MIME (Multipurpose Mail Extension)
A standard that extends email format to support text in non-ASCII characters and attachments like audio, video, and images.
SMTP (Simple Mail Transfer Protocol)
A protocol for sending and receiving email messages.
RTP ( Real-time Transfer Protocol)
A network protocol for delivering audio and video over IP networks, used in streaming and video conferencing.
NAPT (Network Address Port Translation)
A method that translates multiple network addresses into a single one by altering port numbers.
ARP (Address Resolution Protocol)
A protocol used to map IP addresses to MAC addresses.
DHCP (Dynamic Host Configuration Protocol)
Automates IP address configuration and network services like DNS for devices on a network.
TCP (Transmission Control Protocol)
Ensures reliable, ordered, and error-checked data transmission over the internet.
UDP (User Datagram Protocol)
A communication protocol for fast, connectionless data transmission without error checking.
RSA (Rivest-Shamir-Adleman)
RSA is a public-key encryption algorithm that uses an asymmetric encryption algorithm to encrypt data.
A public-key encryption algorithm for securing sensitive data.
DSA (Digital Signature Algorithm)
A cryptographic algorithm used to authenticate digital messages via digital signatures. DSA works by having two keys: a private key owned by the sender and a public key held by the receiver.
DH (Diffie-Hellman)
A key exchange protocol to securely establish shared secrets over public channels.
AES (Advanced Encryption Standard)
A widely used symmetric encryption standard for securing data. AES is implemented in software and hardware throughout the world to encrypt sensitive data. It is essential for government computer security, cybersecurity and electronic data protection.
System Audit
Evaluation of an organization's practices to ensure compliance with policies and regulations.
Unit Test
Testing individual components of code to ensure they function as expected.
Acceptance Test
A test to verify if a product meets required specifications or contract conditions.
Qualification Test
Evaluation of a product or system to ensure it meets performance standards before release.
SATA (Serial ATA)
A computer interface for connecting storage devices like hard drives and SSDs.
Key Frame Method
A traditional animation technique where important frames (keyframes) define motion, with intermediate frames generated for smooth transitions.
Morphing
A visual effect that transitions one image or shape into another.
Motion Capture
A technique for recording the movements of objects, humans, or animals for realistic digital animation.
Pixel Shader
A program that determines the color and appearance of pixels in 3D graphics, adding lighting and texture effects.
Roll Forward
Applies changes to a database during recovery to bring it up to date.
Patch Cable
A physical cable used to connect network devices.
Repeater Hub
A network device that rebroadcasts incoming signals to all connected devices.
Router
A router makes forwarding decisions based on IP addresses (Layer 3 of the OSI model) rather than MAC addresses.
LTE
A mobile communication standard with packet switching, supports MIMO (multiple antennas), and is standardized by 3GPP.
MAC Address
A protocol that manages access to the physical network medium, part of the data link layer.
Mobile Device Management MDM
A system for managing mobile devices in organizations.
Voice over Internet Protocol
A technology for transmitting voice over IP networks
RFID Radio Frequency Identification
A technology used for wireless identification and tracking of objects.
TKIP Temporal Key Integrity Protocol
A security protocol used in Wi-Fi encryption (WPA).
Web Beacon
A small, invisible image used for tracking user activity on websites. Not a malicious tool package.
Cross-site scripting (XSS)
An attack where malicious scripts are injected into a legitimate website.
DNS cache poisoning
An attack where incorrect DNS information is inserted into a DNS resolver’s cache, redirecting users to malicious sites.
SEO poisoning
An attack where malicious websites are manipulated to rank highly in search engine results, misleading users to visit them.
Social Engineering
An attack method where attackers trick people into divulging sensitive information
TLS ( Transport Layer Security)
A cryptographic protocol that ensures secure communication over a computer network. It encrypts data to provide privacy, integrity, and protection from tampering during internet communications, such as web browsing and email.
MRP (Material Requirements Planning)
A system for managing production materials and inventory based on production schedules.
Internet Control Message Protocol
ICMP is used for sending error messages and operational information, such as whether a service is available or a host is reachable (e.g., used by the "ping" command).
NPT
NTP is used to synchronize the clocks of devices over a network. It ensures that all devices on a network have the same time.
RIP (Routing Information Protocol)
RIP is a distance-vector routing protocol used for determining the best route for data by counting the number of hops to the destination.
APOP (Authenticated Post Office Protocol)
APOP is an authentication mechanism used in POP3 for retrieving emails. It provides a way to authenticate the client to the email server using a challenge-response system.
POP3S (Post Office Protocol 3 Secure)
POP3S (Post Office Protocol 3 Secure)
S/MIME (Secure/Multipurpose Internet Mail Extensions)
S/MIME is a protocol for securing emails by providing encryption and digital signatures. It ensures the confidentiality and integrity of email content.
SMTP-AUTH (Simple Mail Transfer Protocol Authentication)
SMTP-AUTH is an extension of the SMTP protocol that allows an email client or sender to authenticate with the mail server when sending an email.
Changeability
The ease with which a software system can be modified to correct defects, improve performance, or adapt to a changing environment.
Interoperability
The ability of a system to work with other systems, exchanging data and using functionalities seamlessly.
Portability
The ease of modifying a software to operate on different platforms or environments without significant rework.
Usability
How easily users can learn to use the software, and how effectively they can interact with it to achieve their goals.
Backtracking
A general problem-solving technique where you revert to a previous step when a current solution path doesn’t work.
Forward Engineering
The process of moving from high-level abstractions and logical designs to the actual implementation of the system, such as from UML diagrams to code.
Reengineering
The process of analyzing and modifying an existing system to improve it or adapt it to new requirements.
Reverse Engineering
The process of analyzing a system’s components or code to extract knowledge or recreate design elements, such as creating a UML class diagram from existing code.
Core Competence
The unique strengths or abilities that give a company a competitive advantage in the market, such as specific skills or technologies.
Corporate Governance
The system by which companies are directed and controlled, focusing on transparency, accountability, and how decisions are made within the organization, especially concerning the interests of stakeholders like shareholders, employees, and customers.
Corporate Identity
The image or branding of a company that reflects its values, culture, and mission. It is how a company presents itself to the public.
Stakeholder Analysis
The process of identifying and assessing the influence and interests of various stakeholders (e.g., customers, employees, investors) in a company’s decisions and operations.
Control Chart
A graph used to monitor the stability of processes over time by showing variations in data points, with control limits to identify any potential deviations.
Histogram
A bar chart that displays the frequency distribution of a set of continuous data, helping to visualize the spread and central tendency of the data.
Pareto Chart
A type of bar graph that shows the relative importance of different factors, following the 80/20 rule (80% of problems are caused by 20% of the causes).
Scatter Diagram
A graph that plots data points on the vertical (Y-axis) and horizontal (X-axis) axes to show the relationship between two variables, helping to identify correlations or trends.
Accumulator
A special register used to store intermediate results of arithmetic and logic operations performed by the CPU. It acts as a temporary storage for calculations before moving the results to memory or other registers.
Index Register
A register that holds an index value to modify operand addresses during instruction execution. It is often used for accessing elements in arrays or for addressing modes in assembly language.
Instruction Register
A register that temporarily holds the current instruction being executed. The instruction register fetches the instruction from memory, decodes it, and prepares it for execution by the CPU.
Program Counter
A special register that contains the address of the next instruction to be fetched and executed. It is automatically updated after each instruction fetch, ensuring the CPU knows the sequence of instructions to execute.
Fatal Error
A serious error that causes the program to terminate unexpectedly. This term is generally broad and doesn't specifically refer to memory access issues.
Page Fault
Occurs when a program tries to access a page in its virtual memory that is not currently loaded into main memory. The operating system handles the page fault by loading the required page from disk (or another storage) into memory, allowing the program to continue executing.
Scheduling Error
Refers to issues related to the scheduling of processes or threads, often due to conflicts or mismanagement in a multitasking environment. This term does not specifically relate to memory access issues.
Segmentation Fault
An error that occurs when a program tries to access a memory segment that it is not allowed to access or when it tries to read or write to an invalid memory location. This is more related to memory protection rather than paging specifically.
Backup File
A copy of the database that is stored separately to prevent data loss. It does not specifically record update history but is used for recovery purposes.
Checkpoint File
A file that records the state of the database at a particular point in time. It helps in recovery by storing the information needed to restore the database to a consistent state but does not maintain a detailed update history.
Dump File
A file that contains a snapshot of the database, typically used for exporting or transferring data. It does not track updates or changes but rather provides a static view of the database at a certain point.
Log File
A file that records all transactions and changes made to the database, including values before and after updates. It serves as the update history, allowing the database to be restored to a previous state if necessary.
Cross-site request Forgery
A type of attack that tricks the user into executing unwanted actions on a different website where they are authenticated. It does not involve embedding malicious code in the web page itself.
Cross-site scripting (XSS)
A vulnerability that allows an attacker to inject malicious JavaScript code into a web page viewed by other users. When victims load the affected page, the embedded script executes in their browser, potentially stealing data or performing actions on their behalf. This is the correct answer.
OGNL Injection
An attack that targets systems using the Object-Graph Navigation Language (OGNL) to manipulate objects and data. While it involves injecting code, it’s not specifically related to JavaScript or embedding code in web pages.
SQL Injection
An attack that exploits vulnerabilities in an application by injecting malicious SQL queries into input fields, allowing attackers to manipulate the database. This does not involve JavaScript code or embedding it in web content.
Brute Force
A method that systematically tries all possible combinations of passwords or keys until the correct one is found.
Denial of Service
An attack that aims to make a service unavailable by overwhelming it with traffic, not focused on obtaining information.
Man-in-the-middle
An attack where an attacker intercepts and relays communication between two parties, potentially accessing confidential information but not through trial-and-error.
Sniffing
A technique for capturing and analyzing network traffic to obtain sensitive information, but not involving trial-and-error.
Penetration Test
A simulated cyber attack on a computer system or network to identify security vulnerabilities that could be exploited by attackers.
Regression Test
A type of software testing that ensures that recent changes haven’t adversely affected existing features. It’s not focused on security vulnerabilities.
Software Inspection
A formal review process where software is examined to find defects, but it does not simulate attacks on the system.
Walk-through
A method where a developer leads others through a program or system to explain its logic and functionality, typically for review purposes, not for vulnerability detection.
Concurrent Engineering
A method that emphasizes the parallelization of tasks to reduce the time taken to develop a product. It focuses on collaboration across different departments but does not specifically relate to database design.
Cold Start
Starting a system from a powered-off state, requiring full initialization.
Rollback
Restoring a system to a previous state by undoing recent changes.
Warm Start
Restarting a system that is still partially operational or recently shut down.
ERP (Enterprise Resource Planning)
Integrated management of core business processes through a suite of applications.
SaaS
A cloud computing model where users access software applications over the Internet, using only the necessary features as needed.
SCM (Supply Chain Management)
Management of the flow of goods and services, including all processes that transform raw materials into final products.
XBRL (eXtensible Business Reporting Language)
A markup language for financial reporting and data exchange, allowing for better transparency and analysis of business information.
CCO (Chief Compliance Officer)
Responsible for overseeing and managing compliance with laws, regulations, and internal policies.
CIO (Chief Information Officer)
Oversees the information technology strategy and the management of IT resources in a company.
COO (Chief Operating Officer)
Responsible for the day-to-day operations of the company and implementing business strategies.
Abstraction
Abstraction is the concept of hiding complex implementation details and showing only the essential features of an object.
Polymorphism
Polymorphism allows objects of different classes to be treated as objects of a common superclass. It can be achieved through method overriding and method overloading.
Inheritance
Inheritance is a mechanism where a new class (child class) inherits attributes and behaviors (methods) from an existing class (parent class).
Encapsulation
Encapsulation is the bundling of data (attributes) and methods (functions) that operate on the data into a single unit or class, restricting access to some of the object's components.
Composition
Composition is a design principle where one class contains references to objects of other classes, forming a “has-a” relationship.
Association
Association represents a relationship between two objects, where one object uses or interacts with another.
Aggregation
Aggregation is a specialized form of association that represents a “whole-part” relationship where the part can exist independently of the whole.
Niche Strategy
Focuses on serving a specific, small segment of the market with specialized products or services. The goal is to dominate a narrow market that larger competitors might overlook.
Leader Strategy
Adopted by the market leader, it aims to maintain the dominant position by innovating, expanding market share, and setting industry standards.
Challenger Strategy
Aimed at overtaking the market leader by attacking their weaknesses, differentiating offerings, or focusing on aggressive marketing and innovation.
Follower Strategy
Involves copying or slightly improving the leader’s products while minimizing risks. Followers focus on adapting to market changes without leading innovation.
GPL (General Public License)
is a widely used open-source software license that guarantees users the freedom to use, modify, and distribute software.
Cyclic Redundancy Check - CRC
Uses polynomial division to generate a remainder (CRC value) sent with data. The receiver checks if the received data is divisible by the same polynomial to detect errors.
Hamming Code
Adds redundant bits (parity bits) to data for single-bit error detection and correction.
Horizontal Parity Check
Adds a parity bit to each row of bits to ensure an even or odd count of 1s.
Vertical Parity Check
Adds parity bits for each column of bits. Each column is checked independently.
RPA
RPA stands for Robotic Process Automation. It refers to the use of software robots or "bots" to automate highly repetitive and routine tasks that are typically performed by human workers. RPA aims to increase efficiency, reduce errors, and free up human resources for more complex and value-added activities.