IT Fundamentals FC0-U61 Part 3

  1. Binary
    Computers process code in binary because the transistors in its CPU and memory components also have two states (off and on).
  2. Bluetooth
    Wireless radio-based technology, working at up to 10m (30 feet) at up to 1 Mbps
  3. Blu-ray
    Latest generation of optical drive technology, with disc capacity of 25 GB per layer.
  4. Bits in a byte
    8 bits
  5. Bytes in a kilobyte
    1024 bytes
  6. Boolean
    Data type supporting 1–bit storage, representing TRUE and FALSE.
  7. Boot Partition
    In Microsoft terminology, the partition that contains the operating system.
  8. Web Browser
    A software application that allows users view and retrieve the contents of the World Wide Web.
  9. Bus
    Buses are the connections between components on the motherboard and peripheral devices attached to the computer.
  10. BCP
    A business continuity plan. Designed to ensure that critical business functions demonstrate high availability and fault tolerance.
  11. CAD
    Computer Aided Design. Software that makes technical drawings and schematics easier to produce and revise.
  12. Captive Portal
    A web page or website to which a client is redirected before being granted full network access.
  13. CD-ROM
    Compact Disc—Read Only Memory). An optical storage technology. The discs can normally hold 700 MB of data.
  14. Optical Drive
    A type of computer hardware that reads and writes data from and to optical media, such as CDs, DVDs, and Blu-ray discs.
  15. SSL Certificate
    Secure Sockets Layer Certificate, also known as Web Page Certificate. A public key that has been certified by some agency, validating that the owner of the key is really who he or she says he or she is and ultimately, secures the connection by using encryption.
  16. Char
    Data type supporting storage of a single character.
  17. Chipset
    The chipset provides communications between different components by implementing various controllers (for memory, graphics, I/O, and so on).
  18. Chrome OS
    Google's cloud-based OS derived from Linux, via an open source OS called Chromium.
  19. CIA Triad
    Confidentiality, Integrity, and Availability—the goals for providing a secure information management system.
  20. Cloud Computing
    A model of computing in which users can access and use shared computing resources, such as servers, storage, and applications, over the internet.
Author
Studymode189
ID
360372
Card Set
IT Fundamentals FC0-U61 Part 3
Description
Updated