Computer Memory, Storage, and Cloud Computing: Key Concepts and Technologies

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/82

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

83 Terms

1
New cards

Dual-Channel Memory

Two memory modules work in parallel, doubling bandwidth (128-bit total).

2
New cards

Virtual Memory

Disk storage used when RAM is full; slower but expands usable memory.

3
New cards

RAM (Volatile)

Data lost when power is removed.

4
New cards

ROM (Nonvolatile)

Read-only firmware storage; retains data without power.

5
New cards

Cache Memory

Fast, small memory close to CPU; most volatile.

6
New cards

Pagefile / Swap Space

Portion of drive used as 'overflow' RAM.

7
New cards

ECC Memory

Error-Correcting Code RAM; detects and corrects bit errors.

8
New cards

SO-DIMM

Small Outline DIMM; laptop memory form factor.

9
New cards

Parity Bit Memory

Detects but cannot correct errors.

10
New cards

IaaS (Infrastructure as a Service)

Virtualized compute, storage, and networking (e.g., AWS EC2).

11
New cards

PaaS (Platform as a Service)

Dev environment for applications (e.g., Azure App Services).

12
New cards

SaaS (Software as a Service)

Cloud-hosted applications (e.g., Gmail, Salesforce).

13
New cards

Private Cloud

Dedicated resources for one organization.

14
New cards

Public Cloud

Shared multi-tenant infrastructure.

15
New cards

Hybrid Cloud

Mix of public and private clouds.

16
New cards

Community Cloud

Shared among organizations with common goals.

17
New cards

High Availability

System designed for minimal downtime.

18
New cards

Rapid Elasticity

Automatic scaling up/down of resources.

19
New cards

Measured/Metered Service

Pay only for resources used.

20
New cards

GSM

Global System for Mobile Communications; uses SIM card.

21
New cards

CDMA

Code Division Multiple Access; no SIM, provisioned by carrier.

22
New cards

LTE (4G)

Long Term Evolution; up to ~100 Mbps, SIM required.

23
New cards

5G

Latest generation; ultra-low latency and gigabit speeds.

24
New cards

Hotspot

Device shares cellular data as Wi-Fi network.

25
New cards

Tethering

Share connection via USB or Bluetooth.

26
New cards

SIM Card

Stores subscriber identity and network credentials.

27
New cards

IMSI

International Mobile Subscriber Identity stored on SIM.

28
New cards

IMEI

Unique device identifier (hardware ID).

29
New cards

Airplane Mode

Disables all radios (cellular, Wi-Fi, Bluetooth).

30
New cards

Toner Vacuum

Specialized vacuum for removing toner safely.

31
New cards

Compressed Air

Never use on laser printers; spreads toner particles.

32
New cards

Corona Wire

Transfers charge to drum; must be kept clean.

33
New cards

Fuser Assembly

Melts toner onto paper; can cause burns if touched.

34
New cards

Drum Cleaning Blade

Removes residual toner during print cycle.

35
New cards

Calibration

Aligns color output and print heads.

36
New cards

Ghosting

Repeating faded image; caused by worn drum or fuser.

37
New cards

Streaks or Lines

Dirty corona wire or roller.

38
New cards

Paper Jam Prevention

Clean rollers and use correct paper weight.

39
New cards

IoT (Internet of Things)

Consumer-grade automation: smart thermostats, cameras, appliances.

40
New cards

SCADA (Supervisory Control and Data Acquisition)

Industrial control systems for factories, pipelines, utilities.

41
New cards

IoT Focus

Convenience and remote monitoring via cloud apps.

42
New cards

SCADA Focus

Process automation, safety, and industrial reliability.

43
New cards

IoT Connectivity

Wi-Fi, Bluetooth, Zigbee, Z-Wave, cellular.

44
New cards

SCADA Connectivity

Industrial Ethernet, serial, private networks.

45
New cards

IoT Example

Smart light bulbs.

46
New cards

SCADA Example

Water treatment or power grid control system.

47
New cards

Most Volatile

Cache / Registers → Lost instantly on power loss.

48
New cards

RAM

Lost on shutdown.

49
New cards

Flash Storage

Retains data (nonvolatile).

50
New cards

SSD / HDD

Permanent until erased.

51
New cards

Optical Media (CD/DVD)

Long-term nonvolatile storage.

52
New cards

Volatile Storage

Requires power to retain data (RAM, cache).

53
New cards

Nonvolatile Storage

Retains data without power (HDD, SSD, Flash, Optical).

54
New cards

certmgr.msc

Opens the Certificate Manager console to view, import, and manage security certificates on Windows.

55
New cards

lusrmgr.msc

Opens Local Users and Groups for managing local user accounts and group memberships.

56
New cards

GPT (GUID Partition Table)

Modern partition style that supports 128 partitions and drives larger than 2 TB; replaces MBR.

57
New cards

NTFS

Default Windows file system that supports file permissions, encryption, and large file sizes.

58
New cards

apt

Command for installing and managing packages on Debian-based Linux systems.

59
New cards

dnf

Command for installing and managing packages on Red Hat-based Linux systems (replaces yum).

60
New cards

chkdsk

Command that checks disk integrity and repairs file-system or sector errors.

61
New cards

WPA2 4-Way Handshake

Authentication process between a client and access point that verifies credentials and exchanges encryption keys.

62
New cards

Rogue antivirus

Fake antivirus software that mimics legitimate alerts to trick users into installing malware.

63
New cards

Data-at-rest encryption

Encrypts data stored on physical media such as HDDs, SSDs, and USB drives.

64
New cards

Data-in-transit encryption

Protects data moving across networks using TLS/SSL or VPNs.

65
New cards

Phishing

A social-engineering attack that tricks users into revealing credentials or downloading malware.

66
New cards

PCI DSS

Security standard for handling credit-card data and preventing payment fraud.

67
New cards

PHI

Protected Health Information governed by HIPAA regulations.

68
New cards

PII

Personally Identifiable Information such as name, address, SSN, or date of birth.

69
New cards

NIST compliance

U.S. government framework for cybersecurity risk management and best practices.

70
New cards

EULA

End-User License Agreement outlining terms and limitations of software use.

71
New cards

Safe Mode

Boots Windows using only essential drivers to isolate startup problems or malware.

72
New cards

msconfig

Tool to manage startup items and boot configurations for troubleshooting.

73
New cards

regedit

Registry Editor — allows manual edits to system configuration and malware removal.

74
New cards

WinPE

Minimal Windows environment used for system recovery and offline malware repair.

75
New cards

Overheating symptoms

Random shutdowns, reboots, or freezing due to poor cooling or dust buildup.

76
New cards

System instability causes

Failing CPU, overheating, or malware from firewall misconfiguration.

77
New cards

Purpose of the change

Describes the business justification and benefits for performing a system change.

78
New cards

Scope of the change

Outlines what systems, users, and timelines are affected by the change.

79
New cards

Proper documentation

Ensures customers understand timelines, procedures, and expectations for support.

80
New cards

Rotation lock

Prevents screen from auto-rotating between portrait and landscape modes.

81
New cards

.apk file

Android app installer file; considered untrusted on Apple devices.

82
New cards

App Store (macOS)

Used to download and check for system and app updates on Apple computers.

83
New cards

Gmail (Workspace)

Cloud-based enterprise email platform managed through Google Workspace.