Terms

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/130

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:16 PM on 10/22/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

131 Terms

1
New cards

What does MIME stand for?

Multipurpose Mail Extension.

2
New cards

What is the purpose of MIME?

It extends email format to support text in non-ASCII characters and attachments like audio, video, and images.

3
New cards

What does SMTP stand for?

Simple Mail Transfer Protocol.

4
New cards

What is the function of SMTP?

It's a protocol for sending and receiving email messages.

5
New cards

What does RTP stand for?

Real-time Transfer Protocol.

6
New cards

What is RTP used for?

Delivering audio and video over IP networks, used in streaming and video conferencing.

7
New cards

What does NAPT stand for?

Network Address Port Translation.

8
New cards

What is the purpose of NAPT?

It translates multiple network addresses into a single one by altering port numbers.

9
New cards

What does ARP stand for?

Address Resolution Protocol.

10
New cards

What is the function of ARP?

It maps IP addresses to MAC addresses.

11
New cards

What does DHCP stand for?

Dynamic Host Configuration Protocol.

12
New cards

What does DHCP do?

Automates IP address configuration and network services like DNS for devices on a network.

13
New cards

What does TCP stand for?

Transmission Control Protocol.

14
New cards

What is the purpose of TCP?

It ensures reliable, ordered, and error-checked data transmission over the internet.

15
New cards

What does UDP stand for?

User Datagram Protocol.

16
New cards

What is the function of UDP?

It allows fast, connectionless data transmission without error checking.

17
New cards

What does RSA stand for?

Rivest-Shamir-Adleman.

18
New cards

What is RSA used for?

It is a public-key encryption algorithm used to secure sensitive data.

19
New cards

What does DSA stand for?

Digital Signature Algorithm.

20
New cards

What is DSA used for?

Authenticating digital messages using two keys: a private key and a public key.

21
New cards

What does DH stand for?

Diffie-Hellman.

22
New cards

What is the purpose of the Diffie-Hellman protocol?

To securely establish shared secrets over public channels.

23
New cards

What does AES stand for?

Advanced Encryption Standard.

24
New cards

What is AES used for?

A widely used symmetric encryption standard for securing data.

25
New cards

What is a System Audit?

Evaluation of an organization's practices to ensure compliance with policies and regulations.

26
New cards

What is a Unit Test?

Testing individual components of code to ensure they function as expected.

27
New cards

What is an Acceptance Test?

A test to verify if a product meets required specifications or contract conditions.

28
New cards

What is a Qualification Test?

Evaluation of a product or system to ensure it meets performance standards before release.

29
New cards

What does SATA stand for?

Serial ATA.

30
New cards

What is SATA used for?

Connecting storage devices like hard drives and SSDs.

31
New cards

What is the Key Frame Method?

A traditional animation technique where keyframes define motion.

32
New cards

What is Morphing?

A visual effect that transitions one image or shape into another.

33
New cards

What is Motion Capture?

A technique for recording the movements of objects, humans, or animals.

34
New cards

What is a Pixel Shader?

A program that determines the color and appearance of pixels in 3D graphics.

35
New cards

What does Roll Forward mean in databases?

Applies changes to a database during recovery to bring it up to date.

36
New cards

What is a Patch Cable?

A physical cable used to connect network devices.

37
New cards

What is a Repeater Hub?

A network device that rebroadcasts incoming signals to all connected devices.

38
New cards

What does a Router do?

Makes forwarding decisions based on IP addresses rather than MAC addresses.

39
New cards

What does LTE stand for?

Long Term Evolution.

40
New cards

What is LTE?

A mobile communication standard that supports packet switching.

41
New cards

What is a MAC Address?

A protocol that manages access to the physical network medium.

42
New cards

What does MDM stand for?

Mobile Device Management.

43
New cards

What is MDM?

A system for managing mobile devices in organizations.

44
New cards

What does VoIP stand for?

Voice over Internet Protocol.

45
New cards

What is RFID used for?

Wireless identification and tracking of objects.

46
New cards

What does TKIP stand for?

Temporal Key Integrity Protocol.

47
New cards

What is TKIP used for?

A security protocol used in Wi-Fi encryption (WPA).

48
New cards

What is a Web Beacon?

A small, invisible image used for tracking user activity on websites.

49
New cards

What is Cross-site scripting (XSS)?

An attack where malicious scripts are injected into a legitimate website.

50
New cards

What is DNS cache poisoning?

An attack that inserts incorrect DNS information into a DNS resolver's cache.

51
New cards

What is SEO poisoning?

An attack that manipulates malicious websites to rank highly in search engine results.

52
New cards

What is Social Engineering?

An attack method where attackers trick people into divulging sensitive information.

53
New cards

What does TLS stand for?

Transport Layer Security.

54
New cards

What is the purpose of TLS?

To ensure secure communication over a computer network.

55
New cards

What does MRP stand for?

Material Requirements Planning.

56
New cards

What is MRP used for?

Managing production materials and inventory based on production schedules.

57
New cards

What does ICMP stand for?

Internet Control Message Protocol.

58
New cards

What is the purpose of ICMP?

Sending error messages and operational information, such as availability of services.

59
New cards

What does NTP stand for?

Network Time Protocol.

60
New cards

What is the function of NTP?

To synchronize the clocks of devices over a network.

61
New cards

What does RIP stand for?

Routing Information Protocol.

62
New cards

What is RIP used for?

Determining the best route for data by counting the number of hops to the destination.

63
New cards

What does APOP stand for?

Authenticated Post Office Protocol.

64
New cards

What is APOP used for?

Authentication mechanism used in POP3 for retrieving emails.

65
New cards

What does POP3S stand for?

Post Office Protocol 3 Secure.

66
New cards

What is S/MIME?

A protocol for securing emails by providing encryption and digital signatures.

67
New cards

What is SMTP-AUTH?

An extension of the SMTP protocol allowing authentication with the mail server.

68
New cards

What is Changeability in software?

The ease with which a software system can be modified.

69
New cards

What is Interoperability?

The ability of a system to work with other systems seamlessly.

70
New cards

What is Portability in software?

The ease of modifying software to operate on different platforms.

71
New cards

What is Usability in software design?

How easily users can learn to use the software.

72
New cards

What is Backtracking?

A problem-solving technique where you revert to a previous step.

73
New cards

What is Forward Engineering?

Moving from high-level abstractions to actual system implementation.

74
New cards

What is Reengineering?

Analyzing and modifying an existing system to improve it.

75
New cards

What is Reverse Engineering?

Analyzing a system to extract knowledge or recreate design elements.

76
New cards

What is Core Competence?

The unique strengths that give a company a competitive advantage.

77
New cards

What is Corporate Governance?

The system by which companies are directed and controlled.

78
New cards

What is Corporate Identity?

The image or branding of a company that reflects its values.

79
New cards

What is Stakeholder Analysis?

Identifying and assessing the influence of various stakeholders.

80
New cards

What is a Control Chart?

A graph used to monitor the stability of processes over time.

81
New cards

What is a Histogram?

A bar chart displaying the frequency distribution of data.

82
New cards

What is a Pareto Chart?

A bar graph showing the relative importance of different factors.

83
New cards

What is a Scatter Diagram?

A graph showing the relationship between two variables.

84
New cards

What is an Accumulator in CPU?

A special register storing intermediate results of arithmetic operations.

85
New cards

What is an Index Register?

A register that holds an index value for modifying operand addresses.

86
New cards

What is an Instruction Register?

A register that temporarily holds the current instruction being executed.

87
New cards

What is a Program Counter?

A special register containing the address of the next instruction.

88
New cards

What is a Fatal Error?

A serious error causing a program to terminate unexpectedly.

89
New cards

What is a Page Fault?

Occurs when a program accesses a page not currently loaded into memory.

90
New cards

What is a Scheduling Error?

Issues related to the scheduling of processes or threads.

91
New cards

What is a Segmentation Fault?

An error occurring when a program accesses a prohibited memory segment.

92
New cards

What is a Backup File?

A copy of the database stored separately to prevent data loss.

93
New cards

What is a Checkpoint File?

Records the state of the database at a specific point in time.

94
New cards

What is a Dump File?

A file containing a snapshot of the database.

95
New cards

What is a Log File?

A file recording all transactions and changes made to the database.

96
New cards

What is Cross-site request Forgery?

An attack tricking users into executing unwanted actions on a website.

97
New cards

What is OGNL Injection?

An attack targeting systems using Object-Graph Navigation Language.

98
New cards

What is SQL Injection?

An attack exploiting vulnerabilities by injecting malicious SQL queries.

99
New cards

What is Brute Force?

Systematically trying all combinations of passwords to find the correct one.

100
New cards

What is a Denial of Service attack?

An attack aimed at making a service unavailable by overwhelming it.

Explore top notes

Explore top flashcards

flashcards
bio 2
44
Updated 1168d ago
0.0(0)
flashcards
Renaissance
30
Updated 47d ago
0.0(0)
flashcards
AP Lang 1st Day Quiz
24
Updated 284d ago
0.0(0)
flashcards
List A page 1
28
Updated 1230d ago
0.0(0)
flashcards
bio exam 3
186
Updated 1081d ago
0.0(0)
flashcards
bio 2
44
Updated 1168d ago
0.0(0)
flashcards
Renaissance
30
Updated 47d ago
0.0(0)
flashcards
AP Lang 1st Day Quiz
24
Updated 284d ago
0.0(0)
flashcards
List A page 1
28
Updated 1230d ago
0.0(0)
flashcards
bio exam 3
186
Updated 1081d ago
0.0(0)