-
32-bit versus 64-bit
In a 32-bit system, the memory address space is limited to 4 GB.
-
Memory Address Space
Is the set of addresses that the CPU can use to access RAM.
-
8.3 Format and 8.3 Filenames
The DOS file naming standard. Filename no longer than 8 characters and extension no more than 3 characters.
-
AAA
Authentication, Authorization, and Accounting—the principal stages of security control
-
Accelerometer/Gyroscope
Components used in mobile devices to detect motion (accelerometer) and rotation (gyroscope).
-
Access Control
Creating one or more barriers around a resource such that only authenticated users can gain access.
-
ACL
Access Control List. The permissions attached to or configured on a network resource, such as folder, file, or firewall.
-
Active Partition
The primary partition marked as active; there is only one per system.
-
Adapter Card
A circuit board providing additional functionality to the computer system (video, sound, networking, modem, and so on).
-
Addressing (Network)
In order to communicate on a network, each host must have an address. Different protocols use different methods of addressing.
-
Adware
Software that displays advertisements on a computer or mobile device, typically unwanted.
-
Biometric
Physical identifying features stored as digital data can be used to authenticate a user.
-
Algorithm
A set of steps or instructions for solving a problem or achieving a desired result.
-
AP
Access Point. Device that provides connectivity between wireless devices and a cabled network.
-
ARM
Advanced RISC Machines. Designer of CPU and chipset architectures widely used in mobile devices.
-
ARP
Address Resolution Protocol. Performs the task of resolving an IP address to a hardware address.
-
Array
Identifier for a group of variables of the same type.
-
ASCII
Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters.
-
Assembly Language
Machine code represented in human-readable text.
-
Attack Surface
The degree of exposure a network or piece of software has to attack.
|
|