Quizlet Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

structured programming

A programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of the structured control flow constructs of selection, repetition, block structures, and subroutines.

single sign-on

A property of access control systems that allows a user to log in once and gain access to all interrelated systems without being prompted to log in again.

attribute

A property.

HDMI

A proprietary audio/video interface for transferring uncompressed video data and compressed or uncompressed digital audio data from a compliant source device to a compatible computer monitor, video projector, digital television, or digital audio device.

HFS

A proprietary file system developed by Apple Inc. in 1998 for use in computer systems running macOS.

APFS

A proprietary file system released in 2017 for macOS, optimized for flash and solid-state drive storage, with a primary focus on encryption.

NTFS

A proprietary journaling file system developed by Microsoft.

Blackberry OS

A proprietary mobile operating system developed by BlackBerry Ltd for its BlackBerry line of smartphone handheld devices.

WPA

A quick alternative to improve Wi-Fi security.

APIPA

A random link-local address starting with 169.254.x.y used when a device fails to obtain an address through DHCP.

ROSI

A ratio between net benefit and cost of investment. As a performance measure, ROI is used to evaluate the efficiency of an investment or to compare the efficiencies of several different investments.

DUMP

A record of the table structure and/or the data from a database, usually in the form of a list of SQL statements.

URL (Uniform Resource Locator)

A reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it.

URL

A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

upgrade

A replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date or to improve its characteristics.

DVD-RAM

A rewritable DVD technology perceived as being better than other DVD technologies for traditional computer usage tasks such as general data storage, and especially data backup and archival.

DVD-RW

A rewritable optical disc with equal storage capacity to a DVD-R, typically 4.7 GB, that stores data in one long spiral track.

GPS

A satellite-based radio-navigation system owned by the United States government and operated by the United States Space Force.

audit trail

A security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.

command prompt

A sequence of characters used in a command-line interface to indicate readiness to accept commands.

thread

A sequence of independent program instructions.

subroutine

A sequence of program instructions that performs a specific task, packaged as a unit.

loop

A sequence of statements which is specified once but which may be carried out several times in succession.

string

A sequences of characters.

OS X

A series of Unix-based graphical interface operating systems developed and marketed by Apple Inc. designed to run on Mac computers.

DIMM

A series of dynamic random-access memory integrated circuits.

keyboard shortcut

A series of one or several keys that invoke a software or operating system operation when triggered by the user.

Mac

A series of personal computers manufactured by Apple Inc. and running the OS X operating system.

proxy server

A server application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources.

Microsoft Update

A service offered by Microsoft that provides updates for Windows components and other Microsoft software.

Windows Update

A service offered by Microsoft that provides updates for Windows components.

DRM (Digital Rights Management)

A set of access control technologies for restricting the use of proprietary hardware and copyrighted works.

Microsoft Office Compatibility Pack

A set of add-ins that allow Microsoft Office 2000, XP, and 2003 to open, edit, and save files using the file format of Office 2007 and later versions of Word, Excel, and PowerPoint.

Chipset

A set of electronic components in an integrated circuit known as a "Data Flow Management System" that manages the data flow between the processor, memory and peripherals.

pipeline

A set of processes chained by their standard streams, so that the output of each process feeds directly as input to the next one.

pipeline

A set of processes chained by their standard streams, so that the output of each process feeds directly as input to the next process.

password confidentiality

A set of rules or a promise that limits access or places restrictions on password sharing.

confidentiality

A set of rules or a promise usually executed through agreements that limits access or places restrictions on certain types of information.

airplane mode

A setting available on smartphones and other portable devices that, when activated, suspends the device's radio-frequency (RF) signal transmission technologies (i.e., Bluetooth, telephony and Wi-Fi), effectively disabling all voice, text and phone services.

default

A setting or a value automatically assigned to a command without user intervention.

EMP (Electromagnetic Pulse)

A short burst of electromagnetic energy.

hotfix

A single, cumulative package that is used to address a problem in a software product. Typically, hotfixes are made to address a specific customer situation, undergo less regression testing, and have more limited distribution than patches.

cookie

A small piece of data sent from a website and stored in a user's web browser or browser cache while the user is browsing that website.

laptop

A small, portable personal computer (PC) with a "clamshell" form factor, typically having a thin LCD or LED computer screen mounted on the inside of the upper lid of the clamshell and an alphanumeric keyboard on the inside of the lower lid.

web browser

A software application for retrieving, presenting and traversing information resources on the World Wide Web.

VMware Fusion

A software hypervisor developed by VMware for computers running OS X with Intel processors.

virtual machine (VM)

A software implemented abstraction of the underlying hardware which is presented to the application layer of the system.

SaaS

A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.

directory service

A software system that stores, organizes, and provides access to operating system information.

RDBMS

A software system used to maintain relational databases.

GPU

A specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device.

firmware

A specific class of computer software that provides the low-level control for a device's specific hardware.

product key

A specific software-based key for a computer program that certifies that the copy of the program is original.

UEFI

A specification that defines a software interface between an operating system and platform firmware, meant to replace the BIOS firmware interface.

FTP

A standard network protocol used for the transfer of computer files between a client and server on a computer network.

file format

A standard way that information is encoded for storage in a computer file.

PXE

A standardized client-server environment that boots a device from software retrieved from the network rather than a local secondary device.

DHCP

A standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services.

privacy policy

A statement or a legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data.

workstation

A stationary personal computer, typically with a separate case holding the system components.

trackball

A stationary pointing device consisting of a ball held by a socket containing sensors to detect a rotation of the ball about two axes.

TKIP

A stopgap security protocol used in the IEEE 802.11 wireless networking standard, and no longer considered secure.

TKIP (Temporal Key Integrity Protocol)

A stopgap security protocol used in the IEEE 802.11 wireless networking standard, and used to replace WEP without requiring the replacement of legacy hardware.

variable

A storage address paired with an associated symbolic name, which contains some known or unknown quantity of information referred to as a value.

CSS

A style sheet language used for describing the presentation of a document written in a markup language.

function

A subprogram which provides an explicit return value.

filename extension

A suffix, separated from the base filename by a dot or space, used to indicate the file's content format or usage.

ICMP

A supporting protocol in the Internet protocol suite used to send error messages and operational information indicating success or failure when communicating with another IP address.

DDL

A syntax similar to a computer programming language for defining data structures, especially database schemas.

DCL

A syntax similar to a computer programming language used to control access (authorization) to data stored in a database.

ifconfig

A system administration utility in Unix-like operating systems that has features for configuring, controlling, and querying TCP/IP network interface parameters.

markup language

A system for annotating a document in a way that is syntactically distinguishable from the text.

protocol

A system of digital rules for data exchange within or between computers.

Internet of things (IoT)

A system of interrelated computing devices, mechanical and digital machines provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

control panel

A system utility that give the user control over hardware and software settings.

msconfig

A system utility used to troubleshoot the Microsoft Windows startup process.

Windows PowerShell

A task automation and configuration management framework from Microsoft, consisting of a command-line shell and associated scripting language built on the .NET Framework.

MIDI

A technical standard that describes a protocol, digital interface and connectors and allows a wide variety of electronic musical instruments, computers and other related devices to connect and communicate with one another.

dictionary attack

A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities from a list.

computer data storage

A technology consisting of computer components and recording media that are used to retain digital data.

OEM

A term that refers either to a company that makes a part or subsystem used in another company's end product or collectively to all of the various manufacturers involved in the final assembly of an end product.

Kbps

A thousand bits per second.

Kb

A thousand bits.

KB

A thousand bytes.

PB

A thousand trillion bytes.

VGA connector

A three-row 15-pin DE-15 connector found on many video cards, computer monitors, and high definition television sets.

identifier

A token or symbol which names a language entity.

Tbps

A trillion bits per second.

Tb

A trillion bits.

TB

A trillion bytes.

discretionary access control

A type of access control by which a subject with a certain access permission is capable of passing that permission on to any other subject.

WEEE (Waste Electrical and Electronic Equipment) Directive

A European Union directive that restricts disposal of electronic and electrical equipment due to hazardous waste.

RoHS (Recycling of Hazardous Substances)

A European Union directive that restricts the use of hazardous materials in the manufacture of various types of electronic and electrical equipment.

parted

A Linux command used to manage hard disk partitions.

net use

A Microsoft Windows command that connects a computer to or disconnects a computer from a shared resource, or displays information about computer connections.

net share

A Microsoft Windows command that manages shared resources.

ipconfig

A Microsoft Windows console application that displays all current TCP/IP network configuration values and can modify Dynamic Host Configuration Protocol DHCP and Domain Name System DNS settings.

UTF (Unicode Transformation Format)

A Unicode encoding that maps code points to byte sequences. Encodings include UTF-8, UTF-16, and UTF-32.

Linux

A Unix-like computer operating system assembled under the model of free and open-source software development and distribution.

chmod

A Unix-like operating system command used to change the access permissions on files and directories.

ls

A Unix-like operating system command used to display file and directory listings.

cd (chdir)

A Windows and Unix-like operating system command used to change the current working directory.

tree

A Windows and Unix-like operating system command used to display a recursive directory listing.

mkdir

A Windows and Unix-like operating system command used to make a new directory.

more

A Windows and Unix-like operating system command used to view the contents of a text file one screen at a time.

attrib

A Windows command used to change various characteristics, or attributes of a file or directory.

cacls

A Windows command used to display and modify the security descriptors on folders and files.

dir

A Windows command used to display file and directory listings.

diskpart

A Windows command used to manage hard disk partitions.

move

A Windows command used to move one or more files or directories from one place to another.

Gbps

A billion bits per second.

Gb

A billion bits.

GB

A billion bytes.

GHz

A billion cycles per second.

gif (Graphics Interchange Format)

A bitmap image format that was introduced by CompuServe.

power strip

A block of electrical sockets that attaches to the end of a flexible cable, allowing multiple electrical devices to be powered from a single electrical socket.

intellectual property (IP)

A category of property that includes intangible creations of the human intellect

mandatory access control

A type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.

NVM

A type of computer memory that can retrieve stored information even after having been power cycled.

inkjet printer

A type of computer printer that recreates a digital image by propelling droplets of ink onto paper, plastic, or other substrates.

flowchart

A type of diagram that represents a workflow or process.

trademark

A type of intellectual property consisting of a recognizable sign, design, or expression which identifies products or services of a particular source from those of others.

ASCII (American Standard Code for Information Interchange)

A character encoding standard for electronic communication used to represent text in computers, telecommunications equipment, and other devices, limited to representing 128 possible characters.

char

A character.

DDR RAM

A class of memory integrated circuits used in computers that makes higher transfer rates possible by more strict control of the timing of the electrical data and clock signals.

office suite

A collection of bundled productivity software intended to be used by knowledge workers.

unstructured backup

A collection of media with copies of data and minimal information about what was backed up and when.

table

A collection of related data held in a structured format within a database consisting of fields and records.

database

A collection of schemas, tables, queries, reports, views and other objects.

package manager

A collection of software tools that automates the process of installing, upgrading, configuring, and removing software packages for a computer's operating system in a consistent manner.

knowledge base

A collection of structured and unstructured data representing facts about products or systems, often hosted on vendor websites and containing troubleshooting approaches and solutions.

GUI (graphical user interface)

A type of interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.

data processing system

A combination of machines, people, and processes that for a set of inputs produces a defined set of outputs.

mv

A command on Unix-like operating systems used to move one or more files or directories from one place to another.

SMB

A common file sharing protocol used on Windows, OS X, and Unix-like systems.

exe

A common filename extension denoting an executable file for DOS, OpenVMS, Microsoft Windows, Symbian or OS/2.

UNC

A common syntax used by Windows to describe the location of a network resource, such as a shared file, directory, or printer using the form \\ComputerName\SharedFolder\Resource.

parallel port

A communication interface based on a 25-pin connector, also known as a printer port or Centronics port.

serial port

A communication interface through which information transfers in or out one bit at a time and based on a 9-pin connector.

Bus

A communication system that transfers data between components inside a computer, or between computers.

CD-RW

A compact disc that can be written, read arbitrarily many times, erased and written again.

OEM

A company that produces parts and equipment that may be marketed by another manufacturer.

7zip / 7z

A compressed archive file format that supports several different data compression, encryption and pre-processing algorithms.

stylus pen

A computer accessory used to assist in navigating or providing more precision when using a touchscreen.

task scheduler

A computer application or service for controlling unattended background program execution of tasks.

32-bit

A computer architecture that supports integer values to -2,147,483,648 through 2,147,483,647 and memory addresses to 4 GiB (gigabytes or gibibytes).

64-bit

A computer architecture that supports integer values to over 18 quintillion and memory addresses to 16 EiB (exbibytes).

PCI-X

A computer bus and expansion card standard that enhances the 32-bit PCI Local Bus for higher bandwidth.

SATA

A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives and optical drives, which replaced IDE / Parallel ATA.

CLI

A type of interface that processes commands to a computer program in the form of lines of text.

SATA

A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.

DDR

A computer bus that transfers data on both the rising and falling edges of the clock signal.

video game console

A computer device that outputs a video signal or visual image to display a video game that one or more people can play.

NIC

A computer hardware component that connects a computer to a computer network.

query language

A computer language used to select data in databases and information systems.

ping

A computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

thin client

A computer or computer program which depends heavily on some other computer (its server) to fulfill its computational roles.

kernel

A computer program at the core of a computer's operating system with complete control over everything in the system.

filter

A computer program or subroutine that processes an input stream, producing another stream.

packet sniffer

A computer program that can intercept and log traffic passing over a digital network.

device driver

A computer program that operates or controls a particular type of device that is attached to a computer.

file manager

A computer program that provides a user interface to manage files and folders.

database server

A computer program that provides database services to other computer programs or computers as defined by the client-server model.

service

A computer program that runs as a background process, rather than being under the direct control of an interactive user.

antivirus software

A computer program used to prevent, detect, and remove malware.

DML

A computer programming language used for adding, deleting, and modifying data in a database.

TLS

A computer programming method that uses static or global memory local to a thread.

shared resource

A computer resource made available from one host to other hosts on a computer network.

ethical hacker

A computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

database management system

A computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.

proxy server

A computer system or an application that acts as an intermediary for requests from clients seeking resources from other servers.

embedded system

A computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.

server

A computer that provides functionality for other programs or devices.

host

A computer which runs one or more virtual machines.

automatic updates

A configuration that allows an operating system or application to automatically download and install system updates.

full backup

A copy of all data at a specific point in time.

incremental backup

A copy of all data that has changed since the last backup.

differential backup

A copy of all data that has changed since the last full backup.

backup

A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.

system image

A copy of the entire state of a computer system that may later be restored to exactly the same state.

TCP

A core protocol of the Internet Protocol Suite that provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating over an IP network.

brute-force attack

A cryptanalytic attack that consists of systematically checking all possible keys or passwords until the correct one is found.

SSH (Secure Shell)

A cryptographic network protocol that uses TCP port 22 for initiating secure text-based shell sessions on remote systems.

TLS (Transport Layer Security)

A cryptographic protocol designed to provide communications security over a computer network using asymmetric cryptography, and which superseded Secure Sockets Layer (SSL).

SSL (Secure Sockets Layer)

A cryptographic protocol designed to provide communications security over a computer network using asymmetric cryptography, superseded by Transport Layer Security (TLS).

ransomware

A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed.

ROM

A type of non-volatile memory useful for storing firmware.

keyboard

A typewriter-style device, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches.

MAC

A unique 48-bit address used in Ethernet networks.

MAC address

A unique identifier assigned to network interfaces for communications on the physical network segment.

SSID

A unique identifier for a wireless LAN.

SID

A unique, immutable identifier of a user, user group, or other security principal.

SID (Security Identifier / System Identifier)

A unique, immutable identifier of a user, user group, or other security principal.

TB

A unit of digital information equal to 10^12 (1 trillion) bytes.

Kb

A unit of digital information equal to 10^3 (1 thousand) bits.

KB

A unit of digital information equal to 10^3 (1 thousand) bytes.

Mb

A unit of digital information equal to 10^6 (1 million) bits.

MB

A unit of digital information equal to 10^6 (1 million) bytes.

Gb

A unit of digital information equal to 10^9 (1 billion) bits.

GB

A unit of digital information equal to 10^9 (1 billion) bytes.

denial-of-service attack

A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

audio connector

A cylindrical plug and socket connector, typically with two, three or four contacts, used for analog audio signals.

hierarchical database

A data model in which the data is organized into a tree-like structure.

flash drive

A data storage device that includes flash memory, typically with an integrated Universal Serial Bus (USB) interface.

external hard drive

A data storage device used for storing and retrieving digital information, connected via USB, eSATA, FireWire, or Thunderbolt.

RAID

A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

array

A data structure consisting of a collection of elements, each identified by at least one array index or key.

database index

A data structure that improves the speed of data retrieval operations on a database table.

container

A data type whose instances are collections of other objects.

flat-file database

A database which is stored on its host computer system as an ordinary file.

ad hoc

A decentralized wireless network that does not rely on a pre existing infrastructure, such as routers or access points in managed wireless networks.

SAN

A dedicated network that provides access to consolidated, block level data storage.

CSV

A delimited text file where each line of the file is a data record.

DVD-DL

A derivative of the DVD-R format standard which holds 8.5 GB by utilizing two recordable dye layers, each capable of storing a little less than the 4.7 gigabyte (GB) of a single layer disc.

computer fan

A device inside or attached to a computer case used for active cooling.

IDS

A device or software application that monitors a network or systems for malicious activity or policy violations.

bridge or switch

A device that connects and filters multiple network segments or devices, by forwarding data only to one or multiple devices that need to receive the data based on destination MAC address.

modem

A device that modulates signals to encode digital information and demodulates signals to decode the transmitted information, used with phone line and cable connections.

scanner

A device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image.

PSU

A device that supplies electric power to a computer system, converting electric current from a source to the correct voltage, current, and frequency.

range extender

A device that takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network.

SSD

A device that uses integrated circuit assemblies to store data persistently, typically using flash memory.

modem

A device used to connect network nodes via wire not originally designed for digital network traffic, by modulating the digital signal to produce an analog signal for transmission.

firewall

A device used to control network security and access rules by rejecting access requests from unrecognized sources while allowing actions from recognized ones.

voltage converter

A device which changes the voltage of an electrical power source.

speaker

A device which converts an electrical audio signal into a corresponding sound.

safe mode

A diagnostic mode of a computer operating system (OS) with reduced functionality that provides access to utility and diagnostic programs so a user can troubleshoot what is preventing the operating system from working normally.

safe mode

A diagnostic mode of a computer operating system. In Windows, safe mode only allows essential system programs and services to start up at boot. It is widely used for removing rogue security software.

MP4

A digital multimedia file format most commonly used to store video and audio, but can also be used to store other data such as subtitles and still images.

mp4 (Moving Picture Experts Group Layer 4)

A digital multimedia file format most commonly used to store video and audio, but can also be used to store other data such as subtitles and still images.

Blu-Ray

A digital optical disc data storage format designed to supersede the DVD format, with a storage capacity of 25 GB per layer, and dual layer discs (50 GB) being the industry standard for high definition (1080p) feature-length video discs.

CD

A digital optical disc data storage format originally developed to store and play only sound recordings (CD-DA), but was later adapted for storage of data (CD-ROM), with a storage capacity of 737 MB.

DVD

A digital optical disc storage format with a storage capacity of 4.7 GB for a single-layered, single-sided disc and 8.5 GB for a dual-layered, single-sided disc.

thermal printer

A digital printing device which produces a printed image by selectively heating coated thermochromic paper.

DVI

A digital video display interface used to connect a video source to a display device.

display resolution

A display setting that determines the number of distinct pixels in each dimension that can or will be displayed.

peer-to-peer

A distributed application architecture that partitions tasks or work loads between equally privileged participants.

EMI

A disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.

rtf

A document file format developed by Microsoft for cross-platform document interchange.

ppt/pptx

A document file format used for presentation software files.

xls/xlsx

A document file format used for spreadsheet files.

txt

A document file format used for text files.

doc/docx

A document file format used for word processing files.

pdf (Portable Document Format)

A document file format used to present documents in a manner independent of application software, hardware, and operating systems.

SQL

A domain-specific language used in programming and designed for managing data held in a relational database management system.

environment variable

A dynamic named value that can affect the way running processes will behave on a computer.

x86

A family of backward compatible instruction set architectures based on the Intel 8086 through 80486 CPUs supporting 16-bit and 32-bit addressing and processing.

Ethernet

A family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs) standardized in 1983 as IEEE 802.3.

ARM

A family of reduced instruction set computing (RISC) architectures for computer processors currently used in mobile phones and tablets.

DSL (Digital Subscriber Line)

A family of technologies that are used to provide internet access by transmitting digital data over telephone lines.

DSL

A family of technologies that are used to transmit digital data over telephone lines.

Wi-Fi

A family of wireless networking technologies, based on the IEEE 802.11 family of standards.

main memory

A fast storage area that is directly accessible by the CPU, and is used to store the currently executing program and immediately needed data.

System Restore

A feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems.

private browsing

A feature in some web browsers where the browser creates a temporary session that is isolated from the browser's main session and user data.

foreign key

A field in a relational table that matches the primary key column of another table.

archive bit

A file attribute used by Microsoft operating systems to indicate whether a file has been backed up since it was modified.

jpg

A file extension and commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.

dmg

A file extension indicating an Apple Disk Image file format, commonly used by the Mac OS X operating system.

mpg

A file extension used for MPEG-1 or MPEG-2 audio and video compression files.

flv

A file extension used to indicate Flash Video files.

m4a

A file extension used to indicate MPEG 4 audio-only files.

msi

A file extension used to indicate a Microsoft Windows Installer (software installation) file.

bmp

A file extension used to indicate a bitmap image

bat (batch file)

A file extension used to indicate a command script file in DOS, OS/2, and Windows.

rar (Roshal ARchive)

A file extension used to indicate a proprietary archive file format that supports data compression, error recovery and file spanning.

png (Portable Network Graphics)

A file extension used to indicate a raster graphics file format that supports lossless data compression, created as an improved, non-patented replacement for Graphics Interchange Format (GIF).

app

A file extension used to indicate application bundles (folder hierarchies) on OS X.

gzip / gz

A file format and software application used for file compression and decompression on Unix and Linux systems.

tar (tape archive)

A file format and the name of a program used to create and manage tape archives on Unix and Linux systems.

tiff (Tagged Image File Format)

A file format for storing raster graphics images, popular among graphic artists and the publishing industry, the specification of which is controlled by Adobe Systems.

File Explorer

A file manager application included with the Microsoft Windows operating system.

AFP

A file sharing protocol specific to OS X.

NFS

A file sharing protocol specific to Unix-like systems.

directory

A file system cataloging structure which contains references to other computer files.

ext

A file system created specifically for the Linux kernel.

NAS

A file-level (as opposed to block-level) computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.

NAS

A file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.

security functions

A firewall, network address translation (NAT), and VPN handling.

optical fiber

A flexible, transparent filament used most often as a means to transmit light and permit transmission over longer distances and at higher bandwidths.

Hardware Compatibility List

A list of computer hardware (typically including peripheral devices) that is compatible with a particular operating system or device management software.

ACL (Access Control List)

A list of permissions attached to a file system object.

ACL

A list of permissions attached to an object.

access-control list (ACL)

A list of permissions attached to an object.

WI-Fi (Wireless Fidelity)

A local area wireless technology that allows an electronic device to participate in computer networking using 2.4 GHz and 5 GHz bands.

PCI

A local computer bus for attaching hardware devices in a computer, which replaced the original ISA and VESA bus configuration.

PCI

A local computer bus for attaching hardware devices in a computer.

troubleshooting

A logical, systematic search for the source of a problem so that it can be solved, and so the product or process can be made operational again.

subnet

A logically visible subdivision of an IP network.

sleep mode

A low power mode for electronic devices which, upon resume, allow the user to avoid having to reissue instructions or to wait for a machine to reboot.

intermittent fault

A malfunction of a device or system that occurs at intervals, usually irregular, in a device or system that functions normally at other times.

virus

A malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or firmware.

digital signature

A mathematical scheme for demonstrating the authenticity of an electronic message or document.

localization

A means of adapting computer software to different languages, regional differences and technical requirements of a target market.

command-line interface

A means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text.

password

A memorized secret, typically a string of characters, used to confirm the identity of a user.

paging

A memory management scheme by which a computer stores and retrieves data from the secondary storage for use in main memory.

virtual memory

A memory management technique developed for multitasking kernels that allows the operating system to use secondary storage as virtual address space.

virtual memory

A memory management technique that is implemented using both hardware and software that maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory.

Windows

A metafamily of graphical operating systems developed, marketed, and sold by Microsoft.

VoIP

A method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

byte

A unit of digital information in computing and telecommunications that consists of eight bits, permitting the values 0 through 255 and used to encode a single character of text.

MHz

A unit of frequency defined as 10^6 (1 million) cycles per second.

GHz

A unit of frequency defined as 10^9 (1 billion) cycles per second.

Hertz

A unit of frequency defined as one cycle per second.

shell

A user interface for access to an operating system's services, using either a command-line interface (CLI) or graphical user interface (GUI).

System File Checker

A utility in Microsoft Windows that allows users to scan for and restore corruptions in Windows system files.

CRT

A vacuum tube containing one or more electron guns, and a fluorescent screen used to view images.

constant

A value that cannot be altered by the program during normal execution.

parameter

A variable that allows for text or data provided as input to a program, command, or subroutine.

webcam

A video camera that feeds or streams its image in real time to or through a computer to a computer network.

wmv (Windows Media Video)

A video file extension created by Microsoft which can contain video in one of several video compression formats.

guest machine

A virtual computer which is run by a host machine.

guest

A virtual machine.

VMware Player

A virtualization software package for computers running Windows or Linux, supplied free of charge for personal non-commercial use by VMware, Inc.

VirtualBox

A virtualization software package for x86 and AMD64/Intel64-based computers distributed by Oracle.

captive portal

A web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources.

AES

A widely accepted data encryption standard using symmetric cryptography and supporting key lengths of 128, 192 and 256 bits which supersedes DES.

AES (Advanced Encryption Standard)

A widely accepted data encryption standard using symmetric cryptography and supporting key lengths of 128, 192 and 256 bits which supersedes DES.

WPA2

A wireless computer network security protocol based on AES.

WPA2 (Wireless Protected Access 2)

A wireless computer network security protocol based on AES.

WPA

A wireless computer network security protocol based on TKIP.

WPA (Wireless Protected Access)

A wireless computer network security protocol based on TKIP.

multi-factor authentication

A method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories of knowledge, possession, and inherence.

multitasking

A method where multiple tasks, also known as processes, are performed during the same period of time by executing them concurrently rather than sequentially.

NAT (Network Address Translation)

A methodology of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.

Mbps

A million bits per second.

Mb

A million bits.

MB

A million bytes.

MHz

A million cycles per second.

tablet

A mobile device with a mobile operating system and touchscreen display and a rechargeable battery in a single, thin and flat package, with screens 7 inches (18 cm) or larger, measured diagonally, and may not support access to a cellular network.

Android

A mobile operating system (OS) based on the Linux kernel and currently developed by Google.

iOS

A mobile operating system developed by Apple Inc. and distributed exclusively for Apple hardware, including iPods, iPhones, and iPads.

smart phone

A mobile phone with more advanced computing capability and connectivity than basic feature phones.

single user mode

A mode in which a multiuser computer operating system boots into a single superuser, common on Unix-like systems including macOS and Linux.

single user mode

A mode in which a multiuser computer operating system boots into a superuser configuration, used primarily for maintenance of multi-user environments such as network servers.

cloud storage

A model of computer data storage in which the digital data is stored in logical pools on one or more physical Internet-based servers, sometimes replicated across multiple locations.

Boot Camp

A multi boot utility included with Apple Inc.'s OS X that assists users in installing Microsoft Windows operating systems on Intel-based Macintosh computers.

PC (Personal Computer)

A multi-purpose computer whose size, capabilities, and price make it feasible for individual use.

avi (Audio Video Interleave)

A multimedia container file extension and format developed by Microsoft.

nslookup

A network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.

workgroup

A network environment in which each computer is responsible for its own security, rather than relying on centralized authentication.

WLAN

A wireless computer network that links two or more devices using a wireless distribution method within a limited area such as a home, school, computer laboratory, or office building.

WLAN (Wireless Local Area Network)

A wireless computer network that links two or more devices using a wireless distribution method within a limited area such as a home, school, computer laboratory, or office building.

802.11b

A wireless networking standard operating in the 2.4 GHz band and supporting up to 11 Mbps data rates.

802.11g

A wireless networking standard operating in the 2.4 GHz band and supporting up to 54 Mbps data rates.

802.11n

A wireless networking standard operating in the 2.4 GHz or 5 GHz band and supporting up to 600 Mbps data rates.

802.11ac

A wireless networking standard operating in the 5 GHz band and supporting up to 1 Gbps data rates.

802.11a

A wireless networking standard operating in the 5 GHz band and supporting up to 54 Mbps data rates.

MPEG (Moving Picture Experts Group)

A working group of authorities that was formed by ISO and IEC to set standards for audio and video compression and transmission.

numeral system

A writing system for expressing numbers; that is, a mathematical notation for representing numbers of a given set, using digits or other symbols in a consistent manner.

bits

Abbreviated with a lower-case b.

bytes

Abbreviated with an upper-case B.

permissions

Access rights assigned to specific users and groups of users to control the ability of the users to view or make changes to system objects.

mobile Internet

Access to the Internet via a cellular telephone service provider.

INSERT

Adds one or more records to any single table in a relational database.

GRANT

Allows specified users to perform specified tasks.

preemptive multitasking

Allows the operating system to terminate running processes that stop responding.

open-source license

Allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions.

concurrent license

Allows use by a given number of users at the same time.

RJ-45

An 8 position 8 contact modular connector typically used for network cable connections.

01:23:45:67:89:ab

An Ethernet MAC address.

198.51.100.1

An IPv4 address.

2001:db8:0:1234:0:567:8:1

An IPv6 address.

SNMP

An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.

SMTP

An Internet standard for electronic mail (email) transmission.

IMAP

An Internet standard protocol used by e-mail clients to retrieve e-mail messages from a mail server.

diskutil

An OS X command used to manage hard disk partitions

VTC

An abbreviation for Video Teleconference.

microphone

An acoustic-to-electric transducer or sensor that converts sound in air into an electrical signal.

Component-RGB

An analog video signal that uses RCA connectors and has been split into separate signals for red, green, and blue.

peripheral

An ancillary device used to put information into and get information out of the computer.

Windows Defender

An anti-malware program developed by Microsoft and included in Windows Vista and later operating systems.

surge protector

An appliance that attempts to limit the voltage supplied to an electric device by either blocking or by shorting to ground any unwanted voltages above a safe threshold.

System Preferences

An application included with the OS X operating system that allows users to modify various system settings which are divided into separate preference panes.

port forwarding

An application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.

HTTP

An application protocol for distributed, collaborative, hypermedia information systems used as the foundation of data communication for the World Wide Web.

Telnet

An application protocol that uses TCP port 23 to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

SFTP

A network protocol that provides file access, file transfer, and file management over any reliable data stream designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities.

HTTP (Hypertext Transfer Protocol)

An application protocol that uses TCP port 80 for distributed, collaborative, hypermedia information systems and the foundation of data communication for the World Wide Web.

SFTP (Secure File Transfer Protocol)

A network protocol that uses TCP port 22 to provide file access, file transfer, and file management functionalities designed as an extension of the Secure Shell protocol (SSH).

WPS (Wireless Protected Setup)

A network security standard that attempted to allow users to easily secure a wireless home network using a PIN rather than long pass phrases.

firewall

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

WAN

A network that covers a broad geographic area using leased telecommunication lines.

WAN (Wide Area Network)

A network that covers a broad geographic area using leased telecommunication lines.

WAP

A networking hardware device that allows other Wi-Fi devices to connect to a wired network.

trojan

A non-self-replicating type of malware program containing malicious code that, when executed typically causes loss or theft of data, and possible system harm.

SD card

A nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers.

WEP

A notoriously weak security standard.

binary number

A number expressed in the base-2 numeral system, which uses only two symbols: typically "0" (zero) and "1" (one).

PIN

A numeric or alpha-numeric password used in the process of authenticating a user accessing a system.

IP address

A numerical label assigned to each device in a computer network that uses the Internet Protocol for communication.

IP address

A numerical label assigned to each device participating in a network that uses the Internet Protocol for communication

POP

An application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.

Storage Area Network

An approach to approach to shared resources that may be used in addition to file and print servers in a very large network.

role-based access control

An approach to restricting system access to authorized users based on job functions.

zip

An archive file format that supports lossless data compression, supported by Microsoft Windows.

vector

An array of object references.

man-in-the-middle attack

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

jar (Java Archive)

A package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file to distribute application software or libraries on the Java platform.

Control Panel

A part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets.

object

A particular instance of a class.

heat sink

A passive heat exchanger.

relative path

A path based on the working directory of the user or application.

absolute path

A path that points to the same location on one file system regardless of the present working directory or combined paths.

IOPS

A performance measurement used to characterize secondary computer storage devices.

PC

A personal computer running Microsoft Windows, used in contrast with Mac.

host machine

A physical computer on which virtualization takes place.

DMZ (demilitarized zone)

A physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.

client

A piece of computer hardware or software that accesses a service made available by another computer.

hypervisor

A piece of computer software, firmware or hardware that creates and runs virtual machines.

argument

A piece of data provided as input to a program, command, or subroutine.

patch

A piece of software designed to update a computer program or its supporting data, to fix or improve it.

contingency plan

A plan devised for an outcome other than in the usual (expected) outcome.

browser extension

A plug-in that extends the functionality of a web browser.

touchpad

A pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on the operating system that is outputted to the screen.

mouse

A pointing device that detects two-dimensional motion relative to a surface.

password reuse

A policy that prevents users from repeating recently used passwords.

password expiration

A policy that requires users to change passwords periodically.

data retention

A policy which defines data persistence and records management for legal and business archival requirements.

flash drive

A portable computer drive.

mobile media player

A portable digital consumer electronics device capable of storing and playing digital media such as audio, images, and video files.

mobile phone

A portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.

hexadecimal

A positional system that represents numbers using sixteen distinct symbols, most often the symbols "0"-"9" to represent values zero to nine, and "A"-"F" (or alternatively "a"-"f") to represent values ten to fifteen.

AC connector

A power plug and socket connector that allows electrically operated equipment to be connected to the primary power supply in a building.

CD-ROM

A pre-pressed optical compact disc which contains data and is not writable or erasable.

DVD-ROM

A pre-recorded DVD mass-produced using molding machines that physically stamp data onto the DVD, and which can only be read and not written or erased.

FRU

A printed circuit board, part, or assembly that can be quickly and easily removed from a computer or other piece of electronic equipment, and replaced by the user or a technician without having to send the entire product or system to a repair facility.

method

A procedure or function.

data analysis

A process of inspecting, cleansing, transforming and modeling data with the goal of discovering useful information, informing conclusion and supporting decision-making.

authentication

A process to establish identity.

authorization

A process to verify permission to access a resource.

portable application

A program designed to run on a compatible computer without being installed in a way that modifies the computer's configuration information.

command line shell

A program that accepts commands as text input and converts commands to appropriate operating system functions.

scripting language

A programming language for a special run-time environment that automates the execution of tasks.

interpreted language

A programming language for which most of its implementations execute instructions directly and freely.

compiled language

A programming language whose implementations translate source code into machine code before execution.

cross-platform

An attribute conferred to computer software or computing methods and concepts that are implemented and inter-operate on multiple computer platforms.

data type

An attribute of data which tells the compiler or interpreter how the programmer intends to use the data.

flac (Free Lossless Audio Codec)

An audio coding format for lossless compression of digital audio.

aac (Advanced Audio Coding)

An audio coding standard for lossy digital audio compression designed to be the successor of the MP3 format, which generally achieves better sound quality than MP3 at similar bit rates.

wav (Waveform Audio File Format)

An audio file extension developed by Microsoft and IBM for audio bitstream files.

MP3

An audio file format that uses a form of lossy data compression, accepted as the de facto standard of digital audio compression for the transfer and playback of music on most digital audio players.

database constraint

Restricts the data that can be stored in relations.

SELECT

Returns a result set of records from one or more tables.

utility software

Software designed to help to analyze, configure, optimize or maintain a computer.

bundled software

Software distributed with another product such as a piece of computer hardware or other electronic device, or a group of software packages which are sold together.

network installation

Software installation from a shared network resource.

headless installation

Software installation performed without using a computer monitor connected to the system.

silent installation

Software installation that does not display messages or windows during its progress.

clean installation

Software installation that is done in the absence of any interfering elements such as old versions of the computer program being installed or leftovers from a previous installation.

unattended installation

Software installation that is performed without user interaction during its progress or with no user present at all.

attended installation

Software installation that requires a user to be present and interact with the installation process.

automated installation

Software installation that runs at a preset time or when a predefined condition transpires,

Parallels

Software providing hardware virtualization for Macintosh computers with Intel processors.

device use best practices

Software sources, removal of unwanted software

spyware

Software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

bloatware

Software that becomes perceptibly slower, use more memory / disk space or processing power, or have higher hardware requirements than the previous version whilst making only dubious user-perceptible improvements.

application software

Software which directly performs tasks that benefit ordinary users.

graphic design software

Specialty software used to create and combine words, symbols, and images to create a visual representation of ideas and messages.

WHERE

Specifies that a SQL Data Manipulation Language (DML) statement should only affect rows that meet specified criteria.

ORDER BY

Specifies that a SQL SELECT statement returns a result set with the rows being sorted by the values of one or more columns.

troubleshooting principle

Start from the simplest and most probable possible problems first.

snooping

Stealthily observing any type of action or communication.

incremental backup

Stores data changed since a reference point in time.

mass storage

Stores programs and data even when the power is off, but requires power to perform read and write functions during usage.

router interfaces

Support different physical types of network connections, such as copper cables, optical fiber, or wireless transmission.

NTFS, HFS Plus, and ext4

Support file system attributes and permissions.

firmware

Supports different networking communications protocol standards, and should be updated whenever security or performance issues have been corrected.

open network

Susceptible to capturing and recording the traffic, gaining unauthorized access to internal network resources as well as to the internet, and then using the information and resources to perform disruptive or illegal acts.

utility software

System software designed to help analyze, configure, optimize or maintain a computer.

operating system (OS)

System software that manages computer hardware, software resources, and provides common services for computer programs.

transport layer protocols

TCP and UDP.

pop-up

Technology that allows a website author to associate any item with any action, including with a cancel or innocent looking button.

Trash

Temporary storage for deleted files in OS X and Linux.

Recycle Bin

Temporary storage for deleted files in the Microsoft Windows operating system.

x64

The 64-bit version of the x86 instruction set, supporting 64-bit addressing and processing, and fully backwards compatible with 16-bit and 32-bit x86 code.

>>

The character sequence used to append output to the end of a file, rather than overwriting it.

<

The character sequence used to redirect input to a stream.

>

The character sequence used to redirect output to a stream.

.

The character sequence used to represent the current directory.

..

The character sequence used to represent the parent directory.

|

The character sequence used to separate commands in a pipeline.

COMMAND.COM

The command prompt for DOS and Windows operating systems prior to Windows 2000.

cmd.exe

The command prompt for Windows NT, Windows 2000 and later operating systems

Wi-Fi

The common name for a flavor of open standards for wireless local area network radio-wave technology defined as IEEE 802.11.

I/O

The communication between an information processing system, such as a computer, and the outside world, possibly a human or another information processing system.

TCP/IP

The computer networking model and set of communications protocols used on the Internet and similar computer networks.

dynamic addressing

The computer's IP address is assigned newly each time.

file system tree

The content in the left pane of a navigational file manager.

current directory

The content in the right pane of a navigational file manager.

backup

The copying and archiving of computer data so it may be used to restore the original after a data loss event.

POP3

The current version of the Post Office Protocol (POP).

Bash

The default command shell on Linux and Mac OS X.

Finder

The default file manager and graphical user interface shell used on all Macintosh operating systems.

mobility

The degree to which a computing device is able to be transported during normal usage.

availability

The degree to which a system, subsystem or equipment is in a specified operable and committable state at a given time.

IDE

The original name for what became the ATA / ATAPI / PATA interface standard for the connection of computer storage devices such as hard disks, floppy drives, and optical disc drives.

WEP (Wired Equivalency Privacy)

The original security algorithm for IEEE 802.11 wireless networks, and superseded by WPA.

WEP

The original security algorithm for IEEE 802.11 wireless networks, and superseded by WPA. WEP is no longer considered secure.

CPU

The part of a computer which executes software program instructions.

context switch

The passing of control between the kernel and applications.

internetworking

The practice of connecting a computer network with other networks through the use of routers that provide a common method of routing information packets between the networks.

multi-licensing

The practice of distributing software under two or more different sets of terms and conditions.

computer maintenance

The practice of keeping computers in a good state of repair.

information security

The practice of protecting information by mitigating information risks.

dumpster diving

The practice of sifting through commercial or residential waste to find items that have been discarded by their owners, but that may prove useful to the collector.

copyleft

The practice of using copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work.

motherboard

The primary circuit board within a personal computer.

IP

The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

IP

The principal communications protocol in the Internet protocol suite for routing / relaying datagrams across network boundaries.

data reporting

The process of collecting and submitting data which gives rise to accurate analyses of the situation.

authentication

The process of confirming identity.

encryption

The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

compression

The process of encoding information using fewer bits than the original representation.

encryption

The process of encoding information.

data collection

The process of gathering and measuring information on targeted variables in an established system, which then enables one to answer relevant questions and evaluate outcomes.

password cracking

The process of recovering passwords from data that have been stored in or transmitted by a computer system, most often through brute-force or dictionary attacks.

device hardening

The process of securing a system by reducing its surface of vulnerability through the removal of unnecessary software, unnecessary usernames or logins and the disabling or removal of unnecessary services.

device hardening

The process of securing a system by reducing its surface of vulnerability.

scalability

The property of a system to handle a growing amount of work by adding resources to the system.

fault tolerance

The property that enables a system to continue operating properly in the event of the failure of some of its components.

availability

The proportion of time a system is in a functioning condition.

social engineering

The psychological manipulation of people into performing actions or divulging confidential information.

throughput

The rate of successful message delivery over a communication channel.

Internet privacy

The right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.

multitasking

The running of multiple independent computer programs on the same computer at the same time.

physical ergonomics

The science of designing user interaction with equipment and workplaces to fit the user. Proper placement of screens, keyboards and mice can reduce eye-strain and repetitive stress injuries.

inputs

The signals or data received by the system.

outputs

The signals or data sent from the system.

virtualization

The simulation of a hardware platform, operating system, storage device, or network resources using software.

48 bits

The size of an Ethernet MAC address.

32-bit

The size of an IPv4 address.

128-bit

The size of an IPv6 address.

proprietary software license

The software publisher grants the use of one or more copies of software under the end-user license agreement (EULA), but ownership of those copies remains with the software publisher.

file system

The specific way in which files are stored on a disk.

form factor

The specification of a motherboard - the dimensions, power supply type, location of mounting holes, number of ports on the back panel, etc.

HTML

The standard markup language for documents designed to be displayed in a web browser.

HTML (Hypertext Markup Language)

The standard markup language used to create web pages.

decimal numeral system

The standard system for denoting integer and non-integer numbers using the symbols "0"-"9".

snapshot

The state of a system at a particular point in time.

schema

The structure of a database described in a formal language supported by the database management system (DBMS).

ESD

The sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown.

ESD (Electrostatic Discharge)

The sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown.

fax

The telephonic transmission of scanned printed material.

latency

The time interval or delay between a source sending a packet and the destination receiving it.

database engine

The underlying software component that a database management system uses to create, read, update and delete data from a database.

DC (Direct Current)

The unidirectional flow of an electric charge, and the form of electrical energy that consumers typically use when they run devices from a battery.

CAM (Computer Aided Manufacturing

The use of computer software to control machine tools and related machinery in the manufacturing of workpieces.

CAD

The use of computer systems to assist in the creation, modification, analysis, or optimization of a design, particularly for manufacturing.

CAD (Computer Aided Design)

The use of computer systems to assist in the creation, modification, analysis, or optimization of a design, particularly for manufacturing.

Information technology (IT)

The use of computers to store, retrieve, transmit, and manipulate data or information.

Ease of Access Center

The utility that enables use of assistive technologies on Microsoft Windows.

Accessibility

The utility that enables use of assistive technologies on OS X and Linux.

SSID

The wireless network name.

peer-to-peer file sharing

Typically uses applications specifically designed for this task, and may include Internet peers, local ad hoc networks, and Bluetooth connections.

UPDATE syntax

UPDATE <table> SET <column> = <value>, ... [WHERE <condition>]

Unicode encodings

UTF-8, UTF-16, and UTF-32.

primary key

Uniquely specifies a record within a table.

spim

Unsolicited electronic messages targeting users of instant messaging services.

spam

Unsolicited electronic messages, especially advertising.

HTTPS, FTPS, and SFTP

Use cryptographic protocols (SSL/TLS or SSH) to encrypt network traffic between the sender and receiver.

wireless connections

Use spread spectrum technology based on a common flavor of open-standards wireless radio-wave technology defined as IEEE 802.11 and known as Wi-Fi.

trusted certificate authority (CA)

Used by a public key infrastructure (PKI) to validate and sign public key certificates.

file extension

Used by many operating systems to determine the format of a file based on the end of its name, more specifically the letters following the final period.

packet

Used by networked computing devices to pass data to each other across connections established using either cable or wireless media.

supervisor mode

Used by the kernel for low level tasks that need unrestricted access to hardware.

user mode

Used for application programs.

browser extensions

Used for improving a browser's user interface, security or accessibility, blocking advertisements, and various other features to make browsing the internet easier and more pleasant.

DQL

Used for performing queries on the data within schema objects.

productivity software

Used for producing information such as documents, presentations, worksheets, data, charts, graphs, digital paintings, electronic music and digital video.

browser cache

Used for temporary storage of web documents, such as HTML pages and images, to reduce bandwidth usage, server load, and perceived lag.

|

Used in command documentation to indicate a list of choices.

[]

Used in command documentation to indicate optional parameters.

...

Used in command documentation to indicate repeated items.

<>

Used in command documentation to indicate required parameters.

email client

Used to access and manage a user's electronic mail.

visual diagramming software

Used to create vector graphics with points connected by lines and curves to form polygons and other shapes.

? -? -h -H /? /h /H

Used to display a brief summary of command parameters.

presentation software

Used to display information in the form of a slide show.

CREATE

Used to establish a new database, table, index, or stored procedure.

conferencing software

Used to facilitate webinars, webcasts, and peer-level web meetings.

private key

Used to generate a digital signature.

project management software

Used to help plan, organize, and manage resource tools and develop resource estimates for sequences of events or tasks.

Command key

Used to implement keyboard shortcuts on Mac keyboards.

Control key

Used to implement keyboard shortcuts on PC keyboards.

period (.)

Used to indicate a hidden file.

tilde (~)

Used to indicate a temporary system file.

- -- / : ?

Used to indicate command options.

character encoding

Used to represent a repertoire of characters using bit patterns, octets, natural numbers, electrical pulses, etc.

query language

Used to retrieve information from databases.

spaces

Used to separate command options.

asterisk ("*")

Used to specify that the query should return all columns of the queried tables.

public key

Used to validate a digital signature.

liquid cooling

Uses a fluid rather than air as the heat conductor, with the most commonly used fluid in desktop PCs being distilled water.

optical storage

Uses a laser to store and retrieve data from compact discs (CD) and DVDs.

shoulder surfing

Using direct observation techniques to obtain information such as passwords, PINs, security codes, and similar data.

passive cooling

Using heat sinks and metal cases.

accounting

Using such system components as audit trails and logs to associate a subject with its actions.

thin provisioning

Using virtualization technology to give the appearance of having more physical resources than are actually available.

uninstallation

Usually involves more than just erasing the program folder.

compiled programs

Usually run much faster than those that are interpreted in software.

software firewall

Utility software used to control incoming and outgoing network traffic based on an applied rule set.

sc.exe

Utility software used to control services running on Microsoft Windows.

anti-malware software

Utility software used to detect and remove malicious software.

diagnostic software

Utility software used to locate problems with the software, hardware, or any combination there of in a system, or a network of systems.

compression software

Utility software used to reduce resource usage, such as data storage space or transmission capacity requirements.

primary storage

Volatile and typically referred to as RAM.

troubleshooting sequence

identify problem -> note possible causes -> determine cause -> confirm solution.

float

real numbers.

program structures

sequence, iteration, recursion, and choice.

mp3 (Moving Picture Experts Group Layer 3 Audio)

An audio file format that uses a form of lossy data compression, accepted as the de facto standard of digital audio compression for the transfer and playback of music on most digital audio players.

single sign-on

An authentication scheme that allows a user to log in with an ID and password to any of several related, yet independent, software systems.

legacy system

An old method, technology, computer system, or application program, of, relating to, or being a previous or outdated computer system.

Chrome OS

An operating system based on the Linux kernel and designed by Google to work with web applications and installed applications, initially designed as a pure web thin client operating system.

kernel

An operating system component that manages input/output requests from software, and translates them into data processing instructions for the central processing unit and other electronic components of a computer.

distro (Linux distribution)

An operating system made as a collection of software based around the Linux kernel and often around a package management system, typically based on either Red Hat's package manager (rpm and yum) or Debian's package manager (dpkg and apt).

embedded operating system

An operating system that has a dedicated function within a larger mechanical or electrical system.

mobile operating system

An operating system that operates a smartphone, tablet, PDA, or other mobile device.

protected mode

An operational mode of CPUs that allows system software to use features such as virtual memory, paging and safe multi-tasking designed to increase an operating system's control over application software.

projector

An optical device that projects an image (or moving images) onto a surface.

iso

An optical disk archive file.

homegroup

An option on Windows 7 and later Microsoft operating systems that extends the workgroup by using a password to join computers into the group, and allows users' libraries, along with individual files and folders, to be shared between multiple computers.

ISP

An organization that provides services for accessing, using, or participating in the Internet.

ISP (Internet Service Provider)

An organization that provides services for accessing, using, or participating in the Internet.

SSL

An outdated encryption protocol.

assistive technology

An umbrella term that includes assistive, adaptive, and rehabilitative devices and software for people with disabilities and also includes the process used in selecting, locating, and using them.

FTP (File Transfer Protocol)

An unencrypted standard network protocol that uses TCP ports 20 and 21 to transfer computer files from one host to another host.

UPS

An uninterruptible power supply, also uninterruptible power source, or battery/flywheel backup, is an electrical apparatus that provides emergency power to a load when the input power source, typically main power, fails.

wired Internet access options

Analog and digital computer modems attached to telephone lines, coaxial television cable, and fiber optic cables.

mobile operating systems

Android, iOS, Windows Phone, and Blackberry.

screen resolution

Another name for display resolution.

virtual machine monitor (VMM)

Another name for hypervisor.

dual boot

Another name for multi-boot.

security best practices

Antivirus/anti-malware, host firewall, changing default passwords, enabling passwords, safe browsing practices, patching/updates

security software

Any computer program designed to enhance information security.

asset

Any data, device, or other component of the environment that supports information-related activities.

PII

Any information relating to an identifiable person.

assembly language

Any low-level programming language in which there is a very strong correspondence between the instructions in the language and the architecture's machine code instructions.

data

Any sequence of one or more symbols given meaning by specific act(s) of interpretation.

malware

Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

personal information

Anything that can be used to identify an individual.

digital asset

Anything that exists in a binary format and comes with the right to use.

productivity software

Application software dedicated to producing information, such as documents, presentations, worksheets, databases, charts, graphs, digital paintings, electronic music and digital video.

collaborative software

Application software designed to help people involved in a common task to achieve goals, such as email, calendaring, text chat, wiki, bookmarking, shared document storage, screen sharing, and video conferencing.

rule-based access control

Applies policies that express a complex Boolean rule set that can evaluate many different attributes.

FAT file system attributes

Archive, Hidden, System, and Read-only.

file system permissions

Assign permissions or access rights to specific users and groups of users to control the ability of the users to view or make changes to the contents of the file system.

non-repudiation

Associating actions or changes with a unique individual, preventing the owner of the account from denying actions performed by the account.

encryption best practices

At rest, in transit, and during processing.

contextual attributes

Attributes that deal with time, location or dynamic aspects of the access.

action attributes

Attributes that describe the activity being attempted.

object attributes

Attributes that describe the resource being accessed.

subject attributes

Attributes that describe the user attempting the access.

multi-factor authentication

Authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.

peripheral

Auxiliary device used for computer input, output, or data storage.

storage hierarchy

Fast but expensive and small storage options close to the central processing unit (CPU) and slower but less expensive and larger options further away.

memory

Fast volatile data technologies which lose data when power is off.

BIOS

Initializes and tests the system hardware components and loads a boot loader or an operating system from a mass storage device.

audio card

Internal computer expansion card that facilitates economical input and output of sound signals to and from a computer.

satellite

Internet access provided through communications satellites.

interpreted languages

JavaScript, Perl, and Python.

journal

Keeps track of changes not yet committed to a file system.

Control/Command+B

Keyboard shortcut to bold text.

Control/Command+C

Keyboard shortcut to copy.

Control/Command+X

Keyboard shortcut to cut.

Control/Command+F

Keyboard shortcut to find.

Control/Command+I

Keyboard shortcut to italicize text.

Control/Command+O

Keyboard shortcut to open.

Control/Command+V

Keyboard shortcut to paste.

Control/Command+P

Keyboard shortcut to print.

Control/Command+S

Keyboard shortcut to save.

Control/Command+A

Keyboard shortcut to select all.

Control/Command+U

Keyboard shortcut to underline text.

Control/Command+Z

Keyboard shortcut to undo.

input devices

Keyboards, pointing devices, scanners, microphones, and webcams.

authentication factors

Knowledge (something the user knows), possession (something the user has), and inherence (something the user is).

TCP/IP

Known as the Internet protocol suite, the conceptual model and set of communications protocols used in the Internet and similar computer networks.

password best practices

Length, complexity, history, expiration, reuse, password managers, reset process.

routing table

Lists the routes to particular network destinations, and in some cases, metrics (distance, performance, or cost) associated with those routes.

backup locations

Local, on-site vs. off-site, cloud storage.

backup media

Locally attached tape, disk, and optical storage, network attached storage, and remote/cloud storage.

computer placement

Locations that have good airflow while minimizing humidity and temperature issues, minimize dust accumulation, and avoid disruption from EMI sources.

common operations performed during software installation

Making sure that necessary system requirements are met Checking for existing versions of the software Creating or updating program files and folders Adding configuration data Making the software accessible to the user Configuring components that run automatically Performing product activation, Updating the software versions

IPS

Network security appliances that monitor network or system activities to identify malicious activity, log information about this activity, report it, and attempt to block or stop it.

WEP and WPA

No longer considered secure.

proprietary software

Non-free computer software for which the software's publisher or another person retains intellectual property rights.

secondary storage

Non-volatile and is often referred to as a hard drive.

based on Unix

OS X, Linux, Android, Chrome OS and iOS.

electrostatic discharge (ESD)

Occurs when differently charged objects are brought close together or when the dielectric between them breaks down.

unauthorized information alteration

Occurs with incomplete or incorrect implementation of authentication and authorization.

unordered file

Offers good insertion performance but inefficient retrieval times.

command-line interfaces

Often preferred by advanced computer users, as they often provide a more concise and powerful means to control a program or operating system.

backup repositories

On-line, near-line, or off-line, and on-site or off-site.

TCP

One of the main protocols of the Internet protocol suite, which provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.

plaintext

Original representation of information.

eSATA

Provides a variant of SATA meant for external connectivity with a more robust connector, longer shielded cables, and stricter electrical standards.

online workspace

Provides an environment that supports application delivery, data, management, security, and a consistent user experience across a variety of devices.

operating system

Provides an interface between the user and the system, coordinates hardware components, provides an environment for software applications to function, monitors system health and functionality, and provides a file structure for data management.

Internet protocol suite

Provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received.

word processing software

Provides for input, editing, formatting and output of text, often with some additional features.

server operating system

Provides functionality for other programs or devices, called "clients".

Internet layer

Provides internetworking between independent networks.

ordered file

Provides more efficient retrieval but lower insertion efficiency.

redundancy

Provides multiple identical instances of the same system and switching to one of the remaining instances in case of a failure.

replication

Provides multiple identical instances of the same system or subsystem, directing tasks or requests to all of them in parallel, and choosing the correct result on the basis of a quorum.

application layer

Provides process-to-process data exchange.

Internet service provider

Provides services for accessing, using, or participating in the Internet using wired or wireless connections.

database software

Provides various functions that allow entry, storage and retrieval of large quantities of information and provides ways to manage how that information is organized.

social engineering

Psychological manipulation of people to cause them to perform actions or divulge confidential information.

establish a theory

Question the obvious, consider multiple approaches, divide and conquer.

Wi-Fi 4 (802.11n)

600 Mbps

Wi-Fi 6 (802.11ax)

9,608 Mbps

access point

A device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards.

Wi-Fi

A local area wireless technology that allows an electronic device to participate in computer networking using 2.4 GHz and 5 GHz bands.

computer network

Allows computers to exchange data.

single-tier software

Has all parts of the program designed to run on the local computer.

software architecture

Refers to the fundamental structures of a software system.

CAM

The use of computer software to control machine tools and related machinery in the manufacturing of workpieces.

spreadsheet software

Used for organization, analysis and storage of data entered in cells of a table.

POTS

Voice-grade telephone service employing analog signal transmission over copper loops.

Wi-Fi encryption options

WEP, WPA, and WPA2.

Wi-Fi 1 (802.11b)

11 Mbps

Wi-Fi 2 (802.11a)

54 Mbps

DNS

A hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.

product key

A specific software-based identifier for a computer program.

group use

Allows use by a department or organization at a given geographic location.

silent installation

Performed without any user interface updates.

WPA2

The current Wi-Fi encryption standard.

web browser

Used for accessing information on the World Wide Web.

IPv4

32-bit addresses using dotted-decimal notation

Wi-Fi 3 (802.11g)

54 Mbps

Wi-Fi 5 (802.11ac)

6,933 Mbps

ARP

A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.

LAN

A computer network that interconnects computers within a limited geographic area such as a home, school, computer laboratory, or office building.

switch

A device that connects and filters multiple network segments or devices, by forwarding data only to one or multiple devices that need to receive the data based on destination MAC address.

router

A device that forwards data packets between different computer networks based on network address (IP address).

software license

A legal instrument governing the use or redistribution of software.

SMB

A network communication protocol for providing shared access to files, printers, and serial ports between nodes on a network.

single use

Allows use by a single user and/or a single computer.

business software

Any software or set of computer programs used by business users to perform various business functions.

NIC

Hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information.

two-tier software

Has a front-end presentation layer providing the user interface and a back end layer providing the application, business logic, and data access.

attenuation

Limits the range of radio signals and is affected by the materials a signal must travel through.

subscription license

Must be renewed, typically annually.

2.4 GHz ISM band

Susceptible to interference from microwave ovens, cordless telephones, USB 3.0 hubs, and Bluetooth devices.

instant messaging software

Used to facilitate a type of online chat that offers real-time text transmission over the Internet.

collaboration software

Used to help people working on a common task attain their goals.

transport layer

Handles host-to-host communication.

data storage devices

Hard drives, flash drives, optical drives, Network Attached Storage (NAS), media players, and smart phones.

emulator

Hardware or software or both that duplicates the functions of one computer system (the guest) in another computer system (the host), different from the first one, so that the emulated behavior closely resembles the behavior of the real system (the guest).

byte

Has 256 possible values.

malicious browser extension

Has access to everything done by the browser and can do things like inject ads into web pages, or make "background" HTTP requests to third-party servers.

process-based database engine

Has better performance in regard to scalability and speed.

n-tier software

Has layers for different servers to provide separate parts of the overall business logic, such as separate sales and inventory management servers.

file-based database engine

Has limited performance in regard to scalability and speed.

bit

Has two possible values.

switches

Have replaced hubs in local area networks.

document sharing system

Helps multiple people work together at the same time on a single document or file to achieve a single final version.

wireless connections

High mobility, but suffer from increased latency in data transfer and more security risks.

Tables

Hold or access stored data.

INSERT syntax

INSERT INTO <table>(<column(s)>) VALUES(<value(s)>)

static

IP addresses are manually assigned to a computer by an administrator.

dynamic

IP addresses assigned either by the computer interface or host software itself through automatic configuration, or assigned by a server using DHCP.

static addressing

IP addresses assigned to a host permanently by fixed configuration of its hardware or software.

Internet layer protocol

IP.

troubleshooting sequence

Identify the problem, research possible causes, establish a theory, test the theory, establish a plan to implement the solution, implement the solution, test functionality, document the outcome.

personally identifiable information (PII)

Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.

less than

<

less than or equal

<=

WHERE syntax

<SQL-DML-Statement> FROM <table> WHERE <predicate>.

logical equal

==

greater than

>

greater than or equal

>=

device driver

Provides a software interface to hardware.

not

!

not equal

!=

S-Video connector

A 4 pin video cable connector.

RJ-11

A 6 position 2, 4 or 6 contact modular connector typically used for phone cable connections

and

&&

PS/2 port

A 6-pin Mini-DIN connector used for connecting some keyboards and mice to a PC compatible computer system.

DVD-R

A DVD that typically has a storage capacity of 4.7 GB and can be written once and read arbitrarily many times.

IPv6

128-bit addresses using colon-hexadecimal notation

double

15 significant digits (eight bytes).

cable Internet

A form of broadband Internet access which uses the same coaxial infrastructure as CATV.

RAM

A form of computer memory that can be read and changed in any order, typically used to store working data and machine code.

file-level encryption

A form of disk encryption where files or directories are encrypted by the file system.

disk-level encryption

A form of disk encryption where the entire partition or disk in which the file system resides is encrypted.

patent

A form of intellectual property that gives its owner the legal right to exclude others from making, using, selling and importing an invention for a limited period of years, in exchange for publishing an enabling public disclosure of the invention.

replay attack

A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.

man page

A form of online software documentation usually found on a Unix or Unix-like operating system.

troubleshooting

A form of problem solving, often applied to repair failed products or processes on a machine or a system.

GUI

A form of user interface that allows users to interact with electronic devices through icons.

programming language

A formal language which comprises a set of instructions that produce various kinds of output.

packet

A formatted unit of data sent through a network to the destination.

BitLocker

A full disk encryption feature included with the Ultimate and Enterprise editions of Windows Vista and later Windows operating systems.

redirection

A function of most command-line interpreters that can send standard streams to user-specified locations.

file transfer

A generic term for the act of transmitting files over a computer network.

VGA

A graphics standard for video display controllers first introduced with the IBM PS/2 line of computers in 1987.

Thunderbolt

A hardware interface that allows for the connection of external peripherals to a computer, combining PCI Express (PCIe) and DisplayPort (DP) into one serial signal alongside a DC connection for electric power, and transmitted over one cable, most often used for video and other high-speed connections on Apple computers.

Cache

A hardware or software component that stores data so that future requests for that data can be served faster.

PCIe

A high-speed serial computer expansion bus standard designed to replace the older PCI, PCI-X, and AGP bus standards.

PCIe

A high-speed serial computer expansion bus standard, designed to replace older bus standards

DDoS

A large-scale attack where the perpetrator uses more than one unique IP address or machines, often from thousands of hosts infected with malware.

FAT32

A legacy industry-standard computer file system with support for an increased number of possible clusters compared to previous versions.

NDA

A legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to.

EULA

A legal contract entered into between a software developer or vendor and the user of the software, often where the software has been purchased by the user from an intermediary such as a retailer.

software license

A legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software.

EULA (End User License Agreement)

A license agreement for proprietary software that provides a contract between the licensor and purchaser, establishing the purchaser's right to use the software.

product activation

A license validation procedure required by some proprietary computer software programs.

flatscreen display / flat panel display

A light, thin display usually based on LCD technologies, and back-lit to make them easier to read in bright environments.

file shortcut

A link in a user interface that allows the user to find a file or resource located in a different directory or folder from the place where the shortcut is located.

AC (Alternating Current)

An electric current which periodically reverses direction, and the form of electrical energy that consumers typically use when they plug devices into a wall socket.

UPS

An electrical apparatus that provides emergency power to a load when the input power source or mains power fails.

DC connector

An electrical connector for supplying power to components inside the computer case.

HDD

An electro-mechanical data storage device that uses magnetic storage to store and retrieve digital data using one or more rigid rapidly rotating platters coated with magnetic material.

repeater or hub

An electronic device that receives a network signal in the form of bits, cleans it of unnecessary noise, and regenerates it.

public key certificate

An electronic document used to prove ownership of a public key based on the owner's identity, and the digital signature of an entity that has verified that identity.

digital certificate

An electronic document used to prove the ownership of a public key.

memory card

An electronic flash memory data storage device used for storing digital information, commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players and video game consoles.

touchscreen display

An electronic visual display that the user can control through simple or multi-touch gestures by touching the screen with a special stylus/pen and-or one or more fingers.

laser printer

An electrostatic digital printing process that passes a laser beam back & forth over an electron-charged, cylindrical drum, to define a differentially-charged image.

certificate authority (CA)

An entity that issues digital certificates.

PATH

An environment variable specifying a set of directories where executable programs are located.

FTPS (File Transfer Protocol over Secure Sockets Layer)

An extension of the File Transfer Protocol (FTP) that uses TCP port 990 and adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.

HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer)

An extension of the Hypertext Transfer Protocol (HTTP) that uses TCP port 443 and adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.

HTTPS

An extension of the Hypertext Transfer Protocol used for secure communication encrypted using Transport Layer Security.

FTPS

An extension to the commonly used File Transfer Protocol that adds support for the Transport Layer Security and the now prohibited Secure Sockets Layer cryptographic protocols.

USB

An industry standard that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices communicating at 12 Mbps, 480 Mbps, or 5 Gbps.

pseudocode

An informal high-level description of the operating principle of a computer program or other algorithm

Unicode

An information technology standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems.

joystick

An input device consisting of a stick that pivots on a base and reports its angle or direction to the device it is controlling.

Kickstart

An installation method used primarily by Red Hat Enterprise Linux to automatically perform unattended operating system installation and configuration.

branch

An instruction in a computer program that can cause a computer to begin executing a different instruction sequence and thus deviate from its default behavior of executing instructions in order.

collaborative workspace

An inter-connected environment in which all the participants in dispersed locations can access and interact with each other just as inside a single entity.

FireWire

An interface standard for a serial bus for high-speed communications and isochronous real-time data transfer developed by Apple and replaced with Thunderbolt.

data-informed decision-making (DIDM)

Based on a sequence of data collection, data analysis, and data reporting.

giga

Billion.

script blocker

Block active web content, which a user can wholly or partially unblock by whitelisting a site or domain from the browser or browser extension's toolbar menu.

default data order

By default, relational database systems may return data rows in any order, or more specifically, without any order.

compiled languages

C++ and Java.

hard disk drive

Data storage device used for storing and retrieving digital information using rapidly rotating platters coated with magnetic material.

solid state drive

Data storage device using integrated circuit assemblies as memory to store data persistently.

64-bit processors

Can address up to 16 EiBs of memory.

clouds

Can be classified as public, private or hybrid.

32-bit processors

Can directly access at most 4 GiB of byte-addressable memory.

Wi-Fi coverage

Can extend from an area as small as a few rooms to as large as many square kilometers.

Wi-Fi best practice

Change the default network SSID and password, and use WPA2 encryption.

client-side scripting

Changes interface behaviors within a specific web page in response to mouse or keyboard actions, or at specified timing events.

UPDATE

Changes the data of one or more records in a table.

serial substitution

Check each component in a system one by one, swapping known good components for each potentially suspect one.

support options

Check manufacturer documentation, search manufacturer websites and technical community groups, perform Internet searches, and contact vendor technical support.

HTTP and FTP

Clear-text protocols, which allow anyone to capture and view the network traffic.

video conferencing software

Collaboration software used to allow two or more locations to communicate by simultaneous two-way video and audio transmissions.

screen sharing software

Collaboration software used to display a personal computer's desktop environment remotely on a separate client device.

instant messaging software

Collaboration software used to share real-time text transmissions over a network or over the Internet.

JOIN

Combines columns from one or more tables in a relational database.

$ or %

Common Unix command prompt ending for a normal user.

#

Common Unix command prompt ending if the user is a superuser (root).

sleep and hibernation

Common operating system power setting modes.

NTFS file system attributes

Compressed, Encrypted, and Indexed.

optical drive

Data storage device using rapidly rotating discs coated with reflective material and read using a laser diode.

on-line backup

Data storage immediately accessible but also vulnerable to being deleted or overwritten.

off-line backup

Data storage that requires direct human action to provide access to the storage media, and therefore less vulnerable to accidental deletion.

redundant resources

Data, network, and power.

volatile memory

Computer memory that requires power to maintain the stored information.

proprietary software

Computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering.

open-source software

Computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.

hypervisor

Computer software, firmware or hardware that creates and runs virtual machines.

spoofing

Concealing the identity of the sender by impersonating another computing system.

switch

Connects data lines from a single network.

router

Connects two or more data lines from different networks.

RAID 10

Consists of a striped set of mirrored drives.

RAID 5

Consists of block-level striping with distributed parity.

RAID 1

Consists of data mirroring, without parity or striping.

RAID 0

Consists of striping, but no mirroring or parity.

full backup

Contains a complete copy of the source taken at a specific point in time.

kernel

Contains a scheduling program which determines how much time each process spends executing, and in which order execution control should be passed to programs.

link layer

Contains communication methods for data that remains within a single network segment.

public key certificate

Contains the public key of the organization providing the certificate and the digital signature of the certificate authority that validated the certificate's information.

file system

Controls how data is stored and retrieved.

permission

Controls the ability of users to view, change, navigate, and execute system resources.

PSU

Converts general purpose electric current from the mains to direct current for the other components of the computer.

DDL

Create and modify database objects such as tables, indexes, and users.

common operations performed on files or groups of files

Creating, opening (e.g. viewing, playing, editing or printing), renaming, moving or copying, deleting and searching for files, as well as modifying file attributes, properties and file permissions.

backup considerations

Critical data, file backups, database, OS backups, stored location.

DELETE syntax

DELETE FROM <table> [WHERE <condition>]

information

Data in context and with meaning attached.

disaster recovery considerations

Data restoration, prioritization, restoring access

near-line backup

Data storage accessible within seconds or minutes but also vulnerable to being deleted or overwritten.

off-site backup

Data storage at a remote location, providing geographic redundancy.

semantics

Define what sort of operations are possible, on what sort of data these operations can be performed, and how the grammar represents these operations and data.

all-in-one

Desktop computer or workstation which integrates the system's internal components into the same case as the display.

DROP

Destroys an existing database, table, index, or view.

regulations

Determine which frequency ranges can be used for what purpose and by whom.

backup rotation

Determines how and when each piece of removable storage is used for a backup job and how long it is retained once it has backup data stored on it.

cable management

Devices or effort used to support and contain cables during system installation, and makes subsequent maintenance or changes to the cable system easier.

unmodified archive bit

Differential and copy backups.

form

Display and modify data on screen.

report

Display data on paper or in digital documents.

EMI (Electromagnetic Interference)

Disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source.

private browsing modes

Do not necessarily protect users from being tracked by other websites or their Internet service provider (ISP).

FAT file system

Does not include file system permissions, only file attributes.

FAT32

Doesn't support compression, encryption, permissions, or journaling.

ESD control methods

ESD-safe packing material, the use of conductive filaments on garments worn by assembly workers, conducting wrist straps and foot-straps to prevent high voltages from accumulating on workers' bodies, anti-static mats or conductive flooring materials to conduct harmful electric charges away from the work area, and humidity control.

field

Each column in a table represents a set of data values of a particular simple type, one value for each row of the database.

record

Each row in a table represents a set of related data, and every row in the table has the same structure.

230 volts and 50 cycles

Electrical power supply voltage and frequency common in Europe.

120 volts and 60 cycles

Electrical power supply voltage and frequency common in North America.

compromised security risks

Electromagnetic or acoustic emanation and time or temperature analysis.

ciphertext

Encrypted information.

NoSQL database limitations

Enforced consistency across the data.

link-layer protocols

Ethernet, Wi-Fi, and DSL.

interpreter

Executes source code directly, without first converting the entire program into binary code.

VPN

Extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

VPN (Virtual Private Network)

Extends a private network across a public network, such as the Internet, allowing a computer or network-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network.

file transfer protocols

FTP, FTPS, and SFTP.

log

File that records either events that occur in an operating system or other software runs.

network firewall

Filters traffic between two or more networks and run on network hardware.

BIOS

Firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.

clear archive bit

Full and incremental backups.

backup models

Full backup, incremental backup, and differential backup.

backup options

Full, incremental, differential, and copy.

identify the problem

Gather information, duplicate the problem, question users, identify symptoms, determine if anything has changed, approach multiple problems individually.

privacy risks

Gathering of statistics, spreading of spyware, and exploitation of various forms of software faults.

wired connections

Greater throughput/bandwidth, reliability, and availability.

user account types

Guest, standard, power user, and administrator.

web protocols

HTTP and HTTPS.

file transfer protocols

HTTP, HTTPS, FTP, FTPS, and SFTP.

single-platform software

Implemented on a specific operating system and CPU architecture.

cross-platform software

Implemented on multiple computing platforms.

database fundamentals

Include data concepts and use.

cross-platform software development challenges

Include testing, lowest-common-denominator feature options, different user interface conventions, and performance issues.

processing

Includes any computations performed by an information system on the inputs in order to generate the associated outputs.

business-specific application

Includes any software or set of computer programs developed for and customized to a specific business or industry's needs.

wired media

Includes coaxial cable, twisted-pair cable, and optical fiber.

IT concepts and terminology

Includes data representation, data processing, and information value.

infrastructure

Includes devices, components, networking, and Internet services.

file management

Includes directories (folders), file types and extensions, and permissions.

Common IoT devices

Includes home appliances, home automation devices, modern cars, IP cameras, streaming media devices, medical devices.

NoSQL data structure

Includes key-value pairs and document databases.

applications and software

Includes operating systems, applications, and uses.

free and open-source license

Includes permissive licenses and copyleft licenses.

software development

Includes programming languages and program structure.

security

Includes related concepts and best practices, as well as business continuity through fault tolerance and disaster recovery.

computer cleaning

Includes the removal of dust and debris from cooling fans, power supplies, and other hardware components.

database replication

Increase data availability, both to improve performance of simultaneous multiple end-user accesses to a database object, and to provide resiliency in a case of partial failure of a database.

archive bit

Indicates that a file was changed since the last backup.

metadata

Information about the format of a file.

disaster recovery

Involves a set of policies, tools and procedures to enable the continuation of vital technology infrastructure and systems following a natural or human-induced disaster.

cloud computing

Involves groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources.

network hosting

Involves installing the application on a shared network resource.

processing speed

Measured in Hertz, or cycles per second.

throughput

Measured in multiples of bits per second (bps).

physical security

Measures designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm.

PCB

Mechanically supports and electrically connects electrical or electronic components using conductive tracks, pads and other features etched from one or more sheet layers of copper laminated onto and/or between sheet layers of a non-conductive substrate.

standard error streams

Merged and directed to the console instead of the pipeline.

file attributes

Metadata associated with computer files that define file system behavior, with each attribute having one of two states: set and cleared.

Hyper-V

Microsoft's hypervisor, available as a free stand-alone product, and an installable role in Windows Server 2008 and later as well as the x64 edition of Windows 8 Pro.

DLL

Microsoft's implementation of the shared library concept in the Microsoft Windows operating system.

mega

Million.

common computing devices

Mobile phones, tablets, laptops, workstations, servers, and gaming consoles.

ALTER

Modifies an existing database object.

output devices

Monitors, printers, and speakers.

64-bit

Most personal computers manufactured since 2005 use this type of processor.

streaming media

Multimedia that is constantly received by and presented to an end-user while being delivered by a provider.

email protocols

POP3, IMAP, and SMTP.

copyrighted material

Peer-to-peer file sharing may have legal ramifications if this is shared.

scheduled installation

Performed at a specific time or in response to a given condition.

attended installation

Performed by a user manually running the installation program and selecting desired options.

network installation

Performed from a shared network resource.

clean installation

Performed on a system without old versions of the program being present.

headless installation

Performed without a computer monitor connected.

unattended installation

Performed without user interaction.

downtime

Periods when a system is unavailable.

scripting languages

Perl, PowerShell, and Python.

perpetual license

Permanent, but may require annual maintenance for updates.

disaster recovery

Policies and procedures to enable the continuation of vital technology infrastructure and systems following a natural or human-induced disruption.

active cooling

Power-driven, such as with a fan

hibernation

Powering down a computer while retaining its state by saving the contents of random access memory (RAM) to a hard disk or other non-volatile storage.

graphical user interfaces

Preferred by casual computer users.

relational database

Presents data to the user as a collection of related tables with each table consisting of a set of rows and columns.

DLP

Preventing the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

intermittent

Problems which are often the result of components that are thermally sensitive.

reproducible

Problems which can be reliably isolated and resolved.

video card

Processes graphics output from the motherboard and transmits it to the display.

email software

Productivity and collaboration software used to access and manage a user's electronic mail.

personal information manager

Productivity software used as a personal organizer.

database software

Productivity software used to capture and analyze data.

presentation software

Productivity software used to display information in the form of a slide show.

desktop publishing software

Productivity software used to generate layouts and produce typographic quality text and images comparable to traditional typography and printing.

word processing

Productivity software used to perform the composition, editing, formatting, and sometimes printing of any sort of written material.

spreadsheet software

Productivity software used to perform the organization, analysis and storage of data in tabular form.

remote desktop software

Productivity software used to run a personal computer's desktop environment remotely on one system while being displayed on a separate client device.

script

Programs written for a special run-time environment that can interpret (rather than compile) and automate the execution of tasks that could alternatively be executed one-by-one by a human operator.

software license types

Proprietary licenses, and free and open source licenses.

TLS

Protocol used to encrypt email.

HTTPS

Protocol used to encrypt web browser communication.

permissions

Provide access rights to specific users and groups of users.

property

Provides a callable interface to access an attribute.

common file system permissions

Read, Write, and Execute.

accounting software

Records and processes accounting transactions within functional modules such as accounts payable, accounts receivable, journal, general ledger, payroll, and trial balance.

Linux distributions

Red Hat, Debian, Ubuntu, Linux Mint, and Google's Android.

accessibility

Refers to the design of products, devices, services, or environments for people with disabilities.

power management

Refers to the mechanism for controlling the power use of personal computer hardware.

booting (bootstrapping)

Refers to the process of loading the basic software into the memory of a computer after power-on or general reset, especially the operating system which will then take care of loading other software as needed.

DELETE

Removes one or more records from a table.

system cooling

Removes the waste heat produced by computer components using active or passive cooling methods.

REVOKE

Removes user accessibility to a database object.

digital products

Represented and stored using the binary number system of ones (1) and zeros (0).

systems, monitors, scanners, batteries, ink and toner cartridges

Require using a qualified recycler for proper disposal to keep hazardous materials from contaminating the environment.

licensing

Required by virtual machines running proprietary operating systems, regardless of the host machine's operating system.

computer cooling

Required to remove the waste heat produced by computer components.

principle of least privilege

Requires that every module must be able to access only the information and resources that are necessary for its legitimate purpose.

multiprogramming kernel

Responsible for managing all system memory which is currently in use by programs.

bare-metal hypervisor

Runs directly on computer hardware to control the hardware and to manage guest operating systems.

hosted hypervisor

Runs on a conventional operating system (OS) just as other computer programs do.

host-based firewall

Runs on individual computers and controls network traffic in and out of those machines.

file server

Runs one or more programs which share file resources with clients.

ORDER BY syntax

SELECT <column(s)> FROM <table(s)> ORDER BY <column> [DESC] [NULLS FIRST], ....

SELECT syntax

SELECT <column> [AS <alias>, ...] FROM <table> [AS <alias>, ...].

network monitoring protocol

SNMP.

dumpster diving

Salvaging items discarded by their owners, but deemed useful to the picker.

differential backup

Saves only the data that has changed since the last full backup.

query

Select and modify data.

bisection

Separate a larger system into two or more subsystems to isolate and identify problems and causes.

three-tier software

Separates the presentation layer, business logic, and data access.

DHCP server

Service provided by a router to support dynamic IP address assignment.

single

Seven significant digits (four bytes).

NoSQL database benefits

Simplicity and scalability.

storage

Slower persistent data technologies which retain data when power is off.

802.3

The IEEE standard that defines Ethernet networks.

802.11

The IEEE standard that defines wireless local area network technology.

shell scripts

The Unix-like term for command interpreter scripts.

batch files

The Windows term for command interpreter scripts.

cross-browser compatibility

The ability of a website or web application to function across different browsers and degrade gracefully when browser features are absent or lacking.

resiliency

The ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.

QoS (Quality of Service)

The ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow.

computer accessibility

The accessibility of a computer system to all people, regardless of disability or severity of impairment, implemented using assistive technology.

impersonation

The act of assuming the identity of another, in order to commit fraud, such as accessing confidential information, or to gain property not belonging to them.

multi-boot

The act of installing multiple operating systems on a computer, and being able to choose which one to boot when starting the computer.

Installation

The act of making a program ready for execution.

installation

The act of making the program ready for execution.

authentication

The act of proving an assertion, such verifying the identity of a computer system user.

eavesdropping

The act of secretly or stealthily listening to the private conversation or communications of others without their consent.

Terminal

The application used to implement a Bash shell interface in OS X and Linux.

topology

The arrangement of the various elements (links, nodes, etc.) of a computer network.

phishing

The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

import

The automated or semi-automated input of data sets between different software applications.

export

The automated or semi-automated output of data sets between different software applications.

bit

The basic unit of information in computing and digital communications which can have only one of two values, most commonly represented as either a 0 or 1.

bandwidth

The bit-rate of available or consumed information capacity expressed typically in metric multiples of bits per second.

SOHO

The category of business or cottage industry that typically involves from 1 to 10 workers.

SOHO (Small Office / Home Office)

The category of business or cottage industry that typically involves from 1 to 10 workers.

domain

The centralized authentication approach used in larger networks, where all user accounts, computers, printers and other security principals, are registered with a central directory service.

/

The character sequence used by Unix-like operating systems to separate folders and filenames in a path.

\

The character sequence used by Windows to separate folders and filenames in a path.

UTF-8

The dominant encoding used on the World Wide Web and uses one byte for the first 128 code points, and up to 4 bytes for other characters.

redundancy

The duplication of critical components or functions of a system with the intention of increasing reliability of the system.

wireless communication

The electromagnetic transfer of information between two or more points that are not connected by an electrical conductor.

CPU

The electronic circuitry within a computer that executes instructions that make up a computer program.

computing platform

The environment in which a piece of software is executed.

copyright

The exclusive right given to the creator of a creative work to reproduce the work, usually for a limited time.

.sh

The file extension for OS X and Linux command scripts.

.bat or .cmd

The file extension for Windows command scripts.

.lnk

The file extension used for Microsoft Windows file shortcuts.

ASCII characters

The first 128 Unicode code points.

#!/bin/sh

The first line of a Bash shell script.

CRUD

The four basic functions of persistent storage.

authorization

The function of specifying access rights to resources.

authorization

The function of specifying access rights/privileges to resources, which is related to information security and computer security in general and to access control in particular.

syntax

The grammar or rules that define how commands are written.

syntax

The grammar that all commands must follow.

process

The instance of a computer program that is being executed.

MAC

The layer that controls the hardware responsible for interaction with the wired, optical or wireless network transmission medium.

password complexity

The length and character set combinations used to create a password, such as upper case and lower case letters, numbers, and punctuation.

web browsing history

The list of web pages a user has visited recently, as well as associated data such as page title and time of visit, which is recorded by web browser software as standard for a certain period of time.

power outage

The loss of the electrical power network supply to an end user.

motherboard

The main printed circuit board (PCB) found in general purpose computers and other expandable systems.

data integrity

The maintenance of, and the assurance of the accuracy and consistency of data over its entire life-cycle.

wiretapping

The monitoring of telephone and Internet-based conversations by a third party, often by covert means.

GNU GPL (GNU General Public License)

The most widely used free software license, which guarantees end users (individuals, organizations, companies) the freedoms to use, study, share (copy), and modify the software.

alias

The name given to file links in OS X.

symbolic link

The name given to file links in Unix and Linux operating systems.

shortcut

The name given to file links in the Windows operating system.

Files

The official file manager for the GNOME desktop.

peta

Thousand trillion.

kilo

Thousand.

backup limitations

Time, performance impact, network bandwidth, and cost.

erase

To eliminate sensitive information on hard drives prior to disposal.

auditing

Tracking of requests for access to resources.

compiler

Transforms source code written in a programming language into binary code to create an executable program.

tera

Trillion.

Boolean

Truth values.

wired connection options

Twisted-pair phone lines, coaxial cable, and optical fiber cable.

impersonation

When someone imitates or copies the behavior or actions of another, often as part of a criminal act such as identity theft.

wireless Internet access options

Wi-Fi, cellular, and satellite connections.

wireless connection options

Wi-Fi, cellular, and satellite.

DESC

Will sort a given column in descending order.

computer operating systems

Windows, OS X, Linux, and Chrome OS.

WEP, WPA, and WPA2

Wireless network security protocols used to encrypt wireless traffic.

non-repudiation methods

video, biometrics, digital signature, receipt.

integer

whole numbers.

or

||


Conjuntos de estudio relacionados

неправильные глаголы eyes open 2 2 часть

View Set

Ch. 3 Income Statement LearnSmart

View Set

chapter 49: immunizing drugs and biochemical terrorism

View Set

INFINITI INTOUCH™ ENHANCEMENTS, PART 1

View Set

CCNA 1 v7 Modules 11 - 13: IP Addressing Exam Answers Full

View Set

Chapters 13-18 Ricci 2nd edition

View Set