COMPTIA ITF+ Part 3 & 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Data

Wide range of items from customer details, and financial records to internal comuncation.

2
New cards

Information

.Processed data that provides value and context.

3
New cards

Intellectual Property

Creations of the mind, such as inventions, literary and artistic works, designs, and symbols used in commerce.

4
New cards

Copyrights

Legal term used to describe the rights that creators have over their literary and artistic works.

5
New cards

Trademarks

Sign used to distinguish the goods or services of one enterprise from those of other enterprises

6
New cards

Patent

An exclusive right granted for an invention, which is a product or a process that provides a new way of doing something or offers a new technical solution to a problem.

7
New cards

Digital Product

Intangible assets that exist in the same kind of digital format

8
New cards

Digital Rights Management (DRM)

Systemic approach to copyright protection for digital products. Encrypts the content of a digital product and allowing access only to those who have the necessary decryption skills.

9
New cards

Security Controls

Safeguards or countermeasures employed to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.

10
New cards

Administrative Controls

Policies, procedures, and practices that estaboish the framework for an organizations security posture

11
New cards

Physical Controls

Involve the use of physical measures to protect assets and prevent unauthorized access

12
New cards

Techinical Controls

Implemented through technology solutions to protect information systems & data

13
New cards

Backups

Regular data backups are a crucial security control that ensures data can be recovered in the case of loss or corruption

14
New cards

Access Controls

Limit and prevent any access to data to make sure the datas value is well kept

15
New cards

Data Encryption

Converts data into code to prevent unauthorized access

16
New cards

Firewalls

Network security systems that monitor and control incoming and outgoing traffic based on predetermined security rules.

17
New cards

Data Exfiltration

Unauthorized transfer of data from a computer or server

18
New cards

High availability

Involves designing systems and processes to ensure a high level of operational performance for a longer period

19
New cards

Return on Security Investment (ROSI)

A metric used to calculate the effectiveness of investments of cybersecurity.

20
New cards

Product Fulfillment

Process to deliver a product to the customer after a sale

21
New cards

Data Capture and Collection

The process of gathering and storing data from various sources for analysis and decision-making.

22
New cards

Central Processing Unit (CPU)

Microprocesser that interpretds and carries out most of the instructions from the software & hardware of a computer

23
New cards

Random Access Memory (RAM)

Used to perform temporary storage functions in the computer and its used heavily by the CPU

24
New cards

Storage Devices

Hardware used to store data permanently or temporarily, such as hard drives, SSDs, and USB flash drives.

25
New cards

Motherboard

The main printed circuit board in a computer that connects the CPU, RAM, and other hardware components, facilitating communication between them.

26
New cards

Power Supply Unit (PSU)

It takes electrical power from an home or office wall outlet and converts it into a form that the computers components can use

27
New cards

Peripheral Devices

Hardware elements that we, as humans interact directly with, such as the monitor, keyboard, mouse, printer, and speakers

28
New cards

System Software

Responsible for managing and controlling the computer hardware

29
New cards

Application Software

Designed to help users complete some kind of productive task.

30
New cards

Fetch-Decode-Execute

A process in computer architecture where an instruction is fetched from memory, decoded to determine the action, and then executed by the CPU.

31
New cards

Workstations

High performance computers designed for technical or scientific applications

32
New cards

All in One Systems (AIO)

Offer a compact and intergrated solution tht combines the functionality of a desktop computer and a monitor into a single device

33
New cards

Operating Systems (OS)

Vital piece of a system software that manages and controls the computers hardware resources and offers services for other software to run to.

34
New cards

Desktops

Known for their expandability & customizations, they cater to everyday computing tasks

35
New cards

Laptops

Compact, all in one computing device designed to be portable and suitable for mobile use.

36
New cards

Servers

Powerful computer designed to manage, store, send and processes data 24/7

37
New cards

Redundant Array of Inexpensive Devices (RAID)

They combine multiple individual hard drives or solid state devices into a single logical device used by the server

38
New cards

Headless Configuration

No monitor, no keyboard, or mouse directly connected to the serverS

39
New cards

Smartphone

Handheld device that combines the the functionalities of a computer and a cellular phone

40
New cards

Tablets

Portable touchscreen devices that utilize the same kind of mobile operating systems like iOS

41
New cards

Internet of Things (IOT)

Devices embedded with sensors, software, and network connectivity enable seamless integration between the physical and digital world

42
New cards

Industrial Internet of Things (IIOT)

Sensors on manufacturing equipment can predict maintenence needs, helping to reduce downtime and improve efficiency.

43
New cards

GE’s Predix

Offers a suit of analytical tools that help companies make sense of data from industrial equipment, optimizing performance, and predicting potential equipment failures

44
New cards

Original Experience Manufacturer (OEM)

Those that produce parts, components, or subsystems that are used in another companys endproduct