CompTIA Tech+ Exam Review Flashcards 2

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/238

flashcard set

Earn XP

Description and Tags

These are changed so they do not have the term within the definition.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

239 Terms

1
New cards

access control list (ACL)

A collection of entries that defines which entities (like user accounts or host addresses) are permitted or denied interaction with a resource and what privileges (such as read or write) they are granted.

2
New cards

access point (AP)

A device that links wireless devices to a wired network

3
New cards

accounting

The process of tracking the usage of resources or rights by an authorized entity and generating alerts for any detected or attempted unauthorized utilization.

4
New cards

advanced encryption standard (AES)

A symmetric block cipher that uses 128-bit

5
New cards

advanced technology extended (ATX)

The main specification for the physical size and layout of PC cases

6
New cards

air-gapped

A security strategy where a computer or network is completely isolated by physical separation

7
New cards

algorithm

A series of mathematical operations

8
New cards

algorithms

The operations

9
New cards

american standard code for information interchange (ASCII)

A 7-bit code page that assigns numerical binary values to specific characters

10
New cards

antivirus software

A program designed to inspect network traffic and files to locate and prevent malicious code from infecting a computer system.

11
New cards

array

An identifier for a group of variables of the same type

12
New cards

artificial intelligence

The field focused on developing computer systems that can create analytical and problem-solving techniques with minimal guidance or explicit instruction from humans.

13
New cards

assembly language

A human-readable text representation of the binary machine instructions that a processor directly executes

14
New cards

attenuation

The loss or weakening of a signal as it travels along a transmission path

15
New cards

augmented reality (AR)

The use of specialized glasses or smartphone applications to overlay digital content onto a user's view of the real world

16
New cards

authentication

The procedure of confirming the identity of a specific user or entity by verifying their unique credentials.

17
New cards

authorization

The function of establishing what permissions and capabilities a particular entity is allowed to have or use.

18
New cards

availability

The security goal of ensuring that computing resources are continuously operational and that necessary information is accessible to those who are permitted to view it.

19
New cards

backdoors

A hidden access method or mechanism that allows someone to bypass or circumvent the regular identity verification process to gain entry to a computer system.

20
New cards

bandwidth

Commonly refers to the volume of data that can be moved over a connection in a specified time

21
New cards

basic input/output system (BIOS)

The legacy 32-bit firmware that runs when a PC starts up to initialize hardware

22
New cards

biometric authentication

A process of verifying a user's identity based on a scan of a physical characteristic (such as facial

23
New cards

bit

The most fundamental unit of digital information

24
New cards

blu-ray

The newest generation of optical disc technology

25
New cards

branching

A control flow statement in programming or scripting that uses a true/false condition to decide which block of code should be executed next.

26
New cards

buses

The communication pathways on the main system board that link the processor

27
New cards

byte

A group of eight fundamental units of digital data

28
New cards

cascading style sheets (CSS)

A simple language used to define the visual formatting of web documents

29
New cards

cathode ray tube (CRT)

A legacy display technology that uses an analog signal to illuminate three colored dots (triads) on a screen to form an image; the viewable area is typically less than the advertised diagonal screen size.

30
New cards

cd-rom

A form of pre-pressed read-only optical storage where a computer can retrieve data but cannot write or erase it.

31
New cards

cd-rw

Optical storage technology supporting up to 700 MB per disc

32
New cards

cellular radio

Technical standards for implementing wireless data access over mobile telecommunications networks

33
New cards

central processing unit (CPU)

The principal microprocessor in a PC or mobile device responsible for executing system firmware

34
New cards

central processing units (CPUs)

The main microprocessors in a PC or mobile device that execute all system firmware

35
New cards

certificate

A digital document issued by a trusted entity to guarantee that a public key used for securing communications genuinely belongs to the organization it claims to represent.

36
New cards

certificate authority (CA)

A server responsible for verifying identities and issuing signed digital wrappers for public keys to guarantee their authenticity and trustworthiness.

37
New cards

ciphertext

Data that has been scrambled using a cipher and key

38
New cards

client-server

A network administration model where some hosts are dedicated to providing services and others are configured as consuming devices that only use those services.

39
New cards

client-server architecture

A network model in which specific hosts are configured to offer services

40
New cards

coaxial cable

A media type characterized by two separate

41
New cards

comma-separated value (CSV)

A simple text file format that uses commas to separate data fields and new lines to denote rows

42
New cards

command line interface (CLI)

A text-based method for a user to interact with an operating system by typing and entering specific instructions.

43
New cards

compiler

A type of program that translates source code written in a high-level language into low-level instructions (like assembly or machine code) that a computer's processor can execute.

44
New cards

computing cycle

The fundamental sequence of actions a device follows to execute instructions

45
New cards

confidentiality

The essential security objective of keeping information and communications private and protected from viewing by unauthorized parties.

46
New cards

cookies

Small text files stored on a user's computer by a website to retain user-specific data or manage session information during their visit.

47
New cards

cybersecurity

The comprehensive practice of protecting computer systems and digital assets from unauthorized access

48
New cards

data at rest

Information that is primarily static

49
New cards

data in transit

Information that is currently being transmitted or moved across a network

50
New cards

database

A structured storage system that organizes electronic information into tables with defined relationships

51
New cards

database administrators (DBAs)

The IT professionals responsible for the configuration

52
New cards

defense in depth

A security approach that involves layering diverse categories of security controls throughout a system or network

53
New cards

defragmentation

A utility that reorganizes data on a mechanical storage device to ensure files are saved in contiguous blocks

54
New cards

digital subscriber line (DSL)

A carrier technology providing high-speed internet access to customers by transmitting data over standard voice-grade phone lines

55
New cards

digital visual interface (DVI)

An older standard for connecting displays that is capable of carrying a digital signal only

56
New cards

displayport

A digital audio and video connection standard developed by VESA

57
New cards

dotted decimal notation

The common format for expressing 32-bit network addresses (IPv4)

58
New cards

double data rate (DDR)

A family of main system memory standards (DDR3/DDR4/DDR5) where data is transferred on both the rising and falling edges of the clock signal

59
New cards

dual inline memory module (DIMM)

The standardized physical format for system memory components

60
New cards

dvd

Optical disc storage technology with a capacity of up to 4.7 GB per layer

61
New cards

dynamic host configuration protocol (DHCP)

A network standard used to automatically assign necessary network configuration details

62
New cards

elasticity

The property by which a computing environment can automatically scale its resources up or down in response to fluctuating user demand and workload.

63
New cards

encrypted

Describes data that has been scrambled using a cipher and key

64
New cards

encryption

The process of scrambling information using various types of mathematical operations and one or more secret keys to provide a secure method for storing or sending data.

65
New cards

end user license agreement (EULA)

A contractual document that dictates the terms and conditions for the installation and operation of a piece of application software.

66
New cards

escape character

A special symbol used to tell a system to interpret the symbol that immediately follows it literally

67
New cards

extensible markup language (XML)

A system using descriptive tags to create documents that are easily read by both humans and machines

68
New cards

factors

The different categories of technology used to implement identity verification

69
New cards

fiber internet

A type of high-speed network connection that uses glass or plastic threads for data transmission between the customer's location and the service provider's network.

70
New cards

file transfer protocol (FTP)

An application-layer standard

71
New cards

firewall

A device or program

72
New cards

flash memory

A type of non-volatile computer chip storage that retains data when power is removed and can be quickly reprogrammed

73
New cards

flowchart

A visual diagram that uses standard symbols to illustrate the sequential steps

74
New cards

foreign key

A field in a structured data table that links to a unique identifying field (primary key) in another table

75
New cards

form factors

The physical size

76
New cards

function

A modular

77
New cards

general data protection regulation (GDPR)

A comprehensive set of rules and requirements established to protect the personal information of individuals residing in the European Union (EU).

78
New cards

geofencing

A security control that creates a virtual perimeter based on real-world geographical coordinates to enforce policy or trigger actions when a device enters or leaves the defined area.

79
New cards

global positioning system (GPS)

A satellite-based navigation system that allows a receiver to determine its precise location on Earth by calculating signals received from orbital devices.

80
New cards

graphical processing unit (GPU)

A microprocessor

81
New cards

graphical user interface (GUI)

A visual

82
New cards

hard disk drive (HDD)

A high-capacity magnetic storage device that uses rapidly spinning mechanical platters and movable heads to read and write data to specific locations.

83
New cards

hard disk drives

Mass storage devices that utilize rotating magnetic platters and read/write heads to persistently store information.

84
New cards

hard disk drives (HDDs)

Persistent storage devices that rely on spinning

85
New cards

hard drive

A common term for a magnetic storage device that stores data persistently using spinning disks and read/write heads.

86
New cards

health insurance portability and accountability act (HIPAA)

A United States federal law that dictates strict standards for the protection of an individual's sensitive medical data.

87
New cards

heatsink

A passive cooling component

88
New cards

hexadecimal

A base-16 numbering system

89
New cards

high definition multimedia interface (HDMI)

A digital cable standard designed to carry both audio and video signals

90
New cards

hot-swappable

Describes a hardware component that can be safely added to or removed from a computer system while the operating system is running

91
New cards

hypertext markup language (HTML)

A system of coded tags used to define the structure and elements of documents intended for viewing in web browsers.

92
New cards

hypertext transfer protocol (HTTP)

The foundational application-layer set of rules

93
New cards

hypertext transfer protocol secure (HTTPS)

The application-layer set of rules

94
New cards

hypervisor

Specialized software or firmware that creates and manages multiple isolated virtual machine instances on a single set of physical host hardware.

95
New cards

identity fraud

The act of inventing entirely false personal credentials or stealing and misusing an individual's private information

96
New cards

image

A complete

97
New cards

incremental backups

A data saving process that only copies files that have changed since the very last data preservation operation (either full or partial).

98
New cards

information technology (IT)

The comprehensive use of computer systems

99
New cards

infrastructure as a service (IaaS)

A cloud service model where the provider offers fundamental computing resources like virtual machines

100
New cards

input

The data