Uploaded by J P

Glossary

advertisement
Glossary
Docter862918_bgloss.indd 1
14-03-2022 18:11:25
2
Glossary
.app A container to hold the application and its resource files that is used on macOS.
.bat The extension type used with Microsoft batch scripts.
.dmg A disk image file format used with macOS that can be mounted to the filesystem.
.js The extension type used with JavaScript scripts.
.pkg An automated package installer used with macOS to install applications.
.ps1 The extension type used with Microsoft PowerShell scripts.
.py The extension type used with Python scripts.
.sh The extension type used with Linux Bash scripts.
.vbs
The extension type used with Microsoft Visual Basic scripts.
A power adapter that allows flexibility between
a power supply and a 20-­pin ATX motherboard connector and a 24-­pin ATX motherboard
connector.
20-­pin to 24-­pin motherboard adapter
32-­bit operating system
An operating system based on 32-­bit commands that can address
32-­bit memory locations.
3D printing Fabrication process also known as additive manufacturing, where
three-­dimensional products are created by adding thin layers of material on top of each other.
3D printers use filament or resin to create the products on a print bed.
64-­bit operating system An operating system based on 64-­bit commands that can address
64-­bit memory locations.
The naming convention used with DOS that requires the format of
eight letters for the name, a period, and then a three-­letter file identifier.
8.3 naming convention
802.11 The IEEE specification that defines the family of wireless network communications.
802.11a A wireless standard that operates at 5 GHz and provides wireless speeds up
to 54 Mbps.
802.11b A wireless standard that operates at 2.4 GHz and provides wireless speeds up
to 11 Mbps.
802.11ac (Wi-­Fi 5) A wireless standard that operates at 5 GHz and provides theoretical
wireless speeds of 6.9 Gbps. Also known as Wi-­Fi 5.
802.11ax (Wi-­Fi 6) A wireless standard that operates at 2.4 GHz and 5 GHz and theoretical
wireless speeds of 9.6 Gbps. Also known as Wi-­Fi 6.
802.11g A wireless standard that operates at 2.4 GHz, is backward compatible with
802.11b, and provides data transmission of up to 54 Mbps.
Docter862918_bgloss.indd 2
14-03-2022 18:11:25
Glossary
3
802.11n A wireless standard that can operate at 5 GHz or 2.4 GHz, is backward compatible
with earlier standards, and provides data transmission up to 600 Mbps.
A address
A DNS record type for an IPv4 host.
AAAA address
AC adapter
Called “quad A,” it’s a DNS record type for an IPv6 host.
Power adapter that plugs into a standard wall outlet and provides alternating
current (AC).
acceptable use policy (AUP)
A policy that establishes acceptable use of organization
resources for employees.
A list of conditions and actions applied to files and network
traffic that allows or denies the access.
access control lists (ACLs)
access control vestibule A small vestibule that prevents people from tailgating by
requiring the person to swipe to pass through the second door.
The device that allows wireless devices to talk to each other and the network.
It provides the functions of the network access as well as security monitoring.
access point
The access token, in Windows, contains the login information for a user,
including their groups and privileges.
access token
account lockout When a password has been entered wrong too many times, an account
will disallow future logons and lock out the user.
accounting In computer security, defined as tracking users and what they do with their
resource access.
A directory service that Microsoft clients use for centralized authentication, authorization, and accounting.
Active Directory (AD)
A feature in Active Directory that allows an Active Directory
object to be recovered from deletion.
Active Directory Recycle Bin
active hub A type of hub that uses electronics to amplify and clean up the signal before it is
broadcast to the other ports.
Web pages that serve interactive content through the use of
backend scripting with VBScript.
Active Server Pages (ASP)
ActiveSync A protocol used by Microsoft Exchange Server that allows users to access
email, calendar, contacts, and tasks from a mobile device such as a smartphone or a tablet.
Address Resolution Protocol (ARP)
A TCP/IP protocol used to resolve IP addresses to
MAC addresses.
administrative privileges
An elevated level of privileges that allows a user to perform
administrative tasks.
Docter862918_bgloss.indd 3
14-03-2022 18:11:25
4
Glossary
administrative shares Hidden network shares that are automatically created by the
operating system for administrative access.
An account on the operating system that has elevated privileges to
modify the operating system.
Administrator account
Administrators group A group on the Windows operating system that when joined elevates members’ privileges, to allow modification of the operating system.
Advanced Encryption Standard (AES) encryption A symmetric block cipher encryption
standard used by the U.S. government and defined as a standard by NIST.
A class of processors that use the reduced instruction set
computing standard. ARM processors are often used in mobile devices because they can be
made smaller and produce less heat than x64/x86 processors.
Advanced RISC Machine (ARM)
A motherboard form factor that followed the
AT motherboard and that has given rise to many modern motherboard form factors, such as
micro ATX. The ATX motherboard was the first to feature the 20-­pin power supply connector
that today’s 24-­pin connector is based on.
Advanced Technology Extended (ATX)
AirDrop An Apple proprietary protocol used to quickly transfer files between iPhones,
iPads, and Macs.
Airplane mode
A mode that turns off all radios on a mobile device to comply with air
travel laws.
AirPrint Technology developed by Apple to allow iPhones and iPads to print wirelessly to
printers without the need to install a printer driver.
alkaline battery A type of battery that uses an alkaline electrolyte of potassium hydroxide
to produce electrical current.
Android Mobile operating system created by Google; one of the most popular smartphone
OSs in the world.
A special bag for electrical components that has a semi-­conductive surface
to both dissipate a charge and keep the bag’s surface at an even potential of voltage.
antistatic bag
An electrically conductive mat used for a work surface in which the potential for electrical static discharge is eliminated by draining static voltage with a 1 mega
ohm resistor.
antistatic mat
antistatic wrist strap A special strap that is fastened to your wrist in which the potential of
electrical static discharge is eliminated by draining static voltage with a 1 mega ohm resistor.
anycast
An IPv6 address that has been assigned to multiple nodes.
App Store An application that allows the download of applications from the cloud for
Apple devices.
Docter862918_bgloss.indd 4
14-03-2022 18:11:26
Glossary
Apple iTunes
5
Apple’s online store for iOS-­compatible apps, comparable to the Google
Play store.
application crashes
The action of an application that quits unexpectedly on an
operating system.
Running applications such as legacy software or OSs, or
performing cross-­platform virtualization, within a virtual machine.
application virtualization
apps Applications that are installed and maintained by the Microsoft Store.
APT (Advanced Package Tool)
A package management system used with many popular
Linux distributions.
archive attribute The attribute or flag that defines if a file or folder should be backed up.
ARM The term used to describe the Advanced RISC Machine processor instruction set.
aspect ratio The relationship between the horizontal and vertical pixel counts that a
monitor can display.
Assembly language
A low-­level language used to program CPU instructions.
A tag associated with equipment in an organization to identify ownership and
track the asset to assist in inventory management.
asset tag
attrib.exe
A command-­line tool for setting file and folder attributes.
attributes File properties that allow a limited characterizing of files and folders based on
their functionality and use.
audit log
A security log that tracks who accessed a device or a service and when.
authentication The process of verifying user or computer credentials using one or multiple
factors.
authentication server Computer that analyzes user credentials and then grants or denies
access to resources on the network.
authentication, authorization, and accounting (AAA)
Security framework for granting
and monitoring resource access control.
authorization The process of permitting or denying a user’s or computer’s actions based on
a ruleset.
automatic document feeder (ADF) Feature on a scanner or multifunction device (MFD) that
allows multiple pieces of paper to be placed in it so that all of them can be scanned in one job.
Automatic Private IP Addressing (APIPA) IP addressing system that automatically configures a host with a nonroutable, private IP address in the event the host is unable to reach the
DHCP server.
Docter862918_bgloss.indd 5
14-03-2022 18:11:26
6
Glossary
backlight A lighting source for an LCD computer screen, placed behind or below the display.
backside bus (BSB) The optional communications pathway between the Northbridge and
the cache controller. When the backside bus is absent, the cache controller communicates
with the Northbridge over the frontside bus.
badge reader
A device that electronically reads an identification badge.
badging Scanning an employee ID at a multifunctional device (MFD) to authenticate
to the MFD.
A motherboard standard developed by Intel in
2005 designed to replace the ATX standard. It never took off and is not used today.
Balanced Technology eXtended (BTX)
barcodes An optical (image-based) representation of data using a special formatting of lines.
An image backup that allows the restoration of a server in the event of
failure and replacement of the server.
bare-­metal backup
baseband OS
The operating system on a mobile device that handles all wireless com-
munication.
baseband update
An update to a mobile phone’s baseband OS, which manages all wireless
communication.
Bash (an acronym for Bourne Again Shell)
An extremely popular shell that is installed on
Linux operating systems.
Basic Input/Output System (BIOS) A type of firmware that instructs the hardware to
use certain motherboard features. It also contains the initialization routine for bootup of
the computer.
A programming technique that allows for a routine to run over and over again
until a condition is met.
Basic loops
basis weight A measurement of the “heaviness” of paper. The number is the weight, in
pounds, of 500 17" × 22" sheets of that type of paper.
battery calibration A software process where a lithium-­ion battery is completely drained
so that it can be fully recharged.
A series of beeps from the computer’s speaker that indicate a problem. The
number, duration, and pattern of the beeps can sometimes tell you what component is causing the problem.
beep code
bias voltage The –600VDC charge that the developing roller acquires from the high-­voltage
power supply.
biometric authentication An authentication method based on human characteristics,
such as fingerprints, retinal patterns, and any other biological uniqueness. Often used as a
“something you are” authentication factor.
Docter862918_bgloss.indd 6
14-03-2022 18:11:26
Glossary
BitLocker
7
A Windows feature that enables full volume-­level encryption.
blacklist A firewall security scheme where all computers are allowed to access the network
except for those on the blacklist. Also called a block list.
blackout
An electric event when there is a total loss of power.
Pieces of metal or plastic that come with a desktop case and cover the expansion
slot openings.
blanks
block storage Storage type where all data is stored in drives in equal-­sized blocks. It’s
generally more efficient and faster than file storage and is used in databases and storage
area networks.
Blu-­ray disc (BD)
An optical disc format that holds more information than a
standard DVD.
The Blue Screen of Death (BSOD) in Windows
or the rotating pinwheel in macOS are operating system crashes, often caused by the physical
memory failing. At other times, they are caused by bad programming, when an application
writes into a memory space reserved for the operating system or another application.
Blue Screen of Death (BSOD/pinwheel)
Bluetooth A popular standard used for short-­range wireless communication. Often used to
create a personal area network (PAN).
BNC connector
A type of coaxial connector used to attach stations to a Thinnet network.
bollard An architectural structure that acts as a visual indicator for a perimeter and protects an area from accidental damage.
Wireless printing technology introduced by Apple to allow for the sharing of
networked printers.
Bonjour
Boolean
A value that can either be true or false.
Boot Configuration Data (BCD) The configuration used by the current Windows bootloader
that was first introduced in Windows Vista.
botnet A group of computers that are organized and controlled for a malicious purpose.
Bourne shell
The original Linux/UNIX command shell; Bash is based on it.
branch logic
A logic that branches off based on a condition, usually facilitated by an if
statement.
brick To render a mobile phone (or other device) nonoperational, hence giving it the usefulness of a brick.
bring your own device (BYOD) A practice of allowing employees to use personal mobile
devices to access corporate electronic resources, such as email and cloud services.
Docter862918_bgloss.indd 7
14-03-2022 18:11:26
8
Glossary
broadcast address IP address that when used, the message is sent to all hosts on the
network segment.
brownout When the voltage dips below the nominal operating voltage for more than a few
seconds. Or, a drop in power but not a total loss of power.
browser redirection The action of redirecting a user visiting a website to a malicious site
for harvesting of credentials.
burner An optical drive so named because it employs a laser capable of intensities stronger
than what is used to read discs. It uses the laser to write, or “burn,” content to the disc.
burn-­in An artifact on the screen. No matter what you have on your screen, you can still
see the outlines of a different image. That image has been “burned” into the monitor.
bus A set of signal pathways that allows information and signals to travel between compo-
nents inside or outside of a computer. A computer contains three types of buses: the external
bus, the address bus, and the data bus.
bus topology A network topology where all computers are connected in a serial fashion.
A bus typically uses coaxial cable.
button cell
A special battery in the form of a coin and about the size of a quarter.
C/C++ A mid-­level object-­oriented language that requires compilation to machine
execution code.
A device used to connect a peripheral or other device to a computer using multiple
copper or fiber-­optic conductors inside a common wrapping or sheath.
cable
A physical lock designed to secure a laptop to a desk or other non-­movable
object, to deter laptop theft.
cable lock
A method of controlling cabling so that it is easy to manage when
cables need to be added, removed, or replaced.
cable management
Device that provides broadband Internet access using cable television lines.
cable modem
cable strippers Hardware tool that removes the plastic coating from copper wires in a cable.
cable tester
cable tie
Device used to identify problems with cables or to confirm their functionality.
A plastic fastener that can be used to bundle cabling together.
cache memory
A storage area for frequently used data and instructions.
The process by which a device such as a printer (or a scanner) is brought within
functional specifications.
calibration
caliper The thickness measurement of a given sheet of paper, which can affect a printer’s
feed mechanism.
Docter862918_bgloss.indd 8
14-03-2022 18:11:26
Glossary
9
DNS record type that indicates an alias for a host. It allows for
a host to have multiple names.
canonical name (CNAME)
A web page that prevents a user from using a wired or wireless connection
until an acceptable use policy (AUP) is accepted or login credentials are provided.
captive portal
The printer belt placed around two small wheels or pulleys and attached to
the print head carriage. The carriage belt is driven by the carriage motor and moves the ­print
head back and forth across the page during printing.
carriage belt
A stepper motor used to move the print head back and forth on an impact
printer. Also called a carriage stepper motor.
carriage motor
Network access
method where computers listen on the line and transmit when the line is empty. In the event
of a packet collision, each sender will wait a random amount of time and re-­send.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)
The Ethernet access
method used by IEEE 802.11 wireless networking.
Cascading Style Sheets (CSS)
A sheet or file that determines the placement and style of
web page elements.
cat A command-­line tool on Linux that allows you to view the contents of a text file.
Cat 5
Twisted pair cabling capable of handling 100 Mbps transmissions up to 100 meters.
Cat 5e
Twisted pair cabling capable of handling 1 Gbps transmissions up to 100 meters.
Cat 6 Twisted pair cabling capable of handling 10 Gbps transmissions up to 55 meters or
1 Gbps up to 100 meters.
Cat 6a
Twisted pair cabling capable of handling 10 Gbps transmissions up to 100 meters.
cathode-­ray tube (CRT) A legacy-­style computer monitor that uses a large vacuum tube
and a high-­voltage electron gun to draw on a phosphorus-­coated screen.
cd A Linux and DOS command that changes the focus directory.
CD-­recordable (CD-­R)
A CD that can be written to one time.
CD-­rewritable (CD-­RW) A CD that can be written to, erased, and rewritten to multiple times.
CD-­ROM
A nonwritable and unerasable CD permanently pressed with digital data.
cellular location services Service provided by a mobile phone carrier that helps mobile
devices pinpoint locations by using communications with cell phone towers.
A community-supported Linux operating system that is compatible with Red Hat
packages and functionality.
CentOS
Docter862918_bgloss.indd 9
14-03-2022 18:11:26
10
Glossary
central processing unit (CPU) The main processing unit that calculates mathematics and
logic, it’s considered the “brain” of the computer.
centralized processing A network processing scheme in which all “intelligence” is found
in one computer and all other computers send requests to the central computer to be processed. Mainframe networks use centralized processing.
CERT organization
An organization dedicated to cybersecurity based at Carnegie
Mellon University.
certificate authority (CA)
A server that issues public/private key pairs on behalf of users
and computers.
A method to document evidence as it’s moved or control is transferred to
other individuals so that it remains valid evidence.
chain of custody
A group of people in an organization who oversee the change
management control process.
change advisory board
change management A process to standardize the methods and procedures used to handle
changes in the company.
channels In wireless communications, subdivisions within a frequency.
characters per second (cps)
A rating of how fast impact printers can produce output.
The wire or roller that is used to put a uniform charge on the EP drum
inside a toner cartridge.
charging corona
charging step The second step in the EP imaging process, at which a special wire or
roller in the toner cartridge gets a high voltage from the HVPS. It uses this high voltage to
apply a strong, uniform negative charge (around –600VDC) to the surface of the photosensitive drum.
The executive officer for an organization who oversees the
information technology for the organization.
chief information officer (CIO)
chipset The set of controller chips that monitors and directs the traffic on the motherboard
between the buses and components. See Northbridge and Southbridge.
chkdsk A Windows command-­line tool used to check the filesystem of a disk for errors.
chmod A Linux command that changes permissions on a file or folder.
chown A Linux command that changes the ownership of a file or folder.
Chrome OS
Cloud-­based operating system created by Google based on the Chrome
web browser.
cipher locks
A physical lock for a door that allows a combination or sequence of buttons
to allow entry.
Docter862918_bgloss.indd 10
14-03-2022 18:11:26
Glossary
11
classless inter-­domain routing (CIDR) IP address spaces that do not correspond directly
to class A, B, or C networks. CIDR can be described as a “slash x” network. The x represents
the number of bits in the network address.
cleaning cycle A set of steps the inkjet printer goes through in order to purge the ­print
heads of any dried ink.
cleaning step The seventh and last step in the EP imaging process, at which excess toner is
scraped from the EP drum with a rubber blade.
client computer
A computer that requests resources from a network, often referred to as a
workstation.
client software Software that allows a device to request resources from a network.
A configuration where multiple OSs are managed on the client
machine and can be run simultaneously with the use of a hypervisor or virtual machine
manager (VMM).
client-­side virtualization
closed source
Describes software with code that is proprietary. Contrast with open source.
cloud computing Using the Internet to provide computing resources such as hardware and
other infrastructure, development platforms, and software applications.
cloud-­based Using the Internet to provide computing resources such as hardware and
other infrastructure, development platforms, and software applications.
CMOS battery A battery that provides power to the CMOS (or BIOS/UEFI) chip that
stores CMOS settings. A PC must retain certain settings when it’s turned off and its power
cord is unplugged.
coaxial cable A medium for connecting computer components that contains a center con-
ductor made of copper, surrounded by a plastic jacket, with a braided shield over the jacket.
code-­division multiple access (CDMA) 3G cellular communications standard developed
by Qualcomm and available only in the United States.
cold cathode fluorescent lamp (CCFL)
A common type of backlight used in laptop
computers.
collision When two or more stations transmit onto a shared medium simultaneously, inval-
idating the data sent from each station.
Command Prompt The interactive prompt that allows commands to be interpreted and
executed in Windows.
commercial license
A software license that is granted or used for commercial purposes.
TCP/IP protocol that uses port 445. Designed by
Microsoft and used to share files and printers between computers, regardless of the operating
system that they run.
Common Internet File System (CIFS)
Docter862918_bgloss.indd 11
14-03-2022 18:11:26
12
Glossary
An intermediate code to which the .NET Framework
is compiled. The CLR is then just-­in-­time compiled to executable machine code.
Common Language Runtime (CLR)
communications interface
The method a device uses to communicate with other compo-
nents, such as SATA or PCIe.
community cloud A cloud that is shared by several clients with similar interests or objectives.
A digital optical disc medium commonly capable of holding from
650 MB to 700 MB of data, corresponding to 74 to 80 minutes of CD-­quality audio, which
is of higher quality than MP3 files.
compact disc (CD)
Compact Disc File System (CDFS)
A filesystem used on compact disc media, also known
as ISO 9660.
compatibility mode A method of providing backward compatibility for applications.
compiler A program that takes high-­level and mid-­level code and compiles it to low-­level
executable machine code.
The extremely small storage space
that holds user settings and dynamically discovered parameters for the BIOS/UEFI.
complementary metal oxide semiconductor (CMOS)
compliance
The act of complying with regulations and policies.
Component Object Model (COM) An interface standard that supports object-­oriented
programming and allows processes to communicate with objects that are created from
application libraries.
composition When referring to printer paper, it’s what the paper is made of. Paper can be
made of cotton fibers or wood pulp, or a combination of the two.
A special vacuum that electronically dissipates electrical static
discharge (ESD) potential so that computer components are not damaged.
computer vacuum
In TCP/IP, connectionless refers to the UDP protocol, which makes a best-­
effort attempt at delivery but does not negotiate and establish a connection like TCP does.
connectionless
connection-­oriented In TCP/IP, connection-­oriented refers to the TCP protocol,
which negotiates and establishes a connection between two hosts before transmission of
data begins.
connectivity device Any device that facilitates connections between network devices.
Some examples include hubs, routers, switches, and bridges.
contention-­based
Competition between two or more network devices for the same
bandwidth.
A process scheduling in which processes depend on each other
to free resources for the next process.
cooperative multitasking
Docter862918_bgloss.indd 12
14-03-2022 18:11:26
Glossary
13
core An embedded CPU die in a processor package. More than one core is often found in a
single package today.
corona roller
A type of transfer corona assembly that uses a charged roller to apply charge
to the paper.
A type of transfer corona assembly. Also, the wire in that assembly that is
charged by the high-­voltage supply. It is narrow in diameter and located in a special notch
under the EP print cartridge.
corona wire
cp A Linux command that copies a file or folder from a source to its destination.
credentials A username and password used for access to a system or application.
crimper A tool that attaches the connector ends onto a network cable. Crimpers also
typically act as cable cutters and cable strippers.
crossover cable A twisted pair network cable used for connecting computers directly to
each other. One end has pins 1 and 3 and 2 and 6 reversed, hence the term crossover.
cross-­platform virtualization An aspect of client-­side virtualization that allows programs
coded for one type of hardware or operating system to work on another that it’s not designed
to work on.
current directory The directory in which commands will be run from the shell.
On a laptop computer, when the cursor apparently jumps around the screen
by itself. It’s usually caused by the user’s hand inadvertently touching the trackpad or touch
stick. Also called a ghost cursor.
cursor drift
An impact printer that uses a plastic or metal print mechanism with
a different character on the end of each spoke of the wheel. As the print mechanism rotates
to the correct letter, a small hammer strikes the character against the ribbon, transferring the
image onto the paper.
daisy-­wheel printer
date code
A numerical code that depicts the date for the release of a software package
or update.
daughterboard
A thin circuit board attached to the motherboard, used to attach
expansion cards.
DB-­9 Connector type used with older serial cables.
A power adapter that plugs into a car cigarette lighter or airplane power
source and provides direct current (DC).
DC adapter
DC jack Power plug used to connect a DC adapter. Most commonly found in airplanes and
automobiles, and may be labeled auxiliary power.
dd
Docter862918_bgloss.indd 13
A Linux command that provides block-­level copying of devices.
14-03-2022 18:11:26
14
Glossary
DDR Double data rate. A type of SDRAM that doubles the data rate of single data rate SDRAM
by transmitting 8 bytes on both the rising edge and the falling edge of each FSB clock cycle.
DDR2 Double data rate version 2. A type of SDRAM that doubles the data rate of DDR
SDRAM by transmitting 16 bytes on both the rising edge and the falling edge of each FSB
clock cycle.
DDR3 Double data rate version 3. A type of SDRAM that doubles the data rate of DDR2
SDRAM by transmitting 32 bytes on both the rising edge and the falling edge of each FSB
clock cycle.
DDR4 Double data rate version 4. A type of SDRAM that doubles the data rate of DDR3
SDRAM by transmitting 64 bytes on both the rising edge and the falling edge of each FSB
clock cycle.
DDR5 Double data rate version 5. A type of SDRAM that doubles the data rate of DDR4
SDRAM by transmitting 128 bytes on both the rising edge and the falling edge of each FSB
clock cycle.
Debian A Linux operating system that many different Linux distributions have been based
on, such as Ubuntu.
dedicated server The server that is assigned to perform a specific application or service.
default gateway The IP address of the “door” to the outside network, typically the internal
network’s router interface.
default username/password The default credentials on a network device that allows
initial management. Defines any screen-­sharing software that allows more than one person to
screen-­share.
The process of consolidating data to create contiguous files on a
mechanical disk drive.
defragmenting
demilitarized zone (DMZ) Old term for a screened subnet. A semi-­public network segment
located between a perimeter router and an internal router on your network. Used for web
servers, FTP servers, and email relay servers.
Water that has had minerals and impurities removed; it does not
leave residue and is recommended for cleaning keyboards and other non-­metal
computer parts.
demineralized water
Isopropyl alcohol that is mixed with methanol or another
additive so that it is not humanly consumable and does not leave a film when it dries.
denatured isopropyl alcohol
An attack for the purposes of disrupting the service or services a
company receives or provides via the Internet.
denial of service (DoS)
Department of Defense (DoD) model A four-­layer networking model loosely corresponding
to the OSI model, upon which the basis for the TCP/IP protocol suite was developed.
Docter862918_bgloss.indd 14
14-03-2022 18:11:26
Glossary
15
desktop The element of the GUI that contains icons, the Start menu, and the taskbar.
desktop management software An extension of some screen-­sharing software packages,
such as Splashtop and TeamViewer. This integration gives you complete device management,
and a lot of these tools will even show when a device is online and connectable.
Developer mode A mode on the Android operating system that allows the manipulation of
various controls for development purposes.
The roller inside a toner cartridge that presents a uniform line of toner
to help apply the toner to the image written on the EP drum.
developing roller
developing step The fourth step in the EP imaging process, at which the image written on
the EP drum by the laser is developed—­that is, it has toner stuck to it.
Server that is configured to forward DHCP broadcasts from clients on
its subnet to the DHCP server, which resides on a different subnet.
DHCP relay agent
DHCP server A centralized server that assigns IP address, subnet mask, and options to
hosts via the DHCP protocol.
An electronic certificate used to validate or authenticate credentials for
users, computers, and applications.
digital certificate
A digital form of copyright protection that protects
digital forms of media and allows the management of rights.
digital rights management (DRM)
Digital Subscriber Line (DSL) A broadband Internet access technology that uses the
existing phone line from your home to the phone company to carry digital signals at
higher speeds.
Digital Subscriber Line (DSL) modem A device that allows broadband Internet access
using the existing phone line from your home to the phone company to carry digital signals
at high speeds.
digital versatile disc (DVD) A digital optical disc medium commonly capable of holding
from 4.7 GB to 8.5 GB of data per side, corresponding to 2 to 4 hours of uncompressed
DVD-­quality video.
Digital Visual Interface (DVI) A digital video interface standard that includes support for
analog monitor interfaces in the DVI-­A standard or one or two links of digital transmission
in the DVI-­D standard. There is also a DVI-­I (the I stands for integrated) that has the ability
to support both standards.
digitizer A device that takes input from a stylus pen, such as drawings or writing, and turns
it into digital form on a computer.
Shielded twisted pair (STP) cabling that has extra insulation to make it waterproof, designed for burial in the ground or for use outside.
direct burial
Docter862918_bgloss.indd 15
14-03-2022 18:11:26
16
Glossary
disaster recovery A plan or system that assists an organization in recovery of services
from an incident or failure.
Another name for RAID 1; a hardware or software solution where exact
copies of data are written to two hard drives simultaneously as a form of data redundancy.
Requires at least two hard drives.
disk mirroring
Another name for RAID 0; a hardware or software solution where data is
written across multiple drives, similar to a stripe. Improves data read and write performance.
Requires at least two hard drives.
disk striping
Disk Utility
A macOS tool that allows you to create an image of the operating system.
DisplayPort A royalty-­free digital display pushbutton-­release interface from VESA that
uses less power than other digital interfaces and VGA, and that can interconnect with HDMI
and DVI with a simple adapter.
distended capacitor A capacitor is an electronic device used to store electricity. A distended or swollen capacitor is one that has failed and that has bulged from its normal size.
Some also leak brownish-­red electrolyte residue.
distributed denial of server (DDoS) A distributed attack by thousands of hosts for the
purpose of disrupting the service or services a company receives or provides via the Internet.
A computer system in which processing is performed by several
separate computers linked by a communications network. The term often refers to any computer system supported by a network, but more properly refers to a system in which each
computer is chosen to handle a specific workload and the network supports the system
as a whole.
distributed processing
DNS poisoning The act of sending malicious DNS results to a DNS server for the purpose
of redirecting users.
DNS server Server that resolves hostnames to IP addresses, typically associated with Internet name resolution.
Dock The component of the Apple macOS interface that allows for convenient access to
frequently used apps, documents, and any running apps. It is similar to the Microsoft
Windows taskbar.
Provides a full range of ports and often a full-­sized keyboard and monitor
for laptop computers.
docking station
domain A networking model that allows for centralized login and management of users
and computer objects. Also referred to as a client-server networking model.
domain controller The authenticating server used with the domain networking model.
The server is responsible for storing objects, authenticating objects, and auditing of
the objects.
Docter862918_bgloss.indd 16
14-03-2022 18:11:26
Glossary
17
Domain Keys Identified Mail (DKIM) An email server authentication method that uses a
public-­private encrypted key pair to help protect against spam emails. The DKIM record is
added to the DNS server as a TXT record type.
Domain Name System (DNS) A TCP/IP name resolution system that resolves hostnames
to IP addresses. DNS uses port 53.
Domain-­based Message Authentication, Reporting, and Conformance (DMARC) A policy
that specifies how a sending domain’s email administrator wants emails that are rejected by
DKIM or SPF to be handled. Added as a TXT record in DNS, it helps protect against email spam.
dot-­matrix printer An impact printer that has a print head containing a row of pins (short,
sturdy stalks of hard wire) that are used to strike the ink ribbon to create an image.
double-­sided memory
A memory module that combines two modules into one.
The poorest quality standard of output from a dot-­matrix impact printer,
suitable only for early document review.
draft quality
driver A software file that allows an operating system to communicate with a hardware
device. Also called a device driver.
A method of mitigating the risk of installing malware with third-­party
drivers by authenticating the author through certificate signing.
driver signing
A memory module packaging style that features a
circuit board with independent pins on both sides of the module’s card edge.
dual inline memory module (DIMM)
dual-­booting A computer with two operating systems that can be booted to either
operating system via a bootloader menu.
dual-­channel memory A RAM implementation scheme in which the memory controller
requires two paired standard memory modules to read from or write to simultaneously.
RIMM offers a single module that alone satisfies both channels on compatible motherboards.
dual-­layer The description used for DVDs and Blu-­ray discs that have two media layers on
one or both sides of the disc.
dual-­rail power A feature of modern power supplies that provides multiple 12V rails in an
effort to supply more power overall to components that require 12VDC, but with the possibility of undersupplying each individual rail.
dual-­voltage options A feature of power supplies that allows the selection of the lower AC
input voltages common in North America or the higher ones common in Europe.
dumpster diving
The act in which someone digs through the trash to collect sensitive
information.
Docter862918_bgloss.indd 17
14-03-2022 18:11:26
18
Glossary
A printer hardware component that is responsible for turning the
paper over so that it can be printed on both sides.
duplexing assembly
DVD-­ROM A nonwritable and unerasable DVD permanently pressed with digital data.
DVI-­to-­HDMI adapter A passive adapter or cable that allows a DVI monitor to be attached
to an HDMI output port on a graphics adapter. Adapters of the opposite orientation also exist.
DVI-­to-­VGA adapter A passive adapter or cable that interconnects a DVI-­A interface
with a VGA interface in order to allow interconnection of disparate graphics adapters
and monitors.
Dynamic disks A proprietary Microsoft partitioning scheme required when creating RAID
groups between volumes in the Windows operating system.
A protocol (and service) in the TCP/
IP protocol suite that automatically configures network clients with IP configuration
information when they join the network. DHCP uses ports 67 and 68.
Dynamic Host Configuration Protocol (DHCP)
Network address translation that allows
for a resource on a private computer to be available for consumption on a public network.
dynamic network address translation (DNAT)
Variables in which the type is automatically set as a value is assigned.
dynamically type
EFI System Partition (ESP) A system partition that stores various files used with UEFI for
the booting of the operating system.
electromagnetic interference (EMI) Any electromagnetic radiation released by an
electronic device that disrupts the operation or performance of any other device.
A special electric motor in a printer that can accurately move in
very small increments. It powers all of the paper transport rollers as well as the fuser rollers.
electronic stepper motor
electrophotographic (EP) imaging process
The seven-­step process by which an EP laser
printer forms images on paper.
electrostatic discharge (ESD) Occurs when two objects of dissimilar electrical charge
come in contact with each other; the charge can damage electronic components.
embedded system
A computer system that other computer systems depend on to
complete processes.
emulator Another name for a hypervisor, or a program that allows for the creation of
virtual machines.
The scrambling of a signal or message to make it unreadable by normal means
and more secure.
encryption
end-­of-­life (EOL)
The end of the supported life of a hardware or software product.
end-­user acceptance The method in which changes to a program or process are tested by
a user or group of users.
Docter862918_bgloss.indd 18
14-03-2022 18:11:26
Glossary
19
end-­user license agreement (EULA) A contract between a software company and an end
user, which specifies the legal use of that application.
A software license that is issued for use across an entire enterprise,
regardless of license count.
enterprise license
entry control roster
A list of people who are authorized in an area that is controlled by a
security guard.
envelope feeder
A special device for feeding envelopes into a printer.
environment variables
A variable that is used as a placeholder for a string of data used by
the operating system.
Environmental Protection Agency (EPA)
The U.S. agency that oversees environmental
protection regulations.
EP cartridge
The component used in a laser printer that forms images on paper.
A lock that secures equipment, such as USB drives, laptops, and other
sensitive electronic media.
equipment lock
An error-­checking scheme that is able to discover 1 or 2 bits
in a byte that contain errors and correct single-­bit errors.
error correction code (ECC)
Technology that allows for network signals to be sent via
electrical power outlets. Devices must be on the same electrical circuit for Ethernet over
power to work.
Ethernet over power
Event Viewer The utility built into Microsoft operating systems that allows an administrator to view system, security, and application events.
A wireless phishing attack in which the attacker sets up a wireless access point to
mimic the organization’s wireless access points.
evil twin
Exchange Online Internet-­based email service operated by Microsoft.
executable machine code
Code that has been compiled and is directly executable
by the CPU.
exFAT
A proprietary Microsoft filesystem primarily created for flash drives over 32 GBs.
An adapter card that is inserted into a bus slot in the motherboard to
expand the native capabilities of a computer system.
expansion card
expansion slot One of the arbitrary insertion points in an expansion bus, based on a
specific technology—­PCI or PCIe, for example.
exploits A manual or automated method of exposing a security vulnerability for the
purpose of gaining unauthorized access.
Docter862918_bgloss.indd 19
14-03-2022 18:11:26
Glossary
20
The third step in the EP imaging process, during which the items being
printed are exposed (written) to the EP drum. In this step, the laser is flashed on and off as
it scans across the surface of the drum. The area on which the laser shines is discharged to
almost ground (–100V).
exposing step
ext4 A filesystem that is commonly used with Linux distributions.
A connector based on Serial ATA (SATA) technology, used
primarily to connect external storage devices.
external SATA (eSATA)
face lock
A biometric type lock that allows you to use your face to unlock your device.
A process in which a device is reset back to the way it was when it came from
the factory; this process wipes all user settings.
factory reset
A regulation imposed by the
Department of Education that protects family and student educational records.
Family Educational Rights and Privacy Act (FERPA)
FAT
A 16-­bit filesystem that was originally used with MS-­DOS.
FAT32
A 32-­bit filesystem that was introduced with Windows 95 (OSR2).
F-­connector Also known as F type, the type of network cable connector that is found on
the end of cable television coaxial cables.
feature update An update that adds functionality to the operating system.
feed roller
The rubber roller in a laser printer that feeds the paper into the printer.
feeder Device that feeds paper or other media into a printer.
fences A physical security barrier used to keep unauthorized persons out of a secure area
while allowing the same environmental conditions.
fiber-­optic cabling Network cable that is made with a glass or fiberglass core and that
transmits light instead of electrical pulses.
Fiber-­to-­the-­Home (FTTH)
Fiber-­optic broadband service delivered directly to a
residence.
Fiber-­to-­the-­Node (FTTN) Fiber-­optic broadband service delivered to the telco box in
front of the house and not directly to the home.
field replaceable unit (FRU) A component that is not serviceable in the field and is only
replaceable, such as a power supply.
fifth generation (5G) The most current generation of cellular communications that supports gigabit speeds over cellular links.
filament Plastic or possibly metal material that comes in wire form on a spool, used by
some 3D printers to create 3D images.
Docter862918_bgloss.indd 20
14-03-2022 18:11:26
Glossary
21
A feature of many network operating systems that “locks” a file to prevent
more than one person from updating the file at the same time.
file locking
file servers Servers on a network designed to hold and store files for clients.
file-sharing software File-sharing software can be a category of remote access software,
if you are solely looking for that feature. Popular file-sharing software includes OneDrive,
Dropbox, and Google Drive.
A protocol in the TCP/IP protocol suite that is optimized for
file transfers. It uses ports 20 and 21.
File Transfer Protocol (FTP)
file-­level backup A backup method in which the files on a filesystem are individually
backed up to media.
fileshare Also known as a file server, a computer used primarily for the storage and
management of files on a network.
filesystem The organizational scheme that governs how files are stored and retrieved from
a disk. Examples include FAT, NTFS, HFS, and ext4.
FileVault A macOS feature that allows volume-­level encryption of the hard drive.
Finder The default file manager on Apple macOS that allows for file organization
and access.
fingerprint lock
finish diagram
A biometric type lock that uses your fingerprint to unlock the device.
A formal documentation of network systems, usually created at the end of
implementation.
finisher A device on a printer that performs such final functions as folding, stapling, hole
punching, sorting, or collating the documents being printed.
fire ratings A rating that defines how long a container can be exposed to fire before its
contents can no longer be protected from heat.
fireproof container A container that is impervious to fire that allows its contents to remain
at a safe temperature.
firewall Software or hardware used to limit traffic based on a set of rules, usually called an
access control list (ACL).
firmware Software that is programmed into erasable read-­only memory that defines how a
piece of hardware operates.
first responder
A person who is designated to respond to incidents and be the first person
on the scene.
first-­in, first-­out (FIFO) A systematic way of sending the most recent information out,
based on the most recent information that first came in.
Docter862918_bgloss.indd 21
14-03-2022 18:11:26
22
Glossary
An organization’s assets that have a fixed monetary value, such as
furniture, computers, and network equipment.
fixed tangible assets
Computer memory that is easily altered using electricity to alter its contents
instantly, but that will store the data in a persistent fashion when power is removed.
flash memory
Device used to read (scan) documents or pictures and turn them into
electronic images of documents or pictures. Can scan only one piece of paper or picture
at a time.
flatbed scanner
flat-­blade screwdriver
floating-­point
A screwdriver that is used for slotted screws.
A numeric value or math that has the precision of a decimal point.
A method of closing an application on Apple macOS when the application
becomes unresponsive.
Force Quit
The size and shape of a component. For example, ATX and Mini-­ITX are two
form factors for motherboards, HDDs commonly are in 2.5" or 3.5", and SSDs have M.2
and mSATA.
form factor
format The action of preparing a disk for storage using a given filesystem. Also a Windows
command-­line tool for preparing a disk for storage.
A generation of cellular technology that was popular throughout
the 2010s. It was the first standard that offered LTE.
fourth generation (4G)
frame The Data Link layer product that includes a portion of the original user data, upper-­
layer headers, and the Data Link header and trailer.
freeware Software that is written and distributed for free usage.
frequency The audio range in which a technology sends and receives broadcasts.
The high-­speed bus controlled by the Northbridge on which RAM,
cache (in the absence of the backside bus [BSB]), PCIe slots used for high-­speed graphics,
AGP slots, and other local-­bus components are interconnected with the CPU and, in some
cases, each other.
frontside bus (FSB)
full-­duplex communication
Communications where both entities can send and receive
simultaneously.
A domain name that is registered with a name provider and that contains a resource record that can be resolved to an IP address.
fully qualified domain name (FQDN)
fuser A device on an EP printer that uses two rollers to heat the toner particles and fuse
them to the paper.
The sixth step in the EP imaging process, when the toner image on the paper is
fused to the paper using heat and pressure. The heat melts the toner, and the pressure helps
fuse the image permanently to the paper.
fusing step
Docter862918_bgloss.indd 22
14-03-2022 18:11:26
Glossary
23
Generalize pass A configuration process in which the operating system is configured with
a new security ID (SID) and drivers are detected.
gesture-­based interaction
Using a mobile device through a series of finger gestures and
device movements.
ghost cursor On a laptop computer, when the cursor apparently jumps around the screen
by itself. It’s usually caused by the user’s hand inadvertently touching the trackpad or touch
stick. Also called cursor drift.
Global Positioning System (GPS)
A satellite-­based navigation system that provides
location and time services.
Global System for Mobile Communications (GSM) An older radio technology used for
the transmission of voice and data in 2G and 3G networks.
globally unique identifier (GUID) A unique identifier that is always unique across all
systems, because of the complexity of the alphanumeric value. It is also used to identify users
in an Active Directory domain.
Google/Inbox (Gmail) Internet-­based email service provider operated by Google.
Gramm–Leach–Bliley Act (GLBA) A regulation imposed by the Federal Trade Commission
(FTC) that protects consumer information.
grandfather, father, son (GFS) A rotation method used for backups that defines month
end, weekly, and daily backup cycles, respectively.
grep
A Linux command that finds patterns of text in the output and contents of text files.
group ID (GID)
The identification mechanism for groups in Linux operating systems.
The Microsoft technology used with corporate domain structures for
applying policies to users and computers.
Group Policy
Guest account An account automatically created and disabled on Windows operating
systems for the express use of guests.
GUID Partition Table (GPT) GUID Partition Table (GPT) is a 64-­bit partition table
specification used with Unified Extensible Firmware Interface (UEFI) BIOS.
half-­duplex communication Communication that occurs when only one entity can
transmit or receive at any one instant.
hard disk drive (HDD) A disk drive that contains magnetically coated platters in a sealed
case and is often used as the main secondary-­storage medium.
hard drive caching
When the print job is stored on the print server’s hard drive after the
job is completed.
The list of devices that are supported by the operating
system vendor and considered compatible with the operating system.
hardware compatibility list (HCL)
Docter862918_bgloss.indd 23
14-03-2022 18:11:26
24
Glossary
A security device that can manage, create, and securely
store encryption keys—­it enables users to safely encrypt and decrypt data.
hardware security module (HSM)
A small device that displays a rotating number, which a user must supply
along with their username and password.
hardware tokens
hash algorithm A one-­way computation that produces a unique numerical result, often
used with files or data.
hazardous waste Any waste that is deemed hazardous to the environment or people; this
waste is always regulated by a government entity.
header
Information attached to the beginning of a network data frame.
Pins on the motherboard used to connect case lights, fans, and other external
components.
headers
Health Insurance Portability and Accountability Act (HIPAA) A regulation imposed by
the Department of Health & Human Services (HHS) that protects patient information.
heat sinks
Metal devices designed to dissipate heat from electronic components.
helpdesk software Software that is used to document helpdesk requests and their
associated solutions.
hibernate mode A power state that saves the contents of memory to the hard drive and
preserves all data and application state.
high availability A cloud feature that guarantees access to resources for a certain amount
of time (limits downtime).
High-­Definition Multimedia Interface (HDMI)
Interface designed specifically to support
digital video and can also transmit digital audio.
A computing environment that allows for a large
number of physical CPUs and a large amount of RAM.
high-­performance computing (HPC)
A tool with a very large needle, a gauge that indicates volts, and a wire
with an alligator clip used to discharge electricity from electronic devices.
high-­voltage probe
hoax A malicious deceptive email or social media post that creates undue panic or concern.
home directory The directory on Linux operating systems that is used for personal
file storage.
host Any computer or device on a TCP/IP network that has an IP address.
In TCP/IP the host ID is the portion of the IP address that uniquely identifies a host
on the network.
host ID
host-­based firewall A software-­based firewall located on a computer.
Docter862918_bgloss.indd 24
14-03-2022 18:11:26
Glossary
hotfix
25
A patch that fixes a problem in the operating system.
hotspot
1.
A location, usually public, where people can access the Internet through a wireless LAN.
2.
A connection that lets users share a cellular Internet connection with Wi-­Fi–capable
devices. A Wi-­Fi–enabled laptop, for example, would look for the mobile phone’s Wi-­Fi
network, join it, and then have Internet access.
hot-­swappable A device that can be inserted and removed without removing power from
the host component.
hub A basic connectivity device used to link several computers together into a physical star/
hub-­and-­spoke topology. A hub repeats any signal that comes in on one port and copies it to
the other ports.
hybrid cloud
A cloud that combines the features of a public cloud with those of a
private cloud.
A secondary storage solution comprising a traditional magnetic hard drive
and modern solid-­state drive, whether as a single device or as two separate ones.
hybrid drive
hybrid topology
A physical network topology that is a combination of bus, star/hub-­and-­
spoke, and mesh.
Hypertext Markup Language (HTML) A standardized markup language for the transfer
and rendering of web pages with their associated elements.
Hypertext Transfer Protocol (HTTP) A protocol in the TCP/IP protocol suite that is the
backbone for Internet (Web) traffic. It uses port 80.
Hypertext Transfer Protocol Secure (HTTPS)
A secure version of the HTTP protocol that
uses TCP port 443.
A CPU feature that allows a single CPU core to be treated by an operating
system that supports simultaneous multithreading (SMT) as if it were two CPUs.
hyperthreading
A Microsoft technology used for operating system virtualization inside of the
Microsoft Windows operating system.
Hyper-­V
hypervisor Software that is installed which allows the creation of virtual machines on a
computer. That is, it gives the computer the ability to run multiple operating systems or
multiple instances of the same OS simultaneously.
iCloud Apple’s Internet-­based cloud storage solution, commonly used to sync iPhones and
other mobile devices as well as to provide Internet-­based email.
Docter862918_bgloss.indd 25
14-03-2022 18:11:26
26
Glossary
identification (ID) A physical badge used to provide positive identification and authoriza-
tion of a person.
ifconfig A Linux command that allows the viewing and configuration of Ethernet interfaces.
image-­level backup
A backup in which an image of the operating system is backed
up to media.
imaging drum The component located inside the EP cartridge of a laser printer that is
responsible for applying toner to a page of paper.
impact paper Paper that is used to produce multipart forms without the use of carbon
paper. Used in impact printers (such as dot-­matrix) and not in inkjet or laser printers.
impact printer Any printer that forms an image on paper by forcing a character image
against an inked ribbon. Dot-­matrix, daisy-­wheel, and line printers are all impact printers,
whereas laser printers are not.
incident
A notable event or occurrence that is unusual or outside of the normal processes.
A document that is used to identify the root cause of a problem
that caused an outage of services.
incident documentation
incident response The approach used by a company or organization to address and man-
age situations involving security breaches or attacks, or other improper activity on computers
or a network.
Indexing Service
A service that provides the cataloging of files for search purposes.
Information Technology eXtended (ITX)
A family of motherboard form factors used in
smaller systems, such as a home theater PC.
A type of wireless transmission between devices that uses radiation in the
infrared range of the electromagnetic spectrum.
infrared (IR)
A type of cloud service that provides the client with
extra network capacity, including processing power, storage, and networking services (such
as firewalls).
infrastructure as a service (IaaS)
inheritance The property of permission that allows subfolders and files to inherit the
parent folder’s permissions.
ink cartridge
A reservoir of ink and a print head, in a removable package.
inkjet printer A type of sprayed-­ink printer. It uses an electric signal that energizes
a heating element, causing ink to vaporize and be pushed out of the pinhole and onto
the paper.
A type of LCD screen. IPS displays have the best viewing angles
and color reproduction of LCD screen types.
in-­plane switching (IPS)
Docter862918_bgloss.indd 26
14-03-2022 18:11:26
Glossary
27
input/output card An expansion card that allows for other input or output devices to
connect to it. Examples include USB expansion cards and eSATA expansion cards.
integers Numeric values or math that uses both positive and negative whole numbers.
integrated development environment (IDE) A programming environment that typically
contains a GUI-­styled editor and a compiled execution environment.
Integrated Drive Electronics (IDE) A nickname for the original ATA standard, now known
as parallel ATA (PATA) since the advent of serial ATA (SATA).
integrated GPU
A graphics processing unit that is integrated into the CPU die.
integrated print server Software installed on a printer that allows the device to receive
and manage print jobs without the need for a separate computer host.
A scripting environment that typically contains a
GUI-­styled editor and an execution environment.
integrated scripting environment (ISE)
interface The port or connection through which a device attaches to an external com-
ponent, such as a printer’s parallel or USB port for connection to a computer, as well as
the software that enables the port to communicate with the external component, such as a
Windows-­based driver for an HP LaserJet.
interface circuitry Also called a port, it’s what makes the physical connection to whatever
signal is coming from the computer (USB, parallel, etc.) and also connects the physical
interface to the control circuitry.
interface software The operating system–specific driver that enables communication
between the computer and a peripheral.
International Mobile Equipment Identity (IMEI)
On mobile phones, a 15-­digit serial
number, which is unique to each device.
On mobile phones, a unique 15-­digit
identifier that describes a specific mobile user and their network. It’s composed of three
elements: the Mobile Country Code (MCC), the Mobile Network Code (MNC), and the
Mobile Station Identifier Number (MSIN), which is a sequential serial number.
International Mobile Subscriber Identity (IMSI)
Internet appliance
A network device specifically designed to ease Internet access.
Internet Control Message Protocol (ICMP) A network protocol that is primarily used for
troubleshooting and messaging responses from routers.
Internet Message Access Protocol (IMAP) A protocol used for downloading email that
uses port 143. The most current version is IMAPv4 (IMAP4).
Internet of Things (IoT) A name given to the vast network of small devices that are
networkable, such as security systems and cameras, home automation systems, thermostats,
door locks, and light switches.
Docter862918_bgloss.indd 27
14-03-2022 18:11:26
28
Glossary
The underlying communications protocol on which the Internet is
based. IP provides addressing on a TCP/IP network and allows a data packet to travel across
many networks before reaching its final destination.
Internet Protocol (IP)
Internet service provider (ISP)
Company that provides others with Internet access.
A network device that monitors network traffic and
looks for suspicious activity that might be the sign of a network-­based attack. It’s a passive
device that logs the activity and can send an alert to the administrator.
intrusion detection system (IDS)
intrusion prevention system (IPS) A network device that monitors network traffic and
looks for suspicious activity that might be the sign of a network-­based attack. It’s an active
device that can take actions to fend off the network attack.
inverter A small circuit board installed behind the LCD panel that takes AC power and
converts (inverts) it for the backlight.
iOS Mobile operating system created by Apple; one of the most popular smartphone OSs in
the world.
iPadOS A variant of Apple iOS with better multitasking features and a better home screen.
ipconfig A command-­line tool on Windows that allows you to view the IP address and
DNS on a client.
iptables A commonly used host-­based firewall that is preinstalled in many Linux
distributions.
IPv4 The version of IP addressing that has been used since the invention of the TCP/
IP protocol. Addresses are 32 bits long and written in dotted decimal notation, such as
192.168.13.85.
IPv6 The newer 128-­bit IP addressing scheme, in which addresses are written in hex. An
example is 2001:db8:3c4d:12::1234:56ab.
iSCSI A storage protocol that allows the transmission of Small Computer System Interface
(SCSI) commands over an Ethernet network via TCP/IP.
ISDN terminal adapter Also known as an ISDN modem, it’s the device that allows you to
connect to an ISDN service.
iTunes A marketplace for music, movies, and other digital media accessed from
Apple devices.
iwconfig A Linux command that allows the viewing and configuration of wireless
interfaces, similar to ifconfig.
jailbreak A term typically used with Apple devices that implies the operating system has
been tampered with in a way that allows global access to systems an end user should not
have access to.
Docter862918_bgloss.indd 28
14-03-2022 18:11:26
Glossary
29
A program language that requires the program to be compiled and run on top of the
Java Runtime Environment (JRE).
Java
JavaScript
A scripting language that is used in web pages to allow for interactive content.
jitter Variable latency (delay) on network connections.
A filesystem that keeps a log (journal) of transactions so that it
can be repaired in the future by reprocessing the journal entries.
journaled filesystem (JFS)
An authentication protocol that provides mutually trusted authentication of
users and computers utilizing user and service authentication tickets.
Kerberos
key fob
A small key chain–type device that allows access to external and internal doors for
buildings.
The most common computer input device for entering text with buttons labeled
with the characters that they represent.
keyboard
Keychain The Apple macOS password manager used to store usernames, passwords, and
other auto-­fill information.
kill
A Linux command that sends signals to processes so that they can be terminated.
knowledge base A group of articles that detail the symptoms of a problem and their
associated solutions, as well as supporting information.
KVM switch A device that switches a single keyboard/video/mouse set among multiple
computer systems.
Cache memory that is smallest, fastest and closest to the processor core that it’s
dedicated to.
L1 cache
L2 cache Cache memory that is larger and slower than L1 cache, and not as close to the
processor. It’s usually, but not always, dedicated to one processor core.
The largest and slowest cache memory bank, which is often shared among
multiple cores within a processor.
L3 cache
A chip interface standard that places the pins on the circuit board
instead of on the chip packaging. The pins do not insert into sockets. The chip has an array
of lands, or flat conductive pads, that interface with the pins by surface contact only.
land grid array (LGA)
lane In PCIe, a switched point-­to-­point signal path between any two PCIe components. The
designation x16, for example, in PCIe represents a component’s ability to communicate over
16 lanes simultaneously.
laser printer A generic name for a printer that uses the electrophotographic (EP)
imaging process.
latency The amount of delay between sending a network data request and receiving a response.
Docter862918_bgloss.indd 29
14-03-2022 18:11:27
30
Glossary
launcher
The area on a mobile phone from which applications are opened.
Switch for changing the display state on a laptop, accessed by pressing the
function key and another key, such as F8 or F4.
LCD cutoff
lease In DHCP, it’s the amount of time that IP configuration information is given to the
DHCP client. The lease contains all pertinent IP configuration information.
legacy software
A computer application that is outdated by today’s standards.
A computer system that is outdated by today’s standards, and uses old
hardware, software, or network protocol.
legacy system
letter quality (LQ) A category of dot-­matrix impact printer that can print characters that
look very close to the quality a laser printer might produce.
A connector on the end of a USB cable, specifically developed by
Apple for its iPhone5 and newer devices.
Lightning connector
A popular directory services protocol that
provides methods for creating, searching, and modifying objects and attributes. Microsoft
uses LDAP in conjunction with Kerberos to authenticate devices and users.
Lightweight Directory Access Protocol (LDAP)
Lightweight Extensible Authentication Protocol (LEAP) A proprietary wireless authentication protocol developed by Cisco for 802.1X RADIUS authentication.
A magnetic tape backup media created as an open standard, as an
alternative to proprietary magnetic tape technologies.
Linear Tape-­Open (LTO)
When a sender and receiver need to be able to see each other, with no obstacles in between, in order to communicate. Examples include infrared and satellite Internet.
line-­of-­sight
link local A special class of IPv6 address that is only usable on the local network; replaces
APIPA used in IPv4.
Linux An open source UNIX-­like operating system originally created by Linus
Torvalds in 1991.
liquid cooling A cooling method used to keep CPUs and other hot-­running components
from overheating by pumping a liquid from outside the system through tubing that leads to
blocks that mount to the components like heat sinks.
liquid crystal display (LCD) A display technology that uses crystals that align to produce
a polarization of light with electrical current. The term is also synonymous with the technology used to produce the backlighting for the LCD technology, compared to newer LED
backlighting.
lithium ion (Li-­ion) battery A type of rechargeable battery that uses lithium ions to store a
charge. These batteries do not suffer from standing discharge but cannot be overcharged.
Docter862918_bgloss.indd 30
14-03-2022 18:11:27
Glossary
31
load balancer A device that accepts incoming requests and re-­routes them to a bank of
servers that can all perform the same task, to spread out the work.
A group of computers and associated peripherals connected by a
communications channel, capable of sharing files and other resources among several users.
local area network (LAN)
Fiber-­optic cable connector that corresponds to the mini form-­factor
standard. Colloquially known as the “little connector.”
local connector (LC)
locale An operating system setting that specifies the language, character set, keyboard, and
monetary notations.
The name given to a class of services that help identify the physical
location of a device. GPS uses satellites to provide location services, and cellular networks
use cell phone towers for the same purpose.
Location services
location-­based services Mobile device services used with the GPS and wireless networks
to track the location of a mobile device.
lockup
The unresponsive action of an operating system or application.
logical diagram
An overview diagram that displays how information flows within a
network system.
Logical Disk Management (LDM) The service in Windows operating systems that controls
disks, volumes, and their management.
long-­range fixed wireless A point-­to-­point technology that uses directional antennas to
send and receive network signals.
Long-­Term Evolution (LTE) Cellular standard developed as an enhancement to 4G.
Provides faster speeds than standard 4G. Also available as the long-­range standard for 5G.
long-­term support (LTS)
An operating system that has a longer than normal extended
support period.
loopback plug
Plug used to loop a signal back into a port to test the functionality
of the port.
ls A Linux command that is similar to the dir command on Microsoft Windows. It allows
for the listing of files and folders in the filesystem on Linux.
lumen (lm) A unit of measure for the total amount of visible light given off by a source
and based solely on what the human eye can perceive, not on both visible and invisible
wavelengths.
M.2 A form factor designed to replace the mSATA standard for ultra-­small expansion
components in laptops and smaller devices, now also included on desktop motherboards.
MAC address
Docter862918_bgloss.indd 31
The unique physical address for each NIC.
14-03-2022 18:11:27
32
Glossary
A setting on a wireless router that prevents or allows access to clients based
on their network card’s physical (MAC) address.
MAC filtering
macOS Apple’s workstation operating system found on laptops and PCs.
The use of magnetic domains to store data on the surface of a medium,
such as the platters of a conventional hard disk drive.
magnetic storage
magnetometer A device that detects metal objects, also known as a metal detector.
mail exchanger (MX)
A DNS record type to signify an email server.
mail server A computer that receives, sends, and manages email.
mainboard
Another term for a motherboard, or the main circuit board in a computer.
maintenance station Provides a zero position for an inkjet printer’s print head and keeps
the print nozzles clear between print jobs.
malware Software that has been created with malicious intent of damage, theft, or disablement of computer systems and data.
man
A command-­line tool on Linux that allows you to view help pages for a command
specified as an argument to the tool.
Networking device that has the ability to configure ports, manage traffic,
and monitor traffic for issues. For management, the switch will use a network protocol such
as Simple Network Management Protocol (SNMP).
managed switch
master boot record (MBR) The first sector of a drive that contains the initial boot
instructions. MBR is also used to describe the basic disk partition scheme.
Master File Table (MFT)
The table used by the NTFS filesystem to locate files on the
filesystem.
A document that contains safety information about a
given product. Information provided includes safe handling procedures, what to do in case of
an accident, and disposal information.
Material Safety Data Sheet (MSDS)
measured service The process by which cloud providers meter clients’ usage, and then
charge them for services used.
A type of logical topology in which each device on a network is connected
to every other device on the network. This topology uses routers to search multiple paths and
determine the best path.
mesh topology
metered service Another name for measured service. The process by which cloud
providers meter clients’ usage, and then charge them for services used.
metropolitan area network (MAN) Networks that are defined by their geographical
nature, such as spanning a metropolitan area or a college campus.
Docter862918_bgloss.indd 32
14-03-2022 18:11:27
Glossary
33
microphone An audio input device that transfers through-­the-­air sounds to a recording or
playback device.
microSD A solid-­state, or flash, memory card format related to SD cards. MicroSD cards
are smaller than miniSD cards, which are smaller than SD cards.
Microsoft 365 A subscription service that provides access to the Office suite of apps from
Microsoft, including Word, Excel, PowerPoint, and others. With the subscription, users also
get storage space in Microsoft’s cloud. That cloud storage space can also be used to sync
devices with each other.
Microsoft’s cloud-­based computing platform for building and managing
applications and services.
Microsoft Azure
Microsoft Defender Security
Microsoft’s built-­in Windows antivirus and antimal-
ware engine.
Microsoft Management Console (MMC) A management console, originally introduced
with Windows 2000, that allows for a uniform structure in displaying management tools
to the user.
Microsoft Remote Assistance (MSRA) A remote assistance tool included with the
Windows operating system since Windows XP.
Microsoft SQL
A relational database software product that was developed by Microsoft.
Microsoft’s online marketplace for the purchase of applications, software
packages, and media.
Microsoft Store
The MSRA tool allows a trusted
helper to assist the end user when the end user creates a solicited request by choosing Invite
Someone You Trust to Help You.
Microsoft Support and Recovery Assistant (MSRA)
A Microsoft Office application that allows for the creation of network
diagrams for a system.
Microsoft Visio
A popular integrated development environment (IDE) that
allows for plug-­ins to edit various types of scripting languages.
Microsoft Visual Studio Code
Micro-­USB Small-­form USB connector typically used for devices such as digital cameras.
It’s the smallest of the USB connectors.
migration
Moving data, files, or settings from one computer or hard drive to another.
A common expansion slot technology used in laptops since 2005. They have a
52-­pin card edge connector.
Mini PCIe
mini-­HDMI connector The HDMI Type C interface with the same 19 pins as the standard
Type A interface. This compact HDMI interface allows smaller devices to output HDMI-­
quality audio and video.
Docter862918_bgloss.indd 33
14-03-2022 18:11:27
34
Glossary
A motherboard form factor—­the largest of the ITX family—­characterized by a
170 mm x 170 mm square format with a full-­size expansion slot, such as PCI, and a standard
memory slot and common integrated interfaces, features lost with smaller ITX form factors.
Mini-­ITX motherboards are commonly used in home-­theater PCs.
mini-­ITX
minimum requirements The minimum hardware specifications required by the
operating system.
miniSD A solid-­state, or flash, memory card format related to SD cards. MiniSD cards are
smaller than SD cards but larger than microSD cards.
mini-­USB Small-­form USB connector used for portable devices such as digital cameras.
Mini-­USB is slightly larger than micro-­USB.
Mission Control
The Apple macOS feature that allows you to view all running apps on the
operating system.
mmWave Very short radio wave technology used with 5G cellular to provide very high
transmission rates over 1 Gbps.
mobile
An operating system used on tablets, phones, and other portable devices.
mobile application management (MAM) A service that allows administrators to control
corporate software on mobile devices, including updating and wiping apps.
mobile device management (MDM)
Software that enforces the requirements for a BYOD
or mobile device security policy.
mobile hotspot When a cellular device allows noncellular devices to access the Internet
through its connection. Also, it can be a network card that allows laptop computers and
other mobile devices to access cellular networks.
modem A device used to provide Internet access through the analog phone line. At the
source it takes a digital signal and converts it to analog and then from analog back to digital
at the destination device.
Molex connector The original, larger system power connector that most often provides
power to non-­SATA hard disk drives and other devices that require more current to power
their motors than offered by antiquated smaller connectors.
motherboard A circuit board to which all computer components are directly or indi-
rectly attached.
mouse Handheld input device that, when moved around on a smooth surface, allows the
user to control the cursor movement on the screen. Comes with one or more buttons to allow
the user to click and interact with information on the screen.
multicast A message sent to multiple hosts. The term is used in IPv6 to refer to a
controlled, small-­scale broadcast.
Docter862918_bgloss.indd 34
14-03-2022 18:11:27
Glossary
multicore
35
A CPU with more than one processor core.
multifactor authentication Requiring multiple forms of identification to allow users
access to network resources, such as something they know, something they have, something
they are, or somewhere they are.
multimeter A testing device used to perform multiple tests, such as determining the voltage
provided by a wire.
multimode fiber (MMF) Fiber-­optic cable that can transmit multiple signals at the same
time. MMF can transmit up to 10 Gbps for up to 550 meters (1,804 feet, or just over one-­
third of a mile), depending on the standard used.
multisocket A motherboard that has more than one CPU socket.
multithreading The ability of a program to submit multiple requests to the processor
at one time.
mutual authentication When two devices that are going to communicate both validate the
other’s identity prior to sending information. Bluetooth uses it, for example.
name server (NS)
DNS record type that is the name or address of the DNS server
for a zone.
nano A command-­line tool in Linux that allows you to view and modify text files.
native resolution The one optimal or fixed resolution supported by a monitor, most often
used in reference to LCD-­based monitors.
near-­field communication (NFC) A short-­range communication technology that uses radio
frequency (RF) communication. It has a functional range of 10 centimeters. It lets users hold
their phone next to someone else’s phone and transfer data or bump their phone to a receiver
at a store to pay for a purchase.
near letter quality (NLQ) A category of dot-­matrix impact printer that can come close to
the quality of a laser printer but still is lacking somewhat in print quality.
near-­field scanner
Portable device that is capable of scanning for near-­field communica-
tion (NFC) signals.
NetBT Short for NetBIOS over TCP/IP, it is an application programming interface (API)
that allows computers to communicate with each other over the network. NetBIOS/NetBT
uses ports 137–139.
netstat A Windows command-­line tool used to view information about inbound and
­outbound network connections.
network A group of computers and associated peripherals connected by a communications
channel capable of sharing files and other resources among several users.
Docter862918_bgloss.indd 35
14-03-2022 18:11:27
36
Glossary
A service that translates private, nonroutable IP
addresses into public addresses that can be used on the Internet.
network address translation (NAT)
Network Basic Input/Output System (NetBIOS) An API that works at Layer 5 of the OSI
model and allows computers to communicate with each other over the network. NetBIOS/
NetBT uses ports 137–139.
network ID In IP addressing, the network ID is the portion of the IP address that identifies
the network (as opposed to the host).
network interface card (NIC) In networking, the PC expansion board that plugs into a
personal computer or server and works with the network operating system to control the
flow of information over the network. The network interface card is connected to the network
cabling (twisted pair, coaxial, or fiber-­optic cable), which in turn connects all the network
interface cards in the network.
network operating system (NOS) Operating system that runs on a computer, allowing it
to connect and operate on a computer network.
A hardware device that creates a copy of network traffic for use by monitoring devices without disrupting normal traffic.
network tap
network-­based firewall A firewall, generally hardware-­based, that protects a network of
computers as opposed to one computer.
The proprietary filesystem primarily used by
Microsoft that provides file security, encryption, performance, scalability, and reliability.
New Technology File System (NTFS)
A rechargeable battery that uses nickel oxide hydroxide
and metallic cadmium as electrodes. These batteries suffer from standing discharge and battery memory.
nickel cadmium (NiCd) battery
nickel metal hydride (NiMH) battery A rechargeable battery that has a composition similar to that of nickel cadmium batteries at the positive electrode. However, the negative electrode uses a hydrogen-­absorbing alloy. These batteries suffer less from standing discharge
than nickel cadmium and can store up to three times the amount of electricity.
Node.js A runtime environment for JavaScript so that JavaScript can be interpreted outside
of a web browser.
nondedicated server A computer that can be both a server and a workstation. In practice,
by performing the functions of both server and workstation, this type of server does neither
function very well. Nondedicated servers are typically used in peer-­to-­peer networks.
non-­parity memory
Primary memory that does not add or check the veracity of an extra
bit per byte of data.
An open standard for hard drives, designed to
optimize the speed of data transfers. It’s been created by a consortium of manufacturers,
including Intel, Samsung, Dell, SanDisk, and Seagate.
Nonvolatile Memory Express (NVMe)
Docter862918_bgloss.indd 36
14-03-2022 18:11:27
Glossary
37
Northbridge The functional part of the chipset that controls local-­bus communication
among components connected to the frontside bus, such as the CPU, memory and cache,
AGP slots, and PCIe slots used for high-­end graphics. See also Southbridge and chipset.
Notepad A Windows utility that allows for the creation and editing of text documents.
Notification area A component of the taskbar that provides quick access to background
processes, such as antivirus, volume controls, and media ejection options.
nslookup A command used to query DNS records from a DNS server, often used in
troubleshooting.
NTFS permissions Filesystem permissions that affect both users logged on both locally
and remotely through network shares.
Occupational Safety and Health Act A U.S. law that governs procedure with respect to
occupational safety and health safety for the private sector.
Occupational Safety and Health Administration (OSHA) The U.S. agency responsible for
overseeing occupational safety and health safety for the private sector.
octet A grouping of 8 bits.
offboarding The processes that encompass the event of employees leaving the organization.
onboarding
The processes that encompass the event of new employees entering the
organization.
on-­path attack An attack where the threat agent positions themself between the com­
promised user and the destination server.
open access point A wireless access point that employs no encryption or authentication,
allowing any device that receives the signal potential access to the connected network.
open source
Describes software with code that is nonproprietary. Contrast with
closed source.
Software in which the source code used to produce the product is
open for development to the public.
open source software
A seven-­layer theoretical networking model
developed by the International Organization of Standardization (ISO).
Open Systems Interconnection (OSI) model
An open source version of the Secure Shell (SSH) protocol used commonly with
Linux operating systems.
OpenSSH
operating system The software that provides the user with an environment in which to
run software and execute commands.
optical network terminal (ONT) Endpoint for an optical network that translates optical
signals into electrical signals for a copper-­based network. Used to get Internet access across
fiber-­optic networks.
Docter862918_bgloss.indd 37
14-03-2022 18:11:27
38
Glossary
The order used to collect evidence for incident response. The most
volatile information is always collected first, such as RAM.
order of volatility
organic light-­emitting diode (OLED) display A display technology that uses electroluminescence to light red, green, and blue subpixels that not only light the display like their LED
counterparts but also produce the image like the cells in a plasma display.
orientation Printer configuration setting that allows a user to choose portrait (taller than it
is wide) or landscape (wider than it is tall) print output.
original equipment manufacturer (OEM)
The vendor that packages an operating system
with its own hardware.
Out-­of-­Box Experience pass
The configuration process in which the operating system is
customized for the end user.
overclocking
Running the processor (CPU) at a higher speed than what it was intended to
operate at.
packet A group of bits ready for transmission over a network. It includes a header, data,
and a trailer.
page printers
Printers that get instructions one page at a time, such as a laser printer.
page-­description language Describes the whole page being printed. The controller in the
printer interprets these commands and turns them into laser pulses or firing print wires.
pairing The process of logically connecting two Bluetooth devices together to enable com-
munication.
pan tilt zoom (PTZ) Cameras that allow for 360-­degree operations and zooming in on an area.
paper feed mechanism The portion of the printer that picks up paper from the paper
drawer and feeds it into the printer.
The sensors on the paper feed mechanism that detect when the printer
has paper or is out of paper.
paper feed sensors
paper feeder
A device that feeds paper or other media into a printer.
paper pickup roller A D-­shaped roller that rotates against the paper and pushes one sheet
into a printer. Also called a pickup roller.
paper tray
The tray that holds paper until it is fed into a printer.
Parallel Advanced Technology Attachment (PATA) New name for integrated drive
electronics (IDE), a parallel communications method to communicate with hard drives and
optical drives.
An electronic computer pathway (bus) that can send 8 bits at a time over
synchronized separate lines, as opposed to 1 bit at a time, like a serial bus.
parallel bus
Docter862918_bgloss.indd 38
14-03-2022 18:11:27
Glossary
39
Old, slow port that uses a DB-­25 connector. Was the standard for many years
for printers, so it’s sometimes referred to as a printer port.
parallel port
parity checking Storing an extra bit with and based on each byte in memory or during
serial transmission. When a byte is accessed, the validity of the parity bit is checked. If the
check shows an error, the byte is rejected or the system halted because there is no way to
determine the nature of the error.
parked When the print head is in the locked, resting position.
A common way to unlock devices that is typically a 4-­or 6-­digit
numeric passcode.
passcode lock
passive hub A type of hub that electrically connects all network ports together. This type
of hub is not powered.
passwd A Linux command that changes the password for a user account.
A software that manages username and password combinations for
various websites and resources.
password manager
password policy An internal policy that dictates how passwords are created and handled
for an organization.
Twisted pair networking cable, also known as a straight-­through cable. Both
ends of the cable have the same pin order. Used to attach computers to hubs.
patch cable
patch panel A large hub that is rack mounted and that houses multiple connections for
computers but possesses no network intelligence.
PCI Express (PCIe) A high-­performance serial local-­bus slot architecture that obviates the
need for AGP and PCI slots. PCIe supports combining the resources of multiple adapters for
higher performance.
Peripheral Component Interconnect (PCI) A popular expansion slot architecture invented
by Intel that succeeded the ISA slot and that is succeeded by PCIe.
personal area network (PAN)
personal computer (PC)
A small-­scale network of Bluetooth-­enabled devices.
A computer designed for a single user, as opposed to a mainframe
or server.
personal identification number (PIN) A numeric password that is only known to the user,
which is used as a factor of authentication.
personal license
A software license that is issued to an individual for personal use.
Anything that can be used to identify an
individual person on its own or in context with other information.
personally identifiable information (PII)
pharming The malicious act of collecting credentials via browser redirection or email phishing.
Docter862918_bgloss.indd 39
14-03-2022 18:11:27
40
Glossary
Phillips screwdriver
A screwdriver that has a protrusion in the shape of a pointed cross.
The act of sending an email in an attempt to steal credentials by making the
recipient believe they are logging into a valid website.
phishing
A physical obstruction generally found on the outer perimeter that
prevents access; examples are fences, walls, and mobile barriers.
physical barrier
physical diagram A diagram that displays specific connections and explains why a
network system functions in a specific manner; used for diagnostics.
A D-­shaped roller that rotates against the paper and pushes one sheet into a
printer. Also called a paper pickup roller.
pickup roller
pickup stepper motor
The motor that turns the pickup roller in a printer.
piconet A Bluetooth network. A Bluetooth-­enabled device can communicate with up to
seven other devices in one piconet.
PIN code
Code used to pair two Bluetooth devices together.
pin grid array (PGA)
CPU sockets that have holes to receive the pins on the CPU.
ping A command used to check basic network connectivity.
plain old telephone service (POTS)
The system of telephone wires used for voice
communications.
platform as a service (PaaS) A type of cloud service that provides infrastructure and also
includes software development tools such as runtime environments.
plenum-­rated When referring to coaxial covering, a designation that means the coating
does not produce toxic gas when burned (as PVC does) and is rated for use in air plenums
that carry breathable air.
A laptop feature in the center of the keyboard. Users can use it to control the
mouse movement.
point stick
pointer drift When the mouse cursor slowly drifts in one direction even though you are not
trying to make it move. This issue is generally related to the point stick not centering properly after it’s been used.
The type of plastic coating found on most network cables. Emits
poisonous gases when burned.
polyvinyl chloride (PVC)
pop-­under
An advertisement that displays under a web page or in the background of
the browser.
pop-­up blocker A browser function that suppresses pop-­ups on web pages and also allows
for whitelisting, or allowing a list of specific sites.
Docter862918_bgloss.indd 40
14-03-2022 18:11:27
Glossary
41
pop-up An advertisement that pops up and displays when a user visits a web page.
port In hardware terms, a port is a location that a cable or device plugs into, often on the
motherboard.
port flapping When a network switch port is opening and closing rapidly, typically three
or more times per second, over at least 10 seconds.
port forwarding Allowing packets that meet the criteria in the ACL to pass through the
firewall to their destination.
port number
The logical channel that TCP/IP-­based protocols use to communicate.
A laptop peripheral that has common ports on it. When the laptop is
plugged into it, the laptop can make use of full-­sized keyboards and mice as well as external
monitors and other peripherals.
port replicator
An automated form of port forwarding. It allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port.
port triggering
A circuit board that fits into an expansion slot in the motherboard or a USB
port and reports numeric codes as the boot process progresses. By looking up the number
where the card stops, you can identify the source of problems.
POST card
Post Office Protocol 3 (POP3)
The most current version of the Post Office Protocol. It
uses port 110.
PostScript (PS) Page-­description language, used more commonly for graphics-­intensive
printing. An alternative to Printer Control Language (PCL).
power button In today’s computers, a physical switch that can be configured to perform
multiple functions, such as power the computer on/off and put it into sleep mode, based on
the length of time it is held.
power circuit The set of conductive pathways that converts 110V or 220V house current
into the voltages an inkjet printer uses (usually 12V and 5V) and distributes those voltages to
the other printer circuits and devices that need it.
Often an LED that indicates the system is on when lit and off when not. The
power light can also blink when in a low-­power state.
power light
Technology that allows for the transmission of electrical power
over Ethernet (twisted pair) cabling.
power over Ethernet (PoE)
A hardware device that sits between a switch and an
access point that requires power to be provided over the Ethernet connection. The injector
supplies the power on the Ethernet connection if the switch is not equipped to do so.
power over Ethernet (PoE) injector
An event in which voltage levels intermittently drop for a brief period of time,
causing a sag in voltage.
power sag
Docter862918_bgloss.indd 41
14-03-2022 18:11:27
42
Glossary
power strip A device that is used to supply power to multiple outlets but that contains no
protective circuitry.
power supply A device inside the computer that takes AC from wall outlets and converts it
to DC that the computer components need.
An event in which the voltage level intermittently spikes, generally after
power is restored from a blackout.
power surge
Part of the boot process controlled by the BIOS/UEFI that
verifies the working condition of the hardware the BIOS/UEFI knows about.
power-­on self-­test (POST)
PowerShell A Windows scripting environment based on the .NET Framework to allow
management of the operating system.
A process scheduling in which each process is allotted a specific
amount of processing resources.
preemptive multitasking
Preferred Roaming List (PRL) update An update to a mobile phone’s primary roaming
list, which determines which cell towers the phone connects to while roaming outside of its
home area.
A shared passphrase for symmetrical encryption often used with VPN
and wireless communications.
preshared key (PSK)
principle of least permissions
A concept in which you assign only the permissions a
person requires to do their job.
print bed
Flat plate upon which 3D images are printed by a 3D printer.
print buffer
A small amount of memory located on the printer used to hold print jobs.
The part of a printer that creates the printed image. In an impact printer, the
print head contains the small pins that strike the ribbon to create the image, and in an inkjet
printer, the print head contains the jets used to create the ink droplets as well as the ink
reservoirs. A laser printer creates images using an electrophotographic method similar to that
found in photocopiers and does not have a print head.
print head
print head alignment The process by which the print heads is calibrated for use. A special
utility that comes with the printer software is used to do this.
printhead carriage The component of an inkjet printer that moves back and forth during
printing. It contains the physical as well as electronic connections for the print head and (in
some cases) the ink reservoir.
print queue
A series of print jobs waiting to use the printer.
print server A computer responsible for managing printers, making them available on the
network, and receiving and processing print jobs from clients.
Docter862918_bgloss.indd 42
14-03-2022 18:11:27
Glossary
43
A service that formats print jobs in the language that the printer needs and
manages the printing process.
print spooler
A conductive series of pathways laminated to a nonconductive
substrate, such as those that make up a motherboard.
printed circuit board (PCB)
Runs a printer’s stepper motors, loads paper, and so on. Monitors
the health of the printer and reports that information back to the computer.
printer control circuit
Printer Control Language (PCL) Page-­description language developed by Hewlett-­Packard,
also called Printer Command Language. It is an alternative to PostScript and is mostly used
for standard office (mainly text-­based) printing.
printer controller assembly A large circuit board in a laser printer that converts signals
from the computer into signals for the various parts in a printer.
A fabric strip that is impregnated with ink and wrapped around two spools
encased in a cartridge. This cartridge is used in dot-­matrix printers to provide the ink for the
printing process.
printer ribbon
printer-­resident fonts
Fonts that are installed into the onboard memory of the printer.
printers Electromechanical output devices that are used to put information from the computer onto paper.
Private addresses are not routable on the Internet. They were intended for
use on private networks only. Compare with public addresses that are used on the Internet.
private address
private cloud
private side
An Internet-­based service owned and operated by an individual company.
The interface on a firewall that faces the internal network.
The identification method used to identify a process running on the
operating system, normally represented by a number.
process ID (PID)
processing step The first step in the EP imaging process, where the image is sent to the
printer and the image is created in memory.
product key Unique code that comes with software that is used to activate the application
and that indicates the ability to use the software.
Product Release Instruction updates On a mobile phone, it’s an update to the Product
Release Instruction (PRI) system, which contains settings for network-­specific configuration items.
prohibited content Material that is not allowed on your company’s computers.
projector An output device that uses a light source to display an image input to one of its
interfaces onto a screen.
Docter862918_bgloss.indd 43
14-03-2022 18:11:27
Glossary
44
propagation delay In satellite Internet, the delay caused by the length of time required to
transmit data and receive a response via satellite.
Protected Extensible Authentication Protocol (PEAP) An open-­standard wireless
authentication protocol developed by Cisco, Microsoft, and RSA for 802.1X RADIUS
authentication.
In networking and communications, the specification that defines the procedures to follow when transmitting and receiving data. Protocols define the format, timing,
sequence, and error-­checking systems used.
protocol
proxy The action of requesting a resource on behalf of a user, computer, or application.
proxy server A computer that makes requests for resources on behalf of a client. Typically
used in an Internet setting, where it can filter content.
ps A Linux command that shows all running processes on the operating system.
All the addresses that are used on the Internet are called public addresses.
They must be purchased, and only one computer can use any given public address
at one time.
public address
An Internet-­based service owned by one company, which provides cloud services to client companies and individuals.
public cloud
public side
The interface on a firewall that faces the Internet or other public network.
punch-down block Large block of connectors used to terminate UTP or STP cable, typi-
cally located in a server room or connectivity closet.
punch-­down tool Handheld tool used to secure cable coming out of the walls to a
patch panel.
push protocol
pwd
A protocol that is designed only to send, such as SMTP.
A Linux command that displays the current working directory.
Python A general purpose, high-­level scripting language that can be installed on any
operating system.
quad-­channel memory Computer memory that is installed and synchronized as four
banks at one time.
quality management system (QMS) A collection of business processes and procedures that is focused on consistency of an organization to satisfy customer satisfaction and
requirements.
quantum light-­emitting diode (QLED) Display technology developed by Samsung that
uses LED backlights, with a thin film of quantum dots over it to improve brightness.
Docter862918_bgloss.indd 44
14-03-2022 18:11:27
Glossary
45
Quick Assist A remote assistance utility that has been included with the Windows
operating system since Windows 8.
radio firmware
The firmware on a mobile phone that manages all wireless com-
munications.
radio frequency (RF)
An electromagnetic signal used for radio communications on a
specific frequency.
A technology that uses radio waves to read
an identification number on a badge or other RFID-­embedded device for authentication purposes.
radio frequency identification (RFID)
radio frequency interference (RFI) Another term for electromagnetic interference (EMI).
The only type of RAID that is not fault tolerant, RAID 0 provides striped volume
sets on two or more drives that allow for larger volumes than one drive alone can provide.
When one or more drives are lost, all data is compromised.
RAID 0
A fault-­tolerant type of RAID that provides mirroring and duplexing. Two and only
two drives exist in a mirrored set. The loss of either drive does not compromise data.
RAID 1
A fault-­tolerant type of RAID that combines the mirroring of RAID 1 in two or
more independent mirrored sets that are striped together with RAID 0 to produce larger volumes than any single mirrored set could provide. RAID 10 requires at least four drives.
RAID 10
A fault-­tolerant type of RAID that combines striped sets with distributed parity
across all drives in the set. A minimum of three drives is required, and the loss of any one
drive does not compromise data.
RAID 5
random access memory (RAM)
Short-­term, volatile, and quickly accessible storage used
by the processor in a computer.
A type of malware that ransoms your data in exchange for money in the form
of cryptocurrency.
ransomware
The ability to quickly increase or decrease the amount of resources
required from a cloud provider.
rapid elasticity
The process of converting signals from the computer into signals for the
various assemblies in a laser printer.
rasterizing
read-­only A copy or resource that is not editable or writable.
real-­time clock (RTC)
A chip on the motherboard responsible for maintaining the
correct time.
Secondary operating system on a mobile phone,
designed to be lightweight and fast, and real-time refers to its ability to minimize lag in data
transfers.
real-­time operating system (RTOS)
Docter862918_bgloss.indd 45
14-03-2022 18:11:27
46
Glossary
A term used with backups to describe the point in time at
which you can recover data from the last backup.
recovery point objective (RPO)
recovery time objective (RTO) A term used with backups to describe the time it takes to
recover data from the recovery point objective (RPO).
Red Hat
A corporately supported version of the Linux operating system.
Software or hardware
implementation where multiple hard drives work together as one unit, often to provide a
performance boost or fault tolerance.
Redundant Array of Independent (or Inexpensive) Disks (RAID)
A secondary backup power supply that will take over and
provide power to computer components if the primary power supply fails.
redundant power supply (RPS)
refresh rate The number of times per second, measured in hertz (Hz), that a screenful of
image information is read from an input source and displayed by a monitor.
regedit
A Windows operating system tool used to edit the Registry.
registration rollers In a laser printer, rollers that synchronize the paper movement with the
image-­formation process in the EP cartridge.
Registry The configuration database inside the Windows operating system that contains
settings for the entire operating system and users.
regulation
An eternal rule or ruling with which an organization must comply.
release to market (RTM) The final version of the software product that is sold to the customer.
The process of repairing an outage, security problems, network issue, or other
network system problem.
remediation
Remote Authentication Dial-­In User Service (RADIUS) An industry-­standard protocol
used to provide authentication, authorization, and accounting (AAA), often used with remote
access solutions.
The main utility used by Microsoft operating systems
to connect remote desktop sessions via the Remote Desktop Protocol (RDP).
Remote Desktop Connection client
Remote Desktop Protocol (RDP) Protocol developed by Microsoft for users to be able to
log into a computer remotely. RDP uses port 3389.
An Apple macOS feature that allows for the sharing of a CD or DVD
remotely from another macOS computer.
Remote Disc
RMM solutions can help IT across the
enterprise or multiple enterprises and give you a holistic view of the enterprise. The remote
monitoring feature of an RMM system can monitor a number of different components, such
as security, hardware, applications, and even activity on the operating system.
Remote Monitoring and Management (RMM)
Docter862918_bgloss.indd 46
14-03-2022 18:11:27
Glossary
remote network installation
47
A method of installing the operating system over a network
connection.
remote office
An office that is located in a different geographic location from the
main office.
A method of reinstalling the operating system without loss of settings,
personal files, and apps.
repair installation
repeater Networking device that takes a signal, amplifies it, and sends it along the cable.
Used to extend maximum distances.
reseating The process of unplugging a device or cable and plugging it back in to ensure it
is properly connected.
reservation On the DHCP server, you can specify that certain hosts will always receive the
same IP address, which is called a reservation.
resin Liquid substance used by 3D resin printers to create 3D images.
resolution The number of rows and columns that a display unit is capable of representing.
resource On a network, any device that clients can access, such as printers or
shared drives.
A Windows utility that allows visualization of processes in the
Resource Monitor
operating system.
The ability of a cloud provider to combine resources from multiple
physical computers to appear to be one combined resource that is available to clients.
resource pooling
restore point A point in time that the operating system or files can be recovered from in
the event of data loss or corruption.
ribbon cartridge
The container that holds the printer ribbon.
ring topology A physical network topology that has computers connected in a ring shape.
Uncommonly used.
riser card
An expansion card that allows for other expansion cards to be inserted into it.
risk The potential of failure or undesirable consequences.
The process of analyzing proposed changes for the possibility of failure or
undesirable consequences.
risk analysis
A connector type for twisted pair cabling. Telephone cabling uses an
RJ-­11 connector and network cabling uses an RJ-­45 connector.
RJ (registered jack)
RJ-­11 Registered Jack 11, a two-­pair (four-wire) plastic connector for the ends of twisted
pair copper cabling.
Docter862918_bgloss.indd 47
14-03-2022 18:11:27
48
Glossary
Registered Jack 45, a four-­pair (eight-wire) plastic connector for the ends of twisted
pair copper cabling.
RJ-­45
rm A Linux command that deletes files and directories.
rollback plan A plan used with change control management to detail the steps to roll back
a procedure if something goes wrong.
A side-­by-­side upgrade process in which the newly decommissioned
equipment becomes the next person’s upgrade, thus perpetuating the cycle until everything
is upgraded.
rolling upgrade
root A Linux operating system super user account that is similar to the Administrator
account on Windows operating systems.
root access A level of access to an operating system in which an end user can modify the
operating system.
root cause
The underlying reason for a system failure or outage of a system.
root server The DNS servers at the “core” of the Internet that hold information about the
top-­level domain name servers.
rootkit
A group of tools used to gain root level access to an operating system.
router In networking, an intelligent connecting device that can send packets to the correct
local area network segment to take them to their destination. Routers link LAN segments at
the Network layer of the OSI model for computer-­to-­computer communications.
routing tables
Tables on a router that determine where the router will send packets on
the network.
A package installation tool that was developed on the Red
Hat Linux operating system, originally named Red Hat Package Manager.
RPM Package Manager (RPM)
RS-­232 Communication standard for communications over a serial connection. The term
RS-­232 is sometimes used synonymously with DB-­9, although DB-­9 is specifically a serial
connector.
safety goggles
Samba
Protective eye equipment that protects your eyes in all directions.
A open source package installed on Linux that allows Windows SMB file sharing.
sandbox A temporary virtual environment used to test how software apps respond in that
environment.
A temporary location where testing can be done without repercussion to
production systems.
sandbox testing
A regulation imposed by the Security and Exchange
Commission that regulates financial documents for an organization.
Sarbanes–Oxley Act (SOX)
Docter862918_bgloss.indd 48
14-03-2022 18:11:27
Glossary
49
satellite Internet A type of Internet connection that uses a satellite dish to receive data
from a satellite and a relay station that is connected to the Internet.
scan to email
Scanning a document on a multifunctional device (MFD) and emailing it to
a recipient.
scatternet A network of two or more Bluetooth piconets.
scope Database on a DHCP server that contains the IP addresses and other configuration
information the server can give out to clients.
A diagram that is scratched out during the troubleshooting of a problem
or initial diagramming of a system.
scratch diagram
screen sharing
A method of remotely sharing a screen so that a technician can help fix
a problem.
Screen-­sharing software will share your screen with another
user; most often used to troubleshoot problems.
screen-­sharing software
screensaver An application originally created to prevent images from being burnt into a
display’s surface.
Secure Boot A system where the firmware can check digital signatures for each boot file it
uses to confirm that it is the approved version and has not been tampered with.
Secure Digital (SD)
A solid-­state, or flash, memory card format.
A protocol that runs on port 22 and sets up a secure Telnet session; is
used for remote logins and for remotely executing programs and transferring files.
Secure Shell (SSH)
Secure Sockets Layer (SSL) A security protocol used to encrypt transmissions over a TCP/
IP network. Has been made obsolete by the newer Transport Layer Security (TLS) protocol.
secured print After printing a job, the job is held until the user authenticates to the printer
and starts the print job.
A security database in the Windows operating system
that contains local users and groups for local authentication.
Security Account Manager (SAM)
security group
An Active Directory group used to control permissions for a group of users
or computers.
security guard
security update
Personnel responsible for the physical security of an building.
An update that patches a security vulnerability in the operating system.
self-­ground A way of discharging a potential buildup of electrical static discharge (ESD)
by touching and holding a grounded component.
Self-­Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) Troubleshooting
technology built into hard drives to provide self-­diagnosis of potential failures.
Docter862918_bgloss.indd 49
14-03-2022 18:11:27
Glossary
50
An email server authentication method that authenticates
using the sender’s IP address, used to help protect against spam emails. The SPF record is
added to the DNS server as a TXT record type.
Sender Policy Framework (SPF)
separation pads
Rubber patches that help keep the paper in place so that only one sheet
goes into a printer.
Serial Advanced Technology Attachment (SATA) The latest version of the standard that
specifies IDE (PATA) but that uses only a single serial pathway for communication instead of
multiple parallel pathways as PATA uses.
An older, slower port technology used on computers. Devices using a serial port
connect with a DB-­9 connector.
serial port
server An operating system that allows for the sharing of resources for workstation access.
Server Message Block (SMB) A Microsoft-­developed protocol used to provide shared
access to files, printers, and other network resources; runs on port 445.
service entrance surge protection
A surge protection that is located between the power
meter and breakers.
The identifier (name) of a wireless router or wireless access
point. The unique name of a wireless network that differentiates it from other wireless networks that are also in range of a wireless client.
service-­set identifier (SSID)
session A connection established between two computers on a network.
A copy of data the Volume Shadow Copy Service (VSS) created at a specific
time or interval, sometimes called a snapshot.
shadow copy
share permissions
Permissions that apply when files are accessed remotely through a Win-
dows share.
A pool of resources is purchased, and each participant in the cloud pays
for a fraction of those resources.
shared resources
A type of software that allows a grace period of usage before it must be
shareware
purchased.
shell
A software program that allows the user to manipulate the operating system.
shielded twisted pair (STP) Copper network cable that has two or four pairs of twisted
wires, shielded by a braided mesh and covered with an outside coating.
shutdown
A Linux command that starts the shutdown process on a Linux operating system.
Simple Mail Transfer Protocol (SMTP)
A TCP/IP protocol optimized for sending email. It
uses port 25.
Docter862918_bgloss.indd 50
14-03-2022 18:11:27
Glossary
51
A protocol that gathers and manages
network performance information. The current version is SNMPv3, and it runs on ports
161 and 162.
Simple Network Management Protocol (SNMP)
Single Connector Attachment (SCA) The connector in hardware RAID devices and bays
that contains both power and data connections instead of two separate connectors.
The new term for the original synchronous RAM
on the market, which shares a common clock signal with the computer’s system-­bus clock.
single data rate SDRAM (SDR SDRAM)
A computer term used to define one device or connection that, if it
fails, brings down the entire system.
single point of failure
single sign-­on (SSO) An authentication process that requires a user to authenticate once.
Credentials are then used for the authentication of all other systems.
single-­channel memory A RAM implementation scheme in which the memory controller
expects or allows standard memory modules to be installed one per bank.
single-­core A CPU that only has one pathway (core) to process data at a time. Older processors were all single-­core, and most today are multicore.
single-­factor authentication A system that requires one piece of information to log a user
in, such as a password, in addition to a username.
Fiber-­optic cable that can only transmit one signal at a time.
It’s the longest-­distance cable available for networking used today and can transmit up to
10 Gbps for up to 40 kilometers (25.85 miles), depending on the standard used.
single-­mode fiber (SMF)
single-­sided memory A memory module that has chips and pin functions that match the
specification for a single module.
sleep/suspend mode
A low power state similar to hibernation, but memory is not
written to disk.
Small Computer System Interface (SCSI)
Computer interface typically used for hard
drives or optical drives.
small office, home office (SOHO)
A term used to define extremely small networks pri-
marily used by a few people.
small office, home office (SOHO) network Network located in a home or in a small
business, usually with fewer than 10 computers.
A small–form factor memory
module based on DIMM principles and designed for the mobile computing sector.
small outline dual-­inline memory module (SODIMM)
smartcard
A security card that resembles a credit card with an integrated circuit embedded
in the card.
Docter862918_bgloss.indd 51
14-03-2022 18:11:27
52
Glossary
Smurf attack
An ICMP broadcast attack in which the sender spoofs the target’s IP address.
The use of deception to obtain information or manipulate people in an
attempt in obtain confidential information or access.
social engineering
software as a service (SaaS) A type of cloud service that handles the task of managing
software and its deployment, and includes the platform and infrastructure as well.
Cloud-­based service that manages logical network
connections in place of physical networking hardware such as switches and routers.
software-­defined networking (SDN)
solenoid In daisy-­wheel printers, the small electromechanical hammer that strikes the back
of the petal containing the character.
solid-­s tate drive (SSD) A drive that has no moving parts but uses flash memory to emulate
a conventional hard disk drive.
A conventional HDD manufactured with a substantial
amount of flash memory–like solid-­state storage aboard.
solid-­s tate hybrid drive (SSHD)
sound card An expansion card that allows the computer to play high-­quality music
through speakers or headphones.
source code The programming code that was used to write and compile the software.
Southbridge The functional part of the chipset that controls non–local-bus communica-
tion among components connected to the various I/O buses, including PCI, IDE, USB, RS-­
232, and parallel. See also Northbridge and chipset.
spam
Unsolicited commercial, illegal, or undesirable emails.
spam gateway
A device that helps detect and deter malicious spam email.
Spanning Tree Protocol (STP) Protocol used by managed switches to prevent network loops.
A phishing attempt in which the source of the email looks like a trusted
source so the victim is more susceptible to the attack.
spear phishing
The configuration pass in which the operating system is configured for a
networking model, user accounts, and computer name.
Specialize pass
splitter A hardware device that takes one input signal and sends it to several
output devices.
SSH A text-­based console for remote access that features encryption and authentication for
both the client and server.
stabilizer bar A small metal bar on a printer that holds the printer carriage as it crosses the page.
stakeholder A person who has a primary interest in or responsibility for a business unit in
an organization.
Docter862918_bgloss.indd 52
14-03-2022 18:11:27
Glossary
standard operating procedure (SOP)
53
A document detailing step-­by-­step instructions to
complete a routine activity.
The set of privileges for a nonadministrator account when logging
into an operating system.
standard privileges
standard user
A user who has standard or basic privileges on the operating system.
standby mode
A power state in which the screen is turned off to reduce power
consumption.
A physical network topology where all computers are attached to a central
connectivity point. Also called hub-­and-­spoke.
star topology
The component of the GUI that allows the user access to the installed programs on the operating system.
Start menu
Start of Authority (SOA)
DNS record type that signifies the authoritative DNS server
for a zone.
Manually configuring a host with an IP address and information, as
opposed to obtaining the address dynamically through a DHCP server.
static IP addressing
static-­charge eliminator strip The device in EP process printers that drains the static
charge from the paper after the toner has been transferred to the paper.
stepper motor
A very precise motor that can move in very small increments. Often used
in printers.
storage area network (SAN)
A network dedicated to storage that provide lossless block
level access to storage.
Storage Spaces
A Windows technology that can help protect data in the event of
disk failure.
straight tip (ST) One of the most common fiber-­optic connectors. Uses a twist-­and-­lock
attaching mechanism.
string A type of variable that can contain both alpha and numeric data. Strings do not con-
tain a value like integer and float variable types do.
stripe set with parity Another name for RAID 5. It provides fault tolerance and
performance increases, and requires a minimum of three hard drives.
su A Linux command that allows the current user to switch the user context to another
user account.
subnet mask A required part of any TCP/IP configuration, used to define which addresses
are local and which are on remote networks.
Docter862918_bgloss.indd 53
14-03-2022 18:11:27
54
Glossary
subscriber connector (SC)
A fiber-­optic cable connector that snaps and locks into place.
subscriber identity module (SIM) OS Operating system on a mobile device that manages
data transfers between the device and the device’s memory (SIM) card.
sudo A Linux command that allows a nonprivileged account to run a privileged command.
super user A user that has elevated privileges in the operating system, equivalent to
administrative credentials on Windows.
High-­level legacy computer
management system that is used to control manufacturing machines and processes; manage large-­scale infrastructure settings such as power grids, oil and gas pipelines, and water
treatment facilities; and run components in buildings such as heating and air conditioning.
supervisory control and data acquisition (SCADA)
An electrical device that will absorb a temporary power spike, known as
surge suppressor
a surge in electricity.
SuSE A Linux distribution that uses the RPM-­based package management system.
swipe lock
A type of lock screen that allows you to unlock your device and that provides
no security.
switch A Layer 2 device similar to a hub in its port count but more advanced, with the
ability to filter traffic based on the destination MAC address of each frame.
swollen battery
One potential sign of a failed battery, it’s when the battery physically
begins to expand.
synchronization The mirroring of contents between a computer and a mobile device.
Commonly synchronized data includes contacts, apps, email, photos, music, and videos.
Synchronous DRAM (SDRAM) The original synchronous RAM on the market, which
shares a common clock signal with the computer’s system-­bus clock.
synthetic backup
A backup created from the last full backup and a series of daily backups.
syslog Server (and system) used to gather and track messages from client devices on
a network.
system board
Another term for a motherboard, or the main circuit board in a computer.
System Center Configuration Manager (SCCM) A Microsoft software product that is
used to automate installations of software packages and provide reporting.
System File Checker (SFC) A service in Microsoft operating systems that monitors and
maintains file integrity of critical system files.
System Protection The primary system in the Windows operating system responsible for
creating system restore points.
Docter862918_bgloss.indd 54
14-03-2022 18:11:27
Glossary
55
The name used to describe the component of Active Directory in contrast to
backup and recovery.
System State
A legacy Microsoft software product that provides
similar functionality to Microsoft System Center Configuration Manager (SCCM).
Systems Management Server (SMS)
Twisted pair cabling specifications that define the order of pins on a cable.
The T568A order is white/green, green, white/orange, blue, white/blue, orange, white/
brown, brown. T568B is white/orange, orange, white/green, blue, white/blue, green, white/
brown, brown.
T568A/T568B
tailgating
The act of following someone through a secure access area, tailgating on their
credentials.
taskbar The component of the GUI that contains programs that are executing as well as
shortcut icons, Start menu, and Notification area.
TCP printing Connecting to a shared printer using the TCP protocol. By default uses the
RAW protocol format and port 9100.
telemetry The process of sending information to Microsoft on the usage, health of the
operating system, and quasi-­personal data for the cloud services.
Telnet A dated text-­based console for remote access that allows the client and server to
communicate over an unencrypted session.
Temporal Key Integrity Protocol (TKIP) A protocol that protects the initialization vector
with an RC4 encryption cipher, used in conjunction with WPA.
terminal An application that allows shell access via a network or physical connection. It is
also the name of a macOS application that performs similar functionality.
test development
A virtual environment created on a virtual machine used to test soft-
ware applications.
tethering Connecting a non-­cellular device to a cellular-­enabled device for the purpose of
getting on the Internet through the cellular connection.
text (TXT) A DNS record type that is followed by a text field. Commonly used in
conjunction with DKIM, SPF, and DMARC records to help combat email spam.
thermal pad A small heat-­conducting piece of material used to connect a CPU to a heat
sink or fan. Used as an alternative to thermal paste.
Heat-sensitive paper that comes on a roll and is used in thermal printers.
Areas of the paper exposed to heat turn color to produce an image.
thermal paper
A compound used to bridge the thermal gap between the surface of a chip’s
packaging and the mating surface of a heat sink.
thermal paste
Docter862918_bgloss.indd 55
14-03-2022 18:11:27
56
Glossary
thermal printer A printer that uses heat and special heat-­sensitive paper to produce
images; common among fax machines.
thermal runaway A condition in which lithium-­ion batteries can overheat, causing the
material to fuse internally, and this perpetuates heat.
An old cellular networking technology that was popular in the
1990s and early 2000s; replaced by 4G.
third generation (3G)
third-­party drivers Drivers that are supplied by a manufacturer and not included with the
Windows operating system.
threat A potential danger to the network or the assets of the organization.
threat agent A malicious individual who is carrying out or planning to carry out an attack
that threatens network security.
Thunderbolt A high-­performance digital interface created by Intel and Apple and based on
the DisplayPort connector that provides external connectivity at up to 40 Gbps over a USB-­C
connection.
time drift The phenomenon of the operating system losing or gaining time that creates
problems when the time is too far off.
Time Machine
A macOS backup utility that allows for local backups of user files.
toner A carbon substance mixed with polyester resins and iron oxide particles. During the
EP imaging process, toner is first attracted to areas that have been exposed to the laser in
laser printers and is later deposited and melted onto the print medium.
toner probe A pair of devices used to determine which port on the patch panel goes with
each wall outlet.
top A command on Linux that interactively displays all the various processes running on
the operating system.
topology A way of laying out a network. Can describe either the logical or physical layout.
Torx screwdriver
A screwdriver with a splined gripping surface.
Input device typically used with touchscreen devices, specifically laptops and
smaller mobile devices. Also called a stylus.
touch pen
touchpad Flat, rectangular device built into the palm rest of a laptop keyboard, used as a
pointing device to control the mouse cursor on the screen.
touchscreen A computer screen that is sensitive to touch.
traceroute A command used to view the path a packet will take to a destination computer
(tracert is the Windows equivalent).
Docter862918_bgloss.indd 56
14-03-2022 18:11:27
Glossary
57
trackball An older device that replaced a mouse on laptops. It was an exposed ball that
functioned much like an inverted mouse.
A paper feed mechanism used in impact printers, it uses paper that has holes
along the edge.
tractor feed
transfer corona assembly The part of an EP imaging process printer that is responsible
for transferring the developed image from the EP drum to the paper.
The fifth step in the EP imaging process, when the developed toner image
on the EP drum is transferred to the print medium using the transfer corona.
transferring step
transformer A device that takes one type of electrical current and turns it into a different
type of electrical current.
transient voltage surge suppressor (TVSS)
A device that removes electrical surges from
an electrical service.
A core protocol in the TCP/IP protocol suite that
establishes connections and guarantees packet delivery.
Transmission Control Protocol (TCP)
A set of computer-­
to-­computer communications protocols that encompasses media access, packet transport,
session communications, file transfer, email, and terminal emulation. TCP/IP is supported by
a very large number of hardware and software vendors and is available on many different
computers, from PCs to mainframes.
Transmission Control Protocol/Internet Protocol (TCP/IP) suite
Transport Layer Security (TLS) A security protocol used to encrypt transmissions over a
TCP/IP network. Commonly used with HTTPS over port 443.
Any physical hazard that might cause an individual to trip and fall, such as
loose wire on a floor.
trip hazard
A memory subsystem that allows the insertion of up to three
banks of memory to communicate in unison with the memory controller.
triple-­channel memory
Protocol that uses port 69. Used to transfer files (but
not securely) and to transmit configuration information to and from network devices.
Trivial File Transfer Protocol (TFTP)
Trusted Installer A system service that is allowed to modify critical system files on the
Windows operating system.
A dedicated security co-­processor within a computer that
the UEFI uses to boot the system securely after authenticating the boot device.
Trusted Platform Module (TPM)
TTY A Linux operating system device that allows for teletype-­style terminal access to
the shell.
A type of LCD screen. TN screens are the oldest LCD screen type,
but they are fast and inexpensive.
twisted nematic (TN)
Docter862918_bgloss.indd 57
14-03-2022 18:11:28
58
Glossary
Helps increase security for mobile devices by requiring an additional piece of information. A common implementation is to require a PIN from a security
token, which changes every 30 seconds.
two-­factor authentication
Type 1 hypervisor Also known as a bare metal hypervisor, it is a software program that
acts as an operating system, and also provides the ability to perform virtualization of other
operating systems using the same computer.
Type 2 hypervisor A software program that sits on top of an existing operating system and
provides the ability to host multiple virtual operating systems on the same computer at the
same time.
Ubuntu A popular Linux distribution that was originally formed from the Debian
distribution.
ultrabook
An extremely thin lightweight notebook computer.
unicast In IPv6, an address that identifies a single node on the network.
unicode An expanded set of characters used for internationalization of text to accommodate different languages.
The extensible successor to the BIOS that
features support for a vast array of systems and platforms by allowing access to system
resources to access additional software modules.
Unified Extensible Firmware Interface (UEFI)
Typically implemented as a hardware device, UTM
combines firewall, IPS, and antimalware protection into one central management point.
unified threat management (UTM)
A UPS is designed to protect everything that’s
plugged into it from power surges, power sags, and even power outages. The device contains
one or more batteries and fuses. Energy is stored in the batteries, and if the power fails, the
batteries can power the computer for a period of time so the administrator can then safely
power it down.
uninterruptible power supply (UPS)
Universal Naming Convention (UNC) The naming convention used with Windows
operating systems that defines a specific file share on a specific server.
Universal Plug and Play (UPnP) Technology designed to allow wireless-­aware devices to
automatically connect to a wireless network, declare themselves to other devices, and
discover other devices.
Universal Serial Bus (USB) A high-­speed, hot-­pluggable serial interface used for connecting
external peripherals to a PC. USB is available in six main versions at speeds up to 40 Gbps.
Universal Time Code (UTC)
The primary time standard used as a worldwide reference for
the offsets of all time zones.
Universal Windows Platform (UWP) A programming platform that allows for the code to
be recompiled for several different hardware platforms.
Docter862918_bgloss.indd 58
14-03-2022 18:11:28
Glossary
59
Unlicensed National Information Infrastructure (U-­NII) Defines a portion of the radio
frequency (RF) spectrum that has been allocated to wireless devices by the FCC.
A Layer 2 device similar to a hub in its port count but more advanced,
with the ability to filter traffic based on the destination MAC address of each frame. Does
not possess any additional network intelligence, unlike a managed switch.
unmanaged switch
unshielded twisted pair (UTP)
Networking cable that has four twisted pairs of copper
wire and a flexible outer coating.
The act of plugging a PCIe adapter into a slot that supports more lanes than
the adapter supports.
up-­plugging
USB controller The hardware usually found on the motherboard of the computer that is
responsible for controlling power and data paths to the USB device.
Newest connector type for USB devices. It’s an oval-­shaped connector versus older,
rectangular USB Type-­A connectors.
USB-­C
User Account Control (UAC) A method of controlling the use of administrator credentials
by a user who has been granted administrative control of the operating system, by prompting
to continue with the administrative function.
User Datagram Protocol (UDP) Part of the TCP/IP suite that performs a similar function
to TCP, with less overhead and more speed but with lower reliability. It is a connectionless
protocol, meaning that it does not guarantee packet delivery.
User ID (UID)
The identification mechanism for users in Linux operating systems.
user profile A group of settings as well as personal documents specific to each user logged
into the operating system.
variable type A characterization of a variable based on the type of data that it will contain,
which also defines the memory to be allocated.
A word used in a program or script that allows for the temporary storage of
information.
variable
VBScript A popular Microsoft scripting language that is based on the Component Object
Model (COM) and Visual Basic.
version
The revision of code for a software product.
A type of LCD screen. VA screens have great contrast ratios but
are otherwise seen as a middle-­performance type between IPS and TN.
vertical alignment (VA)
vi A Linux text-based editor that is widely supported on all Linux systems.
An expansion card often used to save a video stream to the computer
for later manipulation or sharing.
video capture card
Docter862918_bgloss.indd 59
14-03-2022 18:11:28
60
Glossary
An expansion card that allows the computer to present information on some
kind of display, typically a monitor or a projector.
video card
Video Graphics Array (VGA) connector
DB-­15 video connector, typically blue, that
provides analog video.
video surveillance
The process of surveillance using video cameras and video recorders.
The hosting of desktop environments on a central
server. It is a form of desktop virtualization.
virtual desktop infrastructure (VDI)
Network configured on a managed switch and used to
segment broadcast traffic and potentially increase security.
virtual local area network (VLAN)
A virtualized version of a computer that breaks the barrier between
a one-­to-­one hardware and operating system relationship.
virtual machine (VM)
Memory that is provided to the operating system that is in the form of a
file on a disk, to allow more memory for applications.
virtual memory
Virtual Network Computing (VNC) A graphical desktop sharing utility that can be
installed on Linux, Windows, and macOS.
A NIC configured within a virtual machine. It does not need to be (but can be)
virtually connected to a physical NIC.
virtual NIC
virtual private network (VPN) A virtual network connection between two IP addresses
that provides encryption and allows for privacy over the network. Secure point-­to-­point connection using tunneling over a public Internet connection.
virtualization The ability to run multiple operating systems or multiple instances of one
operating system on one physical computer simultaneously. Requires the use of a hypervisor.
Voice over Internet Protocol (VoIP)
An IP-­based telephony standard used to place calls
over a network or the Internet.
Volume Snapshot Service (VSS) A Microsoft service that provides an instant snapshot of
a filesystem to provide recovery points outside the backup period.
vulnerability A weakness of security that can be exploited by an attacker to provide unau-
thorized access.
web server A computer designed to host web pages and provide access to clients.
webcam A video camera that connects to a computer so that the video it captures can be
sent across the Internet in real time.
Docter862918_bgloss.indd 60
14-03-2022 18:11:28
Glossary
61
whaling A phishing attack that targets a wealthy, powerful, or key head figure of an
organization.
whitelist A firewall security strategy that allows access to nobody (so its default is deny),
except those users or computers on the whitelist. Also called an allow list.
whole numbers
A numeric value that has no precision of a decimal point or is a fraction.
wide area network (WAN) A network that expands a LAN to include networks outside of
the local environment and also to distribute resources across distances.
Wi-­Fi
Short for wireless fidelity, it is a collection of IEEE 802.11 standards.
Wi-­Fi analyzer A hardware device or software application that is used to detect or analyze
wireless network signals.
A wireless protection protocol that utilizes 256-­bit keys
and operates in preshared key (PSK) mode and enterprise mode.
Wi-­Fi Protected Access (WPA)
Wi-­Fi Protected Access 2 (WPA2) A wireless protection protocol, also known as 802.11i,
that utilizes the Advanced Encryption Standard (AES) encryption protocol and Counter
Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP). It operates in two modes: preshared key (PSK) mode and enterprise mode.
Wi-­Fi Protected Access 3 (WPA3) A wireless protection protocol that is the successor to
WPA2 and has become part of the mandatory Wi-­Fi 6 Alliance certification process as of
July 2020. WPA3 offers higher encryption standards and replaces PSK with a Simultaneous
Authentication of Equals (SAE) exchange process.
The core of the Windows operating system, responsible for low-­level
hardware access and the loading of higher-level functions, such as the GUI.
Windows kernel
A runtime environment for VBScript scripts to allow for
the scripts to run within the operating system.
Windows Scripting Host (WSH)
Windows Update The Microsoft software update process for the Windows operating
system and other related Microsoft software packages.
Wired Equivalent Privacy (WEP) The original standard of wireless encryption that provides 64-­and 128-­bit encryption of data and operates only in preshared key (PSK) mode.
wireless access point (WAP) A central hub that looks nearly identical to wireless routers
and provides central connectivity like a wireless router, but doesn’t have nearly as many
features. The main one most people are concerned with is Internet connection sharing.
wireless Internet service provider (WISP) In very broad terms, a WISP is an ISP
that grants access using a wireless technology. Specifically, though, the industry uses the
term to refer to providers that offer fixed point-­to-­point, relatively short-­distance broadband Internet.
Docter862918_bgloss.indd 61
14-03-2022 18:11:28
Glossary
62
wireless local area network (WLAN)
An internal wireless network that is an extension of
the local area network (LAN).
wireless mesh network (WMN) A network, managed by a cloud-­based network
controller, that uses wireless technology configured in a redundant mesh network.
wireless personal area network (WPAN)
Another name for a Bluetooth network.
wireless router A central wireless access point that provides connectivity as well as
routing features.
workgroup A loosely defined network that provides decentralized authentication for the
access of files and printers.
workstation An operating system that allows users to access information and applications
on servers.
The term used to describe today’s 64-bit processor instruction set, originally created by AMD.
x64
x86
The term used to describe the Intel 32-bit processor instruction set.
Yellowdog Updater, Modified (YUM) A package management tool that was developed on
the Red Hat Linux operating system, it provides functionality similar to that of APT.
zero insertion force (ZIF) A CPU socket into which the processor can be inserted with little
to no force.
zero-­day An exploit or attack of which the developer has had no prior knowledge,
­therefore no patch exists.
zombie A host that has malware installed and is controlled by a command and
control server in a botnet.
zone file The configuration file on a DNS server that contains the records of the computers
that the server is responsible for resolving the names of (to IP addresses).
A short-­range wireless mesh technology designed to support Internet of Things
(IoT) devices.
Z-­Wave
Docter862918_bgloss.indd 62
14-03-2022 18:11:28
Download