1/58
These 59 vocabulary flashcards cover malware, networking, hardware, cloud computing, virtualization, licensing, security, and command-line concepts discussed in the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer Worm
Malware that replicates and spreads between computers autonomously without attaching itself to another file.
Software Delivery Methods
Ways software can be installed: user-downloaded, from a USB drive, from an optical disc, or over a network.
Scanner
Input device that converts physical documents or images into digital form.
Biometric Authentication (Fingerprint)
Security technique that verifies identity using a person’s unique fingerprint.
SSD Transfer-Speed Advantage
Solid-state drives offer significantly faster data-transfer speeds than mechanical hard drives (HDDs).
ipconfig Command
Windows command-line tool that displays basic network configuration information.
Distributed Denial of Service (DDoS)
Attack in which a botnet of compromised hosts floods a service with traffic to overwhelm it.
FAT File System
Legacy file system that lacks built-in security features such as permissions and encryption.
Virtualization
Creating virtual versions of computing resources such as servers, storage, or networks.
Social Engineering
Manipulative technique (in person, email, phone) used to deceive individuals into divulging confidential information.
Broad Network Access
Cloud-computing feature that makes services available to standard client devices (PCs, tablets, phones) over the network.
Private Cloud
Cloud infrastructure dedicated solely to users within a single organization.
Application Tier
Middle tier in a three-tier architecture where business logic and processing run.
Sharing Passwords (Poor Practice)
Giving passwords to family or friends is NOT a recommended malware or security protection strategy.
Hypervisor
Also called a Virtual Machine Manager; software that creates and manages virtual machines.
Batch File Automation
Using .bat scripts to speed up and repeat routine or repetitive tasks.
VGA
Legacy analog video connection standard now considered out-of-date.
Motherboard Form Factor
Design classification (size, shape, mounting) that dictates compatibility with cases and components.
Router
Network device that uses IP addresses to decide where to forward data packets between networks.
ATX Power Supply
Standard power-supply and motherboard form factor for most desktop/workstation computers.
USB Drive
Removable flash-memory device primarily used for data storage.
Active Liquid Cooling
Cooling system that circulates liquid through a radiator to dissipate heat from computer components.
start calc
Batch-file command that launches Windows Calculator.
Asymmetric Encryption
Cryptography that uses a public key for encryption and a private key for decryption.
Phishing
Email-based social-engineering attack that masquerades as a trusted source to steal information.
Cost Reduction via Virtualization
Running multiple virtual machines on one physical server lowers hardware and operational expenses.
dir Command
Windows command-prompt instruction that lists the contents of a directory.
Username (Identification)
Credential that uniquely identifies a user to a system during the log-in process.
Type 2 Hypervisor
Virtualization software that runs on top of a host operating system.
Task Manager
Windows utility that shows running processes, services, and resource usage.
Freeware License
Software that is completely free to use without cost or modification restrictions.
Conferencing Software
Application enabling real-time audio-video meetings between multiple users over the internet.
.png File Extension
Indicates an image file in the Portable Network Graphics format.
Vishing
Voice-based social engineering attack conducted over phone or VoIP to obtain information.
Single-Use License
Commercial software license that restricts installation to a single machine or user.
Windows "About" Screen RAM Info
System settings page that shows the amount of installed system memory (RAM).
Chipset
Mainboard component that controls communication between the CPU, memory, and peripherals.
Pin Grid Array (PGA)
CPU packaging style featuring an array of pins that insert into a socket on the motherboard.
Hardware Interface (OS Function)
Core operating-system role: managing and interfacing with computer hardware resources.
Ctrl + V
Keyboard shortcut used to paste copied or cut content.
Password Length Security
Each added character exponentially increases the time required for a brute-force password attack.
End-User License Agreement (EULA)
Legal contract granting the user defined rights to use a software application.
Binary 11 → Decimal 3
The binary number 11 equals the decimal number 3.
(Append Operator)
Shell symbol that appends command output to the end of an existing text file.
Browser Updates
Keeping a web browser current is essential for safe internet browsing and security.
Knowledge-Based Authentication
Verification method that relies on something the user knows, such as a password.
Misdirection (Non-Tactic)
Unlike authority, consensus, or scarcity, misdirection is NOT a common social-engineering tactic described in the lecture.
Network Hardware Utilization (Non-Cloud Feature)
Using specific physical network hardware is NOT considered a defining characteristic of cloud computing.
Central Processing Unit (CPU)
Primary component that performs most of a computer’s processing instructions.
Wireless Access Point (WAP)
Device that implements IEEE 802.11 wireless networking services on a local network.
Hybrid Cloud
Cloud environment combining two or more distinct cloud infrastructures (public, private, or community).
Touchpad
Flat pointing device on laptops used to move the on-screen cursor via finger movement.
Virtualization Flexibility
Ability to quickly add or remove virtual machines on one physical host as business needs change.
EMR Software
Electronic Medical Records application categorized as business software for healthcare management.
Microsoft Edge
Web browser developed by Microsoft.
IPv4 Address
32-bit numerical IP address format, e.g., 192.168.1.1.
Microsoft Windows (Not a VMM)
Operating system, not a virtualization platform like VirtualBox, VMware, or Parallels.
MAC Address Assignment
Hardware manufacturer programs a NIC’s unique Media Access Control address at production.
Digital Privacy
Principle concerning how a user’s data is stored, used, and protected by an organization.