Term
|
Definition
A family of specifications for wireless LAN communication. |
|
|
Term
|
Definition
A fast, secure, but relatively expensive protocol for wireless communication. supports speeds up to 54Mbps un the 5 GHz frequency at 60'. |
|
|
Term
|
Definition
2GBps 5GHz and uses Beamforming to transmit. |
|
|
Term
|
Definition
Wi-Fi for short, most commonly used. 11 Mbps 2.4 Ghz range up to 1000'. |
|
|
Term
|
Definition
compatible with 802.11b 54Mbps 2.4GHz 150' range. |
|
|
Term
|
Definition
600Mbps at either 2.4GHz or 5GHz 150' indoors and 300' outdoors. |
|
|
Term
|
Definition
Mobile technology that can determine the orientation of a device with a sensor that measure the acceleration of the device direction. |
|
|
Term
|
Definition
An indicator on a network adapter that flickers when packets are recieived or sent. |
|
|
Term
|
Definition
A method for wireless devices to communicate directly with each other without the use of an AP. |
|
|
Term
|
Definition
A hidden share created by default on every Windows system. If admin shares are deleted, by default, the system recreated them when it restarts. |
|
|
Term
|
Definition
Unwanted software loaded onto a system for the putposes of presenting commercial advertisements to the user. |
|
|
Term
|
Definition
A color scheme available in Windows Vista and 7. |
|
|
Term
|
Definition
In encryption, the rule, system, or mechanism used to encrypt data. |
|
|
Term
|
Definition
The transfer of information in the form of a continuous wave. |
|
|
Term
|
Definition
An operating system for mobile devices. |
|
|
Term
|
Definition
Software that is specifically designed to protect systems against spyware attacks. |
|
|
Term
|
Definition
An application that scans files for executable code that matches patterns known to be common to viruses, and monitors systems for activity associated with viruses. |
|
|
Term
|
Definition
A file name or directory name that indicates the files on which a command will operate. |
|
|
Term
|
Definition
A characteristic of display devices that indicates the ration of width to height. |
|
|
Term
|
Definition
A technique that is used to exploit a vulnerability in any application on a device without the authorization to do so. |
|
|
Term
|
Definition
A server or server role that deremines whether or not access credentials suppied by a user should enable them access to resources. |
|
|
Term
|
Definition
An application that generates single-use security tokens that are used as part of a two-step verification and multifactor authentication. |
|
|
Term
|
Definition
Negotiates a speed that is compatible with the network router or switch. |
|
|
Term
|
Definition
The typical form of illumination used in a full-sized LCD display. |
|
|
Term
|
Definition
Also called a security card, and id card or token that can be used to swipe through an id system or can be used as a proximity card. |
|
|
Term
|
Definition
A transmission scheme where a single signal sends data using the entire bandwidth of a the transmission media. |
|
|
Term
|
Definition
Baseband real time operating system. (Radio Firmware) Signals are sent via RF waves in the 10KHz-1GHz range to wireless antennas. |
|
|
Term
|
Definition
A subset of a security profile, and a document that outlines the minimum level of security required for a system, device, network, or premises. |
|
|
Term
|
Definition
A feature of 802.11ac that transmits radio signals directly at a specific device using smart antennas. |
|
|
Term
|
Definition
An automated method of recognizing a person based on a physiological or behavioral characteristic unique to the individual. Retina, fingerprint, or voice. |
|
|
Term
|
Definition
Special memory that keeps track of its data even when the power is turned off, and is stored in the EEPROMS. |
|
|
Term
|
Definition
A security feature in Windows 7 and Server 2008 that provides full disk encryption protection for your operating system as well as all the data stored on the operating system volume. |
|
|
Term
|
Definition
A Windows security feature that encrypts removable storage deveces such as USB flash frives or portable hard drives. |
|
|
Term
|
Definition
A complete loss of electrical power. |
|
|
Term
|
Definition
A wireless radio technology that facilitates short-range (usually less that 30') wireless communication between devices such as PCs, Laptops, mobile phones, wireless headsets, and gaming consoles, thus creating a wireless PAN. |
|
|
Term
|
Definition
Bayonet Neill-Concelman. A twist lock connector that is used with coaxial cables to carry radio frequencies to and from devices. |
|
|
Term
|
Definition
An OS X app that enables users to install Microsoft Windows and then switch between OS X and the Windows operating system. |
|
|
Term
|
Definition
A series of sequential steps that occur when you start a computer. |
|
|
Term
|
Definition
A command line tool used via the Command Prompt in the Windows Recovery Enviroment (Win7 and Vista) to troubleshoot or repair startup issues. |
|
|
Term
|
Definition
A set of devices that has been infected by a control program called a bot that enables attackers to exploit them and mount attacks. |
|
|
Term
|
Definition
A software-based network device that has the same functionality as a switch. |
|
|
Term
|
Definition
The amount of light emitted from a display device, as measured in lumens. |
|
|
Term
|
Definition
A category of network transmission technologies that provide high throughput by splitting communications pathways into multiple channels transmitted simultaniously over the nerwork media. |
|
|
Term
|
Definition
A temporary power reduction that is used by electrical power comanies to deal with high power demands. |
|
|
Term
|
Definition
An attack that uses password-cracking software to attempt every possible alphanumeric password combination. |
|
|
Term
|
Definition
In a computer system, a group of wires that connect component. They provide a pathway for data transfer. |
|
|
Term
|
Definition
Transmissions that use a cable television connection and a specialized interface device known as a cable modem to provide high-speed Internet access to home and small businesses. |
|
|
Term
|
Definition
A hardware device that connects a subscriber's device to a service provider's cable systems. |
|
|
Term
|
Definition
A device that enables you to remove the protective coating from wiring to facilitate installing a media connector. |
|
|
Term
|
Definition
An electrical instrument that verifies if a signal is present on a cable. AKA Media Tester. |
|
|
Term
|
Definition
High-Speed memory that the CPU can access directly. |
|
|
Term
|
Definition
Uses radio signals to transmmit network data over the cellular telephone system. |
|
|
Term
|
Definition
The record of evidence history from collection to presentation in court, to disposal. |
|
|
Term
|
Definition
The set of chips on the system board that support the CPU and other basic functions. |
|
|
Term
|
Definition
A method for concealing the meaning of text. |
|
|
Term
|
Definition
Data that has been encoded with a cipher and is unreadable. |
|
|
Term
|
Definition
The unencrypted form of data. AKA Plaintext. |
|
|
Term
|
Definition
A computer that makes use of the services and resources of other computers. |
|
|
Term
Client side virtualization |
|
Definition
Takes place at the endpoints and separates the elements of a user's logical desktop enviroment (The applications, operating system, programs, etc.) and divides them from each other and from the physical hardware or a physical machine. |
|
|
Term
|
Definition
A network in which some computers act as servers to provide special services for other client computers. |
|
|
Term
|
Definition
A type of cable that features a central conductior surrounded by braided or foil shielding. A diaelectric insulator separates the conductor and shield and the entire package is wrapped in a jacket. The data signal is transmitted over the central conductor. The outer shielding serves to reduce electromagnetic interference. |
|
|
Term
|
Definition
When printing multiple copies of a multipage document the collection and combination of pages are kept in the proper order. |
|
|
Term
|
Definition
A program that implements the commands entered in the text interface. |
|
|
Term
|
Definition
In a CLI, the area of the screen where users enter commands to interact with the OS. |
|
|
Term
|
Definition
An Admin tool that is used to deploy component applocations and configure the behaviors of components and applications. |
|
|
Term
|
Definition
A type of analog video information that is transmitted or stored as two or more separate signals. |
|
|
Term
|
Definition
The format of an analog (picture only) signal before it is combined with a sound signal and modulated onto a radio frequency carrier. |
|
|
Term
|
Definition
Collecting and analyzing data from storage devices, computer systems, networks, and wireless communications and presenting this information as a form of evidence in a court of law. |
|
|
Term
|
Definition
The primary Admin tool used to manage and configure the system. It consolidates several Admin utilities into a single console to provide easy access to the most common system tools. |
|
|
Term
|
Definition
A method of setting limits on user browser sessions. |
|
|
Term
|
Definition
A system unit component that prevents damage to computer parts by dissipating the heat generated inside a computer chassis. |
|
|
Term
|
Definition
An assembly within a laser printer that contains a wire (the corona wire)m which is responsible for charging the paper. |
|
|
Term
|
Definition
The science of hiding information to protect sensitive information and communications from unauthorized access. |
|
|
Term
|
Definition
A system -maintenance task that enables you to store copies of critical files and folders on another medium for safekeeping. |
|
|
Term
|
Definition
On a mobile device, a scheme for isolating business data from personal data. |
|
|
Term
|
Definition
A system recovery task that enables you to access the backed-up data. |
|
|
Term
|
Definition
An Admin tool that uses Open Database Connectivity (ODBC) to move data berween different types of databases on the system. |
|
|
Term
|
Definition
The process of automatically merging and updating common data that is stored on multiple devices. |
|
|
Term
|
Definition
A method used to remove any sensitive data from a mobile device and permanently delete it. |
|
|
Term
|
Definition
Any circuit board that plugs into another circuit board. |
|
|
Term
|
Definition
Distributed Denial of Service. A type of denial service attack that uses multiple devices on disaparate networks to launch the coordinated attack from many simultaneous sources. |
|
|
Term
|
Definition
Pixels that do not display light as expected and wil show up as black dots on the screen. cannot be fixed, must be replaced. |
|
|
Term
|
Definition
The process of reversing a cipher. |
|
|
Term
|
Definition
An IP addres of the router that routes remote traffic from the device's local subnet to remote subnets. |
|
|
Term
|
Definition
The anti-spyware software that is included with Windows XP, Vista, and 7. |
|
|
Term
|
Definition
A code pattern that identifies a virus. Also called a signiture. |
|
|
Term
|
Definition
In Windows, an Admin tool that is used to manage and configure system devices in a hardware profile. |
|
|
Term
|
Definition
Local-Loop phone connections that use modems and standard telephone technology. |
|
|
Term
|
Definition
An attack that automates password guessing by comparing encrypted passwords against a predetermined list of possible password values. |
|
|
Term
|
Definition
The transfer of information in a signal that comprises only 1's and 0's. |
|
|
Term
|
Definition
On touch screen displays, a layer of sensors between the LCD display and a layer of glass that enables the translatin of the analog touch signal to a digital signal. |
|
|
Term
|
Definition
A thermal printer that uses heated pins to form images directly onto specially coated thermal paper. |
|
|
Term
|
Definition
A component in a file system hierarchy that provides a container to orhanize files and other directories (folders). Also called a folder. |
|
|
Term
|
Definition
On a network, a centralized database that includes objects such as computers, user names, servers, clients, and passwords and provides a centralized Admin and authentication. |
|
|
Term
|
Definition
A device mode that will transmit a friendly signal to another device in close proximity. |
|
|
Term
|
Definition
Circuitry that manages the transfer of data to and from a disk drive, whether it is a hard disk drive or an optical drice. The disk controller provides the communication path between the CPU and the disk drive. |
|
|
Term
Disk Defragmenter (DEFRAG) |
|
Definition
A system untility available in all versions of Windows that scans and analyzes how file fragments are arranged and accessed on the hard disk. |
|
|
Term
|
Definition
Disk mirroring in which the two drives in the mirror each have a dedicated disk controller. |
|
|
Term
|
Definition
The process of monitoring and adjusting the configuration of HDDs and the file systems contained on those HDDs. |
|
|
Term
|
Definition
An isolated section of a disk that functions like a separate physical drive. |
|
|
Term
|
Definition
A personal computer component that enables users to view the text and graphical data output from a computer. |
|
|
Term
|
Definition
A digital display standard that aims to replace DVI and VGA standards. |
|
|
Term
|
Definition
A conductor, but with high resistance that loses its electrical charge slowly. |
|
|
Term
|
Definition
A complete Linux implementation, including kernal, shell, applications, and utilities, that is packaged, distributed, and supported by a software vendor. |
|
|
Term
|
Definition
A bar along the bottom or side of the screen that contains icons for apps that come with a Macintosh computer. |
|
|
Term
|
Definition
Desktop devices that connect portable computers to standard desktop peripherals without the need to connect and disconnect the peripherals themselves when the user switches from stationary to mobile use. |
|
|
Term
|
Definition
A Microsoft network model that an Admin implements by grouping computers together for the purpose of sharing a centralized user account database. Sharing this user account database enables users to use these accounts to log on at any computer in the domain. |
|
|
Term
|
Definition
A server that stores the user account darabase for the domain and is responsible for authernticating users when they log on to the domain. |
|
|
Term
|
Definition
A small hardware component that, when attached to a computing device, enable addition functionality such as wireless connectivity. |
|
|
Term
|
Definition
An impact printer that forms images out of dots on paper by using a set of pins to strike an inked ribbon. |
|
|
Term
|
Definition
Metal strips that can be screwed onto an internal drive before installation. |
|
|
Term
|
Definition
The file that stores the contents of a memory dump. |
|
|
Term
|
Definition
A feature that scans both sides of a document automatically. |
|
|
Term
|
Definition
The process that enables automatic printing on both sides of printing media. |
|
|
Term
|
Definition
A method used to assign addresses using the DHCP service. |
|
|
Term
|
Definition
A mobile digital device designed primarily for reading digital publications such as e-books and digital periodicals. |
|
|
Term
|
Definition
A built in data migration utility in Windows Vista and 7 that helps transfer files, data, and settings from on PC to another. |
|
|
Term
|
Definition
An attack that uses special monitoring software to intercept private network communications, either to steal the content of the communication itself or to obtain user names and passwords for future software attacks. |
|
|
Term
|
Definition
A general term for unwanted signals on the network media that can interfere with network transmissions. |
|
|
Term
|
Definition
The software installed that allows the computer to virtually run another operating system, or another instance of the same operating system. |
|
|
Term
|
Definition
A document for all visitors to sign in and out when entering and leaving the building. |
|
|
Term
|
Definition
Electrostatic Photographic drum. The component in a laser printer that carries the electrical charge to attract toner and then to transfer the toner to the paper. |
|
|
Term
|
Definition
A family of networking technologies that provide connectivity by using ethernet network adapters, contention-based media access, and twisted pair, coax, or fiber media. |
|
|
Term
|
Definition
An admin tool that is used to view the contents of event logs, which contain information about signifigant events that occur on your computer. |
|
|
Term
|
Definition
A printed circuit board that is installed in a slot on a system board to provide special functions for customizing or extending a computers capabilities. AKA adapter card, I/O card, add in, add on, or board. |
|
|
Term
|
Definition
A mobile expansion card designed by the PCMCIA to replace traditional PC Cards to provide PCI Express and USB 2.0 connectivity. |
|
|
Term
|
Definition
A method used to connect devices to the Internet using fiber optic cable. |
|
|
Term
|
Definition
A type of cable in which one or more glass or plastic strands, plus addition fuber strands or wraps, are suttounded by a protective outer jacker. Light pulses carry the signal through fiber optic cable. |
|
|
Term
|
Definition
A characteristic that can be associated with a file or folder that provides the operating system with important information about the file or folder and how it is intended to be used by system users. |
|
|
Term
|
Definition
Software that can recover deleted files from you computer system. |
|
|
Term
|
Definition
A computer that store programs and files that are intended to be shared amond network users. |
|
|
Term
|
Definition
A method that is used by an operating system to store, retrieve, organize, and manage files and directories on mass storage devices. |
|
|
Term
|
Definition
The degree of correctness and validity of a filesystem. |
|
|
Term
|
Definition
The file and folder management app that is included with OS X. |
|
|
Term
|
Definition
A software program or hardware device that protects networks from unauthorized data by blocking unsolicited traffic. |
|
|
Term
|
Definition
Software stored in memory chips that retains data whether or not power to the computer is on. |
|
|
Term
|
Definition
Refers to the individual and the immediate actions that follow an incident. |
|
|
Term
|
Definition
The size and shape of a given component. Often used n tems of motherboard and drive characteristics. |
|
|
Term
|
Definition
Any type of impact ptinter that functions like a typewritter, by pressing preformed characters against the ink ribbon to deposit the ink on the page. |
|
|
Term
|
Definition
The number of complete cycles per second in an analog wave or radio wave. |
|
|
Term
|
Definition
A form of lighting devices from the front of the display. |
|
|
Term
|
Definition
Permits simultaneous two-way communication. |
|
|
Term
|
Definition
A component in a laser printer that uses two rollers to heat toner particles, melting them onto the paper. |
|
|
Term
|
Definition
A mini application in Windows that can perform an information display task. |
|
|
Term
|
Definition
A device, sofware, or system that converts data between incompatible systems. |
|
|
Term
|
Definition
A power protection device that creates its own electricity through the use of motors. |
|
|
Term
|
Definition
Finger movements on a trackpad or mouse that enable a user to scroll, zoom, and navigate desktop, document, and application content. |
|
|
Term
|
Definition
A cursor that jumps around on the screen randomly, or moves too slow, or opens windows and menus on its own. |
|
|
Term
|
Definition
Grand unified Bootloader 2. A program used in Linux distributions that loads operating system kernals. |
|
|
Term
|
Definition
A subset of a security profile, and a document that outlines best practices and recommendations to help conform to policies. |
|
|
Term
|
Definition
Permits two-way communication, but only one direction at a time. |
|
|
Term
|
Definition
A passive heat exchanger that dissipates heat from a source such as the CPU and transfers it, normally via an enlarged surface area, to another medium such as air or water. |
|
|
Term
|
Definition
A unit of measurement that indicates cycles or occurrences per second. |
|
|
Term
|
Definition
A power option available in Windows enviroments that the computer will store whatever is currently on memory on the hard disk and then shut down, and then return to the state it was in upon hibernation when it is awakened. |
|
|
Term
|
Definition
Any message containing incorrect or misleading information that is desseminated to multiple userd through unofficial channels. |
|
|
Term
|
Definition
A firewall installed on a single or home computer. |
|
|
Term
|
Definition
A networking device used to connect the drops in a physical star topology network into a logical bus topology. AKA Multiport repeater. |
|
|
Term
|
Definition
In virtualization technology an application that is installed on the host machine and is used to configure and manage the VMs running on the host. |
|
|
Term
|
Definition
A cloud storage solution that is accessed by using the user's Apple ID. |
|
|
Term
|
Definition
Any type of printer that strikes a component directly against the paper or ink to create characters on the paper. |
|
|
Term
|
Definition
An approach that an attacker will pretend to be someone else. typically a user in distress or a help-desk representative. |
|
|
Term
|
Definition
The process of installing a newer version of an existing operating system that is currently installed on the computer. |
|
|
Term
|
Definition
A surge or spike that is caused when a device that uses a large amount of current is started. |
|
|
Term
|
Definition
A set of practices and procedures that govern how an organization will respond to an incident in progress. |
|
|
Term
|
Definition
A record of any instance where a person is injured or computer equipment is damaged due to enviromental issues. Also, a record of accidents involving hazardous materials that could have an impact on the environment itself. |
|
|
Term
|
Definition
A method for wireless devices to communicate with other devices by first connecting to an AP. |
|
|
Term
|
Definition
A printer that forms images by spraying ink on the paper. |
|
|
Term
|
Definition
A personal computer component that enables users to enter data or instructions into a computer. |
|
|
Term
|
Definition
The point at which two devices connect and communicate with each other. |
|
|
Term
|
Definition
A relatively inexpensive PC that enables internet access and a specific activity. |
|
|
Term
|
Definition
A laptop component that converts DC power to AC power for the display. |
|
|
Term
|
Definition
In printing, a page orientation that is wider than it is tall. |
|
|
Term
|
Definition
A type of printer that forms high-quality images on one page of paper at a time, by using a laser beam, toner, and an electophotographic drum. |
|
|
Term
|
Definition
The principle that establishes that users and software should only have the minimal level of access that is necessary for them to perform the duties required of them. |
|
|
Term
|
Definition
A power problem that is caused by a fluctuation in electrical current. |
|
|
Term
|
Definition
A typr of impact printer that can print a full line of text at a time. |
|
|
Term
|
Definition
An indicator on a network adapter that lights up when a network signal is detected. |
|
|
Term
|
Definition
An open-standards UNIX derivative originally developed and released by a Finnish computer science student named Linus Torvalds. |
|
|
Term
|
Definition
A complete Linux implementation, including kernal, shell, applications,, and utilities, that is packaged, distributed, and supported by a software vendor. |
|
|
Term
|
Definition
A standalone Linx program for troubleshooting a corrupt Linux installation. |
|
|
Term
|
Definition
Cooling methinds that circulate a liquid or liquified gas, water or freon, past the CPY to keep it cool. |
|
|
Term
|
Definition
A logical printer that is managed by the local computer, where the pring device is generally directly attached. |
|
|
Term
|
Definition
An Admin tool that is used to view and edit the security settings for group policies. |
|
|
Term
|
Definition
A folder that is created on the local nerwork by an individual user and then shared with other nerwork users via share folder permissions. |
|
|
Term
|
Definition
In OS X, a copy of altered files that is stored on the startup drive until the Time Machine backup drive is available. |
|
|
Term
|
Definition
An Admin tool that is used to manage user accounts on the local system. |
|
|
Term
|
Definition
An error condition that causes the system or an application to stop responding to user input. |
|
|
Term
|
Definition
A piece of code that sits dormant on a user's computer until it is triggered by a specific event, such as a specific update. Once the code is triggered, the logic bomb "detonates" and corrupts the data on the user's computer. |
|
|
Term
|
Definition
A special connecor used for diagnosing network transmission problems that redirects electrical signals back to the transmitting system. |
|
|
Term
|
Definition
The process of writing track sector markings on a hard disk. |
|
|
Term
|
Definition
The unit of measurement for visible light that is being emitted from a light-source. |
|
|
Term
|
Definition
A computer that stores incoming email messages and forwards outgoing email messages. |
|
|
Term
|
Definition
Any unwanted software that has the potential to damage a system, impede performance, or create a nuisance condition. |
|
|
Term
|
Definition
A form of eavesdropping where the attacker makes an independent connection between the victims as if they are directly talking to each other over a closed connection, when in reality the attacker is controlling the information that travels between the victims. |
|
|
Term
|
Definition
Two sets of interlocking doors inside a small cpace, where the first set of doors must be closed before the second set will open. |
|
|
Term
|
Definition
A series of pages that contain the complete documentation specific to every Linux command. AKA Man pages. |
|
|
Term
|
Definition
A PC component that provides temporary workspace for the processor. |
|
|
Term
|
Definition
The process of writting the contents of a system memory at the time of a stop error to a file on the HDD prior to system shutdown. |
|
|
Term
|
Definition
A system unit component that holds a group of memory chips that act as a single memory chip. |
|
|
Term
|
Definition
Introduced in late 1997, and is often referred to as µATX, has a max size of 9.6" by 9.6". |
|
|
Term
|
Definition
Micro Dual Inlin Memory Module. A memory module standard used in some laptops. |
|
|
Term
|
Definition
A smaller version of the full ATX board with a max size of 11.2" by 8.2". |
|
|
Term
|
Definition
An older motherboard that was introduced by Intel in 1995 to provide better I/O support, lower cost, easier use, and better process support. |
|
|
Term
|
Definition
A bayonet-style connector using the traditional BNC connection method. |
|
|
Term
|
Definition
A smaller version of the full size HDMI, specified more for portable devices. |
|
|
Term
|
Definition
A small compact board that fit the same form factor as the ATX, an the microATX. Max size of 6.7" by 6.6". |
|
|
Term
|
Definition
An extremely small expansion card, often just a few centimeters in length, used to increase communication abilities by providing network adapters or modems and supports variuos connections and buses. |
|
|
Term
|
Definition
A disk fault-tolerence method in which data from an entire partition is copied onto a secod drive. |
|
|
Term
|
Definition
A feature in OS X that allows users to use multiple Spaces as if they were multiple desktops. |
|
|
Term
|
Definition
An electronic device that provides computing pwer in a portable format. |
|
|
Term
|
Definition
A device that converts digital data to an analog signal that can be sent over a telephone line. |
|
|
Term
|
Definition
The main Circuit board in a computer that acts as the backbone for the entire computer system. AKA system board. |
|
|
Term
Multi-factor Authentication |
|
Definition
Any authentication scheme that requires calidation of at least two of the possible authentication factors. |
|
|
Term
|
Definition
The technology used on the surface of the touch screen on tablets and other moblie devices that can recognize more than one contact on the surface at once. |
|
|
Term
|
Definition
A security mechanism that requires that each party in a communication verifies its identity. |
|
|
Term
|
Definition
A set of rectangular rods with number etched into them that let users do multiplication by addint the numbers on properly positioned rods. a precursor to the slide rule. |
|
|
Term
|
Definition
The fixed resolution for LCD or other flat panel display devices. |
|
|
Term
|
Definition
A group of computers that are connected together to communicate and share resources. |
|
|
Term
|
Definition
A shared print device managed by a network print server. It's represented as a logical printer object on the client computer that accesses the server. |
|
|
Term
|
Definition
A hardware/ Software combination that protects all the computers on a network beind the firewall. |
|
|
Term
Network-Connected Printer |
|
Definition
Any print device that can connect directly to the network with a network adapter rather than using a physical cable to connet to a local computer or print server device. |
|
|
Term
|
Definition
Any system that tries to connect to an organizations network and that doesn't meet the minimum requirements of the network. |
|
|
Term
|
Definition
A component of the chipset that controlls the system memory and thAGP cideo ports, and sometime the cache memory. |
|
|
Term
|
Definition
An association of 84 firms for developing open standards for mobile devices. |
|
|
Term
|
Definition
An open source implementation of the SSH protocol that is included with most Linux distributions. |
|
|
Term
|
Definition
A PC storage device that stores data optically. |
|
|
Term
|
Definition
A computer drive that is either intenal or external to a computer system that reads and writes data to an optical disc. |
|
|
Term
|
Definition
In printing, the position of the page and the direction of the content printed on the page. |
|
|
Term
|
Definition
A power condition where the voltage in a circuit is raised above the circuit's upper voltage limit. |
|
|
Term
|
Definition
A section of memory addresses in which a unit of data can be stored. |
|
|
Term
|
Definition
An interrupt generated when an application requests data that is no longer present in its cirtual memory location. |
|
|
Term
|
Definition
In a virtual-memory system, the section of the hard disk used to store memory contents that have been swapped out of physical RAM. |
|
|
Term
|
Definition
An error correction method for electronic communications. |
|
|
Term
|
Definition
The process of creating, destroying, and manipulating patitions to optimize system performance. |
|
|
Term
|
Definition
The process of dividing a single HDD into isolated sections that function as seperate physical hard drives, called partitions. |
|
|
Term
|
Definition
A Linux program that updates the kernal with partition table changes. |
|
|
Term
|
Definition
A fix or update for a software program or application, designed to eliminate known bugs or vulnerabilities and improve performance. |
|
|
Term
|
Definition
A network in which resource sharing, processing, and communications control are completely decetralized. |
|
|
Term
|
Definition
An Admin tool that monitors the state of services or daemons, processes, and resources on a system. |
|
|
Term
|
Definition
In Windows, security settings that control access to individual objects, such as files. |
|
|
Term
|
Definition
Amobile digital device that is larger than a standard sized smartphone and smaller than a tablet. |
|
|
Term
|
Definition
Similar to phishing, this type of social engineering attack redirects a request for a website, typically and e-commerce sire, to a similar but fake site to gain username and password information. |
|
|
Term
|
Definition
A type of e-mail based social engineering attack in which the attacker sends an e-mail from a spoofed source, such as a bank, to try to elicit information from the victim. |
|
|
Term
|
Definition
For network adapter cards, a globally unique hexadecimal number burned into each adapter by the manufacturer. |
|
|
Term
|
Definition
A network of two to eight Bluetooth-enabled devices. |
|
|
Term
|
Definition
A technology that allows images to be printed directly on a printer from digital cameras. |
|
|
Term
|
Definition
The smallest discrete element on a display. A single pixel is composed of a red, a blue, and a green dot. |
|
|
Term
|
Definition
A type of flat panel that uses a gas mixture placed between two sheets of glass that have electrodes attached to their surface. |
|
|
Term
|
Definition
A grade of cable that does not give off noxious gases when burned. used in walls in place of PVC cable. |
|
|
Term
|
Definition
A situation where the mouse ponter moves accross the screen without the user touching the touchpad or mouse. |
|
|
Term
|
Definition
A subset of a security profile, and a document that outlines the specific requirements and rules everyone must meet. |
|
|
Term
|
Definition
A hardware connection interface on a PC that enables devices to be connected to the computer, or the endpoint of a logical connection that client computers use to connect to specific server programs. |
|
|
Term
|
Definition
A technique of selectively enabling or disabling TCP and UDP ports on computers or network devices. It ensures that no traffic, except for the protocol that the Admin has chosen to allow, can pass through an open port. |
|
|
Term
|
Definition
A scaled-down version of a docking station with only the standard ports available. |
|
|
Term
|
Definition
In printing, a page orientation that is taller than wide. |
|
|
Term
|
Definition
An internal computer component that converts line voltage AC power from an electrical outlet to the low-voltage DC power needed by system components. |
|
|
Term
|
Definition
A tool that connects to the power supply's 24 pin connector that test functionality of the unit, |
|
|
Term
|
Definition
The process of creating computer accounts in Windows Active Directory before joining the computers domain. |
|
|
Term
|
Definition
An Admin tool that is used to view and manage all of the printers and print servers installed on a network. |
|
|
Term
|
Definition
A combination of parameters that define the appearance of the printed output. |
|
|
Term
|
Definition
A list of print jobs waiting to be printed. |
|
|
Term
|
Definition
A computer that enables network users to share printers. |
|
|
Term
|
Definition
A cover for a device's screen, making it difficult to read the screen when not directly in front. |
|
|
Term
|
Definition
Addresses used by organizations for nodes that require IP connectivity within their enterprise network, but do not require external connections to the global internet. |
|
|
Term
|
Definition
A subset of a security profile, ad a document that provides detailed information about specific devices and technologies that support policies. |
|
|
Term
|
Definition
A record that summarizes the current running processes on a system. |
|
|
Term
|
Definition
A system that acts as an intermediay for rquests for resources. |
|
|
Term
|
Definition
A computer or application that isolates internal clients from external servers by downloading and storing files on behalf of the clients. |
|
|
Term
|
Definition
Addresses that can be used by organizations that can also be chared with external networks. |
|
|
Term
|
Definition
A tool used in a wiring closet to connect cable wires directly to a patch panel. |
|
|
Term
|
Definition
In a mobile device, memory that contains an operating system that is separate from the end user operating system and that controls all of the low-level timing-dependent functions of the mobile device. |
|
|
Term
|
Definition
A form of wireless communication in which signals are sent cia RF waves, in the 10KHz to 1GHz range to wireless antennas. |
|
|
Term
|
Definition
A cloud computing feature that provides seamless, scalable provisioning. |
|
|
Term
|
Definition
A performance enhancer, available on Windows Vista and 7 that allows the user to supplement the computers memory with an external storage device like a flash drive. |
|
|
Term
|
Definition
A file used by Windows to refresh your PC. |
|
|
Term
|
Definition
The number of times per second that the monitor is "refreshed" or scanned to illuminate pixels. |
|
|
Term
|
Definition
The central configuration database where Windows stores and retrieves startup setting, information, and infromation for local user accounts. |
|
|
Term
|
Definition
A filesystem that handles small files better than ext2 or 3. |
|
|
Term
|
Definition
A software application that operates a Windows computer from a remote location. |
|
|
Term
|
Definition
A feature of OS X that enables users to access external drives or share discs from another computer. |
|
|
Term
|
Definition
The number of pixels that make up the dimension of a display, represented in a ratio calue as the number of horizontal pixels by vertical pixels. |
|
|
Term
|
Definition
A board that is plugged into the system board and provides additional slots for adapter cards. |
|
|
Term
|
Definition
Malicious code that is designed to hide the existence of processes or programs from normal detection methods and to gain continuous privileged access to a computer system. |
|
|
Term
|
Definition
The schedule that determines how many back up tapes or other media sets are needed, and the sequence in which they are used and reused. |
|
|
Term
|
Definition
A networking device that connects multiple networks that use the same protocol. |
|
|
Term
|
Definition
A Windows system startup method that loads only a minimal set of drivers and services and that is used in troubleshooting Windows computers. |
|
|
Term
|
Definition
Provides extremely long-range wirelessnetwork transmissions to relay network signals from the network service provider to individual customers. |
|
|
Term
|
Definition
A safeguard or prevention method to avoid, counteract, or minimize security risks relating to personal or company property. |
|
|
Term
|
Definition
A specific instance of a risk event occuring, whether or ot it causes damage. |
|
|
Term
|
Definition
Documentation of a security incident, including the type and severity of the incident, personnel involved, a description of the incident, and any mitigating actions taken. |
|
|
Term
|
Definition
A large, comprehensive document that defines how security will be implemented within a particular organization. |
|
|
Term
|
Definition
A computer that provides services and resources on the network. |
|
|
Term
|
Definition
Takes place centrally on a server and utilizes one logical device, typically the server, to act as the host machine for the "guest" machines that virtually use the applications and programs provided by the host. |
|
|
Term
|
Definition
Comprehensive software update that generally includes all prior patches and updates, but which can also include important new features and function. |
|
|
Term
|
Definition
A device that converts video content to a format that can be viewed on a television. also reffered to as steaming players or media players. |
|
|
Term
|
Definition
A feature available on Windows XP and newer operating systems that creates backup copies or snapshots of the system's data and stores them locally or to an external location, either manually or regularly scheduled intervals. |
|
|
Term
|
Definition
A network resource, such as a disk, folder, or printer, that is available to other computer users on the network. |
|
|
Term
|
Definition
A component that interacts directly with users and fuctions as the command interpreter for the Linux operating system. |
|
|
Term
|
Definition
A human-based attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN. |
|
|
Term
|
Definition
Adesignated area of the Windows 7 and Windows Vista desktop, displayed vertically along the side of the destop, where users can add gadgers of their choice to provide information and access to frequently used tools or programs. |
|
|
Term
|
Definition
A code pattern that identifies a virus. also called a definition. |
|
|
Term
|
Definition
A digital camera that includes a processor, memory, cellular and Wi-Fi support, and a mobile operating system. |
|
|
Term
|
Definition
A device similar to a credit card that can store authentic information, such as a user's private key, on an embedded chip. |
|
|
Term
|
Definition
A hybrid TV that is basically a television set with web and internet features built into it. |
|
|
Term
|
Definition
A multipurpose device that runs computing applications and that is worn on a preson's wrist. |
|
|
Term
|
Definition
A mobile digital device that combines the functionality of a portable phone with that of media players, GPS navigation, personal digital assistants, and cameras. |
|
|
Term
|
Definition
A printer that produces snapshot-sized images of acceptable photographic quality. |
|
|
Term
Social Engineering Attack |
|
Definition
A type of attack where the goal is to obtain sensitive data, including user names and passwords, from network users through deception and trickery. |
|
|
Term
|
Definition
A computer repair program that can analyze hardware and software components and test them for problems. Also referred to as software diagnostic utility. |
|
|
Term
|
Definition
A means of securing the electronic components to a circuit board using a comination of lead, tin, and silver (solder) and a tool called a soldering iron. |
|
|
Term
|
Definition
A type of printer that uses ink from melted solid-ink sticks. |
|
|
Term
|
Definition
A component of the cipset that controls input/output functions, the system clock, drives and buses, APM power management, and various other devices. |
|
|
Term
|
Definition
In OS X, a virtual desktop consisting of a collection of related windows, as created and managed by Mission Control. |
|
|
Term
|
Definition
Originally, and frequent and repetitive postings in electronic bulletin boards; more commonly, an unsolicited or distasteful commercial email from anonymous sources. |
|
|
Term
|
Definition
A very short increase in the electrical supply coltage or current carried on any wire such as a power line, phone lines, and network lines. Usually only last for a few milliseconds. |
|
|
Term
|
Definition
An IBM-based attack similar to spam that is propagated through instant messaging instead of through email. |
|
|
Term
|
Definition
A human-based or sofware-based attack where the goal is to pretend to be someone else for the purpose of identity concealment. Spoofing can occur in IP addresses, MAC addresses and email. |
|
|
Term
|
Definition
A feature of OS X that enables users to search for apps, documents, images, and other files. |
|
|
Term
|
Definition
A subset of a security profilem, and a tactical document that specifies processes to follow to meet policy requirements. |
|
|
Term
|
Definition
An operating system function that builds file systems on drives and partitions. |
|
|
Term
|
Definition
Configuring TCP/IP statically on a network. Requires that an administrator visit each node to manually enter IP address information for that node. |
|
|
Term
|
Definition
The buildup of stationary electrical charge on any object. |
|
|
Term
|
Definition
A system error serious enough to stop all processes and shut down without warning. |
|
|
Term
|
Definition
A computer component that enables users to save data for reuse at a later time, even after restarted. |
|
|
Term
|
Definition
A disk-performance-enhancement featyre in which data is spread acress multiple drives to improve read and write access speeds. |
|
|
Term
|
Definition
pixels that only show one color of light, so they appear out of place when the display is on. |
|
|
Term
|
Definition
A 32-bit number that is assigned to each host to divide the 32-bit binary IP address into network and node portions. |
|
|
Term
|
Definition
A sudden sharp increase in voltage or current that can last up to 50 microseconds. |
|
|
Term
|
Definition
A power protection device that provides power protection curcuits that can reduce or eliminate the impact of surges and spikes. |
|
|
Term
|
Definition
A power option available in Linux, in which the computer conserves as much energy as possible by cutting off power to the parts of the machine that are not necessary to function, excludidng RAM. |
|
|
Term
|
Definition
A portion of the HDD that is used in situations when Linux runs out of physical memory and needs more of it. |
|
|
Term
|
Definition
In a virtual memory system, the process of moving data back and forth from physical RAM to the pagefile. also called paging. |
|
|
Term
|
Definition
A smart network hardware device that joins multiple network segments together. |
|
|
Term
|
Definition
The BIOS that sets the computer's configuration and environment when the system is powered on. |
|
|
Term
|
Definition
The promary communication pathway between a CPU and other parts of the chipset. The system bus enables data transfer between the CPU, BIOS, memory, and the other buses in the computer. Aslo referred to as frontside bus or local bus. |
|
|
Term
|
Definition
An admin tool that is used to identify and manage issues that may be causing the system to run improperly at start up. |
|
|
Term
|
Definition
The files necessary for the operating system to function properly. |
|
|
Term
|
Definition
A copy of Windows, applications, system settings, and data files that is stored in a separate location than when=re the originals of these items are stored. |
|
|
Term
|
Definition
A utility used in Windows XP, Windows Vista, and Windows 7 that monitores the system for changes to core system files, drivers, and the Registry, and creates restore points to be used to help restore the system if a failure occurs. |
|
|
Term
|
Definition
A snapshot of the system configuration at a given moment in time that contains info about any changes to these components and is stored on the computer's HDD. |
|
|
Term
|
Definition
A personal computer component that ncludes other devices necessary for the computer to function, including the chassis, power supply, cooling sustem, system board, microprocessor, memory chips, disk drives, adapter cards, and ports for conneting external devices. often referred to as a box, main unit, or base unit. |
|
|
Term
|
Definition
A mobile device that includes an integrated tough screen display, virtual onscreen keyboard, and flash memory for data storage. |
|
|
Term
|
Definition
A personal computer storage device that stores data magnetically on a removable tape. |
|
|
Term
|
Definition
A basic system-diagnostic and performance-monitoring tool included with the Windows operating system. |
|
|
Term
|
Definition
An admon tool that allows the uset to create and manage certain system tasks that will be automatically carried out by the computer at predetermined times. |
|
|
Term
|
Definition
Adding a resistor to the end of a coax network segment to prevent reflections wht would interfere with the proper reception of network signals. |
|
|
Term
Thermal dye transfer printer |
|
Definition
A sophisticated type of color printer that uses heat to diffuse dye from color ribbons onto special paper or transparency blanks to produce continuouse-tone output similar in quality to a photographic print. also called dye sublimation printer. |
|
|
Term
|
Definition
Paper that contains a chemical designed to react with the heating element of a thermal printer to create images on paper. |
|
|
Term
|
Definition
A pate that is used to connect a heat sink to a CPU to provide a liquid thermaly conductive compound gel that fills any gaps between the CPU and the heat sink to permit a more efficient transference of heat from the processor to the heat sink. |
|
|
Term
|
Definition
Any printer that uses heat to create the image on the paper with dye or ink from ribbons or with heated pins. |
|
|
Term
Thermal wax tranfer printer |
|
Definition
A printer that uses a thermal printhead to melt wax-based ink from a trasfer ribbon onto the paper. |
|
|
Term
|
Definition
A buisiness computer that performs most or all computeing functions on its own. AKA fat clien. |
|
|
Term
|
Definition
A business computer that relies heavily on another system, typically a server, to run most of its programs, processes, and servers. |
|
|
Term
|
Definition
A hardware interface that supports connecting a wide variety of peripheral devices to PC's and that can use optical fiber or copper wire to transmit signals. |
|
|
Term
|
Definition
An OS X application that provides automated file backups. |
|
|
Term
|
Definition
|
|
Term
|
Definition
An electronic device that sends an electrical signal through one set of UTP cables. |
|
|
Term
|
Definition
An electronic device that emits an audible tone when it detects a signal in a set of wires. |
|
|
Term
|
Definition
An electrostatic-sensitive dry ink substance used in laser printers. |
|
|
Term
|
Definition
Wires etched onto the motherboard to provide electrical pathways. |
|
|
Term
|
Definition
A small button found on some laptops that enables you to move the mouse pointer when no mouse is connected to the computer. |
|
|
Term
|
Definition
Switches that are etched on one sliver of semicondutor that can be opened or closed when conducting electricity. |
|
|
Term
|
Definition
The use of friction to create a static charge. |
|
|
Term
|
Definition
Malicious code that masquerades as a harmless file. When a user executes it, thinking it is a harmless application, it destroys and corrupts data on the users HDD. |
|
|
Term
|
Definition
A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating outer jacket. |
|
|
Term
|
Definition
A collection a credentials and important info about a person with access to the system, including the rights and privileges assigned to the user. |
|
|
Term
|
Definition
A security measure in which a computer user proves its identity in order to gain access to its resources. |
|
|
Term
|
Definition
The allocation be the computer system of a portion of the HDD as if it was a physical RAM. |
|
|
Term
|
Definition
A software-based alternative to a physical printer that enables you to print to a file. |
|
|
Term
|
Definition
The technological process of creating a virtual version of a computer environment by separating the elements of the computing environment from each other and from the physical hardware it runs on via an additional software layer. |
|
|
Term
Virtualization Workstation |
|
Definition
A computer that uses both hardware virtualization and client cirtualization resources to provide a comprehensive virtual workstation for users. |
|
|
Term
|
Definition
A piece of code that spreads from one computer to another by attaching itself to other files. |
|
|
Term
|
Definition
A human-based attack where the goal is to extract personal, financial, or confidential info from the victim by using services such as the telephone system and IP-based voice messaging services (VoIP) as the communication medium. |
|
|
Term
|
Definition
An error or anomaly in the visual display of a picture. |
|
|
Term
|
Definition
The shape of an analog signal when plotted on an oscilloscope or graph. |
|
|
Term
|
Definition
Small monile computing devices that are designed to be worn under, with, or on top of a person's clothing. |
|
|
Term
|
Definition
A computer that provides access to personal, corporate, or educational website content. |
|
|
Term
|
Definition
A form of phishing that targets individuals who are known or are believed to be wealthy. |
|
|
Term
|
Definition
Worldwide Interoperability for Microwave Access. A packet-based wireless technology that provides wireless broadband access over long distances. |
|
|
Term
|
Definition
The anti-spyware software that is included with Windows Vista and 7 installations. |
|
|
Term
Windows Firewall with Advanced Security |
|
Definition
An admin tool that is used to manage advanced firewall settings for the computer and any remote computers connected to the network. |
|
|
Term
Windows Memory Diagnostic |
|
Definition
An admin tool that is used to check the RAM on the system and make sure that it is functioning appropriately and efficiently. |
|
|
Term
Windows Security Policies |
|
Definition
Configuration settings within Windows operating systems that control the overall security behavior of the system. |
|
|
Term
|
Definition
Windows pre-installation environment. A lightweight version of Windows or Windows server that can be used for deployment of the full version of the OS or for troubleshooting OS problems. |
|
|
Term
|
Definition
A tool that attaches media connectors to the ends of cables. |
|
|
Term
|
Definition
A tool that is often incorporated into a wire crimper and that enable the user to remove the protective coating from electrical wires. |
|
|
Term
|
Definition
A network connection that transmits signals without using physical network media. |
|
|
Term
|
Definition
The process of conceiling and protecting data during wireless transmissions. |
|
|
Term
Wireless Network Connection |
|
Definition
A Windows troubleshooting tool used to verify that a computer or other wireless device is connected to the network and able to send and recieve data. |
|
|
Term
|
Definition
A Wi-Fi spectrum analyzer used to detect devices and points of interference as well as analyze and troubleshoot network issues on a WLAN or other wireless networks. |
|
|
Term
|
Definition
A peer-to-peer Microsoft network model that groups computers together for organizational purposes, often deployed in homes and small offices. |
|
|
Term
|
Definition
A piece of code that spreads from on computer to another on its own, not by attaching itself to another file. |
|
|
Term
|
Definition
A mechanism by which programs are run on one machine and the X window output is displayed on another efficiently. |
|
|
Term
|
Definition
A 64-bit, high-performance journaling fliesystem that provides fast recovery and can handle large files efficiently. |
|
|
Term
|
Definition
A downloadable add-on for Windows 7 that allows users running Windows 7 to access and use Windows XP-compatible software and programs directly on their desktops. |
|
|
Term
|
Definition
An attack that exploits a preciously unknown vulnerability in an application or operating system. |
|
|
Term
|
Definition
Unauthorized software that directis the devices to launch a DDoS attack. |
|
|