Glossary

IT Fundamentals Acronym List

The following terms are found in the official CompTIA IT Fundamentals + Acronym List.

Acronym

Spelled Out

AC

Alternating current

ACL

Access Control List

AES

Advanced Encryption Standard

AIO

All-in-one

ARM

Advanced RISC Machine

ARP

Address Resolution Protocol

ASCII

American Standard Code for Information Interchange

BD-ROM

Blu-ray Read-Only Memory

BIOS

Basic Input/Output System

CAD

Computer-aided design

CAM

Computer-aided manufacturing

CD

Compact Disc

CD-ROM

Compact Disc–Read-Only Memory

CD-RW

Compact Disc–Rewritable

CPU

Central processing unit

CRUD

Create, Read, Update, Delete

CSS

Cascading Style Sheets

DC

Direct current

DDL

Data Definition Language

DDoS

Distributed denial of service

DDR

Double data-rate

DHCP

Dynamic Host Configuration Protocol

DIMM

Dual inline memory module

DLP

Data loss prevention

DML

Data Manipulation Language

DNS

Domain Name Service or Domain Name Server

DoS

Denial of service

DSL

Digital Subscriber Line

DVD

Digital Video Disc or Digital Versatile Disc

DVD-R

Digital Video Disc–Recordable

DVD-RW

Digital Video Disc–Rewritable

DVI

Digital Visual Interface

EMI

Electromagnetic interference

eSATA

External Serial Advanced Technology Attachment

ESD

Electrostatic discharge

EULA

End-user license agreement

FAT

File Allocation Table

FAT32

32-bit File Allocation Table

FTP

File Transfer Protocol

FTPS

File Transfer Protocol over Secure Sockets Layer

Gb

Gigabit

GB

Gigabyte

Gbps

Gigabits per second

GHz

Gigahertz

GPS

Global positioning system

GPU

Graphics processing unit

GUI

Graphical user interface

HDD

Hard disk drive

HDMI

High-Definition Media Interface

HFS

Hierarchical File System

HTML

Hypertext Markup Language

HTTP

Hypertext Transfer Protocol

HTTPS

Hypertext Transfer Protocol over Secure Sockets Layer

ICMP

Internet Control Message Protocol

IMAP

Internet Mail Access Protocol

IOPS

Input/output operations per second

IoT

Internet of Things

IP

Internet Protocol

IPS

Intrusion prevention system

IR

Infrared

ISP

Internet service provider

Kb

Kilobit

KB

Kilobyte or Knowledge Base

Kbps

Kilobits per second

LAN

Local area network

MAC

Media access control

MB

Megabyte

Mb

Megabit

Mbps

Megabits per second

MHz

Megahertz

MITM

Man in the middle

MP3

Moving Picture Experts Group Layer 3 Audio

MP4

Moving Picture Experts Group Layer 4

NAS

Network-attached storage

NDA

Nondisclosure agreement

NFC

Near-field communication

NIC

Network interface card

NTFS

New Technology File System

OEM

Original equipment manufacturer

OS

Operating system

PB

Petabyte

PC

Personal computer

PCI

Peripheral Component Interconnect

PCIe

Peripheral Component Interconnect Express

PII

Personally identifiable information

PIN

Personal identification number

POP

Post Office Protocol

POP3

Post Office Protocol 3

PSU

Power supply unit

PXE

Preboot Execution Environment

RAID

Redundant Array of Independent Disks

RAM

Random Access Memory

RF

Radio frequency

RJ

Registered Jack

RJ-11

Registered Jack Function 11

RJ-45

Registered Jack Function 45

ROM

Read-Only Memory

SaaS

Software as a Service

SATA

Serial Advanced Technology Attachment

SD card

Secure digital card

SFTP

Secure File Transfer Protocol

SID

System identifier

SMB

Server Message Block

SMTP

Simple Mail Transfer Protocol

SNMP

Simple Network Management Protocol

SQL

Structured Query Language

SSD

Solid-state drive

SSID

Service set identifier

SSL

Secure Sockets Layer

SSO

Single sign-on

TB

Terabyte

Tbps

Terabytes per second

TCP

Transmission Control Protocol

TCP/IP

Transmission Control Protocol/Internet Protocol

TKIP

Temporal Key Integrity Protocol

TLS

Thread-local storage

UPS

Uninterruptible power supply

URL

Uniform resource locator

USB

Universal Serial Bus

VGA

Video Graphics Array

VoIP

Voice over Internet Protocol

VPN

Virtual private network

WAN

Wide area network

WEP

Wired Equivalency Privacy

Wi-Fi

Wireless Fidelity

WLAN

Wireless local area network

WPA

Wireless Protected Access

WPA2

Wireless Protected Access 2

Glossary of Industry Terms

Terms marked with an asterisk (*) are CompTIA IT Fundamentals+ acronyms, some with additional information provided.

1.8-in drive Form factor for an SSD or hard disk drive suitable for use in a tablet or thin laptop.

10000 rpm Spin rate of a high-performance SATA hard disk.

104-key keyboard Keyboard layout with Windows and right-click keys added to the old 101-key layout.

2.5-in drive Form factor for an SSD, hybrid drive, or hard disk drive suitable for use in a laptop or desktop computer.

20-pin ATX Power supply connector used by version 1.x of the ATX motherboard form factor standard.

24-pin ATX Power supply connector used by current version 2.x of the ATX motherboard form factor standard.

3.5-in drive Form factor for a hybrid drive or hard disk suitable for use in a desktop computer.

32-bit architecture Architecture used by x86 processors.

32-bit Windows Versions of Windows optimized for x86 processors; also compatible with x64 processors.

5400 rpm hard disk drive Spin rate for a “green” energy-saving hard disk.

64-bit architecture Architecture used by x64 processors.

64-bit Windows Versions of Windows designed for use with x64 processors.

7200 rpm hard disk drive Spin rate of a medium-performance desktop (3.5-inch) hard disk drive or a high-performance laptop (2.5-inch) hard disk drive.

802.11a A wireless Ethernet standard that uses 5GHz radio signals and provides performance at rates from 6Mbps up to 54Mbps. It is not compatible with other 802.11-based wireless networks unless dual-band access points are used.

802.11ac A wireless Ethernet standard that uses 5GHz radio signaling for performance up to 1300Mbps. Uses MU-MIMO antenna technology.

802.11b A wireless Ethernet standard that uses 2.4GHz radio signaling for performance from 2Mbps to 11Mbps. It is compatible with 802.11g-based wireless networks but not with 802.11a-based networks unless dual-band access points are used.

802.11g A wireless Ethernet standard that uses 2.4GHz radio signaling for performance up to 54Mbps. It is compatible with 802.11b-based wireless networks but not with 802.11a-based networks unless dual-band access points are used.

802.11n A wireless Ethernet standard that uses 2.4GHz and 5GHz radio signaling for performance up to 600Mbps. Uses MIMO antenna technology.

A

A/V* Audio/Video.

About This Mac macOS app that displays information about your computer and macOS version installed.

AC* Alternating current; the type of electrical current used to run homes and businesses.

AC’97 version 2.3 audio An analog audio codec standard that supports 96KHz sampling and 20-bit stereo playback. Most implementations support jack sensing.

accelerometer A combination of hardware and software that measures velocity in mobile devices; accelerometers detect rotation, shaking of the device, and so on.

Access Control List See ACL.

access denied Message that appears when a user doesn’t have the permissions needed to perform an action on a file.

access point (AP) Also known as wireless access point (WAP). Enables wireless (Wi-Fi) devices to connect to a network.

Accessories Windows Start menu folder containing small apps such as Calculator, Paint, WordPad, Notepad, and other.

Accounting In the security context, refers to methods for recording users’ access to internal and external resources. Three common methods include logs, tracking, and web browser history.

ACID (Atomicity, Consistency, Isolation, Durability) A database that supports the Durability feature of ACID (Atomicity, Consistency, Isolation, Durability) is designed to store transactions that are completed even if the system crashes afterwards.

ACL* Access Control List; a list of permissions for a file and the users or groups that have those permissions.

ACPI* Advanced Configuration Power Interface; an industry specification for the efficient handling of power consumption in desktop and mobile computers.

acronym Word created from the initial letters in a phrase, such as LAN (local area network).

Action Center Windows Control Panel utility that provides one-stop access for security, maintenance, troubleshooting, and recovery options.

active heat sink Heat sink with attached fan.

active listening Listening to a customer while asking questions to draw out more information about a problem or need.

Activity Monitor macOS app that displays running apps and services.

Activity tracker A wearable device that records physical activity such as steps, heart rate, and more. May be integrated into a smart watch or run as an app on a smartphone.

add-ons and extensions Browser add-ons and extensions enable users to customize a browser’s features and add additional options. Browser add-ons and extensions can be used to disable potentially dangerous scripts.

ad-hoc Something that is performed to meet a specific need. An ad-hoc wireless network is created to share printers or information. Implies lack of permanency.

administrative privileges Privileges necessary to perform system-wide changes in Windows (for example, to run tasks marked with the Windows Security shield in Control Panel).

Administrators In Windows systems, Administrators can perform any task, including installing new apps, deleting existing users, and more. Standard users can manage their own accounts but must provide the name and password for an administrator before they can perform administrator-level tasks.

ADSL Asymmetric Digital Subscriber Line. A form of DSL that enables faster downloads than uploads. Can be provided over high-quality, existing phone lines and is well suited for residential and small-business use.

Advanced RISC Machine (ARM) In mobile devices, a 32-bit or 64-bit reduced instruction set computing architecture designed for low-power consumption and simplicity.

AES* Advanced Encryption Standard; encryption used by WPA2 wireless networking.

AFP Apple Filing Protocol; proprietary network protocol for OS X and Classic macOS.

AHCI Advanced Host Controller Interface; SATA setup option in BIOS that supports native command queuing (NCQ) and all other advanced features.

AIO* All-in-one; may stand for a multifunction device that combines print, scan, copy, and sometimes fax capabilities or for a computer built in to a display with a separate keyboard and mouse.

air filter mask Protective gear that might be required for computer techs.

Airplane mode Mobile device setting that turns off cellular, Wi-Fi, and Bluetooth radios.

AirPrint Apple print technology for macOS and iOS devices for printing without installing specific drivers. Most current printers have AirPrint support built in.

ALTER SQL statement that changes tables, indexes, and primary keys

alternate third-party drivers Drivers for Windows that support third-party storage features such as RAID host adapters.

alternative IP address An IP address used if the DHCP server used to assign IP addresses can’t be contacted.

analog (audio) Continuous vibrations at different pitches and frequencies (not sampled).

Android Mobile operating system for tablets and smartphones. Developed by Google.

anti-malware software Software that blocks or scans and quarantines malware.

antistatic bag Protective bag for electronic parts. Prevents ESD.

antivirus software Software that blocks or scans and quarantines computer viruses.

antivirus/anti-malware Software that blocks or scans and quarantines computer viruses and also blocks or scans and quarantines or removes other types of threats.

AP See access point.

APIPA Automatic Private Internet Protocol Addressing (IPv4); a technology implemented on certain Windows platforms through which a system assigns itself an IP address in the absence of a DHCP server. Addresses are assigned from the 169.254.x.x address range.

APIPA/link-local address A self-assigned IP address that cannot be used for Internet access. Link-local is the IPv6 version.

APM Advanced Power Management; an API that enables an operating system running an IBM-compatible personal computer to work with the BIOS to achieve power management.

app scanner Software or service that scans apps for privacy and security issues.

app store General name for the trusted software repositories used by iOS (App Store), Android (Google Play), and Windows (Microsoft Store).

Apple Configurator App used for mass configuration and deployment of iOS devices for organizations and schools.

Apple Pay secure payment service that enables users to pay with their iOS smartphones.

application Software, program, or app.

application crash When an app stops responding.

apt-get Linux command for installing and managing apps (packages).

ARM* Advanced RISC Machines; CPU design used by Android and iOS smartphones and tablets.

ARP* Address Resolution Protocol; maps physical (MAC) addresses to IP addresses in Ethernet and Wi-Fi networks.

array Two or more hard drives addressed as a logical unit, such as a RAID or JBOD (just a bunch of disks) array.

artifact A visible problem with a video display, such as visual noise, blockiness due to over-compression of a photo or video source, and so on.

ASCII* American Standard Code for Information Interchange; a set of 128 seven-bit characters that are widely used for text files. Includes A–Z, a–z, 0–9, and punctuation characters found on standard U.S. keyboards as well as some nonprintable control characters.

Assembly language Assembly language is specific to a processor type. Instead of being used to create large applications, assembly language is used for operating system-related functions such as device drivers.

assigning/changing drive letters A feature of Windows Disk Management that enables new drives to receive a user-assigned drive letter and existing drives to switch to a different drive letter. Drive mapping performs the same task for network shares.

ATA Advanced Technology Attachment; a family of standards for PATA and (in ATA-7 and above) SATA interfaces.

ATAPI Advanced Technology Attachment Packet Interface.

ATM Asynchronous Transfer Mode; ATM is a core protocol used over the SONET/SDH backbone of the public switched telephone network (PSTN) and Integrated Services Digital Network (ISDN), but its use has declined in favor of IP technology.

attenuation Attenuation is the reduction of wireless transmission strength caused by objects in the path of the signal, such as doors, walls, or trees. Attenuation causes wireless network connections to run more slowly.

ATX Advanced Technology Extended; motherboard form factor with integrated port cluster at left rear of board, and the basis for most mid-size to full-size desktop systems.

audio Sound that is recorded or played back on a computer or mobile device.

audio mini-jack 3.5mm (1/8 inch) jacks used for stereo and surround audio, microphones, and line-in/line-out connections.

AUP Acceptable use policy; a document stipulating constraints and practices that a user must agree to before being granted access to a corporate network or the Internet.

authentication The process by which a device or user proves its identity to another device. For example, when a user logs into a computer, network, or email service, the user must provide one or more items to prove identity.

authentication server A server that checks the credentials of users who log in to the network.

authenticator application An application that validates access to a secured website from a new device or browser by sending a PIN code to the user’s mobile phone. The user enters the PIN when prompted.

authorization Refers to the actions a user is allowed to take after connecting with a resource (a drive, folder, network, website, and so on).

Automator macOS feature that is used to schedule tasks.

autorun Strictly speaking, the ability of an operating system to automatically start an app on an optical disc as soon as the disc is inserted. Also used to refer to automatically starting an app on any removable-media drive as soon as it is inserted or connected.

B

backup A copy of a file or folder made on a separate storage device and retained in the event of the loss or corruption of the original.

backup/restore An app that creates backup copies of files and restores them when needed. Backup/restore apps are included in Windows, macOS, and Linux. Third-party apps are also available.

barcode reader Special scanner that reads barcodes for POS, inventory control, security, and other uses.

baseband Component in a cellular network-enabled device (smartphone, tablet) that translates cell signals to and from the onboard CPU. Baseband firmware is updated by the cellular service provider to handle improvements in cellular service when needed.

BASIC The BASIC language was developed in the early 1960’s at Dartmouth College as a device for teaching programming to non-technical people. There is a reason it’s called BASIC; B (Beginner’s) A (All-Purpose) S (Symbolic) I (Instruction) C (Code).

basic (disk type) A basic disk in Windows is bootable and can contain one or more primary partitions.

battery A rechargeable power source used by laptops, tablets, and smartphones for main power and by a UPS for backup power. A disposable power source used by CMOS batteries on motherboards. Uses NiMH, Li-Ion, alkaline, or silver oxide chemistry.

battery backup A device that provides temporary power to connected units until they can be shut down; UPS and SPS devices are two different types of battery backups.

BD-R Recordable Blu-ray (BD) media.

BD-RE Rewriteable Blu-ray (BD) media.

BD-ROM* Blu-ray Read-Only Memory media.

Belarc System Advisor A third-party ActiveX web-based program that identifies the computer’s operating system, hardware, Windows version, and security status.

best practices General term for guidelines that describe the best way to perform a process or achieve a result.

Binary notation The fundamental building block of all computer operations and data storage. Binary uses only two digits; 0 (off) and 1 (on). Binary notation is also known as Base 2 notation.

biometric authentication The process of using biometrics to determine whether a potential user can access a secured area or system.

biometric devices Devices used for biometric authentication, such as fingerprint scanners, iris scanners, and so on.

biometrics Biometrics fall into the category of “something a person is.” Examples of bodily characteristics that are measured include fingerprints, retinal patterns, iris patterns, and even bone structure.

BIOS* Basic Input/Output System; a system that controls and tests basic computer hardware at the beginning of the boot procedure. See also UEFI.

bit The smallest storage unit is the bit. A bit is the 0 or 1 in binary (base 2) numbering. A nibble is equal to four bits.

BitLocker A full disk encryption feature available in the Enterprise and Ultimate editions of Windows Vista and Windows 7, and the Pro and Enterprise editions of Windows 8, 8.1 and Windows 10.

BitLocker to Go An extension of BitLocker for removable-media and external drives. Introduced in Windows 7 and enhanced in Windows 8 and newer.

blackout Complete loss of AC power.

blade A compact device that has one or more CPUs and might also include storage, networking, and management. It is plugged into a blade server, an enclosure that provides power and cooling and might also provide management.

blade server An enclosure for multiple blades that provides power and cooling and might also provide management.

Bluetooth Short-range wireless network used primarily by mobile devices.

Blu-ray An optical medium originally developed for HD movies; capacity of 25GB single-layer and 50GB in dual-layer; also referred to as BD.

BNC Bayonet-Neill-Concelman or British Naval Connector. Used by network and cable TV coaxial cables.

Bonjour Apple software for zero-configuration wireless networking. Used by OS X, macOS, and iOS.

bookmarks Another name for favorites in a web browser; web pages the user has tagged for easy reloading.

Boolean Boolean values are used in Boolean logic, which evaluates whether a given condition is true (1) or false (0). These values are binary.

boot Starting the computer.

Boot Camp OS X and macOS dual-boot feature that enables Windows to be installed on an OS X or macOS system.

Boot Configuration Data BCD; the configuration information used by Windows Vista/7/8/8.1/10 to determine how to start (boot) the system.

boot.ini The configuration information used by Windows XP to determine how to start (boot) the system.

BOOTREC Windows Recovery Environment (RE) command to fix startup problems in Windows Vista/7/8/8.1/10.

branching Branching involves choosing between options based upon one or more variables. One of the most common ways to select between options is the use of an IF statement.

bridge Device that connects two or more networks together to form a larger aggregate network.

brownout Reduction in voltage of 10% or more from specifications.

browser caching A feature that enables a web browser to display already-viewed content much more quickly when you visit the page again.

browser redirection Unauthorized change of the home page, error page, or search page in your web browser to another URL. Can be caused by malware or by apps the user installs that do not allow for opt-outs to these changes when the apps are installed.

brute forcing (brute-force attack) An attack against a password-secured resource that involves using all possible password combinations until the correct password is found.

BSOD Blue Screen of Death. So named in Windows systems because the error message is in white text against a blue background. See STOP errors.

bus speeds Speeds of various buses on motherboards (PCI, PCIe, memory, and so on).

bus-powered hub Receives power from upstream USB port; limits power to 100mA per device.

Business software Software that is used by business to perform business-related functions. Types of business software include database software, project management software, business-specific applications, and accounting software.

BYOD Bring your own device. Acronym for the policy of allowing employees to use their own mobile devices for organization business instead of an organization-provided one.

byte A byte is equal to eight bits. A single character in a plain-text file requires a byte to store it. Multiples of a byte are used by all larger units of measure.

C

cable Wire or wire bundle that delivers data or power to a computer or mobile device.

Cable Cable Internet uses the same RG6 coaxial cable as cable TV, but adds a device called a cable modem to convert the signal for use by computers and home/business networks.

cable lock Lock that uses a multistranded security cable to help prevent the theft of a computer or other technology device. Sometimes called a Kensington lock.

cable management The act of controlling where cables are installed. They should be kept out of walkways, off the floor, and away from anywhere a person might move about.

cable modem A device that encodes/decodes cable Internet network signals. Can be connected to a single computer or to a wired or wireless router.

cable select A PATA jumper setting that enables the 80-wire cable to determine primary and secondary drives.

cable stripper Tool that strips insulation from coaxial or TP wires during the installation process.

cable tester Tool that checks the cable’s ability to carry data reliably.

CAD* Computer-aided drafting; used in computer systems to aid in the creation, modification, analysis, or optimization of a design.

Calendar Function included in desktop and mobile operating systems or available from third parties to keep track of dates, appointments, and tasks to complete.

calibration Adjustments to improve print quality on inkjet or color laser printers.

CAM* Computer-aided manufacturing; the use of software to control machine tools in the manufacturing of workpieces. It is used in many schools with computer-aided design (CAD) to create objects.

camcorder Video camera that records to videotape (DV camcorder) or to flash memory or a hard drive (HD camcorder).

camera You can add two different types of cameras to a desktop or laptop computer- A webcam, which can be used for live video chatting or for recording still photos and videos, A digital camera, which can use the desktop or laptop as a permanent storage location for the photos or videos you have already taken. Both types of cameras connect to a USB port.

CAPTCHA Completely Automated Public Turing Test to Tell Computers and Humans Apart.

captive portal A captive portal looks like an open wireless network to the wireless network app in a smartphone, tablet, or a PC. When you click it, the connection opens to a login page on the user’s default browser. It may be necessary for the user to open the browser manually. After agreeing to the terms of service, the user can navigate to any page permitted by the portal’s rules of use.

card reader A single-slot or multislot device for reading from and writing to flash memory cards.

carriage and belt Components that are part of inkjet or impact printers.

CAT3 Category 3 TP cable. Supports two-line phones and Ethernet 10Mbps.

CAT5 Category 5 TP cable. Supports Fast Ethernet (10/100Mbps).

CAT5e Category 5e TP cable. Supports Gigabit Ethernet (10/100/1000Mbps).

CAT6 Category 6 TP cable. Supports 10G Ethernet (10/100/1000/10000Mbps) and reduces crosstalk for more reliable connections at Gigabit speeds.

CAT6a Category 6a TP cable. Supports 10G Ethernet (10/100/1000/10000Mbps) and reduces crosstalk for more reliable connections at 10G speeds.

CAT7 Category 7 TP cable. Supports 10G Ethernet (10/100/1000/10000Mbps) and has faster transmission speeds than CAT6a.

Category view Default Control Panel view in Windows Vista/7/8/8.1/10. Control Panel applets are grouped into categories with the most frequently used options available from the Category menu. Click a category for all options.

CCFL Cold Cathode Fluorescent Lamp; backlight for conventional LCD displays.

CD* Compact Disc; the oldest optical disc format. DVD and BD drives can also use CD media.

CDFS Compact Disc File System; the ISO 9660 standard, which defines how information is written to optical discs and is used by Windows and macOS.

CD-ROM* Compact Disc–Read-Only Memory; an adaptation of the CD. Computers can read CD-ROMs, but cannot write to CD-ROMs, which are not writable or erasable.

CD-ROM boot Booting from a CD-ROM disc.

CD-RW* Compact Disc–Rewritable; a blank Compact Disc that can be recorded, erased, and rerecorded many times.

cell tower analyzer Mobile app that displays the signal strength of nearby cell towers.

cellular (data network) Data network that enables smartphones and cellular-equipped tablets and laptops to send and receive data via the cellular network.

certificate of destruction Certification from a drive or media-destruction facility that the drive or media has been destroyed.

certificates Provided by companies known as certificate authorities (CAs); the certificates are provided to your web browser. To see the certificate for a secure site, click the padlock, then click the Certificate link to view the certificate information.

chain of custody The chronological documentation or paper trail of evidence that might be used in a court of law.

channels In Wi-Fi, channels are the different frequencies available to 2.4GHz and 5GHz signals. In motherboards, they are two or more identical memory modules grouped together as a logical unit for faster data access. In TV, channels are different frequencies that carry programs.

char The Char data type refers to a single character or a single-character variable.

chip creep Socketed chips working their way out of their sockets over time due to heating/cooling.

chipset Support chips on a motherboard (northbridge or memory controller hub; southbridge or I/O controller hub) that provide an interface between onboard components and expansion slots and the CPU.

CHKDSK Windows command for testing and correcting errors on SSDs, flash memory, and hard disk drives.

chmod Linux command for changing file permissions.

chown Linux command for changing the owner of a file.

cipher text (ciphertext) The message after encryption. The receiver of the cipher text must have a decryption key to convert the cipher text back into plain text.

Classic view Alternate view of Control Panel that lists each applet separately. Also called Large Icons view and Small Icons view.

clean boot Starting Windows without startup services or programs.

clean install Installing an OS on an empty partition rather than as an upgrade to an existing installation.

client Computer that uses shared resources on a network.

client/server Network using dedicated servers such as Microsoft Windows Server editions.

client-side DHCP Settings on a network client for DHCP. When enabled, the client receives an IP address from the server. Otherwise, the client must have an IP address manually assigned.

client-side DNS Settings on a network client for DNS. When enabled, the client uses DNS servers provided by the network. Otherwise, the client must use manually assigned DNS servers.

client-side scripts Used to process user input and usually written in Java-Script. Client-side scripts can be a security risk, so browsers have options to deactivate client-side scripts including settings and add-ons.

clock Clock speed; the speed at which a processor sends and receives information. Same as clock rate.

closed source Software/OS/apps developed by a particular vendor and licensed for use, but changes are not permitted. Object code is not available, and modifications are not permitted.

cloud computing Computing that uses shared Internet-based computers or storage devices.

cloud file sharing Sharing files with a cloud storage service such as Dropbox, Google Drive, and others.

cloud hosted Cloud hosted applications include characteristics such as Internet access required, service required, and files saved in the cloud.

cloud printing Printing that uses shared printers accessed over the Internet.

cloud storage service Cloud storage services enable both personal and business users to access their information and apps anywhere an Internet connection is available. Services such as Google Drive, Microsoft OneDrive, Dropbox, Amazon Drive, and others offer subscriptions that provide access to specific amounts of cloud-based storage.

CMOS Complimentary Metal-Oxide Semiconductor; refers to low-power chip design. It’s also a common term for Real-Time-Clock/Non-Volatile RAM (RTC/NVRAM) chip.

CNR Communications network riser; the riser slot and card for the soft modem and network adapter on some motherboards.

coaxial A type of cable that consists of a solid center copper core, insulation, a metal braided jacket for grounding, with a vinyl or plastic outer jacket. Commonly used for CATV, cable Internet, and satellite Internet.

cold site A disaster recovery location that has basic amenities such as HVAC, AC power, and network, but needs computer equipment, software, and data to function.

collaboration software Enables you and your co-workers to stay in touch with face-to-face, voice, or text exchanges. Examples include: email client, conferencing, instant messaging, online workspace, and document sharing software and services.

collate Printing multiple copies of a multiple-page document in order, so the document does not need to be assembled later.

color depth The number of colors in a display; 24-bit color can display over 16 million colors.

color patterns The patterns visible in a full-color display. A normally-functioning display has different patterns than a malfunctioning display.

COMMAND Old Windows and MS-DOS/PC-DOS command interpreter. Replaced by CMD.EXE.

command line Microsoft Windows uses the command line (also known as command prompt) primarily for technical management tasks. A typical home or business user has little need to use the command line. To open a command line session, open cmd.exe. The terminal in macOS and Linux is sometimes referred to as the command line.

command prompt Prompt in Windows where command-line programs can be run. Open a command-prompt session by opening CMD.EXE.

commercial license Software that is licensed only after the payment of a fee.

community (cloud) Type of cloud computing in which organizations with common concerns or goals share a cloud infrastructure.

Compact Disc (CD) CD media has a capacity of 700MB; DVD and Blu-ray (BD) drives can also read and write CD media.

Compact Flash A popular type of flash memory card for professional digital single-lens reflex (DSLR) cameras.

company confidential information Information that a company uses internally for its business.

compatibility error Programs/apps display this error if they can’t run properly under the current operating system.

compatibility mode Mode in which compatibility settings (changes in resolution, permissions, and so on) are applied to enable a program/app to run under an operating system.

compatibility tools Tools in the OS to enable a program/app to run under the OS. In Windows, these include the Program Compatibility Wizard and the Compatibility tab.

compiled programming language Unlike interpreted programming languages that are run line-by-line and markup languages that work tag by tag, a compiled programming language converts the entire program (source code) into machine-readable code (also known as object code).

compliance with local government regulations Regulations for HVAC, disposal of hazardous chemicals, recycling of old electronics, and others need to be followed to avoid legal penalties.

Component Services A Microsoft Management Console plug-in for managing COM+, DCOM Config, and Distributed Transaction Coordinator components.

components Windows features such as COM+, DCOM Config, and Distributed Transaction Coordinator components used by developers.

composite A low-quality video I/O standard that combines all video signals into a single cable. Does not carry audio.

compressed air Can be used to remove dust, grit, and debris from computers, peripherals, and printers.

compression Enables a drive to store more information than it could normally store. Compression is supported by NTFS and HFS Plus. The amount of disk space that can be saved with compression depends upon the file type being compressed. Compression utilities can be used to store one or more files into a single archive file for backup or emailing. The resulting file can be slightly to significantly smaller than the originals, depending upon compression method and data type.

Computer Management Windows interface for managing tasks, events, users, performance, storage, and services. Snap-in for the Microsoft Management Console (MMC).

COMx Communication port (x=port number). See serial port.

concurrent license Allows a single copy of a program to be used by more than one user.

confidential materials Information proprietary to an organization.

constraints Properties assigned to a column or set of columns that define what type of data can be placed in the column. Constraints are used to prevent inconsistent data and to enforce data integrity.

content filtering Feature of some networks, firewalls, and routers that prevents selected content types from reaching the computers or mobile devices that requested the content.

contingency plan Plan to recover from a disaster striking a home, business, or organization.

continuous reboots Symptom of power supply problem on the Power Good line or STOP (BSOD) error if system is configured to restart on BSOD.

Control Panel A Windows feature that sets Windows hardware options. It can be accessed from the Start menu or the Start, Settings menu in most versions of Windows.

COPY Windows internal command for copying files between one location and another.

copyleft Using copyright laws to assure that software or other works can be used, distributed, and modified and that items derived from those works have the same conditions for use/distribution/modification.

copyright Legal granting of control to the creator of an original work to decide who and whether others can use the work for a specified period of time.

CPU* Central processing unit; an electronic circuit that can process data and execute computer programs (Intel Core i7, AMD Ryzen, and so on).

CPU cache CPU caches hold the most recently accessed memory locations. The CPU cache is checked before system RAM is accessed in case the information needed is already in cache and can thus be accessed more quickly.

CPU core Processing unit inside a CPU. Most CPUs produced today have two or more cores.

CPU fan connector Connection on motherboard to power the CPU fan and monitor speed.

CPU socket Location on the motherboard where the CPU is placed. A spring-loaded clip or locking plate holds the CPU in place.

CPU-Z A third-party CPU identification program that provides extensive technical information on a CPU’s features and revision level.

creased paper Paper-feed problem that can cause printer jams. Often happens when paper is not aligned before being fed into the printer or when the paper guides are not set correctly.

CREATE SQL statement that creates databases, tables, or other elements.

credit card reader Card reader that plugs in to a mobile device’s 3.5mm mini-card headset jack for use in accepting credit/debit cards.

crimper Tool that squeezes a cable connector onto the raw cable to create a finished cable assembly. Versions available for RJ-11, RJ-45, and coaxial.

critical data Data essential to the day-to-day operation of a home, business, or organization.

Cron Linux app that is used to schedule tasks.

cross-platform software Software that is designed to run on more than one combination of hardware and software.

CRUD* Create, Read, Update, Delete; the four basic functions of storage such as flash memory, hard drives, SSDs, and so on.

CSS* Cascading Style Sheets; a language used to create web pages and other pages using XML tags.

cultural sensitivity Using appropriate language and behavior when dealing with people from a different culture than yours.

custom system configuration A computer configuration that is not a stock or standard configuration to better fit the computer to a specified task.

customer expectations What a customer expects during the handling of an installation, repair, or emergency event.

customer information Information about an organization’s customers’ identities, orders, and more.

D

data Information that is stored electronically and can be retrieved or transmitted.

data at rest A general term for data that is being stored on a device.

data capture and collection The process of gathering specific information.

data correlation A statistical relationship between two types of data.

data in transit Data that travels over the public Internet or data that travels on an internal network such as a local area network (LAN). Data may be encrypted while stored (data at rest), but when it is traveling between devices, it is decrypted. To protect it while it is being sent or received, other types of encryption are needed.

data manipulation Changing the order or format of data to make it more meaningful or easier to understand

data persistence Refers to data that remains available after the process that creates it is finished. For example, a database that has been updated with new transactions is not persistent until it has been stored to disk.

data restoration Making data from a backup file or device available for use by an application.

database dump SQL-driven output of a database that can be used as a backup or reused in another database app

DB-25 Serial communications D-shell connector, 25 pins.

DB-9 Nine-pin D-shell connector.

DC* Direct current; the type of electrical current supplied by batteries or by a PC’s power supply.

DDL* Data Definition Language; a computer language used to create and modify the structure of database objects within a database. These database objects include schemas, tables, views, and indexes.

DDoS* Distributed denial of service; an attack that occurs when multiple computer systems flood the bandwidth or resources of a targeted system or network.

DDR* Double Data Rate; refers to Double Data Rate SDRAM. A faster form of SDRAM formerly used by many video cards and motherboards.

DDR RAM* Double Data Rate Random Access Memory.

DDR SDRAM* Double Data Rate Synchronous Dynamic Random Access Memory.

DDR2 SDRAM Double-Double Data Rate SDRAM is the successor to DDR SDRAM. DDR2 SDRAM runs its external data bus at twice the speed of DDR SDRAM, enabling faster performance.

DDR3 SDRAM Double Data Rate Three SDRAM is the successor to DDR2 SDRAM. DDR3 SDRAM runs its external data bus at twice the speed of DDR2 SDRAM, enabling faster performance. DDR3 SDRAM also uses lower voltages than DDR2 and supports higher memory capacities.

DDR4 SDRAM Double Data Rate Four SDRAM is the successor to DDR3 SDRAM. DDR4 SDRAM runs its external data bus at twice the speed of DDR3 SDRAM, enabling faster performance. DDR4 SDRAM also uses lower voltages than DDR3 and supports higher memory capacities.

DE15 Video Graphics Array (VGA) connector that uses three rows of five pins each.

dead pixels A pixel on an LCD (CCFL or LED backlight) or OLED display that doesn’t light up.

dead short Short circuit on the motherboard that makes the system appear to be dead.

decrypt Reversing the encryption of a file or drive so the contents can be viewed.

decrypt email Reversing the encryption of an email attachment so the contents can be viewed.

Default passwords Default passwords for your workstation or other device or web-based apps should be changed immediately. Default passwords are usually obvious (such as ‘password’) and simple to guess.

default SSID The service set identifier (SSID) assigned to a wireless router or access point by the manufacturer.

Defender Windows antivirus and anti-malware program.

DEFRAG A Windows command-line utility for defragmenting a drive.

defragmentation tool A program/app that can be used to defragment a drive. To launch the defragment tool in Windows, right-click a drive in Windows Explorer or File Explorer, select Properties, select Tools, and select Defragment now.

degaussing To demagnetize a CRT display. Degaussing removes color fringing and distortions onscreen. Some monitors automatically degauss the CRT when the monitor is turned on, and others offer a degaussing button or menu option to degauss on demand.

DEL The Windows command-line file-deletion tool. The equivalent in Linux or macOS Terminal is rm.

destruction The ultimate prevention of device availability is device destruction. Destroying storage devices by smashing hard disk platters, flash memory or SSD chips, or optical discs is a legitimate method for preventing the unauthorized reuse of data when storage has been withdrawn from service. However, if the devices are in use and there are no backups, storage destruction equals data destruction.

device drivers Software that enables an operating system to communicate with components and peripherals.

device ID Method of indicating different devices attached to a SCSI host adapter; each device must use a unique device ID number, which is set on each device.

Device Manager A Windows Control Panel applet used to view and manage hardware connected to a computer. It displays detailed information about the hardware in the system, including status and driver information.

Devices Windows 10 category in Settings for managing devices.

Devices and Printers A Windows 7/8/8.1/10 Control Panel applet that lists devices and printers and management options for each.

DHCP* Dynamic Host Configuration Protocol; provides IP addresses as required and allows a limited number of IP addresses to service many devices that are not connected at the same time.

DHCP server Server on a network that provides IP addresses on demand. Usually incorporated into a SOHO wireless router.

dial-up networking Network connection that uses an analog (phone line) modem to make a direct connection to a remote computer via a phone line.

dictionary attack An attack on a secure system that uses a dictionary of words and phrases to find the password.

digital camera A camera that uses a digital image sensor instead of film. Most digital cameras use flash memory cards for storage.

digital product A computer program, music, art, photography, or other creation that is downloaded rather than being distributed through physical media.

digital security Procedures for protecting secure networks, storage, and servers. Includes measures such as network encryption and authentication servers.

Digital subscriber line (DSL) Used by telephone companies to provide Internet services at speeds much faster than that allowed by analog (dial-up) Internet services while allowing traditional analog telephones and devices such as fax machines to share the same connection.

Digital Video Disk (DVD) DVD media has a capacity of 4.7GB (single-layer) or 8.4GB (dual-layer). Blu-ray drives can also read and write DVD media.

digitizer The touch-sensitive layer of a touchscreen display. The digitizer layer can be damaged without damaging the display on a desktop, laptop, or all-in-one unit, and it can be replaced.

dim image Symptom of a possible failing CCFL backlight or may simply indicate the brightness of a display is set too low.

DIMM* Dual Inline Memory Module. DIMMs are available in 168-pin, 184-pin, 240-pin, and 288-pin versions. Dual refers to each side of the module having a different pinout.

DIN Deutsche Industrie Norm; an electrical connector that was originally standardized in the early 1970s. The most common is the five-pin male keyboard DIN connector for the original IBM PC.

DIR Windows command-prompt command for displaying the contents of a folder (directory). The Linux and macOS Terminal equivalent is ls.

direct access Working with a database without using an intermediary such as programming or a GUI.

direct thermal Thermal printing technology in which the print head heats the paper.

directory Older term for a folder in Windows or other operating systems.

directory permissions Permissions assigned to a directory (folder) by the Share command (networking) or by the Advanced properties dialog.

disaster recovery The plan and procedures for recovering from a disaster and restoring IT functions.

discretionary access controls (DAC) Enable users to determine which users and groups can have access to their resources, and at what level. For example, in Windows, files and folders have owners. The owner of a file or folder can grant read, read/write, or other access levels to other users.

disk level encryption Encrypting an entire drive so that only an authorized user can view the drive’s contents after logging into the system. Disk level encryption is sometimes referred to as full disk encryption (FDE).

Disk Management Windows interface for managing hard drive storage (create, delete, format partitions).

Disk Utility macOS app for configuring hard drives.

Diskpart Windows command-line utility for preparing and managing disk drives, partitions, and volumes.

display General term encompassing monitors, HDTVs, and projectors used with a video card or port.

display settings Configuration of display resolution, color depth, refresh rate, and so on.

DisplayPort Primarily used to transmit video but can also send audio and USB signals as well. Designed as a replacement for VGA and DVI. Has similar resolution and audio/video features to HDMI, but with two major differences; DisplayPort is a royalty-free video standard, and DisplayPort 1.2 and later support daisy-chaining of displays.

distorted geometry Caused by not having the screen/wall and projector lined up properly with each other when a projector is used.

distorted image Stretched or squeezed images are caused by incorrect resolution settings. Other types of image distortion can be caused by 3D settings, overheating video card, or failing video card.

DLL Dynamic Link Library; binary files used by Windows and Windows programs.

DLP* Data loss prevention; a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. This term also describes software products that help administrators control what data end users can transfer. (DLP can also stand for Digital Light Processing, a technology used in HDTVs and projectors.)

DLT Digital Linear Tape; a magnetic tape data storage technology developed by Digital Equipment Corporation (DEC). A variant with higher capacity is called Super DLT (SDLT).

DMG macOS archive file used for downloaded programs and files.

DML* Data Manipulation Language; a language used to add, delete, and modify information stored in a database. SQL is an example of a DML.

DMZ Demilitarized zone. In network computing, a DMZ is a subnetwork that provides external services. It is often placed between the LAN and the Internet but is controlled by the organization that also controls the LAN.

DNAT Destination network address translation; more often referred to as port forwarding or DMZ.

Dnf Linux package manager used by recent versions of Red Hat, Fedora, and similar distributions.

DNS* Domain Name Service or Domain Name Server; translates domain names into IP addresses. See Domain Name Service/Server.

DNS server Server that provides DNS server IP addresses to the network. Often incorporated into a wireless router.

Dock OS X and macOS feature for launching and switching applications. It displays app icons across the bottom of the desktop.

docking station Enables laptops and other mobile devices to use devices not built in, such as card slots, high-end audio and video ports, and others; requires a proprietary, dedicated external bus connector.

document database A document database (also known as a document store or document-oriented database) is used to store semi-structured data such as XML or JSON.

documentation Printed or electronic manuals from the vendor explaining how to use an app, OS, or device.

domain Windows corporate network that uses a domain controller to store routes to network devices (shares, printers, and so on) and authenticate the users of each device.

domain name Unique alphanumeric identifier for websites.

Domain Name Service/Server (DNS) Server or service that provides DNS server IP addresses to the network. Often incorporated into a wireless router. It is a naming system for computers and services connected to the Internet or a private network that translates domain dames to numerical IP addresses.

domain setup During Windows installation, users are prompted to provide domain information so the computer can be added to the domain immediately.

DoS* Denial of service; an attack that seeks to make a device or resource unavailable to its users by disrupting services of a host connected to the Internet.

DRAM* Dynamic Random Access Memory (Dynamic RAM). The slowest type of RAM; requires frequent electrical refreshes to keep contents valid.

drill/hammer Popular data-destruction tools.

drive activity light Indicator on the front or top of a computer that lights up when the system drive is being used.

drive array Two or more drives used as a single logical unit.

Drive Not Recognized Error that takes place if a misconfiguration, cable error, or other problem prevents the computer from detecting the drive.

drive status Feature in Windows Disk Management that displays the condition and partition type of a drive.

drive wipe Process that overwrites all information on a drive so it cannot be retrieved.

driver A special file that instructs the OS on how to use a device.

driver installation Installing a driver for a new or existing device.

DRM Digital Rights Management; a set of access control technologies for restricting the use of proprietary hardware and copyrighted works.

DROP SQL statement to remove a table, including data, indexes, and so on

DSL* Digital Subscriber Line; a type of broadband Internet service that uses telephone lines to carry Internet traffic while allowing you to use your phone for normal functions at the same time.

dual channel A motherboard feature in which two identical memory modules are treated as a single logical unit for faster access.

dual rails A power supply with two +12V DC rails. Using dual rails is typically more reliable than using a single +12V DC rail. Many power supplies feature four or more +12V DC rails.

dual voltage A power supply that can manually or automatically switch between 115V and 230V DC current.

Dumpster diving Hackers can learn a lot about a potential target by searching for and removing data, confidential or not, from trash cans and recycling bins.

duplex A printing option that automatically prints on both sides of a sheet.

duplexing assembly The printer options that enable duplex (double-sided) printing.

dust and debris Common problems after a thermal printer with a ribbon is used. Use compressed air or isopropyl alcohol to remove these items before printing more.

DVD* Digital Versatile Disc or Digital Video Disc; the most common optical disc format.

DVD boot Starting a computer from a DVD.

DVD-R* Digital Video Disc–Recordable.

DVD-RAM Digital Video Disc–Random Access Memory.

DVD-ROM Digital Video Disc–Read-Only Memory.

DVD-RW DL An optical drive that supports rewriteable DVD and dual-layer recordable DVD media.

DVD-RW* Digital Video Disc–Rewritable.

DVI* Digital Visual Interface; replaced DFP as the standard for support of LCD displays on desktop computers. DVI-D is for digital displays only; DVI-I supports digital and analog displays; DVI-A supports analog displays only. Sometimes this is also referred to as Digital Video Interface.

DXDIAG DirectX Diagnostics; a Windows utility for identifying the DirectX version in use and testing the computer’s DirectX features.

dye sublimation Thermal printing technology in which dye is released as a gas onto the page.

dynamic partition Windows disk storage type that permits drive spanning, striping, mirroring, and fault-tolerant volumes.

E

eavesdropping When a person uses direct observation to listen into a conversation.

eBook An electronic book; a book in a variety of formats for use with e-reader apps or e-reader devices.

ECC Error Correction Code or Error Checking and Correction; advanced memory that can correct errors and requires special chipsets. ECC is used primarily in servers.

ECP Extended Capabilities Port; a parallel port for computers that supports bidirectional communication between the computer and a peripheral device such as a printer.

ECR Entry control roster; a list containing the names of those that should be permitted access. An ECR is often managed and controlled by a security guard to allow or disallow access to an area.

EEPROM Electrically Erasable Programmable Read-Only Memory.

EFS Encrypting File System; the encryption subset of NTFS.

EIDE Enhanced Integrated Drive Electronics.

electrical fire A fire caused by an electrical problem. A Class C fire extinguisher is designed for electrical fires.

email Electronic mail; messages that can also include attachments that are sent and received with email servers.

email filtering Email server or client feature that blocks sending or receiving of messages with undesirable content.

embedded computer Computer that performs a single task, such as an ATM.

embedded OS OS stored on firmware that controls an embedded computer.

EMI* Electromagnetic interference; interference caused by electromagnet disturbance affecting the performance of a device or transmission channel. It is called radio frequency interference (RFI) when the interference is in the radio frequency spectrum.

eMMC Embedded Multi-Media Controller; a low-cost form of flash memory used in low-cost mobile devices. Slower than SSDs.

EMP Electromagnetic pulse; a short burst of electromagnetic energy.

enclosure A case that can be used for computer components. Usually internal hard disks.

encryption File encryption is designed to prevent unauthorized users from viewing the contents of a file. Encryption is supported in NTFS, HFS Plus, and ext4 file systems. To encrypt files in FAT32, use a third-party utility.

end task Often used in Windows Task Manager to end a program or application that is not responding.

end user The user of a computer or mobile device. Usually assigned standard user privileges.

end-user policies Policies that govern the use of a computer or mobile device by an end user.

enterprise license A software license assigned to an organization rather than an individual computer.

EP Electrophotographic process; the seven-stage method for printing with a laser printer.

EPP Enhanced Parallel Port; an older signaling method (but still widely used) for bidirectional parallel communication between a computer and peripheral device such as a printer. It offers higher rates of data transfer than the original parallel signaling method.

EPROM Erasable Programmable Read-Only Memory; a type of memory chip that retains its data when its power supply is switched off.

ERD Emergency repair disk; a recovery tool for repairing missing or corrupt files or restoring the registry on a Microsoft Windows system.

e-reader A device designed for use with eBooks. Some can be converted into tablets by using nonstandard firmware.

eSATA External Serial Advanced Technology Attachment; a version of SATA for use with external drives.

ESD* Electrostatic discharge; the release of static electricity when two objects with varying electrical potentials come in to contact with each other.

ESD mat A mat that is connected to unpainted metal on a computer or component to equalize electrical potential.

ESD strap A strap worn by a computer technician and clipped to unpainted metal on a computer or other component to equalize electrical potential.

EULA* End-user license agreement; a software license agreement or contract between the licensor and purchaser. It grants the purchaser rights to use the software.

exFAT (FAT64) File system designed to support high-capacity removable storage media, such as flash drives.

EXIT A Windows command-prompt command to exit a command-line program or to exit the command prompt session.

EXPAND A Windows command-prompt command to expand a .cab archive file containing Windows components.

expansion slots Slots in the motherboard for video, network, mass storage, and other types of cards. Types include PCIe, PCI, and others.

expectation of privacy A legal test used to determine how the Fourth Amendment of the US Constitution (prohibition against unreasonable search and seizure) applies to a particular issue of privacy, such as employee privacy.

EXPLORER Runs Windows Explorer (Vista/7) or File Explorer (8/8.1/10) from the command line.

ExpressCard High-performance replacement for CardBus expansion In laptops; available in 34mm-wide (/34) and 54mm-wide (/54) versions.

ext3 Popular journaling file system formerly used by most Linux distributions.

ext4 Replacement for ext3 with support for larger drive sizes, more efficient file handling, backward compatibility, and other improvements. Currently used by most Linux distributions.

extended partition Windows disk partition that can be divided into one or more logical drives. Cannot be made bootable.

extensible Markup Language (XML) Enables data files to be stored in a way that is both human-readable and computer-readable.

external command Program run from the command line, such as XCOPY.EXE.

external hard drive An external hard drive is a USB, FireWire, or Thunderbolt mass storage device. In most cases, the operating system will recognize it and install it as soon as you plug it into the appropriate port.

F

face lock A mobile device security method that uses biometrics to detect your face.

factory recovery partition Common method used by manufacturers to provide Windows recovery media in compressed form.

factory reset/clean install The process of resetting a mobile device to its original condition and performing a clean installation of the OS.

faded prints Common indication of critically low toner level in a laser printer. Can also be caused by using an economy print mode.

failed login attempt restrictions A security feature that prevents login after a specified number of failed attempts.

failure to boot System cannot boot, possibly due to BIOS/UEFI boot order, damage to operating system files, or other causes.

fan Pulls air through the system past hot components for cooling and then out of the system.

fan connector Connection on the motherboard that powers and monitors a case or CPU fan.

fanless/passive A heat sink that does not use a fan.

FAT* File Allocation Table; a file system created for hard drives that originally used 12 or 16 bits for each cluster entry into a file allocation table.

FAT32* 32-bit File Allocation Table; a file system that allows for drive sizes up to 2TB (terabytes).

F-connector A coaxial cable connector used for CATV, cable Internet, and satellite Internet. Typically used with RG-59 and RG-6 cables.

FDD Floppy disk drive; 5 ¼-inch and 3 ½-inch floppy disks are read and written by an FDD.

fdisk Linux app for managing hard drive partitions.

feed assembly Paper-feed component on a printer.

feeder Paper-feed component on a printer.

fiber Short for fiber optic. Network cable that uses glass fibers to transmit photons to carry data.

fiber optic The fastest type of Internet service is based on fiber optic cabling. Fiber optic, which uses light waves (photons) instead of electrical signals to transmit and receive data, has been used for several years for Internet backbone connections between cities.

fields/columns In a standard table view, each column is a field. Some columns are key fields.

file attributes File settings that indicate if a file needs to be backed up or is a read-only, hidden, or system file.

file history A type of backup that retains copies of different versions of a file and enables the user to choose which version to restore.

file permission changes Changes to the default file permissions setting for a file or folder to prevent or permit certain types of actions to be performed by a user or class of users.

file recovery software Software that can recover a deleted file if the file bypassed the Recycle Bin or was never sent to the Recycle Bin.

file server A type of server optimized for sharing files with the network. Typical features include one or more drives, and designed to transmit and receive files from multiple devices at the same time using one or more Gigabit Ethernet or 10G Ethernet network adapters.

file sharing An OS configuration allowing a file or folder to be used by remote users on a network.

file structure and paths How the system drive is configured for storing user files.

file synchronization The process of assuring that files in two locations are updated according to the rules set by the app.

File-level (also known as file/folder-level) encryption Prevents an individual file from being read by users who don’t have the encryption key; other files on the device are not affected.

firewall A network device or software that blocks unauthorized access to a network from other users. Software firewalls, such as the Windows Firewall, ZoneAlarm, and Norton Internet Security, are sometimes referred to as personal or host firewalls. Routers can also function as firewalls.

FireWire 400 See IEEE 1394.

FireWire 800 See IEEE 1394.

Firmware Permanent software that is programmed into embedded systems, chips, IoT devices, and other computer hardware using read-only memory (ROM).

Firmware/BIOS When you first turn on a computer, a special chip called the BIOS (firmware) connected to the motherboard runs programs that activate essential parts of the computer. Later in the startup process, the BIOS/firmware hands responsibility over to the operating system to finish the startup process. See UEFI.

first response When the first technician arrives at the incident scene and identifies what happened.

fitness monitor A type of wearable technology that monitors blood pressure, pulse, steps, and other factors. Uses Bluetooth to communicate with the host mobile device.

flash drive Flash drives can be divided into two categories: USB and card-based. USB flash drives can be plugged directly into a USB port. Card-based flash drives must be plugged into a flash card reader before they can be used.

flash memory Memory that retains its contents without electricity.

Flat file A flat file database stores all information in a single table. This is suitable if all of the information you need to track is closely related.

FlexATX Small version of ATX motherboard designed for low-profile or small form factor systems.

flickering image Visual problem that can be caused by a failing CCFL backlight or by certain settings on mobile devices.

float (also known as floating-point) A number that contains up to seven digits and has at least one decimal place.

Flow chart (flowchart) Shows the flow of any type of process visually, and it’s a great way to help you visualize a planned program’s logic.

Fn key Function key; a special key on laptop keyboards that, when pressed, enables other keys to perform additional tasks, such as adjusting screen brightness, toggling the Windows desktop to an external display, and so on.

Folder options Windows dialog for setting options such as whether registered file extensions and hidden files are displayed.

Force Quit Linux and macOS option to shut down an unresponsive app/program.

force stop Android and iOS option to shut down an unresponsive app.

foreign key A foreign key relates (links) two database tables together. A foreign key can be more than one column and it must be present in both database tables you are trying to relate. The foreign key in one table must be the primary key or candidate key in another table.

form factor Physical size and shape of motherboard and power supply. Refer to www.formfactors.org for specifications for common motherboard and power supply standards.

FORMAT Windows command-line tool for preparing a new drive for use or for overwriting the drive’s contents so the drive can be reused.

FQDN Fully qualified domain name; a complete domain name for a specific computer on the Internet. The FQDN consists of the hostname and the domain name.

front/top panel connectors Connections on front or side of the motherboard for power switch, indicator lights, reset, and other features from the front or top of the computer.

frozen system A system that is unresponsive to the mouse, keyboard, or touch. The power switch must be used to shut down a frozen system.

FRU Field replaceable unit; a computer or electronic part or assembly that can be quickly and easily removed from a computer or other piece of electronic equipment and replaced by a technician without having to send the system to a repair facility.

FSB Front side bus; an older computer communication interface (bus) often used in Intel-chip-based computers. It carries data between the central processing unit (CPU) and the memory controller hub (known as the northbridge).

FTP* File Transfer Protocol; used to transfer files to or from a special server site on the World Wide Web.

FTPS* File Transfer Protocol over Secure Sockets Layer. FTP by itself is not secure; FTPS is used for securing file transfers.

full device encryption The contents of the entire device are encrypted. Assign a PIN code to a mobile device to encrypt it.

full format A disk format that rewrites sector markings over the entire disk rather than simply clearing the root directory (root folder), as with a quick format.

full system functionality system able to perform all the tasks it needs to do

fuser assembly The laser printer component that heats the toner and paper and bonds them together.

G

gadget A Windows 7 feature that allowed the user to place small applets anywhere on the screen. The applets were the same as those used in the Windows Vista sidebar. No longer supported by Microsoft due to security issues.

game pad Game controller.

gaming console A device made to play video games that can be installed from optical media or downloaded. It contains high-speed CPU and GPU components (sometimes integrated) that are designed to render 3D scenes, and the latest models use a Blu-ray (BD) drive to load games or to play DVD and Blu-ray movies.

garbled characters Random text and graphic characters produced by a printer. Can indicate damage to the data cable between the printer and computer or the use of an incompatible printer driver.

gateway The private IP address of a device (such as a router) that connects computers on a LAN to another network.

Gb* Gigabit.

GB* Gigabyte.

Gbps* Gigabits per second.

GDI Graphics Device Interface; the Microsoft Windows GDI enables applications to use graphics and formatted text on both video displays and the printers.

General options The first menu of options displayed when a user opens the Settings menu on an iOS device.

generic hub USB hub that plugs in to a USB port or USB root hub.

geotracking The practice of tracking and recording the location of a mobile device over time.

gestures Finger movements made across an iOS trackpad or Magic Mouse surface or across a touchscreen or touchpad on other operating systems that perform specific tasks.

ghost cursor/pointer drift Symptoms pointing to problems with the touchpad or track pad on a laptop, including accidental thumb swipes, touchpad stuck in the “always clicked” mode, and others.

ghost image Afterimage of the previous page on a page printed with a laser printer. Usually indicates a problem with the toner subsystem, including incorrect voltage, toner sticking to the rollers, and so on.

GHz* Gigahertz.

Gigabit NIC A network interface card (or port) that supports 10/100/1000Mbps Ethernet connections.

glasses and headsets Two types of wearable technology.

Gmail Also known as Google Mail.

Gnu Privacy Guard (GnuPG) Common encryption tool that can be installed with most Linux distributions and even Android.

Google Pay Secure payment service that enables users to pay with their Android smartphones.

Google Play Store The Android app store.

Google Sync The Android cloud backup service.

Google/Inbox Google Mail (gMail).

GPS * Global positioning system; a worldwide system of satellites that provides information concerning the whereabouts of mobile devices and anything else with a GPS receiver.

GPT GUID partition table; used for hard drives over 2.1TB in size.

GPUPDATE Windows command-line utility to refresh group policy settings.

graphics processing unit (GPU) A graphics processing unit (GPU) is a component that renders display output. Currently, there are two places the GPU is located: Many processors made for desktop computers as well as almost all processors made for laptops and other form factors include GPU functions. For higher performance in gaming, 3D rendering, and CAD, cards with discrete GPUs are used in desktops and workstations.

grep Linux plain-text search command.

group use/site license Enables all users in a defined group such as a department, company, or location to legally run the licensed software. Site licenses typically have pricing that varies according to the number of users (seats) needed.

GRUB Linux bootloader.

GRUB2 An improved version of grub that supports booting from Live CD .iso files as well as scripting, among other changes. Often referred to as GRUB.

GSM Global System for Mobile Communications; an open, digital cellular technology used for transmitting mobile voice and data services.

guest account A Windows account with limited permissions.

GUI * Graphical user interface; Windows, macOS, GNOME (Linux), and KDE (Linux) are examples of GUIs.

gyroscope In addition to the accelerometers, this adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics.

H

HAL Hardware Abstraction Layer; an abstraction layer that is implemented in software, between the physical hardware of a system and the software that runs on that system.

half duplex/full duplex/auto Settings for NIC connection speed. Half duplex: the port sends but must wait until sending is over to receive, and vice versa. Full duplex (preferred): the port sends and receives simultaneously, thus doubling effective throughput. Auto: NIC selects the mode according to network defaults.

hard drive Mass storage device. Can refer to hard disk drive, hybrid drive, or SSD.

hard reset Also known as factory reset; clears all user information from a mobile device and resets it to as-shipped (factory) condition.

hardware Objects in a computer that are tangible; can be physically installed or removed.

hardware failure Hardware failure in major computer subsystems such as RAM, motherboard, CPU, storage, cooling, and power supply leads to system shutdown, data loss, and possible data corruption. Poor-quality electricity, such as low voltage (brownouts), overvoltage (surges and spikes) and outlet miswiring (incorrect polarity or missing ground) can damage or destroy motherboard, drive, display, and add-on card components.

hardware token A small keychain-sized device that generates one-time passwords or access codes for secure networks.

HAV Hardware-assisted virtualization; features in the CPU and BIOS that enable virtualization to perform faster.

HCL Hardware Compatibility List; a list of hardware that is compatible with Microsoft Windows operating systems and products.

HD Audio An Intel standard for High Definition Audio (also known as HAD or Azalia). It supports 192KHz 32-bit sampling in stereo and 96KHz 32-bit sampling for up to eight channels.

HD15 Another name for the VGA port.

HDD* Hard disk drive; a hard disk, hard drive, or fixed disk uses magnetic storage to store and retrieve data.

HDMI* High-Definition Media Interface; a compact audio/video interface for transmitting uncompressed digital data. See High-Definition Media Interface.

header cable Connects to motherboard header pins connected to integrated I/O ports.

headset Alternative to speaker or earbuds for listening to audio; when equipped with a microphone, a headset can also be used for hands-free smartphone operation.

heat sink Device that draws heat away from a component (CPU, GPU, or memory).

heating element Thermal printer’s equivalent to a print head. Creates text and graphics on special thermal paper or plain paper with a ribbon.

HELP Windows command-line utility for displaying help. Use HELP /command to see help for a specific command.

hexadecimal (hex) Also known as Base 16 notation, uses the following digits: 0-9 (equivalent to values 0-9 in decimal notation) and a-f or A-F (equivalent to values 10-15 in decimal notation) for a total of 16 digits.

HFS* Hierarchical File System; an Apple proprietary file system developed for computers running macOS. Originally designed for use on floppy and hard disks, it is also found on read-only media such as CD-ROMs.

hibernate Windows power-saving mode that writes the current desktop, opens apps, opens file information to the hard disk, and then shuts down.

HID Human interface device; a mouse or keyboard.

Hide Extensions The default setting in Windows Explorer/File Explorer; technicians should change this to display all file extensions for troubleshooting.

hierarchical storage management (HSM) Data storage technique that moves data from high-speed, high-cost storage to lower-speed, lower-cost storage as it becomes less current.

high availability An option in the configuration of some relational database management systems to enable fast recovery from an error.

high-definition media interface (HDMI) Originally developed for use with HDTVs and displays, the HDMI port is now a common feature on laptops, desktops, and monitors as well as HDTVs and HD projectors. HDMI, unlike DVI and VGA, also carries audio signals. Thus, you can play back audio from a slide show or movie using the speakers built into a monitor or HDTV.

hijacked email When a hacker or malware takes over your email, sends messages without your permission, and similar activities.

Hi-Speed USB USB 2.0 ports and devices.

home automation Technology used to automate lights, appliances, window coverings, and other home features.

Home Network setting Windows Vista/7 network location setting equivalent to selecting Private as the network type in Windows 8/8.1/10. Permits network discovery and supports creating or connecting to a homegroup.

home server A PC optimized to provide file, print, and backup services on a home or SOHO network.

HomeGroup Microsoft secure home and SOHO networking technology for Windows 7/8/8.1/10. In 2018, HomeGroup was removed from Windows 10 (Version 1803 and newer). However, even though it has been removed, you can still share printers and files by using features that are built in to Windows 10.

host firewall A host firewall is a software program running on a workstation or device that prevents unwanted Internet traffic from accessing your system. A host firewall can be used along with a hardware firewall device for an additional layer of protection. Windows and macOS include host firewalls that work on a per-application basis.

hot site A disaster recovery location that has all of the computer equipment, operating systems, applications, and data ready to function in the event that the primary IT site cannot function.

hotspot Method for sharing a smartphone’s Internet access via Wi-Fi.

hotspot/tethering Methods for sharing a smartphone’s Internet access via Wi-Fi or USB, respectively.

hot-swappable device Hot swapping describes inserting and/or removing components without interruption to the device or system. For example, Universal Serial Bus (USB) allows you to add or remove peripheral components such as a mouse, keyboard, portable hard drive, and printer. A SATA or eSATA hard drive configured in AHCI mode is hot swappable as well.

HPFS High-Performance File System; a file system created originally for the OS/2 operating system to improve upon the limitations of the FAT file system. HPFS provided a number of additional capabilities, including support for mixed-case filenames, longer filenames (255 characters as opposed to FAT’s 8.3 characters), and more efficient use of disk space.

HTML* Hypertext Markup Language; a standard for markup symbols that enables hyperlinking, fonts, special text attributes, graphics, and other enhancements to be added to text files for display with web browsers such as Microsoft Internet Explorer and Microsoft Edge, Mozilla Firefox, Google Chrome, Apple Safari, and others. The official source for HTML standards is the World Wide Web Consortium (W3C), but some browsers have added proprietary features to the HTML dialects they understand.

HTPC Home Theater PC.

HTTP* Hypertext Transfer Protocol; the basis for hyperlinking and the Internet. HTTP is interpreted by a web browser program.

HTTPS* Hypertext Transfer Protocol over Secure Sockets Layer; HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems.

hub Central connecting point for UTP-based forms of Ethernet. A hub broadcasts messages to all computers connected to it and subdivides the bandwidth of the network among the computers connected to it. See switch. Also refers to a device used to enable multiple USB devices to connect to a single USB port.

hybrid Refers either to cloud computing that shares characteristics of a private and public cloud or to a hard disk drive with a small SSD onboard for improving disk access time.

Hyper-Threading (HT) technology Intel CPU technology that enables a single processor core to work with two execution threads at the same time.

hypervisor The program running on a host machine that creates and manages virtual machines. Most often refers to Type 1 (Type I) virtualization, where the hypervisor connects directly with the hardware rather than running on top of the host’s OS.

I

i.LINK See IEEE 1394.

I/O Input/Output; a generic term for ports used for input or output, such as USB, PS/2 mouse and keyboard, and FireWire. Storage device ports (SATA and eSATA) are not categorized as I/O ports.

IaaS Infrastructure as a Service; a type of cloud computing in which users can lease cloud-based network services, servers, storage space, and other resources.

iCloud iOS cloud backup service.

ICMP* Internet Control Message Protocol; an error-reporting protocol that network devices such as routers use to generate error messages when network problems prevent the delivery of Internet Protocol (IP) packets.

ICR Intelligent Character Recognition; an advanced optical character recognition (OCR) or handwriting recognition system that allows fonts and various styles of handwriting to be learned by a computer or system to improve accuracy and recognition levels.

ID badge Can be used with various types of physical and digital security, including barcode readers and smart card readers.

IDE Integrated Drive Electronics; also known as ATA or PATA, IDE is an interface for connecting a motherboard to storage devices such as hard drives and optical media drives.

IDS Intrusion detection system; a software application or device that monitors and detects malicious activity on a network.

IEEE Institute of Electrical and Electronics Engineers; the world’s largest association of technical professionals whose objectives are the educational and technical advancement of electrical and electronic engineering, telecommunications, and computer engineering disciplines.

IEEE 1394 A high-speed serial connection. IEEE 1394a (FireWire 400) runs at 400Mbps and IEEE 1394b (FireWire 800) runs at 800Mbps. i.LINK is Sony’s name for a four-wire version of IEEE-1394a.

ifconfig Linux and macOS Terminal command to display and (optionally) change wired network configuration. Similar to the Windows ipconfig command-line utility. In macOS Terminal, ifconfig also supports wireless networking.

IIS Internet Information Services; an extensible web server created by Microsoft for use with the Windows NT family of operating systems.

image backup System backup that stores all information on the system, including the operating system, programs, settings, and data. Most recent image backup programs also support restoration of individual files.

image deployment Installing Microsoft Windows from an image

image recovery Re-creating a working OS from an image backup.

imaging device How Microsoft Windows identifies devices such as digital cameras or scanners in File Explorer/Windows Explorer.

imaging drum An important component in a laser printer.

IMAP* Internet Message Access Protocol; the second most common protocol used to download email.

IMEI International Mobile Equipment Identity; a 15- or 17-digit code that uniquely identifies a mobile phone. The IMEI enables a GSM (Global System for Mobile communication) or UMTS (Universal Mobile Telecommunications Service) network to prevent a lost or stolen phone from making calls.

impact paper Paper designed for impact printers. Typically has holes on both edges for sprocket feeding.

impact printer Print technology that uses a multipin print head and an inked ribbon to make an image.

impersonation A method in which someone assumes the appearance or character of someone else. Can also refer to an attacker configuring a computer or device that will be used in the attack to use another user’s credentials to run a service or an app.

import/input Import brings data into the database from an existing file, such as a spreadsheet, a comma selected values (CSV) file, or other delimited text file. Input is when a user enters each data record. Input can be used to populate an entire database, or it can be used to add additional records after importing data.

IMSI International Mobile Subscriber Identity; a unique number, usually consisting of 15 digits, associated with Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) network mobile phone users. The IMSI number is used to identify a GSM subscriber.

incident response The procedures to follow when unauthorized content or activities are detected.

incineration A method for destroying tape, optical discs, or flexible magnetic media.

Industry Standards Organization An international standards-setting body composed of representatives from various national standards organizations.

information Data that has been interpreted and processed to become meaningful for a particular question, situation, or requirement.

infrastructure The default Wi-Fi configuration, with wireless clients connecting to each other or to the Internet via an access point rather than directly to each other.

inheritance How files and folders receive permissions settings from parent folders.

initializing Preparing a hard drive for use with Windows Disk Management.

ink cartridge Ink supply for an inkjet printer. Almost all current products use a separate cartridge for each color.

inkjet printer A non-impact printer that sprays tiny droplets of ink on plain or glossy paper to create text and images.

in-place upgrade Another name for a repair installation in Windows.

input An input is a command or information that is made available to a computer. Before information can be processed by a computer, it must be input.

instant messaging An Internet communication method that sends and receives messages between two devices in virtual real time.

integer An integer (also known as int) is a whole number with no decimal points or fractions.

integrated GPU A graphics processing unit (GPU) incorporated in the CPU.

integrated I/O ports Ports built in to the motherboard port cluster or internal headers such as USB, DVI, HDMI, Ethernet, and others.

integrated print server A printer or all-in-one unit (scan/copy/print or scan/copy/fax/print) that includes a wireless and/or wired print server.

intellectual property Inventions, writings, art, photography, computer programs, and other creations of the mind.

interference Interference is caused by devices that are operating in the same frequency as the wireless network. For example, if channel 1 is used for your 2.4GHz wireless network, a nearby network using channels 2 or 3 would interfere with your network (and your network would interfere with theirs) because of the overlapping problem with 2.4GHz wireless networking.

intermittent connectivity A network issue that is most likely caused by physical problems, such as a loose or damaged cable or antenna wire, or network signal strength/interference problems.

intermittent device failure A hardware issue that is most likely caused by physical problems such as a loose or damaged cable, lack of USB bus power, and so on.

internal command Windows command-line operations built in to the Windows command interpreter, CMD.EXE, such as COPY, DEL, and DIR.

Internet appliance An Internet-connected device that performs a single task, such as a hardware firewall, email filter, intrusion detection device, and so on.

Internet pass-through When a mobile device connects to a PC to use the PC’s Internet connection.

Internet Protocol (IP) address A numerical label assigned to each computer or device connected to a network that uses the Internet Protocol for communication.

Internet Protocol version 6 (IPv6) Replacing the older Internet Protocol version 4 (IPv4), uses hexadecimal numbering for its IP addresses in place of much longer and harder to read binary values.

interpreted An interpreted computer language is run directly from the program’s instructions. You could say that it is run line-by-line. This contrasts with a compiled programming language, which is converted into a machine language before it can be run. Interpreted languages include scripting, scripted, and markup languages.

intrusion detection/notification An IDS device detects and notifies administrators of threats that might not be detected by a firewall.

invalid certificate (trusted root CA) A trusted root certificate authority (CA) provides digital certificates for use by websites and software developers to authenticate their products and services. An invalid certificate is one that was provided under false pretenses to an attacker. It can be used to take over a system.

inverter Converts DC current into AC current to power CCFL backlight in LCD displays.

IOPS* Input/output operations per second; an input/output performance measurement used to characterize computer storage devices such as hard disk drives (HDD), solid-state drives (SSD), and storage area networks (SAN).

iOS Apple’s mobile OS, used by iPod Touch, iPad, and iPhone devices.

IoT* Internet of Things; the network of devices, vehicles, home appliances, and others embedded with electronics, software, sensors, and connectivity, which enables them to connect and exchange data with reduced human intervention.

IP* Internet Protocol; the main protocol in the Internet Protocol suite for relaying datagrams across networks. It delivers packets from the source host to the destination host based on the IP addresses in the packet headers.

IP addressing The process of assigning IP addresses to network clients, including standalone devices as well as mobile devices, laptops, and desktops.

IP camera Camera that sends live video or still images to a server for access online. Can be part of a home security system or installed separately.

IP conflict Two devices (printers, mobile, computers, and so on) on a network with the same IP address.

IP-based peripherals Many peripherals today are IP-based. That is, they are configured, managed, or use information via the Internet (IP=Internet Protocol).

IPCONFIG Internet Protocol Configuration; Windows command-line tool that displays all TCP/IP network configuration settings.

IPP Internet Printing Protocol; an Internet protocol for communication between computers and printers (or a print server).

IPS* Intrusion prevention system (also in-plane switching). An intrusion prevention system is a network threat prevention technology that examines network traffic to detect and prevent vulnerability exploits. Compare with IDS. In-plane switching is a screen technology for desktop and laptop monitors, tablets, and smartphones that use liquid-crystal displays (LCDs).

IPSec Internet Protocol Security; authenticates and encrypts IP packets, effectively securing communications between the computers and devices that use it. It can negotiate cryptographic keys and establish mutual authentication.

IPv4 IP version 4 is the most common IP version, using 32-bit addresses.

IPv6 IP version 6 will eventually replace IPv4, offering 128-bit addresses to prevent address exhaustion and easier configuration.

IR* Infrared; infrared wireless networking uses infrared beams to send data transmissions between devices. Infrared wireless networking offers transmission rates reaching 10Mbps to 16Mbps.

IrDA Infrared Data Association; defines physical specifications and communications protocol standards for the short-range exchange of data over infrared. Used in personal area networks (PANs).

IRP Incident response plan; a set of written instructions that outlines the organization’s response to a physical or logical threat or emergency.

ISDN Integrated Services Digital Network; a set of communication standards for simultaneous digital transmission of voice, video, and data over the traditional circuits of the public switched telephone network (PSTN).

ISO International Organization for Standardization.

ISO image A single file that contains the layout of an optical disc.

ISP* Internet service provider; an organization that provides services for accessing and using the Internet.

iTunes Apple’s music and media store. Also used for backing up iOS devices.

iwconfig Linux command to display and (optionally) change wireless networks. Not supported in OS X or macOS Terminal.

J

jailbreaking The process of removing limitations on Apple devices, giving the user root access, and allowing a person to install unauthorized software.

jargon Technical language that a nontechnical user cannot understand; should not be used in discussions with customers.

JavaScript A programming language that is used by most web pages as well as many non-web applications. Scripts are typically stored using the .js extension.

JBOD Just a Bunch Of Disks; also known as spanned. The capacity of a JBOD array is the total capacity of all drives added together. a JBOD array Is used as a single volume.

journaling File system feature that continually records changes to the drive as they are made, enabling versioning and easier data recovery. Journaling is found in NTFS, ext3, ext4, OS X or macOS HFS, Windows NTFS, and most other non-FAT file systems.

joystick A game controller often used in flight simulators. Plugs in to a USB port or might use Bluetooth wireless networking.

judgmental An undesirable trait in customer service, marked by lack of active listening, jumping to conclusions, and making moral judgments unrelated to the topic at hand.

jumper Group of two or three pins on a motherboard, storage device, or card; used for configuration.

jumper block Fits across two jumper pins to enable or disable a feature.

K

Kb* Kilobit.

KB* Kilobyte or Knowledge Base.

Kbps* Kilobits per second.

kernel panic A crash on a computer running macOS or Linux that forces the OS to shut down.

key fob A device that can be used in various types of security setups—as a digital key for building or room access, as a PIN code/cryptographic code generator, and as a USB device for secure access to a computer, among other examples.

Key/value database In a key/value database, data is stored as a key (for example, a name) and a value (for example, a phone number). Each key must be unique, and the value can be text, number, HTML, a list, another key-value pair, and so on.

keyboard Alphanumeric data entry Input device with a typewriter-style keyboard and additional functional, numeric, directional, and text-editing keys. It connects via the USB or PS/2 keyboard port. Laptop keyboards also include Fn keys for special functions.

Keychain An macOS password management system.

kill Linux/macOS app for stopping apps and processes by process identifier (PID).

killall Linux app used to stop apps and processes by name.

knowledge base Online database of information about a particular product or service, usually assembled by the vendor.

KVM switch Keyboard-video-mouse; a device that enables a single keyboard, video display, and mouse to work with two or more computers.

L

L1 cache Level 1 cache memory; read by CPU first when new memory information is needed. This is the smallest cache size. See cache.

L2 cache Level 2 cache memory; read by CPU if L1 cache does not have wanted information. This is much larger than L1 cache. See cache.

L3 cache Level 3 cache memory; read by CPU if L2 cache does not have wanted information. This is much larger than L2 cache and is used on high-performance CPUs. See cache.

LAN* Local area network. A network in which the components connect through network cables; if a router is used, a LAN can connect to a WAN.

laptop A portable computer with a built-in screen, keyboard, and touchpad. Has features and performance similar to that of a desktop computer, but runs on battery or AC power.

laser printer Type of nonimpact page printer that quickly produces quality text and images. Most use the electrophotographic (EP) printing/imaging process.

LBA Logical block addressing.

LC Lucent Connector.

LCD Liquid crystal display. Type of screen used on portable computers and on flat-panel desktop displays.

LDAP Lightweight Directory Access Protocol. Maintains distributed directory information services. Examples include email and Microsoft Active Directory.

Least privilege model Also known as the principle of least privilege, recommends that a user should only have enough access to what is needed to perform assigned job-related tasks.

LED Light-emitting diode.

LED display LCD display with LED backlighting instead of a cold cathode fluorescent lamp (CCFL).

legacy/embedded systems Legacy systems are those that rely on outdated, often no-longer-supported software or hardware (for example, devices that use Windows XP). Embedded systems are computer systems built in to larger systems for control or other purposes. For example, a CNC (computer numeric control) router includes a computer that controls the cutting process. Embedded systems sometimes include legacy hardware or software, but not always.

LGA Land Grid Array. Intel CPU socket technology that uses small metal lands in the CPU socket instead of pins on the CPU.

LGA1150 LGA socket used by fourth-generation (Haswell) and fifth-generation (Broadwell) Intel CPUs. Haswell processors are the first to feature an integrated voltage regulator. Broadwell uses a smaller die size than Haswell for improved power efficiency and allows overclocking of the integrated GPU.

LGA1155 LGA socket used by second- and third-generation Core i-series processors; 1155 lands.

LGA1156 LGA socket used by first-generation Core i-series processors; 1156 lands.

LGA1366 LGA socket used by Extreme Core i7 CPUs; 1366 lands.

LGA2011 The original LGA2011 supports high-performance Sandy Bridge E and Ivy Bridge E processors. LGA2011-v3 supports high-performance Haswell E processors.

LGA775 First LGA socket from Intel; used by late-model Pentium 4, Pentium D, others; 775 lands.

Library A Windows feature that enables multiple locations to be viewed in a single Windows Explorer or File Explorer window.

licensing Legal agreement detailing how computer software, hardware, or firmware can be used by the licensee.

lifting techniques Methods for safely lifting heavy and bulky equipment, frequently requiring two or more people (team lifting).

Lightning The proprietary, reversible Apple iOS sync/charging connector used on current iOS devices.

LI-ION Lithium-ion.

LILO A Linux boot loader used on older Linux distributions. Largely replaced by GRUB and GRUB2.

limited connectivity When a network client can connect to LAN resources but not to the Internet. Can result from loss of connection to a DHCP server.

line-of-sight wireless A type of wireless networking in which fixed microwave towers are used to send and receive signals. A popular type of Internet and TV access in rural areas.

Linux An open source operating system that is inspired by the commercial Unix operating system. Available in many versions (called distributions or distros).

liquid-based cooling Cooling system for CPU, GPU, and other components that replaces air cooling with heat blocks, a heat exchanger, and liquid-filled hoses; used for extreme overclocking.

Live File System Microsoft’s implementation of the Universal Disc Format (UDF) for writing to recordable or rewriteable CD or DVD media in Windows.

Live sign in Signing in to a Microsoft (formerly Live) account.

Local Area Network (LAN) A network in which the components connect together through network cables; if a router is used, a LAN can connect to a WAN. A LAN is a group of computers and devices that share a common communications link within a smaller distinct geographic location.

local connectivity See limited connectivity.

local network hosted application An application that is installed on a local network (LAN). Its characteristics include Network required but Internet access is not required.

local security policy Security policy configured on an individual computer using the Local Security Policy MMC snap-in.

local share A share created on a local drive using File and Printer sharing in Windows.

Local Users and Groups A Computer Management node used to manage users and groups that can connect to the Windows computer being managed.

locally-installed application An application that does not require any outside resources after it is installed. Characteristics include network not required after initial installation, application exists locally, and files saved locally.

location data Data used for geolocation, such as a device’s GPS coordinates or approximate location as determined by cell towers or Wi-Fi access.

locator application Program or service that can be used to locate a lost smartphone, tablet, or computer.

lockout Feature built in to encrypted mobile devices and included on many secure websites to block login attempts after a specified number of failures.

lockup A system crash indicated by an unresponsive mouse cursor, keyboard, or touchscreen.

log Event record stored by an OS or app. In Windows, various logs are available in the Event Viewer node of Computer Management.

logical In disk partitioning using Windows, a logical drive is all or a specified portion of an extended partition on a drive using the MBR partitioning scheme.

logical drive Drive created inside of an extended partition.

LoJack for Laptops A locator service that is embedded in the system BIOS/UEFI firmware of most laptops. To activate it, purchase a subscription from LoJack.

loopback plug A plug that routes output to input wires to enable a port to be tested for proper send/receive functions. Widely available for testing Ethernet ports as well as legacy COM and LPT ports. Some BIOS/UEFI and third-party vendors also offer USB loopback plugs.

looping To enable code to run as many times as needed until a condition is no longer true, use a technique called looping. In Java, there are three types of looping: While, For, and Do While.

loud clicking noise A typical symptom of either a hard disk drive or other magnetic drive having read/write problems (the clicking comes from repeated seek movements of the read/write head) or from a failing cooling fan.

loud noise A loud “bang” or “pop” noise, often accompanied by smoke or a chemical odor, usually indicates the failure of a capacitor on the motherboard or in the power supply. The component must be replaced, and if the power supply is affected, it could have damaged other components as well.

low memory errors Errors caused by attempting to print a document that will not fit in the laser printer’s memory. These include partial page printout, requiring the page to be ejected manually, and very slow printing due to extreme page compression being used to try to print the document.

low RF signal Wireless network problem caused variously by obstructions between router and wireless client, the use of only one antenna by a router or client, or excessive distance between the router and client.

low-level format The format process used to prepare a hard disk drive or SSD at the factory. Although a true low-level format cannot be performed in the field, overwriting the drive’s surface with randomized data prevents existing information from being recovered.

LPD/LPR Line Printer Daemon/Line Printer Remote.

LPT Line Printer Terminal. See parallel port.

ls Linux/macOS Terminal command to list the contents of the current directory (folder).

lscpu Linux app that displays CPU information.

lshw Linux app that displays comprehensive hardware information.

lspci Linux app that displays PCI/PCIe hardware information.

lsusb Linux app that displays USB hardware information.

LVD Low voltage differential.

M

MAC* Media Access Control; a sublayer of the data link layer (DLL) in the seven-layer OSI network reference model. MAC is responsible for the transmission of data packets to and from the network interface card (NIC).

MAC Address A Media Access Control address (MAC address) of a device is a unique identifier assigned to a NIC for communications at the data link layer of a network segment.

MAC filtering Router configuration that permits network access only to listed MAC addresses. Can be defeated by attacker spoofing MAC addresses already on the list.

macOS Operating system used by Mac and iMac desktop and laptop computers.

macOS Server Server add-on for macOS.

magnetic disk drive Drive that uses one or more flexible or rigid platters coated in magnetic material. Hard disk drives (but not SSDs) are a current example.

mail server A server that sends or receives email.

maintenance kit A kit for laser printers that includes components that are most likely to wear out, such as the fuser, tray and cassette pickup rollers, tray separation pad, and cassette separation pad. Exact contents vary by model.

malicious software Malicious software, or malware, is software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.

malware Malicious software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent. Malware is a broad term used by computer people to include viruses, worms, Trojan horses, spyware, rootkits, adware, and other types of unwanted software.

MAN Metropolitan area network; a network that interconnects computer resources in a geographic area larger than a local area network (LAN) but smaller than a wide area network (WAN).

Mandatory access controls (MAC) Are strictly top-down; users have no options to make changes in how a resource (file, folder, etc.) can be accessed. Access is controlled by administrator-provided settings that define the object’s classification and the category that can use the object.

man-in-the-middle (MITM) A network attack in which the attacker relays and might alter information passing between two parties, each of which is convinced it is connected directly to the other party.

mantrap A physical security arrangement that uses two doors. The first door must close before the second door can open. Door opening can be controlled remotely or by using physical or electronic tokens.

manufacturer resources General name for instruction manuals, user manuals, service manuals, and other information about a particular computer, mobile device, peripheral, operating system, or app.

MAPI Messaging Application Programming Interface.

MAU Media Access Unit or Media Attachment Unit.

Mb* Megabit.

Mbps* Megabits per second.

MBR Master Boot Record; the data in the first sector of any hard disk that identifies where an operating system is located so that it can be booted into the computer’s main storage or random access memory.

MD Abbreviation for MKDIR; a Windows command-prompt command that makes a folder (directory).

MDM Mobile Device Management; software that secures, manages, and monitors multiple mobile devices from a central location.

meaningful reporting Reports generated from data that provide useful information that can lead to data-driven decision making.

measured service A cloud computing concept for the billing of services by one or more of several measures, such as by the hour, by data transferred, and so on.

Media Access Control (MAC) address A unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment.

Metadata Information (data) stored in a file that helps describe file contents, file dates, author, exposure, and other file-specific information.

Metro UI Windows 8/8.1 UI that is touch-oriented. Windows 10 combines some Metro UI elements (Tablet Mode) with a Start menu similar to Windows 7.

MFD Multifunction device.

MFP Multifunction product.

MHz* Megahertz.

microATX Reduced-size ATX-family motherboard that supports up to four expansion slots. Usually incorporates video ports and only two memory slots.

microDIMM Micro Dual Inline Memory Module.

microphone Used for recording audio, live audio, or video chat. Built in to laptop displays or can connect via USB or 3.5mm mini-jack.

microSD MicroSD is the most common type of storage expansion used by smartphones and tablets.

microUSB Smallest USB connector. MicroUSB Type B is used for USB-on-
the-go.

MIDI Musical Instrument Digital Interface; a standard developed for the storage and playback of music based on digital sampling of actual musical instruments.

MIME Multipurpose Internet Mail Extension.

MIMO Multiple Input Multiple Output.

Mini DisplayPort The Mini DisplayPort connection supports all of the features of DisplayPort in a smaller form factor.

miniDIN-6 Used for PS/2 mouse and keyboard ports.

miniHDMI Small version of HDMI port used by high-performance video cards and some tablets.

mini-ITX VIA Tech–originated ultra-compact motherboard design; used in computing appliances (media servers, and so on).

miniPCI Used for diagnostics cards and for Wi-Fi networking on older laptops.

miniPCIe Used for diagnostics cards and for Wi-Fi networking on more recent laptops.

miniSD Smaller than SD, larger than microSD. Not in widespread use.

missing boot configuration data The BCD store file (used for boot configuration in Windows 7/8/8.1/10) is missing. Restart the system with a Windows distribution disc or repair disc and use Startup Repair or BCDEdit to fix the problem.

missing DLL message A dynamic link library (DLL) file for a program or driver has been deleted or moved. If the file is not in the Recycle Bin, reinstall the app or driver.

missing graphical interface In Linux, the X Window server subsystem didn’t start or has crashed. Enter startx at the Terminal prompt to load it. In Windows, the Safe Mode command prompt might have been selected as the startup mode. Restart the system. If the system was started in VGA (low-resolution) mode, the mode selected might be out of the supported range for the video driver. Restart the system.

missing GRUB/LILO Indicates the Linux boot manager is missing. Can be caused by installing Windows after installing Linux. Use Boot-Repair (https://sourceforge.net/p/boot-repair/home/Home/) to fix.

missing operating system General error message when OS cannot be located by the system BIOS/UEFI firmware. Check boot order, remove unbootable media, and restart system.

Mission Control macOS app window manager and app switcher.

MITM* See Man-in-the-middle.

MLC Multilevel cell; faster but more expensive than SLC flash memory. Used in SSDs.

MMC Microsoft Management Console.

mobile apps Apps designed to run on a mobile OS such as iOS or Android.

mobile payment service Payment service that uses credentials stored on a smartphone. Usually requires that NFC be enabled.

modem Short for modulate-demodulate, this device converts digital computer information into analog form and transmits it via the telephone system to another computer.

Molex Four-pin power connector used for desktop PATA drives and some add-on cards. Molex connectors can be adapted to SATA drives, case fans, and Berg connectors (used for floppy drive power).

motherboard The motherboard (system board or mainboard) is the foundation of the computer. Motherboards connect the CPU, memory, storage devices, input, and output devices to each other with a combination of built-in ports and sockets and cables.

motion sensor Feature in Android and iOS devices that can be used for gaming or in conjunction with integrated camera for security or other uses.

mount point Empty NTFS folder used to mount a drive.

mounted drive A drive accessed through an empty NTFS folder.

mounting The process of recognizing a drive so its contents can be viewed.

mouse An input device that connects through the USB port or PS/2 mouse port. A standard mouse, unlike a printer, multifunction device, or scanner, is a plug-and-play device; it is automatically recognized by the operating system. However, a specialty mouse made for gaming may require driver software to enable features such as game-specific settings.

MP3* Moving Picture Experts Group Layer 3 Audio.

MP4* Moving Picture Experts Group Layer 4.

MPEG Moving Picture Experts Group.

MSCONFIG Known as System Configuration in Windows. A system utility used to troubleshoot the Microsoft Windows startup process.

MSDS Material Safety Data Sheet; a document with information about substances that contain chemicals. It explains how to treat a person who comes in contact with the substance.

MSINFO32 The Microsoft System Information utility displays information about Windows, the computer, peripherals, and installed applications.

MSTSC Microsoft Remote Desktop Connection app.

multiboot installation System configuration in which the user’s choice of two or more operating systems can be selected when the system starts.

multicore processor Processor with two or more cores; some desktop processors have as many as sixteen cores.

multifactor authentication When two or more items (such as a key fob and a password) are required to authenticate a login or entry.

multimeter An electrical testing device that can test amperage, AC and DC voltage, continuity, and other items.

multimode fiber Fiber optic cable with a large center core that is designed for short-distance networking.

multimonitor taskbars A feature of Windows 8/8.1/10.

multiple concurrent users Applies to a database that will be used by more than one user at a time (multiple concurrent users) and needs to have some type of locking mechanism to prevent data corruption.

multiple monitor misalignment/orientation macOS, Linux, and Windows all support multiple monitors but use different methods for configuring alignment.

multitouch touchscreens An input device that can sense the presence of two or more contact points. Common in personal computers, game consoles, laptops, tablets, and smartphones.

Music A Windows Vista/7/8/8.1/10 folder/library.

mutual authentication for multiple services (SSO) Access control method in which a user can sign on once to access multiple services. For example, signing in with a Microsoft account provides access to Outlook.com, OneDrive cloud storage, account management, and so on.

mv Linux/macOS Terminal command for moving/renaming files.

my eyes glaze over (MEGO) Slang expression referring to excessive technical information or statistical data that causes readers to stop paying attention.

N

NAS* Network-attached storage; a file-serving network appliance that contains one or more storage drives, arranged into logical, redundant storage containers or RAID. It Is often bundled with software to enable easy connections from computers on the network to the device

NAT Network Address Translation; enables multiple private IP addresses to connect to the Internet through a single public IP address.

NBTSTAT Windows command for troubleshooting NetBIOS name resolution issues on an IP network.

NDA* A nondisclosure agreement, also called a confidentiality agreement (CA), is a legal contract between parties that outlines confidential material or knowledge that must not be shared with anyone else.

NET Windows command-line utility for managing networks.

NetBEUI Network Basic Input/Output System Extended User Interface.

netboot Booting to a network OS image.

NETDOM Windows command-line utility for managing Active Directory domains.

NETSTAT Windows command-line utility for displaying detailed network status.

Network-attached storage (NAS) See NAS.

network card Network adapter; connects a computer to a network. This term is also used for integrated network adapters and for USB network adapters.

network card properties Connection speed, encryption type (wireless), duplex settings, and other settings.

network printer mapping Connecting to a printer that has its own IP address.

network shares Folder shares available to users on the network.

NFC* Near-field communication; enables wireless sharing between mobile devices and mobile payment systems.

NFS Network File System; a distributed file system protocol developed by Sun Microsystems that allows a user on a client computer to access files over a network.

NIC* Network interface card; used for cards or USB adapters that enable a computing device to connect to a wired or wireless LAN.

NiCd Nickel cadmium.

NiMH Nickel metal hydride.

NNTP Network News Transfer Protocol.

noncompliant system System that does not have all security updates installed.

non-relational database Also referred to as a flat file database or a NoSQL database. This type of database stores information in a single database, which eliminates the need to relate multiple tables together.

non-repudiation A legal term that refers to any situation in which an individual cannot challenge their authorship of a document. However, in IT security, non-repudiation has been extended to refer to situations in which an individual cannot deny being present in a location as well. Non-repudiation methods include video, biometrics, signature, and receipt.

non-structured data Also known as unstructured data, is information such as email, word processing documents, presentations, instant messages, and others that are not stored in a data structure.

non-volatile storage Non-volatile storage is what most of us think of as storage; someplace to keep the operating system, apps, and data before the computer or device is started and where to place new and changed data so it’s available when the system is shut down. There are many types of non-volatile storage, including magnetic (spinning disk) hard drives and solid state drives, optical storage, flash drives, network storage, and cloud storage.

northbridge Chipset component responsible for connection between CPU and high-speed I/O buses such as PCIe and USB 3.0.

Notepad Windows app for plain-text viewing and editing.

nozzle check Inkjet printer maintenance option that uses all nozzles to print a pattern that indicates whether some nozzles are clogged.

NSLOOKUP Displays detailed DNS information.

NTFS * New Technology File System; the preferred file system for Microsoft Windows operating systems.

NTFS permissions File and folder permissions assigned with the folder or file’s Security tab.

n-tier An n-tier architecture uses more than three layers and is frequently used for database applications.

NTLDR New Technology Loader.

NTP Network Time Protocol.

null-modem Serial cable that has transmit and receive wires crossed at one end; used for data transfer.

Num Lock indicator light When light is on, Num Lock is working. Some BIOS/UEFI firmware can configure Num Lock to be enabled at startup.

O

OCR Optical character recognition.

OEM* Original equipment manufacturer.

off-site (backup) Backup copies of files and folders stored away from the originating devices.

OLED OLED displays use organic light-emitting diodes based on organic compounds that emit light.

on-demand Characteristic of cloud computing where users can purchase access to additional resources as needed.

OneDrive Microsoft cloud storage service.

one-tier An architecture that has presentation, logic, and data layers all stored in the same location. A locally installed application is an example of a one-tier app.

one-time purchase A single payment to license the software for as long as the user wants to use it. A one-time purchase license does not expire.

on-site (backup) Backup copies of files and folders stored at the same location as the originating devices.

open source Software whose object code is freely distributable, enabling third parties to modify it and, in turn, distribute modifications. Typically made available free of charge.

open-ended questions Asking questions that receive more than a “yes” or “no” answer; a desirable skill in troubleshooting.

OpenPGP Email encryption that works by exchanging digital IDs (also known as digital certificates or public keys) between users. After the digital IDs are installed, these users can exchange encrypted emails and be able to open them. Digital certificates are acquired from a certificate authority (CA).

operating system (OS) Software that controls all functions of a computing device.

optical Optical drives are fading from standard system configurations, but are still useful for creating and installing operating system recovery disc images, creating and installing self-booting diagnostic apps, for installing apps sold on DVD media, for transferring information to other users, and for creating DVD or Blu-ray movie discs.

optical drive Drive that uses CD, DVD, or Blu-ray media.

orientation Mobile device feature that detects device rotation and changes screen orientation to match.

Original Equipment Manufacturer (OEM) Manufacturers who resell another company’s product under their own branding or name.

OS* Operating system.

OS backup A backup of the operating system and, typically, apps on a computing device.

OTP (one-time password) A password that is valid for only one login session, on a computer system or other digital device. OTP is an effective way of dealing with security risks when logging into email, e-commerce, through remote access, or other types of services from public devices.

Outlook.com Microsoft cloud-based email and calendaring service.

output Output refers to any activity that sends the results of processing to a device so it can be viewed or stored. Typical output devices include displays (monitors, HDTVs, projectors); printers; computer speakers.

overclocking Running CPU, memory, and other components at faster-than-normal speeds. May require adjustments to component voltage and improved air cooling or a switch to liquid cooling.

overheating Problem in which the CPU, GPU, power supply, or other computer component becomes hotter than its normal design parameters call for; can be caused by inadequate airflow, fan failures, or overloaded power supply and can lead to data corruption, system failure, or physical damage to components.

overlimit Mobile system exceeds its data transfer limit. Could be caused by malware.

P

P2P file sharing Peer-to-peer file sharing sets up direct connections between computers on the Internet to locate and transfer files. Frequently used for illicit software and video content.

PaaS Platform as a Service; cloud computing category designed for developing and deploying apps.

paging file (virtual memory) The file stored on the hard drive used by the paging process as virtual memory, also known as a swap file. In Windows it is a file called pagefile.sys.

pairing The process of connecting two wireless devices together, such as Bluetooth or some wireless mice or keyboards and their receiver.

PAN Personal area network.

parental controls Program, service, or feature integrated into some routers that provides for filtering of web contents, restrictions on social media use, time restrictions, or game rating restrictions for users based on age and parent/guardian settings.

passcode lock Mobile device security feature that requires the user to enter a passcode to unlock the device. Must be enabled by the user.

passive heat sink Heat sink that relies on outside air flow for cooling.

passwd Linux command for managing passwords.

password A password is the most typical authentication factor. Unfortunately, passwords can be compromised in many ways, from being taped to the wall of the computer room to being trivially easy to recall and guess.

password best practices Recommendations for creating strong passwords, such as use of randomized alphanumeric and punctuation characters, using passwords longer than the minimum length, and so on.

password complexity Designed to defeat typical methods of breaking passwords; dictionary attack, brute force attack, and spidering.

password expiration Policies that are designed to require users to change passwords on a specified schedule. By requiring users to change passwords, websites and networks reduce the likelihood of a security breach caused by repeated attempts to break the password, shoulder surfing (watching a user as the password is being entered), or careless handling of password information.

password history Prevents the reuse of old passwords until a specified number of new passwords have been used first. This feature works along with password expiration.

password length How long should a password be? The longer the password, the harder it can be to break. However, almost all devices, websites, or accounts have limits on how long a password can be. For example, a typical PIN or passcode on a mobile device can have four to six characters and Windows 8 has a maximum password length of 16 characters.

password managers Apps or services that store your account passwords in a secure location in the cloud, your computer, or mobile device.

password reset process Also known as self-service password reset (SSPR) is any process that allows users who have either forgotten their passwords or triggered an intruder lockout situation to authenticate with another alternate factor and reset their own password.

password reuse Reusing password across sites creates major security risks. If a hacker can steal a password for one site or user account, they can likely access other sites as well.

patch panel A panel containing network ports that connects to a router or switch. Users can plug or unplug network cables to enable or disable connections as needed without disturbing the switch or router itself.

patch/update management Management of OS or app patches and updates. Can be performed by the OS itself or by optional OS-supplied or third-party services.

patching/OS updates Updates to the OS. In Windows, use Windows Update. In Linux, use apt-get. In macOS, use the Mac App Store.

patent A legal right to prevent unauthorized parties from copying an invention. Patents are granted by governments or by international organizations.

patent troll Company that buys or licenses patents from inventors or assignees and sues other companies for patent infringement, often with little justification, and with the hope of being paid license fees by the alleged infringers.

PB* Petabyte.

PC* Personal computer.

PC2001 system design guide A series of computer specifications originally developed by Intel and Microsoft in 2001. Most of its recommendations are obsolete, but the port color coding it contains (carried over from the PC99 design guide) continues to be followed by the industry.

PCI* Peripheral Component Interconnect; 32-bit I/O bus providing a shared 33MHz or 66MHz data path between the CPU and peripheral controllers.

PCI Express See PCIe.

PCIe 6/8-pin Power leads from the power supply used to power PCIe video cards. Some cards use the six-pin connection; some the eight-pin connector.

PCIe* PCI Express; a high-speed set of serial bus communication channels used by adapter cards.

PCI-X Workstation/server version of PCI used for network and mass storage cards; provides faster performance than PCI.

PCL Printer Control Language.

PE Preinstallation environment.

peer-to-peer Network in which some or all of the client PCs also act as peer servers.

Performance (virtual memory) A Windows Control Panel setting that specifies the location and size of the paging file.

Performance Monitor A Windows Computer Management node that enables customized logging of system performance factors, including processor performance, memory transfers, network performance, and others.

Perl Perl refers to a family of two different interpreted programming languages: Perl 5 and Perl 6 (Perl 6 is a substantial rewrite of Perl 5). Perl combines features from a number of languages, including BASIC, and is often used as a “glue” language to connect different systems and interfaces together and for quick data analysis.

permissions Refers to the actions a user or group can take when working with a drive, folder, or file, such as read, write, update, and others.

personal information Information such as name, social security number, and other information that can be used to identify a person.

personal license A software license for personal use.

personal safety General term for measures to keep computer technicians safe, including ESD prevention, electrical protection, lifting methods, air filtration, and others.

personally identifiable information (PII) See PII.

PGA Pin Grid Array; CPU socket design in which pins in the rear of the CPU are inserted into holes in socket and clamped into place.

PGA2 Pin Grid Array 2.

phablets Smartphones with screens of 5.5 inches or larger.

phishing The attempt to gain information such as personally identifiable information and credit cards using email or other electronic communications.

physical backup Database backup that uses operating system commands or third-party apps

physical laptop lock and cable lock See cable lock.

pickup rollers Printer component that pulls paper from the paper cassette, input tray, or roll feed and moves it into position for printing.

Pictures A Windows Vista/7/8/8.1/10 folder/library.

PII* Personally identifiable information; metadata stored in documents and photos that could be used to determine the file’s creator or other personal information.

PIN A Personal Identification Number, or PIN, is a useful alternative to a password. It can be used in place of a password for logging into computers running current versions of Windows or when encryption is enabled on iOS, Android, or other mobile devices. A four-digit PIN is the minimum, but most recent iOS and Android devices support six-digit PINs or alphanumeric passphrases.

PING Windows, Linux, and macOS utility for testing network connectivity.

pinning Placing shortcuts to apps on the taskbar (Windows).

pinwheel Slang term for macOS’s spinning wait cursor, which appears when an application is busy.

PKI Public key infrastructure.

Plain text (also known as plaintext) The original message before encryption.

plan of action How you plan to solve the problem.

plasma Type of display that uses small cells that contain ionized gas.

plastics/frames Components of laptop computers that can be easily damaged.

Play store Short for Google Play, the app store for Android devices.

plenum An air space in a building, such as HVAC ductwork or a suspended ceiling. Plenum cable, which produces very little smoke when burned, is required when a plenum is being used for cabling.

Plug-and-play A plug-and-play installation takes place when you connect a device and the operating system recognizes it and installs the appropriate drivers. Mass storage, keyboards, and mice generally use plug-and-play installation.

PnP Plug and Play.

PoE Power over Ethernet.

pointing device General term for any mouse-type device.

pointing stick Generic term for IBM/Lenovo TrackPoint, Toshiba AccuPoint, and other eraser-head pointing devices located in the middle of the keyboard.

policies and procedures In CompTIA A+ Certification Exam 220-902, policies and procedures refer to mobile device security.

POP* Post Office Protocol; email protocol used by client computers to download or receive email.

POP3* Post Office Protocol 3; the latest version of email protocol used by client computers to download or receive email.

pop-up blocker Used to block or manage pop-ups. A pop-up blocker is enabled in a browser’s settings.

pop-ups Ads or other web content that appear in small browser windows. Some websites use pop-ups when a user clicks a link, but most pop-ups are unsolicited advertising, and some might contain links to malware.

port (physical, TCP, UDP) A physical port is a location to attach a cable, especially a data cable. A TCP or UDP port is a number or range of numbers assigned to a particular connection session or connection type.

port forwarding Redirection of inbound Internet traffic from a public connection to a particular port on a private connection behind the router. Used when the router would normally block the connection.

port mapping See port forwarding.

port replicator Provides a single connection for various types of I/O ports for portable computers; the port replicator is connected to the external devices and is then connected to the portable computer through an external proprietary expansion bus or through a USB port.

port triggering Similar to port forwarding but takes place when a private IP address creates an outbound connection, and inbound connections for that port are temporarily routed to another port. Unlike port forwarding, inbound connections to the rerouted port are dropped when the outbound trigger port is not being used.

PoS Point of sale.

POST card/USB Device that displays port 80h POST codes. Some are powered by USB cables, but USB does not pass these POST codes. They are transmitted via PCI, PCIe, miniPCI, miniPCIe, or parallel (LPT) ports.

POST Power-On Self-Test; BIOS test of basic hardware performed during cold boot.

POST code beeps The POST routine in the BIOS/UEFI firmware might beep in various patterns to indicate errors with video, memory, CPU, or other components. A speaker must be connected to the front-panel speaker header pins on the motherboard in order for POST code beeps to be heard.

POTS Plain old telephone service.

power button Button that turns on power to the system. Does not connect directly to the power supply, but to the motherboard.

power connections and types Connections used on the motherboard, add-on cards, and drives to receive power. Types include 20-pin and 24-pin ATX, ATX12V, EPS12V, Molex, Berg, SATA, PCIe 6/8 pin, and others.

power light Light that indicates power is being received. Might be on the top or front of a desktop computer, power jack, or AC adapter on a laptop or tablet.

Power options OS settings for power usage.

power outage Power outages of more than a few milliseconds can cause unprotected devices to shut down, causing local and network computer errors and the potential for data loss due to disk corruption. However, battery backup units are available for servers and desktop PCs to help systems to continue to run during brief power outages and to shut down properly when the battery approaches exhaustion.

Power over Ethernet injector Adds power to an Ethernet cable so the cable can provide power as well as data to a PoE device.

Power Plan Windows power management setting.

power supply tester Checks to see if the power supply is working or reaching proper voltage levels.

power supply Converts high-voltage AC to low-voltage DC. See PSU.

power surge Short-term overvoltage that can damage equipment.

power user Windows user category that has permissions similar to an administrator. Supported for compatibility purposes in Windows Vista/7/8/8.1/10.

PowerShell Windows command-prompt enhanced command and scripting language. originally developed by Microsoft as a scripting language for Windows (Windows PowerShell). PowerShell is included in Windows 7 and later versions. In 2016, PowerShell Core was introduced as a cross-platform version for use with Windows, macOS, and Linux.

PPP Point-to-Point Protocol.

PPTP Point-to-Point Tunneling Protocol.

pre-installation environment PE; OS environment that is used before system installation to prepare system for use. Can also be used to troubleshoot existing systems.

preventative measures Steps taken to prevent a recurrence of the problem.

PRI Primary Rate Interface.

primary key A primary key contains a unique value for each row, such as a user ID. Each table must have a primary key.

primary partition Bootable disk partition created with Disk Management in Windows or with Diskpart.

principle of least privilege Providing users with just enough permissions to perform ordinary tasks.

print head The printer component that places text or graphics on the paper. Found in impact and inkjet printers.

Print Management A Windows tool used to manage network printers and print servers.

print queue List of print jobs waiting to be sent to the printer.

print server Server optimized for printing. Might be a network server, a self-contained device with its own IP address, or incorporated into a wired or wireless printer.

print sharing Enabling a local printer to be used by other network clients.

print spooler Windows service responsible for receiving print jobs and sending them to the printer.

printer An output device that puts text and graphics on paper, labels, and transparency media. Also used to Identify the printer portion of multifunction devices (print/scan/copy or print/scan/copy/fax).

printer calibration Adjusting the alignment and accuracy of color and monochrome output.

printer preferences Printer settings such as quality, paper type, monochrome or color; details vary with printer.

printer properties Printer management options such as sharing, port usage, security, spooling options, and availability.

printer ribbon Contains ink or other materials that are transferred to the surface being printed. Used by impact, thermal transfer, and dye-sublimation printers.

printer sharing Configuring a local printer so it can be used by others on a network.

prioritization A process of determining what data is most essential to business continuation and restoring it first.

privacy Not having to deal with intrusions; being left alone.

privacy filters Filter that fits over a screen to prevent anyone other than the user from seeing what is on the screen.

private Not for public use, display, or knowledge.

private browsing Prevents your browser from recording browser history, storing searches, storing cookies (which are used by advertisers to track your activity), and saving temporary files.

private IP address IP address that is not visible to the Internet.

private materials Materials belonging to a client.

PRL Preferred Roaming List.

processes In Windows Task Manager, activities that are running on a computer, including program modules, program threads, and services.

processing Processing refers to the retrieval and modification of inputs from input devices or storage devices.

processor architecture Internal design of a processor, including whether it uses 32-bit or 64-bit software.

productivity software A general term for software that is used to create or view information used in all types of business and home-business situations. Examples include word processing, spreadsheet, presentation, web browser, and visual diagramming software.

professional titles Doctor, professor, nurse, and so on. These should be used when communicating with or about a client.

profile security requirements In CompTIA A+ Certification Exam 220-902, profile security requirements refer to determining security settings needed for mobile devices.

Program Compatibility Wizard Windows feature that enables apps written for an older version of Windows to run properly in the current version of Windows.

programmatic access Working with a database by accessing it with a computer program.

programs Applications and software.

Programs and Features A Windows Control Panel subcategory used for uninstalling apps, turning Windows features on and off, viewing updates, and using program compatibility tools.

prohibited activity Any activity that violates an organization’s policies and procedures, specifically involving computers and mobile devices.

prohibited content Any content found on computers or mobile devices that violates an organization’s policies and procedures.

PROM Programmable Read-Only Memory.

proper language Language that is polite, appropriate, and germane to discussing the client’s problems and possible solutions.

properly formatted boot drive with the correct partitions/format Requirements for Windows OS drive configuration and layout, such as file system, partitioning method, location of user files, and so on.

proprietary Most commercial apps are proprietary; the source code (software instructions before being turned into an application) is not available to the public or other companies.

proprietary crash screens (BSOD/pinwheel) General term for how an OS displays a crash, with an example for Windows (BSOD) and macOS (pinwheel).

protection from airborne particles A requirement for technicians who will be working on cleaning out computers and peripherals, painting or refinishing chassis, or tearing down equipment.

protective covers/water proofing Protective accessories for mobile devices.

proxy To preserve bandwidth, help protect against hostile inbound web traffic, or to filter Internet traffic, proxy servers are used to capture outbound and inbound traffic.

proxy server Server that caches Internet page requests, enabling a single page to be viewed by all of the devices requesting it. Reduces outbound traffic to the Internet and can also be used for filtering content.

proxy settings Specific settings for the types of content using a proxy server and its IP address and port numbers.

ps Linux and macOS Terminal command to view system processes.

PS/2 Personal System/2 connector; a six-pin mini-DIN port used for mice or keyboards.

pseudocode An imitation of a computer program. It is a human-readable description of what a computer program needs to do.

PSTN Public switched telephone network.

PSU* Power supply unit.

public IP address An IP address visible to the Internet.

public network setting Windows network location setting that configures the Windows Firewall to protect against unsolicited inbound connections.

punchdown tool Tool used to punch wire pairs into network connectors such as keystone modules, patch panels, and other receptacles for network cables.

punctuality Arriving on time or early for appointments or consultations.

PVC Permanent virtual circuit or polyvinyl chloride.

pwd Linux and macOS Terminal command for displaying the current working directory (folder).

PXE* Preboot Execution Environment.

Python A programming language that is designed to be simple to understand, very extensible, and easy to use with other programming languages. The official website for Python is www.python.org.

Q-R

QoS Quality of Service.

query A query is an inquiry into the database using the SELECT statement. A query is used to extract data from the database in a readable format according to the user’s request.

Query language A query language is a language designed to manage data stored in a particular type of structure, such as a relational database or an XML file.

Quick Format Format command that clears the contents of the root folder (directory) on a storage device.

radio firmware Firmware found in some smartphones that, when activated, can receive FM radio signals. Feature must be supported by mobile service provider.

Radio frequency Radio frequency wireless is also known as fixed wireless service. A fixed wireless ISP (WISP) uses a signal tower to send and receive microwave-frequency radio signals.

RAID* Redundant Array of Independent (or Inexpensive) Disks.

RAID 0 Striping; data written across both drives. RAID 0 is fast but offers no protection against drive failure. Uses two drives.

RAID 1 Mirroring; data written simultaneously to both drives. If one drive fails, the array can be rebuilt from the contents on the other drives. Uses two drives.

RAID 10 Four drives are set up as two mirrored pairs, with data striped across the pairs. If a drive fails, the array can be rebuilt from the other drives. Can also use additional pairs.

RAID 5 Three or more drives are used with data and parity information striped across all drives. If a drive fails, the array can be rebuilt from the other drives.

RAID array All of the drives that are used in a particular RAID configuration.

RAM* Random Access Memory; volatile memory whose contents can be changed.

RAM slots Slots (sockets) on a desktop or laptop motherboard for replacement or additional RAM (memory) modules.

ransomware A type of malware that encrypts your drive(s) and requires you to pay a ransom (usually in a specified time) or else the drives’ contents will be lost.

rapid elasticity A characteristic of cloud computing referring to how quickly and easily more or fewer cloud resources can be used or set aside as needed.

RAS Remote Access Service.

RCA A type of connector used for stereo audio connectors to a receiver, composite video, or S/PDIF coaxial digital audio.

RD Abbreviation for RMDIR, a Windows, Linux, or macOS Terminal command-prompt command for removing a directory (folder).

RDP Remote Desktop Protocol.

record Records are composed of fields, each of which contains one item of information. A set of records constitutes a file.

recovery partition A common feature of Windows installations on computers sold at retail. It typically contains compressed files that can be used to create recovery media or might allow recovery to run directly when a system cannot start normally.

redundancy Duplication of computers, apps, and data to enable quick continuation of operation in the event of primary system failure.

refresh rate Rate at which electron guns in the monitor’s CRT repaint the picture onscreen; also called vertical refresh rate. It is measured in hertz (Hz).

Refresh/Reset Features in Windows 8/8.1/10 that are used for fixing systems that won’t run properly. Refresh removes apps not obtained from the Windows Store, reinstalls Windows Store apps, but does not delete user files. Reset returns Windows to its as-installed condition, removing all apps installed after initial installation and user files. Reset is also used to prepare a system for repurposing or secure disposal.

REGEDIT The Windows Registry Editor.

registered trademark A trademark or service mark registered with the appropriate trademark organization (in the US, the US Patent and Trademark Office).

registry Database of all hardware, software, and system settings in Windows.

REGSVR32 Windows command-line utility to re-register software components.

relational database A set of formally described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. The essential elements of a relational database include schema, tables, fields/columns, and constraints.

remediate The process of restoring an infected computer to health.

Remote Assistance A Windows feature that allows one user to invite another user to temporarily view the screen and control the first user’s computer. Designed for troubleshooting and training.

remote backup Backing up data to a remote location.

Remote Desktop Connection Remote control app in Windows.

Remote Disc macOS feature that enables a macOS computer that lacks an optical disc drive to use another computer’s optical disc drive. Drivers available for Windows.

remote network installation A Windows installation option that allows systems to boot to a network-located OS image and use it for installation.

remote printing Printing to a printer via a remote connection (typically the Internet).

Remote settings Windows Control Panel settings for Remote Desktop Connection and Remote Assistance.

remote wipe A mobile device security feature that can wipe a lost or stolen device.

renamed system files A symptom of a malware infection; renamed files can prevent the system from running properly or from using built-in or third-party security tools.

repair disks A bootable optical disc or USB drive that can be used to repair an OS.

Repair Installation A Windows installation option in which the OS is installed over the same version to fix problems with the previous installation. Also known as an in-place upgrade.

repair/replacement Options for defective hardware. When discussing these options with a client, be clear about the benefits and drawbacks of each so the client can make an informed decision.

repeater Amplifies a network signal to enable it to run over longer cable than normal; hubs or switches also act as repeaters.

replay attack A type of MITM attack in which genuine data is repeated or delayed. A replay attack can be very disruptive if it is used against streaming communications such as voice or video chat and VoIP calls, or time-sensitive data such as stock market information.

replication The process of making a copy or duplicate information needed to continue computer operation.

report A report is a formatted list of the information in one or more database files. A report can be built from a query, so it can provide a printed result of the query.

report through proper channels Proper initial response to an incident involving prohibited content or activities.

repurposing Preparing a computer or storage device for another use. Usually involves secure overwriting of existing information.

reset button Button on the front or top of a desktop computer that, when pushed, sends the Reset signal to the power supply for an immediate restart.

reset to factory default Device has all user data, settings, and optional apps removed. Device works as if it has just been turned on.

resolution The number of dots per inch (dpi) supported by a scanner or printer, or the number of pixels supported by a display.

resource pooling Feature of cloud computing in which multiple clients share a pool of hardware, software, and services.

restore point File that stores configuration information for the system. Created automatically or manually. Used by System Restore. Also stores older versions of data files in Windows Vista/7.

RF* Radio frequency; a frequency or band of frequencies in the range suitable for use in telecommunications.

RFI Radio frequency interference; the radiation of radio frequency energy that causes an electronic device to produce noise or disruption that interferes with the function of another device.

RFID badge A device used in electronic security as a token. The badge is swiped past a receiver to permit the bearer access to a secure location.

RG-59 Coaxial cable used to distribute TV signals in a home or office. Replaced by RG-6.

RG-6 Coaxial cable used to distribute HDTV signals in a home or office. RG-6QS uses quad shielding for better signal quality over long runs.

RGB Red/Green/Blue. Three additive primary colors used in electronic systems, displays, and projectors.

ribbon Used by thermal transfer and dye-sublimation printers to print text or images onto media.

RIP Routing Information Protocol.

RIS Remote Installation Service.

RISC Reduced Instruction Set Computer.

riser A card or cable that extends expansion slot connections straight or at a 90-degree angle to make it possible to install cards that would normally not fit into a chassis.

RJ* Registered Jack.

RJ-11* Registered Jack Function 11. Used for telephone, fax, answering machines.

RJ-45* Registered Jack Function 45. Used for network cable.

RMA Returned Materials Authorization; part of the process of returning a product to receive a refund, replacement, or repair during the product’s warranty period.

ROBOCOPY Windows file copying utility with mirroring and logging capabilities. Replaces xcopy and has more options.

rogue antivirus A malware program that masquerades as a legitimate antivirus program.

Role-Based Access Control (RBAC) Assigns access levels to users based on their role within an organization.

roller A component in a printer that helps move the paper or media through the printer.

ROM* Read-Only Memory; a type of nonvolatile memory used in computers and other electronic devices typically for system or device firmware.

root access The username or account that has access to all commands and files on a Linux or other Unix-like operating system. It is also referred to as the root account or root user.

root hub Hosts USB ports on a PC.

rootkit Malware designed to gain administrative-level control of a computer.

rotating/removable screens A feature of 2-in-1 devices that can be used as tablets or laptops.

router Device that routes data from one network to another. Often integrated with wireless access points and switches.

rows/records Each row in a table is a record in the table.

RPM Revolutions per minute; a standard hard disk drive has a spinning disc inside of it. RPM measures how many times that disc spins in a minute.

RS-232 See serial port.

RTC Real-time clock.

Rule-based access control (also abbreviated as RBAC) Uses rules defined by a system or network administrator to control access.

run as administrator A requirement for some Windows apps and administrative tools. Also known as “run with elevated privileges.”

S

S.M.A.R.T. Self-Monitoring, Analysis, and Reporting Technology

S/MIME A standard for secure email connectivity.

S/PDIF Sony/Philips Digital Interface; digital audio standard for interfacing sound cards or onboard sound hardware to a digital amplifier.

SaaS* Software as a Service; software programs that can be run from the cloud without downloading an app. Examples include Google Docs and Microsoft Word Online, Excel Online, and so on.

SAN Storage area network.

SAS Serial Attached SCSI

SATA* Serial Advanced Technology Attachment; this version of ATA uses thin data and power cables to transmit data serially from mass storage devices at rates of 1.5Gbps, 3.0Gbps, 6.0Gbps, and 16Gbps (SATA Express).

SATA1 CompTIA term for first-generation SATA with a 1.5Gbps maximum transfer rate.

SATA2 CompTIA term for second-generation SATA with a 3.0Gbps maximum transfer rate.

SATA3 CompTIA term for third-generation SATA with a 6.0Gbps maximum transfer rate.

satellite Satellite Internet service uses oval satellite antennas (very similar in appearance to satellite TV antennas) to connect with geosynchronous communication satellites orbiting over the equator. These satellites relay Internet from ground stations to individual users/viewers via a satellite modem.

SC Subscription channel.

scalability Refers to the ability of a database to handle increasing numbers of records, users, and transactions.

scan In technology, the term scan describes the process of looking for threats (spyware, malware, viruses); using a device to read barcodes; or using a device to convert a photo or document into a file using a copier-like device.

scanner A device used to read barcodes; a device used to convert photos or documents into files. Some scanners can also convert slides (transparencies) or negatives into files.

schema Usually refers to the structure of a database as described either in text or graphically.

scope of the problem The goal of open-ended questions is to define the problem as narrowly as possible to help find the solution.

screen calibration A program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly.

screen lock A pattern drawn on the display, a PIN (passcode), or a password used to make a mobile device inaccessible to other people.

Screen Sharing A macOS feature used for remote control.

screwdriver A versatile tool that can be used to remove/attach screws and bolts from/to desktop, laptop, and mobile devices. Multiple removable bits and standard and jeweler’s screwdriver sizes are needed to handle the broadest range of jobs.

script blocker Browser settings and extensions used to block scripts.

scripting languages Refers to interpreted languages that are frequently used to create scripts that are run from within an Integrated Development Environment (IDE).

SD card* Secure digital card; a nonvolatile memory card format. The four families of the secure digital card are the original Standard-Capacity (SDSC), the High-Capacity (SDHC), the eXtended-Capacity (SDXC), and the SDIO, which combines input/output functions with data storage.

SDK/APK System development kit. The software needed to develop an app for an operating system. Android users also need the Android Package Kit to package Android apps for distribution. SDKs are available from OS vendors. The APK is available from Google.

SDRAM Synchronous DRAM. Fast RAM synchronized to the motherboard’s clock speed; typical speeds are 66MHz, 100MHz, and 133MHz.

SDSL Synchronous DSL. A type of DSL connection in which upload and download speeds are the same. SDSL connections are marketed to businesses rather than to home users and almost always require a newly installed circuit to the location and professional installation. See also DSL and ADSL.

Secure Boot A feature of Windows 8/8.1/10 that uses the UEFI specification to prevent unsigned OS versions from being booted. Must be disabled in UEFI firmware if the user wants to install another OS.

security Processes, methods, and attitudes leading to protecting data, information, processes, and personal information held by an organization.

security alert An alert displayed in the taskbar by Windows when a security issue has been noted. Note that many malware apps display fake security alert dialogs in an attempt to infect a system.

security best practices General term for desirable security procedures. For example, locking a system keyboard when you’re away, updating anti-malware and antivirus apps, not opening emails with attachments from unknown senders, and so on.

Security Center A Control Panel feature in Windows Vista that displayed alerts when potential security threats were detected. Replaced by Action Center starting with Windows 7.

security questions Typically used to help reauthorize a user who needs to replace a lost password. Some typical security questions are: Where were you born? Where did you graduate from high school? What is your mother’s maiden name?

self-grounding Touching metal on a nearby object to trigger ESD before picking up an electronic component. Used if ESD mats or wristbands are not available.

self-powered hub Uses AC adapter; provides full power specified for USB port type(s) supported.

semi-structured data Instead of using rows and columns, semi-structured data uses tags to identify elements and hierarchies. By using tags, it’s easier to store nested lists of varying lengths (for example, vehicles owned) than it would be with a relational database.

separation or separator pad A component found in laser printers as part of the paper-feed path and typically included as part of a maintenance kit.

sequence A sequence diagram is another visual aid to program design, specifically object-oriented programming. A sequence diagram shows how objects in a program interact with each other during a particular process.

serial port A serial communication physical interface (also known as COM port) through which information transfers in or out one bit at a time. The RS-232 standard is commonly used to transmit data through DB-9 ports.

server Computer that shares drives and other resources over a network. Peer servers can also be used as workstations; dedicated servers provide services to other computers such as file, print, email, and so on.

service fails to start Services that don’t run can prevent the system from running properly.

service mark A mark that identifies a service. Used for service names, slogans, and identifying phrases. Can be registered at the US Patent and Trademark Office.

service outage A service outage of any duration is bad news for your home, your business, or your organization. The faster you can isolate, respond to, and recover from a service outage, the better for you and your customers.

services Processes that run in the background on Windows, OS X, and Linux for tasks such as print spooling, wireless networking, and many others.

SERVICES.MSC Windows CMC snap-in for viewing and managing services.

set-top box General term for any device used with a TV or HDTV for video, such as a Blu-ray player, cable TV box, or streaming media player.

SFC System File Checker; a utility in Windows that allows users to scan for problems in Windows system files and restore corrupted or missing files.

SFTP* Secure File Transfer Protocol (or SSH File Transfer Protocol); a secure file transfer protocol that runs over the SSH protocol.

Shadow Copy Windows Vista/7 feature that uses restore points to store older versions of files. Replaced by File History in Windows 8/8.1/10.

share permissions File/folder permissions set through the Share/Share With dialog in Windows/File Explorer.

shell/Terminal macOS or Linux command-line environment.

shoulder surfing Direct observation techniques used to gain information about a user, document, or computer system.

shrink partition The process of reducing a partition in size to make room for another operating system. Can be performed using Windows Disk Management or command-line Diskpart tools. In macOS, use Disk Utility. In Linux, use the GParted partition editor or other tools.

Shutdown Shuts down the current computer session, logs off all users, and turns off the power. Can be run from the Windows command prompt or with Linux or macOS Terminal.

SID* Security identifier. A unique name assigned to an object such as a user or computer.

side-by-side apps A feature of Windows 8/8.1/10 that permits a mixture of Metro UI and standard Windows apps to run next to each other on the Windows desktop.

simple volume Windows disk structure similar to a primary partition, but resizable. Up to four simple volumes can exist on a drive; the fourth volume will be created as an extended partition containing one or more logical drives.

single sign-on See SSO. See mutual authentication for multiple services.

single use license Enables all users of a computer to use the software. However, it does not allow the software to be installed on more than one computer.

single-factor authentication Authentication in which a user or device must provide a single form of identification, such as a username/password combination.

single-mode fiber Fiber optic cable designed to carry a signal for many miles. More difficult to work with than multimode fiber.

single-platform software Software that is designed to run on a single combination of hardware and software.

single-use credit cards An alias for a regular credit card number that can be used one time for online purchases.

SiSoftware Sandra A third-party system analysis program that provides extensive technical information on a computer’s hardware.

slang Unofficial names for technology, events, people, and locations. Using slang is an undesirable behavior when dealing with clients.

SLC Single-level cell; flash memory type most often used in SSDs.

sleep/suspend Low-power settings that turn off most operations in a computer.

SLI Scalable Link Interface, system-level integration, or Scanline Interleave Mode.

slow system performance Can be caused by incorrect configuration of swap files, too many startup programs, too many programs open, not enough RAM, not enough free disk space, or too slow a CPU for the apps being used.

smart cache Intel term for CPU cache shared among all processor cores.

smart camera A point-and-shoot camera that uses the Android OS.

smart card A security token used for access to secure areas, websites, or servers.

smart card reader Card reader that can be built in to a laptop or connected via USB for reading smart cards.

Smart TV An HDTV with network capabilities and support for streaming content such as Netflix.

smart watch A watch that connects with a mobile device, typically to act as a relay for notifications, a health monitor, and sometimes as a phone.

smartphones Phones that have CPUs and RAM, run apps, and support Android, iOS, or Windows Mobile OS.

SMB* Server Message Block or small-to-midsize business.

SMTP* Simple Mail Transfer Protocol; a common Internet standard for uploading or sending email.

SNMP* Simple Network Management Protocol; an application-layer protocol used to manage and monitor network devices and their functions.

snooping The unauthorized access to another person’s or company’s data.

social engineering The act of obtaining confidential information by manipulating people.

social media Apps such as Facebook, Twitter, Instagram, and others.

social media data Usernames, messages, and data from services such as Facebook, Twitter, Instagram, and others are among the user data that is removed from a mobile device during a hard reset (factory reset) operation.

social networking Websites and services that allow people to interact with others and share interests, such as Facebook, Pinterest, Twitter, and Instagram among others.

Socket AM3 AMD PGA socket; supports CPUs with dual-channel DDR2 or DDR3 memory controller; 941 pin connectors.

Socket AM3+ AMD PGA socket; supports CPUs with up to eight cores; 942 pin connectors.

Socket FM1 AMD PGA socket; supports first-generation (Llano) AMD APUs with up to four cores. Has 905 pin connectors.

Socket FM2 AMD PGA socket; supports second-generation (Trinity) and third-generation (Richland) AMD APUs with up to four cores. Has 904 pin connectors.

Socket FM2+ AMD PGA socket; supports Kaveri and Godavari APUs with up to four cores; also supports chips used in Socket FM2. Has 906 pin connectors.

SoDIMM Small Outline DIMM (also spelled SODIMM); a compact version of the standard DIMM module, available in various pinouts for use in notebook and laptop computers and laser printers.

soft reset Shutting down a mobile device and restarting it.

software Computer instructions (apps, drivers, games) that can be stored locally or in the cloud and run using the CPU and RAM in the computer.

software token An application that generates one-time passwords or access codes for secure networks.

software update A process that installs patches to the OS or installed applications.

SOHO Small Office, Home Office; refers to small professional businesses that are run out of homes.

solid-state/flash drives boot A solid-state drive (SSD) looks like a hard disk drive to the BIOS/UEFI firmware and is prepared using the same installation process as a hard disk drive. To enable a USB flash drive as a bootable device, a special process must be used to install an OS image on the drive. Whichever drive is used for booting, it must be placed in the boot sequence before other drives that could prevent the system from booting.

sound Can be reproduced on a computer by using a sound card, onboard audio, or a USB adapter.

sound card An add-on card designed for digital sound recording and playback. Plugs in to a PCI or PCIe ×1 slot.

southbridge The chipset component responsible for interfacing with slower devices.

SP Service pack.

spam Unwanted email.

speaker An audio output device. Computer speakers can be connected in one of several ways to a PC depending upon the computer: 3.5mm (mini-jack), HDMI, DisplayPort, and SPDIF. Be sure to select the correct speaker output if both analog (mini-jack) and digital (S/PDIF, HDMI, or DisplayPort) outputs are available.

spear phishing Variation on phishing that involves the use of forged emails that appear to request confidential organization information (payroll, ID, and so on) from a member of the organization.

special thermal paper Heat-sensitive paper used in direct thermal (no ribbon) printing.

specific location With some apps and services, you can restrict access based on a device’s IP address or location. Examples include Microsoft OneDrive for Business; the Device Access dialog allows a network manager to restrict access to specific IP addresses and Microsoft Azure’s Active Directory (Azure AD) conditional access feature.

speed General term for computer or component performance.

SPGA Staggered Pin Grid Array.

spinning disk Spinning disk drives contain one or more aluminum or glass platters that have magnetic coatings. Read/write heads are moved to the correct locations to read existing data and write new or changed data.

splitting partitions Turning a single partition into two or more. Requires that the partition be shrunk and a new partition be created in the unallocated space.

spontaneous shutdown/restart Indicates a serious computer problem. Can result from Windows being configured for automatic restart after a STOP error or from a power supply whose Power Good voltage is not within limits.

spoofing When an email or app pretends to be from a trustworthy source but is actually coming from an attack on your system.

Spotlight macOS search tool.

spyware A type of malware that collects computer and user information without the owner’s consent or knowledge.

SQL* Structured Query Language; SQL is an ANSI and ISO standard and is the de facto standard database query language. Established database products from Oracle and Microsoft support SQL (for example, Microsoft SQL Server).

SRAM Static Random Access Memory, or static RAM. RAM based on transistors that requires electricity far less often than DRAM. It is too expensive and bulky to use as main RAM but popular for use as cache RAM.

SSD * Solid-state drive; a hard drive that uses flash memory instead of magnetic storage platters.

SSH Secure Shell; a cryptographic network protocol for operating network services securely over an unsecured network.

SSID* Service set identifier is a user-friendly name that identifies a wireless network.

SSID broadcast By default, wireless routers and access points broadcast their SSIDs. This feature can be turned off, which requires users to enter the SSID as well as the encryption key to connect.

SSL* Secure Sockets Layer; the predecessor of TLS. Used for securing online transactions.

SSO* Single sign-on. A user authentication service that permits a user to use one set of login credentials (for example, name and password) to access multiple applications.

ST Straight tip; a connector used in fiber-optic cables that utilizes a bayonet-style plug and socket.

standard Blu-ray Disc (BD) BD media has a capacity of 25GB (single layer), with enhanced versions holding more data.

standard format Clears the root folder (directory) of a drive. However, data can still be recovered from the drive.

standard thick client A computer used to run locally stored and locally processed applications.

standard user User who has access to information in a personal folder and can run normal apps. Cannot run processes that will affect the system and has lower privileges than an administrator.

Standby A low-power state that could be selected in older editions of Windows for use when the system was idle. Replaced by Sleep mode.

star topology Network topology in which a central hub or switch is connected to individual workstations with separate cables. This topology is used by Ethernet networks that use TP cables. Wireless networks also use this topology but substitute a wireless access point in place of a hub or switch and radio waves in place of cables.

Start screen Windows 8/8.1 startup dialog. Uses tiles and is optimized for touch (although it also supports mice). Replaced in Windows 10 by a Start menu with optional tablet mode.

Startup A tab in Microsoft System Configuration (MSConfig) that enables or disables startup programs.

static IP address A specific IP address assigned to a device; not assigned by a DHCP server.

STOP error Also known as Blue Screen of Death. A Windows error that forces the system to halt until resolved. Systems can be configured to restart automatically after a STOP error or to leave it onscreen.

storage area network (SAN) Databases that may be many terabytes in size should be accessed through a flexible and fast method such as a storage area network (SAN). Unlike a shared drive on a server or a network attached storage (NAS) device, a SAN is accessed as if it were a local drive by a server but uses fast fiber optic connections.

storage device A storage device is any device that can preserve files or apps for reuse later. Common local storage devices include USB flash drives, internal or external hard drives, and internal SSDs.

Storage Spaces A Windows 8/8.1/10 implementation of software RAID, in which two or more drives can be used to provides real-time copies of each other.

STP Shielded twisted pair; copper Ethernet network cable that uses shielded twisted pair wiring to protect the data transmission line from electromagnetic interference. Contrast with UTP.

streaks Streaks on a page output by a laser printer indicate it needs replacement toner and possibly other maintenance. With other printers, streaks suggest dirty rollers in the paper path.

streaming media device Device that plays back media from websites or Internet media channels on a TV or home theater system.

string The string data type refers to a group of characters that can be a literal value (such as “Abraham Lincoln”) or a variable (xyz).

strong password A password that has a mixture of alphanumeric characters, punctuation marks, no words, and is over the minimum length.

structured data Data that is “organized.” Similar to a spreadsheet, a structured database is divided into rows and columns.

su Linux and macOS Terminal command to switch users.

subnet mask IPv4 network addressing feature to specify how much of the IP address is the host address and how much is the extended network address.

subscription A monthly or yearly payment to license the software for that time period. A subscription expires if the user stops paying for it and the software will then stop working.

subsystem Parts of a computing device that are used for a single task or group of tasks.

sudo Linux and macOS Terminal command to run a command as administrator.

SuperSpeed USB USB 3.0/USB 3.1 (Gen 1) ports and devices.

SuperSpeed+ USB USB 3.1 (Gen 2) ports and devices.

surge suppressor A device that absorbs overvoltage conditions such as spikes and surges to prevent damage to connected devices.

surround sound audio Audio that uses more speakers than stereo. Typically 5.1 or 7.1 (five or seven speakers plus subwoofer).

SVGA Super Video Graphics Array, or Super VGA. May refer to 800×600 VGA resolution or to any VGA display setting that uses more than 16 colors or a higher resolution than 640×480.

S-Video Separate Video; an analog video standard used in many VCR and DVD products for input and output of video signals. Some older video cards use S-Video for their TV outputs. Can be down-converted to composite video by using an adapter.

swap space Linux term for swapfile.

swapfile File used as substitute for RAM; also called paging file.

swipe lock Swiping the screen of a mobile device to lock it.

switch Network device that sets a direct path for data to run from one system to another and can be combined with a router or wireless access point. A switch is faster than a hub because it supports the full bandwidth of the network at each port, rather than subdividing the bandwidth among active ports as a hub does.

SXGA Super Extended Graphics Array; pixel resolution of 1280×1024.

synchronization The matching up of files and other data between one computing device and another.

synchronize to the cloud Matching local files and files in cloud storage. Performed by cloud backup apps such as iCloud.

synchronize to the desktop Matching local files on a mobile device and on a laptop or desktop. Performed by apps such as iTunes.

System Can refer to a computer (system) or to the System properties sheet in Windows.

system board Motherboard.

System Configuration MSConfig utility in Windows; configures startup, boot settings, services, startup apps, and provides access to tools.

system fan connectors Connectors on the motherboard that provide power and speed monitoring to case fans and sometimes the power supply fan.

system files and folders Files used by the OS. For example, files in the Windows folder and subfolders.

System Image Manager A Windows tool that enables you to create answer files for unattended installations.

System Information A Microsoft Windows application that displays information about a computer’s operating system, hardware, and environment (msinfo32.exe).

system lockout When a user is unable to log in to a system because the password is forgotten or unknown.

system lockups System is completely unresponsive; usually caused by overheating, leading to corrupted memory contents.

System Protection System Restore settings in Windows.

system recovery options Special startup options that can be used to fix a Windows installation that isn’t working, including Startup Repair, System Restore, special boot options, and others.

System Restore Windows feature that enables a system to be returned to a previous condition.

system utilities Commands in Windows that help manage and troubleshoot the system, such as msinfo32, Dxdiag, Notepad, and others.

T

T568A TP wiring standard that uses the following wires from pin 1 to 8: green stripe, green, orange stripe, blue, blue stripe, orange, brown stripe, brown.

T568B TP wiring standard that uses the following wires from 1 to 8: orange stripe, orange, green stripe, blue, blue stripe, green, brown stripe, brown.

Table A table is data organized into a structure of columns (vertical) and rows (horizontal).

tablets A mobile device with a larger screen than a smartphone and usually without cellular support. Some can be converted into laptop-like devices by adding keyboards.

tailgating Also known as piggybacking. When a person tags along behind another person to gain entry to a restricted area.

tape drive A drive that makes backups of a system or selected files with magnetic tape.

Task Manager Windows app for viewing and managing running programs, tasks, processes, services, and other information.

Task Scheduler Windows app that is used to schedule tasks to run at startup or at a particular time.

TASKKILL A Windows command-line utility to shut down a specified process.

TASKLIST A Windows command-line utility to list processes.

Tb* Terabit.

TB* Terabyte.

Tbps* Terabits per second.

TCP* Transmission Control Protocol; one of the main protocols of the Internet protocol suite. It provides reliable and error-checked delivery of packets between applications communicating on an IP network.

TCP/IP * Transmission Control Protocol/Internet Protocol; the Internet’s standard network protocol that has become the standard for all networks.

Terminal The primary interface for Linux commands. Also supported in macOS.

tethering The process of sharing a cellular data connection with another device via USB.

texting Sending or receiving texts while working with a client is unacceptable behavior unless it is intended to help solve the problem and the customer is informed.

theme Windows term for the combination of desktop wallpaper, color scheme, and sound effects.

theory of probable cause Theory of what caused the problem.

thermal compound A material sandwiched between a device and a heat sink to provide the best possible heat transfer from the device to the heat sink. See also thermal paste.

thermal paste Material placed between the heat sink and the CPU to draw heat away from the CPU. Might be preapplied or applied by the technician.

thermal printer A printer that uses heat to print text or graphics.

thermal transfer Thermal printer technology that uses a heated wax or resin ribbon.

thick client A computer that is suitable for running locally stored office apps, email, and web browsing; meets or exceeds OS recommendations.

thin client A computer used to access network stored and processed applications; meets minimum OS requirements.

three-tier Three-tier architecture uses three layers that are typically hosted on different devices, such as a computer and two servers.

Thunderbolt Intel-developed ultra high-speed I/O interface in three versions: 10Gbps (Thunderbolt 1), 20Gbps (Thunderbolt 2), and 40Gbps (Thunderbolt 3). Introduced by Apple and also used by some high-performance Windows and Linux PCs. It was originally known as LightSpeed.

Time Machine macOS backup app.

time/date/region/language settings Settings that localize an OS and are made during the installation process.

timeline How long it is expected the service or installation process will take. Keeping the customer informed of changes reflects professional behavior.

timeout Amount of time after a mobile system is idle until the screen locks.

TKIP* Temporal Key Integrity Protocol; an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs. It was designed to provide better encryption than the insecure Wired Equivalent Privacy (WEP) protocol.

TLS* Thread-local storage or Transport Layer Security; Thread-local storage is a programming method that uses static or global memory local to a thread. Transport Layer Security is a security protocol designed to ensure privacy between communicating client/server applications. TLS is the successor to SSL.

tokens A physical object used as part of a security system, such as a smart card, an RFID chip, and so on.

tone generator and probe A network cable testing device.

toner What laser printers use for printing.

Top Linux app that displays most active services and apps.

touch screen Touch-sensitive display standard on smartphones and tablets. Also widely used on all-in-one PCs, laptops, and convertible (2-in-1) mobile devices.

touchpad Most common type of pointing device installed in laptops. All touchpads emulate mice, but most recent models also support multitouch. Wireless touchpads can also be used in place of a mouse.

toxic waste handling Obsolete computer hardware can contain lead solder, mercury (CCFL backlights), and other toxins. Use an authorized electronics recycling center to avoid putting this material in landfills.

TPM Trusted Platform Module; a secure cryptoprocessor standard that employs a dedicated microcontroller to secure hardware by integrating cryptographic keys into the device.

TRACERT Windows command-line utility for tracing the path from the user location to the IP address or URL specified.

tracking Can refer to how websites and advertisers track your web searches and how the operating system itself watches your activity and where your device is geographically.

tracking cookies A file stored on a computer or device by a website a computer or device visited; can be used for targeted ads and to track where a user goes online.

tracking of evidence/documenting process Important parts of the chain of custody process.

tractor feed Paper-feed mechanism used on impact printers.

trademark a mark that identifies a business product. Used for product names, slogans, and identifying phrases Can be registered at the US Patent and Trademark Office.

transfer belt Ink transfer device used in color laser printers.

transfer roller Part of the transferring mechanism on some laser printers.

triple channel (RAM) Three identical memory modules addressed as a single logical unit.

Trojan (Trojan horse) A file or program that appears to be legitimate but is used to steal information or gain backdoor access to a computer.

troubleshooting The process of determining the solution to a problem and documenting the solution.

trusted sources App stores for Android (Google Play), iOS (Apple App Store), macOS (Apple Mac Store), and Windows (Windows Store).

TV tuner A device that can receive analog or digital TV from over-the-air or cable TV sources for live playback or for storage for later viewing.

two-tier Two-tier architecture uses two devices, such as a computer and a server for its layers. For example, in a two-tier application such as a local network hosted application, the presentation layer runs on a computer (one-tier). The programming and data layers run on a server (second-tier).

type 1 hypervisor A VMM that works directly with the host computer hardware, rather than being installed inside an existing operating system. Often referred to as a “bare metal” hypervisor.

U

UAC User Account Control; a security component of Windows that controls how users gain access to resources.

UDF User-defined function, Universal Disk Format, or Universal Data Format.

UDP User Datagram Protocol; an alternative network protocol to TCP used primarily to establish low-latency connections with no error checking between applications on the Internet.

UEFI Unified Extensible Firmware Interface; a specification that defines a software interface between an operating system and firmware. UEFI is meant to replace BIOS firmware while providing legacy support for BIOS services. UEFI supports remote diagnostics.

unattended installation Windows installation process that does not require user intervention to complete.

unauthorized information alteration The alteration of information without authorization threatens the integrity of any process or outcome based on that information (accounts, vote totals, news stories, etc.).

UNC Universal Naming Convention; the naming convention system used in Microsoft Windows for accessing shared network folders and printers on a local area network (LAN).

unicode Replaced ASCII and extended ASCII character sets because it enables operating systems and printers to display and print characters in any language. Unicode supports ASCII, extended ASCII, and both Latin and non-Latin alphabets and special characters.

uninstall/reinstall apps Process to fix issues with unstable/not working mobile apps.

uninstall/reinstall/repair Process to fix issues with unstable/not working desktop or laptop apps.

unnecessary software Software that performs the same job as another program on your system. For example, two different word processors, two different photo editors, and so on.

untrusted sources Software not from the OS app store, from unfamiliar publishers, or not digitally signed.

upgrade Process of installing improved OS, app, or driver files.

UPnP Universal Plug and Play; LAN protocols to allow discovery and use of streaming media sources.

UPS* Uninterruptible power supply; also known as a battery backup unit.

URL* Uniform resource locator; a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

USB* Universal Serial Bus. A high-speed replacement for older I/O ports. USB 1.1 has a peak speed of 12Mbps. USB 2.0 has a peak speed of 480Mbps; USB 2.0 ports also support USB 1.1 devices. USB 2.0 devices can be plugged in to USB 1.1 devices but run at only USB 1.1 speeds. USB 3.0 runs at 5Gbps; supports older USB devices at the native speeds of those devices. USB 3.1 Gen 2 runs at 10Gbps and is compatible with USB 3.0, 2.0, and 1.1 devices (USB 3.1 Gen 1 is the same as USB 3.0).

USB boot Booting from a USB device such as a flash drive.

USB connector type A Standard connector on a root hub or external hub.

USB connector type B Standard connector on a USB device.

USB connector type micro Smallest USB connector. USB-on-the-Go devices use a micro B connector.

USB connector type mini Medium-size USB connector. Five-pin Type B version most common.

USB optical drive Optical drive that connects to a USB port.

USB to Bluetooth Bluetooth transceiver that plugs in to a USB port.

USB to RJ-45 dongle Adapts Ethernet cable to connect to a USB port.

USB to Wi-Fi dongle Wi-Fi transceiver that plugs in to a USB port.

user See standard user.

User Account Control UAC; a Windows Vista feature that blocks unauthorized system-wide changes. Improved in Windows 7/8/8.1/10.

user accounts Accounts with standard permissions.

user authentication Security procedures to verify the identity of a user.

USMT User State Migration Tool; a Microsoft command-line tool utility that allows files and settings to be transferred between PCs. This task can also be performed by the Windows Easy Transfer utility.

UTP Unshielded twisted pair; a popular type of copper cabling used in telephone wiring and local area networks (LANs).

UXGA Ultra Extended Graphics Array; pixel resolution of 1600×1200.

V

vacuum (cleaner) Specialized vacuum cleaners are needed to clean up toner spills.

vendor-specific ports Ports that are not standard (for example, the charging connections on some tablets).

ventilation Airflow through a system or workspace.

vertical lines In printing, the appearance of vertical lines indicates problems with toner cartridge or feed rollers.

VESA Video Electronics Standards Association; a technical standards organization for computer display standards.

VFAT Virtual File Allocation Table; part of the Windows 95 and later operating systems that support long filenames, which otherwise could not be handled by the original File Allocation Table (FAT).

VGA* Video Graphics Array; the first popular analog video standard and the basis for all current video cards. Pixel resolution of 640×480.

vi Linux and macOS Terminal text editor.

video capture The process of capturing live video from analog or digital sources and storing it as a computer file.

video card A video card (also known as display adapter or graphics card) is an expansion card that generates video signal and displays it on a monitor.

View hidden files Setting in Windows File Explorer/Windows Explorer folder options. Recommended option when troubleshooting a system.

View options Setting in Windows File Explorer/Windows Explorer. Select thumbnail size, file details, and others.

violations of security best practices Refusing to follow procedures to protect a system, the network, the organization.

virtual assistant Voice-activated search tools such as Windows Cortana, iOS Siri, and Android Hey Google.

virtual machine VM; a workspace created by a virtual machine manager (VMM) or hypervisor that imitates a computer.

virtual memory Disk space used as a substitute for RAM.

virtual printer A program or service that works through the printer menu to create a file.

Virtual XP Mode Virtual Windows XP Mode; a free virtualized copy of Windows XP Professional available to Windows 7 Business and Ultimate users to help ease the transition from Windows XP to Windows 7. The user must also download Windows Virtual PC to use Virtual XP Mode.

virtualization support Hardware-assisted virtualization. BIOS/UEFI and CPU support for virtualization.

virtualization Creating an environment in which operating systems or applications run on a software-created simulation of a computer rather than directly on the computer hardware itself.

virus Computer program designed to infect a computer and make unwanted modifications to the operating system. If executed, the virus can replicate itself; in this way, it resembles a Trojan horse that can also replicate itself to other computers.

VM Virtual machine; an emulation of a computer system. Their implementations may involve specialized hardware, software, or a combination of both.

VoIP* Voice over Internet Protocol; the delivery of voice communications over IP networks such as the Internet.

volatile storage The contents of volatile storage are available only as long as the system is powered on. Turn off the system, and the contents disappear. There is only one type of volatile storage: RAM.

voltage Electrical potential measured in volts. Can be measured with multimeters or other test equipment or observed in the PC Health or System Monitor feature in BIOS/UEFI.

VPN* Virtual private network; enables anyone with an Internet connection to use the infrastructure of the public network to connect to the main network and access resources as if the user were locally logged on to the network. It also enables two networks to securely connect to each other.

W

Wake-on-LAN WoL; a network option in which a system in sleep mode is awakened by receiving a “magic packet” from the network.

WAN* Wide area network; a network that spans multiple cities, countries, or continents. Network sections might be linked by a leased line, Internet backbone, or satellite feed; routers connect LANs to WANs and WAN segments to each other.

WAP * Wireless Access Protocol or wireless access point. A device that enables connectivity between computers with wireless network adapters to create a wireless network.

warm site A disaster recovery location that has all of the computer equipment ready to be turned on in the event that the primary IT site cannot function. In some cases, the computers might also have operating systems and apps installed, but data must be restored before the site can become fully functional.

wattage Power measurement used to determine the appropriate size of a UPS or a power supply. Also used to measure the thermal design power of a CPU so that an adequate cooling solution can be used.

wearable technology devices Devices such as watches, wristbands, and goggles that communicate with a host mobile device or computer to measure health, transmit or receive data, and other uses.

Web Browser history All web browsers track where you’ve gone, a feature called Web Browser history. To avoid tracking, open web pages using your browser’s private browsing options.

web server A server that distributes web pages.

webcam A video camera designed for live chat sessions. Resolutions range from sub-VGA to 1080p HD.

WEP* Wired Equivalent Privacy; an older wireless network security standard, succeeded by WPA.

Wi-Fi* Wireless Fidelity.

Wi-Fi analyzer Device or app that detects Wi-Fi signals and determines signal strength.

Wi-Fi antenna Internal or external antennas on a router, access point, laptop, or network adapter that send and receive Wi-Fi signals.

Wi-Fi calling A feature in iOS that permits telephone calls when a Wi-Fi Internet connection is available.

Wi-Fi tethering When a mobile device shares its Internet connection with other Wi-Fi-capable devices via USB.

wildcard Characters used as variables in command-line operations such as DIR, DEL, and COPY and in searches. For example, * means any characters and ? means any single character.

Windows Microsoft Windows operating system.

Windows Explorer File management interface for Windows desktop. Replaced by File Explorer in Windows 8 and later.

Windows firewall Built-in feature to block unwanted inbound traffic. Used in Advanced mode, it can also be used to block unwanted outbound traffic.

Windows memory diagnostics Memory-testing program built in to Microsoft Windows.

Windows Mobile Version of Windows for smartphones.

Windows Recovery Environment Windows Vista/7/8/8.1/10 collection of automatic and user-operated repair and diagnostic tools for fixing problems with systems that won’t start.

Windows Server Version of Windows for servers with support for user and network management, very large data sets, and more; Windows Server 2012 is based on Windows 8; Windows Server 2016 is based on Windows 10.

Windows Store Trusted source for software for Windows 8/8.1/10.

Windows Update Updates Windows. If updates for other products from Microsoft are enabled, it is known as Microsoft Update.

Windows Upgrade Advisor Tool available in several versions from Microsoft to help users determine if their systems are ready to upgrade to the next version of Windows.

Windows Virtual PC Virtualization environment supported in Windows 7 Professional, Ultimate, and Enterprise. Required by Windows XP Mode. In Windows 8, Windows 8.1, and Windows 10, Hyper-V replaces Windows Virtual PC.

Windows XP Mode Virtualized installation of Windows XP Professional; runs under Windows Virtual PC.

WINS Windows Internet Name Service. Method sometimes used by Server versions of Windows to dynamically match NetBIOS computer names to their IP addresses (NetBIOS name resolution).

wire stripper Tool used to prepare raw coaxial or TP cable for assembly into a finished cable.

wired (network) Ethernet network.

wiretapping Is the unauthorized listening to POTS (plain old telephone system) phone calls with extension phones or with surreptitious recording devices in the phone. Because POTS has been widely superseded by wireless and VoIP phone technologies, the definition has been extended to cover the secret recording or interception of these types of communications as well.

wireless (network) Usually Wi-Fi, but can also refer to a Bluetooth network.

wireless card Wi-Fi adapter. Can also refer to a USB-based wireless adapter.

wireless locator App or device that locates wireless networks.

wireless Synonym for Wi-Fi or Wireless Ethernet network.

WLAN* Wireless local area network; a wireless data distribution method for devices that use high-frequency radio waves and often include an access point to connect to the Internet. A WLAN is often used in small office or home network implementations.

WOL See Wake-on-LAN.

workgroup A network that does not use a domain controller. Each computer can share or not share folders or printers with others. Unless password-protected sharing is disabled, anyone wanting to use a different computer’s resources must have an account on that system.

workstation Computer optimized for high-speed video, 3D, music, or CAD editing and creation.

worm A computer worm is a self-replicating type of malware similar to a virus but without the need for a user to execute it. It often uses a network to spread itself.

WPA* Wi-Fi Protected Access; a security protocol developed by the Wi-Fi Alliance to secure wireless networking. Takes the place of WEP. Uses the TKIP encryption protocol.

WPA2* Wi-Fi Protected Access version 2. A security protocol developed by the Wi-Fi Alliance to secure wireless networking using the AES encryption protocol. Takes the place of WPA.

WPS Wi-Fi Protected Setup; a security standard created by the Wi-Fi Alliance to increase security features of networks. The most visible manifestation of this is the button on some home routers that must be pressed to allow a new device to connect to the network within a short time period. WPS is not considered secure because flaws in the WPS PIN feature have been identified.

WUXGA Wide Ultra Extended Graphics Array. Has pixel dimensions of 1920×1200.

WWAN Wireless wide area network (cellular data network); uses mobile telecommunication cellular network technologies such as LTE, WiMAX, UMTS, and GSM to transfer data. It can also use Wi-Fi to provide Internet access. These technologies are offered nationwide, or globally, and are provided by a wireless service provider.

WXGA Wide XGA; a common widescreen graphics resolution for laptops and some displays. Has pixel dimensions of 1280×800.

X-Z

x64 The 64-bit extension to x86 processor architecture; backward compatible and supports more than 4GB of RAM.

x86 The 32-bit processor architecture used by AMD and Intel CPUs.

XCOPY Command-line utility for copying files and folders.

xD Short for xD-Picture Card, a now-obsolete flash memory card used by Olympus and Fujifilm digital cameras.

XGA eXtended Graphics Array; a 1024×768 display standard that is a minimum requirement for most Windows programs.

Yahoo A popular search and email provider.

yum Package manager for older versions of Red Hat, Fedora, and related Linux distributions.

zero-day attack An attack on a newly discovered computer or device vulnerability.

ZIF Zero Insertion Force; a type of IC socket or electrical connector that requires very little force for insertion.

zombie/botnet A zombie is a computer that has been taken over by a hacker or malware. When a group of zombie computers are used by a single malware process, the result is a botnet.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset