AP Networking-1.1A & 1.1B Key Hardware & Software Components

0.0(0)
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards covering key concepts related to cybersecurity, computer hardware, and data processing.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

2

CPU

Central Processing Unit; the primary component of a computer that performs most of the processing inside a computer.

3

RAM

Random Access Memory; a type of volatile memory used for temporary storage of data that is quickly accessible by the CPU.

4

Motherboard

The main circuit board of a computer, which connects the CPU, memory, and all other hardware components.

5

Input Devices

Hardware used to provide data and control signals to a computer, examples include keyboard, mouse, and microphone.

6

Output Devices

Hardware that conveys information from a computer to a user; examples include monitors, printers, and speakers.

7

Volatile Memory

Memory that requires power to maintain the stored information; data is lost when the power is turned off.

8

Compiler

A program that translates high-level programming code into machine code.

9

Binary Code

The most basic language of computers, consisting of only two states represented by 0s and 1s.

10

Secure Storage

Methods and techniques used to keep sensitive data safe from unauthorized access or corruption.

11

Data Processing

The collection and manipulation of items of data to produce meaningful information.

12

Peripheral Devices

External devices that connect to a computer to add functionality, such as keyboards, mice, and printers.

13

Network Interface Card

An integrated circuit board that facilitates communication between a computer and a network.

14

Cold Boot Attack

A technique used to gain unauthorized access to data in RAM by cold-booting a computer.

15

BIOS

The basic input/output system, firmware that initializes hardware during the booting process and provides runtime services for operating systems.

16

SSD (Solid State Drive)

A type of storage device that uses flash memory to store data, offering faster read/write speeds and improved reliability compared to traditional hard disk drives.

17

HDD (Hard disk drives)

A type of storage device that uses magnetic disks to read and write data. Compared to solid state drives, HDDs typically offer larger storage capacities at a lower cost but slower performance and increased mechanical failure risk.

18

Firmware

Software that provides low-level control for a device's hardware, enabling it to function properly. It is typically embedded in the hardware and is used to provide the necessary instructions for how the device communicates with other computer hardware.

19

UEFI

Unified Extensible Firmware Interface, a modern firmware interface for computers that replaces the traditional BIOS, allowing for faster boot times and better hardware compatibility.

20

OS

The operating system is software that manages computer hardware and software resources and provides common services for computer programs. It serves as an intermediary between users and the computer hardware. An OS allows users to interact with the computer, manage files, run applications, and control peripheral devices.

21

Common OS

Operating systems include Windows, macOS, and Linux, which offer various functionalities and user interfaces tailored for different computing environments.

22

Application Software

Software designed to perform specific tasks for users, such as word processing, web browsing, or gaming. Unlike system software, application software directly supports user needs.

23

Driver

A special type of software that allows the operating system to communicate with hardware devices, enabling them to function properly.

24

Virtual instance (machine)

A software-based emulation of a physical computer that runs an operating system and applications, allowing multiple virtual environments to exist on a single physical machine.

25

GUI

(Graphical User Interface) A visual way to interact with computers and applications, using elements like windows, icons, and menus to enable user-friendly navigation and control.

26

CLI

(Command Line Interface) A text-based interface that allows users to interact with a computer or software by typing commands into a console or terminal.

27

Disk management

The process of organizing, partitioning, and maintaining storage devices to optimize performance and ensure data availability. It allows users to create, delete, format, and manage disk partitions.

28

Device management

The administration of hardware and software components, ensuring devices are properly configured, maintained, and updated to function efficiently within a network.

29

Access control/protection

Policies and mechanisms that restrict or allow access to resources and data, ensuring that only authorized users have permission to utilize network resources and systems.

30

Memory management

The process of coordinating and handling computer memory resources, ensuring efficient allocation, usage, and management of both volatile and non-volatile memory to optimize system performance and stability.

31

Process/Application Management/Scheduling

The practice of overseeing and coordinating processes and applications within a computing environment, ensuring optimal performance and resource utilization by scheduling tasks effectively. Has the ability to end a task or kill a processto free up resources and prevent system overload.

32

Mobile Device OS

A specialized operating system designed to run on mobile devices such as smartphones and tablets and smartwatches, optimizing performance, interface, and functionality for touch interactions and mobile hardware. Main mobile device OS includes Android, iOS, and Windows Mobile.

33

Workstation OS

An operating system designed specifically for workstations, providing a user interface, support for high-performance computing tasks, and enhanced capabilities for resource management, often used in professional settings like graphic design, engineering, and scientific research. Desktops and laptops. Examples include Windows 10 Pro and macOS and Linux.

34

Server OS

An operating system specifically designed to manage and operate servers, providing services to client devices and ensuring high availability, security, and resource management. Examples include Windows Server, Linux distributions, and Unix.

35

Embedded OS

An operating system designed to operate on embedded systems, often with real-time computing constraints and minimal resources. Embedded OS are used in devices like appliances, automobiles, ATMS, elevators, and medical equipment. Embedded OS is an example of firmware.

36

File systems

The method and structure that an operating system uses to manage and organize files on a storage device. File systems determine how data is stored, retrieved, and organized, with examples including NTFS, FAT32, and ext4.

37

NTFS

A file system used by Windows operating systems for storing and retrieving files on hard drives, supporting large volumes and advanced features like security permissions and journaling. Stands for New Technology File System. Replaced FAT32 as the primary file system in Windows.

38

HFS

A file system developed by Apple for use with macOS, known for its support of large files and directories, case sensitivity, and metadata features. HFS stands for Hierarchical File System. HFS+ is newer.

39

EXT4

A file system commonly used in Linux operating systems, known for its reliability, performance improvements, and support for large file sizes and volumes. EXT4 stands for Fourth Extended File System.

40

Compression

A process that reduces the size of data files to save storage space or improve transmission speed. Compression algorithms can be lossless or lossy, depending on whether they preserve original data quality.

41

Encryption

The process of converting data into a code to prevent unauthorized access, ensuring that only authorized users can read or decrypt the information.

42

Permissions

Settings that control access rights for users and groups to files and directories in a computer system, determining who can read, write, or execute them.

43

Journaling

A filesystem feature that keeps track of changes not yet committed to the main filesystem, ensuring data integrity and recovery in case of a failure.

44

Services

Functions or processes that provide specific capabilities on a network, often running in the background to facilitate communication or data management. Started by the OS. Called daemons on Linux. Can be turned on/off by user.

45

Processes

Sequential steps carried out by a computer to perform a task, which can be managed by the operating system to allocate resources and execute instructions.

46

Utilities

Software tools that perform specific tasks for system maintenance, optimization, or configuration, enhancing the operating system's functionality. Examples: file compression, task scheduling.