IT Concepts and Term
Infrastructure
Apps & Software Dev
Security
Data
100

Converts AC power from the wall socket into DC.

The PSU

100

This device provides the following benefits:

•Low cost

•Better security

•Support for legacy software

•Quick setup and backups

•Easier testing

•Environmental efficiency

Virtualization

100

Is a category of application programs used to communicate and share resources with one another.

Collaboration Software

100

Occurs when data is transformed using a complicated algorithm to make it unreadable

Encryption

100

Going directly into tables to view or change data, suitable method for working with a database that is stored locally.

Manual Access

200

Contains a setup program used to configure settings for hardware devices.

The BIOS

200

Software that allows for the hardware to properly function and communicate with the operating system.

Driver

200

Licensed software is usually free and has the source code available for the public to use. Open-Source licenses are usually used across different operating systems.

Open Source

200

Configurations that establish which data can enter your network and which data can leave your network.

Proxy Settings

200

Does not use the tabular schema of rows and columns.

Non-Relational Data Base

300

Given a scenario you have just implemented a theory of probable cause. What is the next step in the trouble shooting method?

Test the Theory


300

Delivers software on demand, so it doesn't need to be installed locally.

SaaS

300

Windows Operating System are capable of addressing 4 GB of RAM.

32bit System

300

Uses the Advanced Encryption Standard (AES) security algorithm.

WPA 2

300

Is structured to recognize relationships among stored items of information, known as datasets.

Relational Database
400

What is 2000 Megabytes?

2 Gigabytes

400

You don’t own the physical hardware; instead, it’s provided to you through the cloud.

IaaS

400

Intelligence that creates content like text, images, or videos. You use it by entering a prompt, which is a description of the content you want, and the AI generates a response.

Generative AI

400

A service that uses an encryption tunnel which encrypts data in transit while making it difficult in seeing the data that is in transmission.

VPN

400

This command allows you to change things within a table such as column name.

Alter

500

 What is the notation in Binary for 46?

00101110


DAILY DOUBLE!

500

Allows you to use servers and software without needing to manage them yourself.

PaaS


500

The communication takes place between the Client and the Server. The client system sends the request to the server system and the Server system processes the request and sends the data back to the Client System.

Two Tier Model

500

Framework used to assess an organization’s security infrastructure if the system or data is compromised.

CIA Triad

500

Allows the changing or editing of contents in table. You are not deleting, only editing.

Update

M
e
n
u