Glossary Flashcards

Vocabulary (167 cards)

1
Q

AAA

A

Authentication, Authorization, and Accounting

Example sentence: The AAA framework is commonly used in network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AC

A

Alternating Current

Additional information: AC is the type of current used in most household electrical systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL

A

Access Control List

Example sentence: The ACL determines who can access certain files on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ADF

A

Automatic Document Feeder

Additional information: The ADF on a printer allows for automatic scanning or copying of multiple pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES

A

Advanced Encryption Standard

Example sentence: AES is a widely used encryption algorithm for securing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AP

A

Access Point

Additional information: An AP is a device that allows wireless devices to connect to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APFS

A

Apple File System

Example sentence: APFS is the default file system used in Apple’s macOS High Sierra and later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APIPA

A

Automatic Private Internet Protocol Addressing

Additional information: APIPA assigns IP addresses automatically in the absence of a DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

APK

A

Android Package

Example sentence: APK files are used to install applications on Android devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARM

A

Advanced RISC [Reduced Instruction Set Computer] Machine

Additional information: ARM is a type of processor architecture commonly used in mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP

A

Address Resolution Protocol

Example sentence: ARP is used to map IP addresses to MAC addresses on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ATA

A

Advanced Technology Attachment

Additional information: ATA is a standard interface for connecting storage devices to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ATM

A

Asynchronous Transfer Mode

Example sentence: ATM is a high-speed networking technology used for transferring data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATX

A

Advanced Technology Extended

Additional information: ATX is a motherboard form factor standard used in PCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AUP

A

Acceptable Use Policy

Example sentence: Employees must adhere to the AUP when using company resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BIOS

A

Basic Input/Output System

Additional information: BIOS is firmware that initializes hardware components during bootup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BSOD

A

Blue Screen of Death

Example sentence: The BSOD is a common error screen in Windows operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BYOD

A

Bring Your Own Device

Additional information: BYOD policies allow employees to use their personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAD

A

Computer-aided Design

Example sentence: CAD software is used by engineers to create detailed designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

Additional information: CAPTCHA is used to prevent automated bots from accessing websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CD

A

Compact Disc

Example sentence: CDs were popular for storing music and data before digital formats became prevalent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CDFS

A

Compact Disc File System

Additional information: CDFS is the file system used on compact discs for storing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CDMA

A

Code-Division Multiple Access

Example sentence: CDMA is a technology used in mobile communication networks for multiple users to share the same frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CERT

A

Computer Emergency Response Team

Additional information: CERTs are organizations that respond to cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CIFS
Common Internet File System ## Footnote Example sentence: CIFS allows for file sharing and access over a network.
26
CMD
Command Prompt ## Footnote Additional information: CMD is a command-line interpreter in Windows operating systems.
27
CMOS
Complementary Metal-Oxide Semiconductor ## Footnote Example sentence: CMOS batteries power the BIOS settings on a computer motherboard.
28
CPU
Central Processing Unit ## Footnote Additional information: The CPU is the main component responsible for executing instructions in a computer.
29
CRL
Certificate Revocation List ## Footnote Example sentence: CRLs are used to revoke digital certificates that are no longer valid.
30
DC
Direct Current ## Footnote Additional information: DC is the type of current that flows in one direction without reversing.
31
DDoS
Distributed Denial of Service ## Footnote Example sentence: DDoS attacks overwhelm a system with a flood of traffic, causing it to become inaccessible.
32
DDR
Double Data Rate ## Footnote Additional information: DDR is a type of memory that transfers data on both the rising and falling edges of the clock signal.
33
DHCP
Dynamic Host Configuration Protocol ## Footnote Example sentence: DHCP automatically assigns IP addresses to devices on a network.
34
DIMM
Dual Inline Memory Module ## Footnote Additional information: DIMMs are used to add RAM to a computer motherboard.
35
DKIM
DomainKeys Identified Mail ## Footnote Example sentence: DKIM is an email authentication method that helps prevent email spoofing.
36
DMA
Direct Memory Access ## Footnote Additional information: DMA allows data to be transferred directly between memory and I/O devices without involving the CPU.
37
DMARC
Domain-based Message Authentication, Reporting, and Conformance ## Footnote Example sentence: DMARC helps prevent email impersonation and phishing attacks.
38
DNS
Domain Name System ## Footnote Additional information: DNS translates domain names into IP addresses to locate resources on the internet.
39
DoS
Denial of Service ## Footnote Example sentence: A DoS attack disrupts services or resources to legitimate users.
40
DRAM
Dynamic Random-Access Memory ## Footnote Additional information: DRAM is volatile memory used for storing data that needs to be accessed quickly.
41
DRM
Digital Rights Management ## Footnote Example sentence: DRM protects digital content by controlling access and distribution rights.
42
DSL
Digital Subscriber Line ## Footnote Additional information: DSL provides high-speed internet access over traditional copper telephone lines.
43
DVI
Digital Visual Interface ## Footnote Example sentence: DVI is a video interface used to connect a computer to a monitor.
44
DVI-D
Digital Visual Interface-Digital ## Footnote Additional information: DVI-D is a type of DVI connector that supports digital signals only.
45
ECC
Error Correcting Code ## Footnote Example sentence: ECC memory can detect and correct errors in data.
46
EFS
Encrypting File System ## Footnote Additional information: EFS is a feature in Windows that allows files and folders to be encrypted.
47
EMI
Electromagnetic Interference ## Footnote Example sentence: EMI can disrupt electronic devices and communication signals.
48
EOL
End-of-Life ## Footnote Additional information: EOL refers to the end of product support or availability.
49
eSATA
External Serial Advanced Technology Attachment ## Footnote Example sentence: eSATA provides a fast external connection for storage devices.
50
ESD
Electrostatic Discharge ## Footnote Additional information: ESD can damage electronic components through sudden discharge of static electricity.
51
EULA
End-User License Agreement ## Footnote Example sentence: Users must accept the EULA before installing software.
52
exFAT
Extensible File Allocation Table ## Footnote Additional information: exFAT is a file system optimized for flash drives and large files.
53
ext
Extended File System ## Footnote Example sentence: ext is a Linux file system used on many distributions.
54
FAT
File Allocation Table ## Footnote Additional information: FAT is a file system used by early versions of Windows.
55
FAT12
12-bit File Allocation Table ## Footnote Example sentence: FAT12 was used in early floppy disks and limited storage capacity.
56
FAT16
16-bit File Allocation Table ## Footnote Additional information: FAT16 increased the storage capacity and file size limit over FAT12.
57
FAT32
32-bit File Allocation Table ## Footnote Example sentence: FAT32 is still used on some USB drives and memory cards.
58
FSB
Front-Side Bus ## Footnote Additional information: The FSB connects the CPU to other components on a computer motherboard.
59
FTP
File Transfer Protocol ## Footnote Example sentence: FTP is used to transfer files between a client and a server over a network.
60
GFS
Grandfather-Father-Son ## Footnote Additional information: GFS is a backup rotation scheme that keeps multiple generations of data.
61
GPS
Global Positioning System ## Footnote Example sentence: GPS uses satellite signals to determine location and navigation.
62
GPT
GUID [Globally Unique Identifier] Partition Table ## Footnote Additional information: GPT is a modern partitioning scheme used on UEFI systems.
63
GPU
Graphics Processing Unit ## Footnote Example sentence: GPUs are specialized processors used for rendering graphics and images.
64
GSM
Global System for Mobile Communications ## Footnote Additional information: GSM is a standard for mobile networks used by many carriers worldwide.
65
GUI
Graphical User Interface ## Footnote Example sentence: GUIs provide visual elements for interacting with software applications.
66
GUID
Globally Unique Identifier ## Footnote Additional information: GUIDs are unique identifiers used in software applications and systems.
67
HAL
Hardware Abstraction Layer ## Footnote Example sentence: HAL provides a consistent interface for hardware devices to communicate with the operating system.
68
HAV
Hardware-assisted Virtualization ## Footnote Additional information: HAV allows virtual machines to access hardware resources directly for improved performance.
69
HCL Hardware Compatibility List
70
HDCP High-bandwidth Digital Content Protection
71
HDD Hard Disk Drive
72
HDMI High-Definition Multimedia Interface
73
HSM Hardware Security Module
74
HTML Hypertext Markup Language
75
HTTP Hypertext Transfer Protocol
76
HTTPS Hypertext Transfer Protocol Secure
77
I/O Input/Output
78
IaaS Infrastructure as a Service
79
ICR Intelligent Character Recognition
80
IDE Integrated Drive Electronics
81
IDS Intrusion Detection System
82
IEEE Institute of Electrical and Electronics
83
Engineers
84
IMAP Internet Mail Access Protocol
85
IOPS Input/Output Operations Per Second
86
IoT Internet of Things
87
IP Internet Protocol
88
IPS Intrusion Prevention System
89
IPS In-plane Switching
90
IPSec Internet Protocol Security
91
IR Infrared
92
IrDA Infrared Data Association
93
IRP Incident Response Plan
94
ISO International Organization for
95
Standardization
96
ISP Internet Service Provider
97
ITX Information Technology eXtended
98
KB Knowledge Base
99
KVM Keyboard-Video-Mouse
100
LAN Local Area Network
101
LC Lucent Connector
102
LCD Liquid Crystal Display
103
LDAP Lightweight Directory Access Protocol
104
LED Light-emitting Diode
105
MAC Media Access Control/Mandatory Access
106
Control
107
MAM Mobile Application Management
108
MAN Metropolitan Area Network
109
MBR Master Boot Record
110
MDM Mobile Device Management
111
MFA Multifactor Authentication
112
MFD Multifunction Device
113
MFP Multifunction Printer
114
MMC Microsoft Management Console
115
MOU Memorandum of Understanding
116
MSDS Material Safety Data Sheet
117
MSRA Microsoft Remote Assistance
118
Acronym Definition
119
MX Mail Exchange
120
NAC Network Access Control
121
NAT Network Address Translation
122
NDA Non-disclosure Agreement
123
NetBIOS Networked Basic Input/Output System
124
NetBT NetBIOS over TCP/IP [Transmission Control
125
Protocol/Internet Protocol]
126
NFC Near-field Communication
127
NFS Network File System
128
NIC Network Interface Card
129
NTFS New Technology File System
130
NVMe Non-volatile Memory Express
131
OCR Optical Character Recognition
132
OLED Organic Light-emitting Diode
133
ONT Optical Network Terminal
134
OS Operating System
135
PaaS Platform as a Service
136
PAN Personal Area Network
137
PC Personal Computer
138
PCIe Peripheral Component Interconnect Express
139
PCL Printer Command Language
140
PE Preinstallation Environment
141
PII Personally Identifiable Information
142
PIN Personal Identification Number
143
PKI Public Key Infrastructure
144
PoE Power over Ethernet
145
POP3 Post Office Protocol 3
146
POST Power-on Self-Test
147
PPP Point-to-Point Protocol
148
PRL Preferred Roaming List
149
PSU Power Supply Unit
150
PXE Preboot Execution Environment
151
RADIUS Remote Authentication Dial-in User Service
152
RAID Redundant Array of Independent (or
153
Inexpensive) Disks
154
RAM Random-access Memory
155
RDP Remote Desktop Protocol
156
RF Radio Frequency
157
RFI Radio-Frequency Interference
158
RFID Radio-Frequency Identification
159
RJ11 Registered Jack Function 11
160
RJ45 Registered Jack Function 45
161
RMM Remote Monitoring and Management
162
RTO Recovery Time Objective
163
SaaS Software as a Service
164
SAN Storage Area Network
165
SAS Serial Attached SCSI [Small Computer
166
System Interface]
167
SATA Serial Advanced Technology Attachment