1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
BIOS (Basic Input Output System)
firmware used to initialize hardware during booting
UEFI (Unified Extensible Firmware Interface)
a modern firmware interface replacing BIOS
POST (Power-On Self-Test)
a diagnostic testing sequence run by firmware
CMOS (Complementary Metal-Oxide-Semiconductor)
a chip storing BIOS settings
CPU (Central Processing Unit)
the main processor executing instructions in a computer
RAM (Random Access Memory)
volatile memory used for temporary data storage
SSD (Solid State Drive)
a storage device with no moving parts and faster access speeds
HDD (Hard Disk Drive)
a storage device with spinning platters and magnetic heads
GPU (Graphics Processing Unit)
a specialized processor for rendering graphics
PSU (Power Supply Unit)
converts electricity to usable power for computer components
Motherboard
The main circuit board connecting all components in a computer
Chipset
A collection of integrated circuits managing data flow between CPU, memory, and peripherals
SATA (Serial Advanced Technology Attachment)
an interface for connecting storage devices
NVMe (Non-Volatile Memory Express)
a protocol for fast SSD communication via PCIe
USB (Universal Serial Bus)
a standard interface for connecting peripherals
Ethernet
A networking technology for wired LAN connections
IP Address
A unique identifier assigned to a device in a network
Subnet Mask
A number defining the range of IP addresses in a network
Gateway
A device that connects different networks, typically a router
DHCP (Dynamic Host Configuration Protocol)
assigns IP addresses dynamically
DNS (Domain Name System)
translates domain names into IP addresses
VPN (Virtual Private Network)
encrypts data for secure communication over public networks
Firewall
A security device or software that monitors and controls network traffic
Malware
Malicious software including viruses, worm, and trojans
Phishing
A cyberattack technique using deceptive messages to steal information
Trojan Horse
Malware disguised as legitimate software to gain access to systems
Ransomware
A type of malware that encrypts files and demands payment for decryption
Antivirus
Software that detects and removes malicious programs
Encryption
A process of converting data into a secure format to prevent unauthorized access
Authentication
Verifying a user's identity before granting access
Two-Factor Authentication
A security method requiring two forms of verification
HTTPS (Hypertext Transfer Protocol Secure)
encrypted communication over the web
SSL/TLS
Protocols that secure communication between web browsers and servers
Cloud Computing
Using remote servers to store, manage, and process data
Virtualization
Creating virtual versions of physical hardware for efficiency
Hypervisor
Software that enables multiple operating systems to run on a host machine
RAID (Redundant Array of Independent Disks)
a data storage virtualization technology
Backup
Creating copies of data to prevent loss in case of failure
Patch
A software update addressing security vulnerabilities or bugs
Trojan Horse
Malware disguised as legitimate software to gain access to systems
DoS Attack (Denial of Service attack)
overwhelming a system to make it unavailable
Botnet
A network of compromised devices controlled remotely for malicious activities
Ipv4 (Internet Protocol version 4)
the most widely used IP addressing system
IPv6 (Internet Protocol version 6)
a newer protocol with a larger address space
Wi-Fi
A wireless networking technology using radio signals
Bluetooth
A wireless communication standard for short-range device connections
Router
A networking device that directs data packets between network
Switch
A device that connects multiple devices in a network and forwards data
Latency
The delay before data transmission begins after a request
Bandwidth
The maximum data transfer rate of a network connection