Quizlet Questions
structured programming
A programming paradigm aimed at improving the clarity, quality, and development time of a computer program by making extensive use of the structured control flow constructs of selection, repetition, block structures, and subroutines.
single sign-on
A property of access control systems that allows a user to log in once and gain access to all interrelated systems without being prompted to log in again.
attribute
A property.
HDMI
A proprietary audio/video interface for transferring uncompressed video data and compressed or uncompressed digital audio data from a compliant source device to a compatible computer monitor, video projector, digital television, or digital audio device.
HFS
A proprietary file system developed by Apple Inc. in 1998 for use in computer systems running macOS.
APFS
A proprietary file system released in 2017 for macOS, optimized for flash and solid-state drive storage, with a primary focus on encryption.
NTFS
A proprietary journaling file system developed by Microsoft.
Blackberry OS
A proprietary mobile operating system developed by BlackBerry Ltd for its BlackBerry line of smartphone handheld devices.
WPA
A quick alternative to improve Wi-Fi security.
APIPA
A random link-local address starting with 169.254.x.y used when a device fails to obtain an address through DHCP.
ROSI
A ratio between net benefit and cost of investment. As a performance measure, ROI is used to evaluate the efficiency of an investment or to compare the efficiencies of several different investments.
DUMP
A record of the table structure and/or the data from a database, usually in the form of a list of SQL statements.
URL (Uniform Resource Locator)
A reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it.
URL
A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
upgrade
A replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date or to improve its characteristics.
DVD-RAM
A rewritable DVD technology perceived as being better than other DVD technologies for traditional computer usage tasks such as general data storage, and especially data backup and archival.
DVD-RW
A rewritable optical disc with equal storage capacity to a DVD-R, typically 4.7 GB, that stores data in one long spiral track.
GPS
A satellite-based radio-navigation system owned by the United States government and operated by the United States Space Force.
audit trail
A security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.
command prompt
A sequence of characters used in a command-line interface to indicate readiness to accept commands.
thread
A sequence of independent program instructions.
subroutine
A sequence of program instructions that performs a specific task, packaged as a unit.
loop
A sequence of statements which is specified once but which may be carried out several times in succession.
string
A sequences of characters.
OS X
A series of Unix-based graphical interface operating systems developed and marketed by Apple Inc. designed to run on Mac computers.
DIMM
A series of dynamic random-access memory integrated circuits.
keyboard shortcut
A series of one or several keys that invoke a software or operating system operation when triggered by the user.
Mac
A series of personal computers manufactured by Apple Inc. and running the OS X operating system.
proxy server
A server application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources.
Microsoft Update
A service offered by Microsoft that provides updates for Windows components and other Microsoft software.
Windows Update
A service offered by Microsoft that provides updates for Windows components.
DRM (Digital Rights Management)
A set of access control technologies for restricting the use of proprietary hardware and copyrighted works.
Microsoft Office Compatibility Pack
A set of add-ins that allow Microsoft Office 2000, XP, and 2003 to open, edit, and save files using the file format of Office 2007 and later versions of Word, Excel, and PowerPoint.
Chipset
A set of electronic components in an integrated circuit known as a "Data Flow Management System" that manages the data flow between the processor, memory and peripherals.
pipeline
A set of processes chained by their standard streams, so that the output of each process feeds directly as input to the next one.
pipeline
A set of processes chained by their standard streams, so that the output of each process feeds directly as input to the next process.
password confidentiality
A set of rules or a promise that limits access or places restrictions on password sharing.
confidentiality
A set of rules or a promise usually executed through agreements that limits access or places restrictions on certain types of information.
airplane mode
A setting available on smartphones and other portable devices that, when activated, suspends the device's radio-frequency (RF) signal transmission technologies (i.e., Bluetooth, telephony and Wi-Fi), effectively disabling all voice, text and phone services.
default
A setting or a value automatically assigned to a command without user intervention.
EMP (Electromagnetic Pulse)
A short burst of electromagnetic energy.
hotfix
A single, cumulative package that is used to address a problem in a software product. Typically, hotfixes are made to address a specific customer situation, undergo less regression testing, and have more limited distribution than patches.
cookie
A small piece of data sent from a website and stored in a user's web browser or browser cache while the user is browsing that website.
laptop
A small, portable personal computer (PC) with a "clamshell" form factor, typically having a thin LCD or LED computer screen mounted on the inside of the upper lid of the clamshell and an alphanumeric keyboard on the inside of the lower lid.
web browser
A software application for retrieving, presenting and traversing information resources on the World Wide Web.
VMware Fusion
A software hypervisor developed by VMware for computers running OS X with Intel processors.
virtual machine (VM)
A software implemented abstraction of the underlying hardware which is presented to the application layer of the system.
SaaS
A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
directory service
A software system that stores, organizes, and provides access to operating system information.
RDBMS
A software system used to maintain relational databases.
GPU
A specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device.
firmware
A specific class of computer software that provides the low-level control for a device's specific hardware.
product key
A specific software-based key for a computer program that certifies that the copy of the program is original.
UEFI
A specification that defines a software interface between an operating system and platform firmware, meant to replace the BIOS firmware interface.
FTP
A standard network protocol used for the transfer of computer files between a client and server on a computer network.
file format
A standard way that information is encoded for storage in a computer file.
PXE
A standardized client-server environment that boots a device from software retrieved from the network rather than a local secondary device.
DHCP
A standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services.
privacy policy
A statement or a legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data.
workstation
A stationary personal computer, typically with a separate case holding the system components.
trackball
A stationary pointing device consisting of a ball held by a socket containing sensors to detect a rotation of the ball about two axes.
TKIP
A stopgap security protocol used in the IEEE 802.11 wireless networking standard, and no longer considered secure.
TKIP (Temporal Key Integrity Protocol)
A stopgap security protocol used in the IEEE 802.11 wireless networking standard, and used to replace WEP without requiring the replacement of legacy hardware.
variable
A storage address paired with an associated symbolic name, which contains some known or unknown quantity of information referred to as a value.
CSS
A style sheet language used for describing the presentation of a document written in a markup language.
function
A subprogram which provides an explicit return value.
filename extension
A suffix, separated from the base filename by a dot or space, used to indicate the file's content format or usage.
ICMP
A supporting protocol in the Internet protocol suite used to send error messages and operational information indicating success or failure when communicating with another IP address.
DDL
A syntax similar to a computer programming language for defining data structures, especially database schemas.
DCL
A syntax similar to a computer programming language used to control access (authorization) to data stored in a database.
ifconfig
A system administration utility in Unix-like operating systems that has features for configuring, controlling, and querying TCP/IP network interface parameters.
markup language
A system for annotating a document in a way that is syntactically distinguishable from the text.
protocol
A system of digital rules for data exchange within or between computers.
Internet of things (IoT)
A system of interrelated computing devices, mechanical and digital machines provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
control panel
A system utility that give the user control over hardware and software settings.
msconfig
A system utility used to troubleshoot the Microsoft Windows startup process.
Windows PowerShell
A task automation and configuration management framework from Microsoft, consisting of a command-line shell and associated scripting language built on the .NET Framework.
MIDI
A technical standard that describes a protocol, digital interface and connectors and allows a wide variety of electronic musical instruments, computers and other related devices to connect and communicate with one another.
dictionary attack
A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities from a list.
computer data storage
A technology consisting of computer components and recording media that are used to retain digital data.
OEM
A term that refers either to a company that makes a part or subsystem used in another company's end product or collectively to all of the various manufacturers involved in the final assembly of an end product.
Kbps
A thousand bits per second.
Kb
A thousand bits.
KB
A thousand bytes.
PB
A thousand trillion bytes.
VGA connector
A three-row 15-pin DE-15 connector found on many video cards, computer monitors, and high definition television sets.
identifier
A token or symbol which names a language entity.
Tbps
A trillion bits per second.
Tb
A trillion bits.
TB
A trillion bytes.
discretionary access control
A type of access control by which a subject with a certain access permission is capable of passing that permission on to any other subject.
WEEE (Waste Electrical and Electronic Equipment) Directive
A European Union directive that restricts disposal of electronic and electrical equipment due to hazardous waste.
RoHS (Recycling of Hazardous Substances)
A European Union directive that restricts the use of hazardous materials in the manufacture of various types of electronic and electrical equipment.
parted
A Linux command used to manage hard disk partitions.
net use
A Microsoft Windows command that connects a computer to or disconnects a computer from a shared resource, or displays information about computer connections.
net share
A Microsoft Windows command that manages shared resources.
ipconfig
A Microsoft Windows console application that displays all current TCP/IP network configuration values and can modify Dynamic Host Configuration Protocol DHCP and Domain Name System DNS settings.
UTF (Unicode Transformation Format)
A Unicode encoding that maps code points to byte sequences. Encodings include UTF-8, UTF-16, and UTF-32.
Linux
A Unix-like computer operating system assembled under the model of free and open-source software development and distribution.
chmod
A Unix-like operating system command used to change the access permissions on files and directories.
ls
A Unix-like operating system command used to display file and directory listings.
cd (chdir)
A Windows and Unix-like operating system command used to change the current working directory.
tree
A Windows and Unix-like operating system command used to display a recursive directory listing.
mkdir
A Windows and Unix-like operating system command used to make a new directory.
more
A Windows and Unix-like operating system command used to view the contents of a text file one screen at a time.
attrib
A Windows command used to change various characteristics, or attributes of a file or directory.
cacls
A Windows command used to display and modify the security descriptors on folders and files.
dir
A Windows command used to display file and directory listings.
diskpart
A Windows command used to manage hard disk partitions.
move
A Windows command used to move one or more files or directories from one place to another.
Gbps
A billion bits per second.
Gb
A billion bits.
GB
A billion bytes.
GHz
A billion cycles per second.
gif (Graphics Interchange Format)
A bitmap image format that was introduced by CompuServe.
power strip
A block of electrical sockets that attaches to the end of a flexible cable, allowing multiple electrical devices to be powered from a single electrical socket.
intellectual property (IP)
A category of property that includes intangible creations of the human intellect
mandatory access control
A type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
NVM
A type of computer memory that can retrieve stored information even after having been power cycled.
inkjet printer
A type of computer printer that recreates a digital image by propelling droplets of ink onto paper, plastic, or other substrates.
flowchart
A type of diagram that represents a workflow or process.
trademark
A type of intellectual property consisting of a recognizable sign, design, or expression which identifies products or services of a particular source from those of others.
ASCII (American Standard Code for Information Interchange)
A character encoding standard for electronic communication used to represent text in computers, telecommunications equipment, and other devices, limited to representing 128 possible characters.
char
A character.
DDR RAM
A class of memory integrated circuits used in computers that makes higher transfer rates possible by more strict control of the timing of the electrical data and clock signals.
office suite
A collection of bundled productivity software intended to be used by knowledge workers.
unstructured backup
A collection of media with copies of data and minimal information about what was backed up and when.
table
A collection of related data held in a structured format within a database consisting of fields and records.
database
A collection of schemas, tables, queries, reports, views and other objects.
package manager
A collection of software tools that automates the process of installing, upgrading, configuring, and removing software packages for a computer's operating system in a consistent manner.
knowledge base
A collection of structured and unstructured data representing facts about products or systems, often hosted on vendor websites and containing troubleshooting approaches and solutions.
GUI (graphical user interface)
A type of interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.
data processing system
A combination of machines, people, and processes that for a set of inputs produces a defined set of outputs.
mv
A command on Unix-like operating systems used to move one or more files or directories from one place to another.
SMB
A common file sharing protocol used on Windows, OS X, and Unix-like systems.
exe
A common filename extension denoting an executable file for DOS, OpenVMS, Microsoft Windows, Symbian or OS/2.
UNC
A common syntax used by Windows to describe the location of a network resource, such as a shared file, directory, or printer using the form \\ComputerName\SharedFolder\Resource.
parallel port
A communication interface based on a 25-pin connector, also known as a printer port or Centronics port.
serial port
A communication interface through which information transfers in or out one bit at a time and based on a 9-pin connector.
Bus
A communication system that transfers data between components inside a computer, or between computers.
CD-RW
A compact disc that can be written, read arbitrarily many times, erased and written again.
OEM
A company that produces parts and equipment that may be marketed by another manufacturer.
7zip / 7z
A compressed archive file format that supports several different data compression, encryption and pre-processing algorithms.
stylus pen
A computer accessory used to assist in navigating or providing more precision when using a touchscreen.
task scheduler
A computer application or service for controlling unattended background program execution of tasks.
32-bit
A computer architecture that supports integer values to -2,147,483,648 through 2,147,483,647 and memory addresses to 4 GiB (gigabytes or gibibytes).
64-bit
A computer architecture that supports integer values to over 18 quintillion and memory addresses to 16 EiB (exbibytes).
PCI-X
A computer bus and expansion card standard that enhances the 32-bit PCI Local Bus for higher bandwidth.
SATA
A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives and optical drives, which replaced IDE / Parallel ATA.
CLI
A type of interface that processes commands to a computer program in the form of lines of text.
SATA
A computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives.
DDR
A computer bus that transfers data on both the rising and falling edges of the clock signal.
video game console
A computer device that outputs a video signal or visual image to display a video game that one or more people can play.
NIC
A computer hardware component that connects a computer to a computer network.
query language
A computer language used to select data in databases and information systems.
ping
A computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.
thin client
A computer or computer program which depends heavily on some other computer (its server) to fulfill its computational roles.
kernel
A computer program at the core of a computer's operating system with complete control over everything in the system.
filter
A computer program or subroutine that processes an input stream, producing another stream.
packet sniffer
A computer program that can intercept and log traffic passing over a digital network.
device driver
A computer program that operates or controls a particular type of device that is attached to a computer.
file manager
A computer program that provides a user interface to manage files and folders.
database server
A computer program that provides database services to other computer programs or computers as defined by the client-server model.
service
A computer program that runs as a background process, rather than being under the direct control of an interactive user.
antivirus software
A computer program used to prevent, detect, and remove malware.
DML
A computer programming language used for adding, deleting, and modifying data in a database.
TLS
A computer programming method that uses static or global memory local to a thread.
shared resource
A computer resource made available from one host to other hosts on a computer network.
ethical hacker
A computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
database management system
A computer software application that interacts with the user, other applications, and the database itself to capture and analyze data.
proxy server
A computer system or an application that acts as an intermediary for requests from clients seeking resources from other servers.
embedded system
A computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints.
server
A computer that provides functionality for other programs or devices.
host
A computer which runs one or more virtual machines.
automatic updates
A configuration that allows an operating system or application to automatically download and install system updates.
full backup
A copy of all data at a specific point in time.
incremental backup
A copy of all data that has changed since the last backup.
differential backup
A copy of all data that has changed since the last full backup.
backup
A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
system image
A copy of the entire state of a computer system that may later be restored to exactly the same state.
TCP
A core protocol of the Internet Protocol Suite that provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating over an IP network.
brute-force attack
A cryptanalytic attack that consists of systematically checking all possible keys or passwords until the correct one is found.
SSH (Secure Shell)
A cryptographic network protocol that uses TCP port 22 for initiating secure text-based shell sessions on remote systems.
TLS (Transport Layer Security)
A cryptographic protocol designed to provide communications security over a computer network using asymmetric cryptography, and which superseded Secure Sockets Layer (SSL).
SSL (Secure Sockets Layer)
A cryptographic protocol designed to provide communications security over a computer network using asymmetric cryptography, superseded by Transport Layer Security (TLS).
ransomware
A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed.
ROM
A type of non-volatile memory useful for storing firmware.
keyboard
A typewriter-style device, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches.
MAC
A unique 48-bit address used in Ethernet networks.
MAC address
A unique identifier assigned to network interfaces for communications on the physical network segment.
SSID
A unique identifier for a wireless LAN.
SID
A unique, immutable identifier of a user, user group, or other security principal.
SID (Security Identifier / System Identifier)
A unique, immutable identifier of a user, user group, or other security principal.
TB
A unit of digital information equal to 10^12 (1 trillion) bytes.
Kb
A unit of digital information equal to 10^3 (1 thousand) bits.
KB
A unit of digital information equal to 10^3 (1 thousand) bytes.
Mb
A unit of digital information equal to 10^6 (1 million) bits.
MB
A unit of digital information equal to 10^6 (1 million) bytes.
Gb
A unit of digital information equal to 10^9 (1 billion) bits.
GB
A unit of digital information equal to 10^9 (1 billion) bytes.
denial-of-service attack
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
audio connector
A cylindrical plug and socket connector, typically with two, three or four contacts, used for analog audio signals.
hierarchical database
A data model in which the data is organized into a tree-like structure.
flash drive
A data storage device that includes flash memory, typically with an integrated Universal Serial Bus (USB) interface.
external hard drive
A data storage device used for storing and retrieving digital information, connected via USB, eSATA, FireWire, or Thunderbolt.
RAID
A data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
array
A data structure consisting of a collection of elements, each identified by at least one array index or key.
database index
A data structure that improves the speed of data retrieval operations on a database table.
container
A data type whose instances are collections of other objects.
flat-file database
A database which is stored on its host computer system as an ordinary file.
ad hoc
A decentralized wireless network that does not rely on a pre existing infrastructure, such as routers or access points in managed wireless networks.
SAN
A dedicated network that provides access to consolidated, block level data storage.
CSV
A delimited text file where each line of the file is a data record.
DVD-DL
A derivative of the DVD-R format standard which holds 8.5 GB by utilizing two recordable dye layers, each capable of storing a little less than the 4.7 gigabyte (GB) of a single layer disc.
computer fan
A device inside or attached to a computer case used for active cooling.
IDS
A device or software application that monitors a network or systems for malicious activity or policy violations.
bridge or switch
A device that connects and filters multiple network segments or devices, by forwarding data only to one or multiple devices that need to receive the data based on destination MAC address.
modem
A device that modulates signals to encode digital information and demodulates signals to decode the transmitted information, used with phone line and cable connections.
scanner
A device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image.
PSU
A device that supplies electric power to a computer system, converting electric current from a source to the correct voltage, current, and frequency.
range extender
A device that takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network.
SSD
A device that uses integrated circuit assemblies to store data persistently, typically using flash memory.
modem
A device used to connect network nodes via wire not originally designed for digital network traffic, by modulating the digital signal to produce an analog signal for transmission.
firewall
A device used to control network security and access rules by rejecting access requests from unrecognized sources while allowing actions from recognized ones.
voltage converter
A device which changes the voltage of an electrical power source.
speaker
A device which converts an electrical audio signal into a corresponding sound.
safe mode
A diagnostic mode of a computer operating system (OS) with reduced functionality that provides access to utility and diagnostic programs so a user can troubleshoot what is preventing the operating system from working normally.
safe mode
A diagnostic mode of a computer operating system. In Windows, safe mode only allows essential system programs and services to start up at boot. It is widely used for removing rogue security software.
MP4
A digital multimedia file format most commonly used to store video and audio, but can also be used to store other data such as subtitles and still images.
mp4 (Moving Picture Experts Group Layer 4)
A digital multimedia file format most commonly used to store video and audio, but can also be used to store other data such as subtitles and still images.
Blu-Ray
A digital optical disc data storage format designed to supersede the DVD format, with a storage capacity of 25 GB per layer, and dual layer discs (50 GB) being the industry standard for high definition (1080p) feature-length video discs.
CD
A digital optical disc data storage format originally developed to store and play only sound recordings (CD-DA), but was later adapted for storage of data (CD-ROM), with a storage capacity of 737 MB.
DVD
A digital optical disc storage format with a storage capacity of 4.7 GB for a single-layered, single-sided disc and 8.5 GB for a dual-layered, single-sided disc.
thermal printer
A digital printing device which produces a printed image by selectively heating coated thermochromic paper.
DVI
A digital video display interface used to connect a video source to a display device.
display resolution
A display setting that determines the number of distinct pixels in each dimension that can or will be displayed.
peer-to-peer
A distributed application architecture that partitions tasks or work loads between equally privileged participants.
EMI
A disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.
rtf
A document file format developed by Microsoft for cross-platform document interchange.
ppt/pptx
A document file format used for presentation software files.
xls/xlsx
A document file format used for spreadsheet files.
txt
A document file format used for text files.
doc/docx
A document file format used for word processing files.
pdf (Portable Document Format)
A document file format used to present documents in a manner independent of application software, hardware, and operating systems.
SQL
A domain-specific language used in programming and designed for managing data held in a relational database management system.
environment variable
A dynamic named value that can affect the way running processes will behave on a computer.
x86
A family of backward compatible instruction set architectures based on the Intel 8086 through 80486 CPUs supporting 16-bit and 32-bit addressing and processing.
Ethernet
A family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs) standardized in 1983 as IEEE 802.3.
ARM
A family of reduced instruction set computing (RISC) architectures for computer processors currently used in mobile phones and tablets.
DSL (Digital Subscriber Line)
A family of technologies that are used to provide internet access by transmitting digital data over telephone lines.
DSL
A family of technologies that are used to transmit digital data over telephone lines.
Wi-Fi
A family of wireless networking technologies, based on the IEEE 802.11 family of standards.
main memory
A fast storage area that is directly accessible by the CPU, and is used to store the currently executing program and immediately needed data.
System Restore
A feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems.
private browsing
A feature in some web browsers where the browser creates a temporary session that is isolated from the browser's main session and user data.
foreign key
A field in a relational table that matches the primary key column of another table.
archive bit
A file attribute used by Microsoft operating systems to indicate whether a file has been backed up since it was modified.
jpg
A file extension and commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
dmg
A file extension indicating an Apple Disk Image file format, commonly used by the Mac OS X operating system.
mpg
A file extension used for MPEG-1 or MPEG-2 audio and video compression files.
flv
A file extension used to indicate Flash Video files.
m4a
A file extension used to indicate MPEG 4 audio-only files.
msi
A file extension used to indicate a Microsoft Windows Installer (software installation) file.
bmp
A file extension used to indicate a bitmap image
bat (batch file)
A file extension used to indicate a command script file in DOS, OS/2, and Windows.
rar (Roshal ARchive)
A file extension used to indicate a proprietary archive file format that supports data compression, error recovery and file spanning.
png (Portable Network Graphics)
A file extension used to indicate a raster graphics file format that supports lossless data compression, created as an improved, non-patented replacement for Graphics Interchange Format (GIF).
app
A file extension used to indicate application bundles (folder hierarchies) on OS X.
gzip / gz
A file format and software application used for file compression and decompression on Unix and Linux systems.
tar (tape archive)
A file format and the name of a program used to create and manage tape archives on Unix and Linux systems.
tiff (Tagged Image File Format)
A file format for storing raster graphics images, popular among graphic artists and the publishing industry, the specification of which is controlled by Adobe Systems.
File Explorer
A file manager application included with the Microsoft Windows operating system.
AFP
A file sharing protocol specific to OS X.
NFS
A file sharing protocol specific to Unix-like systems.
directory
A file system cataloging structure which contains references to other computer files.
ext
A file system created specifically for the Linux kernel.
NAS
A file-level (as opposed to block-level) computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.
NAS
A file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.
security functions
A firewall, network address translation (NAT), and VPN handling.
optical fiber
A flexible, transparent filament used most often as a means to transmit light and permit transmission over longer distances and at higher bandwidths.
Hardware Compatibility List
A list of computer hardware (typically including peripheral devices) that is compatible with a particular operating system or device management software.
ACL (Access Control List)
A list of permissions attached to a file system object.
ACL
A list of permissions attached to an object.
access-control list (ACL)
A list of permissions attached to an object.
WI-Fi (Wireless Fidelity)
A local area wireless technology that allows an electronic device to participate in computer networking using 2.4 GHz and 5 GHz bands.
PCI
A local computer bus for attaching hardware devices in a computer, which replaced the original ISA and VESA bus configuration.
PCI
A local computer bus for attaching hardware devices in a computer.
troubleshooting
A logical, systematic search for the source of a problem so that it can be solved, and so the product or process can be made operational again.
subnet
A logically visible subdivision of an IP network.
sleep mode
A low power mode for electronic devices which, upon resume, allow the user to avoid having to reissue instructions or to wait for a machine to reboot.
intermittent fault
A malfunction of a device or system that occurs at intervals, usually irregular, in a device or system that functions normally at other times.
virus
A malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or firmware.
digital signature
A mathematical scheme for demonstrating the authenticity of an electronic message or document.
localization
A means of adapting computer software to different languages, regional differences and technical requirements of a target market.
command-line interface
A means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text.
password
A memorized secret, typically a string of characters, used to confirm the identity of a user.
paging
A memory management scheme by which a computer stores and retrieves data from the secondary storage for use in main memory.
virtual memory
A memory management technique developed for multitasking kernels that allows the operating system to use secondary storage as virtual address space.
virtual memory
A memory management technique that is implemented using both hardware and software that maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory.
Windows
A metafamily of graphical operating systems developed, marketed, and sold by Microsoft.
VoIP
A method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
byte
A unit of digital information in computing and telecommunications that consists of eight bits, permitting the values 0 through 255 and used to encode a single character of text.
MHz
A unit of frequency defined as 10^6 (1 million) cycles per second.
GHz
A unit of frequency defined as 10^9 (1 billion) cycles per second.
Hertz
A unit of frequency defined as one cycle per second.
shell
A user interface for access to an operating system's services, using either a command-line interface (CLI) or graphical user interface (GUI).
System File Checker
A utility in Microsoft Windows that allows users to scan for and restore corruptions in Windows system files.
CRT
A vacuum tube containing one or more electron guns, and a fluorescent screen used to view images.
constant
A value that cannot be altered by the program during normal execution.
parameter
A variable that allows for text or data provided as input to a program, command, or subroutine.
webcam
A video camera that feeds or streams its image in real time to or through a computer to a computer network.
wmv (Windows Media Video)
A video file extension created by Microsoft which can contain video in one of several video compression formats.
guest machine
A virtual computer which is run by a host machine.
guest
A virtual machine.
VMware Player
A virtualization software package for computers running Windows or Linux, supplied free of charge for personal non-commercial use by VMware, Inc.
VirtualBox
A virtualization software package for x86 and AMD64/Intel64-based computers distributed by Oracle.
captive portal
A web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources.
AES
A widely accepted data encryption standard using symmetric cryptography and supporting key lengths of 128, 192 and 256 bits which supersedes DES.
AES (Advanced Encryption Standard)
A widely accepted data encryption standard using symmetric cryptography and supporting key lengths of 128, 192 and 256 bits which supersedes DES.
WPA2
A wireless computer network security protocol based on AES.
WPA2 (Wireless Protected Access 2)
A wireless computer network security protocol based on AES.
WPA
A wireless computer network security protocol based on TKIP.
WPA (Wireless Protected Access)
A wireless computer network security protocol based on TKIP.
multi-factor authentication
A method of computer access control which a user can pass by successfully presenting authentication factors from at least two of the three categories of knowledge, possession, and inherence.
multitasking
A method where multiple tasks, also known as processes, are performed during the same period of time by executing them concurrently rather than sequentially.
NAT (Network Address Translation)
A methodology of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.
Mbps
A million bits per second.
Mb
A million bits.
MB
A million bytes.
MHz
A million cycles per second.
tablet
A mobile device with a mobile operating system and touchscreen display and a rechargeable battery in a single, thin and flat package, with screens 7 inches (18 cm) or larger, measured diagonally, and may not support access to a cellular network.
Android
A mobile operating system (OS) based on the Linux kernel and currently developed by Google.
iOS
A mobile operating system developed by Apple Inc. and distributed exclusively for Apple hardware, including iPods, iPhones, and iPads.
smart phone
A mobile phone with more advanced computing capability and connectivity than basic feature phones.
single user mode
A mode in which a multiuser computer operating system boots into a single superuser, common on Unix-like systems including macOS and Linux.
single user mode
A mode in which a multiuser computer operating system boots into a superuser configuration, used primarily for maintenance of multi-user environments such as network servers.
cloud storage
A model of computer data storage in which the digital data is stored in logical pools on one or more physical Internet-based servers, sometimes replicated across multiple locations.
Boot Camp
A multi boot utility included with Apple Inc.'s OS X that assists users in installing Microsoft Windows operating systems on Intel-based Macintosh computers.
PC (Personal Computer)
A multi-purpose computer whose size, capabilities, and price make it feasible for individual use.
avi (Audio Video Interleave)
A multimedia container file extension and format developed by Microsoft.
nslookup
A network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.
workgroup
A network environment in which each computer is responsible for its own security, rather than relying on centralized authentication.
WLAN
A wireless computer network that links two or more devices using a wireless distribution method within a limited area such as a home, school, computer laboratory, or office building.
WLAN (Wireless Local Area Network)
A wireless computer network that links two or more devices using a wireless distribution method within a limited area such as a home, school, computer laboratory, or office building.
802.11b
A wireless networking standard operating in the 2.4 GHz band and supporting up to 11 Mbps data rates.
802.11g
A wireless networking standard operating in the 2.4 GHz band and supporting up to 54 Mbps data rates.
802.11n
A wireless networking standard operating in the 2.4 GHz or 5 GHz band and supporting up to 600 Mbps data rates.
802.11ac
A wireless networking standard operating in the 5 GHz band and supporting up to 1 Gbps data rates.
802.11a
A wireless networking standard operating in the 5 GHz band and supporting up to 54 Mbps data rates.
MPEG (Moving Picture Experts Group)
A working group of authorities that was formed by ISO and IEC to set standards for audio and video compression and transmission.
numeral system
A writing system for expressing numbers; that is, a mathematical notation for representing numbers of a given set, using digits or other symbols in a consistent manner.
bits
Abbreviated with a lower-case b.
bytes
Abbreviated with an upper-case B.
permissions
Access rights assigned to specific users and groups of users to control the ability of the users to view or make changes to system objects.
mobile Internet
Access to the Internet via a cellular telephone service provider.
INSERT
Adds one or more records to any single table in a relational database.
GRANT
Allows specified users to perform specified tasks.
preemptive multitasking
Allows the operating system to terminate running processes that stop responding.
open-source license
Allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions.
concurrent license
Allows use by a given number of users at the same time.
RJ-45
An 8 position 8 contact modular connector typically used for network cable connections.
01:23:45:67:89:ab
An Ethernet MAC address.
198.51.100.1
An IPv4 address.
2001:db8:0:1234:0:567:8:1
An IPv6 address.
SNMP
An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
SMTP
An Internet standard for electronic mail (email) transmission.
IMAP
An Internet standard protocol used by e-mail clients to retrieve e-mail messages from a mail server.
diskutil
An OS X command used to manage hard disk partitions
VTC
An abbreviation for Video Teleconference.
microphone
An acoustic-to-electric transducer or sensor that converts sound in air into an electrical signal.
Component-RGB
An analog video signal that uses RCA connectors and has been split into separate signals for red, green, and blue.
peripheral
An ancillary device used to put information into and get information out of the computer.
Windows Defender
An anti-malware program developed by Microsoft and included in Windows Vista and later operating systems.
surge protector
An appliance that attempts to limit the voltage supplied to an electric device by either blocking or by shorting to ground any unwanted voltages above a safe threshold.
System Preferences
An application included with the OS X operating system that allows users to modify various system settings which are divided into separate preference panes.
port forwarding
An application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.
HTTP
An application protocol for distributed, collaborative, hypermedia information systems used as the foundation of data communication for the World Wide Web.
Telnet
An application protocol that uses TCP port 23 to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.
SFTP
A network protocol that provides file access, file transfer, and file management over any reliable data stream designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities.
HTTP (Hypertext Transfer Protocol)
An application protocol that uses TCP port 80 for distributed, collaborative, hypermedia information systems and the foundation of data communication for the World Wide Web.
SFTP (Secure File Transfer Protocol)
A network protocol that uses TCP port 22 to provide file access, file transfer, and file management functionalities designed as an extension of the Secure Shell protocol (SSH).
WPS (Wireless Protected Setup)
A network security standard that attempted to allow users to easily secure a wireless home network using a PIN rather than long pass phrases.
firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
WAN
A network that covers a broad geographic area using leased telecommunication lines.
WAN (Wide Area Network)
A network that covers a broad geographic area using leased telecommunication lines.
WAP
A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
trojan
A non-self-replicating type of malware program containing malicious code that, when executed typically causes loss or theft of data, and possible system harm.
SD card
A nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers.
WEP
A notoriously weak security standard.
binary number
A number expressed in the base-2 numeral system, which uses only two symbols: typically "0" (zero) and "1" (one).
PIN
A numeric or alpha-numeric password used in the process of authenticating a user accessing a system.
IP address
A numerical label assigned to each device in a computer network that uses the Internet Protocol for communication.
IP address
A numerical label assigned to each device participating in a network that uses the Internet Protocol for communication
POP
An application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
Storage Area Network
An approach to approach to shared resources that may be used in addition to file and print servers in a very large network.
role-based access control
An approach to restricting system access to authorized users based on job functions.
zip
An archive file format that supports lossless data compression, supported by Microsoft Windows.
vector
An array of object references.
man-in-the-middle attack
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.
jar (Java Archive)
A package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file to distribute application software or libraries on the Java platform.
Control Panel
A part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets.
object
A particular instance of a class.
heat sink
A passive heat exchanger.
relative path
A path based on the working directory of the user or application.
absolute path
A path that points to the same location on one file system regardless of the present working directory or combined paths.
IOPS
A performance measurement used to characterize secondary computer storage devices.
PC
A personal computer running Microsoft Windows, used in contrast with Mac.
host machine
A physical computer on which virtualization takes place.
DMZ (demilitarized zone)
A physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
client
A piece of computer hardware or software that accesses a service made available by another computer.
hypervisor
A piece of computer software, firmware or hardware that creates and runs virtual machines.
argument
A piece of data provided as input to a program, command, or subroutine.
patch
A piece of software designed to update a computer program or its supporting data, to fix or improve it.
contingency plan
A plan devised for an outcome other than in the usual (expected) outcome.
browser extension
A plug-in that extends the functionality of a web browser.
touchpad
A pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on the operating system that is outputted to the screen.
mouse
A pointing device that detects two-dimensional motion relative to a surface.
password reuse
A policy that prevents users from repeating recently used passwords.
password expiration
A policy that requires users to change passwords periodically.
data retention
A policy which defines data persistence and records management for legal and business archival requirements.
flash drive
A portable computer drive.
mobile media player
A portable digital consumer electronics device capable of storing and playing digital media such as audio, images, and video files.
mobile phone
A portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.
hexadecimal
A positional system that represents numbers using sixteen distinct symbols, most often the symbols "0"-"9" to represent values zero to nine, and "A"-"F" (or alternatively "a"-"f") to represent values ten to fifteen.
AC connector
A power plug and socket connector that allows electrically operated equipment to be connected to the primary power supply in a building.
CD-ROM
A pre-pressed optical compact disc which contains data and is not writable or erasable.
DVD-ROM
A pre-recorded DVD mass-produced using molding machines that physically stamp data onto the DVD, and which can only be read and not written or erased.
FRU
A printed circuit board, part, or assembly that can be quickly and easily removed from a computer or other piece of electronic equipment, and replaced by the user or a technician without having to send the entire product or system to a repair facility.
method
A procedure or function.
data analysis
A process of inspecting, cleansing, transforming and modeling data with the goal of discovering useful information, informing conclusion and supporting decision-making.
authentication
A process to establish identity.
authorization
A process to verify permission to access a resource.
portable application
A program designed to run on a compatible computer without being installed in a way that modifies the computer's configuration information.
command line shell
A program that accepts commands as text input and converts commands to appropriate operating system functions.
scripting language
A programming language for a special run-time environment that automates the execution of tasks.
interpreted language
A programming language for which most of its implementations execute instructions directly and freely.
compiled language
A programming language whose implementations translate source code into machine code before execution.
cross-platform
An attribute conferred to computer software or computing methods and concepts that are implemented and inter-operate on multiple computer platforms.
data type
An attribute of data which tells the compiler or interpreter how the programmer intends to use the data.
flac (Free Lossless Audio Codec)
An audio coding format for lossless compression of digital audio.
aac (Advanced Audio Coding)
An audio coding standard for lossy digital audio compression designed to be the successor of the MP3 format, which generally achieves better sound quality than MP3 at similar bit rates.
wav (Waveform Audio File Format)
An audio file extension developed by Microsoft and IBM for audio bitstream files.
MP3
An audio file format that uses a form of lossy data compression, accepted as the de facto standard of digital audio compression for the transfer and playback of music on most digital audio players.
database constraint
Restricts the data that can be stored in relations.
SELECT
Returns a result set of records from one or more tables.
utility software
Software designed to help to analyze, configure, optimize or maintain a computer.
bundled software
Software distributed with another product such as a piece of computer hardware or other electronic device, or a group of software packages which are sold together.
network installation
Software installation from a shared network resource.
headless installation
Software installation performed without using a computer monitor connected to the system.
silent installation
Software installation that does not display messages or windows during its progress.
clean installation
Software installation that is done in the absence of any interfering elements such as old versions of the computer program being installed or leftovers from a previous installation.
unattended installation
Software installation that is performed without user interaction during its progress or with no user present at all.
attended installation
Software installation that requires a user to be present and interact with the installation process.
automated installation
Software installation that runs at a preset time or when a predefined condition transpires,
Parallels
Software providing hardware virtualization for Macintosh computers with Intel processors.
device use best practices
Software sources, removal of unwanted software
spyware
Software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
bloatware
Software that becomes perceptibly slower, use more memory / disk space or processing power, or have higher hardware requirements than the previous version whilst making only dubious user-perceptible improvements.
application software
Software which directly performs tasks that benefit ordinary users.
graphic design software
Specialty software used to create and combine words, symbols, and images to create a visual representation of ideas and messages.
WHERE
Specifies that a SQL Data Manipulation Language (DML) statement should only affect rows that meet specified criteria.
ORDER BY
Specifies that a SQL SELECT statement returns a result set with the rows being sorted by the values of one or more columns.
troubleshooting principle
Start from the simplest and most probable possible problems first.
snooping
Stealthily observing any type of action or communication.
incremental backup
Stores data changed since a reference point in time.
mass storage
Stores programs and data even when the power is off, but requires power to perform read and write functions during usage.
router interfaces
Support different physical types of network connections, such as copper cables, optical fiber, or wireless transmission.
NTFS, HFS Plus, and ext4
Support file system attributes and permissions.
firmware
Supports different networking communications protocol standards, and should be updated whenever security or performance issues have been corrected.
open network
Susceptible to capturing and recording the traffic, gaining unauthorized access to internal network resources as well as to the internet, and then using the information and resources to perform disruptive or illegal acts.
utility software
System software designed to help analyze, configure, optimize or maintain a computer.
operating system (OS)
System software that manages computer hardware, software resources, and provides common services for computer programs.
transport layer protocols
TCP and UDP.
pop-up
Technology that allows a website author to associate any item with any action, including with a cancel or innocent looking button.
Trash
Temporary storage for deleted files in OS X and Linux.
Recycle Bin
Temporary storage for deleted files in the Microsoft Windows operating system.
x64
The 64-bit version of the x86 instruction set, supporting 64-bit addressing and processing, and fully backwards compatible with 16-bit and 32-bit x86 code.
>>
The character sequence used to append output to the end of a file, rather than overwriting it.
<
The character sequence used to redirect input to a stream.
>
The character sequence used to redirect output to a stream.
.
The character sequence used to represent the current directory.
..
The character sequence used to represent the parent directory.
|
The character sequence used to separate commands in a pipeline.
COMMAND.COM
The command prompt for DOS and Windows operating systems prior to Windows 2000.
cmd.exe
The command prompt for Windows NT, Windows 2000 and later operating systems
Wi-Fi
The common name for a flavor of open standards for wireless local area network radio-wave technology defined as IEEE 802.11.
I/O
The communication between an information processing system, such as a computer, and the outside world, possibly a human or another information processing system.
TCP/IP
The computer networking model and set of communications protocols used on the Internet and similar computer networks.
dynamic addressing
The computer's IP address is assigned newly each time.
file system tree
The content in the left pane of a navigational file manager.
current directory
The content in the right pane of a navigational file manager.
backup
The copying and archiving of computer data so it may be used to restore the original after a data loss event.
POP3
The current version of the Post Office Protocol (POP).
Bash
The default command shell on Linux and Mac OS X.
Finder
The default file manager and graphical user interface shell used on all Macintosh operating systems.
mobility
The degree to which a computing device is able to be transported during normal usage.
availability
The degree to which a system, subsystem or equipment is in a specified operable and committable state at a given time.
IDE
The original name for what became the ATA / ATAPI / PATA interface standard for the connection of computer storage devices such as hard disks, floppy drives, and optical disc drives.
WEP (Wired Equivalency Privacy)
The original security algorithm for IEEE 802.11 wireless networks, and superseded by WPA.
WEP
The original security algorithm for IEEE 802.11 wireless networks, and superseded by WPA. WEP is no longer considered secure.
CPU
The part of a computer which executes software program instructions.
context switch
The passing of control between the kernel and applications.
internetworking
The practice of connecting a computer network with other networks through the use of routers that provide a common method of routing information packets between the networks.
multi-licensing
The practice of distributing software under two or more different sets of terms and conditions.
computer maintenance
The practice of keeping computers in a good state of repair.
information security
The practice of protecting information by mitigating information risks.
dumpster diving
The practice of sifting through commercial or residential waste to find items that have been discarded by their owners, but that may prove useful to the collector.
copyleft
The practice of using copyright law to offer the right to distribute copies and modified versions of a work and requiring that the same rights be preserved in modified versions of the work.
motherboard
The primary circuit board within a personal computer.
IP
The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
IP
The principal communications protocol in the Internet protocol suite for routing / relaying datagrams across network boundaries.
data reporting
The process of collecting and submitting data which gives rise to accurate analyses of the situation.
authentication
The process of confirming identity.
encryption
The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
compression
The process of encoding information using fewer bits than the original representation.
encryption
The process of encoding information.
data collection
The process of gathering and measuring information on targeted variables in an established system, which then enables one to answer relevant questions and evaluate outcomes.
password cracking
The process of recovering passwords from data that have been stored in or transmitted by a computer system, most often through brute-force or dictionary attacks.
device hardening
The process of securing a system by reducing its surface of vulnerability through the removal of unnecessary software, unnecessary usernames or logins and the disabling or removal of unnecessary services.
device hardening
The process of securing a system by reducing its surface of vulnerability.
scalability
The property of a system to handle a growing amount of work by adding resources to the system.
fault tolerance
The property that enables a system to continue operating properly in the event of the failure of some of its components.
availability
The proportion of time a system is in a functioning condition.
social engineering
The psychological manipulation of people into performing actions or divulging confidential information.
throughput
The rate of successful message delivery over a communication channel.
Internet privacy
The right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
multitasking
The running of multiple independent computer programs on the same computer at the same time.
physical ergonomics
The science of designing user interaction with equipment and workplaces to fit the user. Proper placement of screens, keyboards and mice can reduce eye-strain and repetitive stress injuries.
inputs
The signals or data received by the system.
outputs
The signals or data sent from the system.
virtualization
The simulation of a hardware platform, operating system, storage device, or network resources using software.
48 bits
The size of an Ethernet MAC address.
32-bit
The size of an IPv4 address.
128-bit
The size of an IPv6 address.
proprietary software license
The software publisher grants the use of one or more copies of software under the end-user license agreement (EULA), but ownership of those copies remains with the software publisher.
file system
The specific way in which files are stored on a disk.
form factor
The specification of a motherboard - the dimensions, power supply type, location of mounting holes, number of ports on the back panel, etc.
HTML
The standard markup language for documents designed to be displayed in a web browser.
HTML (Hypertext Markup Language)
The standard markup language used to create web pages.
decimal numeral system
The standard system for denoting integer and non-integer numbers using the symbols "0"-"9".
snapshot
The state of a system at a particular point in time.
schema
The structure of a database described in a formal language supported by the database management system (DBMS).
ESD
The sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown.
ESD (Electrostatic Discharge)
The sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown.
fax
The telephonic transmission of scanned printed material.
latency
The time interval or delay between a source sending a packet and the destination receiving it.
database engine
The underlying software component that a database management system uses to create, read, update and delete data from a database.
DC (Direct Current)
The unidirectional flow of an electric charge, and the form of electrical energy that consumers typically use when they run devices from a battery.
CAM (Computer Aided Manufacturing
The use of computer software to control machine tools and related machinery in the manufacturing of workpieces.
CAD
The use of computer systems to assist in the creation, modification, analysis, or optimization of a design, particularly for manufacturing.
CAD (Computer Aided Design)
The use of computer systems to assist in the creation, modification, analysis, or optimization of a design, particularly for manufacturing.
Information technology (IT)
The use of computers to store, retrieve, transmit, and manipulate data or information.
Ease of Access Center
The utility that enables use of assistive technologies on Microsoft Windows.
Accessibility
The utility that enables use of assistive technologies on OS X and Linux.
SSID
The wireless network name.
peer-to-peer file sharing
Typically uses applications specifically designed for this task, and may include Internet peers, local ad hoc networks, and Bluetooth connections.
UPDATE syntax
UPDATE <table> SET <column> = <value>, ... [WHERE <condition>]
Unicode encodings
UTF-8, UTF-16, and UTF-32.
primary key
Uniquely specifies a record within a table.
spim
Unsolicited electronic messages targeting users of instant messaging services.
spam
Unsolicited electronic messages, especially advertising.
HTTPS, FTPS, and SFTP
Use cryptographic protocols (SSL/TLS or SSH) to encrypt network traffic between the sender and receiver.
wireless connections
Use spread spectrum technology based on a common flavor of open-standards wireless radio-wave technology defined as IEEE 802.11 and known as Wi-Fi.
trusted certificate authority (CA)
Used by a public key infrastructure (PKI) to validate and sign public key certificates.
file extension
Used by many operating systems to determine the format of a file based on the end of its name, more specifically the letters following the final period.
packet
Used by networked computing devices to pass data to each other across connections established using either cable or wireless media.
supervisor mode
Used by the kernel for low level tasks that need unrestricted access to hardware.
user mode
Used for application programs.
browser extensions
Used for improving a browser's user interface, security or accessibility, blocking advertisements, and various other features to make browsing the internet easier and more pleasant.
DQL
Used for performing queries on the data within schema objects.
productivity software
Used for producing information such as documents, presentations, worksheets, data, charts, graphs, digital paintings, electronic music and digital video.
browser cache
Used for temporary storage of web documents, such as HTML pages and images, to reduce bandwidth usage, server load, and perceived lag.
|
Used in command documentation to indicate a list of choices.
[]
Used in command documentation to indicate optional parameters.
...
Used in command documentation to indicate repeated items.
<>
Used in command documentation to indicate required parameters.
email client
Used to access and manage a user's electronic mail.
visual diagramming software
Used to create vector graphics with points connected by lines and curves to form polygons and other shapes.
? -? -h -H /? /h /H
Used to display a brief summary of command parameters.
presentation software
Used to display information in the form of a slide show.
CREATE
Used to establish a new database, table, index, or stored procedure.
conferencing software
Used to facilitate webinars, webcasts, and peer-level web meetings.
private key
Used to generate a digital signature.
project management software
Used to help plan, organize, and manage resource tools and develop resource estimates for sequences of events or tasks.
Command key
Used to implement keyboard shortcuts on Mac keyboards.
Control key
Used to implement keyboard shortcuts on PC keyboards.
period (.)
Used to indicate a hidden file.
tilde (~)
Used to indicate a temporary system file.
- -- / : ?
Used to indicate command options.
character encoding
Used to represent a repertoire of characters using bit patterns, octets, natural numbers, electrical pulses, etc.
query language
Used to retrieve information from databases.
spaces
Used to separate command options.
asterisk ("*")
Used to specify that the query should return all columns of the queried tables.
public key
Used to validate a digital signature.
liquid cooling
Uses a fluid rather than air as the heat conductor, with the most commonly used fluid in desktop PCs being distilled water.
optical storage
Uses a laser to store and retrieve data from compact discs (CD) and DVDs.
shoulder surfing
Using direct observation techniques to obtain information such as passwords, PINs, security codes, and similar data.
passive cooling
Using heat sinks and metal cases.
accounting
Using such system components as audit trails and logs to associate a subject with its actions.
thin provisioning
Using virtualization technology to give the appearance of having more physical resources than are actually available.
uninstallation
Usually involves more than just erasing the program folder.
compiled programs
Usually run much faster than those that are interpreted in software.
software firewall
Utility software used to control incoming and outgoing network traffic based on an applied rule set.
sc.exe
Utility software used to control services running on Microsoft Windows.
anti-malware software
Utility software used to detect and remove malicious software.
diagnostic software
Utility software used to locate problems with the software, hardware, or any combination there of in a system, or a network of systems.
compression software
Utility software used to reduce resource usage, such as data storage space or transmission capacity requirements.
primary storage
Volatile and typically referred to as RAM.
troubleshooting sequence
identify problem -> note possible causes -> determine cause -> confirm solution.
float
real numbers.
program structures
sequence, iteration, recursion, and choice.
mp3 (Moving Picture Experts Group Layer 3 Audio)
An audio file format that uses a form of lossy data compression, accepted as the de facto standard of digital audio compression for the transfer and playback of music on most digital audio players.
single sign-on
An authentication scheme that allows a user to log in with an ID and password to any of several related, yet independent, software systems.
legacy system
An old method, technology, computer system, or application program, of, relating to, or being a previous or outdated computer system.
Chrome OS
An operating system based on the Linux kernel and designed by Google to work with web applications and installed applications, initially designed as a pure web thin client operating system.
kernel
An operating system component that manages input/output requests from software, and translates them into data processing instructions for the central processing unit and other electronic components of a computer.
distro (Linux distribution)
An operating system made as a collection of software based around the Linux kernel and often around a package management system, typically based on either Red Hat's package manager (rpm and yum) or Debian's package manager (dpkg and apt).
embedded operating system
An operating system that has a dedicated function within a larger mechanical or electrical system.
mobile operating system
An operating system that operates a smartphone, tablet, PDA, or other mobile device.
protected mode
An operational mode of CPUs that allows system software to use features such as virtual memory, paging and safe multi-tasking designed to increase an operating system's control over application software.
projector
An optical device that projects an image (or moving images) onto a surface.
iso
An optical disk archive file.
homegroup
An option on Windows 7 and later Microsoft operating systems that extends the workgroup by using a password to join computers into the group, and allows users' libraries, along with individual files and folders, to be shared between multiple computers.
ISP
An organization that provides services for accessing, using, or participating in the Internet.
ISP (Internet Service Provider)
An organization that provides services for accessing, using, or participating in the Internet.
SSL
An outdated encryption protocol.
assistive technology
An umbrella term that includes assistive, adaptive, and rehabilitative devices and software for people with disabilities and also includes the process used in selecting, locating, and using them.
FTP (File Transfer Protocol)
An unencrypted standard network protocol that uses TCP ports 20 and 21 to transfer computer files from one host to another host.
UPS
An uninterruptible power supply, also uninterruptible power source, or battery/flywheel backup, is an electrical apparatus that provides emergency power to a load when the input power source, typically main power, fails.
wired Internet access options
Analog and digital computer modems attached to telephone lines, coaxial television cable, and fiber optic cables.
mobile operating systems
Android, iOS, Windows Phone, and Blackberry.
screen resolution
Another name for display resolution.
virtual machine monitor (VMM)
Another name for hypervisor.
dual boot
Another name for multi-boot.
security best practices
Antivirus/anti-malware, host firewall, changing default passwords, enabling passwords, safe browsing practices, patching/updates
security software
Any computer program designed to enhance information security.
asset
Any data, device, or other component of the environment that supports information-related activities.
PII
Any information relating to an identifiable person.
assembly language
Any low-level programming language in which there is a very strong correspondence between the instructions in the language and the architecture's machine code instructions.
data
Any sequence of one or more symbols given meaning by specific act(s) of interpretation.
malware
Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
personal information
Anything that can be used to identify an individual.
digital asset
Anything that exists in a binary format and comes with the right to use.
productivity software
Application software dedicated to producing information, such as documents, presentations, worksheets, databases, charts, graphs, digital paintings, electronic music and digital video.
collaborative software
Application software designed to help people involved in a common task to achieve goals, such as email, calendaring, text chat, wiki, bookmarking, shared document storage, screen sharing, and video conferencing.
rule-based access control
Applies policies that express a complex Boolean rule set that can evaluate many different attributes.
FAT file system attributes
Archive, Hidden, System, and Read-only.
file system permissions
Assign permissions or access rights to specific users and groups of users to control the ability of the users to view or make changes to the contents of the file system.
non-repudiation
Associating actions or changes with a unique individual, preventing the owner of the account from denying actions performed by the account.
encryption best practices
At rest, in transit, and during processing.
contextual attributes
Attributes that deal with time, location or dynamic aspects of the access.
action attributes
Attributes that describe the activity being attempted.
object attributes
Attributes that describe the resource being accessed.
subject attributes
Attributes that describe the user attempting the access.
multi-factor authentication
Authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
peripheral
Auxiliary device used for computer input, output, or data storage.
storage hierarchy
Fast but expensive and small storage options close to the central processing unit (CPU) and slower but less expensive and larger options further away.
memory
Fast volatile data technologies which lose data when power is off.
BIOS
Initializes and tests the system hardware components and loads a boot loader or an operating system from a mass storage device.
audio card
Internal computer expansion card that facilitates economical input and output of sound signals to and from a computer.
satellite
Internet access provided through communications satellites.
interpreted languages
JavaScript, Perl, and Python.
journal
Keeps track of changes not yet committed to a file system.
Control/Command+B
Keyboard shortcut to bold text.
Control/Command+C
Keyboard shortcut to copy.
Control/Command+X
Keyboard shortcut to cut.
Control/Command+F
Keyboard shortcut to find.
Control/Command+I
Keyboard shortcut to italicize text.
Control/Command+O
Keyboard shortcut to open.
Control/Command+V
Keyboard shortcut to paste.
Control/Command+P
Keyboard shortcut to print.
Control/Command+S
Keyboard shortcut to save.
Control/Command+A
Keyboard shortcut to select all.
Control/Command+U
Keyboard shortcut to underline text.
Control/Command+Z
Keyboard shortcut to undo.
input devices
Keyboards, pointing devices, scanners, microphones, and webcams.
authentication factors
Knowledge (something the user knows), possession (something the user has), and inherence (something the user is).
TCP/IP
Known as the Internet protocol suite, the conceptual model and set of communications protocols used in the Internet and similar computer networks.
password best practices
Length, complexity, history, expiration, reuse, password managers, reset process.
routing table
Lists the routes to particular network destinations, and in some cases, metrics (distance, performance, or cost) associated with those routes.
backup locations
Local, on-site vs. off-site, cloud storage.
backup media
Locally attached tape, disk, and optical storage, network attached storage, and remote/cloud storage.
computer placement
Locations that have good airflow while minimizing humidity and temperature issues, minimize dust accumulation, and avoid disruption from EMI sources.
common operations performed during software installation
Making sure that necessary system requirements are met Checking for existing versions of the software Creating or updating program files and folders Adding configuration data Making the software accessible to the user Configuring components that run automatically Performing product activation, Updating the software versions
IPS
Network security appliances that monitor network or system activities to identify malicious activity, log information about this activity, report it, and attempt to block or stop it.
WEP and WPA
No longer considered secure.
proprietary software
Non-free computer software for which the software's publisher or another person retains intellectual property rights.
secondary storage
Non-volatile and is often referred to as a hard drive.
based on Unix
OS X, Linux, Android, Chrome OS and iOS.
electrostatic discharge (ESD)
Occurs when differently charged objects are brought close together or when the dielectric between them breaks down.
unauthorized information alteration
Occurs with incomplete or incorrect implementation of authentication and authorization.
unordered file
Offers good insertion performance but inefficient retrieval times.
command-line interfaces
Often preferred by advanced computer users, as they often provide a more concise and powerful means to control a program or operating system.
backup repositories
On-line, near-line, or off-line, and on-site or off-site.
TCP
One of the main protocols of the Internet protocol suite, which provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.
plaintext
Original representation of information.
eSATA
Provides a variant of SATA meant for external connectivity with a more robust connector, longer shielded cables, and stricter electrical standards.
online workspace
Provides an environment that supports application delivery, data, management, security, and a consistent user experience across a variety of devices.
operating system
Provides an interface between the user and the system, coordinates hardware components, provides an environment for software applications to function, monitors system health and functionality, and provides a file structure for data management.
Internet protocol suite
Provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received.
word processing software
Provides for input, editing, formatting and output of text, often with some additional features.
server operating system
Provides functionality for other programs or devices, called "clients".
Internet layer
Provides internetworking between independent networks.
ordered file
Provides more efficient retrieval but lower insertion efficiency.
redundancy
Provides multiple identical instances of the same system and switching to one of the remaining instances in case of a failure.
replication
Provides multiple identical instances of the same system or subsystem, directing tasks or requests to all of them in parallel, and choosing the correct result on the basis of a quorum.
application layer
Provides process-to-process data exchange.
Internet service provider
Provides services for accessing, using, or participating in the Internet using wired or wireless connections.
database software
Provides various functions that allow entry, storage and retrieval of large quantities of information and provides ways to manage how that information is organized.
social engineering
Psychological manipulation of people to cause them to perform actions or divulge confidential information.
establish a theory
Question the obvious, consider multiple approaches, divide and conquer.
Wi-Fi 4 (802.11n)
600 Mbps
Wi-Fi 6 (802.11ax)
9,608 Mbps
access point
A device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards.
Wi-Fi
A local area wireless technology that allows an electronic device to participate in computer networking using 2.4 GHz and 5 GHz bands.
computer network
Allows computers to exchange data.
single-tier software
Has all parts of the program designed to run on the local computer.
software architecture
Refers to the fundamental structures of a software system.
CAM
The use of computer software to control machine tools and related machinery in the manufacturing of workpieces.
spreadsheet software
Used for organization, analysis and storage of data entered in cells of a table.
POTS
Voice-grade telephone service employing analog signal transmission over copper loops.
Wi-Fi encryption options
WEP, WPA, and WPA2.
Wi-Fi 1 (802.11b)
11 Mbps
Wi-Fi 2 (802.11a)
54 Mbps
DNS
A hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.
product key
A specific software-based identifier for a computer program.
group use
Allows use by a department or organization at a given geographic location.
silent installation
Performed without any user interface updates.
WPA2
The current Wi-Fi encryption standard.
web browser
Used for accessing information on the World Wide Web.
IPv4
32-bit addresses using dotted-decimal notation
Wi-Fi 3 (802.11g)
54 Mbps
Wi-Fi 5 (802.11ac)
6,933 Mbps
ARP
A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
LAN
A computer network that interconnects computers within a limited geographic area such as a home, school, computer laboratory, or office building.
switch
A device that connects and filters multiple network segments or devices, by forwarding data only to one or multiple devices that need to receive the data based on destination MAC address.
router
A device that forwards data packets between different computer networks based on network address (IP address).
software license
A legal instrument governing the use or redistribution of software.
SMB
A network communication protocol for providing shared access to files, printers, and serial ports between nodes on a network.
single use
Allows use by a single user and/or a single computer.
business software
Any software or set of computer programs used by business users to perform various business functions.
NIC
Hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information.
two-tier software
Has a front-end presentation layer providing the user interface and a back end layer providing the application, business logic, and data access.
attenuation
Limits the range of radio signals and is affected by the materials a signal must travel through.
subscription license
Must be renewed, typically annually.
2.4 GHz ISM band
Susceptible to interference from microwave ovens, cordless telephones, USB 3.0 hubs, and Bluetooth devices.
instant messaging software
Used to facilitate a type of online chat that offers real-time text transmission over the Internet.
collaboration software
Used to help people working on a common task attain their goals.
transport layer
Handles host-to-host communication.
data storage devices
Hard drives, flash drives, optical drives, Network Attached Storage (NAS), media players, and smart phones.
emulator
Hardware or software or both that duplicates the functions of one computer system (the guest) in another computer system (the host), different from the first one, so that the emulated behavior closely resembles the behavior of the real system (the guest).
byte
Has 256 possible values.
malicious browser extension
Has access to everything done by the browser and can do things like inject ads into web pages, or make "background" HTTP requests to third-party servers.
process-based database engine
Has better performance in regard to scalability and speed.
n-tier software
Has layers for different servers to provide separate parts of the overall business logic, such as separate sales and inventory management servers.
file-based database engine
Has limited performance in regard to scalability and speed.
bit
Has two possible values.
switches
Have replaced hubs in local area networks.
document sharing system
Helps multiple people work together at the same time on a single document or file to achieve a single final version.
wireless connections
High mobility, but suffer from increased latency in data transfer and more security risks.
Tables
Hold or access stored data.
INSERT syntax
INSERT INTO <table>(<column(s)>) VALUES(<value(s)>)
static
IP addresses are manually assigned to a computer by an administrator.
dynamic
IP addresses assigned either by the computer interface or host software itself through automatic configuration, or assigned by a server using DHCP.
static addressing
IP addresses assigned to a host permanently by fixed configuration of its hardware or software.
Internet layer protocol
IP.
troubleshooting sequence
Identify the problem, research possible causes, establish a theory, test the theory, establish a plan to implement the solution, implement the solution, test functionality, document the outcome.
personally identifiable information (PII)
Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
less than
<
less than or equal
<=
WHERE syntax
<SQL-DML-Statement> FROM <table> WHERE <predicate>.
logical equal
==
greater than
>
greater than or equal
>=
device driver
Provides a software interface to hardware.
not
!
not equal
!=
S-Video connector
A 4 pin video cable connector.
RJ-11
A 6 position 2, 4 or 6 contact modular connector typically used for phone cable connections
and
&&
PS/2 port
A 6-pin Mini-DIN connector used for connecting some keyboards and mice to a PC compatible computer system.
DVD-R
A DVD that typically has a storage capacity of 4.7 GB and can be written once and read arbitrarily many times.
IPv6
128-bit addresses using colon-hexadecimal notation
double
15 significant digits (eight bytes).
cable Internet
A form of broadband Internet access which uses the same coaxial infrastructure as CATV.
RAM
A form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
file-level encryption
A form of disk encryption where files or directories are encrypted by the file system.
disk-level encryption
A form of disk encryption where the entire partition or disk in which the file system resides is encrypted.
patent
A form of intellectual property that gives its owner the legal right to exclude others from making, using, selling and importing an invention for a limited period of years, in exchange for publishing an enabling public disclosure of the invention.
replay attack
A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.
man page
A form of online software documentation usually found on a Unix or Unix-like operating system.
troubleshooting
A form of problem solving, often applied to repair failed products or processes on a machine or a system.
GUI
A form of user interface that allows users to interact with electronic devices through icons.
programming language
A formal language which comprises a set of instructions that produce various kinds of output.
packet
A formatted unit of data sent through a network to the destination.
BitLocker
A full disk encryption feature included with the Ultimate and Enterprise editions of Windows Vista and later Windows operating systems.
redirection
A function of most command-line interpreters that can send standard streams to user-specified locations.
file transfer
A generic term for the act of transmitting files over a computer network.
VGA
A graphics standard for video display controllers first introduced with the IBM PS/2 line of computers in 1987.
Thunderbolt
A hardware interface that allows for the connection of external peripherals to a computer, combining PCI Express (PCIe) and DisplayPort (DP) into one serial signal alongside a DC connection for electric power, and transmitted over one cable, most often used for video and other high-speed connections on Apple computers.
Cache
A hardware or software component that stores data so that future requests for that data can be served faster.
PCIe
A high-speed serial computer expansion bus standard designed to replace the older PCI, PCI-X, and AGP bus standards.
PCIe
A high-speed serial computer expansion bus standard, designed to replace older bus standards
DDoS
A large-scale attack where the perpetrator uses more than one unique IP address or machines, often from thousands of hosts infected with malware.
FAT32
A legacy industry-standard computer file system with support for an increased number of possible clusters compared to previous versions.
NDA
A legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to.
EULA
A legal contract entered into between a software developer or vendor and the user of the software, often where the software has been purchased by the user from an intermediary such as a retailer.
software license
A legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software.
EULA (End User License Agreement)
A license agreement for proprietary software that provides a contract between the licensor and purchaser, establishing the purchaser's right to use the software.
product activation
A license validation procedure required by some proprietary computer software programs.
flatscreen display / flat panel display
A light, thin display usually based on LCD technologies, and back-lit to make them easier to read in bright environments.
file shortcut
A link in a user interface that allows the user to find a file or resource located in a different directory or folder from the place where the shortcut is located.
AC (Alternating Current)
An electric current which periodically reverses direction, and the form of electrical energy that consumers typically use when they plug devices into a wall socket.
UPS
An electrical apparatus that provides emergency power to a load when the input power source or mains power fails.
DC connector
An electrical connector for supplying power to components inside the computer case.
HDD
An electro-mechanical data storage device that uses magnetic storage to store and retrieve digital data using one or more rigid rapidly rotating platters coated with magnetic material.
repeater or hub
An electronic device that receives a network signal in the form of bits, cleans it of unnecessary noise, and regenerates it.
public key certificate
An electronic document used to prove ownership of a public key based on the owner's identity, and the digital signature of an entity that has verified that identity.
digital certificate
An electronic document used to prove the ownership of a public key.
memory card
An electronic flash memory data storage device used for storing digital information, commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players and video game consoles.
touchscreen display
An electronic visual display that the user can control through simple or multi-touch gestures by touching the screen with a special stylus/pen and-or one or more fingers.
laser printer
An electrostatic digital printing process that passes a laser beam back & forth over an electron-charged, cylindrical drum, to define a differentially-charged image.
certificate authority (CA)
An entity that issues digital certificates.
PATH
An environment variable specifying a set of directories where executable programs are located.
FTPS (File Transfer Protocol over Secure Sockets Layer)
An extension of the File Transfer Protocol (FTP) that uses TCP port 990 and adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.
HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer)
An extension of the Hypertext Transfer Protocol (HTTP) that uses TCP port 443 and adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.
HTTPS
An extension of the Hypertext Transfer Protocol used for secure communication encrypted using Transport Layer Security.
FTPS
An extension to the commonly used File Transfer Protocol that adds support for the Transport Layer Security and the now prohibited Secure Sockets Layer cryptographic protocols.
USB
An industry standard that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices communicating at 12 Mbps, 480 Mbps, or 5 Gbps.
pseudocode
An informal high-level description of the operating principle of a computer program or other algorithm
Unicode
An information technology standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems.
joystick
An input device consisting of a stick that pivots on a base and reports its angle or direction to the device it is controlling.
Kickstart
An installation method used primarily by Red Hat Enterprise Linux to automatically perform unattended operating system installation and configuration.
branch
An instruction in a computer program that can cause a computer to begin executing a different instruction sequence and thus deviate from its default behavior of executing instructions in order.
collaborative workspace
An inter-connected environment in which all the participants in dispersed locations can access and interact with each other just as inside a single entity.
FireWire
An interface standard for a serial bus for high-speed communications and isochronous real-time data transfer developed by Apple and replaced with Thunderbolt.
data-informed decision-making (DIDM)
Based on a sequence of data collection, data analysis, and data reporting.
giga
Billion.
script blocker
Block active web content, which a user can wholly or partially unblock by whitelisting a site or domain from the browser or browser extension's toolbar menu.
default data order
By default, relational database systems may return data rows in any order, or more specifically, without any order.
compiled languages
C++ and Java.
hard disk drive
Data storage device used for storing and retrieving digital information using rapidly rotating platters coated with magnetic material.
solid state drive
Data storage device using integrated circuit assemblies as memory to store data persistently.
64-bit processors
Can address up to 16 EiBs of memory.
clouds
Can be classified as public, private or hybrid.
32-bit processors
Can directly access at most 4 GiB of byte-addressable memory.
Wi-Fi coverage
Can extend from an area as small as a few rooms to as large as many square kilometers.
Wi-Fi best practice
Change the default network SSID and password, and use WPA2 encryption.
client-side scripting
Changes interface behaviors within a specific web page in response to mouse or keyboard actions, or at specified timing events.
UPDATE
Changes the data of one or more records in a table.
serial substitution
Check each component in a system one by one, swapping known good components for each potentially suspect one.
support options
Check manufacturer documentation, search manufacturer websites and technical community groups, perform Internet searches, and contact vendor technical support.
HTTP and FTP
Clear-text protocols, which allow anyone to capture and view the network traffic.
video conferencing software
Collaboration software used to allow two or more locations to communicate by simultaneous two-way video and audio transmissions.
screen sharing software
Collaboration software used to display a personal computer's desktop environment remotely on a separate client device.
instant messaging software
Collaboration software used to share real-time text transmissions over a network or over the Internet.
JOIN
Combines columns from one or more tables in a relational database.
$ or %
Common Unix command prompt ending for a normal user.
#
Common Unix command prompt ending if the user is a superuser (root).
sleep and hibernation
Common operating system power setting modes.
NTFS file system attributes
Compressed, Encrypted, and Indexed.
optical drive
Data storage device using rapidly rotating discs coated with reflective material and read using a laser diode.
on-line backup
Data storage immediately accessible but also vulnerable to being deleted or overwritten.
off-line backup
Data storage that requires direct human action to provide access to the storage media, and therefore less vulnerable to accidental deletion.
redundant resources
Data, network, and power.
volatile memory
Computer memory that requires power to maintain the stored information.
proprietary software
Computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the right to use the software only under certain conditions, and restricted from other uses, such as modification, sharing, studying, redistribution, or reverse engineering.
open-source software
Computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.
hypervisor
Computer software, firmware or hardware that creates and runs virtual machines.
spoofing
Concealing the identity of the sender by impersonating another computing system.
switch
Connects data lines from a single network.
router
Connects two or more data lines from different networks.
RAID 10
Consists of a striped set of mirrored drives.
RAID 5
Consists of block-level striping with distributed parity.
RAID 1
Consists of data mirroring, without parity or striping.
RAID 0
Consists of striping, but no mirroring or parity.
full backup
Contains a complete copy of the source taken at a specific point in time.
kernel
Contains a scheduling program which determines how much time each process spends executing, and in which order execution control should be passed to programs.
link layer
Contains communication methods for data that remains within a single network segment.
public key certificate
Contains the public key of the organization providing the certificate and the digital signature of the certificate authority that validated the certificate's information.
file system
Controls how data is stored and retrieved.
permission
Controls the ability of users to view, change, navigate, and execute system resources.
PSU
Converts general purpose electric current from the mains to direct current for the other components of the computer.
DDL
Create and modify database objects such as tables, indexes, and users.
common operations performed on files or groups of files
Creating, opening (e.g. viewing, playing, editing or printing), renaming, moving or copying, deleting and searching for files, as well as modifying file attributes, properties and file permissions.
backup considerations
Critical data, file backups, database, OS backups, stored location.
DELETE syntax
DELETE FROM <table> [WHERE <condition>]
information
Data in context and with meaning attached.
disaster recovery considerations
Data restoration, prioritization, restoring access
near-line backup
Data storage accessible within seconds or minutes but also vulnerable to being deleted or overwritten.
off-site backup
Data storage at a remote location, providing geographic redundancy.
semantics
Define what sort of operations are possible, on what sort of data these operations can be performed, and how the grammar represents these operations and data.
all-in-one
Desktop computer or workstation which integrates the system's internal components into the same case as the display.
DROP
Destroys an existing database, table, index, or view.
regulations
Determine which frequency ranges can be used for what purpose and by whom.
backup rotation
Determines how and when each piece of removable storage is used for a backup job and how long it is retained once it has backup data stored on it.
cable management
Devices or effort used to support and contain cables during system installation, and makes subsequent maintenance or changes to the cable system easier.
unmodified archive bit
Differential and copy backups.
form
Display and modify data on screen.
report
Display data on paper or in digital documents.
EMI (Electromagnetic Interference)
Disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source.
private browsing modes
Do not necessarily protect users from being tracked by other websites or their Internet service provider (ISP).
FAT file system
Does not include file system permissions, only file attributes.
FAT32
Doesn't support compression, encryption, permissions, or journaling.
ESD control methods
ESD-safe packing material, the use of conductive filaments on garments worn by assembly workers, conducting wrist straps and foot-straps to prevent high voltages from accumulating on workers' bodies, anti-static mats or conductive flooring materials to conduct harmful electric charges away from the work area, and humidity control.
field
Each column in a table represents a set of data values of a particular simple type, one value for each row of the database.
record
Each row in a table represents a set of related data, and every row in the table has the same structure.
230 volts and 50 cycles
Electrical power supply voltage and frequency common in Europe.
120 volts and 60 cycles
Electrical power supply voltage and frequency common in North America.
compromised security risks
Electromagnetic or acoustic emanation and time or temperature analysis.
ciphertext
Encrypted information.
NoSQL database limitations
Enforced consistency across the data.
link-layer protocols
Ethernet, Wi-Fi, and DSL.
interpreter
Executes source code directly, without first converting the entire program into binary code.
VPN
Extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
VPN (Virtual Private Network)
Extends a private network across a public network, such as the Internet, allowing a computer or network-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network.
file transfer protocols
FTP, FTPS, and SFTP.
log
File that records either events that occur in an operating system or other software runs.
network firewall
Filters traffic between two or more networks and run on network hardware.
BIOS
Firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.
clear archive bit
Full and incremental backups.
backup models
Full backup, incremental backup, and differential backup.
backup options
Full, incremental, differential, and copy.
identify the problem
Gather information, duplicate the problem, question users, identify symptoms, determine if anything has changed, approach multiple problems individually.
privacy risks
Gathering of statistics, spreading of spyware, and exploitation of various forms of software faults.
wired connections
Greater throughput/bandwidth, reliability, and availability.
user account types
Guest, standard, power user, and administrator.
web protocols
HTTP and HTTPS.
file transfer protocols
HTTP, HTTPS, FTP, FTPS, and SFTP.
single-platform software
Implemented on a specific operating system and CPU architecture.
cross-platform software
Implemented on multiple computing platforms.
database fundamentals
Include data concepts and use.
cross-platform software development challenges
Include testing, lowest-common-denominator feature options, different user interface conventions, and performance issues.
processing
Includes any computations performed by an information system on the inputs in order to generate the associated outputs.
business-specific application
Includes any software or set of computer programs developed for and customized to a specific business or industry's needs.
wired media
Includes coaxial cable, twisted-pair cable, and optical fiber.
IT concepts and terminology
Includes data representation, data processing, and information value.
infrastructure
Includes devices, components, networking, and Internet services.
file management
Includes directories (folders), file types and extensions, and permissions.
Common IoT devices
Includes home appliances, home automation devices, modern cars, IP cameras, streaming media devices, medical devices.
NoSQL data structure
Includes key-value pairs and document databases.
applications and software
Includes operating systems, applications, and uses.
free and open-source license
Includes permissive licenses and copyleft licenses.
software development
Includes programming languages and program structure.
security
Includes related concepts and best practices, as well as business continuity through fault tolerance and disaster recovery.
computer cleaning
Includes the removal of dust and debris from cooling fans, power supplies, and other hardware components.
database replication
Increase data availability, both to improve performance of simultaneous multiple end-user accesses to a database object, and to provide resiliency in a case of partial failure of a database.
archive bit
Indicates that a file was changed since the last backup.
metadata
Information about the format of a file.
disaster recovery
Involves a set of policies, tools and procedures to enable the continuation of vital technology infrastructure and systems following a natural or human-induced disaster.
cloud computing
Involves groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources.
network hosting
Involves installing the application on a shared network resource.
processing speed
Measured in Hertz, or cycles per second.
throughput
Measured in multiples of bits per second (bps).
physical security
Measures designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm.
PCB
Mechanically supports and electrically connects electrical or electronic components using conductive tracks, pads and other features etched from one or more sheet layers of copper laminated onto and/or between sheet layers of a non-conductive substrate.
standard error streams
Merged and directed to the console instead of the pipeline.
file attributes
Metadata associated with computer files that define file system behavior, with each attribute having one of two states: set and cleared.
Hyper-V
Microsoft's hypervisor, available as a free stand-alone product, and an installable role in Windows Server 2008 and later as well as the x64 edition of Windows 8 Pro.
DLL
Microsoft's implementation of the shared library concept in the Microsoft Windows operating system.
mega
Million.
common computing devices
Mobile phones, tablets, laptops, workstations, servers, and gaming consoles.
ALTER
Modifies an existing database object.
output devices
Monitors, printers, and speakers.
64-bit
Most personal computers manufactured since 2005 use this type of processor.
streaming media
Multimedia that is constantly received by and presented to an end-user while being delivered by a provider.
email protocols
POP3, IMAP, and SMTP.
copyrighted material
Peer-to-peer file sharing may have legal ramifications if this is shared.
scheduled installation
Performed at a specific time or in response to a given condition.
attended installation
Performed by a user manually running the installation program and selecting desired options.
network installation
Performed from a shared network resource.
clean installation
Performed on a system without old versions of the program being present.
headless installation
Performed without a computer monitor connected.
unattended installation
Performed without user interaction.
downtime
Periods when a system is unavailable.
scripting languages
Perl, PowerShell, and Python.
perpetual license
Permanent, but may require annual maintenance for updates.
disaster recovery
Policies and procedures to enable the continuation of vital technology infrastructure and systems following a natural or human-induced disruption.
active cooling
Power-driven, such as with a fan
hibernation
Powering down a computer while retaining its state by saving the contents of random access memory (RAM) to a hard disk or other non-volatile storage.
graphical user interfaces
Preferred by casual computer users.
relational database
Presents data to the user as a collection of related tables with each table consisting of a set of rows and columns.
DLP
Preventing the intentional or unintentional release of secure or private/confidential information to an untrusted environment.
intermittent
Problems which are often the result of components that are thermally sensitive.
reproducible
Problems which can be reliably isolated and resolved.
video card
Processes graphics output from the motherboard and transmits it to the display.
email software
Productivity and collaboration software used to access and manage a user's electronic mail.
personal information manager
Productivity software used as a personal organizer.
database software
Productivity software used to capture and analyze data.
presentation software
Productivity software used to display information in the form of a slide show.
desktop publishing software
Productivity software used to generate layouts and produce typographic quality text and images comparable to traditional typography and printing.
word processing
Productivity software used to perform the composition, editing, formatting, and sometimes printing of any sort of written material.
spreadsheet software
Productivity software used to perform the organization, analysis and storage of data in tabular form.
remote desktop software
Productivity software used to run a personal computer's desktop environment remotely on one system while being displayed on a separate client device.
script
Programs written for a special run-time environment that can interpret (rather than compile) and automate the execution of tasks that could alternatively be executed one-by-one by a human operator.
software license types
Proprietary licenses, and free and open source licenses.
TLS
Protocol used to encrypt email.
HTTPS
Protocol used to encrypt web browser communication.
permissions
Provide access rights to specific users and groups of users.
property
Provides a callable interface to access an attribute.
common file system permissions
Read, Write, and Execute.
accounting software
Records and processes accounting transactions within functional modules such as accounts payable, accounts receivable, journal, general ledger, payroll, and trial balance.
Linux distributions
Red Hat, Debian, Ubuntu, Linux Mint, and Google's Android.
accessibility
Refers to the design of products, devices, services, or environments for people with disabilities.
power management
Refers to the mechanism for controlling the power use of personal computer hardware.
booting (bootstrapping)
Refers to the process of loading the basic software into the memory of a computer after power-on or general reset, especially the operating system which will then take care of loading other software as needed.
DELETE
Removes one or more records from a table.
system cooling
Removes the waste heat produced by computer components using active or passive cooling methods.
REVOKE
Removes user accessibility to a database object.
digital products
Represented and stored using the binary number system of ones (1) and zeros (0).
systems, monitors, scanners, batteries, ink and toner cartridges
Require using a qualified recycler for proper disposal to keep hazardous materials from contaminating the environment.
licensing
Required by virtual machines running proprietary operating systems, regardless of the host machine's operating system.
computer cooling
Required to remove the waste heat produced by computer components.
principle of least privilege
Requires that every module must be able to access only the information and resources that are necessary for its legitimate purpose.
multiprogramming kernel
Responsible for managing all system memory which is currently in use by programs.
bare-metal hypervisor
Runs directly on computer hardware to control the hardware and to manage guest operating systems.
hosted hypervisor
Runs on a conventional operating system (OS) just as other computer programs do.
host-based firewall
Runs on individual computers and controls network traffic in and out of those machines.
file server
Runs one or more programs which share file resources with clients.
ORDER BY syntax
SELECT <column(s)> FROM <table(s)> ORDER BY <column> [DESC] [NULLS FIRST], ....
SELECT syntax
SELECT <column> [AS <alias>, ...] FROM <table> [AS <alias>, ...].
network monitoring protocol
SNMP.
dumpster diving
Salvaging items discarded by their owners, but deemed useful to the picker.
differential backup
Saves only the data that has changed since the last full backup.
query
Select and modify data.
bisection
Separate a larger system into two or more subsystems to isolate and identify problems and causes.
three-tier software
Separates the presentation layer, business logic, and data access.
DHCP server
Service provided by a router to support dynamic IP address assignment.
single
Seven significant digits (four bytes).
NoSQL database benefits
Simplicity and scalability.
storage
Slower persistent data technologies which retain data when power is off.
802.3
The IEEE standard that defines Ethernet networks.
802.11
The IEEE standard that defines wireless local area network technology.
shell scripts
The Unix-like term for command interpreter scripts.
batch files
The Windows term for command interpreter scripts.
cross-browser compatibility
The ability of a website or web application to function across different browsers and degrade gracefully when browser features are absent or lacking.
resiliency
The ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.
QoS (Quality of Service)
The ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow.
computer accessibility
The accessibility of a computer system to all people, regardless of disability or severity of impairment, implemented using assistive technology.
impersonation
The act of assuming the identity of another, in order to commit fraud, such as accessing confidential information, or to gain property not belonging to them.
multi-boot
The act of installing multiple operating systems on a computer, and being able to choose which one to boot when starting the computer.
Installation
The act of making a program ready for execution.
installation
The act of making the program ready for execution.
authentication
The act of proving an assertion, such verifying the identity of a computer system user.
eavesdropping
The act of secretly or stealthily listening to the private conversation or communications of others without their consent.
Terminal
The application used to implement a Bash shell interface in OS X and Linux.
topology
The arrangement of the various elements (links, nodes, etc.) of a computer network.
phishing
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
import
The automated or semi-automated input of data sets between different software applications.
export
The automated or semi-automated output of data sets between different software applications.
bit
The basic unit of information in computing and digital communications which can have only one of two values, most commonly represented as either a 0 or 1.
bandwidth
The bit-rate of available or consumed information capacity expressed typically in metric multiples of bits per second.
SOHO
The category of business or cottage industry that typically involves from 1 to 10 workers.
SOHO (Small Office / Home Office)
The category of business or cottage industry that typically involves from 1 to 10 workers.
domain
The centralized authentication approach used in larger networks, where all user accounts, computers, printers and other security principals, are registered with a central directory service.
/
The character sequence used by Unix-like operating systems to separate folders and filenames in a path.
\
The character sequence used by Windows to separate folders and filenames in a path.
UTF-8
The dominant encoding used on the World Wide Web and uses one byte for the first 128 code points, and up to 4 bytes for other characters.
redundancy
The duplication of critical components or functions of a system with the intention of increasing reliability of the system.
wireless communication
The electromagnetic transfer of information between two or more points that are not connected by an electrical conductor.
CPU
The electronic circuitry within a computer that executes instructions that make up a computer program.
computing platform
The environment in which a piece of software is executed.
copyright
The exclusive right given to the creator of a creative work to reproduce the work, usually for a limited time.
.sh
The file extension for OS X and Linux command scripts.
.bat or .cmd
The file extension for Windows command scripts.
.lnk
The file extension used for Microsoft Windows file shortcuts.
ASCII characters
The first 128 Unicode code points.
#!/bin/sh
The first line of a Bash shell script.
CRUD
The four basic functions of persistent storage.
authorization
The function of specifying access rights to resources.
authorization
The function of specifying access rights/privileges to resources, which is related to information security and computer security in general and to access control in particular.
syntax
The grammar or rules that define how commands are written.
syntax
The grammar that all commands must follow.
process
The instance of a computer program that is being executed.
MAC
The layer that controls the hardware responsible for interaction with the wired, optical or wireless network transmission medium.
password complexity
The length and character set combinations used to create a password, such as upper case and lower case letters, numbers, and punctuation.
web browsing history
The list of web pages a user has visited recently, as well as associated data such as page title and time of visit, which is recorded by web browser software as standard for a certain period of time.
power outage
The loss of the electrical power network supply to an end user.
motherboard
The main printed circuit board (PCB) found in general purpose computers and other expandable systems.
data integrity
The maintenance of, and the assurance of the accuracy and consistency of data over its entire life-cycle.
wiretapping
The monitoring of telephone and Internet-based conversations by a third party, often by covert means.
GNU GPL (GNU General Public License)
The most widely used free software license, which guarantees end users (individuals, organizations, companies) the freedoms to use, study, share (copy), and modify the software.
alias
The name given to file links in OS X.
symbolic link
The name given to file links in Unix and Linux operating systems.
shortcut
The name given to file links in the Windows operating system.
Files
The official file manager for the GNOME desktop.
peta
Thousand trillion.
kilo
Thousand.
backup limitations
Time, performance impact, network bandwidth, and cost.
erase
To eliminate sensitive information on hard drives prior to disposal.
auditing
Tracking of requests for access to resources.
compiler
Transforms source code written in a programming language into binary code to create an executable program.
tera
Trillion.
Boolean
Truth values.
wired connection options
Twisted-pair phone lines, coaxial cable, and optical fiber cable.
impersonation
When someone imitates or copies the behavior or actions of another, often as part of a criminal act such as identity theft.
wireless Internet access options
Wi-Fi, cellular, and satellite connections.
wireless connection options
Wi-Fi, cellular, and satellite.
DESC
Will sort a given column in descending order.
computer operating systems
Windows, OS X, Linux, and Chrome OS.
WEP, WPA, and WPA2
Wireless network security protocols used to encrypt wireless traffic.
non-repudiation methods
video, biometrics, digital signature, receipt.
integer
whole numbers.
or
||