M-Z Flashcards
IT Support Certificate glossary M-Z (471 cards)
MAC(Media Access Control) address:
MAC(Media Access Control) address: A globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers
MAC address:
MAC address: A globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers
MAC filtering:
MAC filtering: Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust
Mac OS:
Mac OS: Apple’s operating system
MACs (Message Authentication Codes):
MACs (Message Authentication Codes): A bit of information that allows authentication of a received message, ensuring that the message came from the alleged sender and not a third party masquerading as them
Maintenance:
Maintenance: Where software is updated and hardware issues are fixed if, and when, they occur
Malware:
Malware: A type of malicious software that can be used to obtain your sensitive information or delete or modify files
Manifest:
Manifest: A library used if an application needs to use a shared library
Master boot record (MBR):
Master boot record (MBR): a traditional partition table within a storage disk that lets you have volume sizes of 2 terabytes or less and is mostly used in the Windows OS
Master file table (MFT):
Master file table (MFT): A way NTFS stores and represents the files you?re working with on your operating system
Mb/s:
Mb/s: megabit per second, which is a unit of data transfer rate
MD5:
MD5: A popular and widely used hash function designed in the early 1990s as a cryptographic hashing function
MDM policy:
MDM policy: The profiles that contains settings for the device
MDM profile:
MDM profile: The policies that contains settings for the device
Meddler in the middle (formerly known as Man in the Middle):
Meddler in the middle (formerly known as Man in the Middle): An attack that places the attacker in the middle of two hosts that think they’re communicating directly with each other
Memory controller chip (MCC):
Memory controller chip (MCC): A bridge between the CPU and the RAM
Memory management:
Memory management: One of the functions that a kernel performs; it optimizes memory usage and make sure our applications have enough memory to run
Memory manager:
Memory manager: A Windows OS program that helps manage virtual memory
Memory usage:
Memory usage: The amount of memory available in your system as well as what memory is currently being used by other applications
Mesh networks:
Mesh networks: Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes
Metadata:
Metadata: Tells us everything we need to know about a file, including who created it, when it was last modified, who has access to it, and what type of file it is
Metered connection:
Metered connection: An internet connection where all data transfer usage is tracked. Cell phone plans that have a limit on data usage per month or that charge based on usage are examples of metered connections
MIC (Message Integrity Check):
MIC (Message Integrity Check): It is essentially a hash digest of the message in question
Micro display port:
Micro display port: One of the standard power, data and display connector types used in mobile devices