Set 4 Flashcards

(20 cards)

1
Q

Audio Jack

A

A small connector used to transmit analog audio signals between devices. Common sizes include 3.5mm (standard for headphones) and 6.35mm (used in professional audio equipment). It typically supports stereo sound and sometimes a microphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

The process of verifying a user’s identity before granting access to a system or resource. Common methods include passwords, PINs, biometrics, and smart cards. It is the first step in access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

The process of granting or denying access to resources after authentication. It determines what an authenticated user is allowed to do—such as read, write, or execute files—based on their permissions or roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Autoplay

A

A Windows feature that automatically performs a specified action when media (like a USB drive, CD, or DVD) is inserted. It can launch applications, open folders, or play media. Often disabled for security reasons to prevent malware execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AutoRun

A

A Windows feature that allows media (like CDs or USB drives) to automatically launch a specified program by reading an autorun.inf file. Often used for installers but can be a security risk if exploited by malware. AutoRun is largely disabled by default in modern Windows versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backup and Restore

A

A Windows utility used to create copies of files or system images to protect against data loss. Backups can be restored in case of hardware failure, accidental deletion, or system corruption. Found in Control Panel on older versions like Windows 7; replaced by File History and System Image Backup in newer versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backup Testing

A

The process of verifying that backup files can be successfully restored and used. Ensures backup integrity, confirms the data is not corrupted, and validates the backup strategy. Critical for disaster recovery planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Badge Reader

A

A security device that scans employee ID badges (often with RFID or magnetic stripes) to control physical access to buildings or restricted areas. Often part of an access control system used in workplaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bandwidth

A

The maximum amount of data that can be transmitted over a network connection in a given amount of time, usually measured in Mbps (megabits per second) or Gbps. Higher bandwidth means more data can flow through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bash

A

Short for Bourne Again SHell, Bash is a command-line interpreter commonly used in Linux and macOS. It allows users to run commands, scripts, and manage files and system tasks. Useful for automation and system administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Basic Disk

A

A type of disk configuration in Windows that uses primary partitions, extended partitions, and logical drives. It supports standard volume types like simple and boot/system volumes. Unlike dynamic disks, basic disks do not support features like spanning or striping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Battery Health

A

A measure of a battery’s ability to hold a charge compared to when it was new. Over time, battery capacity degrades due to charging cycles, heat, and age. Good battery health means longer device runtime and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Binary Numbers

A

A number system that uses only two digits: 0 and 1. Computers use binary to represent all data and instructions because digital circuits have two states: on (1) and off (0). Each binary digit is called a bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Biometric Authentication

A

A security method that uses unique physical traits (like fingerprints, facial recognition, or iris scans) to verify a user’s identity. Common in smartphones and secure access systems. Considered more secure than passwords alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Biometric Scanner

A

A hardware device that captures biometric data such as fingerprints, facial features, or retina patterns to verify a user’s identity. Commonly used for secure access to systems or physical locations as part of authentication processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BIOS

A

Stands for Basic Input/Output System. It’s firmware stored on a motherboard chip that initializes hardware during the boot process and passes control to the operating system. Users can access the BIOS setup to configure system settings like boot order and hardware options.

17
Q

Bit

A

Short for binary digit, a bit is the smallest unit of data in computing. It can have a value of 0 or 1. Bits are the building blocks of all digital data and are grouped into larger units like bytes (8 bits).

18
Q

BitLocker Drive Encryption

A

A Windows feature that encrypts entire drives to protect data from unauthorized access. It uses a TPM (Trusted Platform Module) or a password to unlock the drive at startup. Helps secure data if a device is lost or stolen.

19
Q

Bluetooth

A

A wireless technology standard used for short-range communication between devices, typically up to 30 feet. Commonly used for connecting peripherals like keyboards, mice, headphones, and smartphones.

20
Q

BSoD (Blue Screen of Death)

A

An error screen displayed by Windows after a critical system error or crash. It indicates a stop error that forces the system to halt to prevent damage. Often caused by hardware failures, driver issues, or corrupted system files.