they use to try to authenticate). Pharming is a related technique where the attacker uses DNS spoofing to redirect the user to the fake site. Vishing refers to phishing attacks conducted over voice channels (VoIP),while spear phishing or whaling refers to attacks specifically directed at managers or senior executives.

GPO (Group Policy Object)

On a Windows domain, per-user and per-computer settings can be deployed through Group Policy Objects attached to Active Directory containers, such as domains and Organization Units. Group policy can be used to configure security settings such as password policy, account restrictions, firewall status, and so on.

DC (direct current)

PCs and most computer components function by using power supplied in the form of __________________. This is normally at low voltage and is produced by stepping down the voltage from the building supply. Direct current, does not oscillate between positive and negative states.

PPPoE (PPP over Ethernet)

PPP packets are encapsulated within Ethernet frames for transport by DSL providers.

RTC (real time clock)

Part of the system chipset that keeps track of the date and time. The RTC is powered by a battery so the PC keeps track of the time even when it is powered down. If the computer starts losing time, it is a sign that the battery is failing.

unmanaged_switch

Performs microsegmentation without requiring any sort of configuration.

HIDs (Human Interface Devices)

Peripherals that enable the user to enter data and select commands.

biometric devices

Peripherals used to gather biometric data for comparison to data stored in a database.

port forwarding

Port forwarding means that a router takes requests from the Internet for a particular application (say, HTTP/port 80) and sends them to a designated host on the LAN.

port triggering

Port triggering is used to configure access through a firewall for applications that require more than one port. Basically, when the firewall detects activity on outbound port A destined for a given external IP address, it opens inbound access for the external IP address on port B for a set period.

soft reset

Power cycling a mobile device in an attempt to resolve issues the user is experiencing.

hard copy

Printer output of electronic documents onto paper.

application virtualization

Rather than run the whole client desktop as a virtual platform, the client either accesses a particular application hosted on a server or streams the application from the server to the client for local processing.

VNC (Virtual Network Computing)

Remote access tool and protocol. VNC is the basis of macOS screen sharing.

jailbreaking

Removing manufacturer restrictions on a device to allow other software, operating systems, or networks to work with a device. Typically refers to iPhone devices.

CAM (Computer Aided Manufacturing )

Software that can control machine tools found in manufacturing environments.

wear leveling

Routines used by flash drives to prevent any single storage location from being overused and to optimize the life of the device.

protocol

Rules and formats enabling systems to exchange data. A single network will involve the use of many different protocols. In general terms, a protocol defines header fields to describe each packet, a maximum length for the payload, and methods of processing information from the headers.

encryption

Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered. Encryption provides for a secure means of transmitting data and authenticating users. It is also used to store data securely. Encryption uses different types of cipher and one or more keys. The size of the key is one factor in determining the strength of the encryption product.

system resources

Settings that enable a device to communicate with the CPU and memory without the device conflicting with other devices.

Bluetooth

Short-range radio-based technology, working at up to 10 m (30 feet) at up to 1 Mbps used to connect peripherals (such as mice, keyboards, and printers) and for communication between two devices (such as a laptop and smartphone).

RSA (Rivest Shamir Adelman)

The first successful algorithm to be designed for public key encryption. It is named for its designers.

entry control roster

Sign-in sheet for managing access to premises.

NAPT (Network Address Port Translation)

Similar to NAT, it (or PAT or NAT overloading)maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications.

heat spreader

Similar to a heat pipe except it is a flat container rather than a pipe.

pharming

Similar to phishing, this type of social engineering attack redirects a request for a website, typically an e-commerce site, to a similar-looking, but fake, website. The attacker uses DNS spoofing to redirect the user to the fake site.

LED (Light Emitting Diode)

Small, low-power lamps used both as diagnostic indicators, LCD backlights, and (as Organic LEDs) in high-quality flat panels.

PIV Card (Personal Identification Verification card)

Smart card standard for access control to US Federal government premises and computer networks.

tailgating

Social engineering technique to gain access to a building by following someone else (or persuading them to "hold the door").

virtualization

Software allowing a single computer (the host) to run multiple "guest" operating systems (or Virtual Machines [VMs]). The VMs are configured via a hypervisor or VM Monitor (VMM). VMs can be connected using virtual networks (vSwitch) or leverage the host's network interface(s). It is also possible for the VMs to share data with the host (via shared folders or the clipboard, for instance). VT is now used as major infrastructure in data centers as well as for testing and training.

antivirus

Software capable of detecting and removing virus infections and (in most cases) other types of malware, such as worms, Trojans, rootkits, adware, spyware, password crackers, network mappers, DoS tools, and so on. antivirus software works on the basis of both identifying malware code (signatures) and detecting suspicious behavior (heuristics). antivirus software must be kept up to date with the latest malware definitions and protect itself against tampering.

CRM (Customer Relationship Management)

Software designed to manage an organization's customer (and potential customer) relationships and interactions.

3D slicing software

Software in a 3D printer or in 3D modeling software that takes a 3D model and creates multiple horizontal layers of the model.

PVR (personal video recorder)

Software installed on a home theater PC (HTPC) to record and watch TV broadcasts.

IDS (Intrusion Detection System)

Software or security appliance designed to monitor network traffic (NIDS) or configuration files and logs on a host (HIDS) to record and detect unusual activity. Many systems can automatically take preventive action(Intrusion Prevention System [IPS]).Detection is either signature-based or anomaly-based (or both). IDS software typically requires a lengthy period of configuration and "training" to recognize baseline "normal" activity.

MDM (Mobile Device Management)

Software suites designed to manage use of smartphones and tablets within an enterprise.

remote wipe

Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.

DLP (loss prevention)(Data Loss/ Leakage Prevention)

Software that can identify data that has been classified and apply "fine-grained" user privileges to it (preventing copying it or forwarding by email, for instance).

OCR (Optical Character Recognition)

Software that can identify the shapes of characters and digits to convert them from printed images to electronic data files that can be modified in a word processing program. Intelligent Character Recognition (ICR) is an advanced type of OCR, focusing on handwritten text.

3D modeling software

Software that creates a model of a physical object using polygons, spline curves, and bezel curves.

driver

Software that creates an interface between a device and the operating system. It may also include tools for configuring and optimizing the device.

port scanning

Software that enumerates the status of TCP and UDP ports on a target system. Port scanning can be blocked by some firewalls and IDS.

freeware

Software that is available for download and use free of charge.

CAD (Computer-Aided Design)

Software that makes technical drawings and schematics easier to produce and revise.

print driver

Software that provides an interface between the print device and Windows.

program

Software that provides functionality such as word processing, graphics creation, database management, or other productivity or entertainment uses.

spyware

Software that records information about a PC and its user. Spyware is used to describe malicious software installed without the user's content. Aggressive spyware is used to gather passwords or financial information such as credit card details.

multithreaded

Software that runs multiple parallel threads within a process.

shareware

Software that you can install free of charge usually for a limited time of use or with limited functionality. To continue using it or to access additional features, the user will need to register and often pay for the software.

drop cable

Solid cables used for permanent links such as cable running through walls.

eavesdropping

Some transmission media are susceptible to eavesdropping (listening in to communications sent over the media). To secure transmissions, they must be encrypted.

incident

Something that is not normal and disrupts regular operations in the computing environment.

toner

Specially formulated compound to impact dye to paper through an electrographic process (used by laser printers and photocopiers). The key properties of toner are the colorant (dye), ability to fuse (wax or plastic), and ability to hold a charge. There are three main types of toner, distinguished by the mechanism of applying the toner to the developer roller: dual component (where the toner is mixed with a separate magnetic developer), mono-component (where the toner itself is magnetic), and non-magnetic mono-component (where the toner is transferred using static properties).

PoE (Power over Ethernet)

Specification allowing power to be supplied via switchports and ordinary data cabling to devices such as VoIP handsets and wireless access points. Devices can draw up to about 13 W(or 25 W for PoE+).

TWAIN

Standard "driver" model for interfacing scanner hardware with applications software.

LDAP (Lightweight Directory Access Protocol)

Standard for accessing and updating information in an X.500-style network resource directory. LDAP uses port 389.Unless secure communications are used, LDAP is vulnerable to packet sniffing and Man-in-the-Middle attacks. It is also usually necessary to configure user permissions on the directory. LDAP version 3 supports simple authentication or Simple Authentication and Security Layer, which integrates it with Kerberos or TLS.

GSM (Global System for Mobile Communication)

Standard for cellular radiocommunications and data transfer. GSM phones use a SIM card to identify the subscriber and network provider. 4G and later data standards are developed for GSM.

native resolution

The fixed resolution for LCD or other flat panel display devices.

multifactor authentication

Strong authentication is multifactor. Authentication schemes work on the basis of something you know, something you have, or something you are. These schemes can be made stronger by combining them (for example, protecting use of a smart card certification [something you have] with a PIN[something you know]).

CMYK Color Model (Cyan Magenta Yellow Key [Black] color model)

Subtractive color model used by print devices. ____________ printing involves use of halftone screens. Four screens (or layers) of dots printed in each of the colors are overlaid. The size and density of the dots on each layer produces different shades of color and is viewed as a continuous tone image.

superpiplining

Superscalar architectures feature longer pipelines with multiple stages but shorter actions (micro-ops) at each stage.

PSK (Pre-shared Key)

Symmetric encryption technologies, such as those used for WEP, require both parties to use the same private key. This key must be kept a secret known only to those authorized to use the network. A pre-shared key is normally generated from a passphrase.

auditing

Synonymous with accounting.

restore points

System Restore takes a snapshot of the system configuration and enables rollbacks to these restore points.

ECC (Error Checking and Correcting [or Error Correcting Code])

System memory (RAM)with built-in error correction security. It is more expensive than normal memory and requires motherboard support. It is typically only used in servers.

non-parity

System memory that does not perform error checking (except for the startup memory count).

IPS (Intrusion Protection System)(network IDS(NIDS))

Systems that can automatically take preventive action using signature-based or anomaly-based detection.

QoS (Quality of Service)

Systems that differentiate data passing over the network that can reserve bandwidth for particular applications. A system that cannot guarantee a level of available bandwidth is often described as Class of Service (CoS).

telnet

TCP/IP application protocol supporting remote command-line administration of a host (terminal emulation). Telnet is unauthenticated and has therefore been superseded by SSH or graphical remote configuration utilities. Telnet runs over TCP port 23.

email filtering

Techniques to prevent a user being overwhelmed with spam (junk email).Spam can be blocked from reaching an organization using a mail gateway to filter messages. At the user level, software can redirect spam to a junk folder (or similar).Anti-spam filtering needs to balance blocking illegitimate traffic with permitting legitimate messages. Anti-spam techniques can also use lists of known spam servers (blacklists).

S.M.A.R.T. (Self Monitoring Analysis and Reporting Technology)

Technology designed to alert the user to possible hard disk failures before the disk becomes unusable.

throttling

Technology that allows the CPU to slow down if thermal output reaches a critical level or to improve power performance. Intel's throttling technology is called SpeedStep; AMD's is called PowerNow!

FAT16 (File Allocation Table, 16-bit)

The 16-bit filesystem used in the Windows 3.1 and DOS operating systems with 128 K sectors that only allowed very small partitions (about32 MB) with later Windows versions employing 512 K sectors allowing for 2 GB partitions.

FAT32 (File Allocation Table, 32-bit)

The 32-bit filesystem that allows approximately 4 GB partitions.

IA-64

The 64-bit instruction set developed by Intel for its Itanium server CPU platform that never gained acceptance in the PC market.

Face ID

The Apple device feature that uses face lock to grant access to the device.

Touch ID

The Apple device feature that uses fingerprint biometric information to grant access to the device.

FQDN (Fully Qualified Domain Name)

The full name of any host which reflects the hierarchy from most specific (the host) to the least specific (the top level domain followed by the root).

TFT Active Matrix Display (Thin Film Transistor active matrix display)

The TFT display provides the best resolution of all of the currently available flat-panel Liquid Crystal Display (LCD)designs, although they are also the most expensive. TFT displays offer very high image clarity, contrast ratios of between150:1 to 200:1, fast refresh rates, and wide viewing angles.

USB SuperSpeed

The USB 3.0 standard that operates at up to 5 Gbps and makes the link full duplex.

USB SuperSpeed+

The USB 3.1 standard that operates at up to 10 Gbps.

hives

The Windows Registry is made up of hives. Each hive contains a discrete body of configuration data corresponding to an aspect of the system; for example; the SOFTWARE hive contains all the software configuration information. The files comprising the hives are stored in the %SystemRoot%\System32\Config folder.

GDI(Graphics Device Interface)

The Windows XP component responsible for drawing graphics objects. Cheaper printers use GDI as the print processor. Windows Vista and later have a redesigned display/print architecture called Windows Presentation Foundation, but retain compatibility with GDI applications.

Remote Desktop

The Windows feature that allows a remote user to initiate a connection at any time and sign on to the local machine using an authorized account.

SAM (Security Account Manager)

The Windows local security account database where local system account information is stored.

chipset

The ______________ provides communications between different components by implementing various controllers (for memory, graphics, I/O, and so on). Historically, "fast" controllers (memory and video) were part of a "northbridge" _____________, placed close to the CPU and system memory. Slower buses were part of a "southbridge" _________________. In modern PC architecture, video and memory controllers are part of the CPU (on-die), the northbridge would mostly handle PCI Express adapters, and the southbridge would how SATA, USB, audio and LAN functions, plus PCI/PATA legacy bus support.

autodiscover

The ability of a mobile device to determine connection settings based on the user entering their email credentials.

multitasking

The ability of an operating system to run multiple programs, or tasks, at one time. DOS was a single tasking operating system. Windows 3.x was a cooperative multitasking operating system, while Windows 9x and higher provide preemptive multitasking. Cooperative multitasking relies on the applications to share CPU cycles with one another and to voluntarily relinquish the processor to other tasks, which has reliability implications.

rapid elasticity

The ability to scale cloud computing resources quickly to meet peak demand and just as quickly remove resources if they are not currently needed.

partitioning

The act of dividing a physical disk into logically separate storage areas, often referred to as drives.

current

The actual flow of electrons, measured in Amps (I).

main connector

The adapter from the power supply that supplies power to the motherboard.

cylinder

The aggregate of all tracks that reside in the same location on every disk surface.

EULA (End User License Agreement)

The agreement governing the installation and use of proprietary software.

RPO (Recovery Point Objective)

The amount of data loss that a system can sustain, measured in time. See also recovery time objective.

energy

The amount of power consumed by a device over time, measured in Watt-hours(or more typically Kilowatt-hours [kWh]).

capacity

The amount of space available on storage media.

die

The area on a silicon chip containing millions of transistors and signal pathways created by the hoping process.

stored value

The area where programs keep variable and constant values while the program is running.

DSP chip (Digital Signal Processor chip)

The basis of a sound card containing one or more DACs. It also provides functions for playing digital sound (synthesis) and driving MIDI compatible devices.

boot device priority (see boot sequence)

The boot order is a priority list. For example, if "USB drive" is above "hard drive" in your boot order, your computer will try the USB drive and, if it's not connected or no operating system is present, it'll then boot from the hard drive. ... Once your computer restarts, it will boot using your new boot order priority.

HVAC (Heating, Ventilation, and Air Conditioning)

The building environmental heating and cooling services and the control of those systems.

EP drum (Electrostatic Photographic drum)

The component in a laser printer that carries the electrical charge to attract toner and then to transfer the toner to the paper.

RIP (Raster Image Processing)

The component responsible for converting instructions in the Page Description Language (PDL) to instructions that control the print engine(an inkjet's ink dispersion nozzles or a laser printer's developer laser, for instance). A PDL might contain instructions for printing vector graphics and fonts; the RIP translates these instructions into a pattern of dots (raster) at the required resolution.

motherboard

The computer motherboard, also called the system board, provides the basic foundation for all of the computer's hardware, including the processor, RAM, firmware, and expansion cards. Several motherboard standards are available, each with a different layout and associated advantages.

system clock

The computer's timing mechanism that synchronizes the operation of all parts of the computer and provides the basic timing signal for the CPU; measured in MHz or GHz.

drive controller

The controller is the circuitry in the disk unit that allows it to put data on the bus, which the HBA shuttles to the CPU or RAM.

TCO (total cost of ownership)

The cost of a device over its lifetime, including the cost of replacement components and consumables.

AD DS (Active Directory Domain Services)

The database that contains the users, groups, and computer accounts in a Windows Server domain.

real time

The date and time that are maintained by the Real Time Clock.

default gateway

The default gateway is an IP configuration parameter that identifies the location of a router on the local subnet that the host can use to contact other networks.

host name

The description name assigned to a computer.

desktop

The desktop is at the top of the object hierarchy in Explorer, containing the Computer, Documents, Network, and Recycle Bin objects. The _________ also stores shortcuts.

fonts

The display and word processing programs can make use of any type face designs (fonts) installed on the local system. Most Windows fonts are OpenType (replacing the earlier TrueType)but some design programs and printers also use Adobe Type 1 fonts.

drive encryption

The entire contents of the drive (or volume), including system files and folders, are encrypted.

PoP (Point of Presence)

The equipment that allows a location, facility, home, or other point-of-access to connect to the Internet.

mouse

The essential device to implement a WIMPGUI, a mouse simply controls the movement of a cursor that can be used to select objects from the screen. All Windows mice feature two click buttons, which are configured to perform different actions. Many mice also feature a scroll wheel.

expansion bus

The external bus that allows additional components to be connected to the computer.

Finder

The file management GUI in macOS.

system files

The files necessary for the operating system to function properly.

cleaning blade (see cleaning unit)

The function of the __________________________ is to remove toner residue from the photosensitive member after a toner image has been transferred onto the paper, and, in order to prepare the photosensitive member for creation of another image.

integrity

The fundamental security goal of ensuring that electronic data is not altered or tampered with.

availability

The fundamental security goal of ensuring that systems operate continuously and that authorized individuals can access data that they need.

confidentiality

The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.

IoT (Internet of Things)

The global network of personal devices (such as phones, tablets, and fitness trackers), home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity.

print languages

The language used by printers to interpret output from the computer as printable text and images. Some printers can use multiple print languages.

BD (Blu-ray Disc)

The latest generation of optical disc technology that uses a 405 mmm blue laser for high density storage, with disc capacity of 25 GB per layer. Transfer rates are measured in multiples of 36 MBps.

life expectancy

The length of time for which a device can be expected to remain reliable.

illuminance

The light projecting power. Compare with luminance.

risk

The likelihood and impact (or consequence) of a threat actor exercising a vulnerability.

instruction set

The machine language code and commands the CPU can process.

system memory

The main storage area for programs and data when the computer is running.

USB (Universal Serial Bus)

The main type of connection interface used on PCs. A larger Type A connector attaches to a port on the host; Type B and Mini- or Micro-Type B connectors are used for devices. USB 1.1supports 12 Mbps while USB 2.0 supports480 Mbps and is backward compatible with 1.1 devices (which run at the slower speed). USB devices are hot swappable. A device can draw up to 2.5 W of power. USB3.0 and 3.1 define 5 Gbps (SuperSpeed)and 10 Gbps (SuperSpeed+) rates and can deliver 4.5 W of power.

Internet backbone

The major infrastructure of the Internet.

power rating

The maximum power output available from a PC power supply, measured in watts, calculated as voltage multiplied by current.

printer technology

The mechanism used in a printer to create images on paper. It determines the quality, speed, and cost of the output.

printer type

The mechanism used to make images on the paper. Also referred to as printer technology.

options

The modifiers used with Linux commands to make a command more versatile.

SATA (Serial ATA)

The most widely used interface for hard disks on desktop and laptop computers. It uses a 7-pin data connector with one device per port. There are three SATA standards specifying bandwidths of1.5 Gbps, 3 Gbps, and 6 Gbps, respectively. SATA drives also use a new 15-pin power connector, though adapters for the old style 4-pin Molex connectors are available. External drives are also supported via the eSATA interface.

OS X

The name of the Apple operating system from 2001 through 2016.

Mac OS

The name of the Apple operating system from launch to 2001.

IP (Internet Protocol)

The network (Internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher level protocols in the suite.

TCP/IP Suite (Transmission Control Protocol/Internet Protocol suite)

The network protocol suite used by most operating systems and the Internet. It is widely adopted, industry standard, vendor independent, and open. It uses a 4-layer network model that corresponds roughly to the OSI model as follows: Network Interface (Physical/Data Link), Internet (Network), Transport(Transport), Application (Session, Presentation, Application).

collision domain

The network segment in which contention collisions occur.

boot sequence

The order in which the system firmware searches devices for a boot manager.

configuration baseline

The original or recommended settings for a device.

print job

The output produced by an application and passed to the printer, and then to the print device via a print monitor and port.

fuser assembly

The part of a laser printer that fixes toner to media. This is typically a combination of a heat and pressure roller, though non-contact flash fusing using xenon lamps is found on some high-end printers.

luminance

The perceived brightness of a display screen, measured in candelas per square meter (cd/m²).

RTO (Recovery Time Objective)

The period following a disaster that a system may remain offline. See also recovery point objective.

ACL (Access Control List)

The permissions attached to or configured on a network resource, such as folder, file, or firewall. The ____________ specifies which subjects (user accounts, host IP addresses, and so on)are allowed or denied access and the privileges given over the object (read only, read/write, and so on).

connections

The physical access points that enable a computer to communication with internal or external devices.

refresh rate

The picture displayed on a CRT monitor is updated (by vertical refreshing) many times per second. The more times the image is refreshed, the more stable and flicker-free the picture. On flat panels, there is no flicker as each pixel is not redrawn but only updated. Flat panels can suffer from motion blur and ghosting, however, and better refresh rates can reduce these issues.

interface

The point at which two devices connect and communicate with each other.

baseline

The point from which something varies. A configuration ________________ is the original or recommended settings for a device, while a performance __________ is the originally measured throughput.

command interpreter

The portion of an operating system or script language that is able to read and implement commands entered by a user or from a script file.

front panel

The portion of the system case that provides access to removable media drives, power switch, and LEDs to indicate driver operation.

rear panel

The portion of the system case with cut-out slots aligned with the position of adapter card slots.

voltage

The potential difference between two points (often likened to pressure in a waterpipe) measured in Volts (V). In the UK, mains power is supplied at 220-240 V. In the US, mains power is 110-120 V.

CPU (Central Processing Unit)

The principal microprocessor in a computer or smartphone responsible for running operating system and applications software.

RAM (Random Access Memory)

The principal storage space for computer data and program instructions. RAM is described as being volatile in the sense that once power has been removed or the computer has been rebooted, data is lost.

HTTP (HyperText Transfer Protocol)

The protocol used to provide web content to browsers. HTTP uses port 80. HTTPS(ecure) provides for encrypted transfers, using SSL/TLS and port 443.

power

The rate at which electricity is drawn from the supply by the device using it, measured in Watts.

MTBF (Mean Time Between Failures)

The rating on a device or component that predicts the expected time between failures.

sector

The regularly sized subdivision of a drive track. During low-level formatting, the size and position of the sectors is written to the disk so that the data can be placed into uniform spots that the drive head can easily access.

ESD (electrostatic discharge)

The release of a charge from a metal or plastic surface that occurs when a potential difference is formed between the charged object and an oppositely charged conductive object. This electrical discharge can damage silicon chips and computer components if they are exposed to it.

cover

The removable portion of the system case that allows access to the motherboard and internal components.

Patch Tuesday

The second Tuesday of every month when Microsoft releases updates.

network topology

The shape or structure of a network is commonly described as its topology. Topologies may be either physical (the actual appearance of the network layout) or logical (the flow of data across the network). In a star topology, nodes are connected to a single point while in a hub topology, all nodes connect to the same media and share bandwidth. A ring topology means that communications travel from node-to-node in a loop. In a full mesh network, each node is linked to every other node, but partial meshes are far more common. A hybrid topology uses elements of different topologies, such as a logical bus but physical star.

CPU form factor (Central Processing Unit for factor)

The size, shape, and connection method of the CPU.

active listening

The skill of listening to an individual so that you give them your full attention and are not trying to argue with, comment on, or misinterpret what they have said.

pixel

The smallest discrete element on a display. A single pixel is composed of a red, a blue, and a green dot.

absolute path

The specific location, including the domain name, irrespective of the working directory or combined paths.

access time

The speed at which memory or a disk drive can be addressed and utilized (opened, read from, or written to).

core clock speed

The speed at which the CPU runs internal processes and accesses L1 and L2 cache.

DIMM (Dual In-line Memory Module)

The standard packaging for system memory. There are different pin configurations for different RAM types (DDR SDRAM [184], DDR2/3 SDRAM [240], and DDR4 SDRAM[288]).

broadband

The technic al meaning of __________ is a transmission that divides the available media bandwidth into a number of transmission paths or channels. WAN signaling generally uses this form of transmission and consequently the term is used generally to refer to 2 MBps+ Internet links such as DSL or cable.

Bubblejet

The term used by the Canon company to refer to their thermal inkjet print method.

RVI (Rapid Virtualization Indexing)

The term used for SLAT extensions by AMD.

EPT (Extended Page Table)

The term used for SLAT extensions by Intel.

latency

The time it takes for a signal to reach the recipient. A video application can support a latency of about 80 ms, while typical latency on the Internet can reach 1000 ms at peak times. Latency is a particular problem for 2-way applications, such as VoIP (telephone) and online conferencing.

tone generator and probe

The tone generator is an electronic device that sends an electrical signal through one set of UTP cables. The tone probe (or tone locator) is an electronic device that emits an audible tone when it detects a signal sent by the tone generator in a set of wires.

CMS (Configuration Management System)

The tools and databases that collect, store, manage, update, and present information about CIs.

Microsoft account

The type of account required to get apps from the Microsoft Store, to sync data between devices, access OneDrive, and work with parental controls for a Child account.

UTP (Unshielded Twisted Pair cabling)

The type of cabling typically used for computer networking, composed of eight insulated copper wires grouped into four pairs with each pair twisted to reduce interference between wires.

VM sprawl (virtual machine sprawl)

The uncontrolled development of more and more virtual machines.

domain name

The unique and officially registered name that identifies a company, organization, or individual.

cyber warfare

The use of IT services and devices to disrupt national, state, or organization activities, especially when used for military purposes.

structured cabling system

The use of patch cords, permanent links, and patch panels.

Android application package (APK)

Third-party or custom programs that are installed directly through an APK file, giving users and business the flexibility to install apps directly on Android devices.

permissions

To access files and folders on a volume, the administrator of the computer will need to grant file permissions to the user(or a group to which the user belongs). File permissions are supported by NTFS-based Windows systems.

key exchange

Two hosts need to know the same symmetric encryption key without any other host finding out what it is.

network

Two or more computer systems linked together by some form of transmission medium that enables them to share information.

mutual authentication

Typically a client authenticates to a server. In many circumstances, it may be necessary for the server to authenticate to the client also (to prevent Man-in-the-Middle attacks, for instance). This is referred to as mutual authentication.

impact printer

Typically, a dot matrix printer, this uses pressure to transfer ink from a ribbon onto paper in a particular pattern, similar to the mechanism of a typewriter.

zombie

Unauthorized software that directs the devices to launch a DDoS attack.

supplicant

Under 802.1X, the device requesting access.

SSTP (Secure Socket Tunneling Protocol)

Uses the HTTP over SSL protocol and encapsulates an IP packet with an SSTP header.

AR (augmented reality)

Using software and smartphone cameras or headsets to interact with real-world objects and images or change the way they appear in some way.

Windows Settings

Windows 10 app for configuring and managing the Windows 10 computer.

syslog

Used in UNIX and Linux, log files that allow for centralized collection of events from multiple sources.

PATA (Parallel Advanced Technology Attachment)

Used to be the main disk interface for PCs. The interface was very commonly called IDE (Integrated Drive Electronics) or Enhanced IDE (EIDE). Each PATA adapter supports two devices, commonly called master and slave. A drive is connected to the bus by a 40-pin ribbon cable. The PATA interface has been replaced by SATA.

standoffs

Used to firmly attach the motherboard to the case, ensuring no other part of the motherboard touches the case.

RADIUS (Remote Authentication Dial-in User Service)

Used to manage remote and wireless authentication infrastructure. Users supply authentication information to RADIUS client devices, such as wireless access points. The client device then passes the authentication data to an AAA(Authentication, Authorization, and Accounting) server, which processes the request.

power injector

Used when an existing switch does not support PoE. When a device is connected to a port on a PoE switch, the switch goes through a detection phase to determine whether the device is PoE-enabled. If not, it does not supply power over the port and therefore does not damage non-PoE devices. If so, it determines the device's power consumption and sets the supply voltage level appropriately.

disk wiping

Using software to ensure that old data is destroyed by writing to each location on the media, either using zeroes or in a random pattern. This leaves the disk in a "clean" state ready to be passed to the new owner.

tethering

Using the cellular data plan of a mobile device to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi (a mobile hotspot).

server consolidation

Using virtual servers, make more efficient use of system resources and hardware since most servers' capacity is not fully utilized.

arguments

Values supplied to the command for it to operate on, supplied in the correct order required for the command's syntax.

Data Sources

Windows applications can import data from various data sources. The links to different data files and database drivers can be configured from Administrative Tools.

dim display

When a mobile device has the backlight set to its lowest setting and the automatic light adjustment is disabled, or the phone is set to conserve power by auto-dimming the light.

2-step verification

When a user connects to a service using a device that was not previously registered with the service, the authenticator application sends a one time password to a smartphone or alternate email address that the user then enters to complete the authentication process.

locked out

When a user is unable to access a device because the device has been disabled either by means of the user forgetting the passcode too many times or remotely using an app that locks the device if it is reported lost or stolen.

unauthorized camera and microphone usage

When an attacker gains access to the camera and microphone on a mobile device and uses it to cause a security breach of sensitive data.

unauthorized root access

When an attacker gains root access which allows the attacker to have system-level access to every process running in the OS.

RAW

When applied to a print job, RAW means the job is fully rendered and ready to be passed to the print device without further processing.

data transmission overlimit

When apps, especially malware or rogue apps, trying to collect data in the background use excessive amounts of a data on a mobile device.

power drain

When apps, especially malware or rogue apps, use excessive power and quickly drain the battery of a mobile device.

high resource utilitization

When apps, especially malware or rogue apps, use excessive processor cycles (often trying to collect data in the background)and overwhelm a mobile device.

track

When data is written onto a drive, it is stored as magnetic changes in the structure of the disk. These alterations are written as concentric rings as the disk spins. Each of these rings is termed a track.

AC (alternating current)

When electricity is produced by a generator at the power station, the rotational movement of the magnetic coils causes the current produced to oscillate like a sinewave (it is said to alternate). Computers require direct current (at a constant voltage). A transformer is used to convert ______________ from the power outlet into the 3.3, 5, and 12 V DC supply required by the computer.

unauthorized account access

When someone other than an authorized user gains access to an online account.

redirection

When the user tries to open a web page but is sent to another page (which may or may not look like the page the user was attempting to access).

ARP (Address Resolution Protocol)

When two systems communicate using IP, an IP address is used to identify the destination machine. The IP address must be mapped to a device (the network adapter's MAC address). ARP performs the task of resolving an IP address to a hardware address. Each host caches known mappings in an ARP table for a few minutes. It is also a utility used to manage the ARP cache.

EMF (Enhanced MetaFile)

When using EMF, the software application and GDI quickly produce a partial print job. Control is then released back to the user while spooling continues in the background (GDI and the print driver are called to complete the processing of the job).

spoofing

Where the attacker disguises their identity. Some examples include IP spoofing, where the attacker changes their IP address, or phishing, where the attacker sets up a false website.

MitM (Man-in-the-Middle)

Where the attacker intercepts communications between two hosts.

replay attack

Where the attacker intercepts some authentication data and reuses it to try tore-establish a session.

Data Collector Sets

Window log files that record information for viewing in real time or at a later date.

Component Services

Windows applications use various component (COM) models and APIs to share data. Component Services in Administrative Tools allows configuration of component servers.

counter logs

Windows log files that allow you to collect statistics about resources and can be used to determine system health and performance.

trace logs

Windows log files that allow you to collect statistics about services, including extensions to Event Viewer to log data that would otherwise be inaccessible.

service

Windows machines run services to provide functions; for example, Plug-and-Play, the print spooler, DHCP client, and so on. These services can be viewed, configured, and started/stopped via the Services console. You can also configure which services run at startup using msconfig. You can view background services (as well as applications) using the Processes tab in Task Manager.

homegroup

Windows networking feature designed to allow Windows 7 and later home networks to share files and printers easily through a simple password protection mechanism. Earlier versions of Windows are not supported. Support for homegroups was discontinued in later versions of Windows 10.

Microsoft Windows

Windows started as version 3.1 for 16-bitcomputers. A workgroup version provided rudimentary network facilities. Windows NT 4 workstations and servers (introduced in 1993) provided reliable 32-bit operation and secure network facilities, based around domains. The Windows 9x clients(Windows 95, 98, and Me) had far lower reliability and only support for workgroups, but were still hugely popular as home and business machines. Windows2000 and Windows XP workstations married the hardware flexibility and user interface of Windows 9x to the reliability and security of Windows NT, while the server versions saw the introduction of Active Directory for managing network objects. The subsequent client releases of Windows (Vista and Windows 7) featured a substantially different interface (Aero) with3D features as well as security improvements. The latest client versions—Windows 8 and Windows 10—are designed for use with touchscreen devices.

BCD (Boot Configuration Data)

Windows stores information about operating systems installed on a computer in a boot configuration data store, located in \boot \bcd on the system partition. The _________ can be modified using the bcedit command-line tool or MSCONFIG.

quality updates

Windows updates that are typically released each Tuesday designed to address security vulnerabilities, usually installed in one group of patches and requiring a single reboot. Compare with feature updates.

COM port (communications port)

Windows' representation of a computer's serial port(s), numbered sequentially (COM1,COM2...).

WMN (Wireless Mesh Network)

Wireless network topology where all nodes—including client stations—are capable of providing forwarding and path discovery. This improves coverage and throughput compared to using just fixed access points and extenders.

MIMO/MU-MIMO (Multiple Input Multiple Output/Multiple User MIMO)

Wireless technology used in802.11n/ac and 4G standards. MIMO is the use of multiple reception and transmission antennas to boost bandwidth. A Multi-user MIMO (MU-MIMO)-capable access point can use separate streams to connect multiple MU-MIMO-capable stations simultaneously, providing the stations are not on the same directional path.

traces

Wires etched on to the motherboard to provide electrical pathways.

ACE (access control entry)

Within an ACL, a record of subjects and the permissions they hold on the resource.

managed switch

Works as an unmanaged switch out-of-the-box but an administrator can connect to it over a management port, configure security settings, and then choose options for the switch's more advanced functionality.

bus

_________________ are the connections between components on the motherboard and peripheral devices attached to the computer. __________ are available in industry standard formats, each with its own advantages and disadvantages. The standard functions of a bus are to provide data sharing, memory addressing, power supply, and timing. Common ________ types include PCI, PCI express, and USB.

Chrome OS

_____________________ is derived from Linux, via an open source OS called Chromium. ______________________ itself is proprietary. _________________ is developed by Google to run on specific laptop (chromebooks) and PC (chromeboxes) hardware.

implicit deny

______________________ is a basic principle of security stating that unless something has explicitly been granted access it should be denied access. An example of this is firewall rule processing, where the last (default) rule is to deny all connections not allowed by a previous rule.

resistance (R)

_______________________ describes the property of a material to prevent electrical flow through itself. Metals have little electrical resistance whereas plastics and rubber have very high resistance and in most cases will not allow electrical current to pass through them. The resistance of a body to electrical current is measured in Ohms (Ω or R) and is related to potential difference (V) and current (I) by the equation V=IR.

2D barcodes (see QR code)

_________________________ look like squares or rectangles that contain many small, individual dots. A single _____________________ can hold a significant amount of information and may remain legible even when printed at a small size or etched onto a product.

asset management

_________________________ means identifying each asset and recording its location, attributes, and value in a database.

array (see RAID)

is a data structure consisting of a collection of elements, each identified by at least one ____________ index or key. An _________________ is stored such that the position of each element can be computed from its index tuple by a mathematical formula.

CAM (Content Addressable Memory) (see MAC address table)

is a special type of computer memory used in certain very-high-speed searching applications. It is also known as associative memory or associative storage and compares input search data against a table of stored data, and returns the address of matching data

battery backup (see UPS)

s a device that your computer or device is plugged into in order to minimize the effect of brownouts, surges, and electrical outages. Once a surge or an outage occurs, a _____________________ goes into effect immediately to be able to power the computers and devices for a short period of time.


Conjuntos de estudio relacionados

Chapter 8: Lifting and Moving Patients

View Set

Nurs3554 Exam 3 Violence and Anger

View Set

Chapter 6 Campaigns and Elections

View Set

Anatomy & Physiology Exam 1, Anatomy and Physiology Exam 2, Anatomy & Physiology Exam 3, Anatomy & Physiology Exam 4, Anatomy and Physiology Exam 5

View Set