Set 32 Flashcards

(30 cards)

1
Q

resmon.exe (Resource Monitor)

A

A Windows utility that provides real-time information about CPU, memory, disk, and network usage. Helpful for diagnosing system performance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Resources

A

System components like CPU cycles, memory (RAM), storage, and network bandwidth used by hardware and software. Proper resource management ensures system performance and stability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Response Rate

A

In display technology, this is how quickly a pixel can change from one color to another, typically measured in milliseconds (ms). A lower response time is better for reducing motion blur in fast-moving visuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Restore Point

A

A saved snapshot of system settings and files in Windows, used by System Restore to roll back the system to a previous working state without affecting personal files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Retina Scanner

A

A biometric device that uses infrared light to scan the unique pattern of blood vessels in the retina for high-security authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RFI

A

(Radio Frequency Interference). Electromagnetic interference caused by radio waves, which can disrupt wireless communication and other electronic devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RG-6

A

A type of coaxial cable commonly used for cable TV and broadband internet. It has better shielding and supports higher frequencies than RG-59.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RG-59

A

An older type of coaxial cable typically used for analog video signals or short cable runs. Not as effective as RG-6 for modern broadband.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Riser Card

A

A circuit board that allows additional expansion cards to be installed parallel to the motherboard. Useful in compact or low-profile cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Analysis

A

The process of identifying and evaluating potential risks to systems or data, often used in cybersecurity and disaster recovery planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RJ Connector (Registered Jack)

A

A standardized physical network interface. Common types include:

RJ-11: Used for telephone lines
RJ-45: Used for Ethernet/network cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RJ-11

A

A 4- or 6-pin connector used for telephone connections, typically carrying one or two phone lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RJ-45

A

An 8-pin connector used with Ethernet cables for wired networking (Cat5e, Cat6, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

rm (Linux command)

A

Short for “remove.” A Linux command used to delete files from the command line (e.g., rm file.txt).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rmdir (Linux/Windows command)

A

Short for “remove directory.” A command-line utility used to delete empty directories in Linux or Windows (e.g., rmdir foldername).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Roaming

A

The ability for a mobile device to stay connected to a network while moving between different geographic areas, often by connecting to a partner carrier’s network. Can also refer to user profiles that follow the user across different systems in a networked environment.

17
Q

robocopy

A

Short for Robust File Copy, it’s a command-line tool in Windows used to efficiently copy files and directories, especially over networks. Supports features like resuming interrupted copies, multi-threading, and logging.

18
Q

rogue anti-malware

A

A malicious program disguised as a legitimate antivirus tool. It tricks users into believing their system is infected, then demands payment to “fix” the fake issues.

19
Q

ROM

A

(Read-Only Memory). Non-volatile memory that contains firmware or system instructions. Data in ROM cannot be modified easily or at all (without specialized tools).

20
Q

root directory

A

The top-level directory in a file system hierarchy. It contains all other folders and files. On Windows, it’s usually C:.

21
Q

root keys (Windows Registry)

A

The five top-level sections in the Windows Registry:

  • HKEY_CLASSES_ROOT
  • HKEY_CURRENT_USER
  • HKEY_LOCAL_MACHINE
  • HKEY_USERS
  • HKEY_CURRENT_CONFIG
22
Q

rooting

A

The process of gaining privileged (root) access to an Android device’s operating system, allowing deeper customization and control—similar to jailbreaking on iOS.

23
Q

rootkit

A

A stealthy type of malware designed to hide its presence and give attackers administrator-level control over a system.

24
Q

router

A

A networking device that forwards data packets between networks, typically connecting a local network to the internet and assigning IP addresses to devices.

25
RSA token
A hardware or software-based authentication device that uses the RSA algorithm to generate one-time passcodes (OTP) for multi-factor authentication (MFA).
26
RU
(Rack Unit). A unit of measure used to describe the height of servers and networking equipment in a rack. 1 RU = 1.75 inches (44.45 mm).
27
run (networking)
Refers to the length of cable between devices or from a device to a patch panel or switch. Important for ensuring cables don't exceed maximum length limits (e.g., 100 meters for Cat5e/6).
28
Run as administrator
An option in Windows that allows a program to execute with elevated privileges, which may be necessary for system-level changes or installations.
29
SaaS
(Software as a Service). A cloud computing model where applications are provided over the internet. Examples include Google Workspace, Microsoft 365, and Dropbox. Users access software without managing the infrastructure.
30