1001

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

App history

Tab added to Task Manager in Windows 8 to collect stats such as CPU time and network usage on programs that have run recently.

Preboot Execution Environment (PXE)

Technology that enables a PC to boot without any local storage by retrieving an OS from a server over a network.

Global Positioning System (GPS)

Technology that enables a mobile device to determine where you are on a map.

byte

Unit of 8 bits; fundamental data unit of personal computers. Storing the equivalent of one character, the byte is also the basic unit of measurement for computer storage.

joule

Unit of energy describing (in this book) how much energy a surge suppressor can handle before it fails

spam

Unsolicited e-mails from both legitimate businesses and scammers that account for a huge percentage of traffic on the Internet

SuperSpeed USB 10 Gbps

Updated form of SuperSpeed USB providing speeds up to 10 Gbps. Also called 3.1

print to PDF

Using a virtual printer that produces a PDF file you can save, instead of sending the document to a physical printer

Geofencing

Using mobile device features to detect when the device enters or exits a defined area

Social Engineering

Using or manipulating people inside the networking environment to gain access to that network from the outside.

802.11ac

Wireless networking standard that operates in the 5-GHz band and uses multiple in/multiple out (MIMO) and multi user MIMO (MU-MIMO) to achieve a theoretical maximum throughput of 1+ Gbps

image file

Bit-by-bit image of data to be burned on CD or DVD—from one file to an entire disc—stored as a single file on a hard drive. Particularly handy when copying from CD to CD or DVD to DVD.

sprite

Bitmapped graphic such as a BMP file used by early 3-D games to create the 3-D world.

BD-ROM (Blu-ray Disc-Read Only Media)

Blu-ray Disc equivalent of a DVDROM or CD-ROM. (See Blu-ray Disc.)

BD-RE (Blu-ray Disc-REwritable)

Blu-ray Disc equivalent of the rewritable DVD, allows writing and rewriting several times on the same BD. (See Blu-ray Disc.)

BD-R (Blu-ray Disc-Recordable)

Blu-ray Disc format that enables writing data to blank discs.

dxdiag (DirectX Diagnostics Tool)

Diagnostic tool for getting information about and testing a computer's DirectX version.

Contrast ratio

Difference in intensity between the lightest and the darkest spot that a device can display (in the case of a monitor) or capture (in the case of a camera or scanner)

resistance

Difficulty in making electricity flow through a material measured in ohms

general protection fault (GPF)

Error code usually seen when separate active programs conflict on resources or data. Can cause an application to crash

FAT32

File allocation table that uses 32 bits to address and index clusters. Commonly used with USB flash-media drives and versions of Windows prior to XP.

read-only attribute

File attribute that does not allow a file to be altered or modified. Helpful when protecting system files that should not be edited.

hidden attribute

File attribute that, when used, does not allow the dir command to show a file.

container file

File containing two or more separate, compressed tracks, typically an audio track and a moving-picture track. Also known as a wrapper

WAV

File format for audio faithfully recorded using the pulse code modulation (PCM) format; produces large file sizes

autorun.inf

File included on some media. Lists which program or installation routine Autorun should run

ext4 (Fourth Extended File System)

File system used by most Linux distributions

transmit beamforming

Multiple-antenna technology that adjusts signal when clients are discovered to optimize quality and minimize dead spots. Used in many 802.11n WAPs

polygons

Multisided shapes used in 3-D rendering of objects. In computers, video cards draw large numbers of triangles and connect them to form polygons.

pinch

Multitouch gesture that enables you to make an image bigger or smaller.

CSMA/CD (Carrier Sense Multiple Access/Collision Detection)

Networking scheme used by Ethernet devices to transmit data and resend data after detection of data collisions

Trojan horse

Program that does something other than what the user who runs the program thinks it will do. Used to disguise malicious code.

App Scanner

Program that scans apps installed on a device to highlight risks posed by apps what actions they have permission to take

rootkit

Program that takes advantage of very low-level functionality to gain privileged system access and hide itself from all but the most aggressive anti-malware tools. Can strike operating systems, hypervisors, and even device firmware

device driver

Program used by the operating system to control communications between the computer and peripherals.

Registry Editor

Program used to edit the Windows Registry.

regedit.exe

Program used to edit the Windows Registry.

Cell Tower Analyzer

Program, app, or device to scan and analyze the properties of nearby cellular signals. Can be used to diagnose signal quality issues or identify security threats such as tower spoofing

Wi-Fi analyzer

Program, app, or device used to scan and analyze the properties of nearby Wi-Fi signals. Can be used to identify dead spots, avoid interference from other networks, or identify security threats such as illegitimate wireless access points (WAPs) and more

software token

Programming (usually running on a general computing device such as a smartphone or portable computer) that enables the device to serve as an authentication factor when logging into a secure resource

bug

Programming error that causes a program or a computer system to perform erratically, produce incorrect results, or crash. The term was coined when a real bug was found in one of the circuits of one of the first ENIAC computers.

PAN (Personal Area Network)

Small wireless network created with Bluetooth technology and intended to link computers and other peripheral devices.

gestures

Specific motions the user performs on a touchscreen, such as pinching or swiping, that have a special meaning to the app being used.

file permission

Specifies what degree of access the system should grant a user or group to a particular file

folder permission

Specifies what degree of access the system should grant a user or group to a particular folder

system bus speed

Speed at which the CPU and the rest of the PC operates; set by the system crystal.

ppm (pages per minute)

Speed of a printer.

Pretty Good Privacy (PGP)

Standard for sending and reviving e-mail encrypted to obscure its message from anyone without the key to decrypt it

form factor

Standard for the physical organization of motherboard components and motherboard size. Most common form factors are ATX, microATX, and Mini-ITX.

RS-232

Standard port recommended by the Electronics Industry Association (EIA) for serial devices.

dipole antennas

Standard straight-wire antennas that provide the most omnidirectional function.

MSDS (Material Safety Data Sheet)

Standardized form that provides detailed information about potential environmental hazards and proper disposal methods associated with various computing components.

mSATA

Standardized smaller SATA form factor for use in portable devices

Qi

Standardized wireless charging technology

msinfo32 (system information tool)

Provides information about hardware resources, components, and the software environment. Also known as System Information

DirectX

Set of APIs enabling programs to control multimedia, such as sound, video, and graphics. Used in Windows Vista to draw the Aero desktop.

scripting language

Set of commands, syntax, variables, and format for scripts to be used in a specific computer environment. For example, bash is a scripting language often used in the Bash shell, which is common UNIX environments

maintenance kit

Set of commonly replaced printer components provided by many manufacturers.

script

Set of text instructions that tells a computer a series of commands to execute in a repeatable fashion

expansion bus

Set of wires going to the CPU, governed by the expansion bus crystal, directly connected to expansion slots of varying types (PCI, AGP, PCIe, etc.).

boot options

Settings in the system setup program that define which devices the system will attempt to boot from (and in what order)

user profiles

Settings that correspond to a specific user account and may follow users regardless of the computers where they log on. These settings enable the user to have customized environment and security settings.

imaging process

Seven-step process in laser printing. While it can vary by printer, the steps are typically: processing, charging, exposing, developing, transferring, fusing, and cleaning

Broadcast Domain

group of computers connected by one or more switches-- that is, a group of computers that receive broadcast frames from each other

partition boot sector

sector of a partition that stores information important to its partition, such as the location of the OS boot files. Responsible for loading the OS on a partition

application programming interface

see API

CAD/CAM design workstation

see graphics workstation

update

see patch

Factory Recovery Partition

see recovery partition

activation (virus)

see virus

algorithm

set of rules for solving a problem in a given number of steps (recipe)

Digitizer (Screen)

the touchscreen overlay technology that converts finger and stylus contact into input data for the device to use

decypt

to pass decryption keys and encrypted data through the appropriate decryption algorithm in order to retrieve the original unencrypted data. see encryption

Certificate Authority (CA)

trusted entity that signs digital certificates to guarantee that the certificate was signed by the web site in question (and not forged)

SC

type of fiber optic connector

ST

type of fiber optic connector

DDR3U

ultra-low-voltage version of DDR3, runs at 1.25 V.

drive-by download

undesired file downloads generated by turpid web sites and ads

amperes (Amps or A)

unit of measure for amperage, or electrical current

decibel

unit of measurement typically associated with sound. The higher the number of decibels, the louder the sound

in-place upgrade

upgrade installation

AGP (Accelerated Graphics Port)

A 32/64-bit expansion slot designed by Intel specifically for video that ran at 66 MHz and yielded a throughput of at least 254 Mbps. Later versions (2x, 4x, 8x) gave substantially higher throughput

API (Application Programming Interface)

A Library of related commands available for programmers to use. OpenGL and DirectX, for example, are two well-known 3-D graphics APIs that make it easier to build 3-D games.

air filter mask

A mask designed to keep users from inhaling particulate matter, as when cutting drywall

APM (Advanced Power Management)

BIOS routines (developed by Intel in 1992 and upgraded over time) that enable the CPU to turn on and off selected peripherals. In 1996, APM was supplanted by Advanced Configuration and Power Interface (ACPI).

Anti static bag

Bag made of anti static plastic into which electronics are placed for temporary or long-term storage. Used to protect components from electrostatic discharge

amerage

See current

4G

The fourth generation of cellular data technologies. Most popularly implemented as Long Term Evolution (LTE), a wireless data standard with theoretical download speeds of 1 Gbps and upload speeds of 100 Mbps.

110 block

The most common connection used with structured cabling , connecting horizontal cable runs with patch panels

3G

Third-generation cellular data technologies (such as EV-DO, UTMS, HSPA+, and HSDPA) with real-world speeds under 10 Mbps

AR headset

A non-immersive headset (such as a set of glasses) that places an interface between the wearer and the world. See also augmented reality

Action Center

A one-page aggregation of event messages, warnings, and maintenance messages in windows 7

Account Recovery

A process enabling users to regain account access, typically by resetting a lost or forgotten password

app

A program for a tablet or smartphone. Also, a program written for the Windows 8 Metro interface.

ATA (AT Attachment)

A series of hard drive standards both the older parallel ATA (PATA) and modern serial ATA (SATA) drives. See also PATA and SATA

Advanced Host Controller Interface (AHCI)

An efficient way for motherboards to work with SATA host bus adapters. Using AHCI unlocks some of the advanced features of SATA, such as hot-swapping and native command queuing (NCQ)

app store

Apple's mobile software storefront, where you can purchase apps for your smartphone, tablet, or other Apple products

Apple Pay

Apple's technology and sercie for making secure credit card payments in stores and apps via the iPhone and Apple Watch

Apps & Features

Area of the Windows 10 settings app that enables users to add and remove programs and windows features

AMD (Advanced Micro Devices)

CPU and chipset and manufacturer that competes with Intel. Produces FX, A-Series, Ryzen, and Opteron CPUs and APUs. Also produces video card processors under its ATI brand

Apple Filing Protocol (AFP)

Enables sharing between MACs. Also used by macOS Time Machine for backing up macOS over the network. Uses TCP port 548

ARM

Energy efficient processor design frequently used in mobile devices

AC (alternating current)

Type of electricity in which the flow of electrons alternates direction, back and forth, in a circuit

protective cover

A case or sleeve that protects a mobile device from physical damage.

single-sided RAM

Has chips on only one side as opposed to double-sided RAM.

ps

Linux command for listing all processes running on the computer.

iwconfig

Linux command for viewing and changing wireless settings.

pwd

Linux command that displays the user's current path.

grep

Linux command to search through text files or command outputs to find specific information or to filter out unneeded information.

chmod

Linux command used to change permissions.

retinal scanner

Biometric security device that authenticates an individual by comparing retinal scans. Rarer in the real world than in media such as movies or video games

Cat 5e

Category 5e wire; ANSI/TIA standard for UUTP wiring that can operate at up to 1 Gbps

Cat 6

Category 6 wire; ANSI/TIA standard for UTP wiring that can operate at up to 10 Gbps

chown

Linux command used to change the owner and the group to which a file or folder is associated.

fsck

Linux command-line tool that checks for hard drive errors

remnant

Potentially recoverable data on a hard drive that remains despite formatting or deleting

browser

Program specifically designed to retrieve, interpret, and display Web pages.

RSA token

Random-number generator used along with a user name and password to enhance security

punchdown tool

A specialized tool for connecting UTP wires to a punchdown block.

crimper

A specialized tool for connecting twisted pair wires to an RJ-45 connector. Also called a crimping tool.

positional audio

Range of commands for a sound card to place a sound anywhere in 3-D space.

transfer rate

Rate of data transferred between two devices, especially over the expansion bus.

structured cabling

ANSI/TIA standards that define methods of organizing the cables in a network for ease of repair and replacement

HTML (Hypertext Markup Language)

ASCII-based, script-like language for creating hypertext documents such as those on the World Wide Web.

Principle of Least Privilege

Accounts should have permission to access only the resources they need and no more.

LBA (logical block addressing)

Addressing scheme that presents storage chunks on a storage device to the OS as a sequence of blocks beginnign with LBA0. This saves the OS from having to deal directly with the details of how storage space is arranged on a hard drive or SSD.

Administrative shares

Administrator tool to give local admins access to hard drives and system root folders

USMT (User State Migration Tool)

Advanced application for file and settings transfer of many users. Only usable within a Windows Server Active Directory domain

Point-to-Point Tunneling Protocol (PPTP)

Advanced version of the Point-to-Point Protocol (PPP; used for dial-up Internet) that has improved VPN support

link light

An LED on NICs, hubs, and switches that lights up to show good connection between the devices.

activity light

An LED on a NIC, hub, or switch that blinks rapidly to show data transfers over the network

URL (Uniform Resource Locator)

An address that defines the location of a resource on the Internet. URLs are used most often in conjunction with HTML and the World Wide Web.

IMAP4 (Internet Message Access Protocol, version 4)

An alternative to POP3 that retrieves e-mail from an e-mail server; IMAP uses TCP port 143

QR scanner

An application or device capable of scanning and interpreting QR codes

BYOD (bring your own device)

An arrangement in some companies' IT departments where employees are permitted to use their own phones or other mobile devices instead of company-issued ones. Also, a feature of some wireless carriers where you can buy an unsubsidized device and use it to get cheaper wireless rates.

DDoS (Distributed Denial of Service)

An attack on a computer or network device in which multiple computers send data and requests to the device in an attempt to overwhelm it so that it cannot perform normal operations.

DoS (Denial of Service)

An attack on a computer resource that prevents it from performing its normal operations, usually by overwhelming it with large numbers of requests in an effort to monopolize its resources.

Cat 6a

Category 6a wire; augmented CAT 6 UTP wiring that supports 10-Gbps networks at the full 100-meter distance between a node and a switch.

End user agreement

Change management steps that entails educating and training users about what has changed and how to use any new systems, devices, or features

soft power

Characteristic of ATX motherboards, which can use software to turn the PC on and off. the physical manifestation of soft power is the power switch. Instead of the thick power cord used in AT systems, an ATX power switch is little more than a pair of small wires leading to the motherboard

rapid elasticity

Characteristic of cloud computing that enables cloud consumers to add or remove capacity quickly. Because cloud servers are powered by virtual machines, customers can start or shut down new instances of VMs or move the VMs to more powerful hardware

wildcard

Charcter- usually an asterisk (*) or question mark (?)- used during a search to represent search criteria. For instance, searching for *docx will return a list of all files with a .docx extension, regardless of the filename. The * is the wildcard in that search. Wildcards can be used in command-line commands to act on more than one file at a time

primary corona wire

Charges the photosensitive particles on the imaging drum. Replaced by the primary charge roller in newer laser printers

Super I/O chip

Chip specially designed to control low-speed, legacy devices such as the keyboard, mouse, and serial and parallel ports.

MCC (memory controller chip)

Chip that handles memory requests from the CPU. Although once a special chip, it has been integrated into the chipset or CPU on modern computers.

active PFC (power factor correction)

Circuitry built into PC power supplies to reduce harmonics

Hierarchical File System Plus (HFS+)

Classic file system used by older Macs. Still required for Time Machine drives. Replaced in new Macs and existing compatible systems with Apple File System (AFS)

BIOS (basic input/output services) (basic input/output system)

Classically, software routines burned on the system ROM of a PC. More commonly seen as firmware that directly controls a particular piece of hardware. This firmware handles startup operations and low-level control of hardware such as disk drives, the keyboard, and monitor.

change documentation

Collected documentation for all aspects of a change process, including plans leading up to the change as well as receipts, overtime documents, an inventory of changed systems, a list of created users, and signed end-user acceptance forms.

gain

Ratio of increase of radio frequency output provided by an antenna, measured in decibels (dB)

Aspect Ratio

Ratio of width to height of a display. Wide-screen displays such as modern TVs, desktop computer monitors, portable computer displays, and even smartphones commonly use 16:9 or 16:10, but you can find devices with many other aspect ratios.

plastic filament

Raw material that a typical 3-D printer melts and then extrudes to create physical pieces and parts

CD-ROM (compact disc read-only memory)

Read-only compact storage disc for audio or video data. CD-ROMs are read by using CD-ROM drives and optical drives with backward compatibility, such as DVD and Blu-ray Disc drives.

mirroring

Reading and writing data at the same time to two drives for fault tolerance purposes. Considered RAID level 1. Also called drive mirroring.

Incident report

Record of the details of an accident, including what happened and where it happened.

document findings, actions, and outcomes

Recording each troubleshooting job: what the problem was, how it was fixed, and other helpful information. (Step 6 of 6 in the CompTIA troubleshooting theory.)

dual boot

Refers to a computer with two operating systems installed, enabling users to choose which operating system to load on boot. Can also refer to kicking a device a second time just in case the first time didn't work.

client/server

Relationship in which client software obtains services from a server on behalf of a person.

remediation

Repairing damage caused by a virus.

UDF (universal data format)

Replaced the ISO-9660 formats, enabling any operating system and optical drive to read UDF formatted disks.

hot-swapping

Replacing a bad drive in a RAID array without needing to reboot or power down

Control Panel

Collection of Windows applets, or small programs, that can be used to configure various pieces of hardware and software in a system

profile (network)

Collection of information necessary to automatically connect to a network, stored by the network's SSID. Enables mobile and portable devices to easily use many networks

VoIP (Voice over Internet Protocol)

Collection of protocols that makes voice calls over a data network possible.

service pack

Collection of software patches released at one time by a software manufacturer

network

Collection of two or more computers interconnected by telephone lines, coaxial cables, satellite links, radio, and/or some other communication technique. Group of computers that are connected and that communicate with one another for a common purpose

group

Collection of user accounts that share the same access capabilities

sRGB

Color space standard that corresponds to Standard Dynamic Range (SDR)

Classless Inter-Domain Routing (CIDR)

Current system for creating and notating subnets, it replaced the older, less flexible three class system

1.5 Gbps

SATA drive variety with maximum throughput of 150 MBps See SATA

3 Gbps

SATA drive variety with maximum throughput of 300 MBps See SATA

SDRAM (synchronous DRAM)

DRAM that is synchronous, or tied to the system clock. This type of RAM is used in all modern systems.

DVD-ROM

DVD equivalent of the standard CD-ROM.

DVD-video

DVD format used exclusively to store digital video; capable of storing over two hours of high-quality video on a single DVD.

spear phishing

Dangerous targeted phishing attack on a group or individual that carefully uses details from the target's life to increase the odds they'll take the bait

resources

Data and services such as files, folders, drives, printers, connections, and so on

degaussing

Data destruction procedure used to reduce or remove the electromagnetic fields that store data on magnetic hard drives

SSD (solid state drive)

Data storage device that uses flash memory to store data.

NVMe (Non-Volatile Memory Express)

SSD technology that supports a communication connection between the operating system and the SSD directly through a PCIe bus lane, reducing latency and taking full advantage of the speeds of high-end SSDs. NVMe SSDs come in a few formats, such as an add-on expansion card, though most commonly in M.2 format. NVMe drives are a lot more expensive currently than other SSDs, but offer much higher speeds. NVMe drives use SATAe

g6 Gbps

Sata drive variety with maximum throughput of 600 MBps See SATA

program/programming

Series of binary electronic commands sent to a CPU to get work done.

OS (Operating System)

Series of programs and code that creates an interface so users can interact with a system's hardware; for example, Windows, Mac OS X, and Linux.

ATAPI (Advanced Technology Attachment Packet Interface)

Series of standards that enables mass storage deives other than hard drives to use the IDE/ATA controllers. Popular with optical drives. See also EIDE

bus

Series of wires connecting two or more separate electronic devices, enabling those devices to communicate. Also a network topology where computers all connect to a main line called a bus cable

print server

Server, computer, or standalone network device that shares access to a printer over a network

TCP/IP services

Services such as HTTP or SSH that run atop TCP/IP

encrypted

Data that has been passed through an encryption algorithm, rendering it unreadable without the decryption keys. see encryption

HDD (Hard Disk Drive)

Data-recording system using solid disks of magnetic material turning at high speeds to store and retrieve programs and data in a computer.

ad hoc mode

Decentralized wireless network mode, otherwise known as peer-to-peer mode, where each wireless node is in meshed contact with every other node

hardware token

Dedicated device that contains information used as an authentication factor when logging on to a secure site

bash

Default command shell on macOS and most Linux distributions. see shell

hardware protocol

Defines many aspects of a network, from the packet type to the cabling and connectors used.

AUP (Acceptable Use Policy)

Defines what actions employees may or may not perform on company equipment, including computers, phones, printers, and even the network itself. This policy defines the handling of passwords, e-mail, and many other issues.

scope of the change

Defines who and what the change will affect. May include an inventory of systems to change, people involved, time required, and estimated cost

Pixels per Inch (PPI)

Density of pixels on a display or a light sensor; the higher the density, the greater the resolution

TKIP (Temporal Key Integrity Protocol)

Deprecated encryption standard that provided a new encryption key for every sent packet.

x86

Describes 32-bit operating systems and software.

x64

Describes 64-bit operating systems and software.

pin 1

Designator used to ensure proper alignment of floppy drive and hard drive connectors.

router

Device connecting separate networks; forwards a packet from one network to another based on the network address for the protocol being used. For example, an IP router looks only at the IP network number. Routers operate at Layer 3 (Network) of the OSI seven-layer model

portable battery charger

Device containing a rechargeable battery that can be used to charge other devices, typically over USB, when no outlets are available

Digitizer(peripheral)

Device enabling users to paint, ink, pencil, or otherwise draw with a computer. Also known as a pen tablet.

projector

Device for projecting video images from PCs or other video sources, usually for audience presentations. Available in front- and rearview displays.

TDP (time-domain reflectometer)

Device for testing network cabling by measuring impedance (which is similar to resistance); any impedance means a bad cable

cable tester

Device for verifying that the connectors and wires in a cable (such as UTP) are in good order

POST card

Device installed into a motherboard expansion slot that assists in trouble- shooting boot problems by providing a two-digit code indicating the stop of the boot process where the problem is occurring.

memory

Device or medium for temporary storage of programs and data during program execution. Synonymous with storage, although it most frequently refers to the internal storage of a computer that can be directly addressed by operating instructions. A computer's temporary storage capacity is measured in kilobytes (KB), megabytes (MB), or gigabytes (GB) of RAM (random-access memory). Long-term data storage on hard drives and solid-state drives is also measured in megabytes, gigabytes, and terabytes

Credit card reader

Device that can be attached to mobile phones and tablets to take credit card payments

gyroscope

Device that can detect the position of the tablet or phone in 3-D space

camera

Device that captures visible light to preserve images in analog(film) or digital format. See digital camera

WAP (Wireless Access Point)

Device that centrally connects wireless network nodes.

security token

Devices that store some unique information that a user carries with them. May contain digital certificates, passwords, biometric data, or RSA tokens

wireless repeater/extender

Devices that receive and rebroadcast a Wi-Fi signal to increase coverage.

MFT (master file table)

Enhanced file allocation table used by NTFS. (See also FAT.)

PCI-X (PCI Extended)

Enhanced version of PCI, 64 bits wide. Typically seen in servers and high-end systems.

full device encryption

Enhances mobile device security by encrypting the device's internal storage

System on a Chip (SoC)

Single silicon die containing a CPU, GPU, ad other important support logic

Power conditioning

Ensuring and adjusting incoming AC wall power to as close to standard as possible. Most UPS devices provide power conditioning.

Mini-PCI

Specialized form of PCI designed for use in laptops.

Mini-PCIe

Specialized form of PCIe designed for use in laptops.

GPU (graphics processing unit)

Specialized processor that helps the CPU by taking over all of the 3-D rendering duties.

DNS domain

Specific branch of the DNS name space. First-level DNS domains include .com, .gov, and .edu.

DTS (Digital Theatre Systems)

Technology for sound reductions and channeling methods, similar to Dolby Digital.

Dolby digital

Technology for sound reductions and channeling methods used for digital audio.

cable Internet

Fast internet connection from a cable TV provider via RG-6 and RG-59 cable and a cable modem

SAS (serial-attached SCSI)

Fast, robust storage interface based on the SCSI command set. Also supports SATA drives. Used mainly in servers and storage arrays

emergency notification

Feature built into smartphones enabling them to receive messages from emergency broadcast systems, such as the Emergency Alert System (EAS) in the United States

DPI (dots per inch)

Measure of printer resolution that counts the dots the device can produce per linear (horizontal) inch.

swipe lock

Mobile device feature that uses a swipe gesture to unlock the mobile device.

application amanger

Mobile device interface for removing and managing apps running on the device.

cron

Tool used by many linux distributions for automatically running tasks based on a scheudule

change board

a group of representatives from around the organization who review and approve change proposals

MPEG-4

Moving Pictures Experts Group standard of video and audio compression offering improved compression over MPEG-2.

getting answers

eliciting answers

MPEG-2

Moving Pictures Experts Group standard of video and audio compression offering resolutions up to 1280 × 720 at 60 frames per second.

migration

Moving users from one operating system or hard drive to another

smartphone

A cell phone enhanced to do things formerly reserved for fully grown computers, such as Web browsing, document viewing, and media consumption

triple-channel architecture

A chipset feature similar to dual-channel RAM, but making use of three matched sticks of RAM instead of two

access control list (ACL)

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource

Cellular card

A cellular modem on an expansion card designed for older laptop expansion slots. Current add-on cellular modems are typically attached via USB (and called USB modems by cellular service providers)

home server PC

A computer built to store files on a small office/home office (SOHO) network.

domain controller

A computer running Windows server that stores a set of domain accounts

Web server

A computer that stores and shares the files that make up Web sites.

Yagi

Multi-element antennas that increase signal gain in a specific direction. Resembles older television antennas, but smaller

prompt

A character or message provided by an operating system or program to indicate that it is ready to accept input.

microprocessor

"Brain" of a computer. Primary computer chip that determines relative speed and capabilities of the computer. Also called central processing unit CPU.

CPU (Central Processing Unit)

"Brain" of the computer. Microprocessor that handles primary calculations for the computer. CPUs are known by names such as Core i7 and Opteron

Mac

(Also Macintosh.) Common name for Apple Computers' flagship operating system; runs on Intel-based hardware. CompTIA refers to the operating system as Mac OS X. Apple calls the current operating system macOS

SATA power connector

15-pin, L-shaped connector used by SATA devices that support the hot-swappable feature.

Unicode

16-bit code that covers every character of the most common languages, plus several thousand symbols.

DIMM (dual inline memory module)

32- or 64-bit type of DRAM packaging with the distinction that each side of each tab inserted into the system performs a separate function. DIMMs come in a variety of sizes, with 184-, 240-, and 288-pin being the most common on desktop computers.

Standard Dynamic Range (SDR)

8-bit color standard that defines 256 colors or light intensities

VGA connector

A 15-pin, three-row, D-type VGA monitor connector. Goes by many other names, such as D-shell, D-subminiature connector, DB-15, DE15, and HD15. The oldest and least capable monitor connection type

multiple Desktops

A GUI feature that enables a computer to have more than one Desktop, each with its own icons and background. Mac OS X supports multiple Desktops with Spaces. Most Linux distros use multiple Desktops, often called workspaces. Microsoft introduced the feature with Windows 10.

swollen battery

A Li-Ion battery that has begun to swell as it fails, often due to manufacturing defects, heat, or overcharging. May also deform the device containing it. It is an explosion and fire risk if it ruptures, so dispose of it quickly and safely

exFAT

A Microsoft-proprietary file system that breaks the 4-GB file-size barrier, supporting files up to 16 exabytes (EB) and a theoretical partition limit of 64 zettabytes (ZB). Envisioned for use with flash media devices with a capacity exceeding 2 TB

RAID 0 + 1

A RAID 0 configuration created by combining two RAID 1's. Provide both speed and redundancy, but requires at least 4 disks

bootrec

A Windows Recovery Environment troubleshooting and repair tool that repairs the master boot record, boot sector, or BCD store. It replaces the fixboot and fixmbr Recovery Console commands used in Windows XP and earlier operating systems.

Windows XP mode

A Windows XP virtual machine that ships with Professional, Enterprise, and Ultimate editions of Windows 7 to enable users to run programs that don't work on Windows 7.

dock

A bar at the bottom of the Mac OS X desktop where application icons can be placed for easy access.

Advanced Encryption Standard (AES)

A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. Practically uncrackable.

stranded core

A cable that uses a bundle of tiny wire strands to transmit signals. Stranded core is not quite as good a conductor as solid core, but it will stand up to substantial handling without breaking.

solid core

A cable that uses a single solid wire (not hollow or stranded) to transmit signals.

CMOS battery

A coin cell lithium-ion battery that maintains power to the CMOS memory chip when the computer is otherwise unpowered. The usual battery size is CR2032

profile MDM

A collection of mobile device management (MDM) configuration and security settings that an administrator has created in order to apply those settings to particular categories of users or devices

hybrid cloud

A combination of cloud resources from more than one other cloud type, such as community, private, or public

xcopy

A command line tool used to copy multiple directories at once, which the copy command could not do

Terminal

A command-line tool available in macOS and various Linux distros

DISM (Deployment Image Servicing and Management)

A command-line tool bundled with Widnows 10 to support image deployment.. Also known as dism.exe

bcdedit

A command-line tool that enables you to view the BCD store, which lists the Windows boot options.

remote network installation

A common method of OS installation where the source files are placed in a shared directory on a network server. Then, whenever a tech needs to install a new OS, he or she can boot the computer, connect to the source location on the network, and start the installation from there

virtual machine (VM)

A complete environment for a guest operating system to function as though that operating system were installed on its own computer.

fully qualified domain name (FQDN)

A complete, bottom-to-top label of a DNS host going from the specific host to the top-level domain that holds it and all of the intervening domain layers, each layer being separated by a dot. FQDNs are entered into browser bars and other utilities in formats like mail.totalseminars.com

transfer belt

A component that enables color laser printers to transfer all color layers to the paper in a single pass (as opposed to a separate pass to print each color layer)

backlight

A component used in LCDs to illuminate an image. In older LCDs this was a CCFL; current LCDs use LEDs. See also CCFL, direct LED backlighting and edge LED backlighting

Audio Editing Workstation

A computer workstation for editing audio needs a fast multicore CPU, lots of RAM, and a large monitor. It also needs large, fast hard drives and a high-quality audio interface, and may make use of specialized input devices for mixing audio

video editing workstation

A computer workstation for editing video. Combine sthe hardware requirements of graphics and audio editing workstation. Typically makes use of two or more high-quality-calibrated monitors for both editing and viewing video at native resolution. The high-speed, high-capacity storage required to edit enormous video files is commonly provided by RAID arrays

Graphics Workstation

A computer workstation for graphics design that requires a fast, multicore CPU, maximum RAM, and serious storage space to work with massive graphics files. It also needs a high-quality graphics card and monitor

virtualization workstation

A computer workstation for simultaneous work in multiple virtual machines requires enough power for the host OS, plus any virtual machines, including their operating systems and software. In practice, this means powerful CPU's with many cores and maximum RAM

frame

A data unit transferred across a network. Frames consist of several parts, such as the sending and receiving MAC addresses, the data being sent, and the frame check sequence.

risk analysis

A detailed assessment of any problems that could result from a change

Network Attached Storage (NAS)

A device that attaches to a network for the sole purpose of storing and sharing files

bridge

A device that connects dissimilar network technologies that transmit the same signal

switch

A device that filters and forwards traffic based on some criteria. A bridge and a router are both examples of switches. In the command-line interface, a switch is a function that modifies the behavior of a command

CIFS (Common Internet File System)

A dialect of the Server message Block (SMB) protocol. Currently deprecated but still widely supported

installation media

A disc (typically a CD-ROM or DVD) or drive (as a USB flash drive) that holds all the necessary device drivers

chain of custody

A documented history of who has been in possession of a system.

signed driver

A driver designed specifically to work with Windows that has been tested and certified by Microsoft to work stably with Windows

catastrophic failure

A failure in which a component or whole system will not boot; usually related to a manufacturing defect of a component. Could also be caused by overheating and physical damage to computer components.

ITX

A family of motherboard form factors. Mini-ITX is the largest and the most popular of the ITX form factors but is still quite small.

SuperSpeed USB

A fast form of USB, with speeds up to 5 Gbps. Also called USB 3.0.

data roaming

A feature of cellular data systems that enables the signal to jump from cell tower to cell tower and from your provider to another provider without obvious notice.

Mission control

A feature of macOS that enables switching between open applications, windows, and more

Autorun

A feature that enables Windows to look for and read a file called autorun.inf immediately after a removable media device (optical drive or thumb drive) is inserted and automatically run whatever program the file lists

toner (printing)

A fine powder made up of plastic particles bonded to pigment particles, used to create the text and images on a page printed with a laser printer

subfolder

A folder located inside another folder

MDM (mobile device management)

A formalized structure that enables an organization to account for all the different types of devices used to process, store, transmit, and receive organizational data.

diskpart

A fully functioning command-line partitioning tool.

Personal Computer (PC)

A general computing device that runs Microsoft Windows and can be used for various tasks.

Trusted Platform Module (TPM)

A hardware platform for the acceleration of cryptographic functions and the secure storage of associated information. BitLocker, for example, requires a TPM chip on the motherboard to validate on boot that the computer has not changed

trusted root CA

A highly respected certificate authority (CA) that has been placed on the lists of trusted authorities built into Web browsers

HTPC

A home theater PC designed to attach to a TV or projector for movie and TV viewing

star bus topology

A hybrid network topology where the computers all connect to a central bus-a switch- and have a layout resembling a star

wireless mesh network (WMN)

A hybrid wireless topology in which most nodes connect in a mesh network while also including some wired machines. Nodes act like routers; they forward traffic for other nodes, but without wires

CMOS clear

A jumper setting or button on the motherboard that, when set, will revert CMOS settings to the factory defaults

self-grounding

A less than ideal method for ridding yourself of static electricity by touching a metal object such as a computer case. Alternatively, sending yourself to your own room as a form of punishment.

Single-factor authentication

A less-secure authentication process using only one of the authentication factors

drive letter

A letter designating a specific drive or partition.

DMZ (demilitarized zone)

A lightly protected or unprotected subnet network positioned between an outer firewall and an organization's highly protected internal network. DMZs are used mainly to host public address servers (such as Web servers).

profile (color)

A list of settings that a calibration device creates when calibrating monitors and printers

PRL (Preferred Roaming List)

A list that is occasionally and automatically updated to a phone's firmware by the carrier so that the phone will be configured with a particular carrier's networks and frequencies, in a priority order, that it should search for when it can't locate its home carrier network.

network topology diagram

A map of how everything in an organization's network (including switches, routers, WAPs, services, and workstations) connects. May indicate connection types, speed, technologies, and so on.

NAT (Network Address Translation)

A means of translating a system's IP address into another IP address before sending it out to a larger network. NAT manifests itself by a NAT program that runs on a system or a router. A network using NAT provides the systems on the network with private IP addresses. The system running the NAT software has two interfaces: one connected to the network and the other connected to the larger network. The NAT program takes packets from the client systems bound for the larger network and translates their internal private IP addresses to its own public IP address, enabling many systems to share a single IP address.

equipment rack

A metal structure used in equipment rooms to secure network hardware devices and patch panels. Most racks are 19" wide. Devices designed to fit in such a rack use a height measurement called units, or simply U.

network connection

A method for connecting two or more computers together.

liquid cooling

A method of cooling a PC that works by running some liquid— usually water—through a metal block that sits on top of the CPU, absorbing heat. The liquid gets heated by the block, runs out of the block and into something that cools the liquid, and is then pumped through the block again.

tablet

A mobile device consisting of a large touchscreen, enabling the user to browse the Web, view media, and even play games

Mobile hotspot

A mobile device that broadcasts a small Wi-Fi network to share its mobile data network connection with nearby Wi-Fi devices. Often these are standalone devices, though many cellular phones and data-connected tablets can be set up to act as hotspots.

Cloud computing

A model for enabling and accessing computing storage and other shared (or not shared ) resources on-demand. The "cloud" is based on servicing models that include IaaS, Paas, and SaaS, or hybrid mixtures of these services

ransomware

A nasty form of malware that encrypts data or drives on the infected system and demands payment, often within a limited timeframe, in exchange for the keys to decrypt the data

overloaded network

A network that, often due to a large public event, emergency, or network equipment failure, is unable to keep up with user demand. Users may have good signal quality but be unable to access data, text, or voice services

hybrid (networking)

A network topology that combines features from multiple other topologies, such as the star bus topology

broadcast

A network transmission addressed for every node on the network.

virtual switch

A non-physical version of a hardware switch, made by a hypervisor to network virtual machines

Startup Repair

A one-stop, do-it-all troubleshooting option that performs a number of boot repairs automatically.

patch panel

A panel containing a row of female connectors (ports) that terminate the horizontal cabling in the equipment room. Patch panels facilitate cabling organization and provide protection to horizontal cabling.

multi-rail

A power supply configuration where the current is split into multiple pathways, each with a maximum capacity and its own Over Current Protection (OCP) circuitry. CompTIA calls two-rail versions of this technology "dual rail."

gaming PC

A powerful desktop system designed to play the latest resource-hungry games using high-performance processors, RAM, and graphics cards. Typical peripherals are fast, high-quality monitors, rich sound systems, and input devices such as mice and keyboards tailored to high-performance gaming.

network technology

A practical application of a topology and other critical standards to provide a method to get data from one computer to another on a network. It defines many aspects of a network, from the topology, to the frame type, to the cabling and connectors used.

Inventory Management

A process for protecting devices and equipment by tagging them with barcodes or asset tags, and keeping track of these tagged devices

service

A process that runs in the background of a PC but displays no icons anywhere. You can view a list of services in the Windows Task Manager. Also, a program stored in a ROM chip

command

A request, typed from a terminal or embedded in a file, to perform an operation or to execute a particular program

network documentation

A road map to an organization's network configuration and topology for techs who need to change or repair the network

VESA mount

A screen or display bracket that follows the industry standard-established by the Video Electronics Standards Association (VESA)- which specifies size, location, and type of mounting points

proprietary crash screen

A screen, differing between operating systems, that indicates an NMI.

SNMP (Simple Network Management Protocol)

A set of standards for communication with devices connected to a TCP/IP network. Examples of these devices include routers, hubs, and switches. Uses port 161 and 162

MMC (Microsoft Management Console)

A shell program in Windows that holds individual utilities called snap-ins, designed for administration and troubleshooting. The MMC enables an administrator to customize management tools by picking and choosing from a list of snap-ins. Available snap-ins include Device Manager, Local Users and Groups, and Computer Management

workgroup

A simple, decentralized network that Windows PCs are configured to use by default.

run

A single piece of installed horizontal cabling.

Raid 5 volume (dynamic disks)

A software-based RAID 5 volume made up of three or more dynamic disks with equal-sized unallocated space. Created with Windows Disk Management

WinRE (Windows Recovery Environment)

A special set of tools in the Windows setup that enables you to access troubleshooting and repair features

hash

A special value computed from some other value using an irreversible computation. Has many uses in computing, and plays a key role in modern authentication systems. Instead of saving user passwords directly in a database (which would make them a huge target for attackers), well designed authentication systems computer and save only a (salted) hash of each password. When the user attempts to log in, the system hashes the provided password to see if it matches the saved hash. See also salted hash

Clock Wire (CLK)

A special wire that, when charged, tells the CPU that another piece of information is waiting to be processed

heat sink

A specially designed hunk of metal such as aluminum or cooper that conducts heat away from a CPU or other heat-producing component and out into fins that transfer the heat to circulating air. When used to cool a CPU, a heat sink is typically paired with a fan assembly to improve its performance

distribution (distro)

A specific variant of Linux.

Spinning Pinwheel of Death (SPoD)

A spinnign rainbow wheel that serves as the macOS indicator that an application isn't responding and may be busy or frozen

crossover cable

A standard UTP cable with one RJ-45 connector using the T568A standard and the other using T568B standard. This reserves the signal between sending and receiving wires and thus stimulates the connection to a switch.

Wi-Fi Protected Setup (WPS)

A standard included on many WAPs and clients to make secure connections easier to configure. WPS should be turned off, however, becuase it has a significant security flaw

PCI DSS (Payment Card Industry Data Security Standard)

A standard that sets common rules for systems that accept, process, transmit, or store credit/debit card payments. Often referred to as just PCI

DFS (Distributed File System)

A storage environment where shared files are accessed from storage devices within multiple servers, clients, and peer hosts.

convertible

A subset of 2-in-1 portables that use a hinge or latch mechanism to convert between laptop and tablet modes

thin client

A system designed to handle only very basic applications with an absolute minimum amount of hardware required by the operating system. Relies on resources from servers and thus needs a network connection. meets minimum requirements for selected OS.

Authentication factor

A thing that can be used to identify an individual, such as something they know (password), something they have (smart card), or something they are (fingerprint).

File Explorer

A tool in Windows 8/8.1/10 that enables users to browse files and folders. Previously known as Windows Explorer in Windows 7 and earlier versions

virtual desktop

A traditional desktop OS installed in a VM. A local system could run its own VM containing a virtual desktop, or just connect to a virtual desktop running on a remote server

automatic document feeder

A tray (usually on top) of a scanner or multi function device that holds a document and enables the device to grab and scan each page automatically for easier scanning, copying or faxing of long documents.

DB-9

A two-row DB connector (male) used to connect the computer's serial port to a serial-communication device such as a modem or a console port on a managed switch.

unattended installation

A type of OS installation where special scripts perform all the OS setup duties without human intervention.

gamepad

A type of game controller that usually consists of one or more thumbsticks, a directional pad, multiple face buttons, and two or more triggers

joystick

A type of game controller. Commonly used for flight-simulator games.

mirror set

A type of mirrored volume created with RAID 1. (See also mirroring.)

64-bit processing

A type of processing that can run a compatible 64-bit operating system, such as Windows 7, 8, 8.1, or 10, and 64-bit applications. 64-bit PCs have a 64-bit-wide address bus, enabling them to use more than 4 GB of RAM

IMSI (International Mobile Subscriber Identity)

A unique number that represents the actual user associated with a particular SIM card. The IMSI is usually available from the carrier, to ensure that stolen phones are not misused. The IMSI number can be used to unlock a phone as well.

profile (user)

A user profile describes a Windows user account's customized environment, including Desktop preferences, color schemes, shortcuts, and so on

virus

A virus is a program that has two jobs: to replicate and to activate. Replication means it copies itself. Activation is when a virus damages a system or data. A virsu can't self-replicate across networks; it needs human action to spread to other drives

smart watch

A watch incorporating features and communicating with a mobile device.

change management

A well defined process composed of many planning and execution steps that enables organizations to change their IT infrastructure in a safe, cost-effective manner

integer

A whole number. Integers and floating point numbers are handled differently in programs and by CPUs

WAN (Wide Area Network)

A widespread group of computers connected using long-distance technologies.

Credential manager

A windows Control panel applet which manages saved logon information for web sites, applications, and networks

HomeGroup

A windows feature that connects a group of computers using a common password- no special user names required. Each computer can be a member of only one homegroup at a time. Homegroups enable simple sharing of documents and printers between computers. Homegroups are available in Windows 7,8,8.1, and 10

AutoPlay

A windows feature that opens a dialog box when removable media is inserted into the computer, providing options based on what Windows finds on the drive, including starting the Autorun application

wait state

Occurs when the CPU has to wait for RAM to provide code. Also known as pipeline stall.

Accelerated processing unit (APU)

AMD product that consolidates the GPU and CPU into a single chip

Power Users group

After Administrator/Administrators, the second most powerful account and group type in Windows. Power users have differing capabilities in different versions of Windows.

Establish a plan of action to resolve the problem and implement the solution

After establishing and testing a theory about a particular problem, techs solve the problem (step 4 of 6 in the CompTIA troubleshooting methodology)

Establish a theory of probable cause (question the obvious)

After identifying a problem, techs question the obvious to determine what might be the source of the problem (step 2 of 6 in the CompTIA troubleshooting methodology)

EULA (End User License Agreement)

Agreement that accompanies a piece of software, to which the user must agree before using the software. Outlines the terms of use for the software and also lists any actions on the part of the user that violate the agreement.

protocol

Agreement that governs the procedures used to exchange information between cooperating entities. Usually includes how much information is to be sent, how often it is to be sent, how to recover from transmission errors, and who is to receive the information

instruction set

All of the machine-language commands that a particular CPU is designed to understand

option ROM

Alternative way of telling the system how to talk to a piece of hardware. Option ROM stores BIOS for the card in a chip on the card itself

imaging drum

Aluminium cylinder in a laser printer that is coated with particles of photosensitive compounds. When light hits these particles, whatever electrical charge they may have "drains" out through the grounded cylinder. After the particles are selectively charged by the laser, they attract the toner particles, forming the image that will be transferred. Often built into the toner cartridge. Also known as photosensitive drum

integrity

Always doing the right thing

latency

Amount of delay before a device may respond to a request; most commonly used in reference to RAM.

current

Amount of electrons moving past a certain point on a wire, measured in units called amperes. Also called amperage

Lightning

An 8-pin connector, proprietary to Apple, that can be inserted without regard to orientation. Used to connect mobile devices to a power or data source.

launcher

An Android app that serves as the device's desktop, often with more extensive customization features than launchers provided by Google or the device maker

SIMM (single inline memory module)

An early DRAM package format that came in two common sizes: 30-pin and 72-pin

computer

An electronic device that can perform calculations

microphone

An input device for recording audio.

game controller

An input device specifically designed for playing computer games. Typically has an array of buttons and triggers that control movement and actions on screen

Thunderbolt

An open standards connector interface that is primarily used to connect peripherals to devices, including mobile devices, if they have a corresponding port.

guest

An operating system running inside a virtual machine

line of sight

An unobstructed view between two devices. Required for IR communications.

comment

Annotation text included in scripts, programs, and configuration files, which may be used to describe what the code or setting does and how or why it does it. Most scripting, programming and configuration languages specify how to mark comment text.

RFI (radio frequency interference)

Another form of electrical interference caused by radio wave-emitting devices, such as cell phones, wireless network cards, and microwave ovens.

SATA 3.2

Another term for SATAe.

Reset to factory default

Another term for a factory reset

Personally Identifiable Information (PII)

Any data that can lead back to a specific individual

full-duplex

Any device that can send and receive data simultaneously.

peripheral

Any device that connects to the system unit

system fan

Any fan controlled by the motherboard but not directly attached to the CPU.

hot-swappable

Any hardware that may be attached to or removed from a PC without interrupting the PC's normal processing.

resistor

Any material or device that impedes the flow of electrons. Antistatic wrist straps and mats use tiny resistors to prevent a static discharge from racing through the device

FRU (field replaceable unit)

Any part of a PC that is considered to be replaceable "in the field," i.e., a customer location. There is no official list of FRUs—it is usually a matter of policy by the repair center.

removable media

Any storage on a computer that can be easily removed. For example, optical discs, flash drives, or memory cards.

unauthorized access

Anytime a person accesses resources in an unauthorized way. This access may or may not be malicious.

iCloud

Apple cloud-based storage. iCloud enables a user to back up all iPhone or iPad data, and makes that data accessible from anywhere. This includes any media purchased through iTunes and calendars, contacts, reminders, and so forth.

Boot camp

Apple tool used to install and boot to versions of Windows on a macOS computer

User Accounts applet

Applet in Control Panel that enables you to make changes to current accounts (local or global), and gives you access to the Settings charm (or app in Windows 10) when you opt to add a new account.

Computer management

Applet in Windows' Administrative Tools that contains several useful snap-ins, such as Device Manager and Disk Management.

disk quota

Application allowing network administrators to limit hard drive space usage.

Intrusion Prevention System (IPS)

Application similar to an intrusion detection system (IDS), except that it sits directly in the flow of network traffic. This enables it to stop ongoing attacks itself, but may slow down the network and be a single point of failure.

Intrusion Detection System (IDS)

Application that inspects packets, looking for active intrusions. Functions inside the network, looking for threats a firewall might miss, such as viruses, illegal logon attempts, and other well-known attacks. May also discover threats from inside the network, such as a vulnerability scanner run by a rogue employee

print spooler

Area of memory that queues up print jobs that the printer will handle sequentially.

telecommunications room

Area where all the cabling from individual computers in a network converges

queue

Area where objects wait their turn to be processed. Example: the print queue, where print jobs wait until it is their turn to be printed

LGA (Land Grid Array)

Arrangement of a large number of pins extending from the CPU socket to corresponding contact points on the bottom of the CPU

PGA (pin grid array)

Arrangement of a large number of pins extending from the bottom of the CPU package into corresponding holes in the CPU socket

zero-day attack

Attack targeting a previously unknown bug or vulnerability that software or hardware developers have had zero days to fix

man-in-the-middle (MITM)

Attacker serves as an intermediary between two systems, enabling the attacker to observe, redirect, or even alter messages passing in either direction.

Test the theory to determine cause

Attempt to reslove the issue by either confirming the theory and learning what needs to be done to fix the problem, or by not confirming the theory and forming a new one or escalating (Step 3 of 6 in the CompTIA troubleshooting methodology)

headphones

Audio output device that sits on top of or in a user's ears.

CD quality

Audio quality that has a sample rate of 44.4 KHz and a bit rate of 128 bits.

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

Authentication challenge using images, videos, sounds, or other media to be identified by a user. Computers have a much more difficult time discerning the content of these tests than humans, making the challenge useful in determining if a human or a computer is attempting access

Kerberos

Authentication encryption developed by MIT to enable multiple brands of servers to authenticate multiple brands of clients.

two-factor authentication

Authentication process that provides additional secuirty by requiring two different authentication factors

MFA (Multifactor Authentication)

Authentication schema requiring more than one unique authentication factor. The factors are knowledge, possession, inherence, location, and temporal. For example, a password (knowledge factor) and a fingerprint (inherence factor) is a basic form of multifactor authentication

PKI (Public Key Infrastructure)

Authentication schema where public keys are exchanged between all parties using digital certificates, enabling secure communication over public networks.

Extensible Authentication Protocol (EAP)

Authentication wrapper that EAP-compliant applications can use to accept one of many types of authentication. While EAP is a general-purpose authentication wrapper, its only substantial use is in wireless networks.

DAC (Discretionary Access Control)

Authorization method based on the idea that there is an owner of a resource who may at his or her discretion assign access to that resource. DAC is considered much more flexible than mandatory access control (MAC).

MAC (Mandatory Access Control)

Authorization method in which the system grants access to resouces based on security labels and clearnace levels. Less flexible than discretionary access control (DAC), which lets users assign access levels to resources they own. MAC may be used in organizations with very high security needs.

image-level backup

Backing up a complete volume including any OS, boot files, applications, and data it contains

impersonation

Backing up a complete volume including any OS, boot files, applications, and data it contains

UPC (Universal Product Code)

Bar code used to track inventory

Hex (Hexadecimal)

Base-16 numbering system using ten digits (0 through 9) and six letters (A through F). In the computer world, shorthand way to write binary numbers by substituting one hex digit for a four-digit binary number (e.g., hex 9 = binary 1001).

packet

Basic component of communication over a network. Group of bits of fixed maximum size and well-defined format that is switched and transmitted as a single entity through a network. Contains source and destination address, data, and control information. Packets are included within (and are not the same thing as ) a frame

POST

Basic diagnostic routine completed by a system at the beginning of the boot process to make sure a display adapter and the system's memory are installed; it then searches for an operating system. If it finds one, it hands over control of the machine to the OS

Li-Ion (Lithium-Ion)

Battery commonly used in portable computing devices. Li-Ion batteries don't suffer from the memory effects of Nickel-Cadmium (Ni-Cd) batteries and provide much more power for a greater length of time.

Ni-CD (Nickel-Metal Hydride)

Battery used in early portable PCs. Ni-MH batteries had fewer issues with the memory effect than Ni-Cd batteries. Ni-MH batteries in computing devices have been replaced by Lithium-Ion batteries

pickup roller

Begins the printing process by grabbing paper to be printed and passing it over the separation pad

measured service

Billing model cloud service providers use to charge for services in small increments based on the computing resources the customer consumes

machine language

Binary instruction code that is understood by the CPU.

Steaming Media

Broadcast of data that is played on your computer and immediately discarded

tower spoofing

Broadcasting a rogue cellular signal that imitates a legitimate cell tower in order to trick cellular devices into connecting

malware

Broadly, software designed to use your computer or device against your wishes. Includes adware, spyware, viruses, ransomware, etc. may be part of seemingly legitimate software or installed by exploiting a vulnerability in the device

ISO-9660

CD format to support PC file systems on CD media. often referred to by the more generic term CD File System (CDFS)

CD-R (CD-recordable)

CD technology that accepts a single "burn" but cannot be erased after that one burn.

CD-RW (CD-rewritable)

CD technology that accepts multiple reads/writes like a hard drive.

music CD-R

CD using a special format for home recorders. Music CD-R makers pay a small royalty to avoid illegal music duplication.

ALU (arithmetic logic unit)

CPU logic circuits that perform basic arithmetic (add, subtract, multiply, and divide)

clock-multiplying CPU

CPU that takes the incoming clock signal and multiples it inside the CPU to let the internal circuitry of the CPU run faster.

dual-core

CPUs that have two execution units on the same physical chip but share caches and RAM.

STP (shielded twisted pair)

Cabling for networks, composed of pairs of wires twisted around each other at specific intervals. Twists serve to reduce interference (also called crosstalk)—the more twists, the less interference. Cable has metallic shielding to protect the wires from external interference.

coaxial cable

Cabling in which an internal conductor is surrounded by another, outer conductor, thus sharing the same axis

horizontal cabling

Cabling that connects the equipment room to the work areas.

digital camera

Camera that simulates film technology electronically.

sampling

Capturing sound waves in electronic format

Controller card

Card adapter that connects devices, such as a drive, to the main computer bus/motherboard

Product Release Instructions (PRI)

Carrier-made updates that modify many complex settings for CDMA devices to ready them deployment on the carrier's network

printhead

Case that holds the printwires in a dot-matrix printer.

external enclosure

Casing that encloses an external hard drive.

Cat 5

Category 5 wire; an ANSI/TIA standard for UTP wiring that can operate at up to 100 Mbps

Start button

Clickable element on the Windows taskbar that enables access to the Start menu

public cloud

Cloud network built and maintained by a large company for use by any individual or company who wants to create an account and start paying for services

private cloud

Cloud network built and maintained by or explicitly for a specific company or organization. Often on-site, but may be provided by a third party. While a public cloud network often requires more expertise and costs more, especially up front, it also enables greater customization and security

Community cloud

Cloud network that serves a community or group with shared needs and interests, such as hospitals or defense contractors

SaaS (Software as a Service)

Cloud-based service to store, distribute, and update programs and applications. The SaaS model provides access to necessary application wherever you have an Internet connection, often without having to carry data with your regularly update software.At the enterprise level, the subscription model of many SaaS providers makes it easier to budget and keep hundreds or thousands of computers up to date.

virtual application streaming

Cloud-based versions of local application. Virtual application streaming enables access to programs using almost any device that can browse the Internet

PaaS (Platform as a Service)

Cloud-based virtual server(s). These virtualized platforms give programmers tools needed to deploy, administer, and maintain a Web application.

IaaS (Infrastructure as a Service)

Cloud-hosted provider of virtualized servers and networks.

RG-59

Coaxial cable used for cable television, cable modems, and broadcast TV; thinner than RG-6, which makes it suitable for shorter patch cables

RG-6

Coaxial cabling used for cable television. It has a 75-ohm impedance and uses an F-type connector

signature (malware)

Code pattern of a known virus or malware that antivirus/anti-malware software uses to detect malware

Digital Rights Management (DRM)

Code schemes for enforcing what users can and can't do with commercial software or digital media files

product key

Code used during installation to verify legitimacy of the software.

Plug and Play (PnP)

Combination of smart PCs, smart devices, and smart operating systems that automatically configure all necessary system resources and ports when you install a new peripheral device.

CFS (Command File System)

Command file system or common file system

reg

Command line tool for editing the Registry

copy command

Command line tool used to make a copy of a file and paste it in another location

pipe

Command-line operator that uses the | symbol to "pipe" output from one command to another, instead of printing it to the screen

nslookup

Command-line program in Windows used to determine exactly what information the DNS server is providing about a specific host name.

netstat

Command-line tool in Windows and Linux to identify inbound and outbound TCP/IP connections with the host

Windows PowerShell

Command-line tool included with Windows. Offers a number of powerful scripting tools for automating changes both on local machines and over networks.

ipconfig

Command-line utility for Windows servers and workstations that displays the current TCP/IP configuration of the machine. Similar to ifconfig

sfc (System File Checker)

Command-prompt program (sfc.exe) that scans, detects, and restores Windows system files, folders, and paths.

F-type connector

Common coax connector secured with a screw connector

serial port

Common connector on older PC. Connects input devices (such as a mouse) or communications devices (such as a modem). Also referred to as a COM port.

Wi-Fi (Wireless Fidelity)

Common name for the IEEE 802.11 wireless Ethernet standard.

Broadband

Commonly understood as a reference to high-speed, always-on communication links that can move large files much more quickly than a regular phone line.

TCP/IP (Transmission Control Protocol/Internet Protocol)

Communication protocols developed by the US Department of Defense to enable dissimilar computers to share information over a network. TCP/IP is the primary protocol of most modern networks, including the internet

eliciting answers

Communication strategy designed to help techs understand a user's problems better. Works by listening to a user's description of a problem and then asking cogent questions.

www.comptia.org

CompTIA's Web site.

thick client

CompTIAs name for a standard desktop build. Runs a modern operating system and general productivity applications to accomplish the vast majority of tasks needed by office and home users. It does not need a network connection to run and it meets the recommended requirements for its OS

Pearson VUE

Company that administers the CompTIA A+ exams.

ISP (Internet Service Provider)

Company that provides access to the Internet, usually for money

ISO file

Complete copy (or image) of a storage media device, typically used for optical discs. ISO image files typically have a file extension of .iso.

Zigbee

Completely open wireless networking protocol designed to address home automation challenges

Registry

Complex binary file used to store configuration data about a particular Windows system. To edit the Registry, users can use the applets found in the Control Panel or regedit.exe or regedt32.exe.

RIP (Raster Image Processor)

Component in a printer that translates the raster image into commands for the printer.

erase lamp

Component inside laser printers that uses light to make the coating of the photosensitive drum conductive.

GDI (graphical device interface)

Component of Windows that utilizes the CPU rather than the printer to process a print job as a bitmapped image of each page.

rainbow table

Compressed file that contains a mapping of hashed passwords (or other account information) to the corresponding unhashed, plaintext password. Rainbow tables are useful for reversing unsalted hashes in older/legacy authentication systems, but are useless for reversing properly salted hashes used by well-designed, modern authentication systems

file server

Computer designated to store software, courseware, administrative tools, and other data on a LAN or WAN. It "serves" this information to other computers via the network when users enter their personal access codes.

AnandTech.com

Computer hardware, technology, and Internet news and information site

zombie

Computer infected with malware that has turned it into a botnet member

video capture

Computer jargon for the recording of video information, such as TV shows or movies.

molex connector

Computer power connector used by optical drives, hard drives, and case fans. Keyed to prevent it from being inserted into a power port improperly.

Client

Computer program that uses the services of another computer program. Also software that extracts information from a server; your auto-dial phone is a client and the phone company is its server. Also, a machine that accesses shared resources on a server

server

Computer that shares its resources, such as printers and files, with other computers on a network. Example: network file system server that shares its disk space with a workstation that does not have a disk drive of its own

VR (Virtual Reality)

Computer-generated 3-D video and audio paired with special hardware (usually including a VR headset and sensors to detect movement) to create an immersive simulation a user navigates by moving around in physical space

compliance

Concept that members of an organization must abide by the rules created by and applying to that organization (including government regularions). For a technician, this often defines what software can or cannot be installed on an organiztion's computers

parallel port

Connection for the synchronous, high-speed flow of data along parallel lines to a device, usually a printer.

Transmission Control Protocol (TCP)

Connection-oriented protocol used with TCP/IP

PCIe 6/8-pin connector

Connector on some power supplies for powering a dedicated graphics card

expansion slots

Connectors on a motherboard that enable users to add optional components to a system. (See also AGP, PCI, and PCIe.)

HBA (host bus adapter)

Connects SATA devices to the expansion bus. Also known as the SATA controller.

IEC-320

Connects the cable supplying AC power from a wall outlet into the power supply.

resource pooling

Consolidating resources from many systems into a smaller number of more powerful systems, reducing power, maintenance, and hardware costs.

PCMCIA (Personal Computer Memory Card International Association)

Consortium of computer manufacturers who devised the PC card standard for credit card-sized adapter cards that add functionality in older notebook computers and other computer devices. PCMCIA shut down in 2009

user account

Container that identifies a user to an application, operating system, or network, including name, password, user name, groups to which the user belongs, and other information based on the user and the OS being used. Usually defines the rights and roles a user plays on a system.

notification area

Contains icons representing background processes, the system clock, and volume control. Located by default at the right edge of the Windows taskbar. Most users call this area the system tray.

system tray

Contains icons representing background processes and the system clock. Located by default at the right edge of the Windows taskbar. Accurately called the notification area.

Taskbar

Contains the Start button, Search box (windows 10), pinned apps, running apps, and the notification are. Located by default at the bottom of the desktop

loop

Control construct used in a script or program to repeat a sequence of instructions when certain conditions are met. For example, a script could use a loop to a set of instructions for resizing an image once for every image file in a directory.

File History

Control panel applet introduced in Window 8 for backing up personal files and folders

policies

Control permission to perform a given action, such as accessing a command prompt, installing software or logging on at a certain time of day. Contrast with true permissions, which control access to specific resources

expansion bus crystal

Controls the speed of the expansion bus.

printed circuit board (PCB)

Copper etched onto a nonconductive material and then coated with some sort of epoxy for strength.

kernel

Core portion of program that resides in memory and performs the most essential operating system tasks.

thin provisioning

Creating a Storage Space that reports a size greater than the actual capacity installed in the computer, with the ability to later add more physical capacity up to the reported size

tunneling

Creating an encrypted link between two programs on two separate computers.

user password

Credentials assigned to a login account that does not have administrative capabilities

administrator password

Credentials for the system administrator account

burn-in failure

Critical failure usually associated with manufacturing defects.

system crystal

Crystal that provides the speed signals for the CPU and the rest of the system.

DB connectors

D-shaped connectors used for a variety of connections in the PC and networking world. Can be male (with prongs) or female (with holes) and have a varying number of pins or sockets. Also called D-sub, D-subminiature, or D-shell connectors. They are still reasonably common, but rarely used

open source

Describes a product fo which the plans, schematics, recipes, or other information used to create it are released by its creator or distributor. Most commonly applied to software

closed source

Describes a product for which the plans, schematics, recipes, or other information used to create it are solely controlled by its creator or distributor. Most commonly applied to software

UNC (Universal Naming Convention)

Describes any shared resource in a network using the convention \\<server name>\<name of shared resource>.

Registration(printing)

Describes how accurately the printer lays down each color layer that makes up a page or image. Poor registration can result in muddled colors or a fringe of pure color around a shape or image. Printers usually have a routine (which may mention calibration, alignment, or registration) for detecting and fixing alignment issues

monaural

Describes recording tracks from one source (microphone) as opposed to stereo, which uses two sources.

stereo

Describes recording tracks from two sources (microphones) as opposed to monaural, which uses one source.

nonvolatile

Describes storage that retains data even if power is removed; typically refers to a ROM or flash ROM chip, but also could be applied to hard drives, optical media, and other storage devices

polarization

Describes the alignement (such as vertical or horizontal) of antennas and the signals they transmit. Because polarization, a Wi-FI client and WAP will have the best connection when their antennas are oriented

permission propagation

Describes what happens to permissions on an object, such as a file or folder, when you move or copy it

screen orientation

Describes whether a mobile device screen is in portrait or landscape mode, and the device settings that govern when the orientation may change. When the screen orientation setting is in automatic mode, the user interface (UI) will switch between portrait and landscape modes based on the device's orientation in physical space.

PCI (Peripheral Component Interconnect)

Design architecture for the expansion bus on the computer motherboard that enabled system components to be added to the computer. Used parallel communication. Local bus standard, meaning that devices added to a computer through this port used the processor at the motherboard's full speed (up to 33 MHz) rather than at the slower 8-MHz speed of the regular bus. Moved data 32 or 64 bits at a time rather than the 8 or 16 bits the older ISA buses supported

ISA (Industry Standard Architecture)

Design found in the original IBM PC for the slots that allowed additional hardware to be connected to the computer's motherboard. An 8-bit, 8.33-MHz expansion bus was designed by IBM for its AT computer and released to the public domain. An improved 16-bit bus was also released to the public domain. Replaced by PCI in the mid-1990s.

NLQ (near-letter quality)

Designation for dot-matrix printers that use 24-pin printheads.

modem (modulate/demodulate)

Device that converts a digital bit stream into an analog signal (modulation) and converts incoming analog signals back into digital signals (demodulation). An analog communications channel is typically a telephone line, and analog signals are typically sounds

3-D printer

Device that creates (or "prints") three-dimensional objects, typically by melting material (such as plastic filament) reassembling it in layers

USB hub

Device that extends a single USB connection to two or more USB ports, almost always directly from one of the USB ports connected to the root hub.

VoIP phone

Device that looks like a regular landline phone but uses VoIP to communicate over a computer network

speaker

Device that outputs sound by using magnetically driven diaphragm

port replicator

Device that plugs into a USB port or other specialized port and offers common PC ports, such as serial, parallel, USB, network, and PS/2. By plugging your note- book computer into the port replicator, you can instantly connect the computer to non-portable components such as a printer, scanner, monitor, or full-sized keyboard. Port replica- tors are typically used at home or in the office with the non- portable equipment already connected.

docking station

Device that provides a portable computer extra features such as a DVD drive or PC Card, in addition to legacy and modern ports. Similar to a port replicator. Also, a charging station for mobile devices

firewall

Device that restricts traffic between a local network and the Internet.

smart card reader

Device that scans the smart card chip, such as those in ID badges. Common applications include enhancing the security of doors or laptops

UPS (uninterruptible power supply)

Device that supplies continuous clean power to a computer system the whole time the computer is on. Protects against power outages and sags. (and corresponding data loss)

analog

Device that uses a physical quantity, such as length or voltage, to represent the value of a number. By contrast, digital storage relies on a coding system of numeric units

loopback plug

Device used during loopback tests to check the female connector on a NIC.

inverter

Device used to convert DC current into AC. Commonly used with CCFLs in laptops and flatbed scanners.

multimeter

Device used to measure voltage, amperage, and resistance.

card reader

Device with which you can read data from one of several types of flash memory.

real-time clock (RTC)

Device within the CMOS memory chip that provides date and time information to the computer and operating system

fitness monitor

Devices that encourage physical fitness by counting steps using accelerometers, registering heart rate through sensors, using GPS to track exercise, and offering vibration tools to remind the user to get moving. Fitness trackers fit into one of two type: fobs that clip to the body and more sophisticated fitness bands or watches.

driver signing

Digital signature for drivers used by Windows to protect against potentially bad drivers.

DisplayPort

Digital video connector used by Apple Mac desktop models and some PCs, notably from Dell. Designed by VESA as a royalty-free connector to replace VGA and DVI.

root directory

Directory that contains all other directories.

RAID 6

Disk striping with extra parity. Like RAID 5, but with more parity data. Requires five or more drives, but you can lose up to two drives at once and your data is still protected.

Native Command Queuing (NCQ)

Disk-optimization feature for SATA drives enabling faster read and write speeds

fdisk

Disk-partitioning utility used in DOS and Windows 9x systems.

DLP (digital light processing)

Display technology that reflects and directs light onto a display surface using micromechanically operated mirrors.

IPS (in-plane switching)

Display technology that replaces the older twisted nematic (TN) panels for more accurate colors and a wider viewing angle.

vertical alignment (VA)

Display technology used in mid-range LCD panels. VA refers to how the liquid crystal matrix is arranged within the panel

OLED (organic light-emitting diode)

Display technology where an organic compound provides the light for the screen, thus eliminating the need for a backlight or inverter. Used in high-end TVs and small devices such as smart watches, smartphones, and VR headsets

rearview projector

Display using a projector that illuminates a semi-transparent screen from the back. Once popular for televisions, but virtually unheard of for PCs

Ethic of Reciprocity (Golden Rule)

Do unto others as you would have them do unto you

entry control roster

Document for recording who enters and leaves a building

BitLocker Drive Encryption

Drive encryption software offered in high-end versions of Windows. BitLocker requires a special chip to validate hardware status and to ensure that the computer hasn't been hacked.

mount point

Drive that functions like a folder mounted into another drive.

optical drive

Drive used to read/write to optical discs, such as CDs or DVDs.

unsigned driver

Driver that has not gone through the Windows Certification Program to ensure compatibility. Rarely seen on modern Windows machines, as only the last of the 32-bit Windows versions support unsigned drivers

terminal

Dumb device connected to a mainframe or computer network that acts as a point for entry or retrieval of information

parity RAM

Earliest form of error-detecting RAM; stored an extra bit (called the parity bit) to verify the data.

parity

Early method of error detection where a small group of bits being transferred is compared to a single parity bit set to make the total bits odd or even. The receiving device reads the parity bit and determines if the data is valid, based on the oddness or evenness of the parity bit

electromagnetic interference (EMI)

Electrical interference from one device to another, resulting in poor performance of the device being interfered with. Examples: Static on your TV while running a blow dryer, or placing two monitors too close together and getting a "shaky" screen.

laser printer

Electro-photographic printer in which a laser is used as the light source.

chipset

Electronic chips, specially designed to work together, that handle all of the low-level functions of a PC. In the original PC, the chipset consisted of close to 30 different chips. For most of the 90's and 00's, chipsets consisted of one, two, or three seperate chips embedded into a motherboard. Today, CPUs have controllers built in, such as the memory and display controllers. Almost all chipsets are now a single chip

hub

Electronic device that sits at the center of a star topology network, providing a common point for the connection of network devices. Hubs repeat all information out to all ports and have been replaced by switches, although the term "hub" is still commonly used.

ohm (s)

Electronic measurement of a cable's impedance

partitioning

Electronically subdividing a physical hard drive into groups called partitions (or volumes).

firmware

Embedded programs or code stored on a ROM chip. Generally OS-independent, thus allowing devices to operate in a wide variety of circumstances without direct OS support. The system BIOS is firmware.

PPP (Point-to-Point Protocol)

Enables a computer to connect to the Internet through a dial-in connection and enjoy most of the benefits of a direct connection.

VPN (Virtual Private Network)

Encrypted connection over the Internet between a computer or remote network and a private network.

Transport Layer Security (TLS)

Encryption protocol used to securely connect between servers and clients, such as when your Web browser securely connects to Amazon's servers to make a purchase. Replaces SSL

system/application log errors

Errors and warnings in the system/application logs may indicate the presence of a malware infestation and the scope of its effects.

10BasetT

Ethernet cabling system designed to run at 10 Mbps on twister pair cabling

100BaseT

Ethernet cabling system designed to run at 100 Mbps on twister pair cabling. Also called Fast Ethernet

1000BaseT

Ethernet cabling system designed to run at 1000 Mbps on twister pair cabling. Also called Gigabit Ethernet

10 Gigabit Ethernet

Ethernet standard that supports transfer rates up to 10 Gbps and is common on server-to-server connections. Requires Cat 6 or better twisted pair or fiber optic cabling

General Data Protection Regulation (GDPR)

European Union law that defines a broad set of rights and protections of personal information for citizens of the EU

msconfig (System Configuration utility)

Executable file that runs the Windows System Configuration utility, which enables users to configure a system's boot files and critical system files. Often used for the name of the utility, as in "just run msconfig." This functionality moved to Task Manager in Windows 8

NIC (Network Interface Card or Controller)

Expansion card or motherboard interface that enables a PC to connect to a network via a network cable. A wireless NIC enables connection via radio waves rather than a physical cable.

sound card

Expansion card that can produce audible tones when connected to a set of speakers.

Video card

Expansion card that works with the CPU to produce the images displayed on your computer's display.

MIDI-enabled device

External device that enables you to input digital sound information in the MIDI format; for example, a MIDI keyboard (the piano kind).

password reset disc

External storage media such as an optical disc or USB flash drive which users can recover a lost password without losing access to any encrypted, or password-protected, data. The password reset disc must be created proactively; if a user loses a password and did not already make a reset disc, it will be of no help to create one after the loss

HTTP (Hypertext Transfer Protocol)

Extremely fast protocol used for network file transfers on the World Wide Web. Uses port 80

Library

Feature in Windows 7 and later that aggregates folders from multiple locations and places them in a single, easy-to-find spot in Windows Explorer or File Explorer. Default libraries in Windows include Documents, Music, Pictures, and Videos.

geotracking

Feature in cellular phones that enables the cell phone companies and government agencies to use the ID or MAC address to pinpoint where your phone is at any given time.

accelerometer

Feature in smartphones and tablets that rotates the screen when the device is physically rotated

side-by-side apps

Feature introduced in Windows 8 for quickly pinning an app to the left or right half of a screen

MIMO (multiple input-multiple output)

Feature of 802.11n devices that enables the simultaneous connection of up to four antennas, greatly increasing throughput. 802.11ac also uses MU-MIMO which gives a WAP the capability to broadcast to multiple users simultaneously

object access auditing

Feature of Event Viewer's Security section that creates an entry in the Security Log when certain objects are accessed, such as a file or folder.

event auditing

Feature of Event Viewer's Security section that creates an entry in the Security Log when certain events happen, such as a user logging on.

APIPA (Automatic Private IP addressing)

Feature of Windows that automatically assigns an IP address to the system when the client cannot obtain an IP address automatically

Remote Assistance

Feature of Windows that enables users to give anyone control of his or her desktop over the Internet.

Compatability Modes

Feature of Windows to enable software written for previous versions of Windows to operate in newer operating systems

chassis intrusion detection

Feature offered in some chassis that trips a switch when the chassis is opened.

auto-brightness

Feature on modern mobile devices that attempts to use a camera or other light sensor to adjust screen brightness based on how light or dark it is.

quad-channel architecture

Feature similar to dual-channel RAM, but requiring four sticks instead of two.

metered service

Fee charged by cloud service providers on the basis of how much a resource was used. Fees may be based on things like access time, bandwidth used, bytes uploaded or downloaded, CPU usage, and other resource usage metrics

Information Technology (IT)

Field of computers, their operation and their maintenance

GDDR5

Fifth generation of graphical DDR RAM found on high-performance video cards

Boot Configuration Data (BCD) file

File that contains information about the various operating systems installed on the system as well as instructions for how to actually load (bootstrap) them.

Security tab

File/folder administrative preferences found in the Properties dialog in both File Explorer and Windows Explorer. These preferences govern user and group access to a particular file or folder

log files

Files created in Windows to track the progress of certain processes.

definition file

Files that enable anti-malware programs to identify viruses on your system and clean them. These files should be updated often. Also called signature files

IEEE 1394a

FireWire standard that runs at 400 Mbps.

IEEE 1394b

FireWire standard that runs at 800 Mbps.

software firewall

Firewall implemented in software running on servers or workstations

hardware firewall

Firewall implemented within networking hardware such as a router. See firewall

Level 1 (L1) cache

First RAM cache accessed by the CPU, which stores only the absolute most-accessed programming and data used by currently running threads. Always the smallest and fastest cache on the CPU.

DOS (Disk Operating System)

First popular operating system available for PCs. A text-based, single-tasking operating system that was not completely replaced until the introduction of Windows 95.

logon screen

First screen of the Windows interface, used to log on to the computer system.

boot sector

First sector on a storage drive. The boot-up software in ROM tells the computer to load whatever program is found there. If a system disk is read, the program in the boot record directs the computer to the root directory to load the operating system

root keys

Five main categories in the Windows Registry: HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_USERS HKEY_LOCAL_MACHINE HKEY_CURRENT_CONFIG

spindle speed

Fixed speed in revolutons per minute (RPM) at which a given HDD's platters spin. The most common speeds are 5400 and 7200 RPM; higher performance drives (far less common) run at 10,000 and 15,000 ROM. also called rotational speed

system ROM

Flash ROM chip that stores the system BIOS

USB thumb drive

Flash memory device that uses the standard USB connection.

motherboard

Flat piece of circuit board that resides inside your computer case and has a number of connectors on it. Every device in a PC connects directly or indirectly to the motherboard, including CPU, RAM, hard drives, optical drives, keyboard, mouse, and video cards.

touchpad

Flat, touch-sensitive pad that serves as a pointing device for most laptops.

Public folder

Folder that all users can access and share with all other users on the system or network.

extra battery pack

For devices with removable batteries, an extra battery that can be swapped in as needed

hard reset

For mobile devices, another term for a factory reset. Don't confuse this with a hard reboot. See factory reset

digital certificate

Form in which a public key is sent from a Web server to a Web browser so that the browser can decrypt the data sent by the server.

dual-channel memory

Form of DDR, DDR2, and DDR3 memory access used by many motherboards that requires two identical sticks of DDR, DDR2, or DDR3 RAM.

tailgating

Form of infiltration and social engineering that involves following someone else through a door as if you belong in the building

FPU (floating point unit)

Formal term for math coprocessor (also called a numeric processor) circuitry inside a CPU. A math coprocessor calculates by using a floating point numerical system (which allows for decimals). Before the Intel 80486, FPUs were separate chips from the CPU.

full format

Format process that tests every sector to mark out the unusable ones in the file allocation table (FAT). see formatting

high-level formatting

Format that sets up a file system on a drive.

Computing process

Four parts of a computer's operation: input, processing, output, and storage.

Long Term Evolution (LTE)

Fourth-generation cellular network technology supporting theoretical download speeds up to 1 Gbps and upload speeds up to 100 Mbps. Marketed as and now now generally accepted as a true 4G technology

rogue anti-malware

Free applications that claim to be anti-malware, but which are actually themselves malware

ADSL (asymmetric digital subscriber line)

Fully digital, dedicated connection to the telephone system that provides average download speeds of 3-15Mbps and upload speeds of 384 Kbps to 15 Mbps. Asymmetric identifies that upload and download speeds are different with download usually being significantly faster than upload.

conditionals

Functions that enable a script or program to perform different actions under different conditions. For example, a backup script might "run" every hour, but only create a new backup if the system is idel and if it has been at least a day since the last backup was created

System monitor

GNOME 3 utility that can evaluate and monitor system resources, such as CPU usage and memory usage

integrated GPU

GPU integrated with the motherboard or processor, in contrast to GPUs on separate graphics cards. This typically lowers power consumption, saves space, reduces heat, and may speed up communication with the GPU

dynamic range

Gamut of color or intensity of light that can be displayed or detected by a device

content filtering

Gating access to insecure or objectionable sites using certificates or parental control tools

I/O (input/output)

General term for reading and writing data to a computer. "Input" includes data entered from a keyboard, identified by a pointing device (such as a mouse), or loaded from a disk. "Output" includes writing information to a disk, viewing it on a monitor, or printing it to a printer.

USB (Universal Serial Bus)

General-purpose serial interconnect for keyboards, printers, joysticks, and many other devices. Enables hot-swapping of devices.

CDFS (Compact Disc File System)

Generic name for ISO-9660. File structure, rules, and conventions used when organizing and storing files and data on a CD

stick

Generic name for a single physical SIMM, RIMM, or DIMM.

applet

Generic term for a program in the Windows Control Panel

boot sequence

List containing information telling the bootstrap loader in which order to check the available storage devices for an OS. Configurable in CMOS setup.

ROM (Read Only Memory)

Generic term for nonvolatile memory that can be read from but not written to. This means that code and data stored in ROM cannot be corrupted by accidental erasure. Additionally, ROM retains its data when power is removed, which makes it the perfect medium for storing BIOS data or information such as scientific constants.

toner (networking)

Generic term for two devices used together - a tone generator and a tone probe (locator)- to trace cables by sending an electrical signal along a wire at a particular frequency. The tone probe then emits a sound when it distinguishes that frequency

vendor specific

Generically, a proprietary product or technology that doesn't use common, open standards, Vendor-specific products or features may not be completely or even partially compatible with products from other vendors. Also applies to stores that only sell products from one manufacturer, like the Apple store

Key fob

Generically, just about anything attached to a key ring that isn't a key. Some security tools, such as hardware security tokens and RFID authentication devices, are commonly designed as key fobs

remote desktop

Generically, the process of using one system to access the desktop or graphical user interface (GUI) of a remote system

swipe

Gesture for mobile devices where you hold your finger on the screen and slide it across the screen, either right to left or top to bottom, depending on the type of application.

Chrome OS

Google's Linux-based operating system designed to connect users via the Internet into google applications, such as Gmail, Google Docs, and more. Chrome OS comes preinstalled on purpose-built hardware such as the Chromebook portable computers

Google Play

Google's app and media store for Android devices

printwires

Grid of tiny pins in a dot-matrix printer that strike an inked printer ribbon to produce images on paper.

Administrative Tools

Group of Control Panel applets, including computer management, Event Viewer, Performance Monitor, and Task Scheduler

LAN (Local Area Network)

Group of computers connected via cabling, radio, or infrared that use this connectivity to share resources such as printers and mass storage.

Domain

Groupings of users, computers or networks. In Microsoft networking, a domain is a group of computers and users that share a common account database and common security policy. On the Internet, a domain is a group a common security policy. On the Internet, a domain is a group of computers that share a common element in their hierarchical name. Other types of domains exist- e.g. broadcast domain etc.

hard drive

HDD

display adapter

Handles all the communication between the CPU and the monitor. Also known as a video card.

Personalization Settings

Handles user preferences such as the background picture for both the desktop and lock screen, colors of interface elements, themes, which elements show on the Start screen, and so on. Replaced the Personalization applet in Windows 10

chkdsk (CheckDisk)

Hard drive error detection and, to a certain extent, correction utility in Windows, launched from the command-line interface. Originally a DOS command (chkdsk.exe); also the executable for the graphical Error-checking tool.

basic disk

Hard drive partitioned in the "classic" way with a master boot record (MBR) and partition table. see also dynamic disks.

disk thrashing

Hard drive that is constantly being accessed due to lack of available system memory. When system memory runs low, a Windows system will utilize hard disk space as "virtual" memory, thus causing an unusual amount of hard drive access.

mass storage

Hard drives, optical discs, removable media drives, etc.

smart card

Hardware authentication involving a credit card-sized card with circuitry that can be used to identify the bearer of that card.

plug

Hardware connection with some sort of projection that connects to a port.

KVM (Keyboard, Video, and Mouse) switch

Hardware device that enables multiple computers to be viewed and controlled by a single mouse, keyboard, and screen.

service menu

Hidden device menu containing tools for technicians servicing the device. May contain diagnostics, reports, or interfaces for changing otherwise inaccessible settings.

Diagnostics menu

Hidden mobile device menu that contains tests and diagnostics for verifying the functionality of various device hardware.

FAT (File Allocation Table)

Hidden table that records how files on a hard disk are stored in distinct clusters; the only way DOS knows where to access files. Address of first cluster of a file is stored in the directory file. FAT entry for the first cluster is the address of the second cluster used to store that file. In the entry for the second cluster for that file is the address for the third cluster, and so on until the final cluster, which gets a special end-of-file code. There are two FATs, mirror images of each other, in case one is destroyed or damaged. Also refers to the 16-bit file allocation table when used by Windows 2000 and later NT-based operating systems.

S/PDIF (Sony-Philips Digital Interface)

High-Quality digital audio connector. Users can connect their computers directly to a 5.1 speaker system or receiver with a single cable. S/PDIF comes in both a coaxial version and an optical version

audio interface

High-end external sound device used by Audio engineers and recording artists.

quick format

High-level formatting that creates just the file allocation table and a blank root directory

DSL (digital subscriber line)

High-speed Internet connection technology that uses a regular telephone line for connectivity. DSL comes in several varieties, including asynchronous (ADSL) and synchronous (SDSL), and many speeds. Typical home-user DSL connections are ADSL with faster download speeds than upload speeds.

fiber-optic cable

High-speed cable for transmitting data, made of high-purity glass sealed within an opaque tube. Much faster than conventional copper wire such as coaxial cable. Most common connectors include ST, SC, and LC

print resolution

How densely a printer lays down ink on the page. Measured in "dots per inch" (dpi). Affects quality of a print image

file format

How information is encoded in a file. Two primary types are binary (pictures) and ASCII (text), but within those are many formats, such as BMP and GIF for pictures. Commonly represented by a suffix at the end of the filename; for example, .txt for a text file or .exe for an executable.

TrackPoint

IBM's pencil eraser-sized joystick used in place of a mouse on laptops.

IEEE 1394

IEEE standard governing FireWire communication. see FireWire

link-local address

IPv6 address a computer gives itself when it first boots. IPv6's equivalent to IPv4's APIPA address

VR headset

Immersive headset or eyewear that enables its wearer to interact with simulated reality

PATA (Parallel ATA)

Implementation that integrates the controller on the disk drive itself. (See also ATA, IDE, SATA.)

Safe mode

Important diagnostic boot mode for Windows that runs only very basic drivers and turns off virtual memory.

Enhanced 911 (E-911)

Improves 911 service for cellular phones by using GPS and cellular network triangulation to locate the device and dispatch emergency responders

kill

In UNIX shells (such as Bash) and in PowerShell. this command terminates the indicated process

charms

In Windows 8 and 8.1, tools located in the hidden Charms bar, such as a search function, a sharing tool, a settings tool, and more.

Storage Spaces

In Windows 8 and later, a software RAID solution that enables users to group multiple drives into a single storage pool

Personalization applet

In Windows 8.1 and earlier, this Control Panel applet handles user preferences such as the background picture, colors of various interface elements, and so on.

default gateway

In a TCP/IP network, the nearest router to a particular host. This router's IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP

work area

In a basic structured cabling network, often simply an office or cubicle that potentially contains a PC attached to the network

owner

In both NTFS and UNIX permissions, the owner is usually the user that created a given file or folder, although both systems support changing ownership to another user

backout plan

In case a change doesn't go as planned, a set of steps necessary to undo the change and restore the infrastructure to its previous state.

System resources

In classic terms, the I/O addresses, IRQs, DMA channels, and memory addresses. Also refers to other computer essentials such as hard drive space, system RAM, and processor speed

pixel (picture element)

In computer graphics, smallest element of a display space that can be independently assigned color or intensity.

anti-aliasing

In computer imaging, blending effect that smooths sharp contrasts between two regions e.g. jagged lines or different colors. Reduces jagged edges of text or objects. In voice signal processing, process of removing or smoothing out spurious frequencies from wave forms produced by converting digital signals back to analog

transfer roller

In more recent laser printers, replaces the transfer corona, but performs the same task: applying a positive charge to the paper to draw toner form the imaging drum to the papaer

Port (networking)

In networking, the number used to identify the requested service (such as SMTP or FTP) when connecting to a TCP/IP host. Examples: 80 (http), 443 (HTTPS), 21 (FTP), 23 (Telnet), 25 (SMTP), 110 (POP3), 143 (IMAP), and 3389 (RDP).

high gloss

Laptop screen finish that offers sharper contrast, richer colors, and wider viewing angles than a matte finish, but is also much more reflective.

northbridge

In older chipsets, a chip that connects a CPU to memory, the PCI bus, Level 2 cache, and high-speed graphics. Communicates with the CPU through the frontside bus. Newer CPUs feature an integrated northbridge

Southbridge

In older chipsets, a chip that handled all the inputs and outputs to the many devices in the PC

trigger port

In port triggering, outbound traffic on this port will cause the router to open the destination port and wait for a response

string

In programming and scripting, a non-numeric sequence of alphanumeric data

variables

In scripting and programming, named labels for some portion of in-memory data. The actions taken by the script or program may change or replace the data in the variable

incident response leader

In some organizations, a person other than a supervisor responsible for receiving a responding to all incident reports.

DVD-RW/DVD+RW

Incompatible rewritable DVD media formats.

bit depth

Indicates the number of signal characteristics a device can capture or produce, or the number recorded in a file. Greater bit depths mean more characteristics can be captured, stored, and reproduced. Often used to describe the quality of audio or video signals.

ASCII (American Standard Code for Information Interchange)

Industry-standard 8-bit characters used to define text characters, consisting of 96 upper- and lowercase letters, plus 32 non printing control characters each of which is numbered. These numbers were designed to achieve uniformity among computer devices for printing and the exchange of simple text documents

CompTIA Network+ certification

Industry-wide, vendor-neutral certification for network technicians, covering network hardware, installation, and troubleshooting.

CompTIA A+ certification

Industry-wide, vendor-neutral computer certification program that demonstrates competency as a computer technician

surge suppressor

Inexpensive device that protects your computer from voltage spikes.

BSoD (Blue Screen of Death)

Infamous error screen that appears when Windows encounters an unrecoverable error.

location data

Information provided by a mobile device's GPS; used for mapping functions as well as for location-aware services, such as finding nearby restaurants or receiving coupons for nearby shops.

SPD (serial presence detect)

Information stored on a RAM chip that describes the speed, capacity, and other aspects of the RAM chip.

mouse

Input device that enables users to manipulate a cursor on the screen to select items.

keyboard

Input device. Three common types of keyboards exist: those that use a mini-DIN (PS/2) connection, those that use a USB connection, and those that use wireless technology.

multitouch

Input method on many smartphones and tablets that enables you to use multiple fingers to do all sorts of fun things, such as using two fingers to scroll or swipe to another screen or desktop.

upgrade installation

Installation of Windows on top of an earlier installed version, thus inheriting all previous hardware and software settings.

Android application package (APK)

Installation software for Android apps

clean installation

Installing an operating system on a fresh drive, following a reformat of that drive. often it's the only way to correct a problem with a system when many of the crucial operating system files have become corrupted.

USB host controller

Integrated circuit that is usually built into the chipset that acts as the interface between the system and every USB device that connects to it

Hyper-Threading

Intel CPU feature (generically called simultaneous multithreading) that enables a CPU to run more than one thread at once

Platform Controller Hub (PCH)

Intel's name for the chip that collects functions once performed by multiple chips known as the chipset

session hijacking

Intercepting a valid computer session to get authentication information from it, enabling the attacker to use whatever resources the authentication grants access for as long as the authentication information or session is valid

FireWire (IEEE 1394)

Interconnection standard to send wide-band signals over a serialized, physically thin connector system. Serial bus developed by Apple and Texas Instruments; enables connection of 63 devices at speeds up to 800 Mbps. Mostly supplanted by Thunderbolt

MIDI (Musical Instrument Digital Interface)

Interface between a computer and a device for simulating musical instruments. Rather than sending large sound samples, a computer can simply send "instructions" to the instrument describing pitch, tone, and duration of a sound. MIDI files are therefore very efficient. Because a MIDI file is made up of a set of instructions rather than a copy of the sound, modifying each component of the file is easy. Additionally, it is possible to program many channels, or "voices," of music to be played simultaneously, creating symphonic sound.

recent apps

Interface for viewing a list of recently used apps on a mobile device

Network

Interface in File Explorer or Windows Explorer; displays networked computers and other devices, such as network printers

GUI (Graphical User Interface)

Interface that allows users to interact with computer graphically, by using a mouse or other pointing device to manipulate icons that represent programs or documents. Instead of using only text as in early interfaces. Pronounced "gooey"

IPv4 (Internet Protocol version 4)

Internet standard protocol that provides a common layer over dissimilar networks; used to move packets among host computers and through gateways if necessary. Part of the TCP/IP protocol suite. Uses the dotted-decimal format—xxx.xxx.xxx.xxx. Each x represents an 8-bit binary number, or 0-255. Here's an example 192.168.4.1

Spotify

Internet streaming music service

Ars Technica (arstechnica.com)

Internet technology news site.

Cloud file storage services

Internet-based shared file storage spaces that enable users to save, edit, share, and collaborate on stored files, as well as synchronize files among multiple devices and users

NMI (non-maskable interrupt)

Interrupt code sent to the processor that cannot be ignored. Typically manifested as a BSoD.

asset tag

Inventory tracking tags (which may be simple barcodes or use wireless networking protocols such as RFID) that help an organization track items such as equipment.

pop-up

Irritating browser window that appears automatically when you visit a Web site.

Knowledge Base

Large collection of documents and FAQs that is maintained by Microsoft. Found on Microsoft's Web site, the Knowledge Base is an excellent place to search for assistance on most operating system problems.

personal safety

Keeping yourself away from harm.

Windows logo key

Key on a keyboard bearing the Windows logo that traditionally brings up the Start menu, but is also used in some keyboard shortcuts.

password

Key used to verify a user's identity on a secure computer or network

local area network

LAN

PostScript

Language defined by Adobe Systems, Inc., for describing how to create an image on a page. The description is independent of the resolution of the device that will actually create the image. It includes a technology for defining the shape of a font and creating a raster image at many different resolutions and sizes.

matte

Laptop screen finish that offers a good balance between richness of colors and reflections, but washes out in bright light.

static charge eliminator

Laser printer component that removes the static charge from paper to prevent the paper from wrapping around the imaging drum

IEEE (Institute of Electrical and Electronics Engineers)

Leading standards-setting group in the United States

trusted source

Legitimate app stores run by the major OS vendors such as Applie, Google, Microsoft, and Amazon

tiers

Levels of Internet providers, ranging from the Tier 1 backbones to Tier 3 regional networks.

Certification

License that demonstrates competency in some specialized skill.

lamp

Light source in a projector

CCFL (cold cathode fluorescent lamp)

Light technology used in older LCDs and flatbed scanners. CCFLs use relatively little power for the amount of light they provide

Xeon

Line of Intel CPUs designed for servers

vi

Linux and macOS command-line tool for editing text files

passwd

Linux command for changing a user's password

dd

Linux command for copying entire block volumes.

rm

Linux command for deleting files

ifconfig

Linux command for finding out a computer's IP address information

sudo

Linux command for gaining root access

apt-get

Linux command for installing or updating a program using the advanced packaging tool.

Users group

List of local users not allowed, among other things, to edit the Registry or access critical system files. They can create groups, but can only manage the groups they create.

Administrators group

List of members with complete administrator privileges

local user account

List of user names and their associated passwords with access to a system, contained in an encrypted database.

Search box

Location on the Windows 10 Taskbar where users can input text and see suggestions (for settings, programs, files, and popular Web searches) that may be related

Recycle Bin

Location to which files are moved when they are deleted from a modern Windows system. To permanently remove files from a system, they must be emptied from the Recycle Bin.

network ID

Logical number that identifies the network on which a device or machine exists.This number exists in TCP/IP and other network protocol suites

global user account

Login information and associated settings maintained at a location accessible by any computer, irrespective of location or local account configuration

Welcome screen

Logon screen for Windows. Enables users to select their particular user account by clicking on their user picture.

SCSI (Small Computer System Interface)

Long-lived storage device technology once common in the server market. Has been through many iterations. Today, the SCSI command set lives on in Serial Attached SCSI (SAS) hard drives

shoulder surfing

Looking for credentials or sensitive information by watching someone use a computer or device, often over their shoulder

control construct

Loops and conditional statements (such as the "if" statement) are examples of control constructs, which enable programmers to control the conditions user which certain sections of code will run

DDR3L

Low-voltage version of DDR3. Provides cost savings in large deployments, such as a data center

Celeron

Lower-cost brand of Intel CPUs.

Disk Utility

Mac OS X tool that checks for hard drive errors

Finder

Mac OS X's file and folder browser.

dedicated server

Machine that is not used for any client functions, only server functions.

sector

Magnetically preset storage areas on traditional magnetic hard drives. On older hard drives, a sector held 512 bytes of data; modern drives use 4096-byte Advanced Format (AF) sectors

system unit

Main component of the PC, in which the CPU, RAM, CD-ROM, and hard drive reside. All other devices—the keyboard, mouse, and monitor—connect to the system unit.

SMTP (Simple Mail Transfer Protocol)

Main protocol used to send electronic mail on the Internet. Uses port 25

encryption

Making data unreadable by those who do not possess a key or password.

Verify full system functionality and, if applicable, implement preventive measures.

Making sure that a problem has been resolved and will not return (Step 5 of 6 in the CompTIA troubleshooting methodology)

file-level backup

Manually or automatically copying individual files or folders to one or more backup locations

static IP address

Manually set IP address that will not change

EIDE (Enhanced IDE)

Marketing concept of hard drive-maker Western Digital, encompassing four improvements for IDE drives, including drives larger than 528 MB, four devices, increase in drive throughput, and non-hard drive devices. see also ATAPI

PVC (polyvinyl chloride)

Material used to make the plastic protective sheathing around many basic network cables. Produces noxious fumes when burned

consumables

Materials used up by printers, including paper, ink, ribbons, and toner cartridges.

direct LED backlighting

Matrix of LEDs that illuminates a display from directly behind the display panel

interface

Means by which a user interacts with a piece of software

assertive communication

Means of communication that is not pushy or bossy but is also not soft. Useful in dealing with upset customers as it both defuses their anger and gives them confidence that you know what you're doing.

group policy

Means of easily controlling the settings of multiple network clients with policies such as setting minimum password length or preventing Registry edits.

voucher

Means of getting a discount on the CompTIA A+ exams.

shared memory

Means of reducing the amount of memory needed on a video card by borrowing from the regular system RAM, which reduces costs but also decreases performance.

resolution

Measurement for monitors and printers expressed in horizontal and vertical dots or pixels. Higher resolutions provide sharper details and thus display better-looking images

wattage (watts or W)

Measurement of the amps and volts needed for a particular device to function.

volts (V)

Measurement of the pressure of the electrons passing through a wire, or voltage

duplexing assembly

Mechanical feature of some printers that can automatically flip the paper to print on both sides

fuser assembly

Mechanism in laser printers that uses two rollers to fuse toner to paper during the print process.

boot method

Media a computer uses to initiate the booting process. Includes optical media, removable drives, or a networked location. For the related CMOS setting, see boot sequence

IMC (integrated memory controller)

Memory controller circuitry built into the CPU that enables faster control over things like the large L3 cache shared among multiple cores.

RAM (Random Access Memory)

Memory that can be accessed at random—that is, memory which you can write to or read from without touching the preceding address. This term is often used to mean a computer's main memory.

volatile

Memory that must have constant electricty to retain data.

SO-DIMM (small outline DIMM)

Memory used in portable PCs because of its small size

DRAM (Dynamic Random Access Memory)

Memory used to store data in most personal computers. DRAM stores each bit in a "cell" composed of a transistor and a capacitor. Because the capacitor in a DRAM cell can only hold a charge for a few milliseconds, DRAM must be continually refreshed, or rewritten, to retain its data

Start menu

Menu that can be accessed by clicking the Start button on the Windows taskbar. Enables you to see all pro- grams loaded on the system and to start them.

e-mail (electronic mail)

Messages, usually text, sent from one person to another via computer. Can also be sent automatically to a group of addresses (mailing list).

slot covers

Metal plates that cover up unused expansion slots on the back of a PC. Useful in maintaining proper airflow through a computer case.

hierarchical directory tree

Method by which Windows organizes files into a series of folders, called directories, under the root directory. (See also root directory.)

RAID (redundant array of independent disks)

Method for creating a fault-tolerant storage system. RAID uses multiple hard drives in various configurations to offer differing levels of speed/data redundancy

disk striping with parity

Method for providing fault tolerance by writing data across multiple drives and then including an additional drive, called a parity drive, that stores information to rebuild the data contained on the other drives. Requires at least three physical disks: two for the data and a third for the parity drive. This provides data redundancy at RAID levels 5, 10, and 0+1 with different options.

MAC address filtering

Method of limiting wireless network access based on the physical, hard-wired address of the wireless NIC of a computing device.

Run as administrator

Method of running a Windows program with elevated privileges, disabling protections that normally limit a program's ability to damage the system

CFS (Central File System)

Method to unify all storage devices within a network or organization to facilitate a single management point and to provide user access to any file or data within the organization.

Windows Update

Microsoft application used to keep Windows operating systems up to date with the latest patches or enhancements.

IPSec (Internet Protocol Security)

Microsoft's encryption method of choice for networks consisting of multiple networks linked by a private connection, providing transparent encryption between the server and the client.

Windows Hardware Certification Program

Microsoft's rigorous testing program for hardware manufacturers, which hardware devices must pass before their drivers can be digitally signed.

page fault

Minor memory-addressing error.

brightness contorl

Mobile device feature controlling screen brightness. Can be set to automatically adjust to ambient light or be manually changed

location services

Mobile device feature that can detect the device's location, enabling apps to request and use this information to provide location-aware services, such as finding nearby restaurants

Wi-Fi calling

Mobile device feature that enables users to make voice calls over a Wi-Fi network, rather than a cellular network.

screen lock

Mobile device feature that locks the screen until some form of authentication challenge is passed

passcode lock

Mobile device security feature that requires you to type in a series of letters, numbers, or motion patterns to unlock the mobile device each time you press the power button.

e-reader

Mobile electronic device used for reading e-books

NFC (Near Field Communication)

Mobile technology that enables short-range wireless communication between mobile devices. Now used for mobile payment technology such as Apple Pay and Google Pay

airplane mode

Mode for mobile devices that disables all wireless and cellular communication for use on airplanes

AT (Advanced Technology)

Model name of the second-generation, 80286-based IBM computer. Many aspects of the AT, such as the BIOS, CMOS, and expansion bus, have become de facto standards in the PC industry. The physical organization of the components on the motherboard is called the AT form factor.

UEFI (Unified Extensible Firmware Interface)

Modern 32- or 64-bit firmware programming interface. Replaced the original 16-bit PC BIOS. UEFI supports large capacity storage drives, additional features, and a more direct booting process

touchscreen

Monitor with a type of sensing device across its face that detects the location and duration of contact, usually by a finger or stylus.

S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology)

Monitoring system built into hard drives that tracks errors and error conditions within the drive

Phillips head screwdriver

Most important part of a PC tech's toolkit

flatbed scanner

Most popular form of consumer scanner; runs a bright light along the length of the tray to capture an image.

FlexATX

Motherboard form factor. Motherboards built in accordance with the FlexATX form factor are very small, much smaller than microATX motherboards.

inheritance

NTFS feature that passes on the same permissions in any subfolders/files resident in the original folder

filename

Name assigned to a file when the file is first written on a disk. Every file on a disk within the same folder must have a unique name. Filenames can contain any character (including spaces), except the following: \ / : * ? " < > |

Ethernet

Name coined by Xerox for the first standard of network cabling and protocols that define everything necessary to get data from one computer to another. Since its inception, Ethernet has gone through hundreds of improvements and even forms the basis of wireless networking signals

DE (desktop environment)

Name for the various user interfaces found in Linux distributions.

Pentium

Name given to the fifth and later generations of Intel microprocessors; original had a 32-bit address bus, 64-bit external data bus, and dual pipelining. Also used for subsequent generations of Intel processors—the Pentium Pro, Pentium II, Pentium III, and Pentium 4. Currently used as a budget label for Intel CPUs.

Core

Name used for the family of Intel CPUs that succeeded the Pentium 4, such as the Core i3, core i5, and core i7

code names

Names that keep track of different variations within CPU models

Network File System (NFS)

Network file and print sharing protocol for UNIX and Linux systems that competed with Server Message Block (SMB). Usage has declined as SMB won out

peer-to-peer network

Network in which each machine can act as both a client and a server.

botnet

Network of computers infected with malware that can be controlled to do the bidding of the malware developers, or anyone who pays them. A common use is carrying out distributed denial of service (DDoS) attacks

domain-based network

Network that eliminates the need for logging on to multiple servers by using domain controllers to hold the security database for all systems.

mesh topology

Network topology where each computer has a dedicated line to every other computer, most often used in wireless networks.

mail server

Networked host or server that provides e-mail service

CSMA (Carrier Sense Multiple Access/collision avoidance)

Networking scheme used by wireless devices to transmit data while avoiding data collisions, which wireless nodes have difficulty detecting

cellular wireless networks

Networks that enable cell phones, smartphones, and other mobile devices to connect to the Internet.

Multiuser MIMO (MU-MIMO)

New version of MIMO included in 802.11ac that enables a WAP to broadcast to multiple users simultaneously

Computing Technology Industry Association (CompTIA)

Nonprofit IT trade association that administers the CompTIA +A and Network+ exams and many other vendor neutral IT certifications

hang time

Number of seconds a too-often-hung computer is airborne after you have thrown it out a second-story window.

binary numbers

Number system with a base of 2, unlike the number systems most of us use that have bases of 10 (decimal numbers), 12 (measurement in feet and inches), and 60 (time). Binary numbers are preferred for computers for precision and economy. An electronic circuit that can detect the difference between two states (on-off, 0-1) is easier and more inexpensive to build than one that could detect the differences among ten states (0-9).

grayscale depth

Number that defines how many shades of gray the scanner can save per dot.

IP address

Numeric address of a computer connected to the Internet. An IPv4 address is made up of four octets of 8-bit binary numbers translated into their shorthand numeric values. An IPv6 address is 128 bits long. The IP address can be broken down into a network ID and a host ID. Also called Internet address

multiboot installation

OS installation in which multiple operating systems are installed on a single machine.

toner cartridge

Object used to store the toner in a laser printer. (See also laser printer, toner.)

hang

Occurs when a computer or program stops responding to keyboard commands or other input; a computer or program in such a state is said to be 'hung'

Component failure

Occurs when a system device fails due to a manufacturing or some other type of defect.

fragmentation

Occurs when files and directories get jumbled on a fixed disk and are no longer contiguous. Can significantly slow down hard drive access times and can be repaired by using the defrag utility included with each version of Windows. (See also defragmentation.)

nbtstat

Old command-line utility predating Windows. Provides information on NetBIOS. While not as useful as it once was, it can still help troubleshoot small workgroups.

TN (twisted nematic)

Older technology for LCD monitors. TN monitors produce a decent display for a modest price, but they have limited viewing angles and can't accurately reproduce all the color information sent by the video card.

active partition

On a hard drive, primary partitions that contains an operating system

backside bus

On older CPUs, a set of wires that connected the CPU to Level 2 cache. First appeared in the Intel Pentium Pro. See also frontside bus and external data bus

frontside bus

On older PC architectures, the wires that connect the CPU to its external memory controller

baud

One analog cycle on a telephone line. In the early days of telephone data transmission, the baud rate was often analogous to bits per second. Due to advanced modulation of baud cycles as well as data compression, this is no longer true.

Certified Cisco Network Associate (CCNA)

One of the certifications demonstrating a knowledge of Cisco networking products.

Personal Digital Assistant (PDA)

One of the earliest mobile devices. Lacked cellular connections and touch interfaces, but still shared basic features with current mobile devices

NVIDIA Corporation

One of the foremost manufacturers of graphic cards and chipsets

POP3 (Post Office Protocol 3)

One of the two protocols that receive e-mail from SMTP servers. POP3 uses TCP port 110. While historically most e-mail clients used this protocol, the IMAP 4 e-mail protocol is now more common

command mode

One of two modes (along with insert mode) used in vi. Enables inputting commands such as copy or paste, see vi

OpenGL

One of two popular APIs used today for video cards. Originally written for UNIX systems but now ported to Windows and Apple systems. (See also DirectX.)

Protected Health Information (PHI)

Personally identifiable information that includes an individual's medical and health history.

storage pool

One or more physical drives grouped into a single Storage Space

theory of probable cause

One possible reason why something is not working; a guess.

mini connector

One type of power connector from a PC power supply unit. Supplies 5 and 12 volts to peripherals. Also known as a floppy connector.

Linux

Open-source UNIX-clone operating system.

Windows 10

Operating system developed by Microsoft that powers most desktop and portable computers in use today

Windows Vista

Operating system developed by Microsoft. Version of Windows; came in many different editions for home and office use, but did not have a server edition. Succeeded by Windows 7. No longer supported

Windows 7

Operating system developed by Microsoft. Version of Windows; comes in many different editions for home and office use, but does not have a server edition. Succeeded by Windows 8/8.1

macOS

Operating system from Apple that powers their desktop and portable computers. Based on UNIX; macOS runs on Intel/IBM-based hardware, just like Microsoft Windows. Before 2016, it was known as OS X

image deployment

Operating system installation that uses a complete image of a hard drive as an installation media. Helpful when installing an operating system on a large number of identical PCs.

OS X

Operating system on older Macintosh computers. Based on a UNIX core, early versions of OS X ran on Motorola-based hardware; later versions ran on Intel-based hardware. The X is pronounced "ten" rather than "ex" renamed macOS in 2016

Windows 8/8.1

Operating systems developed by Microsoft. Versions of Windows noted for the Metro interface. Used for desktop and portable PCs and for mobile devices. Succeeded by windows 10

DVD (digital versatile disc)

Optical disc format that provides for 4-17 GB of video or data storage.

Blu-ray Disc (BD)

Optical disc format that stores up to 100 GB of data, designed as a replacement media for DVD. Competed with HD DVD

End Process Tree

Option in Task Manager to halt a program or background process and all of its supporting processes

Last Known Good Configuration

Option on the Advanced Startup Options menu that enables your system to revert to a previous configuration to troubleshoot and repair any major system problems.

CD (compact disc)

Originally designed as the replacement for vinyl records, but (along with other optical media) is also useful for long-term storage of music and data

CMOS (complementary metal-oxide semiconductor)

Originally, computer systems had a standalone CMOS chip - a tiny bit RAM hooked up to a small battery that enabled it to hold system settings for the BIOS firmware even with the computer off. This had long since been incorporated into the chipset. CMOS is often informmally used to refer to the CMOS setup program or system setup utility

printer

Output device that can print text or illustrations on paper. Microsoft uses the term to refer to the software that controls the physical print device.

40-pin ribbon cable

PATA cable used to attach EIDE devices (such as hard drives) or ATAPI devices (such as optical drives) to a system See SATA

webcam

PC camera most commonly used for Internet video.

IDE (Integrated Drive Electronics)

PC specification for small- to medium-sized hard drives in which the controlling electronics for the drive are part of the drive itself, speeding up transfer rates and leaving only a simple adapter (or "paddle"). IDE only supported two drives per system of no more than 504 MB each, and has been completely supplanted by Enhanced IDE. EIDE supports four drives of over 8 GB each and more than doubles the transfer rate. The more common name for PATA drives. Also known as intelligent drive electronics. (See PATA.)

jumper

Pair of small pins that can be shorted with a shunt to configure many aspects of PCs. Often used in configurations that are rarely changed, such as master/slave settings on IDE drives.

SSID (Service Set Identifier)

Parameter used to define a wireless network; otherwise known as the network name.

jack (physical connection)

Part of a connector into which a plug is inserted. Also referred to as a port.

port (physical connection)

Part of a connector into which a plug is inserted. Physical ports are also referred to as jacks.

Actively listen

Part of respectful communication involving listening and taking notes without interrupting

HAL (hardware abstraction layer)

Part of the Windows OS that separates system-specific device drivers from the rest of the OS

USB root hub

Part of the host controller that makes the physical connection to the USB ports.

primary partition

Partition on a Windows hard drive that can store a bootable operating system.

globally unique identified (GUID) partition table (GPT)

Partitioning scheme that enables you to create more than four primary partitions without need to use dynamic disks

virus shield

Passive monitoring of a computer's activity, checking for viruses only when certain events occur, such as a program execution or file download

strong password

Password containing at least eight characters, including letters, numbers, and non-alphanumeric symbols

thermal paste

Paste-like material with very high heat-transfer properties. Applied between the CPU and the cooling device, it ensures the best possible dispersal of heat from the CPU. Also called heat dope or thermal compound

raster image

Pattern of dots representing what the printed page should look like

BitTorrent

Peer-to-peer file-sharing program

maintenance

Period jobs that should be done to keep an operating system running well

hardware

Physical computer equipment such as electrical, electronic, magnetic, and mechanical devices. Anything in the computer world that you can hold in your hand. A hard drive is hardware; Microsoft Word is not

device charger

Plugs into a power source and charges a device through one of its ports, such as USB or Lightning. Convenient for charging while the device stays on.

battery charger

Plugs into a power source and directly charges a device battery. Most convenient with a spare battery, since it requires removing the battery to charge it.

optical mouse

Pointing device that uses light rather than electronic sensors to determine movement and direction the mouse is being moved.

ATX (Advanced Technology Extended)

Popular motherboard form factor that generally replaced the AT form factor.

UTP (Unshielded Twisted Pair)

Popular type of cabling for telephone and networks, composed of pairs of wires twisted around each other at specific intervals. The twists serve to reduce interference (also called crosstalk). The more twists, the less interference. Unlike its cousin, STP, UTP cable has no metallic shielding to protect the wires from external interference. 1000BaseT uses UTP, as do many other networking technologies. UTP is available in a variety of grades, called categories, as follows: CAT 1 UTP Regular analog phone lines—not used for data communications. CAT 2 UTP Supports speeds up to 4 Mbps. CAT 3 UTP Supports speeds up to 16 Mbps. CAT 4 UTP Supports speeds up to 20 Mbps. CAT 5 UTP Supports speeds up to 100 Mbps. CAT 5e UTP Supports speeds up to 1000 Mbps. CAT 6 UTP Supports speeds up to 10 Gbps. CAT 6a UTP Supports speeds up to 10 Gbps. CAT 7 UTP Supports 10-Gbps networks at 100-meter segments; shielding for individual wire pairs reduces crosstalk and noise problems. CAT 7 is not a TIA /EIA standard.

camcorder

Portable device for recording audio and video. While camcorders originally recorded to tape (first analog, and later digital), most modern digital camcorders record to flash media

external speaker

Portable device that can substantially improve on the audio output of a mobile device or portable computer. Typically connects via Bluetooth or a regular headphone jack

2-in-1

Portable devices that attempt to serve as both a laptop and a tablet

hybrid (portable device)

Portable devices that stuff portable-computer power in mobile device-style form factors, such as a tablet.

virtual memory

Portion of the hard drive set aside by an OS to act like RAM when the system needs more RAM than is installed. A file containing this data is typically called a page file. in Windows and a swap file in UNIX platforms like Linux and macOS

electromagnetic pulse (EMP)

Potentially damaging burst of electromagnetic energy caused by events such as electrostatic discharge (ESD)

sleep mode

Power management setting in which all data from RAM is perserved by powering down much of the computer but maintaining power to RAM, or by writing the contents of RAM to the mass storage drive before the system goes into a reduced-power mode. Upon waking up,, the informaton is retrieved from the HDD or SSD and returned to RAM if necessary; the system continues where it left off

hibernate

Power management setting in which all data from RAM is written to the hard drive before the system goes into sleep mode. Upon waking up, all information is retrieved from the hard drive and returned to RAM. Also called suspend to disk

ACPI (Adanced Configuration and Power Interface)

Power management specification that far suprasses its predecessor, APM, by providing support for hot-swappable devices and better control of power modes

throttling

Power reduction/thermal control capability allowing CPUs to slow down during low activity or high heat build-up situations. Intel's version is known as Speed- Step, AMD's as PowerNow!.

single rail

Power supply configuration where all power is supplied along a single pathway

robocopy

Powerful command-line utility for copying files and directories, even over a network.

subwoofer

Powerful speaker capable of producing extremely low-frequency sounds.

environmental control

Practice of protecting computing equipment from environmental damage by taking measures such as air conditioning, proper ventilation, air filtration, temperature monitoring, and humidity monitoring

power plan

Preconfigured profiles (such as Balanced, High performance, and Power saver) in the Power Options applet that modify a Windows system's behavior to adjust power consumption

giga

Prefix for the quantity 1,073,741,824 bytes, except with hard drive labeling, where it means 1 billion bytes. One gigahertz is 1 billion hertz

mega-

Prefix that stands for the binary quantity 1,048,576 (2^20) or the decimal quantity of 1,000,000. One megabyte is 1,048,576 bytes. One megahertz, however, is a million hertz. Sometime shortened to Meg, as in "a 286 has an address space of 16 Megs"

tera-

Prefix that usually stands for the binary number 1,099,511,627,776 (240). When used for mass storage, it's often shorthand for 1 trillion bytes.

Port Forwarding

Preventing the passage of any IP packets through any ports other than the ones prescribed by the system administrator.

external data bus (EDB)

Primary data highway of all computers. Everything in your computer is tied either directly or indirectly to the external data bus. (See also frontside bus and backside bus.)

system BIOS

Primary set of BIOS stored on a flash ROM chip on the motherboard. Defines the BIOS for all the assumed hardware on the motherboard, such as keyboard controller, floppy drive, basic video, and RAM.

PCL (Printer Command Language)

Printer language created by Hewlett-Packard to supersede simple ASCII codes and used on a broad cross section of printers. Identified as printer control language in CompTIA A+ exam objectives

separation pad

Printer part that uses friction to separate a single sheet from any others the pickup roller grabbed

network printer

Printer that connects directly to a network.

dot-matrix printer

Printer that creates each character from an array of dots. Pins striking a ribbon against the paper, one pin for each dot position, form the dots. May be a serial printer (printing one character at a time) or a line printer.

dye-sublimation printer

Printer that uses a roll of heat-sensitive plastic film embedded with dyes, which are vaporized and then solidified onto specially coated paper to create a high-quality image.

thermal printer

Printer that uses heated printheads to create high-quality images on special or plain paper. Common in retail receipt printers, which use large rolls of thermal paper housed in a feed assembly that automatically draws the thermal receipt paper over the heating element

heating element

Printing component of direct thermal printers. Burn dots into the surface of heat-sensitive thermal paper

XML Paper Specification (XPS) print path

Printing subsystem in Windows. Has enhanced color management and good print layout fidelity

disk striping

Process by which data is spread among multiple (at least two) drives. Increases speed for both reads and writes of data. Considered RAID level 0 be- cause it does not provide fault tolerance.

disk mirroring

Process by which data is written simultaneously to two or more disk drives. Read and write speed is decreased but redundancy in case of catastrophe is increased.

firmware update

Process by which the BIOS of a motherboard can be updated to reflect patched bugs and added features. Performed, usually, through CMOS, though some motherboard manufacturers provide a Windows program for performing a firmware update

rooting

Process for circumventing the security restrictions and gaining access to the root user account on an Android device

jailbreaking

Process for circumventing the security restrictions present on an iOS device

activation (software)

Process of confirming that an installed copy of a Microsoft product (most commonly windows or a Microsoft Office application) is legitimate. Ususally done at the end of software installation

Calibration

Process of matching the print output of a printer to the visual output of a monitor.

incident reporting

Process of reporting gathered data about a system or problem to supervisors. Creates a record of work accomplished, and may help identify patterns. Often documented on an incident report form

multitasking

Process of running multiple programs or tasks on the same computer at the same time.

compression

Process of squeezing data to eliminate redundancies allowing files to use less space when stored or transmitted

burn

Process of writing data to a writable optical disc, such as a DVD-R.

single sign-on (SSO)

Process that uses an account or credentials for a popular service (such as a google account) to sign on or authenticate with other services

autodetection

Process through which new disks are automatically recognized by the BIOS.

escalate

Process used when a person assigned to repair a problem is not able to get the job done, such as sending the problem to someone with more expertise

pipeline

Processing methodology where multiple calculations take place simultaneously by being broken into a series of steps. Often used in CPUs and video processors.

hardware virtualization support

Processor features that speed up and simplify virtualization. Required for some hypervisors to function

Web browser

Program designed to retrieve, interpret, and display Web pages.

CMOS setup program

Program enabling you to access and update CMOS data. Also referred to as the system setup utility, BIOS setup utility, UEFI/BIOS setup and similar names.

TWAIN (technology without an interesting name)

Programming interface that enables a graphics application, such as a desktop publishing program, to activate a scanner, frame grabber, or other image-capturing device. Default driver type for scanners

Component Services

Programming tools in Windows for the sharing of data objects between programs.

CNR (communications and networking riser)

Proprietary slot used on some motherboards to provide a connection for modems, sound cards, and NICs that is free from sound interference

Z-Wave

Proprietary wireless networking protocol (with an open API for programmers) designed to address home automation challenges

safety goggles

Protective glasses that keep stuff out of your eyes.

system lockout

Protects against attempts to brute-force a lock screen or login system by locking the user out until they perform some more thorough authentication process. Occurs when too many consecutive login attempts fail.

Virtual Network Computing (VNC)

Protocol enabling remote desktop connections

Service Location Protocol (SLP)

Protocol for advertising and discovering available services over a network. Most common with Print devices. Uses TCP/UDP port 427

ARP (Address Resolution Protocol)

Protocol in the TCP/IP suite used with the command-line utility of the same name (arp) to determine the MAC address that corresponds to a particular IP address.

IPv6 (Internet Protocol version 6)

Protocol in which addresses consist of eight sets of four hexadecimal numbers, each number being a value between 0000 and FFFF, using a colon to separate the numbers. Here's an example: FEDC:BA98:7654:3210:0800:200C:00CF:1234.

DHCP (Dynamic Host Configuration Protocol)

Protocol that enables client hosts to request and receive TCP/IP settings automatically from an appropriately configured server. Uses UDP ports 67 and 68

IrDA (Infrared Data Association)

Protocol that enables communication through infrared devices, which speeds of up to 4 Mbps

NetBIOS (Network Basic Input/Output System)

Protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved. Uses TCP ports 137 and 139, and UDP ports 137 and 138

Lightweight Directory Access Protocol (LDAP)

Protocol used by many operating systems and applications to access directories.

Remote Desktop Protocol (RDP)

Protocol used for Microsoft's Remote Desktop tool. Uses port 3389

P4 power connector

Provides additional 12-volt power to assist the 20/24-pin P1 motherboard power connector

P1 power connector

Provides power to ATX motherboards; 20-pin with original ATX motherboards, 24-pin on current units.

power supply unit (PSU)

Provides the electrical power for a PC. Converts standard AC power into various voltages of DC electricity in a PC

Unified Threat Management (UTM)

Providing robust network security by integrating traditional firewalls with many other security services such as IPS, VPN, load balancing, anti-malware, and more

timbre

Qualities that differentiate the same note played on different instruments

striped volume

RAID 0 volumes. Data is spread across two drives for increased speed.

double-sided RAM

RAM stick with RAM chips soldered to both sides of the stick. May only be used with motherboards designed to accept double-sided RAM. Very common.

ECC RAM/DRAM (error correction code RAM/DRAM)

RAM that uses special chips to detect and fix memory errors. Commonly used in high-end servers where data integrity is crucial

unbuffered RAM

RAM without a register to act as a buffer between the DIMM and memory controller, in other words, normal, consumer-grade RAM

flash ROM

ROM technology that can be electrically reprogrammed while still in the PC. Overwhelmingly the most common storage medium of BIOS in computers today, as it can be upgraded without a need to open the computer on most systems.

DMA controller

Resides between the RAM and the devices and handles DMA requests.

optical resolution

Resolution a scanner can achieve mechanically. Most scanners use software to enhance this ability.

native resolution

Resolution on an LCD monitor that matches the physical pixels on the screen

data usage limit

Restrictions on how much data a user may consume. Once the user exceeds the limit, data may be blocked entirely or bandwidth may be throttled

NTFS permissions

Restrictions that determine the amount of access given to a particular user on a system using NTFS.

factory reset

Returns a device's software to how it left the factory by removing all user-installed data, programs, and customizations.

USB Type-C (connector)

Reversible USB type cable that supports USB Super- Speed+ USB 3.1 with a top speed of 10 Gbps. Quickly becoming the de facto standard port on Android devices. Thunderbolt-enabled USB Type-C ports can reach top speeds of 40 Gbps

NTFS (New Technology File System)

Robust and secure file system introduced by Microsoft with Windows NT. NTFS provides an amazing array of configuration options for user access and security. Users can be granted access to data on a file-by-file basis. NTFS enables object-level security, long filename support, compression, and encryption.

path

Route the operating system must follow to find an executable program stored in a subfolder

Quality of Service (QoS)

Router feature used to prioritize access to network resources. Ensures certain users, applications or services are prioritized when there isn't enough bandwidth to go around by limiting the bandwidth for certain types of data based on application protocol, the IP address of a computer, and all sorts of other features.

port triggering

Router function that enables a computer to open an incoming connection to one computer automatically based on a specific outgoing connection.

FTP (File Transfer Protocol)

Rules that enable two computers to talk to one another during a file transfer. Protocol used when you transfer a file from one computer to another across the Internet. FTP uses port numbers 20 and 21.

emergency repair disk (ERD)

Saves critical boot files and partition information and is the main tool for fixing boot problems in older versions of Windows. Newer versions of Windows call this a system repair disc (Windows Vista/7) or recovery drive (Windows 8/8.1 and 10).

data storage

Saving a permanent copy of your work so that you can come back to it later

file system

Scheme that directs how an OS stores and retrieves data on and off a drive; FAT32 and NTFS are both file systems. Used interchangeably with the term "data structure." (See also data structure.)

data structure

Scheme that directs how an OS stores and retrieves data on and off a drive. Used interchangeably with the term file system. (See also file system.)

monitor

Screen that displays data from a PC. Typically a flat-panel display, such as an LCD

Level 2 (L2) cache

Second RAM cache accessed by the CPU. Much larger and often slower than the L1 cache, and accessed only if the requested program/data is not in the L1 cache.

NLX

Second form factor for slimline systems. Replaced the earlier LPX form factor. (CompTIA lists NLX as New Low-profile Extended)

partition

Section of the storage area of a hard disk. Created during initial preparation of the hard disk, before the disk is formatted

logical drives

Sections of an extended partition on a hard drive that are formatted and (usually) assigned a drive letter, each of which is presented to the user as if it were a separate drive.

HTTPS (HTTP over Secure Sockets Layer)

Secure form of HTTP used commonly for Internet business transactions or any time when a secure connection is required. Uses port 443. (See also HTTP.)

SFTP (Secure File Transfer Protocol)

Secure version of the File Transfer Protocol

access control

Security concept using physical security, authentication, users and groups, and security policies

LoJack

Security feature included in some BIOS/UEFI that enables a user to track the location of a stolen PC, install a key logger, or remotely shut down the stolen computer.

SSL (Secure Sockets Layer)

Security protocol used by a browser to connect to secure Web sites. replaced by Transport Layer Security (TLS))

share-level security

Security sytem in which each resource has a password assigned to it; access to the resource is based on knowing the password

Augmented Reality

See AR

bootstrap loader

Segment of code in a system's BIOS that scans for an operating system, looks specifically for a valid boot sector, and, when one is found, hands control over to the boot sector; then the bootstrap loader removes itself from memory

on-demand

Self-service characteristic of cloud computing. Describes the customer's ability to set up, modify, and delete cloud resources (such as servers, storage, or databases) as needed

rails

Separate DC voltage paths within an ATX power supply.

gearbox

Separate units or packages, also called gear packs, that combine multiple gears for performing mechanical functions in a printer. Most laser printers have two or three gearboxes that can be replaced individually if one fails

eSATA

Serial ATA-based connector for external hard drives and optical drives.

COM ports

Serial communications ports once common on computers. COMx is used to designate a uniquely numbered COM port such as COM1, COM2, etc.

PCIe (PCI Express)

Serialized successor to PCI and AGP that uses the concept of individual data paths called lanes. May use any number of lanes, although a single lane (x1) and 16 lanes (x16) are the most common on motherboards.

SATA (serial ATA)

Serialized version of the ATA standard that offers many advantages over PATA (parallel ATA) technology, including thinner cabling, keyed connectors, and lower power requirements.

beep codes

Series of audible tones produced by a motherboard during the POST. These tones identify whether the POST has completed successfully or whether some piece of system hardware is not working properly. Consult the manual for your particular motherboard for a specific list of beep codes.

front-view projector

Shoots the image out the front and counts on you to put a screen in front at the proper distance.

patch cables

Short (2 to 5 foot) UTP cables that connect patch panels to the hubs.

MP3

Short for MPEG Audio Layer 3, a type of compression used specifically for turning high-quality digital audio files into much smaller, yet similar-sounding, files.

worm

Similar to a virus, except it does not need to attach itself to other programs to replicate. It can replicate on its own through networks, or even hardware like Thunderbolt accessories

duplexing

Similar to mirroring in that data is written to and read from two physical drives, for fault tolerance. Separate controllers are used for each drive, both for additional fault tolerance and for additional speed. Considered RAID level 1. Also called disk duplexing or drive duplexing.

brute force

Simple attack that attempts to guess credentials or identify vulnerabilities by trying many possibilities

Settings app

Since its introduction in Windows 8, it has grown to combine a huge number of otherwise disparate utilities, apps, and tools traditionally spread out all over your computer into one fairly unified, handy Windows app

HDMI (High-Definition Multimedia Interface)

Single multimedia connection that includes both high-definition video and audio. Used to connect a computer to LCDs, projectors, and VR headsets

bit

Single binary digit. Also, any device that can be in an on or off state.

clock cycle

Single charge to the clock wire (CLK) of a CPU, informing the CPU that another piece of information is waiting to be processed

MFD (multifunction device)

Single device that consolidates functions from more than one document-handling device, such as a printer, copier, scanner, or fax amchine

software

Single group of programs designed to do a particular job; always stored on mass storage devices

laser

Single-wavelength, in-phase light source that is sometimes strapped to the head of sharks by bad guys. Note to henchmen: Lasers should never be used with sea bass, no matter how ill-tempered they might be.

throw

Size of the image a projector displays at a certain distance from the screen. Alternately, what you do with a computer that you just can't seem to get working.

ID badge

Small card or document for confirming the identify of its holder and what access they should be granted. May use built-in authentication tools such as RFID or smart card to function as "something you have" authentication factor

module

Small circuit board that DRAM chips are attached to. Also known as a "stick.

mini-DIN

Small connection most commonly used for keyboards and mice. Many modern systems implement USB in place of mini-DIN connections. Also called PS/2.

wireless locator

Small device with signal lights to indicate the presence of Wi-Fi signals

traces

Small electrical connections embedded in a circuit board.

power supply fan

Small fan located in a system power supply that draws warm air from inside the power supply and exhausts it to the outside.

recovery partition

Small hidden partition on a system's primary hard drive with a factory-fresh OS image to recover and reinstall from

icon

Small image or graphic, most commonly found on a system's desktop, that launches a program when selected

Standoffs

Small mechanical separators that screw into a computer case. A motherboard is then placed on top of the standoffs, and small screws are used to secure it to the standoffs.

context menu

Small menu brought up by right-clicking on objects in Windows

texture

Small picture that is tiled over and over again on walls, floors, and other surfaces to create the 3-D world

patch

Small piece of software released by a software manufacturer to correct a flaw or problem with a particular piece of software. also called an update

connector

Small receptacle used to attach a cable to a device or system common types of connector include USB, PS/2, RJ-45, VGA, HDMI, DVI, HD15, DisplayPort, and thunderbolt

mantrap

Small room with a set of doors; one to the unsecured area and one to a secured area. Only one door can open at a time, and individuals must authenticate to continue. Combats tailgating.

Liquid Contact Indicator (LCI)

Small sticker that permanently changes color after getting wet, often from white to red. Installed at various locations inside mobile and portable devices.

mobile device

Small, highly portable computing devices with tightly integrated components designed to be worn or carried by the user. Includes smartphones, tablets, and wearable devices

Mini-USB

Smaller USB connector often found on digital cameras.

thread

Smallest logical division of a single program.

Android

Smartphone and table OS created by Google

mobile payment service

Smartphone feature that can use a connected bank account to automatically transfer payments to merchants. May work in conjunction with Near Field Communication (NFC)

Disk Management

Snap-in available with the Microsoft Management Console that enables techs to configure the various disks installed in a system; available in Computer Management in Administrative Tool.

telephone scams

Social engineering attack in which the attacker makes a phone call to someone in an organization to gain information.

ZIF (zero insertion force) socket

Socket for CPUs that enables insertion of a chip without the need to apply pressure. Intel promoted this socket with its overdrive upgrades. The chip drops effortlessly into the socket's holes, and a small lever locks it in.

antivirus program

Software designed to combat viruses either by seeking out and destroying them or passively guarding against them.

anti-malware program

Software designed to identify and block or remove malware. Typically powered by frequently updated definition files containing the signatures of known malware

Closed source software

Software for which the source code is kept secret

open source software

Software for which the source code is published instead of kept secret. Typically released under an open source license that specifies terms for those who wish to use the software or modify its source

virtual NIC

Software network interface for a virtual machine. For access to a broader network than the host system is connected to, the virtual NIC needs to be bridged to the host's physical NIC. This enables the virtual NIC to receive an address from DHCP, just like a physical NIC

emulator

Software or hardware that converts the commands to and from the host machine into an entirely different platform.

terminal emulation

Software that enables a computer to communicate with another computer or network as if the computer were a specific type of hardware terminal.

hypervisor

Software that enables a single computer to run multiple operating systems simultaneously

proxy server

Software that handles multiple connections to the Internet to go through one protected computer. Common security feature in the corporate world. Applications that want to access Internet resources send requests to the proxy server instead of trying to access the Internet directly, which both protects the client computers and enables the network administrator to monitor and restrict Internet access

freeware

Software that is distributed for free, with no license fee.

virtual printer

Software that presents itself as a printer, but does something else rather than just print the document, such as saving it to a given file type

spyware

Software that runs in the background of a user's PC, sending information about browsing habits back to the company that installed it onto the system

network protocol

Software that takes the incoming data received by the network card, keeps it organized, sends it to the application that needs it, and then takes outgoing data from the application and hands it to the NIC to be sent out over the network.

SDK (software development kit)

Software that used to create custom applications or add features to existing applications on a mobile device.

DUN (Dial-up Networking)

Software used by Windows to govern the connection between the modem and the ISP.

keylogger

Software, usually malware, that copies, saves, and sometimes uploads all keystrokes and other inputs on a computer. Keyloggers are used gather information such as passwords, sites visited, and other activities performed on a computer

LED (light-emitting diode)

Solid-state device that vibrates at luminous frequencies when current is applied.

PC tech

Someone with computer skills who works on computers.

PCM (pulse code modulation)

Sound format developed in the 1960s to carry telephone calls over the first digital lines.

Plenum

Space in the ceiling, walls, and floor where special plenum-grade (fire-retardant) network cables can be run out of sight

5.1 Speaker system

Speaker setup consisting of four satellite speakers plus a center speaker and a subwoofer

7.1 Speaker system

Speaker setup consisting of six satellite speakers (two front, two side, two rear) plus a center speaker and a subwoofer

2.1 Speaker system

Speaker setup consisting of two stereo speakers combined with a subwoofer

Ownership permission

Special NTFS permissions granted to the account that owns a file or folder. Owners can do anything they want to the files and folders they own, including changing their permissions.

riser card

Special adapter card, usually inserted into a special slot on a motherboard, that changes the orientation of expansion cards relative to the motherboard. Riser cards are used extensively in slimline computers to keep total depth and height of the system to a minimum. Sometimes called a daughterboard.

cache (disk)

Special area of RAM that stores the data most frequently accessed from the hard drive. Cache memory can optimize the use of your systems.

anti static wrist strap

Special device worn around the wrist with a grounding connection designed to equalize electrical potential between a technician and an electronic device. Used to prevent electrostatic discharge.

dynamic disks

Special feature of Windows that enables users to span a single volume across two or more drives. Dynamic disks do not have partitions; they have volumes. Dynamic disks can be striped, mirrored, and striped or mirrored with parity.

CDDA (CD-Digital Audio)

Special format used for early CD-ROMs and all audio CDs; divides data into variable-length tracks. A good format to use for audio tracks but terrible for data because of lack of error checking.

thermal paper

Special heat-sensitive paper for use in thermal printers

function (Fn) key

Special key on many laptops that enables some keys to perform a third duty.

swap partition

Special partition found on Linux and UNIX systems that behaves like RAM when your system needs more RAM than is installed

Take Ownership

Special permission allowing users to seize control of a file or folder and potentially prevent others from accessing the file/folder.

power saving modes

Special power modes that limit or modify device functionality in order to prolong battery life. May take steps such as disabling communications, reducing processor speed, limiting programs, and dimming the screen

cache (L1, L2, L3, etc.)

Special section of fast memory, usually built into the CPU, used by the onboard logic to store information most frequently accessed by the CPU.

ECC (error-correcting code)

Special software, embedded on hard drives, that constantly scans the drives for bad blocks

Anti static mat

Special surface on which to lay electronics. These mats come with a grounding connection designed to equalize electrical potential between a workbench and one or more electronic devices. Used to prevent electrostatic discharge

loopback test

Special test to confirm a NIC can send and receive data. A full external loopback test requires a loopback plug inserted into the NIC's port

DVI (Digital Visual Interface)

Special video connector designed for digital to- digital connections; most commonly seen on PC video cards and LCD monitors. Some versions also support analog signals with a special adapter.

troubleshooting methodology

Steps a technician uses to solve a problem. CompTIA A_ defines six steps: identify the problem, establish a theory of probable cause (question the obvious); test the theory to determine cause; establish a plan of action to resolve the problem and implement a solution; verify full system functionality and, if applicable, implement preventative measures, and document findings, actions, and outcomes

parity space

Storage Space that adds resiliency similar to RAID 5 or RAID 6

simple space

Storage Space that just pools storage space, like JBOD

register

Storage area inside the CPU used by the onboard logic to perform calculations. CPUs have many registers to perform different functions.

Magnetic hard drives

Storage devices that read and write data encoded magnetically onto spinning aluminum platters

hybrid hard drive (HHD)

Storage drive that combines the flash memory used in solid-state drives with the spinning platters used in magnetic hard drives; a compromise between the speed and power efficiency of SSDs and the capacity of HDDs

EFS (Encrypting File System)

Storage organization and management service, such as NTFS, that has the capability of applying a cipher process to the stored data.

mirror space

Storage space that mirrors files across two or more drives, like RAID 1 or RAID 10

untrusted source

Stores and sites where apps can be obtained outside of the legitimate trusted sources run by major vendors

partition boot sector

Stores information for booting from the partition, such as the location of OS boot files

Chromebook

Strictly, any portable computer running Google's Chrome OS. Chromebooks offer an experience focused on Web applications by making use of virtually unlimited data storage in the cloud and software as a service (SaaS) applications available over the Web. Because they offload so much work, Chromebooks have a reputation for being cheap and light, but premium Chromebooks are increasingly common.

cat 7

Supports 10-Gbps networks at 100-meter segments; shielding for individual wire pairs reduces crosstalk and noise problems. CAT 7 is not a ANSI/EIA standard.

interrupt/interruption

Suspension of a process, such as the execution of a computer program, caused by an event external to the computer and performed in such a way that the process can be resumed. Events of this kind include sensors monitoring laboratory equipment or a user pressing an interrupt key

object

System component that is given a set of characteristics and can be managed by the operating system as a single entity

environment variables

System data such as the date and time, currently logged-in users, running operating system version, and more. Scripts and programs on a system often use these variables to tailor their behavior to the system's capabilities and configuration

WWW (World Wide Web)

System of Internet servers that supports documents formatted in HTML and related protocols. Can be accessed by applications that use HTTP and HTTPS, such as Web browsers.

data classification

System of organizing data according to its sensitivity. Common classifications include public, highly confidential, and top secret.

DLP (Data Loss Prevention)

System or set of rules designed to stop leakage of sensitive information. Usually applied to Internet appliances to monitor outgoing network traffic.

DNS (Domain Name System)

TCP/IP name resolution system that translates a host name into an IP address. Uses UDP port 53

Startup

Tab added to Task Manager in Windows 8 that allows a user to control which programs start with Windows and see what impact they are having on load time

Details

Tab added to Task Manager in Windows 8 to collect much of the detail from the older Processes tab, including executable names, PIDs, status, executing user, a description, and present resource use. Many more columns can be enabled as well

Processes

Tab in Task Manager that lists all running processes on a system. Frequently a handy tool for ending buggy or unresponsive processes

applications

Tab in Task Manager that lists running applications

Users

Tab in Task Manager that shows other logged in users and enables you to log off other users if you have the proper permissions. Starting in Windows 8, also includes information on resources consumed by programs the user is running

Performance

Tab in Task Manager that tracks PC performance, including CPU usage, available physical memory, size of the disk cache, and other details about memory and processes

System Protection

Tab in Windows System Properties dialog box that enables you to configure how and when the system will create restore points and provides easy access to existing restore points via System Restore

Services

Tab in Windows Task Manager that lists all running services on a system

partition table

Table located in the boot sector of a hard drive that lists every partition on the disk that contains a valid operating system.

drive cloning

Taking a PC and making a duplicate of the hard drive, including all data, software, and configuration files, and transferring it to another PC. see image deployment

memory addressing

Taking memory address from system RAM and using it to address non-system RAM or ROM so the CPU can access it

Networking

Task Manager tab in Windows 7 (merged into the Performance tab in Windows 8) which shows activity on current network connections

Mobile Device Management (MDM) Policies

Technical controls that govern how mobile devices are used as tools in the workplace. See MDM

lithium polymer (LiPo)

Technically, a variant of Li-Ion batteries that use a solid, polymer electrolyte. In practice, this term is commonly applied to traditional Li-Ion batteries packed in polymer bags.

DMA (Direct Memory Access)

Technique that some PC hardware devices use to transfer data to and from the memory without using the CPU

Scalable Link Interface (SLI)

Technology for connecting two or more NVIDIA GPUs together in a system. AMD competes with CrossFire technology

NX bit

Technology that enables the CPU to protect certain sections of memory. This feature, coupled with implementation by the operating system, stops malicious attacks from getting to essential operating system files. Microsoft calls the feature Data Execution Prevention (DEP) turned on by default in every OS

face lock

Technology that enables use of facial features to unlock a mobile device or personal computer.

Power over Ethernet (PoE)

Technology that provides power and data transmission through a single network cable.

REt (Resolution Enhancement technology)

Technology that uses small dots to smooth out jagged edges that are typical of printers without RET, producing a higher-quality print job.

proprietary

Technology unique to a particular vendor.

S/MIME (Secure/Multipurpose Internet Mail Extensions)

Technology used to configure digital signature settings for e-mail and contacts from a corporate address book, depending on how the corporate e-mail server is set up

Telnet

Terminal emulation program for TCP/IP networks that allows one machine to control another as if the user were sitting in front of it. Uses port 23.

SSH (Secure Shell)

Terminal emulation program similar to Telnet, except that the entire connection is encrypted. Uses port 22.

force stop

Terminate an Android app and all associated background processes. More extreme than simply closing the app, which may leave background processes running.

Command Prompt

Text prompt for entering commands

Command Line Interface (CLI)

Text user interface. Users input text commands and receive text output. CLI commands, which are flexible and often faster (or use fewer resources) than a graphical equivalent, are also easy to compose into scripts for performing frequent tasks

ANSI/TIA

The Telecommunication Industry Association (TIA) establishes the UTP categories under the ANSI/TIA 568 specification. The AMerican National Strandards Institute (ANSI) accredits TIA standards to ensure compatibility of industry and international standards see also UTP

Aero

The Windows 7 desktop environment. often used as a shorthand for one of its more obvious aesthetic effects: a window transparency feature called Aero Glass

remotely wipe

The ability to remotely delete user data from a mobile device that has been lost or stolen

Phising

The act of trying to get people to give their user names, passwords, or other security information by pretending to be someone else electronically

tethering

The act of using a cellular-network-connected mobile device as a mobile hotspot.

host ID

The address of a TCP/IP device such as a computer, printer, camera, or other device

potential

The amount of electrical energy stored in an object

lumens

The amount of light given off by a light source from a certain angle that is perceived by the human eye. Unit of measure for amount of brightness on a projector or other light source.

impedance

The amount of resistance to an electrical signal on a wire. Relative measure of the amount of data a cable can handle.

response rate

The amount of time it takes for all the sub-pixels on an LCD panel to change from one state to another. This change is measured in one of two ways: black to white (BtW) measures how long it takes the pixels to go from pure black to pure white and back again, and gray to gray (GTG) measures how long it takes the pixels to go from one gray state to another

tiles

The building blocks of Windows 8's Modern UI, as potentially "smart" app shortcuts, capable of displaying dynamic and changing information without even open- ing the app.

segment

The connection between a computer and a switch

working directory

The current directory used by command-line commands unless they explicitly specify a target file or directory. The prompt usually indicates the working directory

home screen

The default "desktop" of a mobile device.

soft reset

The equivalent of a reboot or restart for a mobile device. An important troubleshooting step because it clears running programs from memory and restarts the operating system. Some portable devices that closely resemble mobile devices may also use soft resets

5G

The fifth generation of cellular data technologies. Technologies in the wave are still cutting their teeth, with development underway in 2019

Comptia A+ 220-1001

The first half of the CompTIA A+ certification for computer technicians. The 1001 exam focuses primarly on understanding terminology and technology, how to do fundamental tasks such as upgrading RAM and basic network and mobile device support

processing (printing)

The first step of the laser printing process, in which the printer translates incoming print commands into pages rendered for printing

ExpressCard

The high-performance serial version of the PC Card that replaced PC Card slots on laptop PCs over the past decade. ExpressCard comes in two widths: 34 mm and 54 mm, called ExpressCard/34 and ExpressCard/54.

Windows Preinstallation Environment (Windows PE)

The installation program for Windows

Mini-ITX

The largest and the most popular of the three ITX form factors. At a miniscule 6.7 by 6.7 inches, Mini-ITX competes with microATX and proprietary small form factor (SFF) motherboards.

kernel panic

The linux equivalent of Blue screen of death (BSOD). An error from which the OS can't recover without a reboot. See BSoD

Charms bar

The location in Windows 8 and 8.1 of the charms tools. Accessed by moving the cursor to the upper-right corner of the screen.

clock speed

The maximum number of clock cycles that a CPU can handle in a given period of time. Measured in MHz or GHz. In modern CPUs, the internal speed is a multiple of the external speed. see also Clock-multiplying CPU.

Mini Secure Digital (MiniSD)

The medium-sized form factor of the SD flash memory standard.

mv

The move command in Linux and Mac OS X.

CompactFlash (CF)

The oldest, most complex and physically largest of all removable flash media cards

ios

The operating system of Apple mobile devices such as smartphones and tablets

RAID 10

The opposite of RAID 0+1, two mirrored RAID 0 configurations. Provides both speed and redundancy, and also requires four disks

Metro UI

The original name for the Windows 8 user interface. Due to legal concerns, it was rebranded the "Modern UI"

%SystemRoot%

The path where the operating system is installed.

color space

The portion of all possible colors that a device (such as an LCD display or camera) is able to display or save

touch interface

The primary user interface on modern mobile devices where keys are replaced with tactile interaction.

backup testing

The process of ensuring that file or system backups have produced backups from which you can restore usable systems and files

authentication

The process of identifying and granting access to some user trying to access a system

sync

The process of keeping files on mobile devices up to date with the versions on desktop computers or over the Internet via cloud-based services

patch management

The process of keeping software updated in a safe and timely fashion

formatting

The process of preparing a partition to store files by creating a file system to organize the blocks and creating a root directory

salting

The process of protecting password hashes from being easily reversed with a rainbow table by adding additional values to each password before hashing and storing it

ISDN (integrated services digital network)

The process of sending telephone transmission across fully digital lines end-to-end, replacing the analog telephone system. ISDN is superiorto POTS telephone lines because it supports a transfer rate of up to 128 Kbps for sending information from computer to computer. It also allows data and voice to share a common phone line. DSL reduced demand for ISDN substantially.

authorization

The process that defines what resources an authenticated user may access and what he or she may do with those resources.

CompTIA A+ 220-1002

The second half of the CompTIA A+ certification for computer technicians. The 1002 exam focuses primarly on software, security, and troubleshooting

processing (computing)

The second step of the computing process, where the CPU completes the tasks that the user's input has given it

Micro Secure Digital (MicroSD)

The smallest form factor of the SD flash memory standard. Often used in mobile devices.

CRT (cathode ray tube)

The tube of a monitor in which rays of electrons are beamed onto a phosphorescent screen to produce images. Also a shorthand way to describe a monitor that uses CRT rather than LCD technology.

U (units)

The unique height measurement used with equipment racks; 1 U equals 1.75 inches. A 1U device fits in a 1.75-inch space, a 2U fits in a 3.5-inch space, and a 4U device fits in a 7-inch space

topology

The way computers connect to each other in a network.

transfer corona

Thin wire, usually protected by other thin wires, that applies a positive charge to the paper during the laser printing process, drawing the negatively charged toner particles off of the drum and onto the paper. Newer printers accomplish the same feat using a transfer roller that draws the toner onto the paper.

Ultrabook

Thin, powerful laptop powered by Intel processors and built according to the Intel design specification. Competes directly with the Apple Mac Air.

Level 3 (L3) cache

Third RAM cache accessed by the CPU. Much larger and slower than the L1 and L2 caches, and accessed only if the requested program/data is not in the L2 cache.

net user

This subcommand of the Windows net command enables a user to create, delete, and change user accounts

refresh rate

Time required for a monitor to redraw the whole screen

MBR (Master Boot Record)

Tiny bit of code that takes control of the boot process from the system BIOS.

shunt

Tiny connector of metal enclosed in plastic that creates an electrical connection between two posts of a jumper

sub-pixels

Tiny liquid crystal molecules arranged in rows and columns between polarizing filters used in LCDs.

debug

To detect, trace, and eliminate errors in computer programs.

dumpster diving

To go through someone's trash in search of information.

boot

To initiate an automatic routine that clears the memory, loads the operating system, and prepares the computer for use. Term is derived from "pull yourself up by your bootstraps." Computers must do that because RAM doesn't retain program instructions when power is turned off. A cold boot occurs when the PC is physically switched on. A warm boot loads a fresh OS without turning off the computer, lessening the strain on the electronic circuitry. To do a warm boot, press the ctrl-alt-delete keys twice in rapid succession (the three-fingered salute).

cluster

To overcome some limitations in addressing inherent in each file system, Windows file systems organize data into groups called clusters. Cluster size varies by file system and partition size

identify the problem

To question the user and find out what has been changed recently or is no longer working properly. Step 1 of 6 in the CompTIA troubleshooting theory

overclocking

To run a CPU or video processor faster than its rated speed.

Local Users and Groups

Tool enabling creation and changing of group memberships and accounts for users.

Performance Options

Tool enabling users to configure CPU, RAM, and virtual memory settings.

Display applet

Tool in Windows 7/8/8.1 used to adjust display settings, including resolution, refresh rate, driver information, and color depth

shell

Tool that interprets command-line input, also known as the command-line interpreter

NetBoot

Tool that makes it easy to install, upgrade, and manage OS X on many remote systems at once, over a network

tech toolkit

Tools a PC tech should never be without, including a Phillips-head screwdriver, a pair of tweezers, a flat-head screwdriver, a hemostat, a Torx wrench, a parts retriever, and a nut driver or two.

address space

Total amount of memory addresses than an address bus can contain

bank

Total number of DIMMs that can be accessed simultaneously by the chip set. The "width" of the external data bus divided by the "width" of the DIMM sticks. Specific DIMM slots must be populated to activate dual-, triple-, or quad-channel memory

tap

Touchscreen gesture where you press a spot on the screen to start an app or interact with a running app.

laptop

Traditional clamshell portable computing device with built-in LCD monitor, keyboard, and trackpad.

half-duplex

Transmission mode where a device can either send or receive, but not do both at once

stripe set

Two or more drives in a group that are used for a striped volume.

satellites

Two or more standard stereo speakers to be combined with a subwoofer for a speaker system (i.e., 2.1, 5.1, 7.1, etc.).

file extension

Two, three, four, five, or more letters that follow a filename and identify the type of file (file format). Common file extensions are .zip, .exe, .doc, .java, and .xhtml

DDR SDRAM (double data rate SDRAM)

Type of DRAM that makes two processes for every clock cycle. (See also DRAM.)

TFT (thin film transistor)

Type of LCD screen. (See also active matrix.)

DDR4 SDRAM

Type of SDRAM that offers higher density and lower voltages than DDR3, and can handle faster data transfer rates. Maximum theoretical capacity of DDR4 DIMMs is up to 512 GB.

DDR2 SDRAM

Type of SDRAM that sends 4 bits of data in every clock cycle. (See also DDR SDRAM.)

DDR3 SDRAM

Type of SDRAM that transfers data at twice the rate of DDR2 SDRAM.

fingerprint lock

Type of biometric device that enables a user to unlock a mobile device using a fingerprint.

dictionary attack

Type of brute force attack using a dictionary to guess things like usernames and passwords. Don't think Webster's- these dictionaries may be full of usernames and passwords that have leaked or been used as defaults over the years

disk duplexing

Type of disk mirroring using two separate controllers rather than one; faster than traditional mirroring because one controller does not write each piece of data twice.

LCD (liquid crystal display)

Type of display commonly used on portable computers. LCDs have also replaced CRTs as the display of choice for desktop computer users. LCDs use liquid crystals and electricity to produce images on the screen.

DC (direct current)

Type of electricity in which the flow of electrons is in a complete circle in one direction

multimode

Type of fiber optic cabling capable of transmitting multiple light signals at the same time using different reflection angles within the cable core. Signals tend to degrade over distance, limiting multimode cable to short distances

single-mode fiber optic cabling

Type of fiber optic cabling that uses laser light to transmit at very high rates over long distances. Still fairly rare

LC

Type of fiber optic connector

active matrix

Type of liquid crystal display (LCD) that replaced the passive matrix technology used in most portable computer displays. Also called TFT (thin film transistor)

adware

Type of malicious program that downloads ads to a user's computer, generating undesirable network traffic

extended partition

Type of nonbootable hard disk partition. May only have one extended partition per disk. Purpose is to divide a large disk into smaller partitions, each with a separate drive letter.

dual-voltage

Type of power supply that works with either 110- or 220-volt outlets.

M.2

Type of space-efficient expansion slot common in recent portable computers. Formerly known as Next Generation Form Factor (NGFF). Also found on some desktop motherboards. While M.2 is a general expansion slot supporting devices such as WI-Fi cards, it's often used to install an NVMe SSD

optical disc/media

Types of data discs (such as DVDs, CDs, BDs, etc.) that are read by a laser.

Tv tuner

Typically an add-on device that allows users to watch television on a computer.

Secure Boot

UEFI feature that secures the boot process by requiring properly signed software. This includes boot software and software that supports specific, essential components.

ls

UNIX equivalent of the dir command, which displays the contents of a directory

micro-USB

USB connector commonly found on Android phones. Slowly being replaced by USB type-C connectors (especially in Android phones)

Low-Speed USB

USB standard that runs at 1.5 Mbps. Also called USB 1.1.

Full-Speed USB

USB standard that runs at 12 Mbps. Also known as USB 1.1.

Hi-Speed USB

USB standard that runs at 480 Mbps. Also referred to as USB 2.0.

RJ (registered jack) connector

UTP cable connector, used for both telephone and network connections. RJ-11 is a connector for four-wire UTP; usually found in telephone connections. RJ-45 is a connector for eight-wire UTP; usually found in network connections.

BNC

Uncommon coax connector secured with a quarter twist

electrostatic discharge (ESD)

Uncontrolled rush of electrons from one object to another. A real menace to PCs, as it can cause permanent damage to semiconductors.

MAC (media access control) address

Unique 48-bit address assigned to each network card. IEEE assigns blocks of possible addresses to various NIC manufacturers to help ensure that the address is always unique. The Data Link layer of the OSI model uses MAC addresses to locate machines.

scan code

Unique code corresponding to each key on the keyboard, sent from the keyboard controller to the CPU.

SID (security identifier)

Unique identifier for every PC that most techs change when cloning

SCSI ID

Unique identifier used by SCSI devices. No two SCSI devices may have the same SCSI ID.

Stateful Packet Inspection (SPI)

Used by hardware firewalls to inspect each incoming packet individually for purposes such as blocking traffic that isn't in response to outgoing requests

channel

Used in a common method for numbering boot devices; the first boot device is channel 1, the second is channel 2, etc.

vertices

Used in the second generation of 3-D rendering; have a defined X, Y, and Z position in a 3-D world.

counter

Used to track data about a particular object when using Performance Monitor

power good wire

Used to wake up the CPU after the power supply has tested for proper voltage.

standard user account

User account in Windows that has limited access to a system. Accounts of this type cannot alter system files, cannot install new programs, and cannot edit some settings by using the Control Panel without supplying an administrator passwords.

administrator account

User account, created when the OS is first installed, that is allowed complete, unfettered access to the system without restriction

Guests group

User group that enables someone without an account to use a system. see group

effective permissions

User's combined permissions granted by multiple groups.

Desktop

User's primary interface to the Windows operating system.

Default user accounts and groups

Users or groups that are enabled by default. Some, such as the guest account, represent a security risk

Ethernet over power

Uses a building's existing electrical network for Ethernet. Requires specialized bridges between the Ethernet network and power outlets

Raid 5

Uses block-level and parity data striping. Requires three or more drives.

RAID 0

Uses byte-level striping and provides no fault tolerance.

inkjet printer

Uses liquid ink, sprayed through a series of tiny jets, to print text or images on a piece of paper. (which is typically fed into the printer from a paper tray under the printer, or an angled feeder on the back of the printer

Raid 1

Uses mirroring or duplexing for increased data redundancy.

impact printer

Uses pins and inked ribbons to print text or images on a piece of paper. Impact printers can make use of a few special types of paper. Tractor-feed paper has holes so that printers with sprockets can continuously print massive stacks of the stuff. Special multi-part impact paper can be used to print receipts in duplicate, triplicate, or more

client-side virtualization

Using a hypervisor installed on a client machine to run a virtual machine. The VM may be created and stored on the client machine or accessed over the netwrok

Augmented Reality (AR)

Using some form of hardware (such as a smartphone or an AR headset) to enhance the wearer's experience of the world by adding an interface layer. The interface layer presents information such as the time or navigation instructions and may also support interaction

multicore processing

Using two or more execution cores on one CPU die to divide up work independently of the OS.

dual-channel architecture

Using two sticks of RAM (either RDRAM or DDR) to increase throughput. See also triple-channel architecture and quad-channel architecture

buffered/registered RAM

Usually seen in motherboards supporting more than four sticks of RAM; used to address interference issues caused by the additional sticks. It accomplishes this with a small register installed on some memory modules to act as a buffer between the DIMM and the memory controller

snap-ins

Utilities that can be used with the Microsoft Management Console

Disk Cleanup

Utility built into Windows that can help users clean up their disks by removing temporary Internet files, deleting unused program files, and more.

System Restore

Utility in Windows that enables you to return your PC to a recent working configuration when something goes wrong. System Restore enables you to select a restore point and then returns the computer's system settings to the way they were at that restore point—all without affecting your personal files or e-mail.

Event Viewer

Utility made available in Windows as an MMC snap-in that enables users to monitor and audit various system events, including network bandwidth usage and CPU utilitzation

Device Manager

Utility that enables techs to examine and configure all the hardware and drivers in a Windows PC.

motherboard book

Valuable resource when installing a new motherboard. Normally lists all the specifications about a motherboard, including the type of memory and type of CPU usable with the motherboard.

checksum

Value generated from some data, like a file, and saved for comparing to other checksums later. Can be used to identify identical data, such as files on a user's system that match known viruses. Checksums can also be used to monitor whether a program is changing itself over time, which is a strong warning sign that it may be malware that evolves to avoid detection

subnet mask

Value used in TCP/IP settings to divide the IP addess of a host into its component parts: network ID and host ID

nit

Value used to measure the brightness of an LCD display. A typical LCD display has a brightness of between 100 and 400 nits.

attributes

Values in a file that determine the hidden, read-only, system, and archive status of the file.

gaming laptop

Variant of the desktop-replacement laptop designed to play resource-hungry games on the go, often at a high price

microATX (uATX)

Variation of the ATX form factor, which uses the ATX power supply. MicroATX motherboards are generally smaller than their ATX counterparts but retain all the same functionality.

SATA Express (SATAe)

Version of SATA that ties capable drives directly into the PCI Express bus on the motherboards. Each lane of PCIe 3.0 is capable of handling up to 8 Gbps of data throughput. A SATAe drive grabbing two lanes, therefore, could move a whopping 16 Gbps through the bus

Windows XP

Version of Windows that replaced both the entire Windows 9x line and Windows 2000; does not have a Server version. No longer supported by Microsoft.. succeeded by windows vista

CRC (Cyclic Redundancy Check)

Very accurate mathematical method used to check for errors in long streams of transmitted data. Before data is sent, the main computer uses the data to calculate a CRC value from the data's contents. If the receiver calculates from the received data a different CRC value, the data was corrupted during transmission and is re-sent. Ethernet packets use the CRC algorithm in the FCS portion of the frame.

SRAM (Static RAM)

Very high-speed RAM built into CPUs that reduces wait states by preloading as many instructions as possible and keeping copies of already run instructions and data in case the CPU needs to work on them again

guest account

Very limited built-in account type for Windows; a member of the Guest group.

audio jack

Very popular connector used to transmit two audio signals; perfect for stereo sound. Confusingly, you can find the diameter described as both 1/8 inch and 3.5 mm

SD (Secure Digital)

Very popular format for flash media cards; also supports I/O devices. In addition to full-sized SD cards, the format also includes two smaller form factors: miniSD and microSD

xD (Extreme Digital) picture card

Very small flash media card format.

interpolation

Video capture and display technology that calculates the color value and light intensity between pixels to fill in information that is not directly captured or saved

XGA (extended graphics array)

Video display mode of 1024 × 768.

SXGA

Video display mode of 1280 × 1024.

WYXGA

Video display mode of 1920 x 1200

SVGA (super video graphics array)

Video display mode of 800 × 600. Native displays are rare these days, but Windows might go into SVGA mode if the video driver is corrupt

WXGA

Video display mode. Most often of 1366 x 768, though a variety of similar resolutions are also known as WXGA

3-D graphics

Video technology that attempts to create images with the same depth and texture as objects seen in the real world

high dynamic range (HDR)

Video technology that increases the bandwidth of display colors and light intensity above standard dynamic range

snapshot

Virtualization feature that enables you to save an extra copy of the virtual machine as it is exactly at the moment the snapshot is taken.

polymorphic virus

Virus that attempts to change its signature to prevent detection by antivirus programs, usually by continually scrambling a bit of useless code. Often shortened to polymorph

stealth virus

Virus that uses various methods to hide from antivirus software

user interface

Visual representation of the computer on the monitor that makes sense to the people using the computer, through which the user can interact with the computer. This can be a graphical user interface (GUI) like windows 10 or a command-line interface like Windows Powershell

virtual assistant

Voice-activated technology that responds to user requests for information. Virtual assistants can be used to search the Internet, make reminders, do calculations, and launch apps.

simple volume

Volume created when setting up dynamic disks. Acts like a primary partition on a dynamic disk.

mirrored volume

Volume that is mirrored on another volume. (See also mirroring.)

spanned volume

Volume that uses space on multiple dynamic disks

respect

What all techs should show their customers

roaming

When a mobile device connects to a network not owned by its home carrier

parallel execution

When a multicore CPU processes more than one thread.

replication

When a virus makes copies of itself, often by injecting itself into other executables

viewing angle

Width (measured from the center to the side of a display) range within which the image can be fully seen

Start Screen

Windows 10 version of the start menu, which functions as a combination of the traditional Start menu and the Windows 8/8.1 Modern UI

Windows Explorer

Windows 7 - utility that enables you to manipulate files and folders stored on the drives in your computer. Rebranded File Explorer in Windows 8, 8.1, and 10

System Tools

Windows 7 menu containing tools such as System Information and Disk Defragmenter, accessed by selecting Start | All Programs | Accessories | System Tools

Advanced Startup Options menu

Windows 7 menu that can be reached during the boot process that offers advanced OS startup options, such as to boot to Safe Mode or boot into Last Known Good Configuration

Task Scheduler

Windows 7 utility enabling users to set tasks to run automatically at certain times

Backup and Restore

Windows 7's backup utility. It offers two options: create a backup or restore from a backup. Windows 10 still supports restoring these backups, which it calls Backup and Restore (Windows 7) see also File History

navigation pane

Windows 7's name for the Folders list in Windows Explorer.

Windows Easy Transfer

Windows 7/8/8.1 method of transferring user data and personalization settings to a new PC. It is not available in Windows 10

bootmgr

Windows Boot manager. Manages the boot process using information from the Boot Configuration Data (BCD) file

Power Options

Windows Control Panel applet that enables better control over power use by customizing a Balanced, Power saver, or High-performance power plan

Sync Center

Windows Control Panel applet where network files marked as Always available offline may be viewed

Programs and Features

Windows Control Panel applet; enables uninstalling or changing program options and altering Windows features.

Reset your PC

Windows RE option in Windows 8 and later that nukes the system— deleting all apps, programs, user files, and user settings—and presents a fresh installation of Windows. Use Reset as the last resort when troubleshooting a PC. And back up data first, if possible. Renamed to Remove everything in Windows 10

Remove everything

Windows Recovery Environment option in Windows 10 that deletes all apps, programs, user files, and user settings - resulting in a fresh installation of Windows. Use as a last resort when troubleshooting (and back up data first)

keep my files

Windows Recovery Environment option in Windows 10 that rebuilds the OS, but preserves user files, settings and Microsoft Store applications (while deleting all other applications on the system)

Refresh your PC

Windows Recovery Environment option in Windows 8/8.1 that rebuilds the OS, but preserves all user files and settings and any applications purchased from the Windows Store. Note well: Refresh deletes every other application on a system. Renamed Keep my files in Windows 10

shutdown

Windows and Linux command for shutting down the computer

hostname

Windows command for displaying the name of a computer

gpresult

Windows command for listing group policies applied to a user.

gpupdate

Windows command for making immediate group policy changes in an individual system.

taskkill

Windows command-line tool for killing running processes

tasklist

Windows command-line tool for listing and managing processes

tracert

Windows command-line utility used to follow the path a packet takes between two hosts. Called traceroute in Mac OS X and Linux.

ReadyBoost

Windows feature enabling the use of flash media (USB/memory cards) as dedicated virtual memory.

UAC (User Account Control)

Windows feature implemented to stop unauthorized changes to Windows. UAC enables stanard accounts to do common tasks and provides a permissions dialog box when standard and administrator accounts do certain things that could potentially harm the computer (such as attempt to install a program)

offline files

Windows feature the enables storing a local, duplicate copy of files and folders on a hard drive. When the laptop connects to a network, Windows automatically syncs those offline files with the files and folders on a file server or other PC

Documents folder

Windows folder for storing user-created files.

Error Checking

Windows graphical tool that scans and fixes hard drive problems. Often referred to by the name of the executable, chkdsk, or Check Disk. The Mac OS X equivalent is the Disk Utility, and Linux offers a command-line tool called fsck.

Data collector Sets

Windows log repository that accepts log entries from other windows computers

pinned apps

Windows method of attaching programs to the taskbar. A pinned app gets a permanent icon displayed on the taskbar. Known as pinned porgrams in Windows 7

ODBC Data Source Administrator

Windows programming tool for configuring the Open Database Connectivity (ODBC) coding standard. Data Source Administrator enables you to create and manage entries called Data Source Names (DSNs) that point ODBC to a database. DSNs are used by ODBC-aware applications to query ODBC to find their databases

file association

Windows term for the proper program to open a particular file; for example, the file association for opening or .mp3 files might be Winamp.

Performance Monitor

Windows tool for tracking system resources over time

Windows Memory Diagnostic

Windows tool that can automatically scan a computer's RAM when a problem is encountered

Remote Desktop Connection

Windows tool used to form a remote desktop connection and graphically access the GUI of a remote system

Local Security Policy

Windows tool used to set local security policies on an individual system.

Resource monitor

Windows utility that displays detailed performance information about a computer's CPU, memory, disk, and network activity

Task Manager

Windows utility that shows all running programs, including hidden ones, and is accessed by pressing ctrl-shift-esc. You can use the Task Manager to shut down an unresponsive application that refuses to close normally

Server Message Block (SMB)

Windows' network file and print sharing protocol, though every major OS now supports it. Protocol of choice for LAN file servers. Uses TCP port 445 and UDP ports 137, 138, and 139

HDBaseT

Wired video transmission system to carry uncompressed HD video over Cat 5a or Cat 6 network cables

IEEE 802.11

Wireless Ethernet standard more commonly known as Wi-Fi.

GSM (Global System for Mobile Communications)

Wireless data standard for mobile devices

infrastructure mode

Wireless networking mode that uses one or more WAPs to connect the wireless network nodes to a wired network segment.

802.11b

Wireless networking standard that operates in the 2.4 GHz band with a theoretical maximum throughput of 11 Mbps

802.11g

Wireless networking standard that operates in the 2.4-GHz band with a theoretical maximum throughput of 54 Mbps and is backward compatible with 802.11b

802.11a

Wireless networking standard that operates in the 5-GHz band with a theoretical throughput of 54 Mbps

WEP (Wired Equivalent Privacy)

Wireless security protocol that uses a standard 40-bit encryption to scramble data packets. Does not provide complete end-to-end encryption and is vulnerable to attack.

WPA (WIFI protected access)

Wireless security protocol that uses encryption key integrity-checking/TKIP and EAP and is designed to improve on WEP's weaknesses. Supplanted by WPA2

WPA2 (Wi-Fi Protected Access 2)

Wireless security protocol, also known as IEEE 802.11i. Uses the Advanced Encryption Standard (AES) and replaces WPA

Bluetooth

Wireless technology designed to create small wireless networks preconfigured to do specific jobs, but not meant to replace full-function networks or Wi-Fi.

Radio Frequency Identification (RFID)

Wireless technology that uses small tags containing small amounts of digital information, and readers capable of accessing it. Passive RFID tags operate by harvesting some of the power a scanner or reader emits, enabling a vast array of applications. Common uses such as tracking inventory, identifying lost pets, contactless payments, authentication, and wiresless door locks are just scratching the surface

T568A and B

Wiring standard for Ethernet cable

AOL

You've got mail!

IMEI (International Mobile Equipment Identity)

a 15-digit number used to uniquely identify a mobile device, typically a smartphone or other device that connects to a cellular network.

file

a named collection of any form of data that is stored beyond the time of execution of a single job. A file may contain program instructions or data, which may be numerical, textual, or graphical information

disk initialization

a process that places special information on every hard drive installed in a windows system

application

a program that enables you to perform a specific task on a computer, such as write a document or play a game

Disk Defragmenter

a program that maintains performance by rearranging chunks of data on a storage device to ensure chunks that comprise a file are store contiguously. Renamed to Optimize Drives in Windows 8 and up

barcode

a scannable, read-only binary code often used to mark items for inventory tracking

restore point

a snapshot of your computer configuration at a specific point in time, created by the System Restore utility and used to restore a malfunctioning system

checkpoint

also known as a snapshot. Saves changes to a virtual machine's state. Checkpoints are great for performing maintenance with a safety net, but they aren't a complete backup, and many snapshots can slow a VM down. Get rid of them when the danger has passed

directory

another name for a folder

ESD mat

antistatic mat

ESD strap

antistatic strap

bootable disk

any storage device with a self-starting operating system

biometric authentication

authentication process using bio-metric data such as voice, finger prints or retinal scans.

optimization

changes made to a system to improve its performance

edge LED backlighting

columns or rows of LEDs placed along the sides or top of a display panel to illuminate the display

del (erase)

command line tool used to delete/erase files

dir

command line tool used to display the entire contents of the current working directory

format

command line tool used to format a storage device

rd (rmdir)

command line tool used to remove directories

net use

command line utility in Windows net command enables a user to connect, disconnect, and view information about existing connections to network resources

md (mkdir)

command-line tool used to create directories

move

command-line tool used to move a file from one location to another

Cd

command-line utility for changing the focus of the command prompt from one directory to another. Shorthand for "change directory"

ping

command-line utility used to send a "ping" message to another computer, which can be used to verify another system is on the network, spot potential DNS issues, identify latency problems, and so on

Computer

commonly used interface for Windows Explorer that displays hard drives and devices with removable storage

trackball

point device used in early portable computers, distinguished by a ball that is rolled with the fingers

User Datagram Protocol (UDP)

connectionless protocol used with TCP/IP

power management

cooperation between hardware, BIOS, and OS to reduce power consumption

cp

copy command in linux

dis-intended capacitors

failed capacitors on a motherboard, which tend to bulge out at the top. This was especially a problem during the mid-2000s, when capacitor manufacturers released huge batches of bad capacitors

extension

file extension

destination port

in port triggering, the port that the router opens to receive a response after the router sends outbound traffic on the trigger port see trigger port

traceroute

macOS and Linux command-line utility for following the path a packet takes between hosts. The Windows version is named tracert

Time Machine

macOS backup tool that enables you to create full system backups, called local snapshots, and to recover some or all files in the event of a crash; it also enables you to restore deleted files and recover previous versions of files

Spaces

macOS feature of enabling multiple desktops

Utilities

macOS folder that contains tools for performing services on a Mac beyond what's included in System Preferences, including Activity Monitor and Terminal

Keychain

macOS password management and storage service that saves passwords for computer and non-computer environments. Also the iCloud Keychain adds synchronization among any macOS and iOS devices connected to the Internet for a user account

System preferences

macOS tool containing many administrative functions

launchd

macOS tool for automatically running tasks based on a schedule

frequency

measure of a sound's tone, either high or low

hotspot

mobile hotspot

change

modify configuration or status of a system, such as updating an NTFS permission or modifying a password

su

older linux command for gaining root access

host (networking)

on a TCP/IP network, a single device that has an IP address-any device (usually a computer) that can be the source or destination of a data packet. In the mainfram world, computer that is made available for use by multiple people simultaneously. Also, in virtualization, a computer running on or more virtual operating systems

insert mode

one of two modes (along with command mode) used in vi. enables typing input to the document. see vi

spoofing

pretending to be someone else by placing false information into packets. Commonly spoofed data include a source MAC address or IP address, e-mail address, Web address, or user name. Generally a useful tool for enhancing or advancing other attacks, such as social engineering or spear fishing

deframentation (defrag)

procedure in which all the files on a hard drive are rewritten on disk so that all parts of each file reside in contiguous clusters. The result is an improvement in disk speed during retrieval operations

primary charge roller

replaces the primary corona wire in newer laser printers. The roller, which is very close to the photosensitive drum, is given a very high charge, forming an electric field (corona) and passing a charge to the photosensitive drum

code

set of symbols representing characters (ACII code) or instructions in a computer program (a programmer writes source code, which must be translated into executable or machine code for the computer to use).

address bus

set of wires leading from the CPU to the memory controller chip (traditionally the northbridge) that enables the CPU to address RAM. Also used by the CPU for I/O addressing. On current CPUs with built-in memory controllers, the address bus refers to the internal electronic channel from the microprocessor to RAM, along which the addresses of memory storage locations are transmitted. Like a post office box, each memory location has a distinct number or address; the address bus provides the means by which the microprocessor can access every location in memory

IRQ (Interrupt Request)

signal from a hardware device, such as a modem or a mouse, indicating that it needs the CPU's attention. In PCs, IRQs are sent along specific IRQ channels associated with a particular device. IRQ conflicts were a common problem in the past when adding expansion boards, but the plug-and-play specification has removed this headache in most cases.

cable lock

simple anti-theft device for securing a laptop to a nearby object

ink cartidge

small container of ink for inkjet printers

satellite latency

small signal delay caused by the distance traveled by satellite signals

codec (compressor/decompressor)

software that compresses or decompresses media streams

honesty

telling the truth

color depth (scanner)

term to define a scanners ability to produce color, hue, and shade

bandwidth

the capacity of a network to transmit a given amount of data during a given period

color depth (display)

the number of bits (bit depth) necessary to represent the number of colors in a graphics mode. Common color bit depths are 16-bit and 32-bit, representing 65,536 colors and 16.7 million colors (plus an 8-bit alpha channel for transparency levels), repectively

radio frequency RF

the part of the electromagnetic spectrum used for radio communication

syntax (command)

the proper way to write a command-line command so that it functions and does what it's supposed to do

attack vector

the route or methods used by a given attack (including malware)

host (virtualization)

the system running (or hosting) a virtual machine

electric potential

the voltage differential between any two objects, one of which is frequently ground or earth, resulting in a degree of attraction for the electrons to move from one of the objects to the other. A large difference between a person and a doorknob, for example, can lead to a shocking experience when the two touch. see electrostatic discharge

heat dope

thermal compound

registration (product)

usually optional process that identifies the legal owner/user of the product to the supplier

Display Settings

windows 10 utility that enables a user to change color schemes, font sizes, and other aspects of what appears on the computer monitor

Users folder

windows default location for content specific to each user account on a computer. It is divided into several folders such as Documents, Pictures, Music, and Videos

802.11n

wireless networking standard that can operate in both the 2.4-GHz and 5-GHz bands and uses multiple in/multiple out (MIMO) to achieve a theoretical maximum throughput of 100+ Mbps


Set pelajaran terkait

Chapter 24: Nursing Care of the Child With an Alteration in Cellular Regulation/Hematologic or Neoplastic Disorder

View Set

Transformational and Charismatic Leadership

View Set

LPN to RN Transition - Fundamentals - Chapter 1: Introduction to Nursing

View Set