1/110
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Information Technology
The use of computers, networks, and other technology to manage and process information.
Hardware
The physical components of a computer system, including the CPU, memory, and storage devices.
Software
The programs and applications that run on a computer, enabling it to perform specific tasks.
Network
A collection of computers and devices connected to share resources and information.
Database
An organized collection of data that can be easily accessed, managed, and updated.
Cloud Computing
The delivery of computing services over the internet, allowing for on-demand access to resources.
Cybersecurity
The practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Operating System
Software that manages computer hardware and provides services for application programs.
Programming
The process of designing and building executable computer software to accomplish a specific task.
User Interface
The means by which a user interacts with a computer or software application.
IT Support
Services that assist users in resolving technical issues with their hardware or software.
Data Backup
The process of copying and archiving computer data to prevent loss in case of failure.
IT Governance
The framework for decision-making and accountability in managing IT resources and investments.
E-commerce
The buying and selling of goods and services over the internet.
Artificial Intelligence
The simulation of human intelligence processes by machines, especially computer systems.
Big Data
Extremely large data sets that can be analyzed computationally to reveal patterns and trends.
Web Development
The work involved in developing a website for the internet or an intranet.
Social Media
Platforms that enable users to create and share content or participate in social networking.
IT Infrastructure
The composite of hardware, software, networks, and facilities that support IT services.
Digital Transformation
The integration of digital technology into all areas of a business, fundamentally changing operations.
Information Technology (IT)
The use of computers, networks, software, and data to store, process, and transmit information in organizations.
Computer System
A complete working computer, including hardware, operating system (OS), and peripheral devices used to input, process, output, and store data.
Hardware
The physical components of a computer system, such as the CPU (Central Processing Unit), RAM (Random Access Memory), storage devices, motherboard, and peripherals.
Software
A collection of programs and data that tell the hardware what to do and how to do it, including applications and system software.
System Software
Software that manages hardware and provides core services, such as operating systems (OS), utility programs, and device drivers.
Application Software
Programs that help users perform specific tasks, such as word processing, web browsing, spreadsheets, or games.
Operating System (OS)
System software that manages computer hardware and software resources and provides common services for computer programs.
User Interface (UI)
The part of a system that users interact with, including screens, menus, windows, icons, and command prompts.
Graphical User Interface (GUI)
A type of user interface that uses windows, icons, menus, and pointers (WIMP) instead of only text commands.
Command-Line Interface (CLI)
A text-based interface where the user types commands to interact with the operating system or applications.
CPU (Central Processing Unit)
The 'brain' of the computer that executes instructions and performs calculations.
RAM (Random Access Memory)
Short-term, volatile memory used by the computer to store data and programs that are currently in use.
Storage Device
Hardware used to store data long term, such as HDDs (Hard Disk Drives), SSDs (Solid-State Drives), USB flash drives, and optical discs.
Hard Disk Drive (HDD)
A storage device that uses spinning magnetic disks to store data; high capacity but slower and mechanical compared to SSDs.
Solid-State Drive (SSD)
A storage device with no moving parts that stores data on flash memory chips; faster and more durable than HDDs.
Input Device
A device used to send data or commands into a computer, such as a keyboard, mouse, scanner, or microphone.
Output Device
A device that receives data from a computer and presents it to the user, such as a monitor, printer, or speakers.
Peripheral Device
Any external device that connects to a computer, such as a keyboard, mouse, printer, webcam, or external drive.
Firmware
Software programmed into read-only memory (ROM) on hardware devices that provides low-level control (for example, BIOS/UEFI).
BIOS / UEFI
Firmware that initializes hardware when the computer starts and helps boot the operating system (OS).
Data
Raw, unprocessed facts such as numbers, text, or images, without context or meaning.
Information
Data that has been processed, organized, or structured to make it meaningful and useful.
Bit
The smallest unit of data in computing, represented as a 0 or 1.
Byte
A group of 8 bits, typically representing a single character like a letter or number.
File
A named collection of data stored on a drive, such as a document, image, or program.
Folder (Directory)
A container used to organize files and other folders on a storage device.
File Extension
The suffix at the end of a filename (such as .docx, .jpg, .exe) that indicates the file type.
File Format
The structure or layout of a file that defines how data is stored and encoded (for example, .txt, .jpg, .mp4).
Database (DB)
An organized collection of related data stored electronically and accessed by software.
Database Management System (DBMS)
Software that creates, manages, and provides access to databases (examples: MySQL, SQL Server).
Computer Network
A group of two or more connected devices that can share data and resources.
Node
Any device connected to a network, such as a computer, printer, or router.
LAN (Local Area Network)
A network that connects devices in a limited area such as a home, office, or campus.
WAN (Wide Area Network)
A network that covers a large geographic area and often connects multiple LANs (for example, the internet).
Internet
A global network of interconnected networks that use standard protocols (such as TCP/IP) to communicate.
Intranet
A private network that uses internet technologies but is accessible only to an organization's authorized users.
Extranet
A controlled private network that grants external partners limited access to an organization's intranet resources.
IP Address
A numerical label (IPv4 or IPv6) assigned to each device on a network so it can send and receive data.
TCP/IP (Transmission Control Protocol / Internet Protocol)
The basic communication protocols that define how data is packaged, addressed, transmitted, and received on the internet.
DNS (Domain Name System)
The system that translates human-friendly domain names (like example.com) into IP addresses.
Router
A device that forwards data packets between networks and directs traffic on the internet.
Switch
A network device that connects multiple devices on a LAN and forwards data only to the correct destination device (MAC address-based).
Modem
A device that converts signals from an internet service provider (ISP) into a form your router or computer can use.
Wireless Access Point (WAP)
A device that allows wireless devices to connect to a wired network using Wi‑Fi.
Wi‑Fi
A wireless networking technology (IEEE 802.11) that uses radio waves to provide high-speed internet and network connections.
Bandwidth
The maximum amount of data that can be transmitted over a network connection in a given amount of time, often measured in Mbps or Gbps.
Latency
The time delay between sending a request and receiving a response over a network, usually measured in milliseconds (ms).
Download
Receiving data from a remote system to your local device over a network or the internet.
Upload
Sending data from your local device to a remote system over a network or the internet.
Cloud Computing
Delivery of computing services (servers, storage, databases, software, networking, etc.) over the internet on demand.
IaaS (Infrastructure as a Service)
Cloud service model where providers offer virtualized computing resources such as servers, storage, and networks over the internet.
PaaS (Platform as a Service)
Cloud service model that provides a platform (OS, runtime, tools) for developing, testing, and deploying applications without managing underlying infrastructure.
SaaS (Software as a Service)
Cloud service model where software applications are delivered over the internet on a subscription or pay-per-use basis.
Virtualization
Technology that allows multiple virtual machines (VMs) to run on a single physical server, sharing hardware resources.
Virtual Machine (VM)
A software-based simulation of a physical computer that runs its own operating system (guest OS) and applications.
Backup
A copy of data stored separately (on another device, location, or cloud) so it can be restored if the original is lost or damaged.
Redundancy
The duplication of critical components or data (for example, multiple drives in RAID) to increase reliability and availability.
Uptime
The amount of time a system or service is available and functioning correctly, often expressed as a percentage.
Downtime
The amount of time a system or service is unavailable or not functioning correctly.
Scalability
The ability of a system to handle increased workload by adding resources like servers, storage, or bandwidth (vertical or horizontal scaling).
Cybersecurity
The practice of protecting systems, networks, and data from digital attacks, damage, or unauthorized access.
Threat
A potential cause of an unwanted impact to a system or organization, such as malware, hacking, or insider abuse.
Vulnerability
A weakness in a system, network, or process that can be exploited by a threat.
Risk
The combination of the likelihood of a threat exploiting a vulnerability and the impact if it happens.
Malware (Malicious Software)
Software designed to damage, disrupt, or gain unauthorized access to a system (includes viruses, worms, Trojans, ransomware, spyware).
Virus
A type of malware that attaches itself to a legitimate program or file and can replicate and spread when that program or file runs.
Worm
A self-replicating malware program that spreads across networks without attaching to other files.
Trojan Horse
Malware disguised as legitimate software that tricks users into installing it, often creating a backdoor.
Ransomware
Malware that encrypts a victim's data and demands payment (ransom) for the decryption key.
Spyware
Malware that secretly monitors user activity and collects information without consent.
Phishing
A social engineering attack that uses deceptive emails, messages, or websites to trick users into revealing sensitive information.
Social Engineering
Manipulating people into giving up confidential information or performing risky actions, often bypassing technical controls.
Encryption
The process of converting data into a coded form (ciphertext) so that only authorized parties with a key can read it.
Decryption
The process of converting encrypted data (ciphertext) back into its original readable form (plaintext).
Authentication
The process of verifying the identity of a user or device, often using credentials such as usernames, passwords, tokens, or biometrics.
Authorization
The process of determining what an authenticated user is allowed to do or access (permissions, roles).
Multi-Factor Authentication (MFA)
A security method that requires two or more independent credentials (factors), such as password plus code or biometric.
Password Policy
A set of rules for creating and managing passwords (length, complexity, expiration) to improve security.
Firewall
Hardware or software that monitors and controls incoming and outgoing network traffic based on security rules.