Vocabulary Comptia A+ 220-1101 & 220-1102
OLED (organic LED)
A display screen technology used in many monitors, TVs, and mobile devices today. It does not require a backlight like LCDs but has a film of organic compounds placed in rows and columns that can emit light. It is lightweight and has a fast response time, low power usage, and a wide viewing angle.
SDS (safety data sheet)
A document that describes a product, including its toxicity, storage, and disposal procedures, as well as information regarding health or safety concerns.
rollback plan
A documented business process that outlines what to do when an IT change isn't going as planned.
SOP (standard operating procedure)
A documented set of instructions on how to do a specific task.
rogue antivirus
A downloaded application that appears to help someone with a problem but that is, in reality, a virus.
compatibility
A feature of hardware or software that allows functionality on multiple models.
screen lock
A feature on a mobile device that requires a PIN, fingerprint, facial features, security pattern, voice, or something else to unlock the screen of the device so the device can be used.
multisocket
A feature on a motherboard that allows more than one processor to be installed.
Type A-B-C fire extinguisher
A fire extinguisher that can be used on either Type A, Type B, or Type C fires.
backlight
A fluorescent lamp or LEDs that are always on for an LCD.
subfolder
A folder contained within another folder that might also be called a subdirectory.
network share
A folder or network device that has been shared and is accessible from a remote computer.
share
A folder that has been set so that others can use it. This can be on a computer, printer, or network resource such as a scanner.
Advanced Technology eXtended (ATX)
A form factor for motherboards, cases, and power supplies.
15,000 RPM
A hard drive speed. The faster the drive RPM, the faster the transfer rate.
5,400 RPM
A hard drive speed. The faster the drive RPM, the faster the transfer rate.
docking station
A hardware device that has connections for a monitor, printer, keyboard, and mouse that allows a laptop computer to be more like a desktop system. Sometimes called a mobile docking station or a laptop docking station.
HPA (Host Protected Area)
A hidden part of the hard drive that is used to reinstall the operating system. It sometimes contains applications installed when the computer was sold. Using an HPA reduces the amount of hard drive space available to the operating system.
DVI port
A port on a video adapter that connects a flat panel monitor to a computer.
single-core processor
A processor that has only one core CPU.
RAID (redundant array of independent [or inexpensive] disks)
A redundancy method that writes to multiple hard drives for larger storage areas, better performance, and fault tolerance.
path
A reference that tells where a file is located among drives and folders (directories).
A/V (audio/video)
A reference to sound and visual data, such as movies or stills.
VPN (virtual private network)
A remote computer connection to a remote network that involves "tunneling" over an intermediate network, such as the internet or a LAN.
reboot
A restart of an operating system, also known as a warm start.
security threat
A risk to a business, such as an operating system that is no longer supported by a vendor and that becomes a risk to the business due to lack of security updates.
system image
A saved copy of the operating system and all user files that can be used to restore a damaged or corrupted computer.
hard drive
A sealed data storage medium on which information is stored. Also called a hard disk.
certificate of destruction
A security measure that provides proof that printed material or stored data has been destroyed.
user authentication/strong passwords
A security method used to ensure that a person accessing a device, network, or resource is allowed to do so.
open-ended question
A soft skills technique that results in more information about a problem than questions that have just yes or no answers.
software firewall
A software application or tool provided with a computer or device like an access point that can be configured to permit or block specific types of traffic.
PRL update
A software configuration changed pushed out to a smartphone by a service provider.
SODIMM (small outline DIMM)
A special small DIMM used in laptops and printers.
antistatic wrist strap
A strap that connects a technician to a computer that equalizes the voltage potential between the two to prevent electrostatic discharge (ESD).
DIMM (dual inline memory module)
A style of 168-pin, 184-pin, 240-pin, or 288-pin memory chip normally used for RAM on Pentium and higher motherboards.
thermal paste
A substance applied between a processor and its heat sink to provide a thermal pad that disperses heat more evenly.
filament
A supply that a 3-D printer needs for printing instead of using ink or toner.
PoE switch
A switch that has the ability to provide power to devices such as access points or IP phones through the Power over Ethernet standard.
cable management system
A system that helps keep network cables neat and organized. A ladder rack is a type of cable management system.
clean the printhead
A task done through the printer software or manually by using a clean lint-free cloth to softly wipe the print head.
clarify customer statement
A technique in which a technician asks open-ended questions that provide more information than questions that result in just yes or no answers.
drive wipe
A technique that can be used to eradicate personal or corporate data from a hard drive before donating or reusing a computer.
ECC (error correcting code)
A technique that uses a mathematical algorithm to verify data accuracy. ECC is more expensive than parity, and the motherboard or memory controllers must also have additional circuitry to process ECC.
social engineering
A technique used to trick people into divulging information, including their own personal information or corporate knowledge.
TN (twisted nematic)
A technology used with LCDs.
omnidirectional antenna
A type of antenna that has a radiation pattern in all directions.
serial cable
A type of cable that connects to an RS-232 or DB9 port.
copper cabling
A type of cabling used to bring video channels into and throughout a home; with home and business wired networks, it uses electrical pulses to represent data (in contrast to the light pulses used in fiber-optic cabling).
DaaS (data as a service)
A type of cloud service that provides data to a company.
RCA
A type of connector used with coaxial cable.
SAS (Serial Attached SCSI)
A type of device that connects in a point-to-point bus. Used in an enterprise environment where high reliability and high mean time between failures are important.
TOSLINK
A type of fiber S/PDIF connection.
memory address
A unique address for memory chips.
toner vacuum
A vacuum that can be safely used inside a laser printer.
environment variable
A variable that describes the environment in which a program runs. It contains a name and a value, where the value is the path to the program identified by the variable name.
PATH variable
A variable that is used in programming and scripting to tell a program where to find the files that it may need.
ISP (internet service provider)
A vendor that provides a connection to the internet.
WISP (wireless internet service provider)
A vendor that provides internet access.
CIFS (Common Internet File System)
A version of Server Message Block (SMB) that can provide access to shared network devices, files, and printers, especially in a mixed environment of Mac and Windows computers. SMB/CIFS uses port 445.
LTE (Long Term Evolution)
A version of the 4G cellular network generation that optimized the network for video streaming and online games.
LCD (liquid crystal display)
A video technology used with laptops and flat screen monitors. The two basic types of LCD are passive matrix and active matrix.
RAM (random-access memory)
A volatile type of memory that loses its data when power to the computer is shut off.
+12V
A voltage level from the power supply that is used for drive motors, CPU, internal cooling fans, and the graphics card.
secure connection
A website connection that uses HTTPS and security certificates through a browser.
802.11ax (WiFi 6)
A wireless standard that uses the 2.4, 5, and 6 GHz ranges, improves wireless connectivity and throughput, and is backward compatible with older 2.4 and 5 GHz devices.
802.11ad
A wireless standard that works in the 60 GHz range and is also known as WiGig.
Z-Wave
A wireless standard used in smart homes that allows a wireless mesh topology where devices can talk to another device until the controller is reached.
Bluetooth
A wireless technology for personal area networks (PANs).
MU-MIMO (multi-user multiple input/multiple output)
A wireless technology used with 802.11ac that allows up to eight simultaneous streams from multiple devices.
smart watch
A wristwatch that is capable of functions such as syncing with a smartphone, downloading apps, and using GPS.
apply update
After an operating system installation, do not forget to download and install the operating system and application updates as well as check for newer device drivers.
ventilation
Airflow, which is crucial for computers. Never block air vents, especially on a laptop.
RAID 1
Also called disk mirroring or disk duplexing, a type of RAID that protects against hard drive failure. See also disk mirroring. It requires two drives at a minimum.
TCP printing
Also known as TCP/IP printing, the ability to connect to and print to a printer that has been assigned an IP address.
802.11g
An IEEE wireless standard that was an upgrade to 802.11b and was backward compatible with it; used the 2.4 GHz range and had speeds up to 54 Mb/s.
gateway
An IP address assigned to a network device that tells the device where to send a packet that is going to a remote network. Also known as a default gateway or a gateway of last resort.
DHCP reservation
An IP address set aside for a specific network device like a router, switch, or printer that needs an IP address that does not change.
Gb
An abbreviation for gigabit.
overheating
An issue with a device getting too hot. For a mobile device, power off the device and let it cool. See if you can determine if a specific spot is getting hotter than other places. Check the battery and replace it, if necessary.
ESD strap
An item that fits around a technician's wrist and connects to an electronic component so that the technician and the component are at the same voltage potential, thus preventing an electrostatic discharge event, which can cause damage to electronic components.
PCI (Peripheral Component Interconnect)
An older 32-bit and 64-bit, 66 MHz local bus standard used in computers.
OS X
An older Apple operating system family that has been replaced by macOS.
Internet Explorer
An older Microsoft browser that is being replaced by Edge.
Microsoft Windows
An operating system used on PCs, tablets, and laptops.
IDE cable
Another name for a PATA cable, an older 40-pin parallel cable that could have two devices attached to the same cable that connects to the motherboard.
thick client
Another name for a computer that contains storage and some applications are installed locally.
back up data
Before making changes to a system, back up the data.
time management
Budgeting and then actually spending time well on doing tasks throughout the workday.
PHI (protected health information)
Certain types of private health-related information that are protected by the Health Insurance Portability and Accountability Act (HIPAA).
interpreted program
Code that is carried out one line at a time.
PS/2 port
Common name for a keyboard and mouse connector, which is an example of a miniDIN-6 connector.
internet calling
Communicating using the internet and an app such as Skype, Google Hangouts, or WhatsApp.
compression
Compaction of a file or folder to take up less disk drive space.
procurement life cycle
Company processes that are performed in order to obtain equipment or applications.
temperature
Computers should operate at temperatures between 60 and 75 degrees.
IoT (Internet of Things)
Connected technology including sensors and smart devices that provides data, information, warnings, and control of things like lights, cameras, appliances, thermostats, and locks.
authorization
Controls what network resources—such as files, folders, printers, video conferencing equipment, fax machines, scanners, and so on—can be accessed and used by a legitimate network user or device.
HTTPS (HTTP over SSL)
HTTP communication encrypted through an SSL session. With HTTPS, web pages are encrypted and decrypted.
NAS (network-attached storage)
Hardware that contains multiple drives that can be accessed by networked computers and devices.
sandbox testing
Implementing a proposed change in a non-production environment.
assigning/changing drive letter
In Disk Management, right-click on a drive volume > Change Drive Letter and Paths.
dd
In Linux, an advanced command-line interface command that copies and converts files.
ifconfig
In Linux/Unix environments, a command that shows network interface information for Ethernet ports.
iwconfig
In Linux/Unix systems, a command that shows network interface information for wireless adapters.
root
In Unix/Linux, the administrator account. The root user has absolute power on a system, including within macOS.
BSOD (blue screen of death)
In Windows, an error in which the monitor screen displays all blue, and the computer locks or is nonfunctional.
comment
In a script, an explanation of what some part of the code does that is ignored by the computer when running the script.
byte
8 bits grouped together as a basic unit.
secure boot
A BIOS/UEFI setting option that prevents unauthorized software from loading during the boot process.
Passwords [BIOS]
A BIOS/UEFI setting that provides protection of the BIOS menu option by storing one or more passwords to access the Setup program.
cp
A Linux command for copying a file. Short for copy.
chown
A Linux command that changes ownership.
sudo
A Linux command that gives a user temporary root privileges.
chmod
A Linux command that gives the file owner read, write, and execute permissions.
ls
A Linux command that lists the contents of the current directory.
mv
A Linux command that moves a file.
su
A Linux command that switches from one user account to another.
touch
A Linux command used to create a file.
Network
A Windows File Explorer link found in the left panel that allows access to other network devices.
Safe boot
A Windows System Configuration option available on the Boot tab.
spanned volume
A Windows term that describes hard drive space created from multiple hard drives.
format
A command that prepares a disk for use.
robocopy
A command used to copy files. It has more parameters than COPY or XCOPY.
taskkill
A command used to halt a process or task.
help
A command used to list all of the available commands.
gpupdate
A command used to refresh local and Active Directory-based Group Policy settings.
regsvr32.exe
A command used to register .dll files in the Windows registry.
sfc
A command used to start the System File Checker utility, which verifies operating system files.
antenna
A component that attaches to a wireless device or is integrated into it. An antenna radiates or receives radio waves.
S-video port
A composite video port, coded yellow, that uses a 7-pin mini-DIN connector.
memory card reader
A device that accepts varied types of memory cards so that data can be copied or read.
flashing screen
A display issue that could be caused by cabling not being inserted fully or having bent/broken pins.
system attempts to boot to an incorrect device
In this situation, change the boot order in BIOS/UEFI.
electrical fire safety
Knowledge of how to extinguish an electrical fire using a Type A-B-C or Type C fire extinguisher.
proprietary vendor-specific ports
Ports primarily for power connections or used as communication options.
pickup rollers
Printer feed rollers.
roll back the device driver
Use Device Manager and right-click on a particular piece of hardware > Properties > Driver tab > Roll Back Driver button to take a device driver back to a previous version.
default printer
When a computer can use multiple printers, the one printer that all applications use by default. A computer user can change the printer to a different one through the Print dialog window. To mark a printer as default, right-click the printer icon and click the Set as Default option.
trackpad
A part of a laptop or keyboard that allows cursor control.
browser extension
Downloadable code that provides an enhanced browser feature or functionality.
Keychain Access
A macOS utility for managing saved passwords securely.
nano
An easy-to-use Linux text editor.
EMI (electromagnetic interference)
Electronic noise generated by electrical devices.
feeder
On a printer, a device that rolls the paper through the paper tray.
Administrator Password
A BIOS/UEFI Setup option used to prevent access and changes made to BIOS.
A record
A DNS address record, which holds the IPv4 address of a particular web address.
AAAA record
A DNS record that holds the IPv6 address of a particular website.
ActiveSync
A Microsoft product that allows data including contacts, email, and calendar synchronization between a mobile device and a Windows desktop computer.
Advanced Boot Options
A Windows boot menu used to access tools used for troubleshooting. Press when the computer is booting (and before Windows loads) to access the Advanced Boot Options menu.
APIPA (automatic private IP addressing)
A Windows option that enables a computer to automatically receive an IP address from the range 169.254.0.1 to 169.254.255.254.
alphanumeric character
A character that can be a letter of the alphabet (uppercase or lowercase), a digit from 0 through 9, or a punctuation mark or symbol, such as @, #, or !.
3.3V
A common desktop power supply output voltage.
AMD (Advanced Micro Devices)
A company that makes processors, graphics processors, and chipsets. AMD is the largest rival of Intel for PC processors.
access point (AP)
A component of a wireless network that accepts associations from wireless network cards.
20-pin to24-pin motherboard adapter
A device that connects an older power supply to an ATX motherboard.
ADF (automatic document feeder)
A feature on a printer or multifunction device that allows paper to be fed into the device to be copied, scanned, or faxed, depending on the model and task.
APK
A file format that can be used to distribute and install Android apps.
2.4 GHz
A frequency commonly used for 802.11 wireless networks.
10,000 RPM
A hard drive speed. The faster the drive RPM, the faster the transfer rate.
7,200 RPM
A hard drive speed. The faster the drive RPM, the faster the transfer rate.
access control list (ACL)
A list of the permissions for a specific object (such as a file or directory), such as what is allowed to be done to the object by particular users or operating system processes. An ACL provides a security filter where traffic is allowed or denied based on configured parameters.
antistatic bag
A plastic enclosure that protects electronic gear from being affected by static charges if the equipment is left exposed.
acceptable use policy (AUP)
A policy that defines rules regarding using a company network, data, and a specific application.
4-pin 12V,
A power supply connector that is sometimes labeled AUX or 12V and used to provide extra power to the processor.
6-pin PCIe
A power supply connector used to provide power to a video adapter.
8-pin PCIe
A power supply connector used to provide power to a video adapter.
application log
A record of an application's crashes and failures to operating properly. In Windows, use Event Viewer to see such information.
administrative privileges
A security function in Windows that requires elevated security rights in order to execute specific commands. Use the Run as administrator option if blocked.
Active Directory (AD)
A service used on Microsoft Windows Server to manage network accounts and devices.
AFP (Apple Filing Protocol)
A set of rules for file services on an Apple device that uses macOS. AFP uses port 548.
administrative share
A share created by Microsoft for drive volumes and the folder that contains the majority of Windows files. An administrative share has a dollar sign at the end of its name.
App Store
A site or app where Apple users shop for various applications to download on a device.
application crash
A situation in which a specific program quits working. In the Windows environment, use Task Manager to quit a crashed application.
AES (Advanced Encryption Standard)
A specification for encryption used in wireless networks that uses 128-bit, 192-bit, and 256-bit encryption keys.
1.8-inch drive
A storage device form factor.
2.5-inch drive
A storage device form factor.
3.5-inch drive
A storage device form factor.
activation clock
A timer for the Windows operating system. When creating an image, a technician must reset or re-arm the activation clock if a single activation key is used. This gives a 30-day (Windows 7) or 90-day (Windows 8/10) grace period before the product key must be re-entered.
Activity Monitor
A troubleshooting tool in a macOS system that sees what processes and services are running, as well as what system resources are used.
3-2-1 backup
A type of backup that involves creating three copies of the data (one primary and two copies) using two different types of media and keeping at least one copy off site.
ADSL (Asymmetrical DSL)
A type of digital subscriber line (DSL) that provides speeds up to 150 Mb/s; it provides faster downloads than uploads.
3-D printer
A type of printer used to create 3-D solid objects out of various materials, including plastic, metal, clay, and ceramics.
analog signal
A type of signal used mainly by older video ports, modems, and sound devices; its signal strength varies in amplitude.
ad hoc mode
A type of wireless configuration in which two 802.11 wireless devices can make a wireless network without the use of an access point.
+5V
A voltage level from the power supply that is used for electronics, the motherboard, adapters, ports, and peripherals.
802.11e
A wireless quality of service standard.
802.11i
A wireless security standard.
568A/B
An ANSI/TIA/EIA Ethernet network cabling standard.
AirPrint
An Apple print server.
active listening
An effective communication technique that ensures what the speaker says is accurately received.
adapter
An electronic circuit card that can be inserted into an expansion slot. Also called a controller, card, controller card, circuit card, circuit board, or adapter board.
AGP (accelerated graphics port)
An extension of the PCI bus (a port) that provides a dedicated communication path between the expansion slot and the processor. AGP is used for video adapters.
AND operator
An operator used with two or more conditions that returns true only if all expressions are true.
account recovery option
An option used when a Microsoft account or password has been forgotten.
Apply button
An option within the Windows OS that makes any changes take effect immediately.
ACL
See access control list.
AP (access point)
See access point and wireless access point.
account settings
Settings required when putting a thick client or thin client onto a network.
amp
Short for ampere, a measurement of electrical current.
ad blocker
Software that is made specifically to not show advertisements that appear in certain websites.
antivirus
Software that protects the operating system and applications from malware.
anti-malware
Software used to protect the operating system and applications.
ACPI (Advanced Configuration and Power Interface)
Technology that allows the motherboard and operating system to control the power needs and operation modes of various devices.
application spoofing
The act of masquerading a mobile app as being from a trusted source.
802.11b
The first IEEE wireless standard to hit the market; used the 2.4 GHz range and supported speeds up to 11 Mb/s.
4G
The fourth generation of cellular technology, which supports IP telephony, gaming services, mobile TV, and video conferencing at speeds up to 1 Gb/s.
24-pin motherboard connector
The main ATX motherboard power connector.
app fails to close
The process to go through on a mobile device to manually stop an app. May require rebooting the device.
2G/3G/4G/5G
Types of cellular networks shown by generation, with 5G being the latest generation type.
Airplane Mode
A mode on smartphones and tablets that enables users to disable all wireless communication but still view a movie or play a game that does not require internet connectivity.
cable modem
A modem that connects to the cable TV network.
fTPM (firmware trusted platform module)
A module used to store security data such as passwords, digital certificates, and encryption keys using protected space and the CPU instead of a separate TPM chip.
TPM (Trusted Platform Module)
A motherboard chip used for hardware and software authentication. TPM increases security by generating and storing cryptographic keys, passwords, and other authentication information, as well as digital certificates. TPM can authenticate hardware devices. Applications can use TPM for file and folder encryption, local passwords, email, VPN/PKI authentication, and wireless authentication.
SATA connector
A motherboard connector used to attach a cable between the motherboard and a SATA device. This connector can also be used to connect an adapter that contains one or more additional external SATA ports.
mini-DIN
A motherboard connector, sometimes called a PS/2 connector, that connects keyboards and mice.
ITX (Information Technology eXtended)
A motherboard form factor size that is smaller than ATX which is the most common form factor. Comes in mini-ITX, nano-ITX, and pico-ITX sizes.
Balanced Technology eXtended (BTX)
A motherboard form factor that is larger than ATX.
expansion slot
A motherboard socket to which adapters are connected.
mobile device motherboard
A motherboard that tends to be proprietary and must be replaced with one from the same manufacturer.
server motherboard
A motherboard that tends to be proprietary and that cannot be replaced with a desktop motherboard.
DNS (Domain Name System)
A naming system that translates internet names into IP addresses. DNS uses port 53.
DMZ (demilitarized zone)
A network area that is separate from the corporate network but contains servers that are accessible to outside devices. Also known as a screened subnet.
straight-through cable
A network cable that uses twisted pair copper wires and RJ45 connectors at each end. The cable uses the same pinout at each end and is also known as a patch cable.
speed (NIC property)
A network card configuration property that is normally configured automatically, but manual options include 10 Gb/s, 1 Gb/s, 100 Mb/s, and 10 Mb/s.
repeater
A network device that boosts the network signal. Network switches are repeaters. Wireless repeaters boost the wireless signal to extend the wireless network.
router
A network device that determines the best path for sending a packet. A router works at Layer 3 of the OSI model.
home folder
A network folder that allows users to store their files and have access to them from any device that they log onto within the same domain.
dial-up network
A network formed by using a modem that connects to the traditional phone network. The modem connects to a remote network device.
virtual NIC
A network interface card used in a virtual environment. Each virtual NIC has its own MAC address and can have an IP address assigned.
PAN (personal area network)
A network of personal devices such as cell phones, laptop computers, and other mobile devices that can communicate in close proximity through a wired network or wirelessly. A Bluetooth wireless keyboard and mouse form a PAN.
DNS server
A network server that is used to translate internet names into IP addresses.
Ethernet
A network system that carries computer data along with audio and video information. Ethernet adapters are the most common network cards.
ping
A network troubleshooting command used to test TCP/IP communications and determine whether a network path is available, whether any delays exist along the path, and whether a remote network device is reachable.
LDAP (Lightweight Directory Access Protocol)
A networking protocol that is used to access, maintain, and distribute directory and database-type information. LDAP uses port 389.
Telnet
A nonsecure application protocol that allows connection to a remote network device. Telnet uses port 23. Commonly replaced by the more secure SSH.
subnet mask
A number a computer uses to determine which part of an IP address represents the network and which portion represents the host.
floating-point number
A number that can be written in the form x÷y, which means it includes a decimal value, even if that value is 0. For example, the number 7 is an integer, but the number 7.0 is a floating-point number.
ESD mat
A pad that is placed on a surface to prevent electrostatic discharge events. Such a mat commonly has a place to attach an antistatic wrist strap.
streak
A paper issue in a printer caused by the drum, toner cartridge, dirty or damaged fusing assembly, or the paper.
thermal pad
A part applied between a processor and a heat sink to provide consistent heat dispersion.
transfer belt
A part located at the bottom of a laser printer used to move paper through the printer.
System Configuration utility
A Windows utility that allows boot files and settings to be enabled/disabled for troubleshooting purposes. The command that brings up this utility is msconfig.exe.
regedit.exe
A Windows utility that can modify and back up the registry.
Disk Cleanup
A Windows utility that helps free up hard drive space by emptying the Recycle Bin, removing temporary files, removing temporary internet files, removing offline files, and so on.
batch file
A Windows-based script that can only be interpreted by the Windows operating system. A batch file has the extension .bat.
Task Scheduler
A Windows-based utility that allows applications or tasks to be executed periodically or at a specific date and time. This can include a systemwide message.
Task Manager
A Windows-based utility that displays memory and processor usage data and also displays currently loaded applications as well as currently running processes.
grandfather-father-son backup
A backup method in which a full backup (grandfather) is done relatively infrequently, such as once a month. Then another full backup (father) is done once a week followed by incremental backups (son) daily.
incremental backup
A backup method in which only files that have changed since the last backup are backed up. This type of backup is therefore faster than a full backup.
synthetic backup
A backup method that uses a full backup and incremental backups.
differential backup
A backup that backs up files that have changed since the last full backup (files that have the archive bit set to on) but in which the backup software does not reset the archive bit, as an incremental backup does.
separation pad
A bar or pad in a laser printer that can have a rubber or cork surface that rubs against the paper as it is picked up.
string
A basic data type that is simply a string of characters.
server-based network
A basic type of LAN in which users log in to a controlling computer, called a server, that knows who is authorized to connect to the LAN and what resources the user is authorized to access. This type of network is usually used in businesses that have 10 or more computers.
disable AutoRun
A best practice for security is to disable this option, which dictates whether software or programs start automatically from discs, USB, or other drives.
disable AutoPlay
A best practice for security is to disable this option, which is used to control what happens when you insert media.
disable Windows application
A best practice is to use the System Configuration utility Startup tab to disable applications that start automatically.
log off when not in use
A best practice when not using a computer, which involves configuring a screen saver to appear or locking the computer after a period of non-use.
palmprint scanner
A biometric security device that is more secure than a fingerprint reader and scans the hand and possibly provides vein analysis.
fingerprint scanner
A biometric security device that requires a finger to be placed on a reader and compared against a stored image.
retinal scanner
A biometric security device that scans the eye for authentication and access.
Boot Camp
A boot loading utility designed to assist with partitioning, installation, and support in running Windows on a Mac.
optical disc (boot option)
A boot method that uses a CD, DVD, or Blu-ray disc that has an operating system on it.
tailgating
A breach of physical security that occurs when an unauthorized person enters a secure space behind an authorized person. Training and diligence by all employees are the only ways to stop tailgating. Also known as piggybacking.
dictionary [attack]
A brute-force security attack that tries to determine a password by using words in a dictionary in order to gain access to data.
swollen battery
A bulging battery, which requires immediate replacement as it may not hold a charge and could soon leak.
capacitor swelling
A bulging end or top of a capacitor that indicates it is time to change it or the component of which it is a part, including the motherboard.
Time Machine
A bundled application in macOS that performs full and incremental system backups to an external hard drive. It gets its clever naming from the capability to navigate past backups as if traveling backward through time.
double image
A burn-in; an image seen on a display screen when an LCD or a plasma display has been left on too long.
USB (Universal Serial Bus)
A bus that allows 127 devices to be connected to a single computer port.
third-party vendor [security]
A business commonly used for security measures such as shredding corporate documents or destroying data on storage devices.
Start button
A button, located in the lower-left corner of the Windows desktop, that is used to access and launch applications, files, utilities, and help, as well as to add/remove hardware and software.
eSATA cable
A cable that attaches to an eSATA port located on the outside of a device such as on a motherboard or card. The maximum length of such a cable is 6 feet (2 meters).
SATA cable
A cable used to connect a SATA device to a motherboard SATA port.
compressed air
A can of air whose top can be pressed to direct high-powered air to remove dust from hard-to-reach places such as under keys, under motherboards, and inside power supplies and devices.
This PC
A category shown in Microsoft Windows that contains local drives and quick access to the desktop, documents, music, and downloads.
processor
A central 32-bit or 64-bit electronic chip that determines the processing power of a computer. Also known as a microprocessor or central processing unit (CPU).
registry
A central Windows database file that holds hardware and software configuration information.
pipe symbol
A character (|) used at the command prompt that allows control of where or how the output of the command is processed.
BIOS (basic input/output system)
A chip that contains computer software that locates the operating system, POST, and important hardware configuration parameters. Also called ROM BIOS, Flash BIOS, or system BIOS. Replaced with UEFI BIOS.
metered service
A cloud computing service for which a company pays an amount based on how much of the service is used on an hourly or monthly basis.
knowledge base
A collection of documents used to answer commonly asked IT questions or describe IT procedures.
maintenance kit
A collection of items commonly used for technical support that includes a portable vacuum, toner vacuum, compressed air, swabs, monitor wipes, lint-free cloths, general-purpose cloths, general-purpose cleanser, denatured alcohol, antistatic brush, optical drive cleaning kit, gold contact cleaner, safety goggles, and an air filter or mask.
SAN (storage area network)
A collection of storage media that is centrally managed and available to a multitude of network devices, such as servers, network-based applications, virtual machines, and users.
QoS (quality of service)
A collection of techniques that ensure that the most important corporate data, voice, and/or video is sent before other noncritical data that may get dropped as a result.
firmware
A combination of hardware and software attributes. An example is a BIOS chip that has instructions (software) written into it.
convert
A command issued from a command prompt that changes an older file system into NTFS.
md
A command issued from a command prompt that creates a directory (folder) or subdirectory.
del
A command issued from a command prompt that deletes a file or folder.
command
A command issued from the Run utility in Windows to bring up a command prompt window.
command /?
A command issued from the Run utility in Windows to list commands and options that are available for that particular command. Replace command with a particular command, such as dir /?.
services.msc
A command that brings up the Services snap-in Computer Management tool so that you can start and stop services.
gpedit.msc
A command that brings up the group policy editor, which is used to control various Windows functions, apps, and what specific groups are allowed to do.
prompt
A command that changes how the command prompt appears. See also command prompt.
attrib
A command that designates a file as hidden, archived, read-only, or a system file.
gpresult
A command that displays Group Policy settings. A group policy determines how a computer is configured for both system and user (or user group) settings.
type
A command that displays a file's contents on the screen.
net user
A command that is used to create, delete, or make changes to user accounts from a command prompt on a Microsoft-based machine.
netdom
A command that is used to manage workstations in a domain environment.
net use
A command that is used to map a network share to a drive letter or to view mapped drives on a Microsoft-based machine.
netstat
A command that is used to view current network connections and the local routing table for a PC.
net
A command that manages almost everything on a network. It can be followed by a number of options, each of which has different parameters.
notepad [command]
A command that opens the Windows Notepad text editor app.
pathping
A command that provides output similar to the ping and tracert commands and that includes network latency and loss information between source and destination IP addresses.
xcopy
A command that transfers files from one place to another in the command prompt environment.
ipconfig
A command used from a command prompt in Windows to view the current IP configuration settings.
dir
A command used from a command prompt to display the contents of a directory.
echo off
A command used from a command prompt to prevent characters from displaying on the screen.
copy
A command used from a command prompt to transfer one or more files from one place to another.
explorer
A command used on a Windows device to bring up File Explorer.
kill
A command used through the Terminal application on a Mac or in Linux to halt a program that has frozen or is not responding. An example is kill -9, where 9 is the process_id.
diskpart
A command-based utility used in preparing hard disk partitions and volumes for use.
vi
A command-line text editor used on macOS and Linux.
ZIF socket (zero insertion force socket)
A common CPU socket that has a lever that provides easy access for CPU removal.
grep
A common Linux utility that searches output for a specified term.
liquid damage
A common hazard of mobile devices.
less
A common macOS and Linux command that shows the contents of a file.
Wi-Fi calling
A common mobile device capability used to make phone calls using a Wi-Fi connection rather than a cell phone network.
PC (personal computer)
A common name for a computer, derived from the IBM PC brand.
intermittent projector shutdown
A common safety precaution for a projector when it has been used for a long period of time and needs to cool. If this occurs when the projector has only been powered a short period of time, check the filter.
impact print head
A component of an impact printer that holds tiny wires called print wires.
menu bar
A component of the macOS GUI that is anchored to the top of a screen and is a dynamically changing bar that presents contextual drop-down menu options on the left side, depending on which window is active. On the right side, it provides shortcuts such as for connecting to a Wi-Fi network or changing volume. It is also informative, displaying information such as battery life on laptops and the time.
web server
A computer configured to provide web-based content that is accessed through a web browser.
gaming PC
A computer design that includes a powerful processor, high-end video or specialized GPU, an SSD, a good sound card, and high-end cooling due to the demands placed on hardware when playing computer-based games.
database system
A computer or server that has software on it that provides for a structured way of collecting, analyzing, sorting, and displaying data.
sleep-and-charge USB port
A computer port that provides power to an attached device (power to charge the device) even when the computer is powered off.
embedded system
A computer that has a specific function within a larger system, such as in medical, manufacturing, or airport industries.
smartphone
A device that has more capabilities than a cell phone, such as internet connectivity, GPS tracking, apps, camera functions, music options, and wireless connectivity to other devices.
redundant power supply
A device that has two or more power supplies that provide power in the event that one power supply fails.
surge suppressor/protector
A device that helps protect power supplies from overvoltage conditions. Also known as a surge strip.
cellular card
A device that is used to connect a laptop to a cell phone network.
line conditioner
A device that protects a computer from overvoltage and undervoltage conditions as well as adverse noise conditions. Also known as a power conditioner.
digitizer
A device that provides input into documents such as architectural drawings, technical plans, and photos. It can also be used to draw electronic pictures.
UPS (uninterruptible power supply)
A device that provides power for a limited time to a computer or device during a power outage.
SPS (standby power supply)
A device that provides power to a computer only after it first detects an AC voltage power-out condition.
battery backup
A device that provides power to a computer when a brownout or a blackout occurs.
wireless access point
A device that receives and transmits data from multiple computers that have wireless NICs installed. The access point can be a standalone unit or can be integrated into an ADSL router.
projector
A device that takes input from a device such as a computer, laptop, camera, and so on and sends an image to a screen or wall.
key fob
A device used for keyless entry.
drawing pad
A device used to draw, annotate an existing document or drawing, type, or write. Also known as a drawing tablet or graphics tablet. Commonly used by teachers, graphic artists, space planners, and engineers.
laptop docking station
A device used to provide increased connectivity, such as to one or more displays, full-sized keyboard, mouse, and so on, as well as wired network connectivity.
syslog server
A device used to receive information from multiple network devices and that provides a historical record of events such as devices losing power, a particular interface going down, or access (login/logout) to the device.
magnetometer
A device used to scan for firearms/weapons that might also be used for location tracking.
vacuum
A device used to suction dust and debris from computers and wiring closets.
hub
A device used with Universal Serial Bus or in a star network topology that allows multiple device connections. A network hub cannot look at each data frame coming through its ports as a switch does. It forwards data frames (packets) to all ports.
subdirectory
A directory contained within another directory. Subdirectories are also called subfolders.
GParted
A disk management tool bundled with Ubuntu that allows the creation, deletion, and resizing of partitions on a physical disk.
initialize disk
A disk option available through the Windows Disk Management tool that enables a disk so that data may be stored on it.
dynamic storage
A disk that has been configured for the Windows operating system that can be resized and managed without rebooting and that contains primary partitions, extended partitions, logical drives, and dynamic volumes.
formatted (disk)
A disk that has been prepared to accept data.
fuzzy image
A display issue that can be caused by faulty electronics or broken/bent pins on a cable.
logical drive
A division of an extended partition into a separate unit, which appears as a separate drive letter.
logical partition
A division of an extended partition. A logical partition can be assigned a drive letter, formatted, and used for storage.
drive partition
A division of space on a hard drive that is recognizable by the operating system.
OSHA (Occupational Safety and Health Administration)
A division of the U.S. Department of Labor that promotes safe and healthy working conditions by enforcing standards and providing workplace safety training.
launcher
A dock-like shortcut bar that allows manipulation of the graphical user interface (GUI) so that multiple apps and/or commands are easily deployed. It has the functionality of being an application launcher shortcut as well as having a universal search feature built in to it.
USB Type-B
A downstream male connector on a USB cable that connects to a Type-B connector on the downstream device.
factory recovery partition
A drive partition that contains files and folders including the operating system, drivers, and preinstalled programs that is used when a system must be rebuilt, restored, or re-created or when troubleshooting Windows problems.
SSHD (solid-state hybrid drive)
A drive that contains both a mechanical hard drive and flash memory used as an SSD.
SSD (solid-state drive)
A drive that uses non-volatile flash memory and no moving parts to store data. It is faster but more expensive than a mechanical hard drive.
NAS drive
A drive used in a network-attached storage device that costs more than a drive of the same capacity used in a PC, for example, because a NAS drive is built to run 24/7.
scareware
A fake message that warns of a virus or computer problem.
client-side DNS
A form of Domain Name System (DNS) in which individuals or businesses configure their computer to use one or more DNS servers to translate uniform resource locators (URLs) into IP addresses.
safety goggles
A form of personal protection that should be worn when working on equipment to protect the eyes from debris, chemicals, and liquids.
whaling
A form of phishing attack that targets senior executives.
vishing
A form of phishing that uses a voice call in order to obtain personal information.
username and password
A form of security in which a device or an authentication server has a specific unique identifier and associated characters to allow access.
5 GHz
A frequency commonly used for 802.11 wireless networks.
function key
A function ( ) key that, when used with another key, provides a specific function such as turning up speakers, connecting to an external monitor, or turning on the wireless adapter. This key is commonly found on laptops.
cmdlet
A function used and associated with a particular operation when creating tasks within PowerShell.
comparison operator
A function used in scripting to evaluate two values.
hash
A function used in security encryption and for file transfers to ensure that a file did not get changed during the download.
PCI (payment card industry)
A generic term for the entities surrounding businesses using payment cards, such as debit and credit cards, for transactions.
Python
A good language for writing scripts because it is easy to learn and can be run on most operating systems. The extension .py is used for Python files.
proactive
A good trait to have as a technician that involves implementing measures to avoid problems rather than waiting for problems to occur before implementing measures.
be on time
A good work habit to have. If you are going to be late for work, contact your supervisor. If you are going to be late for a customer appointment, notify the customer.
maintain a positive attitude
A great idea for professionalism and good rapport with customers.
developer mode
A mode on a mobile device that allows for the device to be customized or apps to be developed. App customization and development can pose a security risk and/or the device operating system to be unstable so be careful using this mode.
equality operator
A method in scripting that is used to compare two values. Another name for comparison operator or equals operator.
asset tag
A method of IT inventory used on hardware and network items.
full backup
A method of backing up a hard drive in which the archive attribute is used. The backup software backs up all selected files and sets the archive bit to off.
NAT (network address translation)
A method of conserving public IP addresses. NAT uses private IP addresses that become translated to public IP addresses.
shredding
A method of destroying documents for security reasons.
TKIP (Temporal Key Integrity Protocol)
A method of encryption that is an improvement over WEP because the encryption keys periodically change.
IT automation
A method of implementing change where changes to devices or applications can occur without a human making repetitive changes to multiple systems.
unattended installation
A method of installing Windows in which the remote computer does not have to be touched. It can be conducted using Microsoft Deployment Toolkit with Configuration Manager or another imaging product.
FAT (File Allocation Table)
A method of organizing a computer's file system.
PoE (Power over Ethernet)
A method of powering a remote device through an Ethernet switch or a patch panel.
multithreading
A method of processing that allows an operating system to be more efficient as it can perform multiple tasks to keep the processor busy.
continuous ink system
A method of providing extra ink for heavily used inkjet printers.
PoE injector
A method of providing power to a remote device using an injector when a PoE switch or patch panel is not available.
encryption
A method of securing data from unauthorized users in which data is converted into an unreadable format.
access control vestibule
A method of separating a nonsecure area from a secure area to prevent unauthorized access and tailgating. Also known as a mantrap.
in-place upgrade
A method of upgrading Windows when an older Windows version is already installed.
virtual RAM
A method of using storage space on the hard drive as if it were memory.
sandbox
A method of using virtualization or non-production equipment to test code or app changes before deployment.
prefix notation
A method used to describe a subnet mask. It includes a forward slash followed by a number, such as /24. The number is how many consecutive bits are set in the subnet mask.
WPS (WiFi Protected Settings)
A method used to easily configure a wireless device for SSID and WPA2 security.
IP addressing scheme
A methodical way of setting up network numbers within an organization. Within a company, the IP addressing scheme tends to be private IP addresses.
IRQ (interrupt request)
A microprocessor priority system that assigns a number to each expansion adapter or port to facilitate orderly communication.
Android
A mobile device operating system.
Android OS
A mobile device operating system.
broken screen
A mobile device part that might have to be replaced. Replacing a screen might require removing the keyboard, drive, memory, and motherboard.
tablet
A mobile device with a touch screen, camera(s), microphone, and possibly one or more ports.
headset
A mobile wearable device that commonly includes a microphone and headphones.
logical operator
An operator used in scripting to allow for two or more conditions to be tested in one statement. Examples of logical operators include AND, NOT, and OR.
secured print
An option available on some printers that requires a passcode in order to send/retrieve a print job.
duplexing assembly
An option available on some printers to allow two-sided printing.
maintenance counter
An option on a laser printer that counts the number of pages until the message to apply the maintenance kit appears again.
remote backup
An option on a mobile device to allow the device or specific data—such as personal contacts, videos, pictures, and/or music—to be backed up to remote storage.
PXE (Preboot Execution Environment) boot
An option some computers have that can be modified to search for the network device that holds the computer image.
file synchronization
An option sometimes available with cloud file storage or a program that you can download that allows you to access files that have been placed in a special folder.
factory reset
An option to reset a computing device back to original settings.
Force Quit
An option used on an Apple device to close an unresponsive app.
command switch
An option used when working from a command prompt that allows a command to be controlled or operated on differently.
recovery partition
An optional partition provided by some vendors that contains the operating system, files, and applications installed on the system when purchased.
legacy system
An outdated computer system or piece of network equipment that needs to be replaced or updated.
power surge
An overvoltage condition that is like a spike but that has a longer duration.
high latency
An undesired network characteristic where packets are dropped frequently and network systems respond slowly to network requests.
dust cleanup
An unsafe condition for technicians to work in without an air filter or mask.
OS update [mobile]
An upgrade to an operating system that is important on mobile devices because the update commonly contains security patches; a device should be connected to power if possible during an update.
HDMI (high-definition multimedia interface)
An upgraded digital interface that carries audio and video over the same cable.
bollard
An upright post that tends to be set in front of a door and is used as a security deterrent.
USB Type-A
An upstream male connector on a USB cable that connects to an upstream Type-A port on a host computer or other hub.
Cat 5
Another name for Category 5 twisted pair cable, which has a bandwidth maximum of 100 MHz, a maximum transmission speed of 100 Mb/s, and a 100-meter (328-foot) maximum cable distance.
Cat 5e
Another name for Category 5e twisted pair cable, which has a bandwidth maximum of 100 MHz, a maximum transmission speed of 1,000 Mb/s, and a 100-meter (328-foot) maximum cable distance. This type of cable reduces crosstalk found in Cat 5 cable.
Cat 6
Another name for Category 6 twisted pair cable, which, with the Cat 6a specification, has a bandwidth maximum of 500 MHz, a maximum transmission speed of 10,000 Mb/s, and a 100-meter (328-foot) maximum cable distance.
disk striping
Another name for RAID 0, in which data is alternately written on two or more hard drives, thus providing increased system performance.
wireless extender
Another name for a wireless repeater that increases the size of a wireless network.
suspend mode
Another name for sleep mode, used to conserve power in a computing device.
checkpoint
In a virtualization environment, a copy or backup of the virtual machine (VM) at a particular point in time that is used to revert the VM to that point in time.
snapshot
In a virtualization environment, a copy or backup of the virtual machine (VM) at a particular point in time that is used to revert the VM to that point in time. It is similar in concept to a restore point.
Type 1 hypervisor
In a virtualization environment, a hypervisor that has the operating system running on top of the hypervisor. Also known as a native hypervisor.
Type 2 hypervisor
In a virtualization environment, a hypervisor that runs on top of a host operating system to manage and oversee the virtual machine. Also known as a hosted hypervisor.
host machine
In a virtualization environment, a real computer.
hypervisor
In a virtualization environment, the software that creates the virtual machine (VM) and allocates resources to the VM. Also called a virtual machine monitor or virtual machine manager (VMM).
purpose of the change
In change management, the part of the planning process that involves documenting why a change is needed.
external shared resources
In cloud computing, resources such as servers, applications, hardware (for example, CPUs and RAM), data storage, and network infrastructure equipment shared between organizations through an external vendor.
shared resources
In cloud computing, resources such as servers, applications, hardware (such as CPUs and RAM), data storage, and network infrastructure equipment shared among people within an organization or between organizations.
Console
In macOS, a centralized place to find system and application logs and messages. It allows parsing manually or by searching for something specific.
directory
In older operating systems, an electronic container that holds files and even other directories. Today's operating systems use the term folder.
GUI (graphical user interface)
In operating systems, an interface in which the user selects files, programs, and commands by clicking pictorial representations (icons) rather than typing commands at a command prompt.
extension
In operating systems, the three or more characters at the end of a filename, after a period (.). The extension associates a file with a particular application that executes the file.
output
In programming or scripting, the result, which could be a screen, a value, a computation, a printed document, and so on.
repetition structure
In scripting, a block of statements that are used repeatedly.
loop
In scripting, a method of repeating something.
vertical lines
Lines that appear on printer paper that may be caused by debris on the corona wires or in the developer unit in the cartridge. When vertical lines appear, replace the toner cartridge.
form factor
The shape and size (height, width, and depth) of a motherboard, adapter, memory chip, power supply, and so on. Before building or upgrading, make sure the device's form factor fits the computer case.
PCIe
A point-to-point serial bus used for motherboard adapters. Each bit can travel over a lane, and each lane allows transfers up to 250 MB/s, with a maximum of 32 lanes (which gives a total of an 8 GB/s transfer rate).
regulatory and compliance policy
A policy that is specific to an industry such as health care or manufacturing.
password policy
A policy that may be contained within a security policy that defines password requirements (length and types of characters) as well as the password change process.
PostScript
A popular page description language from Adobe Systems Inc.
I/O address (input/output address)
A port address that allows an external device to communicate with the microprocessor. It is analogous to a mailbox number.
NIC (network interface card)
A port on a device that allows connectivity to a network. A NIC can connect to a wired or wireless network.
miniUSB
A port on mobile devices that is a miniaturized version of the Universal Serial Bus (USB) interface created for connecting smartphones, GPS devices, printers, and digital cameras.
eSATAp port
A port that accepts both eSATA and USB connectors and can provide power when necessary. Also known as eSATA/USB or power over eSATA.
charging USB port
A port that can provide power to charge and run an unpowered attached device such as a flash drive.
network port
A port that connects a computer to a wired network.
eSATA (External Serial ATA)
A port used to connect external SATA devices to a computer.
DisplayPort
A port, developed by Video Electronics Standards Association (VESA), that can send and receive audio and video signals. Used primarily for display devices and can connect to a single-link DVI or HDMI port with the use of a converter.
disk cache
A portion of RAM set aside for hard drive data that speeds up hard drive operations. A cache on a hard drive controller is also known as a data buffer.
subnet
A portion of a network number that has been subdivided so that multiple networks can use separate parts of that single network number. Subnets allow more efficient use of IP addresses. Also called a subnetwork or a subnetwork number.
host address
A portion of an IP address that represents a specific network device.
burned out bulb
A possible issue when a projector does not display anything.
dual-rail power supply
A power supply that has two +12 volt lines available.
Software Updater
An Ubuntu tool used to update Linux operating systems and applications.
Mb
An abbreviation for megabit.
Notepad
An accessory text editor program in Windows.
POST card
An adapter or a USB attached card that performs diagnostics and displays the results as a series of codes on an LED display.
video capture card
An adapter that makes it possible to bring in video from an external source such as a video camera.
eSATA card
An adapter used to add external SATA ports so that external storage devices can be used. It may include ports for internal SATA devices.
video card
An adapter used to output video to a display.
Disk Utility
A powerful application that manages disks and images in macOS. The utility can rename, reformat, erase, repair, and restore disks. It should be approached with caution because the wrong usage could delete all data on the system or on an attached external disk.
graphic/CAD/CAM design workstation
A powerful computer system utilized by design engineers or graphic designers. It usually has multicore processors, high-end video cards with maximum GPU and video RAM, large displays, a large-capacity hard drive and SSD, and maximum system RAM. It uses output devices such as a scanner, plotter, or 3-D printer.
backup
A precautionary technique used to have a secondary piece of hardware or backup software/files.
calibrate (inkjet)
A print head alignment process that must be performed when installing the printer and when replacing the print head.
garbled print
A printed output indication that the printer cable is not securely attached or a print driver problem exists.
thermal printer
A printer commonly used in retail that uses heat and special thermal paper to create printed images.
roller
A printer part that is part of the system used to move paper through the printer.
multiple print jobs pending
A printer problem that requires checking for paper, ink/toner, and device error message. Repair the problem and clear the print job or restart the printing.
multipage misfeed
A printer problem that requires checking the rollers through the paper path, crooked paper, or the alignment guides.
private browsing
A privacy feature that prevents browsing history, cookies, and data from being collected and kept.
public IP address
A private IP address that a service provider or company translates to a public IP address that is seen on the internet.
low RF signal
A problem caused by a wireless device being too far away from a wireless access point/router or obstructions such as walls.
incorrect color
A problem caused by bent or broken video pins on a monitor's cable ends.
intermittent wireless connectivity
A problem in which a wireless device's connection to a wireless network is affected by obstructions such as walls, trees, concrete columns, rain, snow, fog, other buildings, microwave ovens, and other wireless networks operating in the same unlicensed frequency range.
missing drive in OS
A problem in which the BIOS/UEFI recognizes the storage device, but the OS does not. To handle this issue, use the Disk Management tool to initialize and/or partition the drive.
no display
A problem on a mobile device that can be solved by attaching an external display, or, if attached to a projector, checking the output port chosen. Other options are to check the lid close detector, turn the device off and back on, and charge the device fully.
intermittent shutdown
A problem that can be caused by a bad power supply, motherboard, RAM, or CPU.
touch screen non-responsive
A problem that can be fixed by closing apps, checking whether the problem is app specific, restarting the device (by turning off the device, removing the battery, allowing the device to dry or cool, reinstalling the battery, and turning on the device), removing the screen protector, calibrating the screen, and doing a factory reset.
incorrect chroma
A problem that can be remedied by checking printer ink levels, running color calibration, and checking whether the manufacturer has a chroma optimizer.
incorrect data source
A problem that can be remedied by checking the input source and ensuring that it is correct for the project output.
incorrect orientation
A problem that can be remedied by checking the printer page setup when the printed page does not come out the correct way.
intermittent wireless
A problem that can be remedied by turning off Wi-Fi and turning it back on again and moving the device to find a higher signal strength (as shown on the display on a laptop).
incorrect paper size
A problem that can be remedied by using the printer properties to select the correct size and orientation of the paper before printing.
poor battery health
A problem that can be solved by closing any apps and services that are not being used and replacing the battery.
random reboot
A problem that could be caused by overheating, a power issue, a particular app, or the OS.
physically damaged port
A problem that leads to a device failing to charge after changing the cable. This issue can be solved by closely inspecting a mobile device port.
paper not feeding
A problem that may be due to poor-paper quality or to the inefficiency of the rubber rollers that move the paper.
toner is not fused
A problem that may occur with a laser printer. The culprit is commonly in the fuser assembly.
head crash
A problem that occurs when a read/write head touches a platter in a mechanical hard drive, causing damage to the heads or the platter.
paper jam
A problem that occurs when paper gets stuck along the printer paper pathway.
printing issue
A problem that occurs when trying to send output to a printer. In Windows, try to print a test page from the printer's Properties > General tab. Use the Windows Troubleshooting tool.
poor VoIP quality
A problem that results in dropped calls or unintelligible audio that is solved by implementing QoS. Key measurements of VoIP quality are latency and jitter.
no power
A problem with a computer that can be remedied by checking that the power cord is attached, the power button is pushed, the surge strip is turned on, and the monitor is turned on; the problem could be an indication of a faulty power supply. On a mobile device, check brightness, the lid close sensor, and the battery. On any computer, check for malware.
no wireless connectivity
A problem with a computer that can be remedied by checking whether Wi-Fi is enabled and ensuring that the device is not in Airplane Mode. Turn off Wi-Fi and turn it back on again. Move the device to see if you have a higher signal strength (display on a laptop). Ensure that the correct wireless network is chosen.
black screen
A problem with power (no power, bad power supply) or a CPU, no power to the monitor, disconnected video cable, faculty monitor, turned off monitor, bad motherboard, or a failed CPU cooling system. For video issues, use the Safe Mode or Last Known Good Configuration boot option.
audio issue
A problem with sound output, including on a projector. Check muting, volume settings, and cabling.
does not autorotate
A problem with the device settings, another app, outdated OS, G-sensor, or accelerometer on a mobile device.
initialization
A process in which a variable in a script is given an initial value.
reimage
A process of putting a new image (operating system, applications, and settings) on a corporate computer.
virtualization
A process that allows a computer to run multiple operating systems without affecting each other. It allows the different operating systems to share hardware, and it provides a test environment for software that may not be compatible on a specific platform.
partition
A process that can divide a hard drive so that the computer sees more than one drive.
clear a jam
A process that involves checking the printer paper path for obstructions or creased paper.
repair an application
A process that involves selecting the application in the Windows Programs and Features section of the Control Panel and selecting Repair.
IP filtering
A process that permits or denies specific network traffic based on websites, users, IP addresses, protocols, or apps.
disk mirroring
A process that protects against hard drive failure by using two or more hard drives and one disk controller. The same data is written to both drives. If one hard drive fails, the other hard drive continues to function. Disk mirroring is considered to be RAID level 1.
high-level formatting
A process that sets up a file system for use by the computer. It is the third and last step in preparing a hard drive for use.
site survey
A process used in wireless network design to determine the best wireless hardware placement for the optimum coverage area.
RMM (remote monitoring and management)
A process used to share a screen with a user or remotely access a computer to troubleshoot a specific problem, share files, share a remote image, update apps or the OS, handle inventory control, and deploy security solutions.
clear cache
A process used to troubleshoot browser issues such as a page not displaying correctly or not formatted properly.
update boot order
A process used when a Windows computer does not boot due to the boot order in the BIOS/UEFI settings.
roll back Windows update
A process used when a Windows update causes a system to have issues that involves rolling back the update to at least one previous version and then applying the updates one at a time.
repair installation
A process used when you have to reload the Windows operating system. Sometimes called an in-place upgrade or a reinstallation.
SSID broadcasting
A process used with wireless network access points to periodically send out a beacon frame that includes the SSID. Wireless devices can automatically detect the SSID from this beacon.
APU (accelerated processing unit)
A processor that combines a central processing unit (CPU) with a graphics processing unit (GPU).
virus
A program designed to change the way a computer originally operated.
Program Compatibility Wizard
A program that can check for software application compatibility with a newer Windows version.
chkdsk
A program that locates clusters that are disassociated from the appropriate data file.
MBR (master boot record)
A program that reads the partition table to find the primary partition used to boot the system.
JavaScript
A programming language that can be run on any operating system. Creating and running JavaScript commands requires installing Node.js. The extension that identifies a JavaScript file is .js.
iteration
A programming loop that consists of a block of statements that are executed repeatedly for a specific number of times or until a specific condition is met.
DHCP (Dynamic Host Configuration Protocol)
A protocol that is involved in automatically assigning IP addresses to network devices from a pool of IP addresses. DHCP uses ports 67 and 68.
NTP (Network Time Protocol)
A protocol that synchronizes time between network devices.
NetBT (NetBIOS over TCP/IP)
A protocol that uses TCP ports 137-139 to support outdated applications that rely on the NetBIOS API to use a TCP/IP-based network. Also known as NBT.
Kerberos
A protocol used in conjunction with an authentication server to prevent transmitted packets from being altered or read.
CDMA (Carrier Detect Multiple Access)
A protocol used on older 2G/3G mobile networks.
IMAP (Internet Mail Access Protocol)
A protocol used to receive email through the internet. Uses port 143 by default.
POP3 (Post Office Protocol)
A protocol used to retrieve email from a mail server. It uses port 110.
SSL (Secure Sockets Layer)
A protocol within the TCP/IP protocol stack that is used to create a connection between two network devices such as when you use a website that begins with https:// in the address bar.
risk level
A rating such as low, medium, or high or a numerical value representing the level of risk an IT change brings if implemented.
EPEAT rating system
A rating system of gold, silver or bronze to identify products that have an environmental (green electronics) design.
mobile docking station
A recharging station that provides a stable environment for mobile devices. A mobile docking station may be able to charge more than one device at a time.
Reset This PC
A recovery option that reinstalls Windows and deletes users' files, apps, and settings.
reload OS
A repair option that installs a new copy of the operating system when other repair options haven't been successful in fixing the problem.
loop structure
A repetition structure that uses loops, which contains blocks of statements that are executed repeatedly.
USB Type-C
A reversible plug connector for USB devices and hosts that will eventually replace USB Type-A/Type-B plugs.
print ribbon
A ribbon in an impact printer that is struck by the print head to leave images on paper.
evil twin
A rogue AP that broadcasts the same SSID as a legitimate AP in the area to intercept wireless traffic.
transfer roller
A roller inside a laser printer that replaces the transfer corona. The roller applies a positive charge to the back of the paper so that the toner is attracted to the paper as it moves through the printer.
test development
A safe way to use virtualization or other means when trying out new software without hurting any other device.
MSDS (material safety data sheet)
A safety-related document that contains information about a product, including its toxicity and recommendations for storage/disposal.
GPS (Global Positioning System)
A satellite-based navigation system that transmits location information to receivers in mobile devices. Most mobile devices have GPS capability.
ADF scanner
A scanner that has the added feature of having an automatic document feeder (ADF) to allow multiple pages to be fed or input into the scanner.
VBScript
A scripting language designed specifically for use with Microsoft Internet Explorer. A VBScript file has the extension .vbs.
NOT operator
A scripting operator that flips the result of an expression so that if an expression is true, it will return false and vice versa; if the expression is false, it will return true.
security settings
A section of BIOS/UEFI Setup options that allows configuration of specific security, such as power-on password, chassis intrusion detection, TPM, LoJack, and so on.
volume
A section of a storage device that receives a drive letter and to which data can be written.
lost cluster
A sector on a disk that the file allocation table cannot associate with any file or directory.
RADIUS (Remote Authentication Dial-in User Service)
A secure method of authentication using a server.
TACACS (Terminal Access Controller Access-Control System)
A secure method of authentication using a server.
patching/OS updates
A security best practice for mobile devices in which the operating system (OS) and radio firmware for devices such as cell phones are updated.
patch/update management
A security best practice in which the operating system, drivers, and BIOS/UEFI are kept up to date so that known security issues are addressed.
change default admin user account password
A security best practice is to change the default administrator user account password or create an account that has administrator access and disable the default account.
IPS (intrusion prevention system)
A security device that actively monitors and scans network traffic for malicious traffic and violations of security policies and that takes appropriate action.
badge reader
A security device that allows entry into a space.
USB lock
A security device that prevents USB storage devices from being inserted into a USB port.
UTM (unified threat management)
A security device that provides multiple functions, such as content filtering, antivirus, antispyware, anti-malware, firewall, and intrusion detection and prevention.
timeout/screen lock
A security feature in which, after a period of non-use, the computer requires a username and password to again access the computer.
port security
A security feature on a corporate switch that detects whether someone has swapped one corporate device for another one.
MAC address filtering
A security feature on an access point that allows MAC addresses to be entered to limit the number of wireless devices allowed on the wireless network.
standard privileges
A security function in Windows that allows people using a Standard user account to execute specific commands from a CLI.
principle of least privilege
A security measure in which a user receives only enough security permissions (on devices, files, network resources, and so on) to do his or her job.
restrict login time
A security measure in which user or group accounts can be restricted to specific days and times through Windows account management.
full device encryption
A security measure on mobile devices that supports encoding or scrambling of all user data.
share permissions
A security measure that can dictate what a specific user or group can do with a file or folder that can be accessed across a network.
NTFS permissions
A security measure that can dictate what a specific user or group can do with a file or folder.
trusted source
A security measure that is built in to some browsers and security software that indicates whether a website or downloaded file is a trusted or untrusted software source.
untrusted source
A security measure that is built in to some browsers and security software that indicates whether a website or downloaded file is a trusted or untrusted software source.
PIN code
A security option commonly available on mobile devices.
security pattern
A security option that requires tracing a specific set of dots to access a mobile device.
two-factor authentication
A security process where two key pieces of information are required such as your username/password and pressing a message on a cellphone in order to authorize access.
ransomware
A security situation in which a hacker restricts a user's access to a device, and pressures the user to pay money to regain access to the device.
soft token
A security technique in which a code that is required in addition to the user ID and password is delivered via text, phone call, or email.
decision structure
A selection structure consisting of a test condition together with one or more groups (or blocks) of statements. The result of the test condition determines which block of statements will be executed.
barcode
A series of lines used to uniquely identify an item. In IT, barcodes are commonly used on asset tags for PC hardware and network items.
home server
A server commonly used to act as a web server and print server, control home devices, manage backups, and be accessed from outside the home. A home server commonly includes the capability to stream sound or video, share files, have a Gigabit NIC, or have a RAID hard drive array.
proxy server
A server that acts as a go-between for an application and another server.
AAA server
A server used in a corporate environment that is used to verify credentials such as a username and password.
public cloud
A service or an environment operated by an external vendor to provide an IT service such as storage or an application to a company.
documented business processes
A set of business documents that relate to how things are supposed to be done or have been done in the past.
keyword
A set of characters that is an instruction in a particular programming or scripting language.
ENERGY STAR
A set of energy-efficiency standards including those related to total energy requirements and low power mode(s) and an efficiency standard that a product must meet to achieve this standard.
header
A set of motherboard pins that allows the addition of a specific function such as USB 2 or 3.x ports, UCB-C ports, SATA/eSATA ports, RGP LEDs, and a Trusted Platform Module (TPM).
syntax
A set of symbols and rules used to create instructions. Every scripting language has its own syntax.
login script
A set of tasks that run when a user logs in when the device is part of a Windows domain. Also known as a logon script.
SSID (service set identifier)
A set of up to 32 alphanumeric characters used in wireless networks to differentiate between networks.
licensed range
A set of wireless frequencies that are managed by the FCC for a specific geographic region.
region code
A setting on a DVD or Blu-ray drive or disc that specifies a geographic region. The drive's region code must match the disc's region code.
Disable Execute Bit
A setting that, when enabled in BIOS/UEFI, prevents executable code such as that found in viruses or other malware from loading into memory locations where operating system code resides.
hidden share
A share that has a dollar sign ($) added to the share name so that the share is not shown to a remote networked computer.
for loop
A shorthand way to write a while loop.
digital signal
A signal using 1s and 0s to represent data.
compound condition
A situation in scripting in which two test conditions are contained in a single statement.
VNC (virtual network computing)
A situation in which a computer can be controlled from a remote network.
multiboot
A situation in which a computer can boot from two or more operating systems.
slow boot
A situation in which a computer is slow to start up that could be caused by the operating system, startup applications, services, or too many startup login scripts.
improper charging
A situation in which a phone is inconsistent in how it charges. To solve such an issue, inspect the phone connection, clean the battery and pins with compressed air, and check the charger.
port flapping
A situation in which a port is continuously going up and down.
service fails to start
A situation in which a technician should use the Services Computer Management tool to investigate and possibly manually start the service.
BYOD (bring your own device)
A situation in which personal mobile devices are brought to the work environment and used on the wired or wireless network.
cursor drift
A situation in which the mouse pointer moves across the screen even if no one is touching the input device. Commonly caused by improper touchpad sensitivity settings, outdated drivers, or malware.
high number of ads
A situation that can affect a mobile device data plan. Use OS, browser, and app privacy and location settings to block ads.
project confidence
A skill needed in IT personnel.
slow profile load
A slow startup/login process that results when too many profiles are required at startup or the company makes use of local or domain policies including user and group profiles.
smart card
A small ID-size card that can store data, be encrypted, and swiped through and/or interact wirelessly with a smart card reader. Examples of smart cards are identification, medical, credit, and access cards.
SIM (subscriber identification module)
A small card used in mobile devices and phones that stores personal contacts, numbers, and phone services.
script
A small program written in one of several scripting languages that is designed to do a specific task.
battery
A small self-contained unit used to power a device without using an AC outlet.
pop-up
A small window that appears (pops up) to display a message, a warning, or advice. Pop-ups often are a nuisance but can be managed through the browser's pop-up blocker feature.
CMOS battery
A small, coin-shaped lithium battery that provides power to CMOS memory.
micro-ATX
A smaller version of a standard ATX-sized motherboard form factor. Also known as mATX.
restore point
A snapshot image of the registry and some of the dynamic system files that have been saved previously by the System Restore utility. This is used when a Windows computer has a problem.
baseline
A snapshot of a computer's performance (memory, CPU usage, and so on) during normal operations (before a problem or slowdown is apparent).
impersonation
A social engineering security threat in which someone pretends to be from a user's bank or a company such as Microsoft to get the user to divulge information or to allow the attacker access to the user's account.
Dumpster diving
A social engineering threat in which someone digs through trash in or out of the office as a way to get information.
KMS (Key Management Service)
A software application used in companies that have 25 or more Windows computers to deploy. All newly installed computers register with the computer that has KMS installed. Every 180 days, the computer is re-activated for the license. Each KMS key can be used on two computers up to 10 times.
Ubuntu Software Center
A software manager to access Ubuntu's repositories of open source software. It can install new applications and uninstall existing ones, many of which are available for free.
wildcard
A special character used at the command prompt when typing commands. The ? character is used to designate "any" for a single character place, whereas the * character denotes any characters from that place forward.
CMOS (complementary metal oxide semiconductor)
A special type of memory on a motherboard in which Setup configuration is saved.
window
A specific area of the screen that contains information.
channel
A specific number that signifies the frequency used by a wireless device to transmit and receive. Also called a channel ID.
RFI (radio frequency interference)
A specific type of EMI noise that occurs in the radio frequency range. It often results from operation of nearby electrical appliances or devices.
file type
A specific type of file based on the application that created it. For example, a .txt file created in Word is a different file type than an Acrobat reader .pdf file.
weight limitation
A specification included in a job advertisement that describes expectations for lifting. As a general rule, do not lift anything that weighs over 40 pounds by yourself.
ESCD (Extended System Configuration Data)
A specification that provides the BIOS and operating system a means for communicating with plug-and-play devices. As the computer boots, the BIOS records legacy device configuration information. Plug-and-play devices use this information to configure themselves and avoid conflicts. When an adapter has resources assigned and the resources are saved in ESCD, the resources do not have to be recalculated unless a new device is added to the computer.
pinwheel
A spinning wheel, often seen in macOS, generated by the operating system to indicate possible problems such as a nonresponsive application.
tile
A square block on a Windows 8/10 Start screen with a picture of the function it performs when activated.
DVI (Digital Visual Interface)
A standard for a digital video adapter.
OSI model (Open Systems Interconnection model)
A standard for information transfer across a network that was developed by the International Organization for Standardization. The model has seven layers; each layer uses the layer below it, and each layer provides some function to the one above it.
HTTP (Hypertext Transfer Protocol)
A standard for internet data communication.
microUSB
A standard interface port on mobile devices and smartphones.
64-bit architecture
A standard that allows CPU processing or the movement of data up to 64 bits at one time.
IPv6 (Internet Protocol version 6)
A standard that includes a type of IP address that uses 128 bits represented by hexadecimal numbers. An example of an IPv6 address is fe80::13e:4586:5807:95f7. Each set of four digits represents 16 bits.
IPv4 (Internet Protocol version 4)
A standard that includes a type of IP address that uses 32 bits (four groups of 8 bits each) shown as decimal numbers in dotted-decimal format. An example of an IPv4 address is 192.168.10.1.
32-bit architecture
A standard that supports CPU processing or the movement of data up to 32 bits at one time.
SNMP (Simple Network Management Protocol)
A standard that supports network monitoring and management. SNMP uses ports 161/162.
SMTP (Simple Mail Transfer Protocol)
A standard used for email or for transferring messages across a network from one device to another. SMTP uses port 25.
FTP (File Transfer Protocol)
A standard used for transferring files from one computer to another across a network.
FC (Fibre Channel)
A standard used to connect a storage area network (SAN) to the other network devices.
USB 2.0
A standardized port that supported speeds up to 480 Mb/s, a maximum of 0.5 amps, 5VDC, and Type A and Type B connectors.
USB 3.1
A standardized port that supports speeds up to 10 Gb/s and supports the Type C connector.
USB 3.0
A standardized port that supports speeds up to 5 Gb/s, a maximum of .9 amps, and 5VDC.
shell
A standardized user interface to interact with the operating system.
kill task
A step to take if an application has frozen or has quit responding.
drive not recognized
A storage device error condition that indicates a problem with physical settings, BIOS/UEFI settings, cabling, or a lack of power.
drive status
A storage device state that can be viewed in Windows Disk Management.
optical drive
A storage device that accepts optical discs such as CDs, DVDs, or BDs that hold data, music, video, or software applications.
SD (Secure Digital)
A storage device with non-volatile flash memory used for mobile devices.
recovery drive
A storage location for a backup of only the operating system (and not user files, applications, or current settings).
ESD (electrostatic discharge)
A sudden flow of electric current that occurs when stored-up static electricity is discharged in an instantaneous surge of voltage. Cumulative effects of ESD weaken or destroy electronic components.
sound card
An adapter, also known as an audio card, that has several ports that convert digital signals to audible sound and also the reverse. Common devices that connect to the ports include microphones and speakers.
network path
An address that can be used from a command prompt or File Explorer that can be used to go to a shared resource such as a folder.
root access
An administrative level in Unix/Linux that has the greatest amount of ability to modify the operating system.
port security [firewall]
An advanced setting that can allow inbound or outbound traffic based on a specific TCP or UDP port number.
resin
An alternative to 3-D filament printing that produces better-quality objects.
liquid cooling
An alternative to a fan or heat sink for processor cooling in which liquid is circulated through the system, and heat from the processor is transferred to the cooler liquid.
UPnP (universal plug and play)
An alternative to port forwarding that allows peer-to-peer (P2P) gaming applications to function without further configuration.
authenticator app
An app that can be downloaded and, if a site is configured to use it, provides an additional level of security for mobile devices.
software
An application or operating system consisting of a set of instructions that makes the hardware work.
VLAN (virtual local area network)
A switch technology that allows assignment of ports to a specific VLAN number, thus creating separate networks so that the devices that connect to ports assigned to one VLAN number cannot see devices that connect to switch ports assigned to a different VLAN number.
continuous reboot
A symptom of a CPU, motherboard, or power supply problem.
intermittent device failure
A symptom of a faulty device that involves sporadic or irregular problems occurring with that device.
system lockup
A symptom of a motherboard, CPU, RAM, or power supply problem.
unavailable resources
A symptom of a network problem in which the network device cannot access the internet, a network printer, a network share, a particular server, email, and/or other resources.
unexpected shutdowns
A symptom of an issue with the processor, motherboard, or power supply.
disappearing files
A symptom of malware.
missing files
A symptom of malware.
intermittent connectivity
A symptom of poor or faulty connections with devices on the same network. To remedy this issue, use the ping command to check connections all around the network.
inaccurate system date/time
A symptom of the CMOS battery failing or being dead.
computer reboot
A symptom that something is wrong with the power supply, CPU, or motherboard.
burning smell
A symptom that there is something wrong with a power supply.
msconfig
A system configuration utility command that allows an administrator to enable or disable services, access Control Panel links, and control applications.
dual-channel
A system in which the motherboard memory controller chip handles processing of memory requests more efficiently by handling two memory paths simultaneously.
hardware
A tangible, physical item, such as a keyboard or monitor.
Hyperthreading (HT)
A technology created by Intel that is an alternative to using two processors. HT allows a single processor to handle two separate sets of instructions simultaneously.
VoIP (Voice over IP)
A technology for sending phone calls over the internet or over networks that traditionally transmitted only data.
RFID (radio frequency identification)
A technology that allows automatic identification of people, objects, or animals.
NFC (near field communication)
A technology that connects nearby devices without a cord.
IR (infrared)
A technology used for wireless input/output that is useful only over short distances.
NVMe (Non-Volatile Memory Express)
A technology used with SSDs that provides fast performance when accessing NAND flash memory.
load balancer
A technology used with redundancy, such as multiple paths through the network or multiple servers for a particular app or purpose such as DNS.
SLI (Scalable Link Interface)
A technology used with video cards that allows two cards to work together.
Ethernet over Power (EoP)
A technology, also called powerline communication, in which network data is sent to EoP modules that are plugged into power outlets to extend Ethernet networks.
WiBro (mobile Wireless Broadband)
A technology, also known as mobile WiMAX, that allows wireless connectivity for moving devices, such as those on a bus or train.
paging file
A temporary file in hard disk space used by Windows that varies in size depending on the amount of RAM installed, the available hard drive space, and the amount of memory needed to run the application. Also known as a swap file.
striped volume
A term describing how data is written across 2 to 32 hard drives. Each drive is used alternately instead of filling the first hard drive before going to the second hard drive. Related terms include striping and RAID 0.
workgroup
A term given to a peer-to-peer Windows network. A workgroup does not use a server to authenticate users during the login process.
JBOD (just a bunch of disks or just a bunch of drives)
A term that refers to combining multiple drives, with the combination recognized as a single drive letter or a single virtual disk. This is similar in concept to RAID but is not one of the RAID levels.
x64
A term that refers to the architecture and commands used originally with the Intel 8086 CPU that have been updated to a 64-bit version.
x86
A term that refers to the architecture and commands used with the Intel 8086 CPU.
domain
A term used in Windows server-based networks for an area where users are required to have logins, and file storage, email, and web-based services are commonly provided. Domains are used to organize user accounts and network devices in Microsoft's Active Directory service.
xDSL
A term used to describe the various types of digital subscriber lines (DSLs) available for connecting to the internet. Examples include ADSL, CDSL, DSL Lite, HDSL, RADSL, SDSL, VDSL, and x2/DSL.
multicore
A term used to indicate multiple processor cores in the same housing.
end-of-life
A term used with hardware or software that typically means the vendor no longer supports the product.
cable tester
A tester that checks coaxial and UTP cable ends (depending on the model) to determine if cable terminals are suitable for use.
shell script
A text file that contains a sequence of commands for a Linux/Unix-based system. Shell scripts may not run correctly on a Windows system. A shell script has the file extension .sh.
Memory Diagnostic Tool
A tool accessed by booting from the Advanced Boot Options menu in Windows to thoroughly test RAM.
WinRE (Windows Recovery Environment)
A tool available on the Windows installation disc and also in Windows that includes multiple tools that can be used to troubleshoot Windows when it does not work properly.
Services
A tool that can be accessed through the Windows Computer Management console or by typing services.msc from a command prompt. You can also control it from System Configuration utility > Services tab.
power supply tester
A tool that checks DC voltages sourced from the power supply.
crimper
A tool that permanently attaches an RJ45 or RJ11 connector to a copper core cable.
WRP (Windows Resource Protection)
A tool that protects system files and registry keys in Windows.
Reliability Monitor
A tool that provides a visual graph in Windows Vista or 7 of how stable the system is and shows details on events that might have affected system reliability.
cable stripper
A tool used to cut away the sheathing over a cable's copper wire. Also called a wire stripper.
Sysprep
A tool used to deploy Windows in a corporate environment. Also known as Windows System Preparation.
Wi-Fi analyzer
A tool used to identify what wireless networks are in the area, determine what frequencies (channels) are used, and find a less crowded channel for any wireless installations, hotspots, or tethering that may be needed in a particular area. Also known as a wireless locator.
Windows Memory Diagnostic tool
A tool used to thoroughly test RAM. It is accessed from a command prompt using the mdsched command or using the Administrative Tools section of the Control Panel > Diagnose Your Computer's Memory Problems link.
toner probe
A tool used with a tone generator to locate and identify cables.
tone generator
A tool used with a toner probe to identify cables when they are unlabeled or incorrectly labeled.
blackout
A total loss of AC power.
Control Panel
A traditional Windows utility that allows computer configuration such as adding or removing software, adding or removing hardware, configuring a screen saver, adjusting a monitor, configuring a mouse, installing networking components, and so on. Many of these functions have moved over to a Windows Settings link.
loopback plug
A troubleshooting device used for port testing.
VGA port
A type of 15-pin three-row video port that normally has a CRT monitor attached.
DNS TXT
A type of DNS message used by email apps to try to determine if a message is from a trusted source/domain.
MX record (mail exchange record)
A type of DNS record that forwards email to a server in another domain.
Cat 6a
A type of Ethernet cabling in which the wires are twisted together more closely than in Cat 6 so that speeds up to 10 Gb/s can be achieved over a 100-meter (328-foot) maximum cable distance. This type of cabling sometimes has a thick conductor and jacket.
link-local address
A type of IPv6 address assigned to a NIC. It is used to communicate on a particular network and cannot be used to communicate with devices on a different network.
network topology diagram
A type of IT documentation that shows how wired and wireless devices connect.
IPS (in-plane switching)
A type of LCD display that is best to use when viewing from an angle and needing good quality and color.
RAID 10
A type of RAID in which a mirrored set and a striped set are combined. It requires four hard drives as a minimum.
RAID 5
A type of RAID in which data is put on three or more hard drives, with one of the three drives used for parity.
system partition
A type of active hard drive partition that contains the hardware-specific files needed to load the operating system.
directional antenna
A type of antenna that radiates energy in a specific direction.
brute force
A type of attack in which repeated attempts are made to try to gain access to a network device or stored material.
direct burial cable
A type of cable that has extra insulation, cover, and waterproofing added so it can be used underground without any additional protection.
plenum cable
A type of cable that is treated with fire-retardant materials so that it poses reduced fire risk.
coaxial
A type of cabling used in video connections that has a copper core surrounded by insulation and shielding to protect against EMI.
community cloud
A type of cloud deployment model that is a combination of a private cloud and a public cloud.
DaaS (desktop as a service)
A type of cloud service in which an outside company provides the OS and apps to multiple computers.
PaaS (platform as a service)
A type of cloud service in which servers, databases, operating system, storage, and development tools are provided in an outside environment to relieve the support burden on companies that need an environment to perform high-level programming and develop applications.
SaaS (software as a service)
A type of cloud service that describes hosted applications such as a learning management system, enterprise resource planning (ERP), human resources management (HRM), payroll, antivirus, and inventory management that are hosted by another company and accessible from anywhere.
hybrid cloud
A type of cloud technology in which a company has some cloud services maintained by internal staff (private cloud) and some cloud services that are outsourced (public cloud).
IaaS (infrastructure as a service)
A type of cloud technology service in which routers, switches, servers, virtual machines, load balancers, access points, storage, and other infrastructure devices are provided through an online environment.
Windows domain
A type of computer network in which all user accounts, computers, printers, and other network devices are registered with a central database located on one or more clusters of central computers known as domain controllers.
thin client
A type of computer that does not have all the ports and components (such as a hard drive) of a traditional PC. It includes basic applications, meets minimum requirements for the selected OS, and has network connectivity.
proprietary operating system
A type of computer that only allows a particular operating system or has hardware that is incompatible with other vendors. For example, macOS is used only on Apple devices and is a proprietary system.
M.2
A type of connector that allows attachment of modules of varying size. First found in mobile devices and used for SSDs but now found on desktop motherboards.
RJ45
A type of connector used on Ethernet network cards and ports to connect a device to a wired network.
RJ11
A type of connector used with analog modems and traditional phone jacks.
F type
A type of connector used with coaxial cable that screws onto the cable.
digital signature
A type of electronic signature that confirms that the hardware or updated driver being installed is compatible with Windows. Sometimes called a driver signing.
WEP (Wired Equivalent Privacy)
A type of encryption that is sometimes used in wireless networks.
straight tip (ST) connector
A type of fiber connector that attaches like a BNC connector and requires the user to turn the metal part of the connector in order to make a secure attachment.
multi-mode fiber
A type of fiber-optic cabling that allows multiple light signals to be sent along the same cable.
single-mode fiber
A type of fiber-optic cabling that sends one light beam down the cable.
Lucent connector (LC)
A type of fiber-optic connector that snaps into a connector.
HFS (Hierarchical File System)
A type of file system used with Apple computers that was upgraded to HFS+ and then later upgraded to Apple File System (APFS).
metered connection
A type of internet connection that has a data limit imposed by the service provider.
DSL (digital subscriber line)
A type of internet connection that uses a traditional phone line. A filter is needed on each phone outlet that has a normal analog device attached to separate the analog sound from the internet data.
tri-channel
A type of memory execution in which motherboards access three memory modules simultaneously.
buffered memory
A type of memory in which the modules have extra chips (registers) that delay data transfers to ensure accuracy.
flash drive
A type of memory that holds data even when the power to the device is removed.
swipe lock
A type of mobile device locking/unlocking mechanism that involves a finger sweep movement.
satellite modem
A type of modem that can provide internet access at speeds faster than an analog modem but slower than cable or DSL access.
flash BIOS
A type of motherboard memory that allows updates by disk or by downloading internet files.
IP address
A type of network adapter address used when multiple networks are linked. Known as a Layer 3 address, in IPv4 it is a 32-bit binary number with groups of 8 bits separated by a dot. This numbering scheme is also known as dotted-decimal notation. Each 8-bit group represents numbers from 0 to 255. An example of an IPv4 IP address is 113.19.12.102. See also IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6).
Wi-Fi (Wireless Fidelity)
A type of network in which no wires are needed to connect to the network.
flash memory
A type of nonvolatile memory that holds data when the power is off.
boot partition
A type of partition in Windows that contains the operating system. The boot partition can be in the same partition as the system partition, which is the part of the hard drive that holds hardware-specific files.
GPT (GUID [globally unique identifier] partition table)
A type of partition table available in 64-bit Windows editions. GPTs can have up to 128 partitions and volumes up to 18 EB.
Molex
A type of power connector that extends from a computer's power supply to various devices.
modular power supply
A type of power supply that allows the customization of the number and type of power connections plugged into the power supply.
laser printer
A type of printer that produces output using an imaging process similar to a copier. Laser printers are the most expensive type of printer.
inkjet printer
A type of printer that squirts ink through tiny nozzles to produce print. Inkjet printers produce high-quality, high-resolution color output.
ARM (Acorn RISC Machine)
A type of processor used in mobile devices that requires low power, is fast, and is low cost.
ARM processor
A type of processor used in mobile devices, servers, and microcontrollers that runs cooler, takes less power, and is cheaper than Intel and AMD processors.
PCI (payment card information)
A type of regulated data related to a credit card, debit card, and the finance industry.
DDoS (distributed denial of service)
A type of security attack in which several computer systems are used to attack a network or device with the intention of preventing access, such as to a web server.
DoS (denial of service)
A type of security attack in which the intent is to make a machine or a network unusable.
facial recognition lock
A type of security lock on a mobile device or computer that uses the integrated camera and stored data to determine whether someone is granted access to the computer.
fingerprint lock
A type of security lock on mobile devices and computers that requires a valid stored fingerprint to be matched with the fingerprint of the person trying to gain access.
group policy
A type of security policy applied in a network domain environment. The policy dictates what a set of users can do.
phishing
A type of social engineering in which the attacker attempts to get personal information by sending emails that appear to be from legitimate companies.
CIDR (classless interdomain routing)
A type of subnet mask that does not have a classful boundary. CIDR is a method of allocating IP addresses based on the number of host addresses needed for a particular network.
unmanaged switch
A type of switch that cannot be remotely accessed and is commonly found in home and small business wired networks.
managed switch
A type of switch used in a corporate network that has an IP address assigned and can be remotely accessed, configured, and monitored by an administrator.
DVI-D
A type of video connector used with digital monitors.
Thunderbolt
A type of video port on PCIe adapters or on Apple computers.
WMN (wireless mesh network)
A type of wireless network that does not require access points. Peer radio devices allow connectivity over distances, which is especially good in emergency situations. Data is passed from one device to another to reach its final destination.
PIN (personal identification number)
A unique identifier used to access an account or a device such as a mobile tablet.
thread
A unit of programming code that receives a slice of time from Windows, so it can run concurrently with other units of code or threads.
ReadyBoost
A utility that can speed up the Windows boot process by caching some startup files to a 256 MB+ flash drive, SD card, or CF card.
System Restore
A utility that makes a snapshot of the registry and backs up certain dynamic system files. When a problem occurs, a technician can use this utility to take the system back to a time before the error started.
Performance utility
A utility that monitors memory and usage of other hardware parameters.
GPU (graphics processing unit)
A video adapter processor that assists in video communication between a video adapter and a system processor. Also known as video processor, video coprocessor, or video accelerator.
integrated GPU (graphics processing unit)
A video adapter processor that speeds up video processing and reduces power consumption.
DVI-to-HDMI adapter
A video connector with a DVI connector on one end and an HDMI connector on the other.
LED (light-emitting diode)
A video output technology that is a low-power, low-heat, long-lasting electronic device using liquid crystals.
virtual machine
A virtualized computer, which enables an operating system to appear as a separate computer to each application. A virtual machine, or VM, is a computer that has two or more operating systems installed that are unaware of each other due to virtualization software.
boot sector virus
A virus program placed in a computer's boot sector code, which can then load into memory. When in RAM, the virus takes control of computer operations. The virus can spread to installed drives and drives located on a network.
Trojan
A virus program that appears to be a normal application but that, when executed, changes something. It does not replicate but could gather information that could later be used to hack into someone's computer.
zero day [attack]
A vulnerability in a particular software application that is found by hackers before it is known or fixed by the developer of the application.
splitting partition (Disk Management)
A way of dividing space on a hard drive or making one partition smaller (right-click the drive > Shrink Volume) and then creating a new partition with the relinquished drive space.
safe mode (Mac)
A way to start a Mac so that the startup disk is checked and repaired if possible. To use this mode, hold down while starting the computer.
integer
A whole number, including zero and negative numbers.
Linux
A widely used operating system platform, released in 1991 by developer Linus Torvalds, that is similar to Unix. It is a free open source operating system that anyone can use, contribute to, and modify. It is widely used in many different areas of technology, such as servers, desktops, embedded systems, and smartphones.
System Control Panel
A window that is used to view details about a computer, including the name, amount of RAM, and processor speed; it also allows for remote access/assistance. Similar options are not available through the System Settings link.
transfer corona
A wire inside a laser printer that applies a positive charge to the back of the paper so that the toner is attracted to the paper as it moves through the printer.
radio
A wireless input/output technology that has a longer range than infrared.
WLAN (wireless LAN)
A wireless network that consists of an access point and some wireless devices, including laptops, tablets, and smartphones.
WWAN (wireless wide area network)
A wireless network that extends across more than one county, such as when WiMAX is used.
hotspot
A wireless network that provides free internet access. Security is a concern because no encryption or authentication is commonly required.
WPA3 (Wireless Protected Access 3)
A wireless security standard that makes use of Simultaneous Authentication of Equals (SAE) encryption.
Zigbee
A wireless standard managed by the Zigbee Alliance that is used in low-power, low-distance devices such as sensors and devices in smart homes, like lights, thermostats, security, cameras, door locks, garage doors, and digital assistants.
mail server
An application that is used to maintain a database of email accounts, store email that has been sent and received, and communicate with other mail servers. Also known as an email server.
file recovery software
An application used to recover data from a storage device.
setup location
An appropriate place to install a new printer.
DBR (DOS boot record)
An area of a disk that contains system files.
duplex
An assembly option that allows a printer to print on both sides of a paper without intervention. Duplex is also a NIC setting to choose between half (transmitting in one direction at a time), full (transmitting and receiving simultaneously), or auto.
XSS (cross-site scripting)
An attack in which a threat actor collects and even changes data between a user and a device providing a service (such as a web server).
on-path [attack]
An attack in which a threat actor collects or even changes data between a user and the device providing the service (such as a web server). The attacker inserts a device that mimics being an AP, DHCP server, or router/Layer 3 switch that is the default gateway for a network. Formerly referred to as a man-in-the-middle attack.
shoulder surfing
An attack in which someone sits or stands behind a user and looks at what the user is typing or at what is on the screen to glean information in an unauthorized way.
SQL (Structured Query Language) injection
An attack that targets a database to either collect, delete, display, or modify data.
microphone
An audio input device that can be integrated into a mobile device or that can be added externally, as with a wireless Bluetooth device; controlled with an app.
S/PDIF (Sony/Phillips Digital Interface Format)
An audio transfer format interface that defines how audio signals are carried between audio devices and stereo components. It can also be used to connect the output of a DVD player in a PC to a home theater or some other external device.
single sign-on
An authentication technique that allows a user to authenticate to multiple systems, servers, printers, and other network devices with a minimum of a user ID and password.
continuity
An electrical resistance measurement that indicates whether a wire is good or broken.
bit
An electrically charged 1 or 0.
MOV (metal oxide varistor)
An electronic component built in to some surge protectors to absorb overvoltage spikes or surges.
clock
An electronic component that provides timing signals to all motherboard components. A PC's clock speed is normally measured in MHz.
voltage
An electronic measurement of the pressure pushing electrons through a circuit. Voltage is measured in volts.
run as administrator
An elevated level of security access that may be needed to execute specific commands from the command prompt or to access administrative tools or utilities.
VDI (virtual desktop infrastructure)
An environment in which the PC's operating system and apps reside on a server.
virtual desktop
An environment in which the client computer operating system and applications are hosted remotely in the cloud.
limited connectivity
An error condition in which internet connectivity is lost.
proprietary crash screen
An error condition on a particular computer or application that is unique to the manufacturer.
no connectivity
An error condition that exists if the self-test issued from a computer fails.
read/write failure
An error condition that indicates a hard drive has a defective area.
fail to boot
An error condition that occurs when a boot device such as a hard drive is not responding.
RAID failure
An error condition that requires use of the Windows Disk Management tool to verify the status of the drives used in RAID.
RAID not found
An error condition that sometimes occurs with a power failure or surge, misconfiguration in BIOS/UEFI, system upgrade, application upgrade, or new application installation.
bootable device not found
An error message indicating you should check the boot order. If the boot order is correct, the operating system needs to be installed or reloaded.
no OS found
An error that indicates that the operating system is corrupt, there is a problem with the boot device such as the hard drive, or the BIOS/UEFI settings are incorrect.
browser plug-in
An executable file downloaded to provide an enhanced browser feature or functionality.
fiber cable
An expensive network cabling made of plastic or glass fibers that carries data in the form of light pulses. It handles the greatest amount of data with least amount of data loss, and it comes in single mode and multi-mode. Also known as optical cable and fiber-optic cable.
.sh
An extension used with a shell script or a text file that has a sequence of commands for a Unix-based system.
SPD (serial presence detect)
An extra EEPROM feature that allows the system BIOS to read the EEPROM (which contains memory information such as capacity, voltage, error detection, refresh rates, and data width) and adjusts motherboard timing for the best CPU-to-RAM performance.
Panel
A part of a Linux GUI and similar to macOS, Panel is a menu bar at the top of the screen containing contextual information on the left side and static information on the right side.
RAW volume
A part of a hard drive that has been set aside as a volume but has never been high-level formatted and does not contain a specific type of file system.
punchdown block
A part of a network or phone cabling system that allows a wire to be attached and firmly secured into the block using a punchdown tool.
tractor feed
A part of an impact printer used to move fanfold paper through the printer; the paper has holes on each side.
end-user acceptance
A part of change management in which the person who will use an IT system tests the changes to ensure that the deliverables or outcomes have been met.
risk analysis
A part of change management in which the risks of the proposed changes are weighed against the benefits.
data plane
A part of software-defined networking that is involved with moving data from one location to another. Contrast with control plane.
DC jack
A part on a laptop where the external power brick attaches.
I/O shield
A part that allows for optimum air flow and grounding for the motherboard ports.
eSATA bracket
A part that installs into an empty expansion slot that has one or more eSATA ports. Each port on the bracket has a SATA cable that attaches to an available motherboard SATA port.
port replicator
A part that is similar to a docking station that attaches to a laptop computer and allows more devices, such as a monitor, keyboard, and mouse, to be connected.
phone filter
A part used with DSL internet connectivity that must be attached to every phone outlet and used to connect a traditional analog device.
SSID not found
A particular SSID not being found in the list of wireless networks, which could be because the wireless router/AP has been configured to not broadcast the SSID, and it has to be entered. Alternatively, the device might be out of range of the wireless network.
external storage device
A peripheral that attaches to a computer that is used for saving data.
flatbed scanner
A peripheral used to digitize photos and texts.
printer
A peripheral used to output text and/or graphics onto paper.
administrator
A person responsible for setting up and maintaining a system, such as a Windows computer. Logging in as an administrator allows settings to be changed that may not be allowed for other users.
attitude
A person's behavior and/or mindset toward another person or a thing.
imaging drum
A photosensitive drum inside a toner cartridge that attracts laser toner particles.
hard token
A physical device used to gain access to a resource such as a file or company.
equipment lock
A physical or electronic lock, a special cable that cannot be removed without a tool, or a lock-in device for a port.
key
A physical security measure that can be a physical metal key or an electronic key.
print driver
A piece of software that coordinates between the operating system and the printer.
patch
A piece of software that fixes a specific problem in an application or operating system.
operating system (OS)
A piece of software that loads a computer and makes it operational.
dead pixel
A pixel on an LCD monitor that does not illuminate. Displays commonly have one or more dead pixels.
standoff
A plastic connector on the bottom side of a motherboard.
jumper
A plastic cover for two metal pins on a jumper block.
scribe
A plastic tool that helps with prying plastic parts or covers off laptop and mobile devices.
MAM (mobile application management)
A platform used to manage apps on mobile devices so that new apps can be pushed out, older apps updated, and new features or security measures added.
SATA (Serial ATA)
A point-to-point architecture for IDE devices that provides faster access for attached devices.
private IP address
An IP address used inside a home or business that is not allowed to be transmitted across the internet. Contrast to a public IP address.
VA (vertical alignment)
An LCD panel technology that provides wide viewing angles, good color, and high contrast.
TCP (Transmission Control Protocol)
An OSI model Layer 4 standard that ensures reliable communication between two devices.
Ethernet port
An RJ45 port that connects a device to a wired network.
malicious app
An illegitimate piece of software that could install a virus or ransomware, that could be spyware, and that could disrupt normal usage.
fake security warning
An illegitimate warning that may come through the operating system or a web browser. Do not tap, call, or reply to one of these.
burn-in
An image imprint, or ghost image on a display screen when an LCD or plasma display has been left on too long.
punchdown tool
An implement that is used to terminate cable on a patch panel.
written communication
An important skill for a person in IT to have, especially when communicating with others and documenting IT issues/processes.
phone skills
An important skill set for technicians when talking to users and supporting them over the phone.
high sensitivity of thermal paper
Thermal paper is affected by heat and requires special handling. Store thermal paper in a cool setting as it is highly sensitive to heat.
component/RGB video
Three RCA jacks commonly found on TVs, DVD players, and projectors. One connection is for luminescence (or brightness), and two jacks are for color difference signals.
jailbreak
To compromise the operating system of an iOS mobile device so the user has an increased level of privilege.
Dock
The shortcut organizational bar used for launching, switching, and managing applications in the macOS graphical user interface (usually the bar at the bottom of the screen).
grinding noise
The sound that a fan on a motherboard, case fan, hard drive, optical drive, or printer could make due to something getting caught in it, lack of oil, improperly inserted disc, or starting to fail. For a printer, check gears, torn paper, paper clips, staples, or labels along the paper path.
boot process
The specific order a device goes through to power up, locate an operating system, and automatically load services and applications.
imaging process
The stages a laser printer goes through to get an image on the page: processing, charging, exposing, developing, transferring, fusing, and cleaning.
Start screen
The standard look of Windows 8 that has tiles instead of icons, like the traditional Windows desktop. Windows 8.1 has both the traditional desktop and a Start screen.
DHCP scope
The starting IP address and ending IP address for a pool of addresses to be issued to network end devices.
root directory
The starting place for all files on a disk. A hard drive is limited to 512 entries. The designation for a hard drive's root directory is C:\.
Terminal
The terminal emulator for macOS and Linux that allows command-line interface (CLI) access to the operating system. Certain tasks or functions are not GUI-friendly, and CLI commands are required.
3G,
The third generation of wireless cellular technology, which allowed mobile devices to have faster internet connectivity.
warranty
The time during which a particular piece of hardware is guaranteed by the manufacturer.
standard format
The type of drive formatting done through the drive installation process. Contrast with a low-level format.
AC (alternating current)
The type of electrical power from a wall outlet.
DC (direct current)
The type of power a computer needs to operate.
dash
The universal search tool built in the macOS Launcher bar. It searches local content as well as internet sources, all of which can be enabled or disabled simply by opening up Dash.
convergence
The use of a traditional data network for another type of traffic, such as voice and video traffic (which used to have networks of their own).
biometrics
The use of one or more devices that can authenticate someone based on one or more physical traits, such as a fingerprint, an eyeball (retina), or a hand, or a behavioral trait such as voice or signature.
email filtering
The use of security rules specific to email that process incoming messages before forwarding on to a specific user.
115V vs. 220V input voltage
The voltage level accepted from an electrical outlet. Some power supplies accept 120V (listed as 115V on the certification), and others accept 220V power from an electrical outlet.
orientation
The way in which a document or screen is presented: portrait vs. landscape.
bandwidth
The width of a communications channel, which defines the channel's capacity for carrying data.
blue screen or blue screen of death
See BSOD.
screened subnet
See DMZ (demilitarized zone).
HT
See Hyperthreading (HT).
interrupt
See IRQ (interrupt request).
Microsoft Management Console
See MMC (Microsoft Management Console) or mmc.
Windows Defender Antivirus
See Microsoft Defender Antivirus.
network interface card
See NIC (network interface card).
MSRA (Microsoft Remote Assistance)
See Remote Assistance.
SPDIF (Sony-Phillips Digital Interface Format)
See S/PDIF.
Serial ATA
See SATA (Serial ATA).
Secure Sockets Layer
See SSL.
shielded twisted pair (STP)
See STP (shielded twisted pair).
User Account Control
See UAC (User Account Control).
USB-C
See USB Type-C.
failure to boot
A Windows condition that may require operating system repair or reloading.
nslookup
A Windows troubleshooting command that displays network domain names and their associated IP addresses.
broadcast address
An IP address that communicates with all devices on a particular network.
relational operator
An operator that compares one side of an expression to another and that is used in scripts.
User State Migration Tool
See USMT (User State Migration Tool).
unshielded twisted pair
See UTP (unshielded twisted pair) and see also twisted pair cable.
Windows Resource Protection
See WRP (Windows Resource Protection).
Windows Recovery Environment
See WinRE (Windows Recovery Environment).
AUP
See acceptable use policy (AUP).
mantrap
See access control vestibule.
driver
See device driver.
echo image
See double image.
grounding
See equipment grounding.
optical cable
See fiber cable.
GB
See gigabyte.
dot matrix printer
See impact printer.
poor wireless connectivity
See intermittent wireless.
KB
See kilobyte.
logon script
See login script.
MB
See megabyte.
mATX
See micro-ATX.
no internet connectivity
See no connectivity.
man-in-the-middle (MITM)
See on-path [attack].
OS
See operating system (OS).
CPU (central processing unit)
See processor.
microprocessor
See processor.
sluggish performance
See slow performance.
VM (virtual machine)
See virtual machine.
WAP (wireless access point)
See wireless access point.
USB Permissions
A BIOS/UEFI Setup option used to modify parameters such as USB speed options and the number of ports to enable/disable.
GDPR (General Data Protection Regulation)
A European Union (EU) security standard developed to protect individuals and firms within the EU.
IP (Internet Protocol)
A Layer 3 protocol that is part of the TCP/IP protocol suite.
power supply
A device that converts AC voltage into DC voltage that the computer can use to power all internal and some external devices.
ONT (Optical Network Terminal)
A device that converts light signals from a fiber connection into electrical for a copper connection.
inverter
A device that converts low DC voltage to high AC voltage for the backlight bulb in an LED display.
monitor
A device that displays information from a computer to a user.
zombie
A device that has been hacked and is controlled by someone else or that carries out malicious tasks.
Automatic Updates
A method for getting newer Windows operating system files.
equals operator
A method in scripting that is used to compare two values. Another name for comparison operator or equality operator.
802.11a
An IEEE wireless standard that used the 5 GHz range and had speeds up to 54 Mb/s.
802.11n
An IEEE wireless standard that uses both the 2.4 and 5 GHz ranges and that supports speeds up to 600 Mb/s.
802.11ac (Wi-Fi 5)
An IEEE wireless standard that uses the 5 GHz range and supports speeds up to 4.9 Gb/s.
virtualization support
A BIOS/UEFI option that allows virtualization to be enabled on a computer that has the hardware and an operating system that supports virtualization.
Drive Encryption (BIOS)
A BIOS/UEFI setting that scrambles all the data on the hard drive as a security measure.
Intrusion Detection/Notification
A BIOS/UEFI setting, also known as Chassis Intrusion, that allows for notification when the computer cover is removed.
Boot Password
A BIOS/UEFI setup option used to access the computer before the operating system loads.
ICMP (Internet Control Message Protocol)
A Layer 3 protocol used for troubleshooting network connectivity. Commands that use ICMP include ping, pathping, and tracert.
UDP (User Datagram Protocol)
A Layer 4 connectionless standard that applications use to communicate with a remote device.
mkdir
A Linux (and Windows) command used to make a directory.
msinfo32
A Windows command used to bring up the System Information window from a command prompt. The System Information window contains details about hardware and hardware configurations as well as software and software drivers.
mstsc
A Windows command used to control and use a remote computer that brings up the Remote Desktop Connection utility.
cipher
A Windows command used to decrypt, modify, or copy an encrypted file.
rd
A Windows command used to remove a directory (folder).
bootrec
A Windows command used to repair and recover from hard drive problems.
keyboard port
A DIN connector on the motherboard into which only the keyboard cable must connect.
mouse port
A DIN connector on the motherboard that should accept only a mouse cable.
Boot Options
A BIOS configuration setting that prioritizes devices in the order in which the computer looks for boot files, known as the boot drive order, boot sequence, or boot menu.
LoJack (BIOS option)
A BIOS setting option that controls locating the device, remotely locking the device, remotely deleting data, and displaying an "if lost" message.
Fan Control
A BIOS/UEFI Setup option used to control the configuration of case and/or CPU fans, including the ability to place the fans in silent mode and/or control speed.
dism
(Deployment Image Servicing and Management)$ A Windows utility used to repair and prepare Windows images.
exabyte (EB)
1 billion times 1 billion bytes, or (1,152,921,504,606,800) bytes.
miniPCIe
A 52-pin expansion slot or card used in mobile devices.
Wake on Ring
A BIOS and adapter feature that allows a computer to come out of sleep mode when the telephone rings, so the computer can accept faxes, emails, and so on when the user is absent.
Wake on LAN
A BIOS and adapter feature that allows a network administrator to remotely control power to a workstation and allows a computer to come out of the sleep mode.
GRUB (Grand Unified Boot Loader)
A Linux boot loader that generally replaces the earlier LILO boot loader. It contains all information about how a disk is organized, such as the size and layout of partitions. The latest version is called GRUB2.
updatedb
A Linux command that updates the file database.
man
A Linux command, short for manual, that can be used with another command to bring up an instruction manual for using the other command.
shutdown
A Linux/Unix and Windows command to shut down or restart the system, depending on the options used.
ps
A Linux/Unix command that lists all current processes.
passwd
A Linux/Unix command to set or change a user password.
Finder
A Mac application that is used for navigating and managing files or folders in the file system. It is similar to Microsoft's Windows Explorer/File Explorer.
indexing
A Microsoft Windows configurable feature that allows quick searches for files and folders.
Compatibility Mode
A Microsoft Windows mode used to emulate older operating systems so that older applications or hardware can be used on a newer operating system.
BitLocker To Go
A Microsoft application that can encrypt and password protect external drives and removable media that are 128 MB or larger.
Windows 11
A Microsoft operating system that has a centered taskbar, integrated Android apps, widgets, and better security than prior OSes.
Windows 10
A Microsoft operating system that was released after Windows 8/8.1.
RDP (Remote Desktop Protocol)
A Microsoft protocol used for accessing and controlling networked computers and mobile devices. RDP uses port 3389.
group policy editor
A Microsoft snap-in that is used to control various Windows functions, apps, and what specific groups are allowed to do and deploy security settings.
DirectX
A Microsoft technology that integrates multimedia drivers, application code, and 3-D support for audio and video.
Windows Update
A Microsoft tool that initiates a connection to Microsoft and download/install modified files to revise the current operating system.
BitLocker
A Microsoft utility that encrypts an entire disk volume, including operating system files, user files, and paging files. The utility requires two disk partitions at a minimum.
SCSI (Small Computer System Interface) cable
A Serial Attached SCSI (SAS) drive cable that attaches from the SAS drive to a SATA controller that is capable of supporting a SAS drive.
USB-PD
A USB power delivery standard that allows up to 20V at 5A for 100 watts of power. The standard has five levels of power: 10W, 18W, 36W, 60W, and 100W.
PD (Power Delivery)
A USB standard that allows up to 20V at 5A for 100 watts of power. The standard has five levels of power: 10W, 18W, 36W, 60W, and 100W.
macOS
A Unix-based operating system that was developed by Apple, Inc., for its Macintosh line of computers, called Mac for short. macOS is the second-most-commonly used desktop operating system behind Windows and is the most-used type of Unix/Linux-based desktop operating systems.
Windows Storage Spaces
A Windows 8/10 technology that allows the combination of different types of storage devices into one writable space.
Storage Spaces
A Windows 8/10 technology that makes it possible to combine different types of storage devices into one writable space.
refresh (installation method)
A Windows 8/8.1 tool that reinstalls the operating system but keeps user data and settings. Windows 10 uses Reset This PC for this purpose.
live tile
A Windows 8/8.1/10 feature that allows the content within to change, such as a news headline feed.
Sync Center
A Windows Control Panel area used to synchronize files between computers.
Devices and Printers
A Windows Control Panel that is used to view, install, remove, and manage wired and wireless devices. Current version of Windows can use the Devices settings link.
Print Management
A Windows administrative tool used to manage printers. Use the Print Management administrative tool from the System and Security Control Panel or use the printmanagement.msc command.
Windows Defender
A Windows application that detects spyware.
NTLDR is missing
A Windows boot error condition in which the operating system needs to be reinstalled.
tree
A Windows command that shows a directory and file structure, depending on the option used.
dxdiag
A Windows command to access DirectX software that helps resolve DirectX display and sound driver problems.
MMC (Microsoft Management Console) or mmc
A Windows container for management tools. Also known as the Computer Management console. It holds tools such as Device Manager, Disk Management, Local Users and Groups, Event Viewer, Task Scheduler, Performance, Shared Folders, and Services. mmc is also the command used from a command prompt to open the Microsoft Management Console.
UAC (User Account Control)
A Windows dialog box that asks permission to do something that might be harmful or change the operating system environment. Some changes require an administrator password to continue.
EFS (Encrypting File System)
A Windows encryption feature in which only the authorized user may view or change a file encrypted with EFS.
failed attempts
A Windows feature that locks out a user after a specific number of failed login attempts.
Resource Monitor
A Windows graphic tool that shows performance for the main system components.
Task View
A Windows icon that allows a user to create multiple desktops and switch between them.
restore (installation method)
A Windows installation method that takes the operating system back to a previous point in time.
tracert
A Windows network troubleshooting command that displays the path a data packet takes through a network, thus allowing you to see where a fault occurs in a network. A similar command, traceroute, is used in macOS and Linux.
Safe Mode (Windows)
A Windows option used when a computer stalls, slows down, does not work properly, or has improper video settings or intermittent errors or when a new hardware/software installation causes problems. In Safe Mode, Windows starts with minimal device drivers and services.
service
A Windows process that provides a specific function to the computer.
Device Manager
A Windows program that is used to view and configure hardware.
disable guest account
A Windows security best practice.
graphical interface fails to load
A Windows startup problem in which startup files are missing or corrupt or there are hardware problems.
PowerShell
A Windows technology that helps technicians and network administrators automate support functions through the use of scripts and snippets.
Shadow Copy
A Windows technology used with the System Restore program that uses a block-level image instead of monitoring certain files for file changes.
system volume
A Windows term describing the storage space that holds Windows operating system files used to boot the computer.
boot volume
A Windows term describing the storage space that holds the majority of the Windows operating system files. Can be the same volume as the system volume (which holds the Windows boot files).
basic disk
A Windows term for a drive that has been partitioned and formatted.
basic storage
A Windows term for a partition. Contrast with dynamic storage.
dynamic disk
A Windows term for a volume that can be resized and managed without rebooting.
simple volume
A Windows term for the storage unit that contains the files needed to load the operating system. The system volume and the boot volume can be the same unit.
Optimize and Defragment
A Windows tool accessed with the Defragment button or by using the defrag command. It is used to put files in contiguous clusters on the hard drive for better performance.
File History
A Windows tool that backs up a specific user's libraries instead of the entire system and supports scheduling these backups.
Error Checking
A Windows tool that checks a drive for file system errors, bad hard drive sectors, and lost clusters.
Computer Management
A Windows tool that displays a large group of tools on one screen.
Performance Monitor
A Windows tool that monitors resources such as memory and CPU usage and that allows the creation of graphs, bar charts, and text reports.
Event Viewer
A Windows tool that monitors various events in a computer.
Local Users and Groups
A Windows tool used to create and manage accounts for those who use the computer or computer resources from a remote network computer. These accounts are considered local users or local groups and are managed from the computer being worked on. In contrast, domain or global users and groups are administered by a network administrator on a network server.
Disk Management
A Windows tool used to partition and manage hard drives.
Remote Assistance
A Windows tool used to remotely access a Windows device. The remote computer displays a prompt requesting permission for remote access. Contrast with Remote Desktop, which does not request permission.
Remote Desktop Connection
A Windows tool used to remotely access a Windows-based device that does not require someone to be at that computer and does not prompt for permission.
System File Checker (SFC)
A Windows tool used to verify operating system files.
Shared Folders
A Windows tool used to view shares and sessions and to open files.
Certificate Manager
A Windows tool used to view, modify, import, export, or delete a digital security certificate.
USMT (User State Migration Tool)
A Windows tool used when deploying a large number of Windows computers.
virtualization workstation
A computer that has multiple operating systems in a virtual environment in which one operating system has no interaction with the other operating system; they are independent of one another.
unprotected system
A computer that has no antivirus/anti-malware software installed and/or that has the firewall disabled.
audio/video editing workstation
A computer used to create and modify sound or video files. The computer commonly has multiple powerful multicore processors, maximum system RAM, specialized video and audio cards, one or more fast and large-capacity hard drives, good speakers, a high-quality mouse, dual displays, and possibly a digital tablet and scanner.
overvoltage
A condition in which the AC voltage is above the rated amount of voltage.
faded print
A condition that arises due to inadequate ribbon, ink level, or toner. Check quality settings. In a thermal printer, reduce the print head energy or print head pressure setting.
undervoltage
A condition that occurs when AC power drops below 100 volts, which may cause the computer's power supply to draw too much current and overheat.
system lockout
A configuration setting used to prevent unauthorized access when a security method is not successful (for example, incorrectly entering a password three times).
USB-to-Ethernet converter
A connector cable with a USB plug and an Ethernet end.
front panel connector
A connector found on the motherboard that can have a cable that attaches from the motherboard to the front panel of the computer.
port
A connector located on a motherboard or on a separate adapter.
mSATA
A connector type used for SSDs on desktop motherboards, laptops, and mobile devices.
BNC connector (Bayonet Neill-Concelman connector)
A connector used on coaxial cable.
plastic filament
A consumable supply that a 3-D printer needs for printing.
ink cartridge
A container that holds the ink and the nozzles for an inkjet printer. Also known as a print cartridge.
kernel panic
A critical system error that the operating system cannot recover from. When this happens in macOS, the Mac reboots to return to a stable state.
network protocol
A data communication language.
WPA (Wireless Protected Access)
A data encryption program that uses Temporal Key Integrity Protocol (TKIP) or Advanced Encryption Standard (AES) to improve security.
mouse
A data input device that moves the cursor or selects menus and options.
data cap
A data limit imposed by an internet service provider, usually based on a contract.
file system
A data structure that defines how data is stored on a drive. Examples of file systems include FAT16, FAT32, exFAT, and NTFS.
selection
A decision structure that consists of a test condition together with one or more groups (or blocks) of statements. The result of the test condition determines which block of statements will be executed.
Documents
A default Windows folder where files are saved.
forward compatibility
A design feature in software that enables a system to accept input intended for a later version.
POSIX (Portable Operating System Interface)
A designation that meets the specifications of a standardized operating system outlined by the IEEE Computer Society, containing a Bourne shell and other standard programs and services.
high availability
A desired network feature where the network is available to be used 99.999% of the time.
shortcut
A desktop icon with a bent arrow in the lower-left corner. It is a link to a file, a folder, or a program on a disk. If the file is a document, it opens the application used to create the document.
print server
A device (a computer or a separate device) that connects to a printer used by multiple people through a network.
hole punch
A device or feature on a printer that puts holes in paper. Check if paper that has been hole punched is being misfed or if the chaff from hole-punched paper is causing an issue.
keyboard
A device that allows a user to provide input to a computer.
Wi-Fi antenna
A device that attaches to a WLAN card to receive or transmit wireless signals.
multifunction device
A device that can print, copy, scan, and sometimes act as a facsimile (fax) machine.
smart card reader
A device that can read flash media. Also called a multi-card reader. It can also be a device used to read the embedded chips in smart cards.
AC circuit tester
A device that checks a wall outlet's wiring.
modem (modulator/demodulator)
A device that connects a computer to a phone line or that connects computers and mobile devices to broadband, wireless, Wi-Fi, Bluetooth, or satellite networks.
wireless broadband
A feature available from service providers that allows USB modems, mobile data cards, or integrated laptop connectivity to have the capability to receive, create, and communicate internet information within a specific coverage area.
Back to My Mac
A feature in the System Preferences iCloud menu that enables you to browse a Mac from another macOS device. The remote Mac appears as a shared device in Finder, enabling you to browse the file system.
folder redirection
A feature of Microsoft Active Directory that maps a folder on the local machine to a network location such as a server so the user has access to the folder from any device on the network domain.
connection oriented
A feature of TCP that creates a connection to a destination before data is sent and allows for packets to be re-sent. Examples of application layer protocols that are connection oriented are HTTP, HTTPS, and SSH.
connectionless
A feature of UDP protocols that makes data transfers faster but that allows packets to be dropped and not re-sent. Examples of application layer protocols that are connectionless are DHCP and TFTP.
S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology)
A feature that allows a storage device to send messages about possible failures or data loss. This configuration setting is located in the BIOS/UEFI.
iSCSI
A fiber standard used to connect a storage area network (SAN) to the other network devices.
.ps1
A file extension used for a PowerShell script.
.py
A file extension used for a Python script.
.js
A file extension used with JavaScript files.
.bat
A file extension used with a batch file (a file that has multiple commands that, when executed, run one after another). See also batch file.
text file
A file in which each byte represents one character of ASCII code. Scripts are all text files.
FAT16
A file system supported by DOS and all Windows versions since DOS. DOS and Windows 9x have a 2 GB limit. Newer Windows operating systems have a 4 GB FAT16 partition size limit. Also known as FAT.
FAT32
A file system that supports hard drives up to 2 TB in size.
FAT file system
A file system type also known as FAT16.
exFAT
A file system type that improves upon FAT32 by having a theoretical maximum file size of 16 EB, maximum volume size of 64 ZB (but 512 TB is the current limit), smaller cluster sizes than FAT32, and an increased number of files allowed in a directory. Created for external storage media such as flash drives and hard drives for saving images/video.
ext3 (Third Extended File System)
A file system type used in Linux-based operating systems that introduced journaling.
ext4 (Fourth Extended File System)
A file system type used in Linux-based operating systems that supports larger volumes and file sizes than ext3.
system file
A file that is needed to allow a computer to boot. Also known as a startup file.
executable file
A file with a .bat, .exe, or .com extension that starts an application, a utility, or a command. It is a file on which the operating system can take action.
swap partition
A file, also known as a paging file, that acts as a memory overflow and allows secondary storage to let programs exceed the size of available physical memory by using hard drive space as memory.
Type C fire extinguisher
A fire extinguisher that can be used only on electrical fires.
end-user education
A great security method to use because by educating users, security issues get reported and dealt with earlier and with less damage to a company. Part of a technician's job might be to teach a user how to do something to avoid technical issues or to prevent security issues.
LAN (local area network)
A group of devices sharing resources in a single area, such as a room or a building.
change board
A group of individuals who approve IT projects within an organization.
service pack
A group of upgrades or patches provided by Microsoft for an operating system.
extended partition
A hard drive division.
fileshare server
A high-end computer configured to store files that can be accessed and managed from a remote location.
fiber network
A high-speed, high-capacity computer network composed of fiber-optic cables.
private network
A home or corporate network that uses private IP addresses that are not allowed to be routed on the internet but that are translated at the network border into public addresses using a process called NAT.
door lock
A keyless entry option for a smart home that allows keyless entry. It is also important to have a door lock of any type on a room that holds network infrastructure equipment such as routers and switches.
laser printer maintenance kit
A kit that may include a separation pad, pickup roller, transfer roller, charge roller, and fuser assembly, depending on the vendor.
PCL (Printer Control Language)
A language that uses printer hardware to do the translation between the printer and the computer.
PDL (Page Description Language)
A language unique to a printer that allows communication between the computer and printer and handles the overall page look of a document.
exposing
A laser printer imaging process in which light is directed toward the drum to put 1s and 0s on the drum surface. Light hitting the drum changes the drum surface voltage.
transferring
A laser printer imaging process in which the toner (image) moves from the drum to the paper.
developing
A laser printer process in which toner is attracted to the laser printer drum.
charging
A laser printing imaging process that can also be known as conditioning. This process gets the drum ready for use by applying a uniform voltage on the drum surface by using a primary/main corona or a conditioning roller.
cleaning
A laser printing imaging process that involves removing residual toner from the drum by using a wiper blade or brush.
processing [laser printing]
A laser printing process in which data is converted from the printer language into a bitmap image. This process is also known as raster image processing.
fusing
A laser printing process in which toner is melted into the paper.
non-parity
A less expensive type of memory chip that does not perform error checking.
motherboard LED
A light on a motherboard that is used in troubleshooting. Common LEDs include those for the CPU, boot or drive, VGA or video, and RAM or DRAM.
drive activity LED
A light on the front of a hard drive that blinks when data is being retrieved or written.
inventory list
A list of assets input into an inventory management system or database that can be viewed or printed to see specific details on hardware and/or software maintained by a company.
Recycle Bin
A location in Windows-based operating systems in which user-deleted files and folders are held. This data is not discarded from the computer until the user empties the Recycle Bin.
repetition
A loop structure, in which a loop contains a block of statements that is executed repeatedly.
brownout
A loss of AC power due to overloaded electrical circuits.
DDR5 (Double Data Rate 5)
A lower-voltage memory module that requires a DDR5 motherboard memory expansion slot.
Launchpad
A macOS application launcher shortcut.
System Preferences
A macOS basic management and troubleshooting tool, equivalent to Control Panel/Settings utilities in Windows. It contains most of the system settings, such as desktop backgrounds and screen savers, as well as more advanced settings, such as user accounts and file sharing. Third-party applications can also insert their own preferences menu into the System Preferences menu.
locate
A macOS command that searches for a file in a database of paths. Commonly used subsequently to update, which is a command used to update a local database on the system that contains the full pathname of each file.
spinning pinwheel
A macOS error indication that can indicate a lack of response from the hard drive and/or a particular application.
screen sharing
A macOS feature that allows one user to view and even control the display of another Apple computer that is on the network.
iWork
A macOS office productivity suite that includes a word processor, a spreadsheet, and presentation applications.
Spotlight
A macOS universal search tool that can locate every file and directory and also search email, contacts, music, and even the web.
Mission Control
A macOS utility that gives an overview for managing all application windows and virtual desktops.
System Information
A macOS utility that provides an overview of the Mac, including basic diagnostic information such as installed hardware, software, and network settings.
non-compliant system
A machine that does not meet security policy requirements and that could be a potential security threat.
replace the toner cartridge
A maintenance or repair process for a laser printer.
replace the ribbon
A maintenance or repair process for an impact printer.
replace an ink cartridge
A maintenance or repair process for an inkjet printer.
replace paper [impact]
A maintenance process in which paper is inserted into the paper tray, threaded into the printer, or threaded onto a sheet feeder for fanfold paper.
replace the print head [impact]
A maintenance process in which the part that holds all the pins used to press against the ribbon is replaced.
replace paper [thermal]
A maintenance process in which the technician must ensure that the proper size and type of thermal paper are used and thread the paper through the rollers as directed by the manual or an image on/inside the printer.
clean the heating element
A maintenance process task for a thermal printer.
remove debris
A maintenance process task for a thermal printer.
calibrate (laser printer)
A maintenance task that involves adjusting for print density.
clean a laser printer
A maintenance task that involves vacuuming inside a laser printer using a special vacuum bag.
DB9
A male port on older motherboards, networking equipment, and projectors. Also known as a serial or RS-232 port.
SMB (Server Message Block)
A means of providing access to shared network devices and files. SMB uses port 445.
SSH (Secure Shell)
A means of securing data communication, including remote connectivity of devices and file transfers. SSH uses port 22.
tethering
A means of sharing internet connectivity among mobile devices in the area. It is a form of hotspot.
lumens
A measure of light output or brightness; how much visible light is coming out of equipment such as lamps, lighting equipment, or projectors.
wattage rating
A measure used to determine whether a power supply is powerful enough to support the devices within a computer.
ohm
A measurement of electrical resistance.
IOPS (input/output operations per second)
A measurement of hard drive speed for both magnetic drives and SSDs that takes into account sequential reads/writes and random reads/writes.
bps (bits per second)
A measurement of speed.
power rating
A measurement, expressed in watts per channel, that represents how loud the speaker volume can go without distorting the sound.
power
A measurement, expressed in watts, that represents how much work is being done.
resistance
A measurement, in ohms, of how much opposition is applied to an electrical circuit.
fan
A mechanical cooling device attached to or beside a processor or in a computer case.
speaker
A mechanical device that produces acoustic sound and that may be internal or external to a computer or mobile device.
DDR3 (Double Data Rate 3)
A memory module that is an upgrade from DDR2 for speeds up to 1,600 MHz that better supports dual-core and quad-core processor-based systems.
laptop RAM
A memory module that is normally in the SODIMM form factor.
DDR4 (Double Data Rate 4)
A memory module that operates at a lower voltage and faster speeds than DDR3 and lower modules.
quad-channel
A memory type in which a motherboard can access four memory modules simultaneously.
context menu
A menu of options usually available from the main menu that is brought up by right-clicking an item.
desktop alert
A message that appears relating to the system or notifications chosen by the user or a security-related message regarding a problem or potential threat.
heat sink
A metal device for cooling a processor by conducting heat to its fins or bars. Convection then transfers the heat away by flowing air through the case.
USB expansion card
A metal plate that has one or more USB ports and a cable that connects to the motherboard. The metal plate fits in a slot that a normal card in an expansion slot would take.
HyperTransport
AMD's I/O architecture in which a serial-link design allows devices to communicate in daisy-chain fashion without interfering with any other communication. Thus, I/O bottlenecks are mitigated.
Kb
Abbreviation for kilobit.
domain access
Access to an account or a device onto a Microsoft corporate network.
user profile
All settings associated with a specific user, including desktop settings, network configurations, and applications that the user has access to. A user profile is part of the registry.
Data Sources
Also called Data Sources ODBC (open database connectivity), a programming interface that allows applications to access data from a database.
RAID 0
Also called disk striping without parity, a type of RAID that enables data to be alternatively written on two or more hard drives but be seen by the system as one logical drive. RAID level 0 does not protect data if a hard drive fails; it only increases system performance.
print spooler
Also known as a print manager, a software program that intercepts a request to print and sends print information to the hard drive, from which it is then sent to the printer whenever the processor is not busy with other tasks. A print spooler allows multiple print jobs to be queued inside the computer so that other work can be performed.
wireless card
Also known as a wireless NIC, an electronic device that allows wireless network connectivity.
heat spreader
Aluminum or copper fittings on memory modules used to dissipate heat.
MIMO (multiple input/multiple output)
An 802.11n wireless technology in which multiple antennas operate cooperatively to increase throughput on a wireless network.
T568A
An ANSI/TIA/EIA Ethernet network cabling standard.
T568B
An ANSI/TIA/EIA Ethernet network cabling standard.
organizational unit (OU)
An Active Directory container that groups users, groups, accounts, or even other OUs in order to subdivide administrative duties.
security group
An Active Directory type that makes it possible to apply group policy settings or permissions to any shared resource.
iCloud (offsite data storage and email option)
An Apple cloud-based service that comes with macOS, offering storage, application support, and syncing of contacts, photos, email, bookmarks, documents, and more between multiple macOS, iOS, and even Windows devices.
iOS
An Apple operating system for mobile devices.
Lightning port
An Apple port used to connect displays and external drives. Commonly used to connect Apple mobile devices like iPhones and iPads to host computers and USB battery chargers.
iTunes
An Apple program that allows users to play and manage music, books, movies, and lectures.
WPA2 (Wireless Protected Access 2)
An improvement over WPA that includes dynamic negotiation between the AP and the client for authentication and encryption algorithms. It is a common choice for securing wireless networks.
smoke
An indication of a power supply problem.
error message
An indication provided by a system or an application that should be noted to help in troubleshooting.
slow performance
An indication that a computer system is operating in a less-than-efficient manner. It could be caused by lack of hard drive space, inadequate memory, a poorly performing application, malware, or insufficient CPU cores/speed. For mobile devices, check battery power level, close apps that aren't being used, close services that aren't being used, connect to a Wi-Fi network, and move closer to the AP.
POST beep
An indication that a hardware error exists, such as an error in the CPU, motherboard, RAM, or or a stuck key. Look up the code for more information.
extended read/write time
An indication that a storage device is nearly full or in need of replacement because it takes longer than normal to retrieve and/or save data.
extremely short battery life
An indication that it may be time to replace the battery and also close apps and services that are not being used.
dim display
An indication to check display settings and the battery level. The display could require calibration.
touch pen
An input device that may be known as a stylus and that is used to provide input on a mobile device.
IDE (Integrated Drive Electronics)
An interface that evolved into the ATA (now PATA) standard and supports internal storage devices.
carriage belt
An internal inkjet printer part that moves the printhead.
splash screen
An introductory screen that appears on a device that may be required and that states the criteria for accessing the device or a particular service or website.
high network traffic
An issue on a mobile device that may prompt you to try moving to a different location and getting closer to the access point or using a different cellular area to get better performance.
no Bluetooth connectivity
An issue that could be helped by turning the device off and back on, checking for interference, ensuring that Bluetooth is enabled, and entering passkeys/PINs.
OS not found
An issue that occurs when the boot order in the BIOS/UEFI is incorrect, when the hard drive does not contain an operating system, or when there is an issue with the drive that contains the operating system being recognized by the computer.
OS fails to update [mobile]
An issue that requires a technician to be sure device is powered on and connected to Wi-Fi or a wired network; free up space; ensure that the device is still supported; turn off Bluetooth; reset the device and clear the cache and storage space; and restart the device or perform a factory reset.
Windows Explorer
An older Windows application used to view and manipulate files and folders that has been replaced with File Explorer.
legacy software
An older software program that might require an older OS to run or that does not run properly under a newer OS.
subscriber connector (SC)
An older type of fiber-optic connector that is square and doesn't have a push lever as part of the connector like the LC type, but it does snap into a socket.
GSM (Global System for Mobile Communications)
An older worldwide cellular network standard previously used in Europe and other places (and still used in some countries).
.NET Core
An open source managed computer software framework used for the cross-platform version of Windows PowerShell.
NFS (Network File System)
An open standard protocol used for sharing files across a network.
command-line interface
An operating environment that is not graphical and in which only typed commands are available.
internal hard drive partition (boot option)
An operating system boot option to boot from a bootable partition.
internal fixed disk (boot option)
An operating system boot option to boot from a partition on an internal hard drive.
external hard drive (boot option)
An operating system boot option when a USB or eSATA drive is used.
attribute
An operating system condition used to hide, archive, make a file read-only, or designate a file as a system file.
APFS (Apple File System)
An operating system developed and owned by Apple that is used on desktop computers and iPads. It uses GPT partitions and allows disk cloning.
icon
An operating system graphic that represents a file, an application, hardware, or shared network resources.
image deployment
An operating system installation method in which a system image is taken from an external drive, disc, or server and put on a computer.
system log
An operating system log that can be viewed when things go wrong. In Windows, Event Viewer is used to view system logs.
Chrome OS
An operating system supported by Google and Google partners that is used on laptops.
L3 cache
Any fast cache memory installed on the motherboard when both L1 and L2 cache are on the processor. Could also be located inside the processor housing.
Apple Macintosh OS
Any operating system on an Apple device, including OS X, iOS, and macOS.
PII (personally identifiable information)
Any personal data or method of identifying, locating, or contacting a particular person.
gigabyte
Approximately 1 billion bytes of information (exactly 1,073,741,824 bytes); abbreviated GB.
megabyte
Approximately 1 million bytes of data (exactly 1,048,576 bytes). Abbreviated MB.
terabyte (TB)
Approximately 1 trillion bytes of information, or 240 (1,099,511,627,776) bytes.
kilobyte
Approximately 1,000 bytes of information (exactly 1,024 bytes).
.. (navigation command)
At a Windows command prompt, a representation of the parent directory.
PVC (polyvinyl chloride)
Cable that has a plastic insulation or jacket that is cheaper and easier to install than plenum cable. It can have flame retardant added.
crossover cable
Cabling that connects two like devices (for example, two computers, two switches, two routers).
data at rest
Data that is stored in some location. Data at rest should be encrypted or password protected.
downstream
Describes information pulled from the internet, such as when viewing web pages or downloading a file.
upstream
Describes information that is sent to the internet, such as sending email or uploading a file to a server.
upward compatibility
Design of a software product such that it can accept input intended for a future version. Another name for forward compatibility.
incineration
Destruction by fire.
cd
The same as the chdir command in Windows. Used from a Windows or a Linux/macOS command prompt to move into a different directory.
full format
During an installation process to partition a hard drive, an option that identifies and marks bad sectors on the drive so they will not be used for data storage. Contrast with quick format.
quick format
During an installation process, a function used to prepare a hard drive partition but not identify and mark bad sectors so that they will not be used for data storage.
spam
Email that is unsolicited and comes from unknown people or businesses.
software incompatibility
Failure of a new application to work with an older operating system.
cache memory
Fast memory designed to increase processor operations.
L2 cache
Fast memory located inside the processor housing but not inside the processor.
L1 cache
Fast memory located inside the processor.
disable a service
In Windows, use the Services option from within the Computer Management console in order to disable a service that might be causing issues.
folder
In Windows-based operating systems, an electronic container that holds files as well as other folders. It is also called a directory.
MAN (metropolitan area network)
In a networking environment, a network that spans a city or town.
cloud services
Functions provided through a network on devices that are either remote or local but managed and configured through remote applications. Examples of cloud services include wireless networking, network switches, servers, printing, scanning, and file storage.
restart service
In Windows, to use the Services Computer Management tool to restart a service that has stopped responding.
variable
In scripting, the name of a storage location in the computer's internal memory. The value of the variable is the contents at that memory location. It is called a variable because the value can change (vary) as the program runs.
backward compatibility
In software, the ability of an application to run on older operating systems.
switch
In star networks, a Layer 2 central controlling device that looks at each data frame as it comes through each port.
pwd
In the Linux environment, a command that identifies the current working path.
battery not charging
In this situation, inspect the battery compartment. Try to charge with a different connector, such as a car adapter.
physical cabling issue [projector]
Inability of a projector to output from a particular source. This issue can be solved by checking all physical connections on both ends of the cable.
slow network speed
Increased time to transmit data from source to destination, resulting from network latency. For wireless networks, this is caused by obstructions such as objects, walls, weather, microwave, ovens, and devices/other wireless networks operating in the same unlicensed frequency range. For wired networks, it is typically caused by poor or faulty cabling or security issues.
extending partition (Disk Management)
Increasing the size of a partition by right-clicking on the drive letter and selecting Extend Volume.
audit log
Information saved on servers and printers that can be used when troubleshooting problems. On a printer or print server, this might be called a print log.
jitter
Irregular receipt of voice packets that is measured in seconds and can cause poor VoIP quality.
transport layer
Layer 4 of the OSI model, which determines the details of how data is sent, supervises the validity of the transmission, and defines the protocol for structuring messages.
session layer
Layer 5 of the OSI model, which manages communication and administrative functions between two network devices.
EULA (end-user license agreement)
Legal language that specifies what can and cannot be done with a particular software application or operating system.
licensing
Legitimately using a particular software package after purchasing or registering with the software provider.
preventive maintenance
Maintenance that is done to prolong the life of a device.
initializing (Disk Management)
Making a drive available to be used by right-clicking on a drive > Initialize Disk.
shrink (partition)
Making a hard drive section smaller. In the Disk Management tool, right-click the drive letter > Shrink Volume.
cryptominer
Malicious software code that uses a computer's processing power in order to do cryptomining of digital currency.
overclocking
Manually changing the front side bus speed and/or multiplier to increase CPU and system speed, but at the cost of increasing the CPU operating temperature. Overclocking a CPU may void the manufacturer's warranty.
mounting (Disk Management)
Mapping an empty folder on an NTFS volume by right-clicking on a partition or volume > Change Drive Letter and Paths > Add > Mount in the Following Empty NTFS Folder and either type the path or browse to an empty folder > OK > OK.
unbuffered memory
Memory that does not delay all data transfers by one clock tick to ensure accuracy as registered memory does. Used in low- to medium-powered computers.
SRAM (static random-access memory)
Memory that is faster but more expensive than DRAM. SRAM is also known as cache memory, or L1, L2, or L3 cache.
OneDrive
Microsoft's cloud storage solution.
dual-voltage memory
Motherboard memory modules that use less power and produce less heat if the motherboard supports this feature. Not all installed modules must support the lower voltage for the system to take advantage of the modules that do support the lower voltage.
twisted pair cable
Network cable made of eight copper wires twisted into four pairs. Can be shielded or unshielded.
STP (shielded twisted pair)
Network cable with extra foil to prevent outside noise from interfering with data on the cable.
taskbar
On a Windows program, the bar that runs across the bottom of the desktop and holds buttons that represent files and applications currently loaded into RAM. It also holds icons representing direct access to system tools.
gestures
On a touch device, finger motions (swipe, pinch, tap, spread, and so on) used to manipulate applications or features.
sequence
One of the three basic programming constructs, which means that code executes one instruction at a time, in the sequence the code is written.
construct
One of the three elements scientists in the 1960s showed are common to all programming code: sequence, selection (or decision), and repetition (or loops).
Standard user
One of the two basic types of Windows user accounts. By default, a Standard user cannot install most applications or change system settings. Contrast with an Administrator account, which has full control over a system.
special function key
One of the uppermost keys on a keyboard, which activate specific functions. Labeled , , and so on, these keys control things like sound level, screen brightness, and more.
regedt32.exe
One of two Windows registry editors. See also registry and regedit.
DRAM (dynamic random-access memory)
One of two major RAM types, which is less expensive but also slower than SRAM. DRAM requires periodic refreshing of the stored 1s and 0s.
MAC address (Media Access Control address)
One of two types of addresses assigned to network adapters, used when two devices on the same network communicate. Also known as a Layer 2 address.
security policy
One or more documents that provide rules and guidelines related to computer and network security.
command prompt
Otherwise known as a prompt or command-line interface (CLI), a text-based environment in which commands are entered.
special thermal paper
Paper sensitive to heat that is used with thermal printers, typically in retail establishments.
private cloud
Part of a company's network infrastructure located outside the business in a remote location. The company has responsibility for managing the software and hardware involved in a private cloud.
FSB (front side bus)
Part of the dual independent bus that connects the CPU to the motherboard components.
rights
Permissions granted or denied to files, folders, and network resources.
air filter/mask
Personal protective equipment that should be used whenever dust, airborne particles, or debris could cause personal issues. An air filter might also be used in an area where the air quality is not appropriate for a computer or networking equipment.
Windows Defender Firewall
Security software provided with Microsoft Windows that is used to allow or block network traffic based on rules.
Microsoft Defender Antivirus
Security software that is compatible with other antivirus products and is available in Windows.
boot sector
Previously called DBR or DOS boot record, a section of a disk that contains information about the system files (the files used to boot the operating system).
Remote Desktop Services
Previously known as Terminal Services, software on a server that can be used to deploy images to computers and to access, control, and manage remote computers and servers.
virtual printing
Printing to somewhere other than to the directly connected printer and to a specific file so that the information can be viewed, saved, emailed, or sent to another printer.
external interference
Problems that wireless devices and other networks can cause with wireless network connectivity and reception when using the same unlicensed frequency range.
adding array (Disk Management)
Right-click inside unallocated space of a drive > New Spanned Volume or New Striped Volume > select another drive to be added > select a drive letter and file system.
local security policy
Security rules that can be applied to a computer.
spoofing
Sending an Ethernet frame with a fake source MAC address to trick other devices into sending traffic to a rogue device.
rm
Short for remove, a Linux command that deletes a file or directory.
webcam
Short for web camera, a small camera used for communicating via video across the internet.
soft reset
Simply restarting a device. Contrast this to a hard reset, which is also called a factory reset.
service release
Software available from a manufacturer to fix a known problem (bug) in its applications program.
malware
Software code designed to damage an electronic device (that is, cause lockups or slowness, crash an app, cause the device not to run or boot, and more).
DHCP server
Software configured on a network server or router that issues IP addresses from its pool of numbers upon request to a network device.
keylogger
Software designed to capture keystrokes in an effort to collect user IDs and passwords.
firewall
Software or a hardware device that protects one or more computers from being electronically attacked. It inspects data for security purposes and filters traffic based on network protocols and rules established by a network administrator. Firewalls operate at the application layer of the OSI model.
IDS (intrusion detection system)
Software or hardware that is designed to detect potential security issues that could allow illegal entry to the computer or network. The IDS could log the incident and contact someone in order to prevent invasion.
open source
Software that allows vendors to use the core source code and gives them the ability to customize the software. Examples include Google Android and Linux.
password manager
Software that can potentially fill in web forms and that manages passwords for various websites.
spyware
Software that collects information without user consent, using keystroke logging, gaining access to saved documents, and recording internet activity. It results in unsolicited pop-ups and identity theft.
extensible software
Software that is easily upgraded.
bootleg app
Software that is pirated (has not been paid for).
compiled program
Software that must be turned into machine language before it can execute.
Setup
Software that tells a computer about itself and the hardware it supports, such as the amount of RAM memory, type of hard drive installed, current date and time, and so on.
hot fix
Software used to fix a particular software problem. Contrast with patch and service pack.
locator application
Software used to pinpoint where a mobile device can be found.
cellular location service
Software used to pinpoint where a mobile device is located.
local share
Something such as a printer, folder, or disc that has been made available across a network.
network boot
Sometimes called a Preboot Execution Environment (PXE) boot, where the system boots from a server that deploys an operating system image to a computer.
impact printer
Sometimes called a dot matrix printer, a type of printer that physically impacts a ribbon in order to place images on the paper.
impact paper
Special paper designed to withstand the pressure of images struck upon it in an impact printer printhead.
device driver
Special software that allows an operating system to access a piece of hardware.
HSM (hardware security module)
Specialized hardware that can be a USB device or a device on a network used for digital key management, storage/protection of cryptographic keys, encryption, and authentication that operates much like a TPM.
POST (power-on self-test)
Startup software contained in the BIOS/UEFI that tests individual hardware components.
off site storage
Storage of data and backups at a remote location or in the cloud.
on site storage
Storage of data and backups kept within a business.
unexpected app behavior
Strange behavior that could be caused by a free app, the OS version, a malicious app, or poorly written software.
DRM (digital rights management)
Technology used to implement controls placed on digital media.
port triggering
Temporarily sending data through a firewall, based on a preconfigured condition.
SMS (Short Message Service)
Text messaging, which can be used to provide a security code for authentication.
default gateway
The IP address of a Layer 3 device, such as a router, that is directly connected to its immediate network. It tells a device on its network where to send a packet destined for a remote network.
apt-get
The Linux command-line interface tool that is the equivalent of Ubuntu Software Center; a utility to manage software.
ReFS (Resilient File System)
The Microsoft replacement file system for NTFS.
system protection
The System section of the Control Panel > System Protection tab, which is used to set up and configure System Restore, manage restore points, and manage the amount of disk space used by System Restore.
defrag
The Windows command that starts the defragmentation process of reordering and placing files in contiguous sectors for better performance.
rapid elasticity
The ability for a provider to expand software and hardware quickly, in response to a customer's needs.
teamwork
The ability to work with others toward a common goal.
password security
The act of being conscientious about where passwords are written and stored.
piracy
The act of copying or distributing copyrighted software.
self-grounding
The act of placing a part of your body in contact with an electronic device to prevent an electrostatic discharge (ESD) event.
humidity
The amount of moisture in the air. The potential for an electrostatic discharge (ESD) event is higher when the humidity is low.
CL rating (column address strobe [CAS] latency rating)
The amount of time (number of clock cycles) that passes before the processor moves on to the next memory address. Chips with lower access times (CL rating) are faster than those with higher access times (larger numbers).
latency
The amount of time a packet takes to travel from source to destination. Use the tracert command to see the amount of latency.
DHCP lease time
The amount of time in minutes, days, or hours that a device that receives an IP address from a DHCP server gets to keep the address.
refresh rate
The amount of time it takes a screen to be drawn in 1 second, measured in hertz (Hz) or milliseconds (ms). In LCDs, the refresh rate is also called temporal resolution. LCD refresh rates are traditionally 60 Hz.
MTBF (mean time between failures)
The average number of hours before a device fails.
measured service
The capability to track cloud consumer usage and apply resources as needed, based on usage.
MDM (mobile device management)
The capability to view and manage multiple mobile devices.
system resources
The collective set of interrupt, I/O address, and DMA configuration parameters.
port mapping
The combination of one public address and a port number that represents one internal company host; also called port address translation (PAT).
toner
The combined particles in a laser toner cartridge that produce an image when fused onto paper. Toner is harmful if inhaled and messy if spilled.
Nautilus
The default file manager for the GNOME desktop in Linux systems.
PRL (preferred roaming list)
The default roaming list created by a cell network provider.
watt
The electrical measure in which computer power supplies are rated.
internal data bus
The electronic lines inside a processor.
external data bus
The electronic lines that allow a processor to communicate with external devices. Also known as an external data path or external data lines.
notification area (Windows)
The far-right area of the taskbar, which contains information about an application or a tool, such as security, network access, speaker control, and date and time.
5G
The fifth generation of cellular network technology that supports speeds up to 10 Gb/s.
.vbs
The file extension for VBScript files.
NTFS (New Technology File System)
The file system used with Microsoft operating systems today (starting with Windows NT). It enables encryption, compression, larger file sizes, and longer filenames.
effective permissions
The final permissions granted for a particular resource. Folder permissions are cumulative—the combination of the group and the person's permissions. The deny permission overrides any allowed permission set for a user or a group. When NTFS and shared folder permissions are both used, the more restrictive permissions become the effective permissions.
primary partition
The first detected drive partition on a hard drive that has been configured with a basic disk.
change management
The formal process of systematically choosing and implementing business changes.
system requirements (application)
The hardware and software required for an application to be installed.
kernel
The heart of an operating system, which acts as the controller and interpreter for nearly everything in a system so that hardware and software can interface and work together. It controls memory management, peripherals, and allocating other system resources to processes.
Intel Corporation
The largest processor manufacturer in the world. Intel also makes chipsets, motherboards, network cards, microcontrollers, and other electronic chips and components.
performance (virtual memory)
The level of operation of a computer, which is affected by the virtual memory settings that allocate specific hard drive space to be used when more applications and data are loaded than the amount of RAM installed.
Credential Manager
The location where Windows stores login credentials such as usernames, passwords, and addresses.
motherboard
The main circuit board of a computer. Also known as the mainboard, planar, or system board.
RAM limitation
The maximum amount of memory that an operating system can recognize. Even if a system has more RAM installed, the operating system will not be able to use that extra memory.
volt
The measurement for voltage.
cluster
The minimum amount of space that one saved file occupies.
DVI-I
The most common type of DVI video connector that is used with both analog and digital monitors.
UTP (unshielded twisted pair)
The most common type of network cable, which comes in different categories for different uses. See also twisted pair cable.
TCP/IP (Transmission Control Protocol/Internet Protocol)
The most widely used network protocol stack for connecting to the internet. Developed by the Defense Advanced Research Projects Agency in the 1970s, it is the basis of the internet.
CPU socket
The motherboard part where a processor inserts.
filename
The name of a file. In older operating systems, the filename was limited to 8 characters plus a 3-character extension. Today's operating systems allow filenames up to 255 characters.
b/s (bits per second)
The number of 1s and 0s transmitted per second.
native resolution
The number of pixels going across and down a flat panel monitor. This resolution is the specification for which the monitor was made and is the optimum resolution.
resolution
The number of pixels shown on a monitor or the output of a printer.
baud
The number of times an analog signal changes in 1 second. If a signal that is sent changes 600 times in 1 second, the device communicates at 600 baud. Today's signaling methods (modulation techniques, to be technically accurate) allow modems to send several bits in one cycle, so it is more accurate to speak of bits per second than baud.
CCFL (cold cathode fluorescent lamp)
The older flat-panel backlight technology used before LED backlights were used.
iPadOS
The operating system used on a Macintosh tablet (an iPad).
print bed
The part of a 3-D printer where an object is built.
memory
The part of a computer that temporarily stores applications, user documents, and system operating information.
desktop
The part of a graphical user interface that is between the user and the applications, files, and hardware. It is the area in which all work is performed.
fuser assembly
The part of a laser printer that melts the toner onto the paper.
feed assembly
The part of a printer responsible for taking the paper through the printer.
processing [scripting]
The part of a program involved in performing work or a task. Input and output are the other two parts of a program.
printhead
The part of an impact printer that holds the print wires and impacts the ribbon.
inkjet print head
The part of an inkjet printer that holds the ink reservoir and the spray nozzles and is easily replaced.
document changes
The part of change management that creates a historical record of what changes occurred.
control plane
The part of software-defined networking that is involved with the "brains" of whatever network device is being virtualized, such as a routing table being built in preparation for routing data to a remote destination or MAC address table being built in order to do switching of the data to a specific port to get the data to a specific device. Contrast with data plane.
load alternate third-party driver
The part of the Windows installation process in which a technician downloads drivers for hardware such as a RAID controller before continuing the installation process.
heating element
The part on a thermal printer that is a component of the print head.
network number
The portion of an IP address that represents which network the computer is on.
boot
The process of a computer coming to a usable condition.
printer sharing
The process of allowing multiple users on the same printer. It is commonly used in home and small business environments. Contrast with a printer server, used in corporate environments.
throttle management
The process of controlling processor speed by slowing down the processor when it is not used heavily or when it is running too hot.
browser synchronization
The process of coordinating settings such as bookmarks and passwords across multiple devices when the user is signed into the account.
user account management
The process of creating a user, adding that user to a group, and managing those functions.
declaration
The process of creating a variable in a script. The exact syntax to do this is known as a variable declaration.
authentication
The process of determining whether a network device or person has permission to access a network.
equipment grounding
The process of ensuring that the components in a device like a PC or rack are at the same voltage potential. Grounding is important to personal safety because consistent grounding minimizes the possibility of voltages being applied to places they shouldn't be applied, such as the case. If a piece of equipment is not grounded, someone could receive a shock or be electrocuted simply by touching it.
clean install
The process of loading an operating system on a computer that does not already have one installed.
firmware update
The process of obtaining and installing updates to the BIOS/UEFI so that the latest options or security patches are applied. Updating firmware is also known as flashing the BIOS.
incident documentation
The process of providing details on what a technician has done about a particular problem.
remote network installation
The process of pulling an image from a server or network share in order to load an operating system.
CPU throttling
The process of reducing the clock frequency to reduce power consumption.
clear browsing data
The process of removing all cookies, browsing history, and other data tracked by a web browser.
defragmentation
The process of reordering and placing files in contiguous sectors.
warm boot
The process of restarting a computer by pressing , using the restart function, or by clicking the Windows Restart option. A warm boot puts less strain on a computer than a cold boot.
port forwarding
The process of sending data through a firewall, based on a particular port number or protocol.
hard reset
The process of turning a device off and back on or a factory reset of a mobile device.
update network settings
The process of updating network settings in order to get onto a wired or wireless network. This could involve using the ipconfig /release and ipconfig /renew commands or changing the IP address to a manually assigned one.
content filtering
The process of using a device or software to screen data for suspected security risks.
degaussing
The process of using a strong electromagnet (sometimes called a degausser or degaussing coil) to change a drive's magnetic field and erase the drive as a security measure.
remote wipe
The process of using software to send a command to a mobile device to delete data, perform a factory reset, remove everything from the device so that it cannot be used, and overwrite data storage to prevent forensic data recovery.
cross-platform virtualization
The process of using virtualization to run a different OS than was intended for the machine, such as Windows on a Mac computer.
security certificate verification
The process of verifying that the address in a certificate matches the web address and is digitally signed by a "trusted" authority.
lifting technique
The proper method to use when lifting equipment, involving using your legs and not your back.
frequency response range
The range of sounds a speaker can reproduce.
CPU speed
The rate at which a CPU operates. It is the speed of the front side bus multiplied by the multiplier. Normally measured in GHz.
clock speed
The rate at which timing signals are sent to motherboard components (normally measured in MHz).
UEFI (Unified Extensible Firmware Interface)
The replacement for the traditional BIOS that has a boot manager instead of the BIOS controlling the boot process. The UEFI environment allows for a graphical interface, the use of a mouse, antivirus software to be used before the operating system loads, and internet access.
rebuild a Windows profile
To make a copy of the user profile folder, rename the registry key, and have the user log in again. This should be done if a message appears, saying that a user profile cannot be loaded.
mount
To make a drive available and recognizable to the operating system through use of the diskpart command utility.
collate
To print complete copies of documents in numerical order, one set at a time.
input
To put data into a device or program.
auditing
Tracking network events such as logging onto the network domain. Auditing is sometimes called event logging or simply logging.
WAN (wide area network)
Two or more LANs communicating, often across large distances. The most famous WAN is the internet.
network
Two or more devices that can communicate and share resources with each other.
low-level format
Use of a utility that formats a drive; note that this is different from the high-level format done on a newly installed drive or during an operating system installation.
multifactor authentication
Use of two or more factors to provide access. The factors can be something you possess, such as a card, current location, security token-provided code, PIN, fingerprint, facial recognition, palm print, or password.
inherited permissions
Windows NTFS permissions that are propagated from what Microsoft calls a parent object. For example, if a folder is given the permission Read, then all files within that folder inherit the read-only attribute.
unwanted notifications
Windows notifications that can be controlled on a per-app basis using the Notifications & actions link through Windows Settings.
library
Windows storage that is similar to a folder but that is automatically indexed for faster searching.
unlicensed range
Wireless frequencies that any manufacturer can use.
wireless regulations
Wireless frequency rules that include licensed and unlicensed ranges, but even in the unlicensed ranges there are rules that must be followed regarding maximum power, subchannels, and so on.
patch panel
With twisted pair cable, a central location to which network cables terminate. It mounts in a network wiring rack, has network ports on the front, and has wiring connected to the back to provide network connectivity.
scope of the change
Within a project plan, a scope of change describes the implications of the IT modifications and specifies affected systems.
while
loop$ In scripting, a type of loop that begins with the keyword while along with a test condition. If the condition is true, the loop begins, and the block of statements in the loop repeats until the condition is no longer true.
OR
operator$ A scripting operator that returns false if and only if both sides of the expression are false.