comp tia fundementals plus

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/159

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

160 Terms

1
New cards

Information Technology (IT)

The utilization and management of technology and systems to store, retrieve, transmit, and protect information for various purposes

2
New cards

Input

Stage where data is entered into the computer system; provides the raw data that the computer will process.

3
New cards

Processing

The CPU performs calculations, comparisons, and other operations to transform the raw data into meaningful information.

4
New cards

Output

Displays or transmits the results of the processing to the user or another system either visually (using a monitor or printer) or audibly (by using speakers).

5
New cards

Storage

Data is saved to storage devices like a hard drive, SSD, or cloud storage for later use; allows the results of processing to be retained and retrieved as needed

6
New cards

Decimal Notation (Base-10)

The essential numerical system that forms the foundation of everyday mathematical operations, utilizes ten distinct symbols, from 0 to 9, to represent all possible numbers

7
New cards

Binary Notation (Base-2)

The fundamental numerical system that underpins the digital world, characterized by the use of two distinct symbols, 0 and 1

8
New cards

Hexadecimal Notation (Base-16)

A numerical system characterized by the use of sixteen distinct symbols to represent all possible numbers (digits from 0 to 9 and letters from A to F)

9
New cards

bit (Binary Digit)

Smallest unit of data in computing, which can hold a value of 0 or 1

10
New cards

byte

Equivalent to 8 bits and another basic unit of data

11
New cards

Nibble

Term for a single hexadecimal character

12
New cards

Data Type

Defines the kind of data that can be stored and manipulated within a program

13
New cards

Integers

Represent whole numbers, both positive and negative, without any decimal component

14
New cards

Floating-point Numbers

Used to represent real numbers (decimal or fractions)

15
New cards

Boolean Values

Represent the logical values of TRUE and FALSE

16
New cards

Characters

Used to represent individual letters, digits, punctuation marks, or any other symbol that can be represented in text

17
New cards

Strings

Sequences of characters used to represent and manipulate text

18
New cards

American Standard Code for Information Interchange (ASCII)

Developed in the 1960s as one of the first character encoding standards, and it uses 7 bits to represent each character

19
New cards

Unicode

A much more extensive encoding system that can represent over a million unique characters

20
New cards

Data

Wide range of items from customer details, and financial records, to internal communication

21
New cards

Information

Processed data that provides value and context

22
New cards

Intellectual Property (IP)

Creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce

23
New cards

Copyrights

Legal term used to describe the rights that creators have over their literary and artistic works

24
New cards

Trademarks

Sign used to distinguish the goods or services of one enterprise from those of other enterprises

25
New cards

Patents

An exclusive right granted for an invention, which is a product or a process that provides a new way of doing something or offers a new technical solution to a problem

26
New cards

Digital Products

Intangible assets that exist in some kind of digital format

27
New cards

Digital Rights Management (DRM)

Systematic approach to copyright protection for digital products

28
New cards

Security Controls

Safeguards or countermeasures employed to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets

29
New cards

Administrative Controls

Policies, procedures, and practices that establish the framework for an organization's security posture

30
New cards

Physical Controls

Involve the use of physical measures to protect assets and prevent unauthorized access

31
New cards

Technical Controls

Implemented through technology solutions to protect information systems and data

32
New cards

Return on Security Investment (ROSI)

Metric used to calculate the effectiveness of investments in cybersecurity

33
New cards

Product Fulfillment

Process to deliver a product to the customer after a sale

34
New cards

Data Capture and Collection

Involves gathering data from various sources, such as transaction records, customer interactions, and internet of things log files

35
New cards

Hardware

the tangible parts of a computer, which is all of the things thing you can see and touch

36
New cards

Software

The coded instructions that guide the hardware's operations

37
New cards

Central Processing Unit (CPU)

Microprocessor that interprets and carries out most of the instructions from the computer's hardware and software

38
New cards

Random Access Memory (RAM)

Used to perform temporary storage functions in the computer and it is used heavily by the central processing unit

39
New cards

Motherboard

Used to connect all the computer's components together to ensure that they can communicate with each other

40
New cards

Peripheral Devices

Hardware elements that we, as humans, interact with directly with, such as the monitor, keyboard, mouse, printer, and speakers

41
New cards

System Software

Responsible for managing and controlling the computer hardware

42
New cards

Application Software

Designed to help users complete some kind of productive task

43
New cards

Operating System (OS)

Vital piece of system software that manages and controls the computer's hardware resources and offers services for other software to run on

44
New cards

Laptops

Compact, all-in-one computing devices designed for portability and convenience

45
New cards

Server

Powerful computer designed to manage, store, send, and process data 24/7

46
New cards

Smartphone

Handheld device that combines the functionalities of a computer and a cellular phone using operating systems like iOS and Android to manage hardware and software resources

47
New cards

Internet of Things (IoT)

Devices embedded with sensors, software, and network connectivity, enable seamless integration between the physical and digital world

48
New cards

Motherboard

Printed circuit board (or PCB) that acts as the central hub where all other hardware components connect and communicate, making it an essential part of any computing device

49
New cards

Central Processing Unit (CPU)

Executes instructions and processes data, making it a critical component of any computing device

50
New cards

Graphics Processing Unit (GPU)

Specialized processor designed to accelerate rendering images and videos on a device's screen

51
New cards

Random Access Memory (RAM)

Provides temporary storage for data that the processor needs to access quickly

52
New cards

Hard Disk Drive (HDD)

Utilizes magnetic storage technology to read and write data

53
New cards

Solid-State Drive (SSD)

Have revolutionized the storage industry with their flash memory-based technology

54
New cards

Network Interface Card (NIC)

Provides a dedicated, full-time connection to a network, translating the data produced by the computer into a format that can be transmitted over the network, and vice versa

55
New cards

System Bus

Critical component in computer architecture, serving as the primary communication channel between the various components of a computer system

56
New cards

System Cooling

The process of dissipating heat produced by electronic components to keep them within a safe operating temperature

57
New cards

System Firmware

Serving as the link between the system's hardware and its operating system

58
New cards

Computer Network

Complex systems that enable communication and data exchange between multiple devices

59
New cards

Local Area Networks (LAN)

Network that connects devices in a relatively small area, such as a home, office, or a group of buildings

60
New cards

Wide Area Networks (WAN)

Span a large geographical area, often connecting LANs that are miles apart

61
New cards

Wired Networks

Involve the use of physical cables to connect devices to the network

62
New cards

Wireless Networks

Provide connectivity without the need for physical cables

63
New cards

Firewall

Network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules

64
New cards

Transmission Control Protocol/Internet Protocol (TCP/IP)

Conceptual framework that defines how data should be packaged, addressed, transmitted, routed, and received on the internet

65
New cards

Hostname

A device's name when connected to a network

66
New cards

Fully Qualified Domain Names (or FQDNs)

The device's domain name specifies its exact location in the tree hierarchy of the DNS

67
New cards

Domain Name System (DNS)

Allows human-readable names when accessing a website or email server

68
New cards

RJ11

A type of connection for phone lines and voice services.

69
New cards

RJ45

A common data and digital service.

70
New cards

HyperText Transfer Protocol (HTTP)

Operates on port 80 and defines how messages are formatted and transmitted between web servers and web browsers

71
New cards

HyperText Transfer Protocol Secure (HTTPS)

Secure variant of HTTP that operates on port 443 and is specifically designed to provide secure communication over the Internet

72
New cards

Post Office Protocol Version 3 (POP3)

Operates on port 110 and is widely used for retrieving emails from a mail server

73
New cards

Internet Message Access Protocol (IMAP)

Operates on port 143 and allows multiple email clients to manage the same mailbox while keeping the email stored on the server

74
New cards

Simple Mail Transfer Protocol (SMTP)

Operates on port 25 and serves as the standard protocol for sending emails across the Internet

75
New cards

Fiber Optic Internet

Uses tiny strands of glass to transmit information as pulses of light, allowing data to move at, quite literally, the speed of light

76
New cards

Cable Internet

Internet is typically provided by companies that started out in the Cable Access TV, or CATV, industry

77
New cards

Digital Subscriber Line (DSL)

A prevalent type of internet service is often found in homes and small offices around the world

78
New cards

Wireless internet service

Helpful in areas where installing cables is too challenging or expensive

79
New cards

Wired Equivalent Privacy (WEP)

Aimed at providing security similar to wired networks

80
New cards

SSID

An access point not to broadcast the name of the wireless LAN

81
New cards

Operating Systems (OS)

They perform a variety of crucial functions, including serving as an interface between the user and the computer, between applications and hardware, maintaining system health and functionality, and managing data

82
New cards

Command Line Interface (CLI)

An interface between a user and a computer

83
New cards

Kernel

An interface between a software application and hardware

84
New cards

Management Interface

A critical tool for configuring and managing systems effectively

85
New cards

Windows Registry Editor (regedit)

a database can be edited directly, allowing administrators a high level of control over system configuration

86
New cards

Process

Primary unit that governs a program and manages the memory resources allocated by the operating system

87
New cards

Service

Works behind the scenes to support the operation of your computer and run processes that handle essential tasks for you

88
New cards

System Memory/RAM

Main type of volatile memory used in a system

89
New cards

Virtual Memory/Pagefile

A technique the OS can use to extend the amount of available RAM

90
New cards

Command Prompt

A more correct term, an integral part of computer operations, offering an alternate approach to managing operating systems and applications

91
New cards

User Account Control (UAC)

A mechanism designed to ensure that actions requiring administrative rights are explicitly authorized by the user

92
New cards

Drivers

ensures that the hardware and software are in sync and working together

93
New cards

Disk Partitions

Divisions of a Hard Disk Drive (HDD) or Solid-State Drive (SSD), each acting as a separate logical unit of separation within a single physical drive

94
New cards

File System

A method and data structure that an operating system uses to control how data is stored and retrieved

95
New cards

.odf

An open standard used by LibreOffice and other open-source office suites

96
New cards

.tiff

High-quality graphic format often used for professional printing and it can also utilize lossless or JPEG compression

97
New cards

.png

Portable Network Graphics that support lossless data compression and transparency

98
New cards

.wmv

A video container format developed by Microsoft, compatible with many media players and usable for DVD and Blu-ray discs

99
New cards

.mp3

Developed from MPEG, is a popular format for distributing music and is supported by most media players, but it uses lossy compression, discarding some audio information

100
New cards

.zip

Developed for the PKZIP utility, it's now natively supported by Windows, Mac OS X, and Linux, meaning these OS can create and extract files without third-party applications