Jumat, 30 Desember 2022

Daftar Kata IT | Technology Dictionary

 

Well, banyak banget orang-orang awam yang masih kurang paham beberapa istilah dalam dunia IT, mungkin sedikit catatan ini akan membantu.. Enjoy !

Terms and definitions from Google 

A

Abstraction: To take a relatively complex system and simplify it for our use

Address bus: Connects the CPU to the MCC and sends over the location of the data, but not the data itself

Algorithm: A series of steps that solves specific problems.

Android: A mobile operating system based on Linux

Application: A computer program designed for a specific use

Application software: Any software created to fulfill a specific need, like a text editor, web browser, or graphics editor

ARPANET: The earliest version of the Internet that we see today, created by the US government project DARPA in the 1960s

ASCII: The oldest character encoding standard used is ASCII. It represents the English alphabet, digits, and punctuation marks

Assembly language: A language that allowed computer scientists to use human readable instructions, assembled into code that the machines could understand

ATA: The most common interface that hard drives use to connect to our system

ATX (Advanced Technology eXtended): The most common form factor for motherboards

Automation: It makes processes work automatically

A record: The most common resource record, used to point a certain domain name at a certain IPv4 IP address

ACK flag: One of the TCP control flags. ACK is short for acknowledge. A value of one in this field means that the acknowledgment number field should be examined

Acknowledgement number: The number of the next expected segment in a TCP sequence

Ad-Hoc network: A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages

Address class system: A system which defines how the global IP address space is split up

Address Resolution Protocol (ARP): A protocol used to discover the hardware address of a node with a certain IP address

Anycast: A technique that's used to route traffic to different destinations depending on factors like location, congestion, or link health

Application layer: The layer that allows network applications to communicate in a way they understand

Application layer payload: The entire contents of whatever data applications want to send to each other

ARP table: A list of IP addresses and the MAC addresses associated with them

ASN: Autonomous System Number is a number assigned to an individual autonomous system

Asymmetric Digital Subscriber Line (ADSL): A device that establishes data connections across phone lines and different speeds for uploading and downloading data

Automatic allocation: A range of IP addresses is set aside for assignment purposes

Absolute path: It is one that starts from the main directory

ACI: Access Control Lists

Administrator: A user that has complete control over a machine

Alias: A nickname for common commands

Appending flags: A way to add the data of the file without erasing existing data

App Store apps: A Package Manager that acts as a repository

App Store repository: A app store service that also acts as a repository

App stores: A central managed marketplace for app developers to publish and sell mobile apps

APPX: An APPX is another way to package contents of a file to act like a unit of distribution

Archive: An archive is comprised of one or more files that are compressed into a single file" for verb agreement

B

Backward compatible: It means older hardware works with newer hardware

Binary system: The communication that a computer uses is referred to as binary system, also known as base-2 numeral system

Bios (Basic Input Output Services): The BIOS is software that helps initialize the hardware in our computer and gets our operating system up and running

BIOS/UEFI: A low-level software that initializes our computer's hardware to make sure everything is good to go

Block storage: It improves faster handling of data because the data isn't stored in one long piece but in blocks, so it can be accessed quicker

Boot: To start up a computer

Bootloader: A small program that loads the operating system

Browser: A user interface for displaying and interacting with web pages

BYOD (Bring Your Own Device): Refers to the practice of allowing people to use their own personal devices for work

Byte: A group of 8 bits

Baud rate: A measurement of how many bits could be passed across a phone line in a second

Bit: The smallest representation of data that a computer can understand

Bluetooth: The most common short range wireless network

Border Gateway Protocol (BGP): A protocol by which routers share data with each other

Broadband: Any connectivity technology that isn't dial-up Internet

Broadcast: A type of Ethernet transmission, sent to every single device on a LAN

Broadcast address: A special destination used by an Ethernet broadcast composed by all Fs

Background processes/Daemon processes: Processes that run or take place in the background

Bash: The language used to interact with the shell

Biometric data: A way of protecting your accounts and information using biometric data such as facial recognition and fingerprint

Block devices: A system that acts like USB drives and hard drive by transmitting data

C

Cache: The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored

Character encoding: Is used to assign our binary values to characters so that we as humans can read them

Charge cycle: One full charge and discharge of a battery

Children's Online Privacy Protection Act (COPPA): Regulates the information we show to children under the age of 13

Chipset: It decides how components talk to each other on our machine

Chrome OS: A Linux-based operating system designed by Google

Clients: A device that receives data from a server

Clock cycle: When you send a voltage to the clock wire

Clock speed: The maximum number of clock cycles that it can handle in a set in a certain time period

Clock wire: When you send or receive data, it sends a voltage to that clock wire to let the CPU know it can start doing calculations

Coding: Translating one language to another

Command Line Interface (CLI): A shell that uses text commands to interact with the operating system

Compiled programming language: A language that uses human readable instructions, then sends them through a compiler

Computer: A device that stores and processes data by performing calculations

Computer file: Data that we store and a file can be anything, a word document, a picture, a song, literally anything

Copyright: Used when creating original work

CPU: Central processing unit

CPU sockets: A CPU socket is a series of pins that connect a CPU’s processor to the PC’s motherboard

Cryptography: The overarching discipline that covers the practice of coding and hiding messages from third parties

Cable categories: Groups of cables that are made with the same material. Most network cables used today can be split into two categories, copper and fiber

Cable modem termination system: Connects lots of different cable connections to an ISP's core network

Cable modem: A device that sits at the edge of a consumer's network and connects it to the cable modem termination system

Cables: Insulated wires that connect different devices to each other allowing data to be transmitted over them

Caching and recursive name servers: They are generally provided by an ISP or your local network, and their purpose is to store domain name lookups for a certain amount of time

Carrier-Sense Multiple Access with Collision Detection (CSMA/CD): CSMA/CD is used to determine when the communications channels are clear and when the device is free to transmit data

Channels: Individual, smaller sections of the overall frequency band used by a wireless network

Client: A device that receives data from a server

CLOSE: A connection state that indicates that the connection has been fully terminated, and that no further communication is possible

CLOSE_WAIT: A connection state that indicates that the connection has been closed at the TCP layer, but that the application that opened the socket hasn't released its hold on the socket yet

Cloud computing: The concept and technological approach of accessing data, using applications, storing files, etc. from anywhere in the world as long as you have an internet connection

CNAME: A resource record used to map one domain to another

Collision domain: A network segment where only one device can communicate at a time

Computer networking: The full scope of how computers communicate with each other

Connection-oriented protocol: A data-transmission protocol that establishes a connection at the transport layer, and uses this to ensure that all data has been properly transmitted

Connectionless protocol: A data-transmission protocol that allows data to be exchanged without an established connection at the transport layer. The most common of these is known as UDP, or User Datagram Protocol

Copper cable categories : These categories have different physical characteristics like the number of twists in the pair of copper wires. These are defined as names like category (or cat) 5, 5e, or 6, and how quickly data can be sent across them and how resistant they are to outside interference are all related to the way the twisted pairs inside are arranged

Crosstalk: Crosstalk is when an electrical pulse on one wire is accidentally detected on another wire

Cyclical Redundancy Check (CRC): A mathematical transformation that uses polynomial division to create a number that represents a larger set of data. It is an important concept for data integrity and is used all over computing, not just network transmissions

Cache: The assigned stored location for recently or frequently accessed data; on a mobile app it is where anything that was changed or created with that app is stored

Centralized logging: Parsing logs in one central location

Character devices: A way to transmit data character by character like a keyboard and mouse

Child directories: It is a directory housed by a parent directory

Chocolatey: A third party package manager for Windows

CLI: Command line interpreter

Client/Server runtime subsystem: System that handles running Windows GUI and Command line

Closed source packages: A source code that does not allow public access

Command line: A text interface program for a computer that inputs text commands and translates them to the operating system

Command line mode: When you are able to run commands while still in your current shell

Computer management: A tool that lets you manage a local or remote computer

D

DARPA: A US government project in the 1960s that went on to create the earliest version of the Internet that we see today

Data blocks: Data that can be broken down into many pieces and written to different parts of the hard disk

Data sizes: Metrics that refer to data sizes including bit, byte, kilobyte, kibibyte, and megabyte

DDR SDRAM (Double Data Rate SDRAM): A type of RAM that is faster, takes up less power, and has a larger capacity than earlier SDRAM versions

Decimal form- base 10 system: In the decimal system, there are 10 possible numbers you can use ranging from zero to nine

Desktop: The main screen where we can navigate our files, folders, and applications

Digital divide: The growing skills gap between people with and without digital literacy skills

DIMM: Dual Inline Memory Module

Display port: Port which also outputs audio and video

Distribution: A version of the operating system

Distributions: Some common Linux distributions are Ubuntu, Debian, and Red Hat

Domain name: A website name; the part of the URL following www.

Domain Name System (DNS): A global and highly distributed network service that resolves strings of letters, such as a website name, into an IP address

DRAM: Dynamic Random Access Memory

Drivers: The drivers contain the instructions our CPU needs to understand external devices like keyboards, webcams, printers

DVI: DVI cables generally just output video

Datalink layer: The layer in which the first protocols are introduced. This layer is responsible for defining a common way of interpreting signals, so network devices can communicate

Data offset field: The number of the next expected segment in a TCP packet/datagram

Data packet: An all-encompassing term that represents any single set of binary data being sent across a network link

Data payload section: Has all of the data of the protocols further up the stack of a frame

Demarcate: To set the boundaries of something

Demarcation point: Where one network or system ends and another one begins

Demultiplexing: Taking traffic that's all aimed at the same node and delivering it to the proper receiving service

Destination MAC address: The hardware address of the intended recipient that immediately follows the start frame delimiter

Destination network: The column in a routing table that contains a row for each network that the router knows about

Destination port: The port of the service the TCP packet is intended for

DHCP: A technology that assigns an IP address automatically to a new device. It is an application layer protocol that automates the configuration process of hosts on a network

DHCP discovery: The process by which a client configured to use DHCP attempts to get network configuration information

Dial-up: Uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number

DNS zones: A portion of space in the Domain Name System (DNS) that is controlled by an authoritative name server

Domain: Used to demarcate where control moves from a top-level domain name server to an authoritative name server

Domain name: A website name; the part of the URL following www.

Domain Name System (DNS): A global and highly distributed network service that resolves strings of letters, such as a website name, into an IP address

Dotted decimal notation: A format of using dots to separate numbers in a string, such as in an IP address

DSL: Digital subscriber line was able to send much more data across the wire than traditional dial-up technologies by operating at a frequency range that didn't interfere with normal phone calls

DSLAM: Digital Subscriber Line Access Multiplexers are devices that connect multiple DSL connections to a high-speed digital communications channel

Duplex communication: A form of communication where information can flow in both directions across a cable

Duration field: Specifies how long the total frame is

Dynamic allocation: A range of IP addresses is set aside for client devices and one of these IPs is issued to these devices when they request one

Dynamic IP address: An IP address assigned automatically to a new device through a technology known as Dynamic Host Configuration Protocol

DACL: Directory Control Lists

Data: Actual content of a file

Data buffer: A region of RAM that’s used to temporarily store data while it’s being moved around

Debian(.deb): A Debian package is packaged as a .deb file

Defragmentation: A process of taking all the files stored on a given disk and reorganizing them into neighboring locations

Device manager: A console management system for your device

Disk Management utility: Native tool for Windows that helps with managing disk space

Disk to disk cloning: A type of cloning that happens when you connect an external hard drive to the machine you want to clone

Driver: Used to help our hardware devices interact with our Operating System

Dynamic-link libraries: Programs that want to use functionality that the code provides can tap into it if they need to (shared libraries)

E

Electrostatic discharge: Electrostatic discharge is a sudden and momentary flow of electric current between two electrically charged objects caused by contact, an electrical short or dielectric breakdown

Error message: Helpful indicators that can point you in the right direction

Etcher.io: A tool you can use to load an install image onto your USB device and make it bootable

Ethernet cable: It lets you physically connect to the network through a cable

.exe: A file extension found in Windows for an executable file

Expansion slots: Give us the ability to increase the functionality of our computer

External Data Bus (EDB): It's a row of wires that interconnect the parts of our computer

Error detection: The ability for a protocol or program to determine that something went wrong

Error recovery: The ability for a protocol or program to attempt to fix an error

ESTABLISHED: Status indicating that the TCP connection is in working order, and both sides are free to send each other data

Ethernet: The protocol most widely used to send data across individual links

Ethernet frame: A highly structured collection of information presented in a specific order

EtherType field: It follows the Source MAC Address in a dataframe. It's 16 bits long and used to describe the protocol of the contents of the frame

Exterior gateway: Protocols that are used for the exchange of information between independent autonomous systems

Enterprise app management: A management system that allows an organization to to distribute custom mobile apps

Environment: Whatever settings or variables a child process inherits from the parent’s process

Escape characters: A concept that means that the next character after the back tick should be treated literally

Event Viewer: A place where all events that have been logged are stored

Executable file: A file containing instructions for a computer to execute when they’re run

.exe: A file extension found in Windows for an executable file

F

Factory reset: Resetting a device to the settings it came with from the factory

Fiber optic cable: Fiber optic cables contain individual optical fibers which are tiny tubes made of glass about the width of a human hair. Unlike copper, which uses electrical voltages, fiber cables use pulses of light to represent the ones and zeros of the underlying data

File extension: The appended part of a filename that tells us what type of file it is in certain operating systems

File handling: A process of storing data using a program

File system: A system used to manage files

Finder: The file manager for all Macs

Firmware: Software that's permanently stored on a computer component

Folders/Directories: Used to organize files

Form factor: A mathematical way to compensate for irregularities in the shape of an object by using a ratio between its volume and height

Fiber cable: Fiber optic cables contain individual optical fibers which are tiny tubes made of glass about the width of a human hair. Unlike copper, which uses electrical voltages, fiber cables use pulses of light to represent the ones and zeros of the underlying data

FIN: One of the TCP control flags. FIN is short for finish. When this flag is set to one, it means the transmitting computer doesn't have any more data to send and the connection can be closed

FIN_WAIT: A TCP socket state indicating that a FIN has been sent, but the corresponding ACK from the other end hasn't been received yet

Firewall: It is a device that blocks or allows traffic based on established rules

Five layer model: A model used to explain how network devices communicate. This model has five layers that stack on top of each other: Physical, Data Link, Network, Transport, and Application

Fixed allocation: Requires a manually specified list of MAC address and the corresponding IPs

Flag field: It is used to indicate if a datagram is allowed to be fragmented, or to indicate that the datagram has already been fragmented

Flat file: A collection of records/information that follow a consistent format with rules around stored values. On a host computer, one use is to have a list of network address and host name pairs (a hosts file)

Flow label field: 20-bit field that's used in conjunction with the traffic class field for routers to make decisions about the quality of service level for a specific datagram

Fragmentation: The process of taking a single IP datagram and splitting it up into several smaller datagrams

Fragmentation offset field: It contains values used by the receiving end to take all the parts of a fragmented packet and put them back together in the correct order

Frame check sequence: It is a 4-byte or 32-bit number that represents a checksum value for the entire frame

Frame control field: 16 bits long, it contains a number of sub-fields that are used to describe how the frame itself should be processed

Frequency band: A certain section of the radio spectrum that's been agreed upon to be used for certain communications

FTP: An older method used for transferring files from one computer to another, but you still see it in use today

FTTB: Fiber to the building, fiber to the business or even fiber to the basement, since this is generally where cables to buildings physically enter. FTTB is a setup where fiber technologies are used for data delivery to an individual building

FTTH: Fiber to the home. This is used in instances where fiber is actually run to each individual residents in a neighborhood or apartment building

FTTN: Fiber to the neighborhood. This means that fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount of the population

FTTP: Fiber to the premises. FTTH and FTTB may both also be referred to as FTTP

FTTX: Stands for fiber to the X, where the X can be one of many things

Full duplex: The capacity of devices on either side of a networking link to communicate with each other at the exact same time

Fully qualified domain name: When you combine all the parts of a domain together

Form factor: A mathematical way to compensate for irregularities in the shape of an object by using a ratio between its volume and height

Factory reset: Resetting a device to the settings it came with from the factory

File permissions: A process for setting permissions for who has access to certain files

File record number: The index of the files entry in the MFT

File system: Used to keep track of files and file storage on a disk

Full control: A user or group with full control that can do anything they want to files

G

GIT: A version control system that helps keep track of changes made to files and directories

Globalization: The movement that lets governments, businesses, and organizations communicate and integrate together on an international scale

Groups: A collection of users

GUI: A graphical user interface

GUID partition table: Only used if you are using UEFI booting

H

Hard drive: It is a long term memory component that holds all of our data, which can include music, pictures, applications

Hardware: External or internal devices and equipment that help you perform major functions

Hardware resource deficiency: It refers to the lack of system resources like memory, hard drive space, etc

HDD (Hard disk drive): Hard disk drives, or HDDs, use a spinning platter and a mechanical arm to read and write information

HDMI: A type of cable that outputs both video and audio

Heatsink: It is used to dissipate heat from our CPU

HFS+/APFS: HFS+ is a journaling system developed by Apple Inc. and APFS is another but more encrypted Apple journaling system

Hostname: Used to identify the computer when it needs to talk to other computers

Hubs: Devices that serve as a central location through which data travels through

Half-duplex: It means that, while communication is possible in each direction, only one device can be communicating at a time

Handshake: A way for two devices to ensure that they're speaking the same protocol and will be able to understand each other

HDSL: High Bit-rate Digital Subscriber Lines. These are DSL technologies that provision speeds above 1.544 megabits per second

Header checksum field: A checksum of the contents of the entire IP datagram header

Header length field: A four bit field that declares how long the entire header is. It is almost always 20 bytes in length when dealing with IPv4

Hexadecimal: A way to represent numbers using a numerical base of 16

Hop limit field: An 8-bit field that's identical in purpose to the TTL field in an IPv4 header

Host file: It is a flat file that contains, on each line, a network address followed by the host name it can be referred to as

Hub: It is a physical layer device that broadcasts data to everything computer connected to it

Hybrid cloud: Used to describe situations where companies might run things like

their most sensitive proprietary technologies on a private cloud or on premise while entrusting their less sensitive servers to a public cloud

Hypervisor: A piece of software that runs and manages virtual machines while also offering guests a virtual operating platform that's indistinguishable from actual hardware

Hard link: When created in NTFS, an entry is added to the MFT that points to the linked file record number, not the name of the file. This means the file name of the target can change and the hard link will still point to it

Hardware ID: A special string of characters assigned to hardware

Having dependencies: A process of counting on other pieces of software to make an application work since one bit of code depends on another in order to work

Hidden files: A set of files that are not visible either to avoid alteration or simply because you don’t want someone to see them

Hot key: A keyboard shortcut that does a particular task

I

Information technology: The use of digital technology, like computers and the internet, to store and process data into useful information

Input/Output device: A device that performs input and output, including monitors, keyboards, mice, hard disk drives, speakers, bluetooth headsets, webcams, and network adapters

Install image: A downloadable operating system image used to install an operating system on a device

Instruction set: A list of instructions that our CPU is able to run

Internet: A worldwide system of interconnected networks

Internet Corporation for Assigned Names and Numbers (ICANN): Where website names are registered

Internet Protocol version 4 (IPv4): An address that consists of 32 bits separated into four groups

Internet Protocol version 6 (IPv6): An address that consist of a 128 bits, four times the amount that IPv4 uses

Internet service provider (ISP): A company that provides a consumer an internet connection

Internet of Things (IoT): The concept that more and more devices are connected to the internet in a smarter fashion such as smart thermostats that turn off the air conditioner when you leave and turn it on when you come back

Interpreted programming language: A language that isn't compiled ahead of time

I/O management: Anything that can give us input or that we can use for output of data

iOS: A mobile operating system developed by Apple Inc.

IP address: The most common protocol used in the network layer, used to helps us route information

ITX (Information Technology eXtended): A form factor for motherboards that is much smaller than ATX boards

IANA: The Internet Assigned Numbers Authority, is a non-profit organization that helps manage things like IP address allocation

ICMP: Internet control message protocol is used by router or remote hosts to communicate error messages when network problems prevent delivery of IP packets

ICMP payload: Piece of the packet which lets the recipient of the message knows which of their transmissions caused the error being reported

Identification field: It is a 16-bit number that's used to group messages together

Infrastructure as a Service (IaaS): A subset of cloud computing where a network and servers are provided for customers to run their services

Instantiation: The actual implementation of something defined elsewhere

Interface: For a router, the port where a router connects to a network. A router gives and receives data through its interfaces. These are also used as part of the routing table

Interior gateway: Interior gateway protocols are used by routers to share information within a single autonomous system

Internet Protocol (IP): The most common protocol used in the network layer

Internet Service Provider (ISP): A company that provides a consumer an internet connection

Internetwork: A collection of networks connected together through routers - the most famous of these being the Internet

IP datagram: a highly structured series of fields that are strictly defined

IP masquerading: The NAT obscures the sender's IP address from the receiver

IP options field: An optional field and is used to set special characteristics for datagrams primarily used for testing purposes

IPv6 tunnel: IPv6 tunnel servers on either end of a connection take incoming IPv6 traffic and encapsulate it within traditional IPv4 datagrams

IPv6 tunnel brokers: Companies that provide IPv6 tunneling endpoints for you, so you don't have to introduce additional equipment to your network

Inherit only: A permission group that means that a DACL will be inherited, but not applied to a container

Inode: A file structure for metadata and files

Installing from source: A process of installing from a source

Interactive mode: When the parted tool launches you into a separate program

I/O Streams: An input stream handles data flowing into and out of a program

J

K

Kernel: The main core of an operating system that creates processes, efficiently schedules them, and manages how processes are terminated

Kernel module: It extends the kernel's functionality so developers don't have to actually touch the Linux kernel

L

Land Grid Array (LGA): It is a type of CPU socket that stick out of the motherboard

Lightning adaptor: One of the standard power, data and display connector types used in mobile devices

Linux OS: Linux is one of the largest an open source operating system used heavily in business infrastructure and in the consumer space

Logic gates: Allow transistors to do more complex tasks, like decide where to send electrical signals depending on logical conditions

Logs: Files that record system events on our computer

Line coding: Modulation used for computer networks

Link-local unicast address: Allow for local network segment communications and are configured based upon a host's MAC address

Listen: It means that a TCP socket is ready and listening for incoming connections

Local Area Network (LAN): A single network in which multiple devices are connected

Loopback address: An IP address that always points to itself. This type of address is used to test internal pathing through the TCP/IP protocols

Library: A way to package a bunch of useful code that someone else wrote

List folder contents: A command that will execute and list folder contents and is an alias for Read and Execute

Logging: The act of creating log events

Log rotation: A way for the OS to clean out log files to make room for new ones

M

Mac OS: Apple's operating system

Mb/s: megabit per second, which is a unit of data transfer rate

Memory controller chip (MCC): A bridge between the CPU and the RAM

Memory usage: The amount of memory available in your system as well as what memory is currently being used by other applications

Memory management: One of the functions that a kernel performs; it optimizes memory usage and make sure our applications have enough memory to run

Metadata: Tells us everything we need to know about a file, including who created it, when it was last modified, who has access to it, and what type of file it is.

Micro display port: One of the standard power, data and display connector types used in mobile devices

Micro HDMI: One of the standard power, data and display connector types used in mobile devices

Micro USB: One of the standard power, data and display connector types used in mobile devices

Microsoft Terminal Services Client: A client program used to create RDP connections to remote computers

Mini HDMI: One of the standard power, data and display connector types used in mobile devices

Mini USB: One of the standard power, data and display connector types used in mobile devices

Motherboard: The body or circulatory system of the computer that connects all the pieces together

MAC(Media Access Control) address: A globally unique identifier attached to an individual network interface. It's a 48-bit number normally represented by six groupings of two hexadecimal numbers

MAC filtering: Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust

Mesh networks: Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes

Metered connection: An internet connection where all data transfer usage is tracked. Cell phone plans that have a limit on data usage per month or that charge based on usage are examples of metered connections

Modulation: A way of varying the voltage of a constant electrical charge moving across a standard copper network cable

Multicast: A way of addressing groups of hosts all at once

Multicast frame: If the least significant bit in the first octet of a destination address is set to one, it means you're dealing with a multicast frame. A multicast frame is similarly set to all devices on the local network signal, and it will be accepted or discarded by each device depending on criteria aside from their own hardware MAC address

Multiplexing: It means that nodes on the network have the ability to direct traffic toward many different receiving services

MX record: It stands for mail exchange and this resource record is used in order to deliver email to the correct server

Manifest: A library used if an application needs to use a shared library

Master boot record (MBR): a traditional partition table within a storage disk that lets you have volume sizes of 2 terabytes or less and is mostly used in the Windows OS

Master file table (MFT): A way NTFS stores and represents the files you’re working with on your operating system

Memory manager: A Windows OS program that helps manage virtual memory

Metadata: Tells us everything we need to know about a file, including who created it, when it was last modified, who has access to it, and what type of file it is.

Microsoft Install Package(.msi) and MSI files: Microsoft Install Package is a file extension used to guide a program called Windows Installer in the installation, maintenance, and removal of programs of the windows operating systems. MSI files are a combination of of databases that contain installation instructions in different tables along with all the files

Mobile applications: Software that is distributed on mobile OS devices

Mobile device management: A system used to apply and enforce rules about how the device has to be configured and used

Modify: An umbrella permission that includes read and execute and write

Mounting: Making a file or hard disk accessible to the computer

Multilingual user interface: Interface that offers and support different languages

N

Network: The interconnection of computers

Network Address Translation (NAT): A mitigation tool that lets organizations use one public IP address and many private IP addresses within the network

Network stack: A set of hardware or software that provides the infrastructure for a computer

Networking: Managing, building and designing networks

Networking protocols: A set of rules for how we transfer data in a network

Northbridge: interconnects stuff like RAM and video cards.

NVMe (NVM Express): interface standard which allows greater throughput of data and increased efficiency.

Name resolution: This process of using DNS to turn a domain name into an IP address

Network Address Translation (NAT): A mitigation tool that lets organizations use one public IP address and many private IP addresses within the network

Network layer: It's the layer that allows different networks to communicate with each other through devices known as routers. It is responsible for getting data delivered across a collection of networks

Network port: The physical connector to be able to connect a device to the network. This may be attached directly to a device on a computer network, or could also be located on a wall or on a patch panel

Network switch: It is a level 2 or data link device that can connect to many devices so they can communicate. It can inspect the contents of the Ethernet protocol data being sent around the network, determine which system the data is intended for and then only send that data to that one system

Next header field: Defines what kind of header is immediately after this current one

Next hop: The IP address of the next router that should receive data intended for the destination networking question or this could just state the network is directly connected and that there aren't any additional hops needed. Defined as part of the routing table

Node: Any device connected to a network. On most networks, each node will typically act as a server or a client

Non-metered connection: A connection where your data usage is not tracked or limited, instead you are charged a flat fee for unlimited and unrestricted usage. A Wi-Fi connection is an example of a non-metered connection

Non-routable address space: They are ranges of IPs set aside for use by anyone that cannot be routed to

NS record: It indicates other name servers that may also be responsible for a particular zone

NTP servers: Used to keep all computers on a network synchronized in time

O

Open SSH: The most popular program to use SSH within Linux

Open Source: This means the developers will let other developers share, modify, and distribute their software for free

Operating system: The whole package that manages our computers resources and lets us interact with it

Overclocking: it increases the rate of your CPU clock cycles in order to perform more tasks

Octet: Any number that can be represented by 8 bits

Optical Network Terminator: Converts data from protocols the fiber network can

understand to those that are more traditional twisted pair copper networks can understand

Options field: It is sometimes used for more complicated flow control protocols

Organizationally Unique Identifier (OUI): The first three octets of a MAC address

OSI model: A model used to define how network devices communicate. This model has seven layers that stack on top of each other: Physical, Data Link, Network, Transport, Session, Presentation, and Application

OTA update: A type of update that is installed by the mobile device itself

P

PC: It means personal computer, which technically means a computer that one person uses

PCI Express: Peripheral Component Interconnect Express

PDA (Personal Digital Assistant): Allows computing to go mobile

Peripherals: the external devices which we connect to our computer that add functionality, like: a mouse, a keyboard, and a monitor

Permission denied: An error message you might find when accessing a protected file

Pin Grid Array (PGA): CPU socket where the pins are located on the processor itself

Plink (PuTTY Link): A tool built into the command line after PuTTY is installed that is used to make remote SSH connections

Ports: Connection points that we can connect devices to that extend the functionality of our computer

POST (Power On Self Test): It figures out what hardware is on the computer

Powershell: A shell (program that interprets text commands) for Windows

Power supply: Converts electricity from our wall outlet onto a format that our computer can use

Power user: Above average computer users

Process management: The capacity to manage the many programs in a system - when to run them, the order they run in, how many resources they take up, how long they run, etcetera

Process scheduler: The part of the kernel that makes multitasking possible

Programming: Coding in a programming language

Programming language: Special languages that software developers use to write instructions for computers to execute

Programs: Basic instructions that tell the computer what to do

Punch cards: A sequence of cards with holes in them to automatically perform calculations instead of manually entering them by hand

Padding field: A series of zeros used to ensure the header is the correct total size

Pairing: When a wireless peripheral connects to a mobile device, and the two devices exchange information, sometimes including a PIN or password, so that they can remember each other

Patch panel: A device containing many physical network ports

Payload: The actual data being transported, which is everything that isn't a header

Payload length field: 16-bit field that defines how long the data payload section of the datagram is

Physical layer: It represents the physical devices that interconnect computers

Platform as a service: A subset of cloud computing where a platform is provided for customers to run their services

Point-To-Point VPN: Establishes a VPN tunnel between two sites but VPN tunneling logic is handled by network devices at either side, so that users don't all have to establish their own connections

Pointer resource record: It resolves an IP to a name

Port: It is a 16-bit number that's used to direct traffic to specific services running on a networked computer

Port forwarding: A technique where specific destination ports can be configured to always be delivered to specific nodes

Port preservation: A technique where the source port chosen by a client, is the same port used by the router

Preamble: The first part of an Ethernet frame, it is 8 bytes or 64 bits long and can itself be split into two sections

Presentation layer: It is responsible for making sure that the unencapsulated application layer data is actually able to be understood by the application in question

Private cloud: When a company owns the services and the rest of the cloud infrastructure, whether on-site or in a remote data center

Protocol: A defined set of standards that computers must follow in order to communicate properly is called a protocol

Protocol field: A protocol field is an 8-bit field that contains data about what transport layer protocol is being used

Proxy service: A server that acts on behalf of a client in order to access another service

PSH flag: One of the TCP control flags. PSH is short for push. This flag means that the transmitting device wants the receiving device to push currently- buffered data to the application on the receiving end as soon as possible

Public cloud: The cloud services provided by a third party

Public DNS servers: Name servers specifically set up so that anyone can use them for free

Packaged archives: The core or source software files that are compressed into one file

Packaged managers: An application that makes package installation and removal easier

Parameter: A value that is associated with a command

Parent directory & child directories: A parent directory is a directory that houses all subsequent child directories

Partition: A logical division of a hard disk that is treated as a separate unit by operating systems and file systems

Partition table: How the disk is partitioned on an OS

Paths: A main directory that branches off and holds other directories and files

Personal package archives: A software repository for uploading source packages to be built and published

Portable Executable (PE) format: Windows unique version of .exe

Primary account: The initial account you made during setup

Processes: Help the computer run programs

Process Explorer: A utility Microsoft created to let IT support specialists and system administrators look at running processes

Process ID: Unique identifier for processes on your computer

Process monitoring: A way of monitoring what processes are happening during installation

Programs: The applications that we can run

Prompt: A prompt shows you which directory you’re currently in

Q

Qwiklabs: An online platform which provides training in cloud services

Quad A (AAAA) record: It is very similar to an A record except that it returns in IPv6 address instead of an IPv4 address

R

RAM: Random Access Memory

Registers: An accessible location for storing the data that our CPU works with

Reimaging: The process of reimaging involves wiping and reinstalling an operating system using a disk image which is a copy of an operating system

Remote connection: The ability to connect an authorized person to a computer or network remotely; allows us to manage multiple machines from anywhere in the world

Remote Desktop Protocol (RDP): A secure network communication protocol developed by Microsoft that allows a user to connect to another device remotely

Return merchandise authorization (RMA): The process of receiving returned merchandise and authorizing a refund

RGB model: RGB or red, green, and blue model is the basic model of representing colors

ROM chip (Read Only Memory): A read-only memory chip where the BIOS is stored

Root cause: The main factor that's causing a range of issues

Router: A device that knows how to forward data between independent networks

RPM: Revolutions per minute

Receiving address: The MAC address of the access point that should receive the frame

Recursive name servers: Servers that perform full DNS resolution requests

Registrar: An organization responsible for assigning individual domain names to other organizations or individuals

Reverse lookup zone files: They let DNS resolvers ask for an IP, and get the FQDN associated with it returned

Reverse proxy: A service that might appear to be a single server to external clients, but actually represents many servers living behind it

Round robin: It is a concept that involves iterating over a list of items one by one in an orderly fashion

Router: A device that knows how to forward data between independent networks

Routing protocols: Special protocols the routers use to speak to each other in order to share what information they might have

RST flag: One of the TCP control flags. RST is short for reset. This flag means that one of the sides in a TCP connection hasn't been able to properly recover from a series of missing or malformed segments

Read and execute permission: Permissions that grant you access to read the file that exists and execute it if its runnable

Read permission: Permissions that grant you access to read the file that exists

Re-flash: A way to preserve end-user data on a device that you plan on resetting

Regular expression: A pattern matching language that describes words, phrases, or more complicated patterns; regular expressions are used to help you do advanced pattern based selection

Relative path: It is a path from your current directory

Remote connection: The ability to connect an authorized person to a computer or network remotely; allows us to manage multiple machines from anywhere in the world

Repository: A server that acts like a central storage location for packages

Resource monitoring: The most common way to quickly take a peek at how system resources are doing

Root directory: A parent directory for all other directories in a file system

Root user: It is the first user that gets automatically created when we install a Linux OS and has all the privileges on the OS. Also called the super user. There's technically only one superuser or root account, but anyone that's granted access to use their powers can be called a superuser too

S

SATA: The most popular serial ATA drive, which uses one cable for data transfers

Safe operating temperature: The temperature range in which rechargeable batteries must be kept in order to avoid demanage

Scalability: The measure of a system’s ability to increase or decrease in performance and cost in response to varying loads in system processing demands

SDRAM: It stands for Synchronous DRAM, this type of RAM is synchronized to our systems' clock speed allowing quicker processing of data

Server logs: Text files that contains recorded information about activities performed on a specific web server in a defined period of time

Servers: Devices that provide data to other devices that request that data, also known as a client

Scripting: Coding in a scripting language

Script: It is run by an interpreter, which interprets the code into CPU instructions just in time to run them

Scripts: Mainly used to perform a single or limited range task

Shell: A program that interprets text commands and sends them to the OS to execute

Standoffs: Used to raise and attach your motherboard to the case

SOC (System On a Chip): Packs the CPU, Ram, and sometimes even the storage onto a single chip

Software: The intangible instructions that tell the hardware what to do

Software bug: An error in software that causes unexpected results

Software management: A broad term used to refer to any and all kinds of software that are designed to manage or help manage some sort of project or task

Southbridge: It maintains our IO or input/output controllers, like hard drives and USB devices that input and output data.

SSH (Secure shell): A protocol implemented by other programs to securely access one computer from another.

SSH authentication key: A secure authentication method for accessing a computer from other device

SSH client: A program you must have installed on your device in order to establish an SSH connection with another device

SSH server: Software installed on a machine that allows for that device to accept an SSH connection

Standardization: A systematic way of naming hosts

Swap space: The allocated space where the virtual memory is stored on the hard drive when the amount of physical memory space is used up or full

SSD: Solid State Drive

Switches: Devices that help our data travel

System: A system refers to a group of hardware components and software components that work together to fun the programs or processes in the computer

System settings: Settings like display resolution, user accounts, network, devices, etc

System software: Software used to keep our core system running, like operating system tools and utilities

Sequence control field: A field that is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames

Sequence number: A 32-bit number that's used to keep track of where in a sequence of TCP segments this one is expected to be

Server: A device that provides data to another device that is requesting that data, also known as a client

Server or Service: A program running on a computer waiting to be asked for data

Service type field: A eight bit field that can be used to specify details about quality of service or QoS technologies

Session layer: The network layer responsible for facilitating the communication between actual applications and the transport layer

Short-range wireless network: It is what mobile devices uses to connect to their peripherals

Simplex communication: A form of data communication that only goes in one direction across a cable

Socket: The instantiation of an endpoint in a potential TCP connection

Software as a Service (SaaS): A way of licensing the use of software to others while keeping that software centrally hosted and managed

Source MAC address: The hardware address of the device that sent the ethernet frame or data packet. In the data packet it follows the destination MAC address

Source port: A high numbered port chosen from a special section of ports known as ephemeral ports

SRV record: A service record used to define the location of various specific services

Start Frame Delimiter (SFD): The last byte in the preamble, that signals to a receiving device that the preamble is over and that the actual frame contents will now follow

Start of authority: A declaration of the zone and the name of the name server that is authoritative for it

Static IP address: An IP address that must be manually configured on a node

Subnet mask: 32-bit numbers that are normally written as four octets of decimal numbers

Subnetting: The process of taking a large network and splitting it up into many individual smaller sub networks or subnets

Symmetric Digital Subscriber Line (SDSL): A device that establishes data connections across phone lines and has upload and download speeds that are the same

SYN flag: One of the TCP flags. SYN stands for synchronize. This flag is used when first establishing a TCP connection and make sure the receiving end knows to examine the sequence number field

SYN_RECEIVED: A TCP socket state that means that a socket previously in a listener state, has received a synchronization request and sent a SYN_ACK back

SYN_SENT: A TCP socket state that means that a synchronization request has been sent, but the connection hasn't been established yet

SACL’s: System Access Control List

SD devices: Mass storage devices like hard drives

Secure copy: A command you can use in Linux to copy files between computers on a network

Security patch: A piece of software that is meant to fix up a security hole

Session manager subsystem: Process that is in charge of setting some stuff up to work for the OS

Shared folders: A way to share files between computers on the same network on Windows

Shell: A shell is a command line interpreter for Linux

Shortcut: An entry in the MFT that has a reference to some destination, so that when you open it up, you get taken to that destination

Side-by-side assemblies: A system that manages most shared libraries and resources on Windows and supports access to multiple versions of the same shared library automatically

Side-loading: A process of installing mobile apps directly without using an app store

Signal: A way to tell a process that something has just happened

Simple permissions: Special or specific permissions

Single sign on (SSO): An account that grants you access to multiple accounts without require constant entry of a password or username

Softlinks: A shortcut in Linux, that allows us to link to another file using a file name

SSH (Secure shell): A protocol implemented by other programs to securely access one computer from another

SSH authentication key: A secure authentication method for accessing a computer from other devices

Standard error (stderr): A data stream that redirect the output of error messages in a different output stream. It works both in Linux and Windows

Standard In (stdin): A data stream in which the input that you provide through the keyboard goes to the standard in stream of the process that you're interacting with. It works both in Linux and Windows

Standard out (stdout): A data stream that when a process creates output, it adds data to the standard out stream, which flows out of the process. It works both in Linux and Windows

Standard user: A user who is given access to the machine but has restricted access to do thing like install software or change certain setting

Standard error (stderr): An output stream where error messages are sent from a program or process

Standard in (stdin): An input stream where data is sent into a program or process

Standard out (stdout): An output stream where data is sent from a program or process

Subdirectories: A directory below or at a deeper level in the directory hierarchy

Suspended apps: A command that will tell the OS to suspend background mobile apps

Swap space: The allocated space where the virtual memory is stored on the hard drive when the amount of physical memory space is used up or full

Symbolic links: Work similarly to shortcuts, but at the file system level. The key difference is that the operating system treats them like substitutes for the file they're linked to in almost every meaningful way

Sysinternals package: A set of tools released by Microsoft that can help you troubleshoot

System properties: A control panel applet that allows you to edit the size and number and location of paging files

 

 

T

Task bar: It gives us quick options and shows us information like network connectivity, the date, system notifications, sound etc

Terminal: A text based interface to the computer

Thermal paste: A substance used to better connect our CPU and heat sink, so the heat transfers from to the other better

Time slice: A very short interval of time that gets allocated to a process for CPU execution

Transfer Control Protocol (TCP): A protocol that handles reliable delivery of information from one network to another

Troubleshooting: The ability to diagnose and resolve a problem

Type-C connector: A type of USB connector meant to replace many peripheral connections

T-Carrier technologies: Technologies Invented to transmit multiple phone calls over a single link. Eventually, they also became common transmission systems to transfer data much faster than any dial-up connection could handle

TCP checksum: A mechanism that makes sure that no data is lost or corrupted during a transfer

TCP segment: A payload section of an IP datagram made up of a TCP header and a data section

TCP window: The range of sequence numbers that might be sent before an acknowledgement is required

Time-To-Live field (TTL): An 8-bit field that indicates how many router hops a datagram can traverse before it's thrown away

Top Level Domain (TLD): The top level of the DNS or the last part of a domain name. For example, the “com” in www.weather.com

Total hops: The total number of devices data passes through to get from its source to its destination. Routers try to choose the shortest path, so fewest hops possible. The routing table is used to keep track of this

Total length field: A 16-bit field that indicates the total length of the IP datagram it's attached to

Traffic class field: An 8-bit field that defines the type of traffic contained within the IP datagram and allows for different classes of traffic to receive different priorities

 

Transmission Control Protocol (TCP): The data transfer protocol most commonly used in the fourth layer. This protocol requires an established connection between the client and server

Transmitter address: The MAC address of whatever has just transmitted the frame

Transport layer: The network layer that sorts out which client and server programs are supposed to get the data

TTL: The lifetime limit of data given in seconds. This number can be configured by the owner of a domain name for how long a name server is allowed to cache in entry before it should discard it and perform a full resolution again

Twisted pair cable: The most common type of cabling used for connecting computing devices. It features pairs of copper wires that are twisted together

Two-factor authentication: A technique where more than just a username and password are required to authenticate. Usually, a short-lived numerical token is generated by the user through a specialized piece of hardware or software

TXT record: It stands for text and was originally intended to be used only for associating some descriptive text with a domain name for human consumption

Types of DNS servers: There are five primary types of DNS servers; caching name servers, recursive name servers, root name servers, TLD name servers, and authoritative name servers

Tab completion: A way to auto-complete a command or file names and directories

Task Manager: A Windows utility that allows you to gain information about what tasks you have running in the background

Termination signal: A kill command that will stop whatever process you tell it to

Trim: A command to delete unused data blocks so the space can be used for the computer’s storage needs

U

Ubuntu: The most popular Linux consumer distribution

UEFI: United Extensible Firmware Interface

USB (Universal Serial Bus): A connection standard for connecting peripherals to devices such as computers

USB-C adapter: One of the standard power, data and display connector types used in mobile devices

UTF-8: The most prevalent encoding standard used today

Uniform Resource Locator (URL): A web address similar to a home address

User name: A unique identifier for a user account

User space: The aspect of an operating system that humans interact with directly like programs, such as text editors, music players, system settings, user interfaces, etcetera

Unicast transmission: A unicast transmission is always meant for just one receiving address

Urgent pointer field: A field used in conjunction with one of the TCP control flags to point out particular segments that might be more important than others

URG flag: One of the TCP control flags. URG is short for urgent. A value of one here indicates that the segment is considered urgent and that the urgent pointer field has more data about this

User Datagram Protocol (UDP): A transfer protocol that does not rely on connections. This protocol does not support the concept of an acknowledgement. With UDP, you just set a destination port and send the data packet

Unix epoch: It is the number of seconds since midnight on January first, 1970. It's a 'Zero Hour' for Unix based computers to anchor their concept of time

UUID: Universally Unique ID

V

Virtual Box: An application you can use to install Linux and have it completely isolated from your machine

Virtual machine (VM): An application that uses physical resources like memory, CPU and storage, but they offer the added benefit of running multiple operating systems at once

Virtual memory: A combination of hard drive space and RAM that acts like memory which our processes can use

VPN (Virtual private network): A secure method of connecting a device to a private network over the internet

Version field: First field in an IP header that specifies the version of IP

Virtual LAN (VLAN): It is a technique that lets you have multiple logical LANs operating on the same physical equipment

Virtual Private Network (VPN): A technology that allows for the extension of a private or local network, to a host that might not work on that same local network

Virtualization: A single physical machine called a host runs many individual virtual instances called guests

VLAN header: A piece of data that indicates what the frame itself is. In a data packet it is followed by the EtherType

Variable: Files that constantly change

Virtual instance: A single virtual machine

Virtual memory: A combination of hard drive space and RAM that acts like memory which our processes can use

Volume: A format for a filesystem on a partition

VPN (Virtual private network): A secure method of connecting a device to a private network over the internet

W

WannaCry Attack: A cyber attack that started in Europe and infected hundreds of thousands of computers across the world

Wireless networking (Wi-Fi): Networks you connect to through radios and antennas

World Wide Web (WWW): The information system that enables documents and other web resources to be accessed over the Internet

Wide area network: Acts like a single network but spans across multiple physical locations. WAN technologies usually require that you contract a link across the Internet with your ISP

Wi-Fi Protected Access (WPA): A security program that uses a 128-bit key to protect wireless computer networks, which makes it more difficult to crack than WEP

Wired Equivalence Privacy (WEP): An encryption technology that provides a very low level of privacy. WEP should really only be seen as being as safe as sending unencrypted data over a wired connection

Wireless access point: A device that bridges the wireless and wired portions of a network

Wireless LANS (WLANS): One or more access points act as a bridge between a wireless and a wired network

Wireless networking: Networks you connect to through radios and antennas

Wildcard: A character that is used to help select files based on a certain pattern

Windows domain: A network of computers and users that are added to a central database

Windows Search service: A service that indexes files on your computer by looking through them on a schedule

Windows store: A Windows store is an application repository or warehouse where you can download and instal universal Windows platform apps

Windows update client service: System that runs in the background on your computer to download and install updates and patches for your operating system

Write permission: A permission that allows you to make changes to a file

Z

Zone Files: Simple configuration files that declare all resource records for a particular zone

 


Share: