Deck A Flashcards

(148 cards)

1
Q

DHCP

A

Dynamic Host Configuration Protocol – automatically assigns IP addresses to devices on a network so they can communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS

A

Domain Name System – translates domain names (like google.com) to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP Address

A

A unique number assigned to each device on a network, used to identify the device on that network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Subnet Mask

A

Defines the network vs host portion of an IP address; helps routers know which devices are local vs on other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Default Gateway

A

The IP address of the router that devices use to send traffic outside their local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAC Address

A

Media Access Control address – hardware-burned unique identifier assigned to a device’s network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NAT

A

Network Address Translation – translates private (internal) IP addresses to a public IP to enable internet access from LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP

A

Transmission Control Protocol – connection-oriented, reliable data delivery; guarantees delivery, correct order, error checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

UDP

A

User Datagram Protocol – connectionless, faster, no guarantee of delivery/order; used for streaming/voice/video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP

A

HyperText Transfer Protocol – used for standard web traffic (websites) over port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTPS

A

HTTP Secure – encrypted HTTP, secures data over the web (TLS/SSL), port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FTP

A

File Transfer Protocol – used to transfer files over a network; not encrypted, ports 20/21.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SFTP

A

SSH File Transfer Protocol – secure (encrypted) file transfer over SSH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH

A

Secure Shell – encrypted remote command-line access and file transfer (SFTP), port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SMTP

A

Simple Mail Transfer Protocol – sends outbound email, common ports 25 or 587.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3

A

Post Office Protocol v3 – old standard for retrieving email from server to client, ports 110 or 995 (secure).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IMAP

A

Internet Message Access Protocol – retrieves/manages email from server to client (more modern), ports 143 or 993 (secure).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RDP

A

Remote Desktop Protocol – Microsoft’s remote desktop tool, port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DNS Server

A

A server that responds to DNS queries, returning IP addresses for domain names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Router

A

Network device that forwards data packets between networks, routes traffic to/from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Switch

A

Network device that connects multiple devices on a LAN and uses MAC addresses to forward data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Firewall

A

Hardware or software that enforces network security rules to allow/block traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

LAN

A

Local Area Network – a network covering a small geographic area like a home or office building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

WAN

A

Wide Area Network – a network covering a larger geographic region, often connecting multiple LANs (e.g. via the internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Ethernet
A family of wired networking technologies common in LANs, often using twisted‑pair or coax cabling.
26
Twisted-Pair Cable (UTP / STP)
Unshielded or Shielded Twisted‑Pair cabling used in Ethernet networks (e.g. Cat5e, Cat6).
27
Fiber Optic Cable
Cable that uses light to transmit data, extremely fast and resistant to electromagnetic interference, used for backbone or long-distance links.
28
Coaxial Cable
Older cable type using a central conductor and shield, used in older broadband/internet connections or cable TV.
29
BIOS
Basic Input/Output System – firmware interface between hardware and OS, used on older machines for boot configuration.
30
UEFI
Unified Extensible Firmware Interface – modern replacement for BIOS, supports larger drives, faster boot, security features (Secure Boot).
31
Boot Loader
A small program that loads the OS from disk into memory during boot (e.g. GRUB, Windows Boot Manager).
32
Partition
Division of a storage device (HDD/SSD) that helps organize data; can contain different file systems.
33
File System
Defines how data is stored/retrieved on a partition (e.g. NTFS, FAT32, exFAT, ext4).
34
NTFS
New Technology File System – default Windows file system supporting permissions, large files, journaling.
35
FAT32
Legacy file system supporting smaller drives and high compatibility, but limited file size (≤4GB).
36
exFAT
Extended FAT file system – designed for flash drives/SD cards, handles large files and cross-platform compatibility.
37
Swap/Page File
Portion of storage used as “virtual memory” when RAM is full.
38
RAM
Random Access Memory – volatile memory used by CPU to store data for running programs; fast but loses data on power off.
39
DDR4 / DDR5
Generations of RAM modules — newer versions are faster and more efficient.
40
SSD
Solid State Drive – fast storage with no moving parts, much faster than HDD.
41
HDD
Hard Disk Drive – mechanical storage device, cheaper per GB but slower than SSD.
42
M.2/NVMe
A form-factor and protocol for SSDs offering high speed and compact size compared to SATA.
43
Power Supply Unit (PSU)
Provides power to all computer components; rated in watts and quality matters for stability.
44
Motherboard
Main circuit board that houses CPU, RAM, slots for expansion, chipset, connectors.
45
CPU
Central Processing Unit – “brain” of the computer, executes instructions.
46
GPU
Graphics Processing Unit – handles images, video, rendering; can be integrated or discrete.
47
PCIe
Peripheral Component Interconnect Express – high-speed interface for expansion cards (GPU, SSD, etc.).
48
BIOS — CMOS Battery
Keeps BIOS settings (date/time, boot order) when PC is powered off.
49
Heat Sink / Fan / Thermal Paste
Used to regulate and dissipate CPU/GPU heat to prevent overheating.
50
Case / Chassis
Enclosure housing all computer components, provides airflow and protection.
51
POST
Power-On Self-Test – a diagnostic test run by BIOS/UEFI on startup to check hardware health.
52
Router vs Modem
Modem connects to ISP and converts signal; router directs traffic within your network; often combined in “gateway.”
53
DHCP Reservation
Configuring DHCP server to always assign the same IP to a device based on its MAC address.
54
Static IP Address
Manually assigning an IP address (not dynamic) — useful for servers, printers, or devices needing fixed address.
55
Subnetting
Dividing networks into smaller subnetworks (subnets) to improve efficiency/security; involves calculating subnet mask, network ID, broadcast address.
56
CIDR Notation
Classless Inter-Domain Routing notation (e.g. /24, /16) used to represent subnet masks compactly.
57
Default Printer
Printer set as default device where print jobs are sent automatically.
58
LAN Party
Term used for multiple devices connected locally for gaming/transfer — not an exam term but useful context.
59
Firmware
Software stored in hardware (like BIOS/UEFI, routers, SSD controllers) — manages device-level control.
60
Driver
Software allowing OS to communicate with and control hardware devices.
61
Virtual Machine (VM)
Software-based emulation of a computer system; allows multiple OS on one physical machine.
62
Hypervisor
Software layer that manages virtual machines (e.g. VirtualBox, VMware, Hyper-V).
63
Command Line Interface (CLI)
Text-based interface to interact with OS or network tools (e.g. Command Prompt, Terminal).
64
GUI
Graphical User Interface — OS or software interface with windows, icons, menus.
65
Ping
Network utility that sends ICMP echo requests to test connectivity and measure latency.
66
ipconfig / ifconfig
Command-line tool showing a device’s IP configuration on Windows (ipconfig) or Linux/macOS (ifconfig).
67
tracert / traceroute
Network tool to show the path and transit delays of packets across a network.
68
nslookup / dig
DNS lookup tools to query DNS servers for domain-to-IP or IP-to-domain resolution.
69
netstat
Network tool to show active connections, listening ports, and network statistics.
70
ARP
Address Resolution Protocol – maps IP addresses to MAC addresses within a LAN.
71
Port 80
Default port for HTTP web traffic.
72
Port 443
Default port for HTTPS secure web traffic.
73
Port 21
Default port for FTP (unencrypted file transfer).
74
Port 22
Default port for SSH / SFTP (secure remote access & file transfer).
75
Port 25 / 587
Default ports for SMTP (sending email).
76
Port 110
Default port for POP3 (retrieving email).
77
Port 143 / 993
Ports for IMAP / IMAP Secure (email retrieval).
78
Port 3389
Default port for RDP (Remote Desktop Protocol).
79
TLS / SSL
Protocols to encrypt network traffic, ensuring secure communication (used in HTTPS, secure email, etc.).
80
VPN
Virtual Private Network – encrypts/encapsulates internet traffic, allowing secure remote access or privacy.
81
Two‑Factor Authentication (2FA)
Security method requiring two forms of verification (password + second factor) to access an account or system.
82
Malware / Virus / Ransomware
Malicious software designed to damage or exploit a system or data.
83
Antivirus / Anti‑malware
Software that detects, quarantines, or removes malware/viruses from a system.
84
Patch / Update
Software improvements/fixes for OS, firmware, drivers — often includes security fixes.
85
Backup
Copying data to another location (cloud, external drive) to prevent data loss.
86
Encryption
Converting data into code to prevent unauthorized access — important for security and privacy.
87
User Account Control (UAC)
Windows security feature that asks permission before allowing changes that affect system-wide settings.
88
Permissions (Read / Write / Execute)
File/folder security settings that control which users can read, modify, or execute files.
89
Workgroup vs Domain
Workgroup = peer-to-peer network model (small/home), Domain = centralized authentication/management (business/enterprise).
90
Active Directory (AD)
Microsoft’s directory service for domains — manages users, computers, policies (common in business networks).
91
OSI Model – Layer 1 (Physical)
Describes physical network components like cables, hubs, repeaters.
92
OSI Model – Layer 2 (Data Link)
Handles MAC addressing and switches; ensures error-free transfer between adjacent hosts.
93
OSI Model – Layer 3 (Network)
Manages IP addressing and routing (routers, IP protocol).
94
OSI Model – Layer 4 (Transport)
Handles transport protocols (TCP/UDP), flow control, multiplexing.
95
Swap/Virtual Memory
Disk-based memory used when RAM is full — allows systems to handle more/ larger tasks.
96
Safe Mode
A minimal diagnostic mode in OS to troubleshoot problems (drivers, startup issues).
97
Device Manager (Windows)
Tool to manage hardware devices and drivers (install, update, disable, uninstall).
98
Disk Management (Windows)
Tool to manage partitions, volumes, drives, format drives, assign letters.
99
Event Viewer (Windows)
Tool to view system, security, and application logs — helpful for troubleshooting.
100
msconfig / system configuration
Windows tool to manage startup programs, boot options, services.
101
Command: chkdsk
Windows utility to check disk integrity and fix file system errors.
102
Command: sfc /scannow
Windows utility to check and repair protected system files.
103
Command: defrag (legacy) / Optimize Drives
Windows tool to defragment/optimize hard drives (mostly HDDs).
104
Command: format
Utility to prepare a drive/partition for data — erases and sets up filesystem.
105
Command: ping -t / continuous ping
Send repeated ping packets to monitor latency or detect network drops.
106
Command: ipconfig /release & ipconfig /renew
Windows commands to release current DHCP lease and request a new one (useful for network troubleshooting).
107
Command: net use (Windows)
Maps a network drive to a share or disconnects mapped drives.
108
Command: ls / cd / mkdir / rm (Linux/macOS)
Basic directory and file commands in Unix-style OS.
109
Command: sudo
Linux/macOS command to run tasks as superuser (privileged).
110
Loopback Address 127.0.0.1
A special IP that points back to the same machine (used for testing).
111
Broadcast Address
An IP address that sends a packet to all devices on a network segment.
112
WLAN / Wi‑Fi
Wireless LAN — network connectivity via wireless standards (802.11a/b/g/n/ac/ax).
113
SSID
Service Set Identifier — the name assigned to a Wi-Fi network.
114
SSID Hiding
Security option to hide network name from casual scanning (not a real security barrier alone).
115
MAC Filtering
Router security method limiting which MAC addresses can join the network.
116
SSID vs Password
SSID = network name; Password = key needed to join.
117
2.4 GHz vs 5 GHz Wi‑Fi
Different frequency bands; 2.4 GHz has better range, 5 GHz offers faster speed but shorter range.
118
Airplane Mode
Disables all wireless communications on a device (cell, Wi‑Fi, Bluetooth).
119
Driver Rollback
Reverting a device driver to a previous version if new driver causes issues.
120
Plug and Play (PnP)
OS feature that auto‑detects and configures new hardware when plugged in.
121
UTP vs STP
Unshielded Twisted Pair vs Shielded Twisted Pair cable — STP has shielding for environments with interference.
122
Patch Panel (Network)
Hardware unit connecting incoming and outgoing cables, organizes wiring in structured networks.
123
PoE – Power over Ethernet
Delivers electrical power through Ethernet cables to compatible devices (phones, cameras, access points).
124
Backup Battery / UPS
Uninterruptible Power Supply — provides power if main supply fails, helps prevent data loss or corruption.
125
Active / Passive Cooling (PC)
Active uses fans/heatsinks; passive relies on heat sinks or conduction — relevant for thermal management.
126
Firewall – Port Blocking vs Port Forwarding
Port blocking denies traffic; port forwarding routes traffic to internal devices (e.g. gaming PC, server).
127
Demilitarized Zone (DMZ) (Network)
Subnetwork that exposes external‑facing services (web server, gaming server) while keeping LAN secure.
128
Hot-swappable Devices
Hardware that can be removed/installed without shutting down the system (e.g. some drives, USB devices).
129
External vs Internal Drives
External drives connect via USB/Thunderbolt; internal drives are mounted inside PC via SATA/NVMe.
130
Encryption at Rest vs In Transit
At rest = data stored encrypted on disk; in transit = data encrypted while moving over network (HTTPS, VPN).
131
Windows Registry
Database used by Windows to store configuration/settings for OS and installed programs.
132
Linux / macOS Permissions: rwx
File permissions: read (r), write (w), execute (x) — defines what users can do with files/folders.
133
User vs Administrator (Privileges)
Administrator (or root) has full control; standard user has restricted access — important for security and preventing damage.
134
Shared Folder vs Local Folder
Shared = accessible over network; Local = only on the device — key for network sharing and permissions.
135
Clipboard and Copy/Paste Functions
Basic OS feature, but can differ between OS (Windows, macOS, Linux) — useful for usability troubleshooting.
136
Driver Signature Enforcement (Windows)
Security feature requiring drivers to be digitally signed before they’ll load — protects against malicious drivers.
137
Virtualization Support (VT‑x / AMD‑V)
CPU features that allow virtual machines to run efficiently — relevant if you're using VMs for labs or testing.
138
Hypervisor Types: Type‑1 vs Type‑2
Type‑1 = “bare‑metal” hypervisor (runs directly on hardware), Type‑2 = hypervisor software running on host OS — relevant for virtualization planning.
139
Mobile Device OS Differences (iOS / Android / Windows / iPadOS)
Key when supporting mobile devices — different update processes, file systems, permissions, security models.
140
IMEI / MAC (for mobile devices)
Identifiers for mobile devices — needed for tracking, security, network access control, device support.
141
VPN Client vs VPN Server
Client = your device connecting through VPN; Server = endpoint providing encrypted network access (used by remote workers).
142
Two‑Phase Boot (UEFI + OS Loader)
Modern boot process: UEFI loads boot loader, which loads OS — important for troubleshooting boot issues.
143
Safe Boot
144
(iOS / Android / Windows / iPadOS)
Key when supporting mobile devices — different update processes, file systems, permissions, security models.
145
Safe Boot / Recovery Mode
OS mode for repairing system issues — loads minimal drivers/services to help troubleshoot or remove malware.
146
Command: sfc /scannow (Windows)
Checks integrity of protected system files and repairs them — useful for fixing corrupt or missing system files.
147
Command: chkdsk /f
Checks hard drive for errors and repairs them — useful on HDDs or if file systems get corrupted.
148
Command: format / quick format
Prepares a storage device for use by creating a new filesystem — erases all data, used for reinstall or cleaning drives.