Line-of-Sight wireless technology
What is InfraRed (IR)
The Apple File System (old)
What is HFS
What data type is this piece of data:
1011010010
Can't tell! It could be boolean, binary, decimal, an integer, or any number of others. Need more data!
This is the column in a table in a database
What is a Field
CIA stands for
What is Confidentiality, Integrity, and Availability
The maximum throughput rate for standard, consumer-grade fiber optic connections
What is 1 Gigabit/second (1 Gbps)
A bare-metal hypervisor (type)
What is a Type 1 Hypervisor
Logic that uses "if, then" terms
What is Branching
The rules that control what types of information can go in what kinds of fields
What are constraints
Security which asks for a password once for one platform and then grants access to other platforms
What is Single Sign-On
The type of RAM only found in servers
What is ECC RAM?
File system that allows disk-level and also folder-level encryption
What is NTFS (New Technology File System)
Arrays are _____ and ______.
What is fixed length and only one certain data type
A template for a query that always searches the same fields and returns the gathered information in a certain format
What is a report
DDOS (acronym)
What is Distributed Denial of Service
DHCP (Acronym)
What is Dynamic Host Configuration Protocol
Software that you can use a trial copy of but that you have to pay for to get the full version
What is Shareware
The database programming language used by almost every database for searches
What is SQL (Structured Query Language)
The command to use for getting rid of a single Field or Record in a table
What is Delete
Security in which everyone only gets access to exactly the things they need and nothing more
What is the Least Privilege model
Maximum throughput for 802.11n
What is 600 Megabits/second (Mbps)
Name one command in the CLI for troubleshooting
What is:
ping, ifconfig (or ipconfig), tracert, netstat, nslookup, etc.
Coding language that is most often used to patch and mod video games. Examples include Lua and Lisp
What is a scripted language
The 3 permission types in a database
What is RWX (Read, Write, eXecute)
An attack that captures another person's information (such as a login hash) and then sends it at a later time to get unauthorized access.
What is a replay attack