Glossary

This glossary defines many of the terms and abbreviations used throughout the course and this book.

Numerics

/? A basic cmd command for getting help on a specific command.

> In the CLI, a symbol for sending the output of a command to a file.

1G/2G First-generation (1G) cell phones that handled analog voice calls only and second-generation (2G) networks that handled digital calls.

2.5G A cell phone generation that supports web browsing, short audio and video clips, games, and application and ring tone downloads.

3D printer A printer used to create three- dimensional objects.

3G A cell phone generation that supports faster data speeds as well as full-motion video, streaming music, 3D gaming, and faster web browsing.

3.5G A cell phone generation that supports high-quality streaming video, high-quality video conferencing, and Voice over IP (VoIP).

32-bit bus A set of wires that transmits 32 bits of data at one time from the processor to RAM or to other motherboard components.

4G A cell phone generation that supports IP-based voice, gaming services, high-quality streamed multimedia, and IPv6.

5G A cell phone standard that was ratified in June 2018 and that is currently being implemented in select markets.

64-bit bus A set of wires that transmits 64 bits of data at one time from the processor to RAM or to other motherboard components.

802.11 collective group IEEE 802.11 and Wi-Fi group standards that specify the radio frequencies, speeds, and other capabilities for WLANs.

802.11 standard An IEEE standard that specifies connectivity for wireless networks.

A

AAA server See authentication, authorization, and accounting (AAA) server.

Accelerated Graphics Port (AGP) A high-speed slot for attaching an AGP video card. AGP has been superseded by PCI.

acceptable use policy A policy within a security policy that identifies network resources and usages that are acceptable to the organization. It may also identify ramifications of violating this policy.

acceptance A step in the change management processes that involves determining the parties responsible to accept the change.

access point (AP) A device that connects to a wireless router and is used to extend the reach of a wireless network.

account credentials The username that is used to log into a mail or other server and the account password.

Active Directory A database of all computers, users, and services in a Windows domain.

active listening skills Skills related to really hearing what is being said and engaging with a person.

active partition On MBR disks, the partition used to store and boot an operating system.

ActiveX filtering A type of filtering that allows for web browsing without running ActiveX controls.

adapter A component that physically connects one technology to another.

adapter card A device that increases the functionality of a computer by adding controllers for specific devices or by replacing malfunctioning ports.

address bus A set of wires that carries the memory addresses of the locations where data is read or written by the CPU.

administrative shares Shares that are hidden from users and accessible only by members of the local administrators’ group and identified with a dollar sign ($) at the end of the share name.

administrative tools Tools that enable users to configure a wide range of system functions, such as general hardware, storage, and encryption settings and operations.

Administrative Tools control panel A Control Panel item that includes a collection of tools that are used to monitor and configure Windows operation.

Administrator account An account that has complete control over a computer and can change settings globally, install programs, and get through User Account Control (UAC) when elevation to perform a task is required.

Administrators A Windows group that has permissions that give full control of the computer and access to all folders.

Advanced Configuration and Power Interface (ACPI) An interface that allows the operating system to control power management. Replaces Advanced Power Management (APM). Allows technicians to create power management schemes to get the best performance from a laptop.

Advanced Encryption Standard (AES) A symmetric encryption method.

Advanced Technology (AT) power supply The original power supply for legacy computer systems; now considered obsolete.

adware Software that is usually distributed with downloads of online software. It can display unsolicited advertising using pop-up web browser windows or new toolbars, or it may unexpectedly redirect the user from a web page to a different website. Pop-up windows may be difficult to control as new windows can pop up faster than the user can close them.

AFP Apple Filing Protocol, a proprietary protocol developed by Apple to enable file services for macOS and classic Mac OS.

AirDrop A technology supported by Apple iOS and macOS that uses Bluetooth to establish a Wi-Fi direct connection between devices for file transfer.

Airplane mode A setting that turns off all cellular, Wi-Fi, and Bluetooth radios on a mobile device.

alternating current (AC) A current that changes direction at a uniformly repetitive rate. This type of electricity typically is provided by a utility company and is accessed through wall sockets.

analog telephone A device that can transmit data over standard voice telephone lines for Internet access. This type of service uses an analog modem to place a telephone call to another modem at a remote site. This method of connection is known as dialup.

self-monitoring analysis and reporting technology (S.M.A.R.T.) Technology that enables a PC to predict the future failure of hard disk drives.

Android An open source mobile operating system developed by Google.

Android Application Package (.apk) An archive format in which Android applications are packaged that allows third-party or custom programs to be installed directly, without going through the storefront interface.

Android Main Home Screen An Android setting that defines the format of the home screens and the look and feel of icons, buttons, the color scheme, and animations.

answer file A file that contains simple text that instructs Windows Setup how to configure and install the OS.

anti-malware program Software that continuously looks for known patterns against a database of known malware signatures to detect and block Trojans, rootkits, ransomware, spyware, keyloggers, and adware programs.

antivirus Software that relies on code signatures, which are files containing a sample of the code used by viruses and malware. Based on these signature files, the software scans the contents of a computer disk, comparing the contents of the files stored on the disk with the samples stored in the signature file.

App Store The place to download (for free or for purchase) apps for Apple iOS mobile devices.

Appearance and Personalization A Windows configuration category that permits configuration of the taskbar and navigation (via Settings), File Explorer, and available fonts.

Apple File System (APFS) The Apple Mac workstation file system, which supports native file encryption.

Apple ID A username required to set up an iOS device and used to access the Apple App Store, the iTunes Store, and iCloud.

Apple’s Software Development Kit (SDK) Xcode A kit that third-party developers can use to create apps for iOS devices.

application programming interface (API) A set of guidelines that programmers follow to ensure that a new application is compatible with an OS.

applications Software programs that enable you to perform specific tasks, such as word processors, databases, spreadsheets, and games.

approval A step in the change management processes that involves verifying approval status.

apps Programs that are executed on mobile devices. Mobile devices come with a number of different apps preinstalled to provide basic functionality.

ASA firewall A dedicated Cisco device that provides stateful firewall services. It ensures that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts.

aspect ratio The horizontal to vertical measurement of the viewing area of a monitor.

assessment A step in the change management processes that involves reviewing the impact of a change and the risk assessment.

asymmetric encryption Encryption that ensures confidentiality of a message by requiring two keys: a private key and a public key. The public key can be widely distributed, including by being emailed in plaintext or posted on the Web. The private key is kept by an individual and must not be disclosed to any other party.

AT Extended (ATX) A computer desktop power supply form factor. It is an updated version of the AT but still considered to be obsolete.

ATX12V The most common power supply on the market today. It includes a second motherboard connector to provide dedicated power to the CPU.

audio The sound system that comes with or can be added to a computer.

audio editing workstation A computer used to record music and create music CDs and CD labels. A high-end video editing workstation can be used to create television commercials, prime-time programming, and movies for the theater or home movies.

audio port A port used to connect audio devices to a computer.

augmented reality (AR) Computer technology that creates a simulated environment as it superimposes images and audio over the real world in real time.

authentication methods Ways to accomplish authentication, including using passwords, two-factor authentication, tokens, biometrics, and OTP.

authentication, authorization, and accounting (AAA) server The device that controls who is permitted to access a network (authenticate), what the user can do while there (authorize), and track what actions the user can perform while accessing the network (accounting).

automated Preconfigured tasks that run according to conditions or timers and can install software when appropriate without user intervention.

automatic document feeder (ADF) A slot where an existing document can be placed in a machine in order to make copies of the document. One page of the document is pulled onto the glass surface of the platen, where it is scanned and copies are made. The page on the platen is then automatically removed, and the next page in the original document is pulled onto the platen. This process continues until the entire original document in the feeder has been pulled through.

Automatic Private IP Addressing (APIPA) A form of addressing in which Windows automatically assigns an address to a computer that cannot communicate with a DHCP server to obtain an IPv4 address.

axis In a 3D printer, one of several bars on which the hotend nozzle travels to dispense filament. Axes are vertical or horizontal so that the hotend nozzle can be located within a specified location in a 3D environment to “print” the object.

B

Background Intelligent Transfer Service (BITS) A Windows protocol that allows the OS to browse the update site and select updates for download and installation.

backlight A light that supplies the main source of light to the screen of the laptop display. Without it, the image on the screen would not be visible. The backlight shines through the screen and illuminates the display. Two common types of backlights are cold cathode fluorescent lamp (CCFL) and LED.

backup A copy of data that is made to protect the data. A phone backup, for example, includes application settings, text messages, voicemails, and other data types.

backup media A copy of computer data taken and stored locally or stored elsewhere so that it can be used to restore the original after a data loss event.

backup storage location The place where iOS backups are stored; iTunes allows backups to be stored on the local computer hard drive or on the iCloud online service.

Backup Straight from an iOS Device An iOS backup option that allows a user to configure an iOS device to upload a copy of its data directly to iCloud.

baiting An attack in which the attacker leaves a malware-infected flash drive in a public location (such as a corporate restroom), hoping a victim will find the drive and insert it into a laptop, where it installs the malware.

barcode scanner or price scanner A scanner that reads the information contained in the barcodes affixed to most products. These scanners can be handheld, wireless devices, or a stationary device.

basic disk The default disk type in Windows, which contains partitions such as primary and extended as well as logical drives that are formatted for data storage.

basic input/output system (BIOS) An older version of computer firmware that is responsible for hardware initialization, the power-on self-test (POST), and locating the Master Boot Record (MBR).

beep codes An audible reporting system for errors the BIOS finds during the POST.

belt The print head stepper motor uses the belt to move the print head assembly across the page. The belt will then apply the combined layers of ink color uniformly onto the paper.

biometric lock A type of secure lock that is unlocked using a biometric scanner such as a thumbprint reader.

BitLocker A feature that enables a user to encrypt all data on a disk drive or removable drive. Available on Windows 7 Enterprise and Ultimate, Windows 8 Pro and Enterprise, and Windows 10 Pro, Enterprise, and Education Editions.

blacklist A list that specifies which IP addresses are denied on a network and that automatically approves everything else.

blackout A complete loss of AC power.

Bluetooth A wireless industry standard that uses an unlicensed radio frequency for short-range communication, enabling portable devices to communicate over short distances.

Bluetooth Class 1 A type of Bluetooth with maximum permitted power of 100 mW and a power range of 100 meters.

Bluetooth Class 2 A type of Bluetooth with maximum permitted power of 2.5 mW and a power range of 10 meters.

Bluetooth Class 3 A type of Bluetooth with maximum permitted power of 1 mW and a power range of 1 meter.

Bluetooth pairing The process in which two Bluetooth devices establish a connection to share resources.

Bluetooth Specification 1.0 An older Bluetooth technology with limited capabilities, high power consumption, and a data transfer rate of 1 Mb/s.

Bluetooth Specification 2.0 An older Bluetooth technology with limited capabilities, high power consumption, and a data transfer rate of 3 Mb/s.

Bluetooth Specification 3.0 An older Bluetooth technology with limited capabilities, and high power consumption, and a data transfer rate of 24 Mb/s.

Bluetooth Specification 4.0 A newer Bluetooth technology geared toward devices that have limited power and do not need high data transfer rates; offers a rate of 1 Mb/s.

Bluetooth Specification 5.0 A newer Bluetooth technology geared toward devices that have limited power and do not need high data transfer rates; has four different data rates to accommodate a variety of transmission ranges.

Boot A tab in System Configuration used to choose the Windows OS version to boot if more than one is present. You can also choose to boot up in Safe boot (formerly Safe mode) with different options regarding the way that Windows starts.

boot loader program A program that is configured to locate and load an operating system from the boot device.

boot order The sequence in which a computer should check devices for the operating system’s boot files.

boot sector virus A virus that attacks the boot sector, file partition table, or file system.

booting The process of turning on a device and beginning the startup sequence, verifying hardware, and loading operating system software.

botnet An army of compromised hosts.

branch cache In Windows, a technology that enables remote computers to share access to a single cache of data from shared folders and files or document portals such as SharePoint sites. This can reduce WAN traffic because the individual clients do not each need to download their own copy of cache data.

bridge A device that divides a LAN into segments. A bridge keeps a record of all the devices on each segment.

brightness The luminance of a monitor, measured in candelas per square meter (cd/m2).

broad network access A type of network access in which capabilities are available over the network and can be accessed using smartphones, tablets, laptops, and workstations.

broadband A transmission technique that uses different frequencies to send multiple signals over the same medium.

brownout A temporary drop in AC power.

buffer A component of fiber-optic cable that helps shield the core and cladding from damage.

buffered memory Memory chips that have a control chip built into the module. The control chip assists the memory controller in managing large quantities of RAM.

bus A collection of wires through which data travels from one part of a computer to another.

C

C A compiled language that needs to be converted into executable code using a compiler. It performs almost as efficiently as assembly code.

C# A compiled language that needs to be converted into executable code using a compiler. It is a high-level, object-oriented programming language that is also built as an extension of C.

C++ A compiled language that needs to be converted into executable code using a compiler. It is a low-level programming language that adds object-oriented features to its base language C.

cable modem A device that that is typically connected to a home or small office router so that multiple users can connect to a cable company’s network that provides Internet access.

cable tester A tool used to check for wiring shorts, faults, or wires connected to the wrong pins.

cache memory Typically static RAM (SRAM) that is used for storing the data and instructions most recently used by the CPU.

CAD or CAM (CAx) workstation A workstation used to design products and control the manufacturing process.

call center An organization to which customers call in to receive help for specific computer-related problems.

capture card A device that sends a video signal to a computer so the signal can be recorded to a storage drive with video capture software.

carriage Where the print head and ink cartridges are located on Inkjet printers.

case fan An active cooling solution to increase the air flow in a computer case to allow more heat to be removed.

cd A command used to change the current directory to the path specified after the command in Linux, Microsoft CLI, PowerShell, and other CLIs.

cellular A communications technology that handles the transfer of voice, video, and data. With a cellular WAN adapter installed, a user can access the Internet over the cellular network.

cellular WAN A wide-area network that has the technology for the use of a cell phone or laptop for voice and data communications.

central processing unit (CPU) A small microchip that is responsible for interpreting and executing commands.

centronics connector A connector used for connecting older external SCSI devices such as scanners and printers. This connector came in 36-pin and 50-pin versions.

CGA Color graphics adapter; an obsolete display standard that IBM introduced in 1981.

chain of custody The ability to prove how evidence was collected, where it has been physically stored, and who has had access to it between the time of collection and its entry into the court proceedings.

change management process A process that can prevent business functions from being negatively impacted by the updates, upgrades, replacements, and reconfigurations that are a normally part of IT operations.

charging A laser printer process in which the image on the drum is removed and the drum is conditioned for the new image. A wire, grid, or roller receives a charge of approximately –600 volts DC uniformly across the surface of the drum.

charms In Windows 8, a feature that provides quick access to access to Search, Share, Start, Devices, and Settings.

chipset A collection of integrated circuits on the motherboard that control how system hardware interacts with the CPU and motherboard and determines how much memory can be added to a motherboard and the type of connectors on the motherboard.

chkdsk A command that checks a file system for errors, including errors with physical media, and repairs some file system errors. It requires Administrator privileges.

cladding A component of fiber-optic cable that acts like a mirror, reflecting light back into the core of the fiber and keeping light in the core as it travels down the fiber.

clean An OS installation in which all components of any previous version of the software are removed prior to installation.

clean install An OS installation in which all components of any previous version of the software are removed prior to installation.

cleaning In a laser printer, the process in which remaining toner is removed from the drum after an image has been deposited on the paper and the drum has separated from the paper.

client A host that uses the services provided by servers.

client-side emulator Both hardware and software that can be used to behave like or imitate a different system. Some uses are running an OS on a hardware platform for which it was not designed, running a Windows program on a Mac, and more.

client-side virtualization A process in which virtual instances of clients are created on a single system to enable users with specific needs to run VMs on their local computer.

Clock and Region A Windows category that enables configuration of time and date settings and formats. Location and language can also be configured here in some Windows versions.

clock multiplier The speed ratio between a computer’s frontside bus and the CPU.

clock speed The speed at which data travels through the bus, measured in MHz or GHz.

closed source Software for which the source code is not published.

closed-ended question A question that requires a simple answer, such as yes or no, and that is intended to get the most relevant information in the shortest time.

cloud computing A technology that separates applications from hardware and provides on-demand delivery of computing services over the network.

cloud computing services The delivery of computing services that are owned and hosted by service providers.

cloud printing The process of sending a print job to a remote printer.

cloud service provider A company that provides various services tailored to meet customer requirements.

cloud storage Online storage that is accessed over the Internet.

cloud-based network controller A device in the cloud that allows network administrators to manage network devices.

cls A command that deletes all command output and moves the command prompt to the top of the command window.

cmd The Windows command line utility, which is a remnant of the very early days of Microsoft, when DOS was the only operating system that Microsoft had to offer.

CMYK The colors in the inkjet color printing process: colors cyan, magenta, yellow, and black.

coaxial cable A cable that is constructed of either copper or aluminum and is used by both cable television companies and satellite communication systems. Coaxial cable is enclosed in a sheath or jacket and can be terminated with a variety of connectors.

color calibration The process of adjusting settings to match the colors on a screen to the colors on a printed sheet.

command line interface (CLI) A prompt at which a user types commands to interact with the OS.

commercial license A software license for a person who receives financial compensation of any sort, in any amount, for use of the software.

communication skills The ability to transfer information from one place to another verbally, in writing, nonverbally, or using a combination of modalities.

community cloud A cloud for exclusive use by specific entities or organizations that is customized for the community.

Compact Disc File System (CDFS) A file system created specifically for optical disc media.

CompactFlash An older type of Flash memory that is still in wide use because of its high speed and high capacity.

Compatibility mode A mode that Windows provides to enable older applications to run when they otherwise might not run properly on newer Windows operating systems.

compiled language A language that needs to be converted into executable code using a compiler.

complementary metal-oxide semiconductor (CMOS) RAM that uses a battery to ensure that it maintains its settings while the computer is turned off.

complex instruction set computer (CISC) A CPU architecture that uses a broad set of instructions and requires fewer steps per operation.

Component Services A Windows Administrative Tool used by administrators and developers to deploy, configure, and manage Component Object Model (COM) components.

Computer Management console A Windows console that enables management of many aspects of a computer and remote computers in one tool.

conditional statement A statement such as an if-else or a case statement that is needed for scripts to make decisions.

connectivity When used to describe a computer monitor characteristic, it refers to VGA, DVI, HDMI, DisplayPort, and so on.

contrast ratio A measurement of the difference in intensity of light between the brightest point (white) and the darkest point (black).

Control Panel A graphical centralized configuration area in Windows that can be used to modify the system in almost every aspect of the hardware and software, including OS functions.

controller card A hardware component that works as an interface between the motherboard and other computer components.

conventional lock A type of secure physical lock that is unlocked by entering the required key into the door handle mechanism.

converter A device that physically connects one technology to another much like an adapter but that also translates the signals from one technology to the other.

copy A command used to copy files.

core The light transmission element at the center of optical fiber.

CPU fan The fan that moves heat away from the metal fins of the heatsink.

CPU throttling A technique that forces the processor to run at less than the rated speed to conserve power or produce less heat.

CPU virtualization A hardware feature supported by AMD and Intel CPUs that enables a single processor to act as multiple processors. This hardware virtualization technology allows the operating system to support virtualization more effectively and efficiently than is possible through software emulation.

Credential Manager A Windows utility that helps manage passwords that are used for websites, Windows applications, and networks.

crimper A tool used to attach connectors to wires to make a cable.

Critical An Event Viewer message type that indicates immediate attention is required. Usually related to system or software crashes or lockups.

cron A CLI utility that can schedule tasks during off-peak hours.

Ctrl+C A key combination that can be used in the CLI to exit a running command process or script.

Ctrl+Shift+Enter A key combination that can be used in the CLI to run the command prompt as an administrator.

customer-replaceable units (CRUs) Parts of a laptop that can be replaced by the customer.

cutoff switch On the cover of many laptops, a small pin that contacts a switch when the case is closed and turns off the display to conserve power.

cyber law A term to describe the international, regional, country, and state laws that affect computer security professionals.

D

daisy wheel An impact printer with print heads that strike an inked ribbon, causing characters to be imprinted on the paper.

data backup A copy of the data on a computer hard drive that is saved to another storage device or to cloud storage.

data bus A system of wires that carries data between computer components.

data exfiltration The process in which data is intentionally or unintentionally lost, stolen, or leaked to the outside world.

data loss prevention (DLP) A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

data migration The process of transferring data and settings.

Data Sources A tool that administrators use to add, remove, or manage data sources using Open Database Connectivity (ODBC).

data synchronization The exchange of data between two or more devices while maintaining consistent data on those devices.

data type A particular data item used by variables. Integers and strings are examples of data types.

data wiping software Software tools specifically designed to overwrite existing data multiple times, rendering the data unreadable.

data-sending Trojan Malware that provides the attacker with sensitive data, such as passwords.

Date and Time control panel In Windows, the Control Panel item that provides the means to change the system time and date.

deadbolt lock A type of secure physical lock that is unlocked by entering the required key into a lock separate from the door handle mechanism.

default gateway Identifies the router interface that a device uses to access the Internet or another network.

Default Programs control panel The Windows Control Panel item that provides the means to configure the way that Windows handles files and the applications that are used to work with them.

defense-in-depth A layered approach to security that requires a combination of networking devices and services working together in tandem.

degaussing wand A wand with very powerful magnets that is held over exposed hard drive platters to disrupt or eliminate the magnetic field on the hard drive.

del A command used to delete a file or folder.

demilitarized zone (DMZ) A network that provides services to an untrusted network so that the traffic using the server does not come inside the local network.

denial of service (DoS) Trojan Malware that slows or halts network activity.

destination port number The UDP or TCP port number associated with the destination application on a remote device.

destructive Trojan Malware that corrupts or deletes files.

detachable touchscreens A touchscreen that can be removed from a laptop and used like a tablet.

developing The laser printer process in which toner is applied to the image on the drum.

device driver Software used by an OS to access and communicate with each hardware component.

Device Manager A Windows utility that displays a list of all the devices installed in the computer and allows you to diagnose and resolve device problems.

Devices and Printers control panel The Windows Control Panel item that provides a high-level view of the devices connected to a computer.

DHCP The assignment of IP addresses to computers in a defined network scope.

digital assistant A program that can understand natural conversational language and perform tasks for the end user.

digital camera An input device that captures images and videos that can be stored, displayed, printed, or altered.

Digital Light Processing (DLP) A technology that uses a spinning color wheel with an array of mirrors. Each mirror corresponds to a pixel and reflects light toward or away from the projector optics, creating an image of up to 1024 shades of gray. The color wheel then adds the color data to complete the projected image.

digital rights management (DRM) Software that is designed to prevent illegal access to digital content and devices.

digital signal processor (DSP) The process of measuring, filtering, and/or compressing analog signals; it should be a factor considered when purchasing a new sound card.

Digital Visual Interface (DVI) A technology for transmitting uncompressed digital video. A DVI connector consists of as many as 24 pins (3 rows of 8 pins) for digital signals, up to 4 pins for analog signals, and a flat pin called a ground bar.

dir A command used to display various file attributes and properties.

directory A location used to store programs and data files typically displayed in a hierarchical tree structure.

DirectX A collection of APIs related to multimedia tasks for Microsoft Windows.

DirectX Diagnostic (DxDiag) tool A tool that displays details for all DirectX components and drivers that are installed in a computer.

Disable a Device A Device Manager option for disabling a device.

disaster recovery plan A comprehensive document that describes how to restore operation quickly and keep critical IT functions running during or after a disaster.

discoverable mode The mode Bluetooth devices must be set to so that they can be detected for pairing. This is also called visible.

disk cloning A process that involves duplicating all the information on a disk, sector by sector, to another disk.

disk error checking A process that involves checking the integrity of files and folders by scanning the hard disk surface for physical errors.

Disk Management utility The part of the Windows Computer Management console that is used for extending and shrinking partitions, viewing drive status, assigning and changing drive letters, adding drives, adding arrays, and designating the active partitions.

disk optimization Use of tools to perform hard drive defragmentation to gather the noncontiguous data into one place and enable the OS to run faster.

disk utility A tool used to help diagnose and solve disk-related problems and includes most modern operating systems.

diskpart A command that starts a separate command interpreter with commands for working with disk partitions.

dism A command that is used to work with system images before they are deployed.

display colors The number of colors to display, or the bit depth; the higher the bit depth, the greater the number of colors.

display name The name that appears to the public when you create an account; can be your real name, nickname, or any name that you want people to see.

DisplayPort An interface technology designed to connect high-end graphics-capable PCs and displays, as well as home theater equipment and displays.

distributed DDoS An attack that completely overwhelms a target device by having many infected hosts called zombies send false requests to create a denial of service condition for legitimate users.

DNS Domain Name System, a system that provides a way to map an IP address to a registered Internet domain for Web, email, and other Internet services.

DNS poisoning An attack in which an attacker has successfully infected a host to accept false DNS records pointing to malicious servers.

do-while loop A statement that repeats a section of code and then checks a variable to verify whether it is true (or false). Also known as a post-test loop.

documentation A step in the change management processes that involves determining and monitoring change logs, implementation steps, and collected documents.

domain A group of computers and electronic devices with a common set of rules and procedures that are administered as a unit.

dot matrix An impact printer with print heads that strike an inked ribbon, causing characters to be imprinted on the paper.

dot pitch The distance between pixels on the screen. A lower dot pitch (that is, a smaller distance between dots) produces a better image.

dots per inch (dpi) A measure of the quality of printing. The larger the dpi number, the better the image resolution.

Double Data Rate 2 SDRAM (DDR2) A form of memory that runs at higher clock speeds than DDR (553 MHz vs. DDR at 200 MHz) and improves performance by decreasing noise and crosstalk between signal wires.

Double Data Rate 3 SDRAM (DDR3) A form of memory that expands memory bandwidth by doubling the clock rate of DDR2 and that generates less heat than DDR2.

Double Data Rate 4 SDRAM (DDR4) A form of memory that quadruples DDR3 maximum storage capacity and consumes less power than DDR3, at 1.2 V.

Double Data Rate SDRAM (DDR) A form of memory that can support two writes and two reads per CPU clock cycle and that transfers data twice as fast as SDRAM.

double parity A RAID type that provides fault tolerance for up to two failed drives.

drive activity LEDs Lights that indicate when a computer system is reading or writing to hard drives.

drive encryption A technology that protects information on a hard drive by converting it into unreadable code to prevent data theft.

Drive Status The part of the Disk Management utility that shows the condition of the drives.

DSL Digital Subscriber Line, an always-on service that connect to the Internet. With DSL, voice and data signals are carried on different frequencies on the copper telephone wires.

dual channel A type of memory that has a second channel so it can access a second module at the same time.

dual core CPU A single CPU with two cores, in which both cores can process information at the same time.

dual inline memory module (DIMM) A circuit board that holds various memory chips. There are 168-pin SDRAM DIMMs, 184-pin DDR DIMMs, 240-pin DDR2 and DDR3 DIMMs, and 288-pin DDR4 DIMMs.

dual inline package (DIP) An individual memory chip that has dual rows of pins used to attach it to the motherboard.

dual rail Splits the total amperage capability among four circuits. This can allow for safer operation because you’re not forcing loads of power through a single rail.

Dumpster diving An in-person attack in which an attacker rummages through trash bins to discover confidential documents.

duplex multimode LC connector A fiber-optic connector that accepts both the transmitting and receiving fibers in a single connector.

duplexing assembly A part of a printer that turns a printed page over and feeds it back through the printer to be printed on the other side.

DVI See Digital Visual Interface (DVI).

dynamic disk A physical disk that provides features not supported by basic disks and has the ability to create volumes that span across more than one disk.

Dynamic Host Configuration Protocol (DHCP) A protocol that automatically provides IP addresses to network hosts and provides a way to manage those addresses.

dynamic RAM (DRAM) An older technology, historically used for main memory, that gradually discharges energy so it must be constantly refreshed in order to maintain the stored data in the chip.

E

Ease of Access A Windows settings category that provides many options that make Windows easier to use, especially for people who require accommodations for physical or perceptual challenges.

electromagnetic degaussing device A tool that is useful for erasing multiple drives. It consists of a magnet with an electrical current applied to it to create a very strong magnetic field that disrupts or eliminates the magnetic field on a hard drive.

electronic lock A type of secure physical lock that is unlocked by entering a secret combination code or PIN into the keypad.

electronic protected health information (ePHI) The electronic version of PHI, which includes patient names, addresses, dates of visits, telephone and fax numbers, and email addresses.

electrically erasable programmable read-only memory (EEPROM) A form of memory in which information is written to the memory chip after it is manufactured and without being removed from the device. The contents can be “flashed” for deletion. EEPROMs are often used to store a computer system’s BIOS.

electrostatic discharge Occurs when there is a buildup of an electric charge on a surface that comes into contact with another, differently charged, surface.

email A store-and-forward method of sending, storing, and retrieving electronic messages across a network.

email address The address people need to send email to you.

email protocol A protocol used by an incoming email server.

Email Security Appliance (ESA) A Cisco-proprietary device that filters spam and suspicious emails.

Encrypting File System (EFS) A file system used on Windows 7 Professional, Enterprise, and Ultimate, Windows 8 Pro and Enterprise, and Windows 10 Pro, Enterprise, and Education Editions that allows the user to configure file- and folder-level encryption. EFS is directly linked to a specific user account. Only the user who encrypted the data can access it after it has been encrypted using EFS.

encryption A process in which data is transformed using a complicated algorithm to make it unreadable. A special key must be used to return the unreadable information back into readable data.

end devices Computers connected to a network that participate directly in network communication.

end user license agreement (EULA) A license between a software owner and an individual end user.

endpoint management server A server that is typically responsible for monitoring all the end devices in a network, including desktops, laptops, servers, tablets, and any device connected to the network. An endpoint management server can restrict an end device’s connection to the network if the device does not meet certain predetermined requirements.

Enhanced Capabilities Port (ECP) A parallel port that supports bidirectional communication.

Enhanced Parallel Port (EPP) A parallel port that supports bidirectional communication.

enterprise license A software site license held by a company. Typically with an enterprise license, the company pays for its employees to use the software.

environmental variable A variable that an operating system uses to keep track of important details such as username, home directory, and language.

EPS12V A computer desktop power supply form factor that was originally designed for network servers but is now commonly used in high-end desktop models.

erasable programmable read-only memory (EPROM) Nonvolatile memory that can be erased through exposure to strong ultraviolet light. Constant erasing and reprogramming could ultimately render an EPROM chip useless.

e-reader A special-purpose device with a black-and-white display that has been optimized for reading text.

error An Event Viewer message type that indicates a problem exists, but no immediate action is required.

error-correcting code (ECC) memory Data storage that can detect multiple bit errors in memory and correct single bit errors in memory.

eSATA adapter card An adapter that is installed in a computer to provide eSATA ports.

eSATA cable A cable that is used to connect external SATA drives. An eSATA port has a key feature to prevent inadvertent insertion of a USB connector.

eSATA card A card that adds additional internal and external SATA ports to a computer through a single PCI Express slot.

Ethernet A protocol used to connect devices together in a LAN. An Ethernet cable is a common type of network cable used with wired networks.

Ethernet over Power More commonly called powerline networking, it uses existing electrical wiring to connect devices providing the ability to connect a device to the network wherever there is an electrical outlet.

EU General Data Protection Regulation (GDPR) A European regulation that governs the handling of personal data, including financial and healthcare information.

Event Viewer A Windows component that shows the history of application, security, and Windows system events.

execute disable (NX) bit A technology used in CPUs to protect areas of memory that contain operating system files from malicious attacks by malware.

exFAT A file system created to address some of the limitations of FAT, FAT32, and NTFS when formatting USB flash drives. One of the primary advantages of exFAT is that it can support files larger than 4GB.

exit A command used to close the command window.

expansion card A card that gives a computer additional capabilities.

expansion port A connection port on a computer that allows various types of peripheral devices to be connected to the system externally.

expansion slots A computer slot that allows connections to the system bus for the various types of adapter cards, allowing expansion of system performance.

EXPLORER A shortcut that opens File Explorer or Windows Explorer when typed in the Start Button search box.

exposing A part of the laser printing process that involves exposing the photosensitive drum with a laser beam. Every portion of the drum that is scanned with the light has the surface charge reduced to about –100 volts DC. This electrical charge has a lower negative charge than the rest of the drum. As the drum turns, an invisible image is created on the drum.

ExpressCard/34 An expansion slot available on some laptops to add functionality. The expansion slot is 34 mm wide and 75 mm long.

ExpressCard/54 An expansion slot available on some laptops to add functionality. The expansion slot is 54 mm wide and 75 mm long.

ext3 A 64-bit Linux file system with support for journaling.

ext4 A Linux file system that delivers significantly better performance than ext3.

Extended Hierarchical File System (HFS Plus) Apple Mac file system that supports many of the same features as NTFS in Windows but not native file/folder encryption.

extended partition A primary partition that has been divided into logical partitions to make more partitions than the four that would otherwise be possible.

external flash drive A removable storage device that connects to an expansion port such as USB, eSATA, or FireWire.

external Serial ATA (eSATA) A port that is designed to work with both SATA and USB.

F

F7 key In the CLI, a shortcut that moves through the previously entered commands.

F8 key A key that can be pressed during the boot process to open the Windows Advanced Boot Options menu.

facial recognition scanner A biometric input device used to identify a person based on his or her unique facial features.

Failure Audit (security only) A security auditing event enabled in Windows Group Policy (in Active Directory environment) or Local Security Policy (for a single computer). It is triggered by failed attempts at computer login.

feeder The part of a 3D printer that takes filament from a feed tube that is placed into the extruder and pulls it down to be heated and then exit through the hotend nozzle.

fiber-optic cable A cable composed of two kinds of glass (core and cladding), surrounded by insulating material and a protective outer shield (jacket).

field-replaceable units (FRUs) Parts of a laptop that should not be replaced by the customer but by a certified service center or the manufacturer.

filament The material used in 3D printers to create objects.

file A block of related data that is given a single name and treated as a single unit.

File Allocation Table, 32-bit (FAT32) A file system that supports partition sizes up to 2 TB or 2048 GB, and that is used by Windows XP and earlier OS versions.

file backup A backup done for disaster recovery purposes that stores only the specific files indicated at the time the backup is run, no matter which type of backup is made.

File Explorer Options The Windows Control Panel item where many of the most commonly used file and folder options can be found.

File History A Windows application that backs up the files in the libraries, on the desktop, in the Favorites folders, and in the Contacts folders in Windows 8 and Windows 10.

file system A process that provides the directory structure that organizes the user’s operating system, application, configuration, and data files.

File Transfer Protocol Secure (FTPS) An encrypted version of FTP.

fingerprint scanner A biometric input device used to identify a person based on his or her fingerprint.

firewall Hardware or software that protects computers and networks by preventing undesirable traffic from entering internal networks.

firewall apps Apps for mobile devices that can monitor app activity and prevent connections to specific ports or IP addresses.

FireWire An external connector, similar to a USB port, that provides a high-speed connection between a computer and peripheral devices.

firmware Permanent software programmed into read-only memory.

firmware virus A virus that attacks device firmware.

first response The term used to describe the official procedures employed by those who are qualified to collect evidence.

fitness tracker A device that is similar to a smartwatch but that is limited to monitoring a person’s physical activity, sleep, and exercise.

flash card A data storage device that uses Flash memory to store information.

flash card reader A peripheral device that reads and writes memory cards, such as Secure Digital (SD) and Secure Digital High Capacity (SDHC) flash cards.

flash memory A solid-state storage device with no moving parts and nonvolatile memory.

fluorescent backlight A backlight that shines through an LCD screen and illuminates the display.

Folder Options In Windows 7 and earlier, the Control Panel item where many of the most commonly used file and folder options can be found.

folder A Windows directory.

footprinting The phase of a network attack in which the attacker attempts to learn as much about the target network as possible.

for loop A statement that repeats a section of code a specified number of times.

form factor A device’s physical design and look.

format A command used to create a new file system for a disk. It requires Administrator privileges.

formatting The process of creating a file system on a partition for file storage.

front-side bus (FSB) The path between the CPU and the Northbridge.

FTP File Transfer Protocol, a protocol used to transfer files between computers that is considered insecure.

FTP Trojan Malware that enables unauthorized file transfer services on end devices.

full access One of the common levels of user access to BIOS, in which all screens and settings are available, except the supervisor password setting.

Full Control A Windows permission for files and folders that allows users to see the content of a file or folder, change and delete existing files and folders, create new files and folders, and run programs in a folder.

full format A type of hard drive formatting that removes files from the partition while scanning the disk for bad sectors. It is required for all new hard drives.

function (Fn) key A keyboard key that can be used to activate a second function on a dual-purpose key.

fuser assembly A laser printer component that is made up of hot rollers that melt toner into the paper.

fusing The laser printer process in which toner is permanently fused to the paper.

G

gadgets In Windows 7 small applications, such as games, sticky notes, a calendar, or a clock on the desktop to put content, information, and functions in a convenient place.

game port A device port that connects a joystick or MIDI-interfaced device to a computer.

GDDR Synchronous Dynamic RAM RAM specifically designed for video graphics that is used in conjunction with a dedicated GPU.

General The tab in Windows System Configuration that displays three startup selections for troubleshooting: Normal Startup, Diagnostic Startup, and Selective Startup.

Global Positioning System (GPS) A satellite-based navigation system that transmits signals back to Earth.

Global System for Mobile Communications (GSM) A digital cellular technology used for transmitting mobile voice and data services.

globally unique identifier (GUID) partition table (GPT) A partition table scheme standard for hard drives that makes use of a number of modern techniques to expand on the older MBR partitioning scheme. GPT is commonly used in computers with UEFI firmware. Most modern operating systems now support GPT.

Google Play The place to get Android apps.

gpresult A command used to display the Group Policy settings that are in effect for a currently logged in user.

GPS receiver A device that locks onto GPS signals and constantly calculates its position relative to satellites.

gpupdate A command that can be used to do a Group Policy update.

graphical user interface (GUI) An interface that allows a user to interact with the OS by using menus and icons.

graphics card Computer hardware that produces the image you see on a monitor.

graphics card cooling system A video adapter card fan that is used to cool the GPU.

guest operating system (guest OS) The operating system that is running in a VM.

Guests A Windows group that people can use to access a computer through a temporary profile that is created at logon and deleted on logoff. Guest accounts are disabled by default.

H

hard disk drive (HDD) A traditional magnetic storage disk device, with speed measured in revolutions per minute (RPM).

hard drive caching Storage of printer files in cache, which poses privacy and security risks because someone with access to the device could recover these files and have access to confidential or personal information.

hardware The physical components in a computer system.

hardware access Communication with a hardware component in a computer, which is governed by a device driver.

Hardware and Sound A Windows settings category that permits configuration of devices such as printers, media devices, power, and mobility.

Hardware control panel The Windows Control Panel item that contains tools a technician can use to add and remove printers and other types of hardware, configure AutoPlay, manage power, and update drivers.

hash encoding A type of encoding that ensures the integrity of a message.

HD A display standard known as high-definition.

Health Insurance Portability and Accountability Act (HIPAA) A U.S. regulation that describes penalties for breaches of PHI and ePHI.

health monitoring device A device that can deliver hospital-quality data to healthcare practitioners by detecting heart attacks, monitoring air quality, or detecting oxygen levels in the blood.

Healthy A Disk Management utility status that indicates a volume that is functioning properly.

heat sink A large surface area with metal fins installed on top of the CPU to dissipate heat into the surrounding air and draw heat away from the CPU core.

help A command that gets information on other commands.

hexa-core CPU A single CPU with six cores inside it.

Hibernate An option that causes documents, applications, and the state of the operating system to be saved to a temporary file on the hard drive. With this option, the computer takes a little longer to power on than from the Sleep state, but it does not use any power to retain the information on the hard drive.

High-Definition Multimedia Interface (HDMI) A digital interface used to transmit audio and video data in a single cable.

hives Multiple database files in the Windows Registry that are associated with each of the top-level registry keys.

HKEY_CLASSES_ROOT A Windows Registry key that contains settings about the file system, file associations, and shortcuts. Information here is used when you ask Windows to run a file or view a directory.

HKEY_CURRENT_CONFIG A Windows Registry key that contains information about the current hardware profile of the machine.

HKEY_CURRENT_USER A Windows Registry key that contains data about the preferences of the currently logged on user, including personalization settings, default devices, and programs.

HKEY_LOCAL_MACHINE A Windows Registry key that contains information about the physical state of the computer, including hardware configuration, network logon and security information, and Plug and Play information.

HKEY_USERS A Windows Registry key that contains all the configuration settings for the hardware and software configured on the computer for all users.

Home button On iPhone versions prior to the iPhone X, a physical button that performs navigation and other functions.

Home Network A network location profile in HomeGroup that allows you to create or join a HomeGroup.

HomeGroup A Windows option that allows computers on the same home network to automatically share files and printers.

host computer A physical computer controlled by a user. VMs use the system resources of the host machine to boot and run an OS.

host operating system (host OS) The operating system of a host computer. Users can use a virtualization emulator on the host OS to create and manage VMs.

host-based authentication A form of authentication in which the client requests authentication with a public key. The server generates a challenge with this key, and the client must decrypt it with the matching private key to complete the authentication.

host-based firewall A firewall on each individual host computer that controls incoming and outgoing network traffic and determines whether to allow it into a particular device.

hotend nozzle A part of a 3D printer that extrudes the filament after it is heated to the correct temperature.

HTTP Hypertext Transfer Protocol, a protocol that provides a set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.

HTTPS Hypertext Transfer Protocol Secure, a protocol that provides a set of rules for exchanging text, graphic images, sound, and video on the World Wide Web. HTTPS adds encryption and authentication services using Secure Sockets Layer (SSL) protocol or the newer Transport Layer Security (TLS) protocol.

hub A device that extends the reach of a network by regenerating the electrical signal. It also receives data on one port and then sends it out to all other active ports. Hubs are legacy devices that do not segment network traffic and should not be used in today’s networks.

hybrid cloud A cloud made up of two or more different cloud types (such as part private and part public), where each part remains a distinctive object, but both are connected using a single architecture.

hyper-threading A process in which multiple pieces of code (threads) are executed simultaneously in the CPU.

HyperTransport A technology used to enhance CPU performance that provides a high-speed, low-latency connection between the CPU and the Northbridge chip.

hypervisor Software used on a host computer to create and manage VMs. It is the brain of virtualization.

I

i.LINK A high-speed communication bus that is platform independent. Also known as FireWire or IEEE 1394.

I/O card Another term for an expansion card.

IDE (Integrated Development Environment) A suite of tools used to write and test scripts.

IDE ribbon cables A type of cable used for floppy drives, hard drives, and optical drives.

identification A step in the change management processes that defines the change request.

Identification and Authentication Policies A security policy item that specifies authorized persons who may access network resources and that outlines verification procedures.

IEEE 1284 The standard for parallel printer ports.

IEEE 1394 A high-speed communication bus that is platform independent. Also known as i.LINK.

IEEE 802.11i/WPA2 The industry standard for securing WLANs.

image backup A backup done for disaster recovery purposes that records all the information stored on the computer at the time the image is created.

image-based internal partition installation A Windows image stored on an internal (often hidden) partition that can be used to restore Windows to its original state when it was shipped from the factory.

imaging drum The central part of a laser printer, which is a metal cylinder that is coated with light-sensitive insulating material. When a beam of laser light strikes the drum, it becomes a conductor at the point where the light hits it.

impersonation A type of attack in which an attacker pretends to be someone he or she is not (such as a new employee, a fellow employee, a vendor or partner company employee) to gain the trust of a victim.

implementation The step in the change management processes that determines the steps to complete and how to test the results.

incident handling policy A security policy item that describes how security incidents are handled.

incoming and outgoing mail server names The names for mail servers, which are provided by the network administrator or ISP.

Indoor Positioning System (IPS) A system that can determine device location by triangulating its proximity to radio signals such as Wi-Fi access points.

Information An Event Viewer message type that indicates a successful event.

infrared (IR) A wireless mobile technology used for device communication over short ranges.

Infrastructure as a Service (IaaS) A service in which a cloud provider manages the network and provides organizations access to network equipment, virtualized network services, storage, software, and supporting network infrastructure.

inkjet printer A type of non-impact printer that creates output by spraying ink onto the material being printed on.

InPrivate mode A browser mode that makes it possible to browse the web anonymously without retaining information. In this mode, the browser temporarily stores files and cookies and deletes them when the InPrivate session is ended.

input device Hardware device, usually outside the computer case, that allow input of raw data for a computer to process.

input/output (I/O) port A port used to connect peripheral devices such as printers, scanners, and portable drives to a computer.

Institute of Electrical and Electronic Engineers (IEEE) standards Standards by a global association and organization of professionals working toward the development, implementation, and maintenance of technology-centered products and services.

Institute of Electrical and Electronics Engineers (IEEE) 802.15.1 standard The Bluetooth standard, which defines physical layer (PHY) and Media Access Control (MAC) specifications for wireless connectivity with fixed, portable, and moving devices within or entering personal operating space.

Integrated Drive Electronics (IDE) A standard type of interface used to connect some hard drives and optical drives to each other and to the motherboard.

Integrated Drive Electronics (IDE) A ribbon cable used to connect storage drives inside a computer.

integrated graphics processing unit (GPU) A chip that performs the rapid mathematical calculations required to render graphics.

Integrated Services Digital Network (ISDN) A broadband standard that uses multiple channels to send voice, video, and data over normal telephone wires.

intermediary devices Devices that exist in between host devices to ensure that data flows from one host device to another host device.

International Mobile Equipment Identity (IMEI) A unique 15-digit number used to identify a mobile device. This number identifies the device to a carrier’s network.

Internet Control Message Protocol (ICMP) A communications protocol used by devices on a network to send control and error messages.

Internet email Email service that is hosted on the Internet and controlled by a service provider such as Gmail.

Internet Mail Access Protocol (IMAP) A communications protocol used to retrieve email messages from a server. It is more advanced than POP3 and offers a number of advantages.

Internet Options A group of settings used to configure Microsoft Internet Explorer.

Internet Protocol (IP) address An address assigned as part of connecting to a network. There are two versions: IPv4 and IPv6. See also IPv4 address and IPv6 address.

intrusion detection system (IDS) A system that passively monitors traffic on a network.

intrusion prevention system (IPS) A system that monitors incoming and outgoing traffic, looking for malware and network attack signatures. If it recognizes a threat, it can immediately stop it.

inverter A device located behind the screen panel on an LCD laptop screen that is used to convert direct current (DC) to alternating current (AC).

iOS A closed source Unix-based operating system for Apple’s iPhone smartphone and iPad tablet.

iOS Erase Data An iOS data option that causes the device’s screen to go black and all the data on the device to be deleted if the wrong passcode is entered 10 times.

iOS GUI The user interface on an iOS device.

iOS interface An iOS screen that is used to organize apps and from which apps are launched with a touch.

iOS Notification Center A page that displays all iOS alerts in one location. To open the notification area on iOS devices, touch the top center of the screen and swipe down.

iOS Spotlight An iOS search field that shows suggestions from many sources, including the device itself, the Internet, iTunes, the App Store, and nearby locations.

IoT Internet of Things, a network of many smart devices that extends Internet connectivity beyond standard devices, like computers and smartphones, to include devices like refrigerators and TVs that are embedded with sensors and other technology to allow them to become part of the network.

IP address See Internet Protocol (IP) address.

ipconfig A command that displays basic IP configuration information, including the IP address, subnet mask, and default gateway for all network adapters to which TCP/IP is bound.

IPv4 address An address assigned to a device connected to a computer network that is composed of two parts: a part that identifies the network and a part that identifies the device on the network.

IPv6 address An address assigned to a device connected to a computer network that is 128 bits and is represented in hexadecimal format.

J

jacket A component of fiber-optic cable that protects against abrasion, moisture, and other contaminants.

jailbreaking A process used on iOS devices to remove manufacturer restrictions and make it possible to run arbitrary user code and grant users full access to the file system and full access to kernel modules.

Java A compiled language that needs to be converted into executable code using a compiler.

Java APIs A collection of APIs related to the development of Java programming.

JavaScript A client-side scripting language that runs in a browser.

jump list A list of tasks that are unique to an application. To open an application’s jump list, right-click the application’s icon in the taskbar.

K

Kerberos An authentication protocol that allows for single sign-on (SSO).

keylogger Trojan Malware that actively attempts to steal confidential information, such as credit card numbers, by recording keystrokes entered into a web form.

keys A hierarchical arrangement of registry values in the Windows Registry.

KVM switch A hardware device that can be used to control more than one computer while using a single keyboard, monitor, and mouse.

L

L1 cache Typically static RAM (SRAM) internal cache that is integrated into the CPU.

L2 cache External cache originally mounted on the motherboard near the CPU and now integrated into the CPU.

L3 cache Static RAM (SRAM) memory used on some high-end workstations and server CPUs.

land grid array (LGA) A chip in which the pins are in the socket instead of on the processor.

laptop A portable computer.

laptop display The output device that shows all the onscreen content and is one of the most expensive components of a laptop.

laser printer A high-quality, fast printer that uses a laser beam to create an image.

Last Known Good Configuration A setting that loads the configuration settings that were used the last time that Windows started successfully. It does this by accessing a copy of the Registry that is created for this purpose.

LDAP Lightweight Directory Access Protocol, a protocol used to maintain user identity directory information that can be shared across networks and systems.

LED-based backlight A backlight that shines through an LED screen and illuminates the display.

legacy system A computer or networking system that is no longer supported but that is still in operation in today’s networks.

level one technician A technician whose primary responsibilities are to gather pertinent information from the customer and accurately enter all the information into a ticket or work order.

level two technician A technician who is typically more knowledgeable and experienced than a level one technician or who has been working for the company for a longer period of time and receives an escalated work order with the description of the problem and then calls the customer back to ask any additional questions and resolves the problem.

light-emitting diode (LED) An LCD display that uses LED backlighting. LED consumes less power than standard LCD backlighting.

Lightning A small proprietary 8-pin connector used by Apple mobile devices such as iPhones, iPads, and iPods for both power charging and data transfer.

Lightning cable A cable used to connect Apple devices to host computers and other peripherals, such as USB battery chargers, monitors, and cameras.

line-of-sight wireless An always-on service that uses radio signals for transmitting data and Internet access. A clear path between the transmission tower and customer is required.

link-local address An address used by a device to communicate with other computers connected to the same network within the same IP address range.

Linux shell script A Linux shell interpreted language.

liquid crystal display (LCD) A display that has two polarizing filters with a liquid crystal solution between them. An electronic current aligns the crystals so light can pass through or not pass through, creating the image.

local area network (LAN) A network that connects devices using wire cables in a small geographical area. A LAN is typically owned by an individual, such as in a home or small business, or wholly managed by an IT department, such as in a school or corporation.

local backup A backup that uses local storage such as an external HDD or flash media to store backed up files and that can be accessible if there is no network connectivity.

local email An email server managed by a local IT department such as a school network, business network, or organizational network.

local installation An OS installation that occurs from the hard drive, CD, DVD, or USB media.

Local Users and Groups A Windows administrative tool that provides an efficient way of managing users.

locator application An Android or iOS app that makes it possible to find a mobile device that is misplaced or stolen.

logical drive A section of an extended partition that can be used to separate information for administrative purposes.

logical partitions Areas in a hard drive that provide logical storage units that can be formatted to store information, such as data files or applications.

LoJack A security feature that is used to find a lost or stolen device.

loop A device used in coding to repeat commands or tasks.

loopback adapter A tester that determines the basic functionality of computer ports.

low-level formatting A type of disk formatting in which the surface of the disk is marked with sector markers that identify tracks where the data will be physically stored on the disk.

LTE A designation for a 4G technology that meets the 4G speed standards.

Lucent connector (LC) A smaller version of the fiber-optic SC connector, sometimes called a local connector.

M

MAC address filtering A security method that specifies exactly which device MAC addresses are allowed to or blocked from sending data on a network.

macro virus A virus that uses the Microsoft Office macro feature maliciously.

magnetic stripe reader A device that reads information that is magnetically encoded on the back of plastic cards, such as identification badges or credit cards.

malware Software developed to perform malicious acts.

man-in-the-middle An attack in which the attacker intercepts communications between two hosts.

mantrap A small room with two doors, one of which must be closed before the other can be opened; controls physical access to sensitive areas of a building.

mapped drive A drive that makes it possible to access a single file, specific folders, or an entire drive between different operating systems over a network.

master boot record (MBR) A kind of boot sector that is stored on a hard disk drive or other storage device that contains the necessary computer code to start the boot process.

maximum speed rating The maximum speed at which a processor can function without errors.

md A command used to create a new directory.

mean time between failures (MTBF) The average length of time a device such as a printer is expected to work without failing.

measured and metered service Service performance measurements that can be used in a cloud system to automatically control and optimize resources using a metering mechanism.

Media Access Control (MAC) address A physical address that is hard coded onto a network interface card (NIC) by the manufacturer. The address stays with the device regardless of what network the device is connected to. A MAC address is 48 bits and represented in hexadecimal format.

memory module A circuit board that contains integrated circuits and that is installed in a memory slot on a motherboard. A single-sided memory module contains RAM on only one side of the module, and a double-sided memory module contains RAM on both sides.

memory stick A Sony-proprietary Flash memory used in cameras, MP3 players, handheld video game systems, mobile phones, cameras, and other portable electronics.

memory support Virtual computing requires more powerful hardware configurations because each installation needs its own resources. Virtual machines have the same basic system requirements, which includes considering the memory need for the host OS and providing enough RAM to meet the requirements of each VM and its guest OS.

Message Digest 5 (MD5) An older hashing algorithm that has been deprecated. Hashing uses a mathematical function to create a numeric value, called a message digest, that is unique to the data.

Messaging Application Programming Interface (MAPI) A proprietary messaging architecture.

metropolitan area network (MAN) A network that spans a large campus or city.

micro-ATX A smaller motherboard form factor designed to be backward compatible with ATX. They often use the same Northbridge and Southbridge chipsets and power connectors as full-sized ATX boards and therefore can use many of the same components.

microSD A type of removable Flash memory card used for storing information mostly in mobile phones and other mobile devices.

Microsoft Backup utility A Windows utility that is used to perform backups.

Microsoft Management Console (MMC) An application that allows the creation of custom management consoles for collections of utilities and tools from Microsoft or other sources.

Microsoft OneDrive A cloud storage service that is available to Microsoft Windows users.

Microsoft Server Exchange Email software that is also a contact manager and calendaring software.

Microsoft System Preparation (Sysprep) A tool that is used to remove an undesirable Windows setting and that can be used to install and configure the same OS on multiple computers and prepare the OS with different hardware configurations.

Microsoft Windows Update A Windows utility that is used to scan for new software and install service packs and patches.

micro-USB A miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices.

micro-USB cable A cable used to connect a mobile device with a micro-USB port to an electrical outlet charger or to connect to another device in order to charge and/or transfer data.

mini PCI A smaller version of PCI found in some laptops.

mini-PCI card A card that has 124 pins and that is capable of handling 802.11a, 802.11b, and 802.11g wireless LAN connection standards.

mini-PCIe card A card that has 54 pins and that supports the same standards as mini-PCI as well as 802.11n and 802.11ac wireless LAN standards.

miniSD A version of SD between the size of an SD card and a microSD card. The format was developed for mobile phones.

mini-USB cable A cable used to connect a mobile device with a mini-USB port to an electrical outlet charger or to connect to another device in order to charge and/or transfer data.

mirroring A RAID type that stores duplicate data on one or more other drives.

MMC See Microsoft Management Console (MMC).

mobile device Any device that is handheld and lightweight; in addition, they typically have touchscreens for input.

mobile hotspot A wireless access point that is created by a mobile device that shares its data connection.

mobile operating system An operating system designed specifically to run on mobile devices, such as smartphones, tablets, and wearables.

mobility In information technology, the ability to access information electronically from different locations outside the home or office.

modem A device that converts signals produced by one type of device to a form compatible with another device, often used to connect a home or small office to the Internet.

Modify A Windows permission available for files and folders that allows users to change and delete existing files and folders but not create new files or folders.

monitor resolution The amount of information that can be displayed on a screen. A higher resolution monitor displays more information on a screen than a lower resolution monitor does.

more A command used to display the contents of a file one screen at a time.

motherboard, system board, or main board The backbone of a computer. It is a printed circuit board (PCB) that contains buses, or electrical pathways, that interconnect electronic components.

mounting Making a disk image file readable as a drive.

move A command used to move a file or directory from one directory to another.

mSATA or M.2 module A family of standards that specify physical aspects of expansion cards such as connectors and dimensions.

MSINFO32 A Windows command that opens the System Information window, which shows a summary of system components, including hardware components and software information.

MSTSC A Windows command that opens the Remote Desktop utility.

multi rail A power supply that has a separate printed circuit board (PCB) for each connector of the power supply.

multicore CPU A single integrated circuit that contains more than one CPU core.

multifactor authentication Authentication that uses a combination of different technologies, such as a password, a smart card, and biometrics, to authentication a user.

multifactor lock A lock that uses a combination of mechanisms.

multimeter A tool that can take many types of measurements, including AC/DC voltage, electric current, and other electrical characteristics, to test the integrity of circuits and the quality of electricity in computer components.

multimode fiber (MMF) Fiber-optic cable that consists of a larger core and that uses LED emitters to send light pulses.

multiple displays The attachment of two or more monitors to the same computer.

multiprocessing The running of two or more CPUs.

Multipurpose Internet Mail Extensions (MIME) An Internet standard that extends the text-based email format to include other formats, such as pictures and word processor documents and is normally used in conjunction with SMTP.

multitasking Operating multiple applications at the same time.

multithreading Dividing a program into smaller parts that can be loaded as needed by the operating system. Multithreading allows individual programs to be multitasked.

multi-user Programs and peripheral devices that can be used by two or more users with individual accounts at the same time.

N

National Institute of Standards and Technology (NIST) One of the oldest physical science laboratories in the United States.

native mode A mode in which the image sent to the monitor by the video adapter card matches the native resolution of the monitor.

native resolution The best monitor resolution for a specific monitor.

navigation icon On an Android device, icons on the system bar that are used for navigating apps and screens.

near field communication (NFC) A communication protocol that enables two electronic devices to establish communication when they are close to each other.

near letter quality (NLQ) The highest quality of printing that is produced by a dot matrix printer.

Nearby Sharing Microsoft’s file sharing mechanism, introduced in Windows 10, which provides the ability to share content with a nearby device using both Wi-Fi and Bluetooth.

net use A command used to display and connect to network resources.

net user A command used to display and change information about computer users.

NetBIOS (NetBT) A program through which older computer applications can communicate within a local area network (LAN ).

netiquette Politeness in email, text, forums, and other Internet-based interactions.

network A group of two or more computers.

Network Address Translation (NAT) A process used to convert private IPv4 addresses to Internet-routable IPv4 addresses.

Network and Sharing Center In Windows, a utility that allows an administrator to configure and review nearly all network settings on a computer.

network attached storage (NAS) A server that is connected to a network to provide file-level data storage to clients using a centralized storage location.

network components Devices such as wired and wireless network interface cards (NICs) and network devices such as switches, wireless access points (APs), routers, and multipurpose devices.

network design The way a network is set up and connected to other networks to support the needs of a business.

Network File Sharing A protocol that enables remote hosts to mount file systems over a network and interact with those file systems as though they are mounted locally.

Network File System (NFS) A network-based file system that allows file access over the network.

network installation A type of software installation in which installation files are stored on a server so that a client computer can access the files remotely to begin the installation.

network interface card (NIC) A device that provides a physical connection to a network using a network cable.

network maintenance policy A security policy item that specifies network device operating systems and end-user application update procedures.

network media The channel over which a message travels from source to destination across a network.

network port Also known as an RJ-45 or 8P8C, a port that has 8 pins and connects hardware devices to a network.

network printer mapping Allowing a user to print over a network without the need for a direct connection to the print device.

network requirements In a virtual computing environment, the type of network connections made depend on the type of virtual machine being used and how it needs to connect to the outside networks.

network service A service provided using the protocols agreed upon according to the type of service requested.

New Technology File System (NTFS) A file system that provides improved fault tolerance over traditional file systems and also provides file-level security.

NFC (Near Field Communication) Enables mobile devices to establish radio communications with other devices if the devices are close together or touching.

NFC devices and terminals A system in which tap-to-pay devices, such as credit cards or smartphones, are able to read and write to an NFC chip.

NFC payment A contactless payment that uses near field communication (NFC) technology to exchange data between readers and payment devices.

NFS (Network File System) A network-based file system that allows file access over a network.

NIC See network interface card (NIC).

NIST Special Publication 800-122 A publication that addresses PII.

No Authentication (Open) A wireless network setting in Windows that causes data to be sent unencrypted and with no authentication.

noise Interference, such as EMI or RFI, that causes unclean power and may cause errors in a computer system.

noncompliant system A system that has not been updated with operating system or application patches or that is missing antivirus and firewall security software.

nonparity memory The most common RAM used for home and business workstations, which does not check for errors in memory.

nonvolatile memory Memory whose contents are not erased when the computer is powered off.

Non-Volatile Memory Express (NVMe) A specification that was developed to allow computers to take greater advantage of the features of SSDs by providing a standard interface between SSDs, the PCIe bus, and operating systems.

Northbridge A chipset that controls high-speed access to the RAM and video card as well as the speed at which the CPU communicates with all the other components in the computer.

NOTEPAD A command that opens the Notepad basic text editor.

notification and system icons Icons on an Android device for the clock, battery status, and radio signal status for Wi-Fi and provider networks.

O

octa-core CPU A single CPU with eight cores inside it.

OLED See organic light-emitting diode (OLED).

on-demand (self-service) Describes a situation in which individuals can provision or make changes to computing services as needed without human interaction with the service provider.

one-time password (OTP) An authentication code that is sent to a previously registered email address or phone number for use in multifactor authentication.

Open Database Connectivity (ODBC) A technology that programs use to access a wide range of databases or data sources.

Open Graphics Library (OpenGL) A cross-platform standard specification for multimedia graphics.

open source Software for which users have access to the source code.

open source license A copyright license for software that allows developers to modify and share the source code that runs the software.

open-ended questions Questions that allow customers to explain the details of a problem in their own words.

operating system (OS) A software program that performs general system tasks, such as controlling RAM, prioritizing the processing, controlling input and output devices, and managing files.

operation and planning documents Proposals for future projects and project approvals, meeting presentations and minutes, and budgets and purchasing records.

operator In a programming language, a character that is used to make comparisons.

optical fiber A cable that is composed of two kinds of glass (core and cladding) and a protective outer shield (jacket).

optical fiber connector A connector that terminates the end of an optical fiber.

optical media Discs that are written and read by a laser.

optical storage device A peripheral computer component that can read CD-ROMs or other optical discs using a laser to store and retrieve saved data.

organic light-emitting diode (OLED) A technology that is commonly used for mobile devices and digital cameras but can also be found in some laptops. Whereas LCD and LED screens use backlights to illuminate their pixels, OLED pixels produce their own light.

orientation The direction of a display, which can be landscape, portrait, flipped landscape, or flipped portrait.

output device A hardware device that takes the data processed from input and passes on the information for use.

overclocking A technique used to make a processor work at a faster speed than its original specification.

P

pages per minute (PPM) The speed of a printer.

paper orientation The direction of a printout, which can be landscape or portrait.

parallel A wider data transfer path where multiple bits are sent together, as opposed to a serial data transfer path, where one bit follows another.

parallel bus A channel that sends multiple bits over multiple wires simultaneously.

parallel port A port that has a 25-pin receptacle and is used to connect various peripheral devices.

parity The error-checking bit in the type of RAID that provides basic error checking and fault tolerance.

parity memory Memory that contains 8 bits for data and 1 bit for error checking.

partition An area of a hard drive that can be formatted to store information, such as data files or applications.

passcode The PIN, password, pattern, or another passcode type used to unlock a mobile device.

password policy A security policy item that ensures passwords meet minimum requirements and are changed regularly.

patch A code update that a manufacturer provides to prevent a newly discovered virus or worm from making a successful attack.

patch panel An unpowered or powered device commonly used to collect incoming cable runs from the various networking devices throughout a facility.

Payment Card Industry (PCI) An organization formed in 2005 by the five major credit card companies in an effort to protect account numbers, expiration dates, and magnetic strip and chip data for transactions around the globe. The PCI Council partners with organizations, including NIST, to develop standards and security procedures around these transactions.

PCI Express (PCIe) An expansion standard that uses a serial bus that has higher throughput and many other improvements over the older expansion slots. PCIe has x1, x4, x8, and x16 slots, which vary in length from shortest to longest, respectively.

PCI Express micro card Memory card that has 54 pins and supports the same standards as mini-PCIe.

PCI-Extended (PCI-X) An updated version of PCI that operates up to four times faster than PCI but that has become mostly obsolete.

PCmover Express A tool for transferring selected files, folders, profiles, and applications from an old Windows PC to a Windows 10 PC.

peek To view Windows desktop icons that are behind open windows by placing your cursor over the Show desktop button at the right edge of the taskbar.

Performance Monitor A Windows administrative tool that can be used to create customized performance graphs and reports from a wide range of hardware and software components.

Peripheral Component Interconnect (PCI) A 32-bit or 64-bit expansion slot; PCI is becoming obsolete.

permissions Rules that limit folder or file access for an individual or for a group of users.

persistent data Data stored on a local drive, such as an internal or external hard drive, or an optical drive that is preserved when the computer is turned off.

personal area network (PAN) A network that connects devices, such as mice, keyboards, printers, smartphones, and tablets within the range of an individual person.

Personalize A setting that enables users to personalize the desktop and other aspects of the Windows GUI.

personally identifiable information (PII) Any data that could potentially identify a specific individual.

Phase 1: Network design recovery strategy A phase of a disaster recovery plan that involves analyzing the network design.

Phase 2: Inventory and documentation A phase of a disaster recovery plan in which you create an inventory of all locations, devices, vendors, used services, and contact names and verify cost estimates that are created in the risk assessment step.

Phase 3: Verification A phase of a disaster recovery plan in which you create a verification process to prove that the disaster recovery strategy works.

Phase 4: Approval and implementation A phase of a disaster recovery plan in which you obtain senior management approval and develop a budget to implement and maintain the disaster recovery plan.

Phase 5: Review A phase of a disaster recovery plan in which you review the plan and ensure that information in the plan is kept up to date to ensure that critical services will be restored in case of a disaster.

phishing An attack in which the attacker sends fraudulent email disguised as being from a legitimate, trusted source to trick the recipient into installing malware on a device or to share personal or financial information (such as a bank account number and access code).

physical security Security related to access to an organization’s premise, restricted areas, and computing and network infrastructure.

pickup rollers Parts in a printer that move a sheet of paper out of the tray or cassette and through the printer during the printing process.

piezoelectric Crystals that are located in the ink reservoir at the back of an inkjet printer’s nozzle. A charge is applied to the crystal, causing it to vibrate. This vibration of the crystal controls the flow of ink onto the paper.

pin grid array (PGA) An integrated circuit with pins on the underside that are inserted into the motherboard CPU socket using zero insertion force (ZIF).

ping A command used to test connections between computers that works by sending an ICMP echo request and receiving an ICMP echo reply message to confirm connectivity.

pinned application An application added to the Windows taskbar for easy access.

pixel A tiny dot capable of displaying the shades red, green, and blue (RGB). Abbreviation for picture element.

planning A step in the change management processes that defines activities and roles including evaluating the time necessary to implement, the downtimes, and the recovery process during the execute and control stage of a project.

platen A large roller in a dot matrix printer that applies pressure to keep the paper from slipping.

Platform as a Service (PaaS) A service in which a cloud provider provides access to operating systems, development tools, programming languages, and libraries used to develop, test, and deliver applications.

plenum-rated cable A cable made from a special plastic that retards fire and produces less smoke than other cable types.

policy documents Acceptable use policies, security policies, regulatory compliance policies, and disaster recovery policies.

POP3 See Post Office Protocol 3 (POP3).

pop-up A small window on a website that opens on top of another web browser window and it is often unwanted or annoying.

port An interface used to track various types of hardware and software communications.

Port Address Translation (PAT) A version of NAT that overloads the router-assigned public IP address.

port forwarding A rule-based method of directing traffic between devices on separate networks.

port number A numeric identifier used to keep track of a specific conversation. Every message that a host sends contains both a source port and destination port.

port triggering A process in which a router temporarily forwards data through inbound ports to a specific device when a designated port range is used to make an outbound request.

Post Office Protocol 3 (POP3) A protocol used by email clients to retrieve messages from an email server.

power button A physical button that turns a computer on or off.

power management A system that controls the flow of electricity to the components of a computer.

Power Options control panel A Windows Control Panel item that allows you to change the power consumption of certain devices or the entire computer.

power over Ethernet (PoE) A method for powering devices that do not have a battery or access to a power outlet.

power supply A critical component used to convert the current provided from an AC outlet into DC current usable by many parts inside a computer case.

power surge A dramatic increase in voltage above the normal flow of electrical current. A power surge lasts for a few nanoseconds.

power-on self-test (POST) The hardware check that the BIOS performs on the main components of the computer at boot.

PowerShell A powerful command line utility in Windows that offers many advanced features, such as scripting and automation.

Preboot Execution Environment (PXE) An environment that is used to boot the computer, connect to the network, and communicate with the server to begin the installation process when the client computer does not have an operating system installed.

Preferred Roaming List (PRL) A baseband update for mobile device radio firmware that includes configuration information that a cellular phone needs to communicate on networks other than its own so that a call can be made outside of the carrier’s network.

pretexting An attack in which the attacker pretends to need personal or financial data in order to confirm the identity of the recipient.

preventive maintenance Regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems.

preventive maintenance plan A plan that provides many benefits to users and organizations, such as decreased downtime, improved performance, improved reliability, and lower repair costs. Preventive maintenance plans should include detailed information about the maintenance of all computers and network equipment.

preventive maintenance program A detailed program that determines maintenance timing, the type of maintenance performed, and the specifics of how the maintenance plan is carried out.

primary partition A hard drive area that contains the operating system files and is usually the first partition.

Primary Rate ISDN (PRI) A baseband update for mobile device radio firmware that configures the data rates between a device and a cell tower to ensure that the device is able to communicate with the tower at the correct rate.

print bed In a 3D printer, the platform onto which the heated filament forms the object.

print head A core component in a printer that contains the nozzle that sprays ink onto a paper.

print job buffering A process in which a print job is captured in internal printer memory.

Print Management utility A Windows utility that provides a detailed view of all the printers that are available to a computer.

print server A server that enables multiple computer users to access a single printer, regardless of device or operating system.

print spool settings Settings that enable you to cancel or pause the current print jobs in the printer queue.

Print to File A Windows setting that enables you to save your data in a file with an extension such as .prn. Print to file can now save in other formats.

Print to Image A Windows setting that enables you to prevent others from easily copying the content in a document by printing to an image file format, such as JPG or TIFF.

Print to PDF A Windows setting that enables you to print to Portable Document Format (PDF) 8.

Print to XPS A Windows setting that enables you to print to the XML Paper Specification (XPS) format, which was meant to be an alternative to PDF.

printed circuit board (PCB) A circuit board that contains buses, or electrical pathways, that interconnect electronic components.

printer An output device that creates hard copies of files.

printer sharing The process of allowing multiple computers and devices connected to the same network to access one or more printers.

Private A network profile in Windows that allows the user to customize the sharing options. This profile is for use on trusted networks, and the PC is discoverable by other devices.

private key A key that is used with asymmetric key encryption and that is paired with a public key. Public and private keys are paired for secure communication, such as email. The private key is kept by an individual and must not be disclosed to any other party.

processing The printer process that involves converting data from the source into a printable form. The printer converts data from common languages, such as Adobe PostScript (PS) or HP Printer Command Language (PCL), to a bitmap image stored in the printer’s memory.

processor chip A collection of transistors interconnected by wires.

processor support Virtual computing requires more powerful hardware configurations because each installation needs its own resources. Virtual machines have the same basic system requirements, which includes CPUs specifically designed to support virtualization. The virtualization feature on these processors might need to be enabled.

Programs and Features control panel A Windows Control Panel item used to uninstall a program from a computer if you no longer use it or if you want to free up space on your hard disk.

program virus A virus that inserts itself in an executable program.

programmable read-only memory (PROM) A type of computer memory in which information on the chip is written after the chip is manufactured. Generally, these chips cannot be erased and can be programmed only once.

Programs A Windows Update category that allows changes to installed programs and Windows updates. Activation or deactivation of a wide range of Windows features can also be accessed here.

project document A document containing user requests for changes, updates, or new services; software design and functional requirements; logical and physical network topology diagrams; or change management forms.

proprietary or vendor-specific cables Cables used with some mobile devices that are not compatible with other vendor ports but often are compatible with other products from the same vendor.

protected health information (PHI) A form of PII that includes patient names, addresses, dates of visits, telephone and fax numbers, and email addresses and that needs to be secured and protected.

protocol A standard set of rules that defines how devices on a network communicate with one another.

proxy server A computer system that has the authority to act as another computer to function as a relay between a client and a server.

proxy Trojan Malware that uses the victim’s computer as the source device to launch attacks and perform other illegal activities.

PS/2 port A 6-pin connector used for connecting a keyboard and mouse.

Public A network profile in Windows that disables file and printer sharing and network discovery on the link. The PC is hidden from other devices.

public key A key that is used with asymmetric key encryption and paired with a private key. Public and private keys are paired for secure communication, such as email. The public key can be widely distributed and used to encrypt messages.

public key authentication A type of authentication that provides additional protection over host-based authentication. The user must enter a passphrase to access the private key. This helps prevent the private key from being compromised.

Public Network A network location profile in HomeGroup in which the HomeGroup is not available.

punchdown tool A tool used to terminate wire into termination blocks.

Python An interpreted, object-oriented, high-level language.

Q–R

quad core CPU A CPU with four cores inside it.

quality of service (QoS) Refers to technology that manages prioritization of certain data traffic to reduce packet loss, latency, and jitter on the network.

quick format A disk formatting option that removes files from the partition but does not scan the disk for bad sectors.

Radio Corporation of America (RCA) A type of connector that has a central plug with a ring around it and that is used to carry audio or video. RCA connectors are often found in groups of three, where a yellow connector carries video and red and white connectors carry left and right audio channels.

RADIUS Remote Authentication Dial-in User Service, an AAA server that performs the authentication on behalf of network devices. The network devices do not store and validate user credentials directly but instead pass the request to the AAA server and forward the response to the user.

rail The printed circuit board (PCB) inside a power supply to which external cables are connected.

random-access memory (RAM) Temporary working storage for data and programs being accessed by the CPU. Unlike ROM, RAM is volatile memory, which means the contents are erased every time the computer is powered off.

ransomware Malware that typically denies a user access to his or her files by encrypting the files and then displaying a message demanding a ransom for the decryption key.

rapid elasticity A term that refers to services that can be provisioned when needed and then released very quickly when no longer required.

rd A command used to delete a directory.

RDP Remote Desktop Protocol, a desktop protocol developed by Microsoft to provide remote access to the graphical desktop of a remote machine.

Read A Windows permission available for files and folders that allows users to see the contents of a folder and open files and folders.

Read and Execute A Windows permission that allows users to see the contents of existing files and folders and but not create new files or folders.

read-only memory (ROM) Nonvolatile memory located on the motherboard and other circuit boards that contains instructions that can be directly accessed by a CPU.

reconnaissance The phase of an attack in which the attacker attempts to learn as much about the target network as possible.

recovery partition A section of a disk that is inaccessible to the user and contains an image that can be used to restore the computer to its original configuration.

Reduced Instruction Set Computer (RISC) A CPU architecture that uses a small set of instructions and executes them very rapidly.

Redundant Array of Independent Disks (RAID) A scheme that provides a way to store data across multiple hard disks for redundancy.

refresh rate The number of times per second an image on a monitor is rebuilt. A higher refresh rate produces a better image.

regedit A tool that enables an administrator to view or make changes to the Windows Registry.

Region control panel A Windows Control Panel item that allows you to change the format of numbers, currencies, dates, and times.

Registry Editor (regedit) A Windows tool that allows an administrator to view or make changes to the Registry.

regulatory and compliance policy A policy that specifies what data must be collected and how long it must be retained.

relational operators In most programming languages, the operators used to make mathematical comparisons.

Remote A tab used in Windows to adjust settings for Remote Assistance and Remote Desktop and allow other people to connect to a computer to view or work on it.

remote access policy A security policy item that identifies how remote users can access a network and what is accessible via remote connectivity.

remote-access Trojan Malware that includes a backdoor for administrative control over the target computer.

remote authentication In a wireless network, authentication provided by a scalable authentication architecture using RADIUS or Terminal Controller Access Control System Plus (TACACS+).

remote backup A copy of a device’s data that is stored in the cloud or network location.

Remote Installation Services (RIS) A Microsoft server that is used to communicate with the client, store the setup files, and provide the necessary instructions for the client to access the setup files, download them, and begin the operating system installation.

remote lock A tool that allows you to lock a mobile device with a passcode so others cannot gain access to the data in the device.

remote wipe A tool that deletes all data from a mobile device and returns it to a factory state.

ren A command used to rename a directory or file.

repair log A log that helps you determine which equipment is the most or least reliable. It also provides a history of when a computer was last fixed, how it was fixed, and what the problem was.

repeater A device that regenerates weak signals and extends the distance a signal can travel.

replay A type of spoofing attack in which the attacker captures an authenticated packet and alters the packet’s contents and sends the packet to its original destination with the goal of the target host accepting the altered packet as authentic.

Reset button A button that restarts a computer without turning it off; not all devices have one.

resistance Opposition to the flow of current in a circuit.

resolution The number of horizontal and vertical pixels in a monitor.

resource pooling A process in which a provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model. The tenants (that is, customers) share the different physical and virtual resources that are dynamically assigned and reassigned according to consumer demand.

response time The amount of time it takes for a pixel to change properties (such as color or brightness).

restore point A snapshot that contains information about a computer’s operating system, installed programs, and Registry settings.

restrictions on failed login attempts Limitations on the failed login attempts to lock out a user who enters the wrong password more than a specified number of times.

RFID Radio frequency identification, a form of wireless communication that uses the frequencies in the 125 MHz to 960 MHz range to uniquely identify items.

RG-6 Heavy-gauge cable that has insulation and shielding and is tuned for high-bandwidth, high-frequency applications such as Internet, cable TV, and satellite TV signals.

RG-59 A thinner cable that is recommended for low-bandwidth and lower-frequency applications such as analog video and CCTV applications.

riser card A card that can be added to a computer to provide additional expansion slots for more expansion cards.

RJ-11 connector An interface used to connect a computer to a standard telephone line.

RJ-45 connector A standardized physical network interface for connecting telecommunications or data equipment. The most common twisted-pair connector is an 8-position, 8-contact (8P8C) modular plug and jack.

robocopy A command used to copy files or entire directory trees; Microsoft recommends using robocopy instead of xcopy.

roll back a driver To use Device Manager to change the currently installed driver to the previously installed driver.

rollers In an inkjet print, devices that pull in paper from the feeder.

ROM See read-only memory (ROM).

rooting A process used on Android devices to gain privileged or root-level access for modifying code or installing software that is not intended for the device.

rootkit Malware used by cybercriminals to gain administrator account–level access to a computer.

router A network layer device that forwards data packets between networks. Routers use IP addresses to forward traffic to other networks.

RSA The most popular example of asymmetric encryption.

S

S0 state A state in which the computer is on and the CPU is running.

S1 state A state in which the CPU and RAM are still receiving power, but unused devices are powered down.

S2 state A state in which the CPU is off, but the RAM is refreshed. The system is in a lower mode than S1.

S3 state A state in which the CPU is off, and the RAM is set to a slow refresh rate. This mode is often called “save to RAM,” and this state is known as suspend mode.

S4 state A state in which the CPU and RAM are off. The contents of RAM have been saved to a temporary file on the hard disk. This mode is also called “save to disk,” and state is known as hibernate mode.

S5 state A state in which the computer is off.

Safe mode A diagnostic mode used to troubleshoot Windows and Windows startup issues. Functionality is limited as many device drivers are not loaded.

Safe Mode with Command Prompt An option that starts Windows and loads the command prompt instead of the GUI.

Safe Mode with Networking An option that starts Windows in Safe mode with networking support.

safety data sheet (SDS) A fact sheet that summarizes information about material identification, including hazardous ingredients that can affect personal health, fire hazards, and first-aid requirements.

sandbox A location in an OS that keeps code isolated from other resources and other code.

SATA Serial AT Attachment, a standard that defines the way data is transferred, the transfer rates, and physical characteristics of the cables and connectors.

SATA data cable A 7-pin data cable that connects SATA devices to the SATA interface. This cable does not supply any power to the SATA device; a separate power cable provides power to the drive.

satellite A connection that uses a satellite dish for two-way communication. The dish transmits and receives signals to and from a satellite that relays these signals back to a service provider.

screen calibration A process that involves adjusting the colors, brightness, and other settings for a screen.

screen orientation The direction of a mobile device screen, which can be either portrait or landscape. A sensor inside the device, known as an accelerometer, detects how the device is being held and changes the screen orientation appropriately.

screen resolution The number of pixels in a screen. A higher number of pixels provides better resolution.

screen size The diagonal measurement of a screen (such as from the top left to the bottom right), typically expressed in inches.

script file A simple text file written in a scripting language to automate processes and tasks on an operating system.

script virus A virus that attacks the OS interpreter, which is used to execute scripts.

scripting language A language that differs from a compiled language in that each line is interpreted and then executed when the script is run.

secpol.msc A Windows administrative tool used to open Local Security Policy. It can be used to enforce security settings on the local computer.

secure boot A UEFI security standard that ensures that the system firmware stops any digitally unsigned drivers from loading and also helps stop malicious software.

Secure Digital (SD) card An ultra-small Flash memory card designed for use in portable devices such as cameras, MP3 players, and laptops to provide high-capacity memory in a small form factor.

Secure Hash Algorithm (SHA) A popular hashing algorithm that uses a mathematical function to create a numeric value, called a message digest, that is unique to the data.

Secure Shell (SSH) A TCP protocol that provides strong authentication and encrypted data transport between a client and a remote computer.

Secure Sockets Layer (SSL) A protocol developed to establish authenticated and encrypted links between networked computers. Developed for sending information securely over the Internet.

security credentials manager An entity that manages usernames, passwords, digital certificates, and encryption keys so that applications and other services can request and utilize those credentials.

security policy A set of security objectives to ensure the security of a network, the data, and the computers in an organization.

security software disabler Trojan Malware that stops antivirus programs or firewalls from functioning.

Serial AT Attachment (SATA) See SATA.

serial bus A channel that sends a bit at a time at a much faster rate than would a parallel bus.

serial port A port that has a 9-pin DB-9 port or a 25-pin port and is used to connect various peripheral devices.

server A host that provides services. A server requires server software in order to provide specific application services to the network.

server virtualization A process that involves creating virtual instances of servers on a single physical server and taking advantage of idle resources to reduce the number of servers required to provide services to users.

service pack An update distributed by a manufacturer that combines patches and upgrades.

service set identifier (SSID) The name of a wireless network.

service-level agreement (SLA) A contract that defines expectations between an organization and a service vendor to provide an agreed-upon level of support.

Services A tab in Windows System Configuration that is used to display a list of services that are started with the operating system. Allows services running on the computer to be enabled or disabled and can be used to prevent individual services from being loaded on boot for troubleshooting purposes.

Services console (SERVICES.MSC) A Windows console that allows you to manage all the services on your computer and remote computers.

Settings app A Windows 10 app that can be used to configure the operating system. From it you can access many system settings.

Setup.exe The Windows installation program, which can perform an in-place upgrade and automatically preserve all data, settings, applications, and drivers from the existing operating system version or a clean Windows OS installation.

sfc A command used to verify and repair Windows system files.

shake A feature in Windows 7, 8, 8.1, and 10 that enables a user to minimize all windows that are not being used by clicking and holding the title bar of one window and shaking it with the mouse. Repeat the action to maximize all of the windows.

shielded twisted-pair (STP) A two-pair wiring medium used primarily with Token Ring networks. STP cabling has a layer of shielded insulation to reduce electromagnetic interference (EMI).

shoulder surfing An in-person type of attack in which an attacker inconspicuously looks over someone’s shoulder to steal passwords or other information.

shutdown A command used to power off a local or remote computer.

signature file A file that contains a sample of the code used by viruses and malware.

signature pad A device that electronically captures a person’s signature.

SIM card A small card that contains information used to authenticate a device to mobile telephone and data providers. The card can also hold user data, such as personal contacts and text messages.

Simple Mail Transfer Protocol (SMTP) A protocol used to send email from clients to an email server. It may also be used to relay email messages from the source to destination email servers.

single channel Memory slots on a motherboard where all the RAM slots are addressed at the same time.

single core CPU A single CPU that contains one core that handles all the processing.

Single Inline Memory Module (SIMM) A small circuit board that holds several memory chips. SIMMs have 30-pin or 72-pin configurations.

single-mode fiber (SMF) Fiber-optic cable that consists of a very small core and uses laser technology to send a single ray of light in data transmission.

single rail A power supply that has all the connectors connected to the same printed circuit board (PCB).

single point of failure A point in a network where there are no backup servers to handle the failure.

single sign-on (SSO) A type of authentication that enables users to log in once to access all system resources rather than logging in each time they need to access an individual resource.

Siri A digital assistant program for iOS that can understand natural conversational language and perform tasks for the end user. A special software that understands advanced voice controls.

Sleep A Windows power option setting that allows a computer to power on quickly but uses power to retain the information in RAM.

SLP Service Location Protocol, a protocol that allows computers and other devices to locate services on a LAN without previous configuration.

Small Computer Systems Interface (SCSI) A standard for connecting peripheral and storage devices. It is a bus technology, meaning that all devices connect to a central bus and are daisy-chained together.

small outline DIMM (SODIMM) A smaller-profile memory module used by most laptops.

smart card A card that is similar to a credit card but has an embedded microprocessor that can be loaded with data.

smart card reader An input device that is typically used on a computer to authenticate the user.

smartphone A device that is very compact and quite powerful and that runs a special operating system designed for mobile devices. Smartphones use cellular connectivity options for voice, text, and data services.

SmartScreen Filter A Windows web filtering capability that detects phishing websites, analyzes websites for suspicious items, and checks downloads against a list that contains sites and files that are known to be malicious.

smartwatch A type of wearable that includes a microprocessor, a special operating system, and apps. Sensors in the smartwatch can gather data about various aspects of the body, such as heart rate, and use Bluetooth to report this information to another device, such as a smartphone.

SMB/CIFS Protocols that allow for sharing of files, printers, and other resources between nodes on a network. CIFS is a dialect of SMB.

snap To resize a window by dragging it to one of the edges of the screen.

SNMP Simple Network Management Protocol, a protocol that enables network administrators to monitor network operations from centralized monitoring stations.

social engineering An access attack in which the attacker attempts to manipulate individuals into performing actions or divulging confidential information.

socket A connector on the motherboard that houses a CPU and forms the electrical interface and contact with the CPU.

SODIMM See small outline DIMM (SODIMM).

software The operating system and programs that run on a computer system.

Software as a Service (SaaS) A service in which a cloud provider provides access to services, such as email, calendar, communication, and office tools over the Internet on a subscription basis.

software firewall A program that provides firewall services on a computer to allow or deny traffic to the computer. It applies a set of rules to data transmissions through inspection and filtering of data packets.

software license A contract that outlines the legal use or redistribution of software.

solid-state drive (SSD) A drive that stores data as electrical charges in semiconductor Flash memory. It has no moving parts, makes no noise, is energy efficient, and produces less heat than an HDD.

solid-state hybrid drive (SSHD) A compromise between a magnetic HDD and an SSD that combines a magnetic HDD with onboard Flash memory serving as a nonvolatile cache.

something for something Sometimes called quid pro quo, a social engineering attack in which an attacker requests personal information from a party in exchange for something such as a free gift.

sound adapter An adapter card used to provide audio capability.

sound card A device that provides audio capability in a computer.

Sound control panel The Windows Control Panel item for configuring audio devices or changing the sound scheme of a computer.

source code A sequence of instructions that is written in human-readable language before it is turned into machine language (zeros and ones).

source port number The number associated with the originating application on the local device.

Southbridge A chipset that enables the CPU to communicate with slower-speed devices including hard drives, Universal Serial Bus (USB) ports, and expansion slots.

spam Also known as junk mail, unsolicited email that often contains harmful links, malware, or deceptive content.

spear phishing An attack in which the attacker creates a targeted phishing attack tailored specifically for an individual or organization.

spike A sudden increase in voltage that lasts for a short period and exceeds 100% of the normal voltage on a line. Spikes can be caused by lightning strikes but can also occur when the electrical system comes back on after a blackout.

spoofing An attack in which the attacker forges IP addresses.

spyware Malware that is similar to adware but that is used to gather information about the user and send it to cybercriminals without the user’s consent.

SSH See Secure Shell (SSH)

SSH File Transfer Protocol (SFTP) An extension to Secure Shell (SSH) protocol that can be used to establish a secure file transfer session.

standard formatting A type of disk formatting that involves creating a boot sector and a file system. Standard formatting can only be performed after low-level formatting has been completed.

Standard User account A Microsoft user account that allows limited control over a computer. Users with this type of account can run applications but cannot install programs.

standby power supply (SPS) A battery backup that is enabled when voltage levels fall below normal.

standoffs Non-metallic spacers that provide space between the motherboard and the case to keep it from grounding and short-circuiting.

Start menu In Windows, the primary place to locate all the applications installed on the computer, a list of recently opened documents, and a list of other elements, such as the search feature, Help and Support, and Control Panel.

Startup A tab in Windows System Configuration that is used to display a list of all the applications that run automatically when Windows starts.

stateful packet inspection (SPI) A firewall technology that keeps track of the state of network connections traveling through the firewall.

static IP address An IP address that is manually configured on a device.

static RAM (SRAM) Memory that is usually used for cache that uses little power and is much faster than dynamic RAM.

storage In virtual computing, more powerful hardware configurations may be necessary; therefore, large and fast drives for storage on each VM are needed to contain very large files such as operating systems, applications, and all the VM data.

storage controller A device that allows for the expansion of internal and external drives for a computer system and that can be integrated or added as an expansion card.

Storage Spaces A technology that became available in Windows 8 and 10 that can be configured from a Control Panel item. It is the disk array technology that is recommended by Windows that creates pools of physical hard drives from which virtual disks (storage spaces) can be created.

strengthening material Material that prevents a fiber-optic cable from being stretched when it is being pulled. The material used is often the same material used to produce bulletproof vests.

striping A RAID method that involves writing data across multiple drives.

stylus A handheld pen-like tool used to convert analog signals into digital signals to input commands to a computer screen, mobile device, or graphics tablet.

subdirectory A directory that is located within another directory.

subfolder A folder that is located within another folder.

subnet mask A number used to separate the IP address into the network and host addresses. It masks the network part of the system’s IP address and leaves the host portion to identify the device is that is connected to the network.

subscriber connector (SC) A fiber-optic connector sometimes referred to as square connector or standard connector that uses a push/pull mechanism to ensure positive insertion. This connector type is used with multimode and single-mode fiber.

Success Audit (security only) A message indicating that a Microsoft Event Viewer security event has been successful. For example, a successful logon from a user triggers an event with this level.

supervisor password When configured, this password prevents access to a BIOS setup utility for preventing changing BIOS settings in the future.

surge protector A device that helps protect against damage from electrical surges and spikes.

SVGA (Super Video Graphics Array) A display standard introduced in 1989 that is still supported on some platforms.

swap partition An area used by an operating system to supplement system RAM.

Swift A programming language used with Apple’s Software Development Kit (SDK) Xcode to create apps for iOS devices.

switch A device that microsegments a LAN and that connects multiple devices on a network by receiving data and using filtering and forwarding to send the data to the intended destination device.

symmetric encryption Encryption that ensures the confidentiality of a message by requiring both sides of an encrypted conversation to use an encryption key to encode and decode the data. The sender and receiver must use identical keys.

SYN flood A type of DoS attack that exploits the TCP three-way handshake. The attacker sends continuous false SYN requests to the target. The target is eventually overwhelmed and unable to establish valid SYN requests, creating a DoS attack.

Sync A setting that copies new apps, music, video, or books from iTunes to your phone and from your phone to iTunes, resulting in full synchronization on both devices.

Sync Center A Windows utility that allows files to be edited from multiple Windows devices.

Sync over Wi-Fi A setting that enables iTunes to scan and connect to iOS on the same Wi-Fi network.

synchronous dynamic RAM (SDRAM) RAM that operates in synchronization with the memory bus.

syslog A protocol that allows networking devices to send their system messages across the network to syslog servers.

System and Security control panel A Windows Control Panel item that enables viewing and configuration of security settings such as Windows Defender Firewall, and also access to administrative tools that enable configuration of a wide range of system functions, such as general hardware, storage, and encryption settings, and operations.

System Center Configuration Manager (Configuration Manager) A Windows utility that can be used to automate the process of upgrading Windows 7 or Windows 8.1 to Windows 10. It updates the operating system and migrates apps and settings to the new OS.

System Configuration (MSCONFIG) A tool used to identify problems that keep Windows from starting correctly.

System control panel A Windows Control Panel item that allows all users to view basic system information, access tools, and configure advanced system settings.

System Image Manager (SIM) A utility used to create the setup answer file when customizing a standard Windows 10 installation.

System Information A tool used to collect and display information about local and remote computers. It is designed to quickly find information about software, drivers, hardware configurations, and computer components.

system panel connectors The places where the hard disk drive activity lights, case speaker, reset button, power on/off button, computer power on light, and key lock, are connected.

System Protection The Windows tab to access System Restore, which returns a computer to an earlier configuration and allows you to configure settings to enable system restore points and the amount of disk space that is used for them.

System Restore utility A Windows tool that allows you to restore a computer to a previous configuration if restore points have been set.

system speaker A motherboard speaker that indicates the computer’s status during the POST.

T

T568A and T568B Wiring schemes that define the pinout, or order of wire connections, on the end of each cable.

tablet A mobile device that is similar to a smartphone and uses a special mobile operating system such as Android or iOS.

tailgating An in-person attack in which an attacker quickly follows an authorized person into a secure location to gain access to the secure area.

tape drive A drive that uses a magnetic read/write head and removable tape cartridges for archiving data.

Task Manager A Windows utility that provides a high level of information about how a system is operating, including displaying what programs are running on the computer, the overall resource usage, and detailed statistics about each process.

taskbar An element of an operating system’s GUI typically located at the bottom of the screen. It enables users to locate and launch programs or view any program that is currently open.

taskkill A command used to kill a running process.

tasklist A command used to display a list of the processes that are currently running on the local computer or on a remote computer.

TCP Transmission Control Protocol, a reliable, full-featured transport layer protocol which ensures that all of the data arrives at the destination.

TCP/IP model A model that consists of layers that perform functions necessary to prepare data for transmission over a network.

Telnet An insecure remote access protocol that provides a command line on a remote computer.

Terminal Controller Access Control System Plus (TACACS+) A remote authentication AAA server that performs authentication on behalf of network devices. Rather than the network devices storing and validating user credentials directly, they pass the request to the AAA server and forward the response to the user.

tether To use a smartphone to share its cellular data connection with other devices.

tethering Connecting a mobile device to another mobile device or computer to share a network connection.

TFTP Trivial File Transfer Protocol, a protocol used to transfer files between computers that utilizes less overhead than FTP, is used for transferring small amounts of data, and does not need authentication for communication.

thermal printer A printer in which a pulse of electrical current is applied to heating chambers around the nozzles to create a bubble of steam in the chamber. The steam forces ink out through the nozzle and onto the paper.

thermal compound A material that increases the efficiency of heat transfer from the CPU to the heat sink by filling any tiny gaps between the two.

thick client Sometimes called a fat client, a system that has its own operating system, applications, and local storage, where all of the processing is performed locally on the computer.

thin client A low-end network computer that relies on remote servers to perform all data processing.

thumbnail preview A thumbnail image of a running program that is viewed by hovering the mouse over the program icon on the taskbar.

Thunderbolt card A card that allows for high-speed connection of peripherals such as hard drives, RAID arrays, and network interfaces and that can transmit high-definition video using the DisplayPort protocol.

tiles Interactive apps on a Windows 8 Start screen that provide dynamic information and quick updates about apps without the need to launch the applications.

Time Machine A backup tool included with macOS.

token-based lock A type of secure lock that is unlocked by swiping a secure card or by using a proximity reader to detect a smart card or a wireless key fob.

tone generator and probe A two-part tool used to trace the remote end of a cable for testing and troubleshooting. The tone generator applies a tone to the wire to be tested.

toner A negatively charged combination of plastic and metal particles that is used in laser printers.

Tools A tab in Microsoft System Configuration that is used to display a compact and very comprehensive list of diagnostic tools that can be run to help with troubleshooting.

total cost of ownership (TCO) A financial estimate intended to help determine the direct and indirect costs of a device such as a printer.

touchscreen A special glass piece attached to the front of a screen, known as a digitizer, that converts touch actions (press, swipe, and so on) into digital signals that are processed by the laptop or tablet.

tractor feed Continuous-feed paper that most dot matrix printers use that has perforations between sheets and perforated strips on the sides that are used to feed the paper and to prevent skewing or shifting.

transfer roller A device in a laser printer that assists in transferring toner from the imaging drum to the paper.

transferring A laser printer process in which toner, attached to the image, is transferred to paper.

transistor A semiconductor whose state changes from on to off or off to on, generating a small amount of heat. The amount of heat generated increases as the speed of the processor increases. When the processor becomes too hot, it begins to produce errors.

triple core CPU A single CPU with three cores inside it. This is a quad-core processor with one of the cores disabled.

Triple Data Encryption (3DES) algorithm A legacy symmetric encryption method.

Trojan horse A program that looks useful but that carries malicious code.

troubleshooting The systematic process used to locate the cause of a fault in a computer system and correct the relevant hardware and software issues.

Troubleshooting control panel A Windows Control Panel item that has a number of built-in scripts that are used to identify and solve common problems with many Windows components.

troubleshooting process steps A systematic approach that includes identifying the problem, establishing a theory of probable cause, testing the theory to determine the cause, establishing a plan of action, verifying full system functionality, and documentation.

trusted app source An app that is authenticated and authorized by a service provider. The service provider issues the developer a certificate to use to sign its apps and identify them as trusted.

Trusted Platform Module (TPM) A specialized chip installed on a motherboard and designed to secure hardware by storing encryption keys, digital certificates, passwords, and data.

TV tuner card A card that provides the ability to watch and record television signals on a PC by connecting a cable television, satellite, or antenna to the installed tuner card.

twisted-pair A pair of insulated wires wrapped together in a regular spiral pattern to control the effects of electrical noise.

type A command used to display the contents of a file.

Type 1 (native) hypervisor A bare-metal hypervisor typically used with server virtualization that runs directly on the hardware of a host and manages the allocation of system resources to virtual operating systems.

Type 2 (hosted) hypervisor A hypervisor hosted by an OS that is commonly used with client-side virtualization.

U

Ubuntu A distribution (distro) of Linux.

UDP User Datagram Protocol, a very simple transport layer protocol that does not provide for any reliability.

unattended See unattended installation.

unattended installation An installation method in which no prompts or other information is displayed. It is based on an answer file that contains simple text that instructs Windows Setup how to configure and install the OS.

unattended.bat file A Windows file used on a client machine to prepare the hard drive and install the OS from the server over the network.

unbuffered memory Conventional memory in a computer. The computer reads data directly from the memory banks, making it faster than buffered memory.

Unified Extensible Firmware Interface (UEFI) A newer type of BIOS that has many advantages, including a GUI that is user friendly compared to older BIOS versions, the ability to recognize larger hard drives, and a built-in feature called secure boot.

unified threat management (UTM) A generic name for an all-in-one security appliance. UTMs include all the functionality of an IDS/IPS as well as stateful firewall services.

Uninstall a Driver In Windows Device Manager, an option to remove a driver.

uninterruptible power supply (UPS) A device that helps protect against potential electrical power problems by supplying a consistent level of electrical power to a computer or other device. The battery is constantly recharging while the UPS is in use. The UPS provides a consistent quality of power when brownouts and blackouts occur.

Universal Plug and Play (UPnP) A protocol that enables devices to dynamically add themselves to a network without the need for user intervention or configuration.

Universal Serial Bus (USB) A standard interface that connects peripheral devices to a computer; these devices are hot swappable, which means users can connect and disconnect the devices while the computer is powered on.

Universal Serial Bus (USB) controller card A card that provides additional USB ports to connect a computer to peripheral devices.

Unix A proprietary operating system written in the C programming language.

unshielded twisted-pair (UTP) A four-pair wire medium used in a variety of networks. UTP is rated in categories, with higher categories providing the best performance and highest bandwidth.

up-arrow keys A Windows CLI shortcut that moves through the previously entered commands.

Update a Driver Windows Device Manager option to change the currently installed driver.

update A new, improved, or fixed version of software that replaces older versions of the same software.

USB See Universal Serial Bus (USB).

USB 3.0 motherboard connector A connector that allows the connection of a USB 3.0 module for additional USB 3.0 front or rear panel ports.

USB 3.1 motherboard connector Also known as a USB header, a group of pins on a motherboard that allows the connection of a USB 3.1 module for additional USB 3.1 front or rear panel ports.

USB mini-B A connector form factor that is rectangular with small indentations on each side and that is replacing the mini-USB form factor.

USB Type-A A rectangular connector found on virtually every desktop PC and laptop, as well as TVs, game consoles, and media players.

USB Type-B A connector form factor that is commonly used to connect printer and external hard drives. It has a square shape with beveled exterior corners and an extra notch at the top.

USB Type-C A connector form factor that is smaller than the Type-A connector and is rectangular with four rounded corners.

USB-C cable A cable that can be plugged in in either direction and that is used with mobile devices to connect to an electrical outlet charger or to connect to another device, such as when connecting a smartphone to a laptop in order to charge and/or transfer data.

User Account Control (UAC) A Windows utility that monitors programs on the computer and warns users when actions might present threats to the computer.

User Accounts A category that enables administration of Windows user accounts and User Account Control (UAC).

user documentation Documentation such as searchable knowledge base articles and FAQs, end-user manuals for hardware and software, and help desk ticket databases with ticket resolutions.

user interface The interface a user uses to interact with software and hardware.

user password A password that provides access to the BIOS based on a defined level such as full access, limited access, view only access, and no access.

User State Migration Tool (USMT) A command line utility developed by Microsoft that allows users who are comfortable with scripting languages to transfer files and settings between Windows PCs.

Users A Windows group whose users have permissions that allow them to perform common tasks such as running applications and accessing local or network printers. A user profile is created and persists on the system.

V

variable A designated place to store information within a computer. A primary function of computers is to manipulate variables.

VBScript Windows Visual Basic Scripting Edition, a scripting language developed by Microsoft.

VGA (Video Graphics Array) A connector for analog video that has 3 rows and 15 pins.

video adapter A device that provides video capability.

video port A port for connecting a monitor cable to a computer.

view only access One of the common levels of user access to BIOS, where all screens are available but no settings can be changed.

virtual assistant A program that can understand natural conversational language and perform tasks for the end user.

virtual desktop infrastructure (VDI) A technology that allows users to log in to a server to access their own virtual computers. Input from the mouse and keyboard is sent to the server to manipulate the virtual computer.

virtual LAN (VLAN) A broadcast domain that is created on a single switch as if it were multiple switches and groups a collection of devices from different LANs.

virtual machine (VM) A software program or operating system that acts like a separate computer and is capable of performing tasks such as running applications and programs as if it were a separate computer. VMs share the resources of the host computer, and virtualization software separates the actual physical hardware.

virtual machine manager (VMM) Another name for a hypervisor, software used on the host computer to create and manage VMs.

virtual memory An area on the hard drive that can be used when a computer does not have enough RAM available to run a program.

virtual printer Software on a computer that has an interface similar to a print driver that is coded to send the output to other applications rather than to a physical device.

virtual private network (VPN) A network used to securely connect to another network over an insecure network, such as the Internet.

virtual reality (VR) Computer technology that creates a simulated, three-dimensional environment that a user feels immersed in and can manipulate.

virtual reality headset A head-mounted device that provides a separate image for each eye and that typically includes head-motion and eye-motion tracking sensors. These devices are also output devices that deliver video and audio to the wearer.

virtualization A technology that enables a single computer to host multiple independent virtual computers that share the host computer hardware.

virus Malware that requires human action to propagate and infect other computers.

volatile data Data that disappears as soon as the computer is turned off.

volatile memory Memory whose contents are erased every time the computer is powered off.

voltage A measurement of the work required to move a charge from one location to another. Voltage is measured in volts (V). A computer power supply usually produces several different voltages.

voltage selector switch A physical switch used to set the input voltage on a power supply to either 110V/115V or 220V/230V.

Volume Boot Record (VBR) A sector that loads the boot manager, which for Windows is bootmgr.exe.

VPN See virtual private network (VPN).

W

Wake on LAN (WOL) A setting used to wake up a networked computer from a very low power mode state. Very low power mode means that the computer is turned off but is still connected to a power source. To support WOL, the computer must have an ATX-compatible power supply and a WOL-compatible NIC.

Warning A Windows Event Viewer message type that indicates a potential problem with a software component not functioning ideally.

water cooling system A system in which a metal plate is placed over the processor, and water is pumped over the top to collect the heat that the processor generates. The water is pumped to a radiator to disperse the heat into the air, and the water is then recirculated.

watt (W) A measure of the pressure required to push electrons through a circuit (voltage), multiplied by the number of electrons going through that circuit (current). Computer power supplies are rated in watts.

wearable A smart device that is meant to be worn on the body or attached to clothing.

Web Security Appliance A Cisco-proprietary device that filters known and suspicious Internet malware sites.

web server A server that provides web resources requested by a client using HTTP or HTTPS.

webcam A video camera that is either embedded into the display on a mobile device or connected externally to a computer, often used for video conferencing or to stream live video onto the Internet.

while loop A statement that checks a variable to verify whether it is true (or false) before repeating a section of code. This is known as a pre-test loop.

whitelist A list that specifies which IP addresses are allowed on a network.

whoami A command that displays the name of the computer on which the prompt is open and the user account.

wide area network (WAN) A network that connects multiple networks in geographically separated locations, with access contracted from a service provider.

Wi-Fi A technology that makes use of radio waves in order to provide high-speed connections to users on a local area network (LAN) and that usually has no limit for the amount of data.

Wi-Fi analyzer A mobile tool for auditing and troubleshooting wireless networks.

Wi-Fi antenna A device that transmits and receives data carried over radio waves.

Wi-Fi calling A technology by which modern smartphones use the Internet to transport voice calls by taking advantage of a local Wi-Fi hotspot.

Wi-Fi Protected Access (WPA) A wireless network setting that uses Pre-Shared Key.

Win+R In the CLI, a key combination that opens a run box.

Windows 7 A version of Windows that can be installed as an upgrade from Windows XP or Vista.

Windows 8 A version of Windows that introduced the Metro user interface, which unifies the Windows look and feel on desktops, laptops, mobiles phones, and tablets.

Windows 8.1 An update for Windows 8 that includes improvements to make Windows more familiar for the users with devices that use touch or mouse and keyboard interfaces.

Windows 10 The version of Windows that became available in July 2015. Nine editions of Windows 10 are currently offered.

Windows 10 Mobile A Microsoft user interface that uses code on all Microsoft devices. This includes Windows 10 Mobile phones and tablets.

Windows Advanced Boot Options A boot screen that lets a user start Windows in advanced troubleshooting modes. The menu can be accessed by turning on your computer and pressing the F8 key before Windows starts.

Windows Advanced Startup Options A menu that provides a selectable list of Windows startup modes and troubleshooting tools.

Windows API An API that provides application developers with user interface controls and file management and graphical elements, such as windows, scroll bars, and dialog boxes.

Windows apps Apps that are distributed through the Microsoft Store.

Windows Automated Installation Kit (AIK) A collection of tools and technologies designed to help deploy Microsoft Windows operating system images.

Windows Defender The antivirus functionality included directly in the Windows OS.

Windows Easy Transfer A tool available to transfer data and settings from an old Windows computer to a new one.

Windows Firewall A software firewall that helps prevent cybercriminals and malware from gaining access to a computer. It is installed by default when the Windows OS is installed.

Windows Malicious Software Removal Tool A tool that checks a computer for malicious software.

Windows Media Center A Microsoft app that allows a computer to be used as a home entertainment appliance for playing DVDs.

Windows Memory Diagnostics A Windows tool that schedules a memory test that will be executed when the computer starts.

Windows ReadyBoost A setting that enables Windows to treat an external flash device, such as a USB drive, as hard drive cache. It increases the performance of Windows without installing additional RAM.

Windows Registry A database that contains settings for Windows and for applications that use the Registry.

Windows Update A website located at update.microsoft.com. The site hosts maintenance updates, critical updates, and security patches, as well as optional software and hardware updates for Microsoft Windows versions 7, 8, and 10.

windowsupdate.log A file stored in the %SystemRoot% directory that contains records of update activity.

wire cutters A tool used to snip wires, mostly aluminum and copper wires, in a network environment.

wire strippers A tool used to remove the insulation from wire so that it can be twisted to other wires or crimped to connectors to make a cable. Wire strippers typically have a variety of notches for different wire gauges.

Wired Equivalent Privacy (WEP) A wireless network setting that provides very weak security and should not be relied upon for confidentiality.

wired network A network that uses physical media such as copper cables to transfer data between connected devices.

wireless access point (AP) A device that provides network access to wireless devices, such as laptops and tablets. A wireless AP uses radio waves to communicate with the wireless NIC in the devices and other wireless access points.

wireless adapter A device that a laptop can use to access the Internet; it can be built into the laptop or attached to the laptop through an expansion port.

wireless LAN (WLAN) A network that is similar to a LAN but that wirelessly connects users and devices in a small geographical area instead of using a wired connection. A WLAN uses radio waves to transmit data between wireless devices.

wireless mesh network (WMN) A technology that uses multiple access points to extend a WLAN.

wireless network A network that uses radio signal frequencies for communication among network devices. Also called a Wi-Fi network or a WLAN.

wireless NIC A device that connects a computer to a network using radio frequencies.

wireless router A device that connects multiple wireless devices to a network and may include a switch to connect wired hosts.

wireless wide area network (WWAN) A network that requires use of an adapter to link to a cellular provider’s network through the nearest base station or transmitter. WWAN adapters can be internal or external (in which case they are connected by USB).

Work Network A network location profile in HomeGroup for which you are not allowed to create or join a HomeGroup but for which you can view and share resources with other computers.

workgroup A collection of workstations and servers on a LAN that are designed to communicate and exchange data with one another.

worm A self-replicating program that propagates automatically without user actions by exploiting vulnerabilities in legitimate software.

WPA2-Personal A wireless network setting that uses the Advanced Encryption Standard (AES) cipher and Pre-Shared Key (PSK) to encrypt communications.

WPA2-Enterprise A wireless network setting with which authentication is passed from the access point to a centralized authentication server running Remote Authentication Dial-in User Service (RADIUS).

Write A Windows permissions that allows users to create new files and folders and make changes to existing files and folders.

X–Z

xcopy A command used to copy files or entire directory trees.

xD A Flash memory card format that is used in digital cameras made by Olympus and Fujifilm.

zero insertion force (ZIF) Refers to the amount of force needed to install a CPU into the motherboard socket or slot.

zero-day Also referred to as zero-day attack, zero-day threat, or zero-day exploit, the day that an unknown vulnerability is discovered by the vendor.

zero-hour The moment an exploit is discovered.

Zigbee A wireless technology that uses low-power digital radios based on the IEEE 802.15.4 wireless standard for low-rate wireless personal area networks (LR-WPANs). It is meant to be used by low-cost, low-speed devices.

zombies Many infected hosts that are used to overwhelm a target in a DoS attack and amplify the attack to a DDoS attack.

Z-Wave A wireless technology that uses low-energy radio waves based on the IEEE 802.15.4 wireless standard for low-rate wireless personal area networks (LR-WPANs). It is meant to be used by low-cost, low-speed devices to let smart devices communicate with one another.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.19.29.89