1/130
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What does MIME stand for?
Multipurpose Mail Extension.
What is the purpose of MIME?
It extends email format to support text in non-ASCII characters and attachments like audio, video, and images.
What does SMTP stand for?
Simple Mail Transfer Protocol.
What is the function of SMTP?
It's a protocol for sending and receiving email messages.
What does RTP stand for?
Real-time Transfer Protocol.
What is RTP used for?
Delivering audio and video over IP networks, used in streaming and video conferencing.
What does NAPT stand for?
Network Address Port Translation.
What is the purpose of NAPT?
It translates multiple network addresses into a single one by altering port numbers.
What does ARP stand for?
Address Resolution Protocol.
What is the function of ARP?
It maps IP addresses to MAC addresses.
What does DHCP stand for?
Dynamic Host Configuration Protocol.
What does DHCP do?
Automates IP address configuration and network services like DNS for devices on a network.
What does TCP stand for?
Transmission Control Protocol.
What is the purpose of TCP?
It ensures reliable, ordered, and error-checked data transmission over the internet.
What does UDP stand for?
User Datagram Protocol.
What is the function of UDP?
It allows fast, connectionless data transmission without error checking.
What does RSA stand for?
Rivest-Shamir-Adleman.
What is RSA used for?
It is a public-key encryption algorithm used to secure sensitive data.
What does DSA stand for?
Digital Signature Algorithm.
What is DSA used for?
Authenticating digital messages using two keys: a private key and a public key.
What does DH stand for?
Diffie-Hellman.
What is the purpose of the Diffie-Hellman protocol?
To securely establish shared secrets over public channels.
What does AES stand for?
Advanced Encryption Standard.
What is AES used for?
A widely used symmetric encryption standard for securing data.
What is a System Audit?
Evaluation of an organization's practices to ensure compliance with policies and regulations.
What is a Unit Test?
Testing individual components of code to ensure they function as expected.
What is an Acceptance Test?
A test to verify if a product meets required specifications or contract conditions.
What is a Qualification Test?
Evaluation of a product or system to ensure it meets performance standards before release.
What does SATA stand for?
Serial ATA.
What is SATA used for?
Connecting storage devices like hard drives and SSDs.
What is the Key Frame Method?
A traditional animation technique where keyframes define motion.
What is Morphing?
A visual effect that transitions one image or shape into another.
What is Motion Capture?
A technique for recording the movements of objects, humans, or animals.
What is a Pixel Shader?
A program that determines the color and appearance of pixels in 3D graphics.
What does Roll Forward mean in databases?
Applies changes to a database during recovery to bring it up to date.
What is a Patch Cable?
A physical cable used to connect network devices.
What is a Repeater Hub?
A network device that rebroadcasts incoming signals to all connected devices.
What does a Router do?
Makes forwarding decisions based on IP addresses rather than MAC addresses.
What does LTE stand for?
Long Term Evolution.
What is LTE?
A mobile communication standard that supports packet switching.
What is a MAC Address?
A protocol that manages access to the physical network medium.
What does MDM stand for?
Mobile Device Management.
What is MDM?
A system for managing mobile devices in organizations.
What does VoIP stand for?
Voice over Internet Protocol.
What is RFID used for?
Wireless identification and tracking of objects.
What does TKIP stand for?
Temporal Key Integrity Protocol.
What is TKIP used for?
A security protocol used in Wi-Fi encryption (WPA).
What is a Web Beacon?
A small, invisible image used for tracking user activity on websites.
What is Cross-site scripting (XSS)?
An attack where malicious scripts are injected into a legitimate website.
What is DNS cache poisoning?
An attack that inserts incorrect DNS information into a DNS resolver's cache.
What is SEO poisoning?
An attack that manipulates malicious websites to rank highly in search engine results.
What is Social Engineering?
An attack method where attackers trick people into divulging sensitive information.
What does TLS stand for?
Transport Layer Security.
What is the purpose of TLS?
To ensure secure communication over a computer network.
What does MRP stand for?
Material Requirements Planning.
What is MRP used for?
Managing production materials and inventory based on production schedules.
What does ICMP stand for?
Internet Control Message Protocol.
What is the purpose of ICMP?
Sending error messages and operational information, such as availability of services.
What does NTP stand for?
Network Time Protocol.
What is the function of NTP?
To synchronize the clocks of devices over a network.
What does RIP stand for?
Routing Information Protocol.
What is RIP used for?
Determining the best route for data by counting the number of hops to the destination.
What does APOP stand for?
Authenticated Post Office Protocol.
What is APOP used for?
Authentication mechanism used in POP3 for retrieving emails.
What does POP3S stand for?
Post Office Protocol 3 Secure.
What is S/MIME?
A protocol for securing emails by providing encryption and digital signatures.
What is SMTP-AUTH?
An extension of the SMTP protocol allowing authentication with the mail server.
What is Changeability in software?
The ease with which a software system can be modified.
What is Interoperability?
The ability of a system to work with other systems seamlessly.
What is Portability in software?
The ease of modifying software to operate on different platforms.
What is Usability in software design?
How easily users can learn to use the software.
What is Backtracking?
A problem-solving technique where you revert to a previous step.
What is Forward Engineering?
Moving from high-level abstractions to actual system implementation.
What is Reengineering?
Analyzing and modifying an existing system to improve it.
What is Reverse Engineering?
Analyzing a system to extract knowledge or recreate design elements.
What is Core Competence?
The unique strengths that give a company a competitive advantage.
What is Corporate Governance?
The system by which companies are directed and controlled.
What is Corporate Identity?
The image or branding of a company that reflects its values.
What is Stakeholder Analysis?
Identifying and assessing the influence of various stakeholders.
What is a Control Chart?
A graph used to monitor the stability of processes over time.
What is a Histogram?
A bar chart displaying the frequency distribution of data.
What is a Pareto Chart?
A bar graph showing the relative importance of different factors.
What is a Scatter Diagram?
A graph showing the relationship between two variables.
What is an Accumulator in CPU?
A special register storing intermediate results of arithmetic operations.
What is an Index Register?
A register that holds an index value for modifying operand addresses.
What is an Instruction Register?
A register that temporarily holds the current instruction being executed.
What is a Program Counter?
A special register containing the address of the next instruction.
What is a Fatal Error?
A serious error causing a program to terminate unexpectedly.
What is a Page Fault?
Occurs when a program accesses a page not currently loaded into memory.
What is a Scheduling Error?
Issues related to the scheduling of processes or threads.
What is a Segmentation Fault?
An error occurring when a program accesses a prohibited memory segment.
What is a Backup File?
A copy of the database stored separately to prevent data loss.
What is a Checkpoint File?
Records the state of the database at a specific point in time.
What is a Dump File?
A file containing a snapshot of the database.
What is a Log File?
A file recording all transactions and changes made to the database.
What is Cross-site request Forgery?
An attack tricking users into executing unwanted actions on a website.
What is OGNL Injection?
An attack targeting systems using Object-Graph Navigation Language.
What is SQL Injection?
An attack exploiting vulnerabilities by injecting malicious SQL queries.
What is Brute Force?
Systematically trying all combinations of passwords to find the correct one.
What is a Denial of Service attack?
An attack aimed at making a service unavailable by overwhelming it.