CompTIA Tech+ Flashcards

(204 cards)

1
Q

Principal microprocessor in a PC or mobile device responsible for running firmware, operating system, and applications software.

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).

A

Hard Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The communication between an information processing system, such as a computer or computing device, and the outside world. The data or commands could come from a human, or from another computing device.

A

Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Volatile storage devices that hold computer data and program instructions while the computer is turned on.

A

Random Access MEMORY (RAM)

Essential part of computer operations without it the computer wont start

this kind of memory “volatile” because it changes easily, it’s not stable (White board analgy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Device with a persistent storage mechanism, such as hard drives, solid state drives, and optical drives.

A

Mass Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Persistent mass-storage device implemented using flash memory.

A

Solid State Drives (SSD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).

Flash devices, such as USB flash drives and SSDs (solid state drives), store information using programmable, non-volatile flash memory.

A

Hard Disk Drive (HDD)

Hard disks keep data on special magnetic disks inside a protective housing to store data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Flash RAM is similar to a ROM chip in that it retains information even when power is removed, but it adds flexibility in that it can be reprogrammed with new contents quickly. Flash memory is used in USB thumb drives and memory cards for removable storage and in Solid State Drives (SSDs), designed to replicate the function of hard drives.

A

Flash Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The use of computers and related devices to manage data.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A device connected to a computer to provide communication, such as input and output, or supplementary functions, such as additional storage.

A

peripheral

something outside the main computer that you can connect with a cable or

mouse, keyboard, printers, screens, and speakers are referred to as peripherals or peripheral devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

provides the basic foundation for all of the computer’s hardware including the processor, RAM, firmware, and expansion cards. Several motherboard standards are available each with a different layout and associated advantages.

A

Motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

rovides shared resources on the network and allows clients to access this information. The advantage of a server-based system is that resources can be administered and secured centrally.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software that facilitates the control and configuration of the computer device via device drivers, services, and one or more user interfaces.

A

Operating System (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using software and smartphone cameras or headsets to interact with real-world objects and images or change the way they appear in some way.

A

augmented reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A computer-generated, simulated environment experienced via a headset connected to a PC or powered by a smartphone.

A

Virtual Reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Devices that can report state and configuration data and be remotely managed over IP networks.

A

The Internet of Things (IoT)

Lightbulbs
Security cameras
Doorbells
Smart speakers
Smart TVs
Smartwatches
Home appliances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is specifically designed to handle and render the graphics of video games, making them look detailed and smooth

A

GPU (Graphics Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data that can be used to identify or contact an individual (or, in the case of identity theft, to impersonate them).

A

Personally Identifiable information PII

Full name (first name, middle name or names, and last name)
Home address
Phone number
Social Security or National Insurance number
Email address
Bank account number
Passport number
Driver’s license number
Login credentials (a username and password combination)
Vehicle identification numbers (VINs)
Browser history
Social media posts
IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A person or entity responsible for an event that has been identified as a security incident or as a risk.

A

Threat Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The invention of fake personal information or the theft and misuse of an individual’s personal information.

A

Indentity Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher. There are symmetric, asymmetric, and hash cipher types.

A

Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A text file used to store information about a user when they visit a website. Some sites use cookies to support user sessions.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

System for sending text messages between cell phones.

A

Short Message Service (SMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered.

End-to-end encryption is a method of secure communication that prevents third parties from reading your data while it’s transferred from one system or device to another.

A

Encryption

Encryption uses different types of cipher and one or more keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Application protocol used to transfer files between network hosts. Variants include S(ecure)FTP, FTP with SSL (FTPS and FTPES), and T(rivial)FTP. FTP utilizes ports 20 and 21.
File Transfer Protocol (FTP) ## Footnote FTP also doesn't automatically encrypt the files for safety. The standard now is to use secure versions of this protocol.
26
The science of creating machines with the ability to develop problem-solving and analysis strategies without significant human direction or intervention.
Artificial Intelligence (AI)
27
A component of AI that enables a machine to develop strategies for solving a task given a labeled dataset where features have been manually identified but without further explicit instructions.
Machine Learning (ML)
28
US federal law that protects the storage, reading, modification, and transmission of personal healthcare data.
Health Insurance Portability & Accountability (HIPAA)
29
Data that has been enciphered and cannot be read without the cipher key.
Ciphertext
30
Information that is primarily stored on specific media, rather than moving from one medium to another.
Data at Rest
31
Information that is being transmitted between two hosts, such as over a private network or the Internet. Also referred to as "data in motion."
Data in Transit
32
Application protocol used to provide web content to browsers. HTTP uses port 80. HTTPS(ecure) provides for encrypted transfers, using TLS and port 443.
HyperText Transfer Portocol Secure (HTTPS)
33
A secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).
Virtual Private Network
34
Strong authentication mechanism that requires a user to submit two different types of credential, such as a fingerprint scan plus PIN. Often, the second credential is transmitted via a second trusted device or account. This is also referred to as 2-step verification.
Two_Factor Authentication (MFA)
35
a sleuth who solves puzzles using numbers! They look at lots of information about things like what people buy, what they like, or how they use apps and games.
Data Analyst
36
your focus is on understanding and implementing privacy regulations, ensuring organizations handle data responsibly.
Data Privacy Specialist
37
you step into a vital role where law meets technology, advocating for data protection and helping shape the future of privacy rights.
data privacy attorney
38
Network protocol suite used to implement the Internet and most WANs and LANs. It uses a four-layer network model that corresponds roughly to the OSI model as follows: Network Interface (Physical/Data Link), Internet (Network), Transport (Transport), Application (Session, Presentation, Application).
Transmission Control Protocol?Internet Protocol (TCP/IP)
39
Administration paradigm whereby any computer device may be configured to operate as both server and client.
Peer-to-peer architecture
40
A system of coded tags that identify the structure of the document files used for web pages.
HyperText Markup Language (HTML)
41
Application protocol used to provide web content to browsers. HTTP uses port 80. HTTPS(ecure) provides for encrypted transfers, using TLS and port 443.
HyperText Transfer Protocol (HTTP)
42
Administration paradigm where some host machines are designated as providing server and services and other machines are designated as client devices that only consume server services.
Client_Server Architecture
43
Software designed to view HTML pages. Browsers must be configured carefully and kept up to date with system patches to make them less vulnerable to malware and other security concerns.
Web Browser
44
A simple language for adding style, such as different colors, fonts, spacing, and other formatting, to Web documents.
Cascading Style Sheets (CSS)
45
An application-level addressing scheme for TCP/IP, allowing for human-readable resource addressing. For example: protocol://server/file, where "protocol" is the type of resource (HTTP, FTP), "server" is the name of the computer (www.microsoft.com), and "file" is the name of the resource you wish to access.
Uniform Resource Locator (URL)
46
a guarantee that a public key it has issued to an organization to encrypt messages sent to it genuinely belongs to that organization.
Certificates
47
A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.
Certificate Authority (CA)
48
Attack technique where the threat actor disguises his or her identity or impersonates another user or resource.
Spoofed
49
Provides Internet connectivity and web services to its customers.
Internet Service Provider (ISP)
50
Generally used to refer to the amount of data that can be transferred through a connection over a given period. Bandwidth more properly means the range of frequencies supported by transmission media, measured in Hertz.
Bandwith
51
is used to interface a computer with the telephone network for data and fax communications, modulating digital data for transmission as an analog signal and demodulating incoming analog transmissions. Broadband modems are used to transmit signals over telephone (DSL) or cable TV networks. ## Footnote analog or dial-up
Modem
52
An analog or dial-up modem
Router
53
Time taken for a signal to reach the recipient, measured in milliseconds. Latency is a particular problem for two-way applications, such as VoIP (telephone) and online conferencing. ## Footnote also known as ping rate (measured in milliseconds) 0.001
Latency
54
download speed is much faster than the upload speed. ISP gives you a lot more speed for downloading, something like 80% to 90% of your total Internet speed. This means only 10% to 20% is left for uploading data to the Internet.
asymmetric connection
55
Carrier technology to implement broadband Internet access for subscribers by transferring data over voice-grade telephone lines. There are various "flavors" of DSL, notably S(ymmetric)DSL, A(symmetric)DSL, and V(ery HIgh Bit Rate)DSL.
Digital Subscriber Line (DSL)
56
57
Internet connection type that uses a fiber link between the subscriber premises and ISP network. Fiber to the premises (FTTP) uses a full fiber link, while fiber to the curb (FTTC) retains a short segment of copper wire between the subscriber premises and a street cabinet.
Fiber Internet
58
Push/pull connector used with fiber optic cabling.
Subscriber Connector (SC)
59
Small form factor push-pull fiber optic connector; available in simplex and duplex versions.
Local Connector (LC)
60
Fiber optic transceiver module type supporting duplex 1 Gbps (SFP) or 10 Gbps (SFP+) links. ## Footnote Fiber Internet is different because it doesn't need a modem. Instead, it uses something called a fiber optical network terminal.
Small form-factor pluggable (SFP)
61
In places where it's hard to get fast Internet like fiber or cable, there's another way to connect using an antenna
Fixed Wireless Internet
62
The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.
Confidentiality
63
The fundamental security goal of keeping organizational information accurate, free of errors, and without unauthorized modifications.
Integrity
64
The fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.
Availability
65
The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.
Non-repudiation ## Footnote means that a person cannot deny doing something, such as creating, modifying, or sending a resource
66
A method of validating a particular entity's or individual's unique credentials.
Authentication
67
is a longer password comprising a number of words. This has the advantages of being more secure because of its length, and easier to remember.
Passphrase
68
A number used in conjunction with authentication devices such as smart cards
PIN
69
Devices with touchscreens can offer the option to use a pattern lock as another security measure. This allows the user to draw a predefined pattern on a grid of 3 columns and 3 rows of dots.
Patterns
70
A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication.
Token
71
An authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system. Physical characteristics stored as a digital data template can be used to authenticate a user. Typical features used include facial pattern, iris, retina, fingerprint pattern, and signature recognition.
Biometrics Authentication
72
Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.
Single Sign-On (SSO)
73
A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role
principle of least privilege
74
Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted. ## Footnote Events are things like sign-on attempts, software use, and file modification
Accounting
75
Security control that can enforce a virtual boundary based on real-world geography.
Geofencing
76
A email-based social engineering attack in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phishing
77
Using persuasion, manipulation, or intimidation to make the victim violate a security policy.
Social Engineering
78
A malicious action that takes place when a threat actor exploits an unlocked and unattended desktop or mobile device to gain unauthorized access.
Lunchtime Attacks | where an attacker gets access to an account through an open desktop
79
Social engineering tactic to obtain someone's password or PIN by observing him or her as he or she types it in.
Shoulder Surfing
80
Social engineering technique in which a person gains access to a building by following someone who is unaware of his or her presence.
Tailgating
81
Email-based or web-based form of phishing that targets specific individuals.
Spear Phishing
82
the victim receives a text, or SMS, message claiming to be from a reputable company or service provider ## Footnote Account Verification Scams Prize or Lottery Scams Tech Support Scams Bank Fraud Alerts Tax Scams Service Cancellation
Smishing Attacks
83
Software that serves a malicious purpose, typically installed without the user's consent (or knowledge).
Malware
84
Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
Virus
85
Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim's files and demanding payment. ## Footnote lock up a computer and demand money to release it
Ransomware
86
A type of malware that replicates between processes in system memory and can spread over client/server network connections.
Worms ## Footnote A worm can make copies of itself to move from one computer to another,
87
Software that records information about a PC and its users, often installed without the user's consent.
Spyware
88
Malicious software or hardware that can record user keystrokes.
Keystrokes
89
Security strategy that positions the layers of diverse security control categories and functions as opposed to relying on perimeter controls. ## Footnote Placing security controls in place
Defense in Depth
90
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.
Security Controls
91
Security policy concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers.
Seperation of Duties
92
Enforcing a security zone by separating a segment of the network from access by the rest of the network. This could be accomplished using firewalls or VPNs or VLANs. A physically separate network or host (with no cabling or wireless links to other networks) is referred to as air-gapped. Also referred to as segmentation or network segmentation enforcement.
Networking Segmentation ## Footnote is one way to restrict access to different areas of a company's network
93
Inspecting traffic to locate and block viruses.
Antivirus Software ## Footnote It primarily works by using a list of known virus patterns, called definitions or signatures.
94
A small unit of supplemental code meant to address either a security problem or a functionality flaw in a software package or operating system.
patches
95
Identifying, testing, and deploying OS and application updates. Patches are often classified as critical, security-critical, recommended, and optional.
Patch Management
96
made up of eight bits
Byte | A single byte, in this simplest form, can store one of 256 values ## Footnote much a storage drive or memory can hold, we use bytes to measure that capacity
97
Persistent mass-storage device implemented using flash memory.
Solid State
98
Mass storage device that uses mechanical platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter (sectors).
hard disk drives
99
100
In its most simple form, a network consists of two or more computers connected to each other by an appropriate transmission medium which allows them to share data. More complex networks can be developed from this basic principle—networks can be interconnected in different ways and even dissimilar networks can be linked.
Networks
101
Adapter card that provides one or more Ethernet ports for connecting hosts to a network so that they can exchange data over a link.
Network Interface Card (NIC)
102
Series of jack/plug types used with twisted-pair cabling, such as RJ45 and RJ11.
Registered Jack | RJ-45
103
Application protocol for operating remote connections to a host using a graphical interface. The protocol sends screen data from the remote host to the client and transfers mouse and keyboard input from the client to the remote host. It uses TCP port 3389.
Remote desktop propocol (RDP)
104
An environment for passing commands to a computer by using a graphical, mouse-driven interface rather than by using text-based commands.
Graphical User Interface (GUI)
105
Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.
Dynamic host configuration protocol (DHCP)
106
Network scope restricted to a single geographic location and owned/managed by a single organization.
local area networks (LANs)
107
Network scope that spans a large geographical area, incorporating more than one site and often a mix of different media types and protocols plus the use of public telecommunications networks.
wide area networks (WANs). ## Footnote LANs can be small, like the Wi-Fi network at your house, or they can be much bigger, like in a large company.
108
Intermediate system used to establish contention-free network segments at OSI layer 2 (Data Link). An unmanaged switch does not support any sort of configuration.
Switch ## Footnote commonly used to connect computers in a LAN
109
Network scope covers the area of a city (that is, no more than tens of kilometers).
Metropolitan Area Network (MAN) ## Footnote A MAN is bigger than a neighborhood but not as huge as a whole country
110
A text-based interface between the user and the operating system that accepts input in the form of commands.
command line interface (CLI)
111
Hardware address that uniquely identifies each network interface at layer 2 (Data Link). A MAC address is 48 bits long with the first half representing the manufacturer's organizationally unique identifier (OUI). Also called a client identifier.
media access control (MAC)
112
Specification allowing power to be supplied via switch ports and ordinary data cabling to devices such as VoIP handsets and wireless access points. Devices can draw up to about 13 W (or 25 W for PoE+).
Power over Ethernet (PoE).
113
A logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a VLAN ID. Even though hosts on two VLANs may be physically connected to the same switch, local traffic is isolated to each VLAN, so they must use a router to communicate.
Virtual LAN (VLAN)
114
Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.
Firewall
115
is a useful tool for figuring out where a network cable starts or ends.
Toner Probe
116
checks if a new cable, or one already connected to a patch panel or wall jack, is working
Cable Tester
117
used to push each of the eight wires into a patch panel or a wall jack. When you press the cable into the right spot with this tool, it makes a satisfying click sound.
Punch Down
118
a tool that helps connect an RJ-45 cable to its clip.
Crimper
119
A device that provides a connection between wireless devices and can connect to wired networks, implementing an infrastructure mode WLAN.
Access Point
120
A standard for two-way radio communications over very short (around four inches) distances, facilitating contactless payment and similar technologies. NFC is based on RFID.
Near Field Communication (NFC)
121
Noise that occurs when a magnetic field around one electrical circuit or device interferes with the signal being carried on an adjacent circuit.
Interference
122
A legacy mechanism for encrypting data sent over a wireless connection.
Wired Equivalent Privacy (WEP)
123
Standards for authenticating and encrypting access to Wi-Fi networks. Also called WPA2 and WPA3.
Wi-Fi Protected Access (WPA)
124
Symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as WPA2, WPA3, and TLS.
Advanced Encryption Standard (AES)
125
Standards for authenticating and encrypting access to Wi-Fi networks. Also called WPA2 and WPA3.
Wi-Fi Protected Access (WPA3),
126
Guest operating system installed on a host computer using virtualization software (a hypervisor), such as Microsoft Hyper-V or VMware. Also known as a "VM."
virtual machines (VMs)
127
sed to create a research lab to analyze viruses. As the malware is contained within the guest OS, it cannot infect the researcher's computer or network.
Virtual labs
128
If the host computers have been upgraded, software may not work well with the new operating system. For example, Windows 7 could be installed which can natively run older programs.
Support legacy software applications:
129
Test software applications under different operating systems and resource constraints. This is a quick and easy way to run through new software to see if there are any issues.
Development environment:
130
Lab environments can be set up so that students can practice using a live operating system and software without impacting the production environment. At the end of the lab, changes to the VM can be discarded and the original environment is available again for the next student to use.
Training
131
Contract governing the installation and use of software.
End User License Agreement (EULA).
132
Documentation of best practice and work instructions to use to perform a common administrative task.
standard operating procedure (SOP)
133
Structured approach to problem-solving using identification, theory of cause, testing, planning, implementation, verification, and documentation steps.
Troubleshooting Methodology i
134
Identify the Problem Establish a Theory of Probable Cause Test the Theory Establish a Plan of Action to Resolve Implement the Plan or Escalate Issue Verify Functionality Document Findings
CompTIA Troubleshooting Methodology
135
Interview Users Duplicate the Problem Identify Symptoms One at a Time Understand Recent Changes & Review Documentation
Identify the Problem
136
Question the Obvious Consider Multiple Approaches Start At One End of the System
Establish a Theory of Probable Cause
137
Theory Confirmed Theory Not Confirmed
Test the Theory
138
Make Sure You Understand the Process Identify Potential Effects Backup Important Data Implement the Solution Escalate the Issue
Establish a Plan and Implement the Fix
139
A generic name for protocols that carry voice traffic over data networks.
voice over Internet protocol services (VoIP)
140
Confirm Functionality Put in Preventative Measures if Needed
Confirm the Solution Works
141
Add to the Knowledge Base Explain in Detail
Document Your Findings
142
Licensing model that grants permissive rights to end-users, such as to install, use, modify, and distribute a software product and its source code, as long as redistribution permits the same rights.
Open source
143
64-bit default file system for Windows, with file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas.
New Technology File System (NTFS)
144
Fragmentation occurs when a data file is not saved to contiguous sectors on an HDD and reduces performance. The defragmenter mitigates this and can also perform optimization operations for SSDs.
defragmentation
145
The collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).
Access Control List (ACL)
146
can be used to recover the data or at least restore the file system to a good working state.
Journaling
147
if you want to allocate a certain amount of storage and set limits on maximum capacity and the size of individual files
Limitations
148
Files and folders with this attribute do not appear in directory listings unless the option to view hidden files and folders is enabled.
Hidden Files
149
Very old file systems limited file names to eight characters plus a three-character extension. Modern file systems support longer file names (usually up to 255 characters) and complete directory paths.
Naming Rules
150
These include pictures, videos, and audio files.
Multimedia files
151
These range from plain text documents to Adobe PDFs to Google Docs, which can be saved online or locally.
Document or text file
152
These include spreadsheets and databases.
Data files
153
These are software programs that run on your computer, like a browser or your favorite game.
Executable files
154
macOS uses Disk Image (.dmg) files to distribute software, but for archiving purposes, it commonly uses standard formats like .zip. Like Linux, macOS can also use archive formats such as .tar.gz.
Archived files
155
These include web pages in .html format, as well as cache and cookies.
Internet files
156
Clone copy of an operating system installation (including installed software, settings, and user data) stored as a file on disk. VMs use images to store persistent data, and the technology is also used to make system backups.
Image
157
Persistent mass-storage device implemented using flash memory.
solid-state drive (SSD)
158
Amount of data transfer supported by a link in typical conditions. This can be measured in various ways with different software applications. Goodput is typically used to refer to the actual "useful" data rate at the application layer (less overhead from headers and lost packets).
Throughput
159
One thousand (1,000) bits per second. Slow network links are measured in Kbps. ## Footnote Slow network links are measured in Kbps.
Kilobits per second (Kbps) | Throughput Units
160
One million (1,000,000) bits per second. ## Footnote Wireless networks and residential Internet links typically have this rate of throughput.
Megabits per second (Mbps) | Throughput Units
161
One billion (1,000,000,000) bits per second. ## Footnote The latest PC bus standards and networks can support this higher level of throughput.
Gigabits per second (Gbps) | Throughput Units
162
One trillion (1,000,000,000,000) bits per second ## Footnote This sort of capacity is found in major telecommunications links between data centers, cities, and countries.
Terabits per second (Tbps): | Throughput Units
163
| Throughput Units
164
1 Hz means one cycle per second. A cycle would just be how many times a process reoccurs. ## Footnote For example, if you clap your hands once every second, you're clapping at 1 Hertz. If you clap 10 times every second, you're clapping at 10 Hertz. We use Hertz (Hz) to describe how fast a device runs.
Hertz
165
signal from the master clock ## Footnote On a computer, laptop, tablet, or phone, the internal parts move data around using a synchronized clock. All these devices use a master clock to stay synchronized, or to stay working together smoothly.
square wave
166
Size and shape of a component, determining its compatibility. Form factor is most closely associated with PC motherboard, case, and power supply designs.
form factors
167
Standard PC case, motherboard, and power supply specification. Mini-, Micro-, and Flex-ATX specify smaller board designs.
advanced technology extended (ATX)
168
A processor socket type allowing the chip to be placed in the socket with as little risk of damaging the pins on the processor chip as possible.
zero insertion force (ZIF)
169
Connections between components on the motherboard and peripheral devices providing data pathways, memory addressing, power supply, timing, and connector/port form factor.
Buses
170
Legacy internal expansion bus supporting 32-bit parallel transfers working at 33 MHz.
peripheral component interconnect (PCI)
171
Internal expansion bus that uses serial point-to-point communications between devices. Each link can comprise one or more lanes (x1, x2, x4, x8, x12, x16, or x32). Each lane supports a full-duplex transfer rate of 250 MB/s (v1.0) up to about 4 GB/s (v5.0).
PCI express (PCIe)
172
Type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security.
Unified Extensible Firmware Interface (UEFI)
173
Legacy 32-bit firmware type that initializes hardware and provides a system setup interface for configuring boot devices and other hardware settings.
basic input/output system (BIOS)
174
Test routine built into PC firmware to confirm that system components are available at boot or to signal an error condition via a beep code or on-screen status message.
power-on self-test (POST)
175
A ROM chip is a special form of memory that has data written to it during the manufacturing process and thus is not amenable to alteration.
read-only memory (ROM)
176
CPU socket form factor used predominantly by Intel where connector pins are located on the socket.
land grid array (LGA)
177
CPU socket form factor used predominantly by AMD where connector pins are located on the CPU package.
pin grid array (PGA)
178
Cooling device fitted to PC components to optimize heat transfer.
heatsink
179
Cooling substance applied between a component and heat sink to optimize heat transfer.
thermal paste
180
Standard form factor for system memory. There are different pin configurations for different DDR-SDRAM RAM types
dual inline memory module (DIMM).
181
The science of creating machines with the ability to develop problem-solving and analysis strategies without significant human direction or intervention.
artificial intelligence (AI)
182
Serial ATA is the most widely used interface for hard disks on desktop and laptop computers. It uses a 7-pin data connector with one device per port. There are three SATA standards specifying bandwidths of 1.5 Gb/s, 3 Gb/s, and 6 Gb/s respectively. SATA drives also use a new 15-pin power connector, though adapters for the old style 4-pin Molex connectors are available. External drives are also supported via the eSATA interface.
Serial Advanced Technology Attachment (SATA)
183
Persistent mass-storage device implemented using flash memory.
solid state drives (SSD)
184
Storage device enclosure with network port and an embedded OS that supports typical network file access protocols (FTP and SMB for instance).
network attached storage (NAS)
185
Specifications that support redundancy and fault tolerance for different configurations of multiple-device storage systems. Commonly known as "RAID."
redundant array of independent disks (RAID).
186
A CRT receives an analog signal from the graphics adapter and forms a color image on the screen by illuminating red, green, and blue dots (triads), The screen size is the diagonal distance across the face of the CRT, though part of this area may be obscured by the case, making the viewable area considerably less than the quoted screen size. CRTs are no longer mass-manufactured and modern systems use LCD panels.
cathode ray tube (CRT)
187
Digital audio/video interface developed for use on both consumer electronics and computer equipment.
High Definition Multimedia Interface (HDMI),
188
Legacy video interface supporting analog-only signaling over a 15-pin D-shell connector.
video graphics array (VGA)
189
Digital audio/video interface developed by VESA. DisplayPort supports some cross-compatibility with DVI and HDMI devices.
190
Legacy video interface that supports digital only or digital and analog signaling.
digital visual interface (DVI).
191
A battery-powered device that supplies AC power that an electronic device can use in the event of power failure.
uninterruptible power supply (UPS).
192
A device that can be added or removed without having to restart the operating system.
hot-swappable
193
Data storage systems that organize electronic information into structured tables, allowing for the easy retrieval and interpretation of data. Many databases are operated using Structured Query Language (SQL, pronounced "sequel"). Database design, programming, and administration is complex and security should be considered as a critical requirement.
databases
194
The IT role responsible for the configuration, management, and support of database applications.
database administrators (DBAs)
195
Multiple users can get into, or access, the database at the same time. This allows people to use the data without waiting or taking turns.
Centralized access | Database Characteristics
196
Databases include security measures to ensure only authorized users can access the data. Different users have different permission levels. For example, a top-level administrator can view and edit all the data, while lower-level users might only see records but not change or delete them.
Security | Database Characteristics
197
The information in a database is valuable and losing it could cause significant damage to an organization. Databases are easy to back up, so database administrators (DBAs) can restore the data if something goes wrong.
Recovery | Database Characteristics
198
Databases can store thousands, millions, or even billions of data points. Imagine trying to keep track of a billion rows on a spreadsheet. It would not be easy. Fortunately, a good database makes analyzing a million records just as easy as analyzing a few dozen.
Scalability | Database Characteristics
199
A comma-separated value file type uses commas and new lines to organize information into cells in a table format, and stores the table as a text file. This file type uses the extension ".csv" and is one of the most common outputs for any spreadsheet program.
comma-separated value (CSV)
200
A system for structuring documents so that they are human and machine readable. Information within the document is placed within tags, which describe how information within the document is structured.
eXtensible Markup Language (XML).
201
A system of coded tags that identify the structure of the document files used for web pages.
HyperText Markup Language (HTML),
202
Structured database in which information is stored in tables where columns represent typed data fields and rows represent records. Tables can have relationships, established by linking a unique primary key field in one table with the same value in a foreign key field in another table. The overall structure of a particular database and its relations is called a schema.
relational database,
203
A unique identifier for a record that cannot contain duplicates and is used to reference a record.
Primary Key
204
A non-relational database for storing unstructured data, common with big data technologies.
NoSQL ## Footnote Unlike relational databases, these databases don't use traditional rows and columns.