• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

32-bit versus 64-bit

64-bit is newer. Software can be compiled on both. 64-bit CPUs can run most 32-bA it software but 32-bit cannot execute 64-bit software.

8.3 Filenames

The DOS file name standard. An 8 character ASCII name followed by a 3 character file extension.AAA

Principal Stages of Security Control

Authentication, Authorization and Accounting

AAA

Accelerometer/Gyroscope

Accelerometer = motion detecting in most mobile devices


Gyroscope = rotation detecting in most mobile devices

Access Control (File)

Creating one or more barriers around a resource such that only authenticated users can gain access.

ACL (Access Control List)

The permissions attached to or configured on a network resource, such as a file, folder or firewall.

777

Active Partition

Active. Bootable. Only one per system.

Adapter Card

Circuit Board providing additional functionality to the computer system.

Raw Adapter Cards

Network Addressing

Method for assigning hosts and IP address.

Adware

Software that records information about a PC and its user once the user gives permission to do so.

Algorithm

A defined performing a process but in encryption. A minimum key size of 2048 bits is considered secure by NIST.


SHA-1 and MD5 (hash functions)


3DES, AES, RC (Rivest Cipher)


IDEA, Blowfish/Twofish and CAST ( used for symmetric encryption)


Dillie-Heliman, RSA, ElGamal and ECC ( used for asymmetric encryption)

AMD

Advanced Micro Devices


CPU manufacturer providing healthy competition for Intel.

AMD

Advanced Micro Devices


CPU manufacturer providing healthy competition for Intel.

AP

Access Point


Device that provides connectivity between wireless devices and cables network.

Hotspots

ARM

Small processor mostly used in android


RISC (reduced instruction set computing)

Advanced RISC Machines


Micro penis

ARP

Associates with the hard coded MAC address to the Devices IP address.

Address Resolution Protocol

Array

Identifier for a group of variables of the same type. The number of possible elements in an array is fixed when the array is declared.

ASCII

7-big code page mapping binary values to character glyphs. Standard ASCII can represent 127 characters l, though some values are reserved for non-printing control characters.

Assembly language

Is the machine code represented in human-readable text.

Different Backup Types

Full


Incremental (schedule specific)


Differential (only recording the changes)

Binary

Notartuinal system with 2 values per digit (zero and one). Computers process code in binary because the transistors in its CPU and memory components also have two states (on and off)