This email authentication protocol, which stands for Domain-based Message Authentication, Reporting, and Conformance, helps prevent email spoofing and phishing attacks by allowing domain owners to specify policies for email handling.
What is DMARC?
This RAID configuration combines disk mirroring and disk striping to protect data, and is often described as a 'stripe of mirrors'."
What is RAID 10?
This first step in the boot process, initiated by firmware in the computer's BIOS or UEFI, tests major hardware components and prepares the system to load the operating system, often signified by a single beep.
What is the Power-On Self Test (POST)?
This device measures or maintains orientation, based on the principles of angular momentum, and is often used in navigation systems, smartphones, and gaming controllers.
What is a Gyroscope?
This process uses rule-based logic to automate manual tasks like data entry and invoice approval, improving efficiency and reducing errors in business processes.
What is Workflow Automation?
In networking terms, this is a physical location that serves as an access point to the internet, and it houses servers, routers, and other telecommunications equipment.
What is a Point of Presence (PoP)?
This RAID configuration provides data striping at the byte level and also stripe error correction information, offering a good balance of data protection, system performance, and usable capacity.
What is RAID 5?
This cylindrical drum in a laser printer is electrostatically charged by a laser to attract and transfer toner particles onto paper to create an image.
What is a Photosensitive Drum?
This digital cellular technology uses spread spectrum techniques to allow multiple users to share the same band of frequencies by assigning unique code sequences to each user.
What is Code Division Multiple Access (CDMA)?
This adjustable setting in a printer determines the distance between the print head and the paper, affecting print quality and the ability to accommodate different paper thicknesses.
What is the Platen Gap?
This term refers to a control panel on a computer monitor or television screen that allows you to adjust certain features such as brightness, contrast, and color settings.
What is On-Screen Display (OSD)?
This term refers to a sector on a computer's disk drive or flash memory that is no longer reliable for storing and retrieving data because it has been physically damaged or worn out.
What are Bad Blocks?
This networking device distributes incoming network traffic across multiple servers to ensure efficient utilization of resources, improve performance, and enhance high availability of applications and services.
What is a Load Balancer?
This networking standard, often referred to as Gigabit Ethernet, uses four pairs of twisted-pair copper cables to transmit data at a rate of 1 gigabit per second.
What is 1000BASE-T?
These hypervisors are installed directly on top of the host operating system and rely on it to manage hardware resources, enabling virtualization of multiple guest operating systems.
What are Host-based Hypervisors?
In a fiber-optic broadband setup, this device is installed at the customer's premises and connects to the Optical Line Terminal (OLT) over the Passive Optical Network (PON). It converts fiber-optic light signals to electrical signals.
What is an Optical Network Terminal (ONT)?
This term describes a condition where a computer's hard drive is constantly reading and writing data due to insufficient memory, leading to a significant degradation in system performance.
What is Disk Thrashing?
This security measure requires two types of identification to access a system, typically something you know (like a password) and something you have (like a token or smartphone), providing an additional layer of protection against unauthorized access.
What is Two-Factor Authentication (2FA)?
In the context of IT security, this term describes the uncontrolled growth and proliferation of multiple and disparate systems, often leading to increased complexity, inefficiency, and security vulnerabilities.
What is Security Sprawl?
This Ethernet standard, also known as PoE++ (Power over Ethernet Plus Plus), provides higher power levels for devices such as wireless access points, IP cameras, and industrial equipment, delivering up to 90 watts of power over Ethernet cables.
What is 802.3bt?
This approach to network management allows network administrators to manage network services through abstraction of lower level functionality, offering benefits in terms of network agility and flexibility.
What is Software Defined Networking (SDN)?
This dedicated device connected to a network provides a central location for data storage and sharing, often used in home and business environments for backup, file sharing, and media streaming.
What is a Network Attached Storage (NAS)?
In the context of computer security, this technique involves adding special characters to data to prevent it from being interpreted as executable code, often used to prevent Cross-Site Scripting (XSS) attacks.
What is Escape or Escaping?
This widely adopted set of standards defines the physical and data link layer specifications for Ethernet networks, including the popular variants such as 10BASE-T, 100BASE-TX, and 1000BASE-T.
What is IEEE 802.3?
This term stands for a security architecture framework in network systems which respectively validates a user's identity, determines what that user is allowed to do, and records what the user actually does.
What is Authentication, Authorization, and Accounting (AAA)?