It
Self-Directed Learning
An educational process where learners take the initiative to identify their learning needs, set goals, find resources, and assess their progress. This approach fosters independence as students become responsible for their own education. An example could be a student choosing to learn a programming language online by finding tutorials, completing exercises, and creating personal projects.
Motherboard
The main printed circuit board (PCB) in a computer that links various components and peripherals. It provides the necessary electrical circuits to connect the CPU, memory, storage, and other hardware while managing power and data transfer. Examples of motherboards include ATX, microATX, and mini-ITX formats used in personal computers.
CPU Socket
A Zero Insertion Force (ZIF) socket on the motherboard that securely holds the Central Processing Unit (CPU) in place while allowing easy removal or replacement. The CPU socket type must match the specific CPU model, such as LGA 1151 or AM4.
DIMM Slot
Dual In-line Memory Module (DIMM) slots are connectors on a motherboard used for installing RAM (Random Access Memory). Depending on the motherboard, there can be multiple DIMM slots, allowing for expansion of memory capacity, the typical arrangement being two or four slots.
System Clock
A crucial hardware component that generates a consistent signal, synchronizing all activities within the computer. It determines the speed at which the CPU and other components operate, often measured in megahertz (MHz) or gigahertz (GHz). An example is a CPU with a 3.5 GHz clock speed.
Bus
A set of electrical pathways (wires) that connect various components of a computer system, allowing data to be transmitted. Different types of buses include the data bus, address bus, and control bus, which work together to facilitate communication between the CPU, memory, and peripherals.
RAM (Random Access Memory)
A type of volatile memory used to temporarily store data and programs that are actively being used by the computer. The primary function of RAM is to allow quick read and write access to a storage medium, making it essential for multitasking and application performance. An example is a computer with 16GB of DDR4 RAM.
Firmware
A specialized type of software stored on Non-Volatile Read-Only Memory (ROM) that controls and manages hardware components during the boot process and operation of a device. Firmware updates can enhance functionality or patch security vulnerabilities; for example, a firmware update for a router may improve network performance.
Cache
A smaller, faster type of volatile memory that temporarily stores frequently accessed data to speed up processing. Cache memory is divided into levels (L1, L2, L3) based on proximity to the CPU. For example, an Intel processor with 256KB of L1 cache is designed for speedy access to the most critical data.
Malware
Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems. Types of malware include viruses, worms, trojans, ransomware, and spyware, which can steal personal information or disrupt system operations. An example of malware is the WannaCry ransomware that affected thousands of computers worldwide.
Phishing
An online scam that aims to acquire sensitive information by masquerading as a trustworthy entity in electronic communications. Phishing attempts often involve deceptive emails or websites designed to trick recipients into revealing personal information like passwords or credit card numbers. An example is a fraudulent email that appears to come from a bank, asking users to verify their account credentials.
Database Management System (DBMS)
Software that enables the creation, manipulation, and management of databases. A DBMS allows users to efficiently store, retrieve, and manage data while ensuring data integrity and security. Examples include MySQL, Oracle, and Microsoft SQL Server.
Data Integrity
The accuracy and consistency of data over its lifecycle, ensuring that the data remains unchanged and dependable throughout its storage and processing phases. Techniques such as checksums and validation rules are often employed to maintain data integrity in databases.
Virtual Machines
Software-based emulations of physical computers that enable multiple operating systems to run concurrently on a single hardware platform. This technology allows users to create isolated environments for testing software or running applications cross-platform. An example is running a Windows virtual machine on a Mac using software like VMware or VirtualBox.
IoT (Internet of Things)
A network of interconnected devices that collect, exchange, and act on data using the internet. IoT devices can range from everyday household items, such as smart refrigerators and thermostats, to industrial machinery that monitors performance metrics.
VPN (Virtual Private Network)
A secure connection created over the Internet that allows remote users to access a private network, encrypting data to protect confidentiality and privacy. VPNs are commonly used for secure remote work, with examples including NordVPN and ExpressVPN.
Social Engineering
A psychological manipulation technique that exploits human behavior to trick individuals into divulging confidential information, such as passwords or financial details. Common forms of social engineering include phone scams and phishing attacks.
Encryption
The process of transforming data into a coded format to prevent unauthorized access. Encryption employs algorithms to secure data, such as AES (Advanced Encryption Standard) or RSA (RivestâShamirâAdleman), ensuring that only authorized parties can decrypt and access the information.
Multi-layer Verification
An authentication method that requires users to provide multiple forms of information for access, typically combining something they know (password), something they have (smartphone app), and something they are (biometric verification). This enhances security significantly; for example, using a bank app that requires both a password and a fingerprint scan.
Digital Forensics
The process of collecting, analyzing, and preserving digital evidence from computers, networks, and other digital devices for use in legal investigations and prosecutions. This field plays a crucial role in investigating cybercrimes, such as uncovering evidence of data breaches or fraud.
Open Source Software (OSS)
Software for which the original source code is made publicly available, allowing anyone to inspect, modify, and distribute the code. Examples of open source software include the Linux operating system and the Mozilla Firefox web browser.
Backups
Copies of data that are stored separately to ensure recovery in case the original data is lost, corrupted, or compromised. Backup methods range from file-based backups to full disk images, with common tools including Acronis Backup and Windows Backup.
Streaming
The delivery of audio and video content over the internet in real-time without the need for prior download. Examples include Netflix for video content and Spotify for music streaming.
Compression Technology
Techniques used to reduce the size of files while preserving their quality, making storage and transmission more efficient. Examples of compression formats include JPEG for images and ZIP for file archives.
Cybercrime
Criminal activities carried out through computers or the internet, including hacking, identity theft, and online fraud. Cybercrime can have devastating impacts, leading to financial loss and legal consequences for victims.
Password Strength
Indicators of how secure a password is, determined by factors such as length, complexity, and unpredictability. Strong passwords combine uppercase and lowercase letters, numbers, and special characters; an example of a strong password is 'G!fT7c#19zR!ĐŸsR'.
Firewall
A network security system designed to monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewalls can be hardware-based or software-based, with examples including Cisco ASA firewalls and Windows Firewall.
Data Verification
The process of checking the accuracy and reliability of data through various methods, such as validation checks or cross-referencing with trusted sources. Data verification is crucial in maintaining data integrity, especially in critical applications like financial systems.