IT Fundamentals FC0-U61 Part 1

  1. 32-bit versus 64-bit
    In a 32-bit system, the memory address space is limited to 4 GB.
  2. Memory Address Space
    Is the set of addresses that the CPU can use to access RAM.
  3. 8.3 Format and 8.3 Filenames
    The DOS file naming standard. Filename no longer than 8 characters and extension no more than 3 characters.
  4. AAA
    Authentication, Authorization, and Accounting—the principal stages of security control
  5. Accelerometer/Gyroscope
    Components used in mobile devices to detect motion (accelerometer) and rotation (gyroscope).
  6. Access Control
    Creating one or more barriers around a resource such that only authenticated users can gain access.
  7. ACL
    Access Control List. The permissions attached to or configured on a network resource, such as folder, file, or firewall.
  8. Active Partition
    The primary partition marked as active; there is only one per system.
  9. Adapter Card
    A circuit board providing additional functionality to the computer system (video, sound, networking, modem, and so on).
  10. Addressing (Network)
    In order to communicate on a network, each host must have an address. Different protocols use different methods of addressing.
  11. Adware
    Software that displays advertisements on a computer or mobile device, typically unwanted.
  12. Biometric
    Physical identifying features stored as digital data can be used to authenticate a user.
  13. Algorithm
    A set of steps or instructions for solving a problem or achieving a desired result.
  14. AP
    Access Point. Device that provides connectivity between wireless devices and a cabled network.
  15. ARM
    Advanced RISC Machines. Designer of CPU and chipset architectures widely used in mobile devices.
  16. ARP
    Address Resolution Protocol. Performs the task of resolving an IP address to a hardware address.
  17. Array
    Identifier for a group of variables of the same type.
  18. ASCII
    Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters.
  19. Assembly Language
    Machine code represented in human-readable text.
  20. Attack Surface
    The degree of exposure a network or piece of software has to attack.
Author
Studymode189
ID
360343
Card Set
IT Fundamentals FC0-U61 Part 1
Description
Updated