Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
- 3rd side (hint)
32-bit versus 64-bit |
64-bit is newer. Software can be compiled on both. 64-bit CPUs can run most 32-bA it software but 32-bit cannot execute 64-bit software. |
|
|
8.3 Filenames |
The DOS file name standard. An 8 character ASCII name followed by a 3 character file extension.AAA |
|
|
Principal Stages of Security Control |
Authentication, Authorization and Accounting |
AAA |
|
Accelerometer/Gyroscope |
Accelerometer = motion detecting in most mobile devices Gyroscope = rotation detecting in most mobile devices |
|
|
Access Control (File) |
Creating one or more barriers around a resource such that only authenticated users can gain access. |
|
|
ACL (Access Control List) |
The permissions attached to or configured on a network resource, such as a file, folder or firewall. |
777 |
|
Active Partition |
Active. Bootable. Only one per system. |
|
|
Adapter Card |
Circuit Board providing additional functionality to the computer system. |
Raw Adapter Cards |
|
Network Addressing |
Method for assigning hosts and IP address. |
|
|
Adware |
Software that records information about a PC and its user once the user gives permission to do so. |
|
|
Algorithm |
A defined performing a process but in encryption. A minimum key size of 2048 bits is considered secure by NIST. SHA-1 and MD5 (hash functions) 3DES, AES, RC (Rivest Cipher) IDEA, Blowfish/Twofish and CAST ( used for symmetric encryption) Dillie-Heliman, RSA, ElGamal and ECC ( used for asymmetric encryption) |
|
|
AMD |
Advanced Micro Devices CPU manufacturer providing healthy competition for Intel. |
|
|
AMD |
Advanced Micro Devices CPU manufacturer providing healthy competition for Intel. |
|
|
AP |
Access Point Device that provides connectivity between wireless devices and cables network. |
Hotspots |
|
ARM |
Small processor mostly used in android RISC (reduced instruction set computing) |
Advanced RISC Machines Micro penis |
|
ARP |
Associates with the hard coded MAC address to the Devices IP address. |
Address Resolution Protocol |
|
Array |
Identifier for a group of variables of the same type. The number of possible elements in an array is fixed when the array is declared. |
|
|
ASCII |
7-big code page mapping binary values to character glyphs. Standard ASCII can represent 127 characters l, though some values are reserved for non-printing control characters. |
|
|
Assembly language |
Is the machine code represented in human-readable text. |
|
|
Different Backup Types |
Full Incremental (schedule specific) Differential (only recording the changes) |
|
|
Binary |
Notartuinal system with 2 values per digit (zero and one). Computers process code in binary because the transistors in its CPU and memory components also have two states (on and off) |
|