Set 21 Flashcards
(26 cards)
Incident Reporting
The process of documenting and communicating an event (e.g., a security breach, system failure) to the appropriate personnel for response and analysis.
Inheritance
In permissions, the concept where files or folders inherit access rights from their parent directory unless explicitly changed.
In-Place Upgrade
Installing a newer version of an OS over an existing one without removing apps or user files—used to preserve settings and data.
Insider Threat
A security risk from someone within an organization (employee, contractor) who may misuse access, intentionally or accidentally.
Installation Media (Drivers)
The files needed to install hardware drivers, typically on a USB drive, CD/DVD, or downloaded from a manufacturer’s website.
Installation Media (Operating Systems)
A USB drive, CD/DVD, or ISO that contains the files needed to install or repair an operating system.
iGPU
(Integrated GPU). A graphics processor built into the CPU or motherboard, used for basic visual tasks (e.g., Intel HD Graphics), not as powerful as discrete GPUs.
Intel
A leading processor and hardware manufacturer, known for CPUs (like Core i5, i7), chipsets, and integrated graphics.
Interface
A point where two systems or devices connect and communicate, such as USB ports, software GUIs, or network interfaces.
IoT
(Internet of Things). Devices with network connectivity and embedded sensors (e.g., smart thermostats, cameras, doorbells) used for automation and remote control.
ISP
(Internet Service Provider). A company that provides internet access to individuals and organizations (e.g., Comcast, AT&T, Spectrum).
Interrupt/Interruption
A signal that temporarily halts the CPU to handle a task like input/output—managed by the interrupt request (IRQ) system.
IDS
(Intrusion Detection System). A security system that monitors traffic for suspicious activity and alerts administrators to potential threats or breaches.
IPS (not in plane switching)
(Intrusion Prevention System). A security tool that actively monitors and blocks suspicious network traffic in real time—stops threats before they cause damage.
Inventory Management
The process of tracking IT assets and equipment, such as hardware, software, and licenses, to ensure proper usage and availability.
Inverter
A component in laptops that converts DC to AC power for the backlight of LCD screens (used in older models; LED backlighting has mostly replaced it).
iOS
Apple’s mobile operating system used on iPhones and some iPads; known for tight security, touch-based interface, and App Store apps.
IP
(Internet Protocol). A set of rules for sending and receiving data across networks. Every device on a network has a unique IP address.
IP Address
A unique number assigned to a device on a network (e.g., 192.168.1.1 for IPv4); used to identify and locate devices on a network.
iPadOS
A version of iOS specifically optimized for iPads, offering multitasking features, file management, and Apple Pencil support.
ipconfig
A Windows command-line tool that displays and manages IP settings like IP address, subnet mask, and default gateway.
IPS (not intrusion prevention system)
(In-Plane Switching). A type of LCD display technology that offers better color and wider viewing angles than older TN panels—commonly found in modern monitors.
IPSec
(Internet Protocol Security). A protocol suite used to encrypt and secure IP communications, commonly used in VPNs (Virtual Private Networks).
IPv4
Internet Protocol version 4—uses 32-bit addresses (e.g., 192.168.0.1). Still widely used but being replaced by IPv6.