what is the component that stores instructions as well as currently used or frequently accessed resources for the CPU to quickly access
RAM (Random Access Memory)
a piece of information that is widely used in cryptography to encrypt and/or decrypt data
Key
what is the way a user can interact with a computer called?
UI (User Interface)
what is the process that a user has to go through where the computer makes sure they should have access
Authentication
what is the application that enforces what traffic can pass through based on a list of rules
Firewall
what are the 2 most common types of media for long-term storage in a computer
SSD (Solid State Drive)
HDD (Hard Disk Drive)
the use of cryptography and computer science to hide data by altering it so its hard to determine its contents
Encryption
what is the type of interface where it relies on objects such as windows for the user to interact with it.
GUI (Graphical User Interface)
what is the concept of having more than one type of way to authenticate in order to fully authenticate
Multi-factor authentication
what is the hardware device that allows multiple machines to be connected on the network and can route their packets to determined destinations based on the packet
Switch
What is the firmware that loads before the OS and facilitates the communications between components and software
BIOS (Basic Input Output System)
what is an off-site storage solution where files exist on a server you don't manage and are accessible over the internet
cloud storage
what is the text-base interface where you can only type and read to interact with the computer
CLI (Command Line Interface)
what type of account on a computer or network allows tasks to be done by a person in that person's name
User account
what is the hardware that allows multiple machines to be connected and have their traffic go from layer 3 to layer 4 in order to access the WAN
router
what is the microprocessor architecture that is designed to run a reduced amount of instructions
RISC (Reduced Instruction Set Computing)
an industry standard used to authenticate users and applications into a service
Oauth2
what is the application in Windows where you can run commands and runs BATCH files
CMD (Command Prompt)
What is the object that multiple accounts can be placed in where they inherit the object attributes
Group | User group
what is the hardware device that allows for multiple machines to be connected to it and will route the network traffic from each port to each other port no matter its contents
Hub
first developed by Acorn Computers This microprocessor architecture relies heavily on the RISK architecture to make a power-efficient CPU that can run on lower power and make less heat.
ARM (Advanced RISC Machine)
what is a type of programming language with many layers of abstraction that can easily be used to program a computer to do complicated tasks
high-level programing language
what is the Windows application that can run commands and can perform advanced tasks as well as scripting
PSH (PowerShell)
what is the process of enforcing rules on objects in a domain such as groups, users, or machines
Policy Enforcement
what is the difference between a RJ-45 patch cable and a RJ-45 crossover cable
patch cable (also known as a straight-through cable) has the same pinouts on either end
crossover cable switches the data transmit and receive pins, this is accomplished by having the T-568A pinouts on one end and T-568B on the other