CompTIA ITF+ Review

Authentication

A type of identification that requires the user to provide something that they know, something that they have, or something that they are.

HDMI (High Definition Multimedia Interface)

is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data

LAN (Local Area Network)

a geographic network that covers a relatively small geographic area such as a building or a office space - no more than a mile distance between computers

Paid

Paid

Authorization

The process of giving someone permission to do or have something. Ex: Authorization to certain rooms

WAN (Wide Area Network)

A network that spans a long distance and connects two or more LANs.

VGA (Video Graphics Adapter)

a graphics standard for video display controller first introduced with the IBM. These Adapters do not deliver audio only video.

pseudocode

a high-level description of the actions of a program or algorithm, using a mixture of English and informal programming language syntax

subroutine

A small program inside a large one. Used when the same series of commands are repeated multiple times.

Analog Signal

continuous electrical signals or waves sent by a computer to display information on a monitor

Accountability

The process of monitoring and recording what someone has accessed or modified in the system

DVI (Digital Visual Interface)

Port that enables digital signals to transmit directly to the LCD monitor

Multi-factor Authentication

Authentication that requires two or more evidences of authentication, usually of different types.

Digital signal

A system of discrete states: high or low, on or off, 1 or 0 sent by a computer to display information on a monitor

SATA (Serial AT Attachment)

A popular bus used to connect hard drives and other mass storage devices to the computer.

compiled language

A programming language in which the program code must be submitted to a compiler that manipulates the code, translating it into a more basic language that machines can understand.

Single Sign-on

A method of authenticating with one system to gain access to other related systems.

twisted-pair cable

Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).

USB Universal Serial Port

An external bus standard that supports data transfer.

interpreted language

A programming language in which programs are "indirectly" executed by an interpreter program.

fiber-optic cable

A cable that transmits data at close to the speed of light along glass or plastic fibers. This type of wiring is expensive, but is immune to light, sound, and electrical interference.

query language

A specially designed computer language used to manipulate data in or extract data from a database.

fire wire port

port that can connect multiple types of devices that require faster data transmission speeds

assembly language

A programming language that represents machine code in human-readable text. Typically specific to a particular hardware architecture.

driver

A small program that instructs the operating system on how to operate a specific piece hardware.

client-server LAN

A computer (or more than one computer) called a server manages the network resources for all of the client devices on the network

Device Password

A security concern regarding network devices and other devices, such smartphones, that give the option of using the device without a password.

USB Type A

Printer, Scanner, Camera, Mouse, Keyboard, External CD-Rom, MP3 player, PDA

peer-to-peer LAN

There is no server, and people on the network each determine what files they will share with others on the network.

markup language

A means of marking data in a document so that it is accessible to a program language.

variable

Contains a value that can change during the execution of a program.

USB Type-C Port

a new port used to support a smaller, reversible connector

Firewall

A device that controls the flow of network traffic to protect systems from unauthorized network connections.

Network Physical media

the cabling and connectors used to interconnect the network devices.

Ethernet Cable (RJ-45)

cable that connects computers to the LAN that allows the computers to communicate with each other and other peripherals.

wireless communication

Communications media that do not use cables but instead rely on radio waves to communicate.

constants

Contains a value that cannot be changed from within a program.

Anti-Malware Software

Software that helps protect against malicious software infections.

Anti-Spam Software

Software that helps remove unwanted, unsolicited email.

Intranets

a type of WAN in which private company networks allow employees to easily access, share, and publish information using internet software

Telephone Connector (RJ-11)

A fax modem uses twisted pair cabling with an RJ-11 connector at the fax end and a connector suitable for use with the country's phone system at the other end. Once used by dial up modems.

NFC (Near Field Communication)

Mobile technology that enables short-range ( around 2-inches) wireless communication between mobile devices. Now used for mobile payment technology such as Apple Pay and Google Wallet

Extranets

a type of WAN in which private intranets extended to authorized users outside the organization usually through a VPN

Ecommerce

The buying and selling of products or services electronically, typically through the Internet.

Public/Private Classification

An attribute used to classify information based on the risk of public disclosure.

Bluetooth

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices

loop

Used to repeat code in your program.

procedures

a segment of code that can be reused

Display Port

an alternative to DVI that also supports HDMI

Government/Military Classification

A scheme for classifying information based on government and military requirements.

function

a segment of code that can be reused, and return a value to whatever called it.

Data Destruction Policy

Directions for disposing and even destroying data when it's no longer needed or when a storage device needs to be replaced.

attributes

Values and data types that define an object in Object-Oriented Programming

Data Redundancy

A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.

modem

A device converts analog signals to digital signals, typically seen in areas that use telephone lines

Network Redundancy

A method of increasing fault tolerance by providing multiple network paths between hosts.

Thunderbolt port

A high speed input/output port; Thunderbolt 2 provides two channels of 20 Gbps capacity on one port.

methods

What you can do to an object in Object-Oriented Programming

Router

A device that transfers data from one network to another in an intelligent way

Power Redundancy

A method of increasing fault tolerance by providing power backups and power failover.

HID (Human Interface Device)

Input devices (peripherals) that enable the user to enter data and select commands

properties

Alternative ways of accessing a field publicly in Object-Oriented Programming.

batch file

A text file containing a series of OS commands.

RFID (Radio Frequency Identification)

uses radio signals to communicate with a tag placed in or attached to an object

Network Interface Cards

Provides a place to plug the network cable into the computer and it creates and sends the signal from one network component to another.

Network Attached Storage

A device that contains one or more hard drives that users can access over the network.

Coaxial cable (coax)

Cable consisting of a hollow outer cylindrical conductor that surrounds a single inner wire conductors

Ad Hoc Backup

Unscheduled backups performed periodically.

Windows PowerShell

Command-line tool included with Windows. Offers a number of powerful scripting tools for automating changes both on local machines and over networks.

VBScript

an object-oriented scripting language that Microsoft derived from the Visual Basic programming language

PS/2 port

a round 6-pin port used by a keyboard or mouse.

Regular Backup

Regularly scheduled backups.

wired communication

Use of wires and cables to connect and communicate for internet access

Client Device/Host/Node

A device (Tablet, Phone, Desktop, Laptop) that is connected to the network

Motherboard

A printed circuit board that connects all PC components

single-platform software

written to run under a particular operating system

System Backup

A backup of the system software, including operating system files.

Servers

Computers or devices that provide access to various network services, such as printing, data storage, and communications.

cross-platform software

written to run under multiple operating systems or platforms.

Firmware

Software that is permanently stored into hardware to give instructions

Database Backup

A backup of data stored in a database.

Local Installation

The traditional method for delivering applications by installing them on individual desktop computer systems.

Basic Input/Output System/BIOS

Software built into the ROM that is the first instructions the computer processes to test devices

Internet Service Provider (ISP)

a company that provides access to the internet for a monthly fee

Local Backup

Backups that are stored in the same building or even the same room as the computer systems they are taken from.

database

a collection of organized data that allows access, retrieval, and use of data

Off-site Backup

Backups that are stored at a location far enough from a possible natural disaster while being close enough to recover the data and systems within a reasonable amount of time.

Copper Cable

Low cost method of providing connections in a network. Signal strength is lost with distance and can only work over short distances. Suffers from electrical interference.

32-bit CPU

Slightly outdated form of processing with approximately 4 GB of RAM available

database

a collection of organized data that allows access, retrieval, and use of data

64-bit CPU

Modern CPU that allows for much more RAM to be used than a 32-bit

Disaster Recovery

An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.

cellular network

A wireless network which uses cell towers to transfer information.

Business Continuity

The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.

Satellite Network

A Wireless network which uses satellites to communicate and transfer information

Intel CPU Brands

Core, Pentium, Celeron, Atom, Xeon

Network Hosting

A method of delivering applications by installing them in the local network.

tables

An arrangement of data made up of horizontal rows and vertical columns.

Systems Administrator

a person responsible for securing networks and responding to intrusions as well as tickets from users

Ryzen & Epyc

The AMD CPU brands designed for desktop and workstation computers include:

TCP/IP Model Layers

1. Application
2. Transport
3. Internet
4. Network Access

tables

An arrangement of data made up of horizontal rows and vertical columns.

Computer Forensics Expert

A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.

Bus

The paths, or lines, on the motherboard on which data, instructions, and electrical power move from component to component.

Application Layer

The first layer of the TCP/IP model. Application layer protocols enable software programs to negotiate formatting, procedural, security, synchronization, and other requirements with the network.

Security Analyst

A person who is in charge of designing and implementing security methods to protect an organization's computer systems and networks.

Transport Layer

Second layer in the TCP/IP stack. Sets-up a connection between the two hosts, agrees the protocol and packet size. These two Protocols are TCP and UDP

Types of Bus

PCI (32 Bit), PCI Express or PCIe 1.0, PCIe x16 (4 GBpsGraphics adapters use x16 lanes)

Cloud Hosting

A method of delivering applications by hosting them in the cloud.

Heatsinks

passive cooling systems that looks like metal fins to dissipate heat from components like chips

Internet Layer

responsible for addressing, packaging, and routing messages on the Internet

record

A collection of fields that appear as a row in a database or table.

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

Phishing

E-mail or pop-up message; usually looks like it's from a legitimate financial institution and TRICKS you into provide your personal information in order to fix a problem with your account

Data Link/Network Access Layer

handles all the physical details of interfacing with the cable, including the network interface card and a device drivers.

Thermal paste

A compound used to bridge the thermal gap between the surface of a chips packaging and the mating surface of a heatsink.

record

A collection of fields that appear as a row in a database or table.

Impersonation/ Identity Theft

Someone who is pretending to be another person. They may use your name and other personal information.

TCP (Transmission Control Protocol)

Provides reliable in the Transport-layer protocol, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

bootstrapping or booting a computer

standard means for the CPU to start processing instructions and initialize the other components

field

a single characteristic of data that appears in a table as a column

Shredding

A procedure to destroy documents to protect your financial information and PII

Software as a Service (SaaS)

A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.

UDP (User Datagram Protocol)

A Transport-layer protocol that is one of the protocols in the Internet protocol suite, and excludes error checking and quality assurance, this protocol is faster than TCP.

field

a single characteristic of data that appears in a table as a column

UEFI (Unified Extensible Firmware Interface)

provides support for 64-bit CPU operation at boot, a full GUI and mouse operation at boot, and better boot security. A computer with UEFI may also support booting in a legacy BIOS mode.

ARP

Address Resolution Protocol. Resolves IP addresses to MAC addresses. ARP Tables include a map of the different devices with a MAC address

Personally Identifiable Information (PII)

the name, postal address, or any other information that allows tracking down the specific person who owns a device

dumpster diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

Internet Protocol (IP)

The network protocol that deals with the routing of packets through interconnected networks to the final destination. Every hosts on a network is given an IP Address to identify it on the network.

Optical Drive (CD/DVD)

A storage device that uses light instead of magnetism to store information. This include CD-ROM, DVD, and Blu-ray devices.

One Tier

An application architecture model where programs run as standalone applications on a single computer.

Packet Structure

...

shoulder surfing

Watching an authorized user enter a security code or password on a keypad/keyboard.

External hard Drive

An HDD that can be connected as a peripheral to a computer.

flat file

Simple database program whose records have no relationship to one another

Network Interface Card (NIC)

A component, sometimes built into and sometimes plugged into the motherboard, that provides wired or wireless (or both) network connectivity.

IP address

A number assigned to any node that is connected to the Internet. They are formatted to take 4 different spaces Ex:
192.168.12.2

Security Training

teaching computer users not to click on communications or software that they are not expecting to receive

flat file

Simple database program whose records have no relationship to one another

Security Policies

Rules set in place by a company to ensure the security of a network. These may include how often a password must be changed or how many characters a password should be, require employees to go through security training, or have users log-out of there comp

IPv4

The Internet Protocol version 4 is the dominant protocol for routing traffic on the Internet, specifying "to" and "from" addresses using a 32-bit binary set

Flash Storage

A compact, portable storage device that uses special memory chips to store data. Flash storage devices can be removed from a power source and its contents will remain intact.

Two Tier

An application architecture model with two separate tiers (a client and a server) where applications store and retrieve data from a central repository.

Power Supply

The component of a computer that supplies the right amount and form of electricity to the motherboard and other computer components.

IPv6

A new protocol developed to replace IPv4, addressing the issue of IP address exhaustion using a 128-bit binary set

comma-seperated-values

separates each piece of data with a comma

Fault Tolerance

the ability for a system to respond to unexpected failures or system crashes by using a backup system immediately and automatically takes over with no loss of service

Outage Cost

Financial damage and reputational damage, causing the company to lose money and customers.

MAC address (Media Access Control)

A unique identifier similar to a serial number assigned to equipment or devices at the time of manufacture. On a network, an IP address is linked to a MAC address

Plug and Play

technology that allows a hardware component to be attached to a computer so that it is automatically configured by the operating system, without user intervention

comma-seperated-values (CSV)

file uses commas to identify the end of a column and a line feed for each row

Device Hardening

Security tasks used to reduce the scope
of the device's vulnerability and attack surface.

Subnetting

The process of logically dividing a network
into smaller subnetworks or subnets.

Device Manager

Primary Windows tool for managing hardware.

relational database

A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables

Antivirus Software

Software used to detect and eliminate computer viruses and other types of malware.

relational database

A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables

Web Interface

The interaction between a user and software running on a web browser. The page is downloaded and rendered.

Network ID

The portion of an IP address common to all nodes on the same network or subnet.
Network ID: 172.30.0.0
Host 1's Address: 172.30.15.12
Host 2's Address: 172.30.15.24

Three Tier

An application architecture model with three separate tiers where an application presents the user interface on a client workstation, data is processed on an application server, and information is retrieved from a database management system on a database

LCD (liquid crystal display)

Type of display commonly used on portable computers. LCDs have also replaced CRTs as the display of choice for desktop computer users.

DNS (Domain Name System)

The Internet's system for converting alphabetic names into numeric IP addresses.

Malware

software designed to infiltrate or damage a computer system without the user's informed consent.
-Spyware
-Adware
-Trojan Horse
-Ransomware

Patch Management

The practice of monitoring for, evaluating,
testing, and installing software patches and updates.

FQDN (Fully Qualified Domain Name)

A host name plus domain name that uniquely identifies a computer or location on a network.

CRT Monitor (Cathode Ray Tube)

desktop monitor that contains a cathode-ray tube

n-Tier

An application architecture model where application developers add as many tiers as they need to create the most efficient services and processes on a network.

RDBMS (Relational Database Management System)

A system that stores information, which is linked by a unique identifiers in tables.

laser printer

uses a toner cartridge filled with fine powder and a heated fuser

URL (Uniform Resource Locator)

A location or address identifying where documents can be found on the Internet; a Web address or a 'link'

OEM (Original Equipment Manufacturer)

The original manufacturer of a hardware component or sub-component.

Structured Query Language (SQL)

an international standard language used to maintain and query (search) data in the database.

inkjet printer

A nonimpact printer that sprays tiny drops of ink onto paper.

Signed Code

Code that is digitally signed by the creator; great for Microsoft and Google, not really important for small users with no inherit credibility

default gateway

The first IP address of the device that a client computer will look for when attempting to gain access outside the local network. This is usually the IP of the Router on the network

Abandon ware

computer software that is no longer distributed or supported by the developer or copyright holder.

Platform Compatibility

A concern with using enterprise software in a network with multiple computer platforms and operating systems.

CMYK (Cyan, Magenta, Yellow, Black)

the four ink colors used to create most process color printing

DHCP (Dynamic Host Configuration Protocol)

A network protocol that provides automatic
assignment of IP addresses and other TCP /IP configuration information to devices on the network.

Webcam

A camera that broadcast images through the Internet through a computer or web cell phone.

Structured Query Language (SQL)

an international standard language for processing a database

top-level domain

Domains (including .net, .org, .com, .mil. and the set .xx country codes) at the end of a domain name are the highest level of the domain name hierarchy.

biometric authentication

uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users

Quarantine

The process of separating malware or malicious software from the computers primary system

Hyper Text Transfer Protocol (HTTP)

The way data is transferred to an external site through a server.

printer consumables

Paper, Toner, Fusers and Rollers

Primary Key

A field (or group of fields) that uniquely identifies a given entity in a table

thermal printer

generates images by pushing electrically heated pins against the heat-sensitive paper

foreign key

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

HTTPS (Hypertext Transfer Protocol Secure)

An encrypted version of HTTP. It ensures information you access is securely accessed

Updates

Changes to formally controlled documentation, plans etc., to reflect modified or additional ideas or content.

Firmware

Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware.

FTP (File Transfer Protocol)

A protocol used to move files and folders over a network or the Internet.

volatile memory

memory that is lost when the computer is turned off. All RAM Modules are volatile

Primary Key

A field (or group of fields) that uniquely identifies a given entity in a table

virus definition

The characteristics of a list of known viruses.

SOHO (Small office/home office)

A small business office with between 1 and 10 users.

solid state drive (SSD)

long-term storage device that contains no moving parts. It's Solid, so nothing is moving.

Proprietary Software

Software that isn't owned but requires the purchase of a license to use the software.

hard disk drive (HDD)

A long-term storage device used to store and retrieve data from rapidly rotating disks coated with magnetic material.

Personal License

A software license given to home and small business customers that allows them to install the software on a limited number of systems.

Wireless Access Point (WAP)

is a network device that serves as an interface between devices and the network. Access Points are used to extend wireless access in a network in the event the Router is further away.

Access Control List (ACL)

A clearly defined list of permissions that specifies what actions a user may perform on a shared resource or if they are authorized to use it at all

foreign key

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

DSL (digital subscriber line)

A telephone line that carries digital data from end to end, and is used as a type of broadband Internet access. These usually require a Modem to convert phone signals to digital signals

Role-Based Access Control (RBAC)

A control system in which access decisions are based on the roles of individual users as part of an organization. Roles could go under Job Title or Department

flash memory devices

Electronic storage devices that are compact, portable, require little power, and contain no moving parts.

Mandatory Access Control (MAC)

The most restrictive access control model, typically found in military settings in which security is of supreme importance.

Fiber Optic Network

Dedicated wire to rapidly and reliably transmit masses of multimedia data at the same time that it's handling voice messages.

file system

Determines the way an operating system stores files on disk.

unstructured data

Not defined and does not follow a specified format

Rule-Based Access Control

An access control model that based on a list of predefined rules that determine what accesses should be granted

Fiber to the Home (FTTH)

provides home users with Internet access via fiber-optic cable

disk partition

A disk partition is a section of a hard drive that is treated as a separate storage unit;

Enterprise License

A software license, often called a volume license or a site license, that allows the customer to install the software without restriction using the same activation code, typically until a maximum cap is reached.

NTFS (New Technology File System)

A file system developed by Microsoft to be used with all Windows Operating Systems

Non-repudiation

The security goal of ensuring that data remains associated with the party that creates it or sends a transmission.

Fiber to the Curb (FTTC)

Takes the fiber even closer to the subscriber, bringing the optical fiber directly to the "curb" near customer homes and/or businesses.

constraints

limitations on what information can be inputted into a field.

metadata

data about data

ipconfig

Windows command that shows the IP configuration settings on a PC

Hardware Token

A device held by a user that displays a number or a password that changes frequently, such as every 60 seconds. The number is synchronized with a server and used as a onetime password.

FAT32

File allocation table that uses 32 bits to address and index clusters. Commonly
used with Flash drives or Flash Memory Devices

Wireless Standards

802.11b - 2.4 GHz 11 Mbps
802.11a - 5 GHz, 54 Mbps
802.11g - 2.4 GHz, 54 Mbps
802.11n - 5 GHz, 108 Mpbs
802.11ac - 5 GHz, 1.7 Gpbs

ext3 and ext4

File systems commonly used by Linux/Unix and Apple's Mac Operating system

Software Token

An app, or other software that generates a token for authentication.

Open Source Software

Software that can be downloaded, installed, and used without paying a licensing fee. The source code can also be downloaded, modified, and compiled and given to others as long as it is not resold for profit.

Task Manager

lists all the programs being used and indicates their status

unstructured data

Not defined and does not follow a specified format

Something you know

An authentication factor indicating knowledge, such as a password or PIN.

2.4 GHz

Wireless networking radio frequency that has moderate speeds but offers longer ranges.

Something you have

An authentication factor using something physical, such as a smart card or token.

5 GHz

Wireless networking radio frequency that has faster speeds but offers shorter range

File Explorer

The file management tool in the Windows Operating System used to organize files.

key/value pair database

a means of storing the properties of objects, without predetermining the fields used to define them.

Something you are

Authentication factor that relies on a physical characteristic (fingerprint, face, eye, palm)

Line of Sight (LOS)

The area you can clearly see in any direction

file permission settings

option that specify access rights for a specific file or directory

Data Definition Language (DDL)

The language that allows a database administrator to define the database structure, schema, and subschema.

file permission levels

A specific permission which can be granted on files and/or folders.
-Full Control
-Modify
-Read/list/execute
-Write

metadata

data about data

Data Encryption

A security measure for wireless networks that scrambles data transmitted between network devices.

Least Privilege

Providing only the minimum amount of privileges necessary to perform a job or function.

Software Subscription

Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.

WEP (Wired Equivalent Privacy)

A key encryption technique for wireless networks that uses keys both to encrypt data

Default password

Password on system administration, user, or service accounts predefined in a system, application, or device; usually associated with default account. Default accounts and passwords are published and well known, and therefore easily guessed.

file types

indicates the type of application that produced the document:
PDF, RTF, DOCX, XLS, PPT

Global Positioning System (GPS)

A system that determines the precise position of something on Earth through a series of satellites, tracking stations, and receivers.

WPA

Wireless Protected Access. Wireless network encryption system.

executable files

programs or software that runs immediately after the user clicks on the file
.bat, .msi, .cmd, .com, .dll, .exe

Windows Update

A feature of the Windows operating system that keeps the operating system current.

Indoor Position System (IDS)

System that determines the precise location of something or someone in an indoor space.

WPA2

Wireless Protected Access 2. Wireless network encryption system. This is considered the most secure encryption standard for wireless networks

Audio ports

-1 Side Speaker (Grey)
-2 Rear Speaker (Black)
-3 Audio In Sub woofer (Orange)
-4 Microphone (Pink)
-5 Audio Out Speakers (Green)
-6 Analog Line/Telephone (Blue)

key/value pair database

a means of storing the properties of objects, without predetermining the fields used to define them.

Wireless Enterprise Network

Same WiFi standards, but using enterprise-level equipment.

Single Sign On (SSO)

Using one authentication credential to access multiple accounts or applications.

direct/manual access

Connecting directly to a database using administrative tools, and running SQL commands

plain text

Text or message which contains no encryption

Malware

software that is intended to damage or disable computers and computer systems.

Data Definition Language (DDL)

The language that allows a database administrator to define the database structure, schema, and subschema.

Viruses and Worms

The two types of malware that have the primary objective of infecting a computer.

query/report builder

Provides a GUI for users to select actions to perform on the database, and convert those selections to SQL statements that will be executed.

Cipher text

Message data after it has been encrypted.

Trojan Horse

a program that appears desirable but actually contains something harmful

Symmetric Encryption

An encryption method in which the same key is used to encrypt and decrypt a message. The key in this case is the algorithm used to translate the message.

Data Manipulation Language (DML)

A specific language, provided with a DBMS, which allows users to access and modify the data, to make queries, and to generate reports.

Programmatic Access

A software application can interact closely with a database either using SQL commands or using SQL commands stored as procedures in the database.

Adware

computer software that displays advertisements that can be a nuisance to the end-user.

grant

a command that grants a permission to a user

Encryption

Process of converting readable data into unreadable characters or scrambling data

Spyware

A type of Malware that locates and saves data from users without them knowing about it.

digital certificate

a notice that guarantees a user or a website is legitimate

Cipher types

-3DES
-AES
-RC
-Blowfish/Twofish

permissions

granting or denying a user access to files

Asymmetric Encryption

a type of cryptographic based on algorithms that require two keys - one of which is secret (or private) and one of which is public (freely known to others).

Cookies

small computer programs left behind on your computer when you visit a website. To target specific ads to you.

direct/manual access

Connecting directly to a database using administrative tools, and running SQL commands

Public Key Infrastructure (PKI)

A framework for managing all of the entities involved in creating, storing, distributing, and revoking digital certificates.

Personally Identifiable Information (PII)

any data that can be used to identify, locate, or contact an individual. Ex:
Name
Address
Date of Birth

deny

a command that overrides a grant

query/report builder

Provides a GUI for users to select actions to perform on the database, and convert those selections to SQL statements that will be executed.

digital signature

a means of electronically signing a document with data that cannot be forged

pop-up ad

A small web page containing an advertisement that pops on the users screen

digital certificate

a data file that uniquely identifies individuals or organizations online and is comparable to a digital signature

Firewall

Part of a computer system that is designed to block unauthorized access of applications and ports.

Boolean

A single value of either TRUE or FALSE.

antivirus software

Software used to detect and eliminate computer viruses and other types of malware.

Public Key

One of the keys used in asymmetric encryption systems. It is widely distributed and available to everyone.

Programmatic Access

Interacting with a database either using SQL commands

string

A collection of characters

Private browsing

A feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

Private Key

In an asymmetric encryption scheme the decryption key is kept private and never shared.

network appliance

A device or equipment dedicated to working with a network: Ex:
-Switches
-Routers
-Wireless Access Port

create

a command that can be used to add a new database on the server,, or to add a new table within an existing database

Virtual Private Network (VPN)

Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet to another Network

Dictionary Attack

Attempt to break a password by trying all possible words.

booleon operators

A boolean operator, or logical operator, consists of operators such as AND, OR, NOT, NOR, NAND, and XOR. These operators are used with conditional statements in programming, search engines, algorithms, and formulas.

Network Attached Storage (NAS) or File Servers

A device or devices that have many hard drives to provide large amounts of disk space.

Attenuation

Loss of power in a signal as it travels long distances

Brute Force Attack

A password-cracking program that tries every possible combination of characters, given only part of the passwords

Data Manipulation Language (DML)

Database commands that modify the records within the database and not the schema itself.

alter

a command that allows you to add, remove (drop), and modify table columns (fields)

Backup

A copy of data that is made in case the original data is lost or damaged. The backup can be used to restore the original data.

Printer Sharing or Print Server

allows a computer user to share his or her attached printer with other users on a network

drop

a command that can be used to delete a table

cloud storage

An Internet service that provides remote storage or access to resources to users through an app or website. The term 'Cloud' is used in terms of high availability, much like actual clouds.

NoSQL

Nonrelational databases that arise from big data.

Universal Naming Convention (UNC)

A naming system used by Windows computers to locate network file shares and network printers. The format is \\computername\foldername.

insert

a command that adds a new row into a table in the database

Drive Mapping

A process of assigning a drive letter to a storage device located on a different network workstation.

Database Administrator

A person who is responsible for designing, maintaining, backing up, and securing an organization's databases.

SMTP

(Simple Mail Transfer Protocol) The main protocol used to send electronic mail from server to server on the Internet.

update

a command that changes the value of one or more table columns

IMAP (Internet Message Access Protocol)

a common protocol for retrieving email messages from the server, but is not directly downloaded

Database Developer

A person who designs and implements databases, usually by writing SQL code and conducting performance tests to ensure database optimization.

POP(Post Office Protocol)

used to retrieve email from a server and download it directly on the device.

delete

a command that removes records from within a table

proxy server

A form of network security that acts as a go-between for who can make requests or access resources on a network.

Data Analyst

A person who specializes in gathering and analyzing data to inform business decisions.

Data Scientist

A person who focuses on data analysis, especially as it relates to data mining and big data analytics. These positions require even more advanced programming and analytical skills.

select

a command that allows you to query a database and retrieve data from it.

grant

a command that grants a permission to a user

Data Mining

A broad and open-ended analysis of extracted big data.

deny

a command that overrides a grant

Data Extraction

The process of gathering and organizing big data.

integers

Whole numbers and their opposites (. . . -3, -2, -1, 0, 1, 2, 3. . .)

floating point numbers

decimal numbers(0.5, 0.99, 0.10)

Boolean

A single value of either TRUE or FALSE

character

a letter of the alphabet, a symbol, or a number

string

A sequence of characters; the primary data type for text. (Ex: 'Word' 'Happy' Hello')

Unicode

A encoding standard that enables most of the languages in the world to be symbolized with a special character identification. (Ex: a, &, �, �)

ASCII (American Standard Code for Information Interchange)

A Character encoding standard for English Symbols specifically.