IT Fundamentals & Cloud Computing Lecture Notes

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/58

flashcard set

Earn XP

Description and Tags

These 59 vocabulary flashcards cover malware, networking, hardware, cloud computing, virtualization, licensing, security, and command-line concepts discussed in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

59 Terms

1
New cards

Computer Worm

Malware that replicates and spreads between computers autonomously without attaching itself to another file.

2
New cards

Software Delivery Methods

Ways software can be installed: user-downloaded, from a USB drive, from an optical disc, or over a network.

3
New cards

Scanner

Input device that converts physical documents or images into digital form.

4
New cards

Biometric Authentication (Fingerprint)

Security technique that verifies identity using a person’s unique fingerprint.

5
New cards

SSD Transfer-Speed Advantage

Solid-state drives offer significantly faster data-transfer speeds than mechanical hard drives (HDDs).

6
New cards

ipconfig Command

Windows command-line tool that displays basic network configuration information.

7
New cards

Distributed Denial of Service (DDoS)

Attack in which a botnet of compromised hosts floods a service with traffic to overwhelm it.

8
New cards

FAT File System

Legacy file system that lacks built-in security features such as permissions and encryption.

9
New cards

Virtualization

Creating virtual versions of computing resources such as servers, storage, or networks.

10
New cards

Social Engineering

Manipulative technique (in person, email, phone) used to deceive individuals into divulging confidential information.

11
New cards

Broad Network Access

Cloud-computing feature that makes services available to standard client devices (PCs, tablets, phones) over the network.

12
New cards

Private Cloud

Cloud infrastructure dedicated solely to users within a single organization.

13
New cards

Application Tier

Middle tier in a three-tier architecture where business logic and processing run.

14
New cards

Sharing Passwords (Poor Practice)

Giving passwords to family or friends is NOT a recommended malware or security protection strategy.

15
New cards

Hypervisor

Also called a Virtual Machine Manager; software that creates and manages virtual machines.

16
New cards

Batch File Automation

Using .bat scripts to speed up and repeat routine or repetitive tasks.

17
New cards

VGA

Legacy analog video connection standard now considered out-of-date.

18
New cards

Motherboard Form Factor

Design classification (size, shape, mounting) that dictates compatibility with cases and components.

19
New cards

Router

Network device that uses IP addresses to decide where to forward data packets between networks.

20
New cards

ATX Power Supply

Standard power-supply and motherboard form factor for most desktop/workstation computers.

21
New cards

USB Drive

Removable flash-memory device primarily used for data storage.

22
New cards

Active Liquid Cooling

Cooling system that circulates liquid through a radiator to dissipate heat from computer components.

23
New cards

start calc

Batch-file command that launches Windows Calculator.

24
New cards

Asymmetric Encryption

Cryptography that uses a public key for encryption and a private key for decryption.

25
New cards

Phishing

Email-based social-engineering attack that masquerades as a trusted source to steal information.

26
New cards

Cost Reduction via Virtualization

Running multiple virtual machines on one physical server lowers hardware and operational expenses.

27
New cards

dir Command

Windows command-prompt instruction that lists the contents of a directory.

28
New cards

Username (Identification)

Credential that uniquely identifies a user to a system during the log-in process.

29
New cards

Type 2 Hypervisor

Virtualization software that runs on top of a host operating system.

30
New cards

Task Manager

Windows utility that shows running processes, services, and resource usage.

31
New cards

Freeware License

Software that is completely free to use without cost or modification restrictions.

32
New cards

Conferencing Software

Application enabling real-time audio-video meetings between multiple users over the internet.

33
New cards

.png File Extension

Indicates an image file in the Portable Network Graphics format.

34
New cards

Vishing

Voice-based social engineering attack conducted over phone or VoIP to obtain information.

35
New cards

Single-Use License

Commercial software license that restricts installation to a single machine or user.

36
New cards

Windows "About" Screen RAM Info

System settings page that shows the amount of installed system memory (RAM).

37
New cards

Chipset

Mainboard component that controls communication between the CPU, memory, and peripherals.

38
New cards

Pin Grid Array (PGA)

CPU packaging style featuring an array of pins that insert into a socket on the motherboard.

39
New cards

Hardware Interface (OS Function)

Core operating-system role: managing and interfacing with computer hardware resources.

40
New cards

Ctrl + V

Keyboard shortcut used to paste copied or cut content.

41
New cards

Password Length Security

Each added character exponentially increases the time required for a brute-force password attack.

42
New cards

End-User License Agreement (EULA)

Legal contract granting the user defined rights to use a software application.

43
New cards

Binary 11 → Decimal 3

The binary number 11 equals the decimal number 3.

44
New cards

(Append Operator)

Shell symbol that appends command output to the end of an existing text file.

45
New cards

Browser Updates

Keeping a web browser current is essential for safe internet browsing and security.

46
New cards

Knowledge-Based Authentication

Verification method that relies on something the user knows, such as a password.

47
New cards

Misdirection (Non-Tactic)

Unlike authority, consensus, or scarcity, misdirection is NOT a common social-engineering tactic described in the lecture.

48
New cards

Network Hardware Utilization (Non-Cloud Feature)

Using specific physical network hardware is NOT considered a defining characteristic of cloud computing.

49
New cards

Central Processing Unit (CPU)

Primary component that performs most of a computer’s processing instructions.

50
New cards

Wireless Access Point (WAP)

Device that implements IEEE 802.11 wireless networking services on a local network.

51
New cards

Hybrid Cloud

Cloud environment combining two or more distinct cloud infrastructures (public, private, or community).

52
New cards

Touchpad

Flat pointing device on laptops used to move the on-screen cursor via finger movement.

53
New cards

Virtualization Flexibility

Ability to quickly add or remove virtual machines on one physical host as business needs change.

54
New cards

EMR Software

Electronic Medical Records application categorized as business software for healthcare management.

55
New cards

Microsoft Edge

Web browser developed by Microsoft.

56
New cards

IPv4 Address

32-bit numerical IP address format, e.g., 192.168.1.1.

57
New cards

Microsoft Windows (Not a VMM)

Operating system, not a virtualization platform like VirtualBox, VMware, or Parallels.

58
New cards

MAC Address Assignment

Hardware manufacturer programs a NIC’s unique Media Access Control address at production.

59
New cards

Digital Privacy

Principle concerning how a user’s data is stored, used, and protected by an organization.