Well, banyak banget orang-orang awam yang masih kurang paham beberapa istilah dalam dunia IT, mungkin sedikit catatan ini akan membantu.. Enjoy !
Terms and definitions from Google
A
Abstraction: To take a relatively complex system
and simplify it for our use
Address bus: Connects
the CPU to the MCC and sends over the location of the data, but not the data
itself
Algorithm: A series of steps that solves
specific problems.
Android: A mobile operating system based on
Linux
Application: A computer program
designed for a specific use
Application software: Any software created to fulfill a
specific need, like a text editor, web browser, or graphics editor
ARPANET: The earliest version of the Internet
that we see today, created by the US government project DARPA in the 1960s
ASCII: The oldest character encoding
standard used is ASCII. It represents the English alphabet, digits, and
punctuation marks
Assembly language: A language that allowed computer
scientists to use human readable instructions, assembled into code that the
machines could understand
ATA: The most common interface that hard
drives use to connect to our system
ATX (Advanced
Technology eXtended):
The most common form factor for motherboards
Automation: It makes processes work
automatically
A record: The most common resource record, used to
point a certain domain name at a certain IPv4 IP address
ACK flag: One of the TCP control flags. ACK is
short for acknowledge. A value of one in this field means that the
acknowledgment number field should be examined
Acknowledgement number: The number of the next expected segment
in a TCP sequence
Ad-Hoc network: A network configuration without
supporting network infrastructure. Every device involved with the ad-hoc
network communicates with every other device within range, and all nodes help
pass along messages
Address class system: A system which defines how the global IP
address space is split up
Address Resolution Protocol (ARP): A
protocol used to discover the hardware address of a node with a certain IP
address
Anycast: A technique that's used to route traffic
to different destinations depending on factors like location, congestion, or
link health
Application layer: The layer that allows network
applications to communicate in a way they understand
Application layer payload: The entire contents of whatever data
applications want to send to each other
ARP table: A list of IP addresses and the MAC
addresses associated with them
ASN: Autonomous System Number is a number
assigned to an individual autonomous system
Asymmetric Digital Subscriber Line (ADSL): A device that establishes data connections
across phone lines and different speeds for uploading and downloading data
Automatic allocation: A range of IP addresses is set aside for
assignment purposes
Absolute path: It is one that starts from the main directory
ACI: Access Control Lists
Administrator: A user that has complete control over a machine
Alias: A nickname for common commands
Appending flags: A way to add the data of the file without erasing
existing data
App Store apps: A Package Manager that acts as a repository
App Store repository: A app store service that also acts as a repository
App stores: A central managed marketplace for app developers to
publish and sell mobile apps
APPX: An APPX is
another way to package contents of a file to act like a unit of distribution
Archive: An archive
is comprised of one or more files that are compressed into a single file"
for verb agreement
B
Backward compatible: It means older hardware works with
newer hardware
Binary system: The communication that a computer
uses is referred to as binary system, also known as base-2 numeral system
Bios (Basic Input
Output Services): The
BIOS is software that helps initialize the hardware in our computer and gets
our operating system up and running
BIOS/UEFI: A low-level software that
initializes our computer's hardware to make sure everything is good to go
Block storage: It improves faster handling of data
because the data isn't stored in one long piece but in blocks, so it can be
accessed quicker
Boot: To start up a computer
Bootloader: A small program that loads the
operating system
Browser: A user interface for displaying and
interacting with web pages
BYOD (Bring Your Own
Device): Refers to
the practice of allowing people to use their own personal devices for work
Byte: A group of 8 bits
Baud rate: A measurement of how many bits could be
passed across a phone line in a second
Bit: The smallest representation of
data that a computer can understand
Bluetooth: The most common short range wireless network
Border Gateway Protocol (BGP):
A protocol by which routers
share data with each other
Broadband: Any connectivity technology that isn't
dial-up Internet
Broadcast:
A type of Ethernet
transmission, sent to every single device on a LAN
Broadcast
address: A special destination used by an Ethernet broadcast
composed by all Fs
Background
processes/Daemon processes: Processes that run or take place in the background
Bash: The language used to interact
with the shell
Biometric data: A way of protecting your
accounts and information using biometric data such as facial recognition and
fingerprint
Block devices: A system that acts like USB
drives and hard drive by transmitting data
C
Cache: The assigned stored location for recently or frequently
accessed data; on a mobile app it is where anything that was changed or created
with that app is stored
Character encoding: Is used to assign our binary values
to characters so that we as humans can read them
Charge cycle: One full charge and discharge of a
battery
Children's Online
Privacy Protection Act (COPPA): Regulates the information we show to children under the age of
13
Chipset: It decides how components talk to each other on our machine
Chrome OS: A Linux-based operating system
designed by Google
Clients: A device that receives data from a server
Clock cycle: When you send a voltage to the clock
wire
Clock speed: The maximum number of clock cycles
that it can handle in a set in a certain time period
Clock wire: When you send or receive data, it
sends a voltage to that clock wire to let the CPU know it can start doing
calculations
Coding: Translating one language to another
Command Line Interface
(CLI): A shell that
uses text commands to interact with the operating system
Compiled programming
language: A language
that uses human readable instructions, then sends them through a compiler
Computer: A device that stores and processes
data by performing calculations
Computer file: Data that we store and a file can be
anything, a word document, a picture, a song, literally anything
Copyright: Used when creating original work
CPU: Central processing unit
CPU sockets: A CPU socket is a series of pins that
connect a CPU’s processor to the PC’s motherboard
Cryptography: The overarching discipline that
covers the practice of coding and hiding messages from third parties
Cable categories: Groups of cables that are made with the same material. Most network cables used today can be split into two categories, copper and fiber
Cable modem termination system: Connects lots of different cable connections to an ISP's core network
Cable modem: A device that sits at the edge of a consumer's network and connects it to the cable modem termination system
Cables: Insulated wires that connect different devices to each other allowing data to be transmitted over them
Caching and recursive name servers: They are generally provided by an ISP or your local network, and their purpose is to store domain name lookups for a certain amount of time
Carrier-Sense Multiple Access with Collision Detection (CSMA/CD): CSMA/CD is used to determine when the communications channels are clear and when the device is free to transmit data
Channels: Individual, smaller sections of the overall frequency band used by a wireless network
Client: A device that receives data from a server
CLOSE: A connection state that indicates that the connection has been fully terminated, and that no further communication is possible
CLOSE_WAIT: A connection state that indicates that the connection has been closed at the TCP layer, but that the application that opened the socket hasn't released its hold on the socket yet
Cloud computing: The concept and technological approach of accessing data, using applications, storing files, etc. from anywhere in the world as long as you have an internet connection
CNAME: A resource record used to map one domain to another
Collision domain: A network segment where only one device can communicate at a time
Computer networking: The full scope of how computers communicate with each other
Connection-oriented protocol: A data-transmission protocol that establishes a connection at the transport layer, and uses this to ensure that all data has been properly transmitted
Connectionless protocol: A data-transmission protocol that allows data to be exchanged without an established connection at the transport layer. The most common of these is known as UDP, or User Datagram Protocol
Copper cable categories : These categories have different physical
characteristics like the number of twists in the pair of copper wires. These
are defined as names like category (or cat) 5, 5e, or 6, and how quickly data
can be sent across them and how resistant they are to outside interference are
all related to the way the twisted pairs inside are arranged
Crosstalk: Crosstalk is when an electrical pulse on
one wire is accidentally detected on another wire
Cyclical
Redundancy Check (CRC): A mathematical transformation that uses
polynomial division to create a number that represents a larger set of data. It
is an important concept for data integrity and is used all over computing, not
just network transmissions
Cache: The assigned stored location
for recently or frequently accessed data; on a mobile app it is where anything
that was changed or created with that app is stored
Centralized logging: Parsing logs in one central location
Character
devices: A way to transmit
data character by character like a keyboard and mouse
Child
directories: It is a directory housed by a parent directory
Chocolatey: A third party package manager
for Windows
CLI: Command line interpreter
Client/Server runtime subsystem: System that handles running Windows GUI and Command line
Closed source
packages: A source code
that does not allow public access
Command line: A text interface program for a computer that inputs text commands and translates them to the operating system
Command line mode: When you are able to run commands while still in your current shell
Computer
management: A tool that lets you manage a local or remote computer
D
DARPA: A US government project in
the 1960s that went on to create the earliest version of the Internet that we
see today
Data blocks: Data that can be broken down
into many pieces and written to different parts of the hard disk
Data sizes: Metrics that refer to data
sizes including bit, byte, kilobyte, kibibyte, and megabyte
DDR SDRAM (Double Data Rate SDRAM): A type of RAM that is faster, takes up less power, and has a larger
capacity than earlier SDRAM versions
Decimal form- base 10 system: In the decimal system, there are 10 possible numbers you can use
ranging from zero to nine
Desktop: The main screen where we can
navigate our files, folders, and applications
Digital divide: The growing skills gap
between people with and without digital literacy skills
DIMM: Dual Inline Memory Module
Display port: Port which also outputs audio
and video
Distribution: A version of the operating
system
Distributions: Some common Linux
distributions are Ubuntu, Debian, and Red Hat
Domain name: A website name; the part of
the URL following www.
Domain Name System (DNS): A global and highly distributed network service that resolves strings
of letters, such as a website name, into an IP address
DRAM: Dynamic Random Access Memory
Drivers: The drivers contain the
instructions our CPU needs to understand external devices like keyboards,
webcams, printers
DVI: DVI cables generally just
output video
Datalink layer: The layer in which the first
protocols are introduced. This layer is responsible for defining a common way
of interpreting signals, so network devices can communicate
Data offset field: The number of the next expected segment in a TCP packet/datagram
Data packet: An all-encompassing term that
represents any single set of binary data being sent across a network link
Data payload section: Has all of the data of the protocols further up the stack of a frame
Demarcate: To set the boundaries of
something
Demarcation point: Where one network or system ends and another one begins
Demultiplexing: Taking traffic that's all
aimed at the same node and delivering it to the proper receiving service
Destination MAC address: The hardware address of the intended recipient that immediately
follows the start frame delimiter
Destination network: The column in a routing table that contains a row for each network that
the router knows about
Destination port: The port of the service the TCP packet is intended for
DHCP: A technology that assigns an
IP address automatically to a new device. It is an application layer protocol
that automates the configuration process of hosts on a network
DHCP discovery: The process by which a client
configured to use DHCP attempts to get network configuration information
Dial-up: Uses POTS for data transfer,
and gets its name because the connection is established by actually dialing a
phone number
DNS zones: A portion of space in the
Domain Name System (DNS) that is controlled by an authoritative name server
Domain: Used to demarcate where
control moves from a top-level domain name server to an authoritative name
server
Domain name: A website name; the part of
the URL following www.
Domain Name System (DNS): A global and highly distributed network service that resolves strings
of letters, such as a website name, into an IP address
Dotted decimal notation: A format of using dots to separate numbers in a string, such as in an IP
address
DSL: Digital subscriber line was
able to send much more data across the wire than traditional dial-up
technologies by operating at a frequency range that didn't interfere with
normal phone calls
DSLAM: Digital Subscriber Line
Access Multiplexers are devices that connect multiple DSL connections to a
high-speed digital communications channel
Duplex communication: A form of communication where information can flow in both directions
across a cable
Duration field: Specifies how long the total
frame is
Dynamic allocation: A range of IP addresses is set aside for client devices and one of these
IPs is issued to these devices when they request one
Dynamic IP address: An IP address assigned automatically to a new device through a
technology known as Dynamic Host Configuration Protocol
DACL: Directory Control Lists
Data: Actual content of a file
Data buffer: A region of RAM that’s used to
temporarily store data while it’s being moved around
Debian(.deb): A Debian package is packaged as
a .deb file
Defragmentation: A process of taking all the
files stored on a given disk and reorganizing them into neighboring locations
Device manager: A console management system for
your device
Disk Management
utility: Native tool for
Windows that helps with managing disk space
Disk to disk
cloning: A type of cloning
that happens when you connect an external hard drive to the machine you want to
clone
Driver: Used to help our hardware
devices interact with our Operating System
Dynamic-link
libraries: Programs that want to use functionality that the code provides can
tap into it if they need to (shared libraries)
E
Electrostatic discharge: Electrostatic discharge is a sudden and momentary flow of electric
current between two electrically charged objects caused by contact, an
electrical short or dielectric breakdown
Error message: Helpful indicators that can
point you in the right direction
Etcher.io: A tool you can use to load an install image onto your USB device
and make it bootable
Ethernet cable: It lets you physically
connect to the network through a cable
.exe: A file extension found in
Windows for an executable file
Expansion slots: Give us the ability to
increase the functionality of our computer
External Data Bus (EDB): It's a row of wires that interconnect the parts of our computer
Error detection: The ability for a protocol or program to
determine that something went wrong
Error recovery: The ability for a protocol or program
to attempt to fix an error
ESTABLISHED: Status indicating that the TCP
connection is in working order, and both sides are free to send each other data
Ethernet: The protocol most widely used to send
data across individual links
Ethernet frame: A highly structured collection of
information presented in a specific order
EtherType field: It follows the Source MAC Address in a
dataframe. It's 16 bits long and used to describe the protocol of the contents
of the frame
Exterior gateway: Protocols that are used for the exchange
of information between independent autonomous systems
Enterprise app
management: A management system that allows an organization to to distribute
custom mobile apps
Environment: Whatever settings or variables
a child process inherits from the parent’s process
Escape
characters: A concept that means that the next character after the back tick
should be treated literally
Event Viewer: A place where all events that
have been logged are stored
Executable file: A file containing instructions
for a computer to execute when they’re run
.exe: A file extension found in
Windows for an executable file
F
Factory reset: Resetting
a device to the settings it came with from the factory
Fiber optic cable:
Fiber optic cables contain individual optical fibers which are tiny tubes made
of glass about the width of a human hair. Unlike copper, which uses electrical
voltages, fiber cables use pulses of light to represent the ones and zeros of
the underlying data
File extension: The appended part of a filename that
tells us what type of file it is in certain operating systems
File handling: A process of storing data using a
program
File system:
A system used to manage
files
Finder: The file manager for all Macs
Firmware: Software that's permanently stored
on a computer component
Folders/Directories: Used to organize files
Form factor: A mathematical way to compensate for
irregularities in the shape of an object by using a ratio between its volume
and height
Fiber cable: Fiber optic cables contain individual
optical fibers which are tiny tubes made of glass about the width of a human
hair. Unlike copper, which uses electrical voltages, fiber cables use pulses of
light to represent the ones and zeros of the underlying data
FIN: One of the TCP control flags. FIN is
short for finish. When this flag is set to one, it means the transmitting
computer doesn't have any more data to send and the connection can be closed
FIN_WAIT: A TCP socket state indicating that a FIN
has been sent, but the corresponding ACK from the other end hasn't been
received yet
Firewall: It is a device that blocks or allows
traffic based on established rules
Five layer model: A model used to explain how network
devices communicate. This model has five layers that stack on top of each
other: Physical, Data Link, Network, Transport, and Application
Fixed allocation: Requires a manually specified list of
MAC address and the corresponding IPs
Flag field: It is used to indicate if a datagram is
allowed to be fragmented, or to indicate that the datagram has already been
fragmented
Flat file: A collection of records/information that
follow a consistent format with rules around stored values. On a host computer,
one use is to have a list of network address and host name pairs (a hosts file)
Flow label field: 20-bit field that's used in conjunction with the traffic class field for routers to make decisions about the quality of service level for a specific datagram
Fragmentation: The process of taking a single IP datagram and splitting it up into several smaller datagrams
Fragmentation offset field: It contains values used by the receiving end to take all the parts of a fragmented packet and put them back together in the correct order
Frame check sequence: It
is a 4-byte or 32-bit number that represents a checksum value for the
entire frame
Frame control field: 16 bits long, it contains a number of sub-fields that are used to describe how the frame itself should be processed
Frequency band: A certain section of the radio spectrum
that's been agreed upon to be used for certain communications
FTP: An older method used for transferring
files from one computer to another, but you still see it in use today
FTTB: Fiber to the building, fiber to the
business or even fiber to the basement, since this is generally where cables to
buildings physically enter. FTTB is a setup where fiber technologies are used
for data delivery to an individual building
FTTH: Fiber to the home. This is used in
instances where fiber is actually run to each individual residents in a
neighborhood or apartment building
FTTN: Fiber to the neighborhood. This means
that fiber technologies are used to deliver data to a single physical cabinet
that serves a certain amount of the population
FTTP: Fiber to the premises. FTTH and FTTB may
both also be referred to as FTTP
FTTX: Stands for fiber to the X, where the X
can be one of many things
Full duplex: The capacity of devices on either side of
a networking link to communicate with each other at the exact same time
Fully qualified domain name: When you combine all the parts of a
domain together
Form factor: A mathematical way to compensate for
irregularities in the shape of an object by using a ratio between its volume
and height
Factory reset: Resetting a device to the settings it came with from the factory
File permissions: A process for setting permissions for who has access to certain files
File record number: The index of the files entry in the MFT
File system: Used to keep track of files and file storage on a disk
Full control: A user or group with full control that can do anything they want to files
G
GIT: A version control system that helps
keep track of changes made to files and directories
Globalization: The movement that lets governments,
businesses, and organizations communicate and integrate together on an
international scale
Groups: A collection of users
GUI: A graphical user interface
GUID partition
table: Only used if you
are using UEFI booting
H
Hard drive: It is a long term
memory component that holds all of our data, which can include music, pictures,
applications
Hardware: External or internal
devices and equipment that help you perform major functions
Hardware resource deficiency: It
refers to the lack of system resources like memory, hard drive space, etc
HDD (Hard disk drive): Hard disk
drives, or HDDs, use a spinning platter and a mechanical arm to read and write
information
HDMI: A type of cable that
outputs both video and audio
Heatsink: It is used to
dissipate heat from our CPU
HFS+/APFS: HFS+ is a journaling
system developed by Apple Inc. and APFS is another but more encrypted Apple
journaling system
Hostname: Used to identify the
computer when it needs to talk to other computers
Hubs: Devices that serve as a
central location through which data travels through
Half-duplex: It means that, while communication is
possible in each direction, only one device can be communicating at a time
Handshake: A way for two devices to ensure that
they're speaking the same protocol and will be able to understand each other
HDSL: High Bit-rate Digital Subscriber Lines.
These are DSL technologies that provision speeds above 1.544 megabits per
second
Header checksum field: A checksum of the contents of the entire
IP datagram header
Header length field: A four bit field that declares how long
the entire header is. It is almost always 20 bytes in length when dealing with
IPv4
Hexadecimal: A way to represent numbers using a
numerical base of 16
Hop limit field: An 8-bit field that's identical in
purpose to the TTL field in an IPv4 header
Host file: It is a flat file that contains, on each
line, a network address followed by the host name it can be referred to as
Hub: It is a physical layer device that
broadcasts data to everything computer connected to it
Hybrid
cloud: Used to describe situations where companies might run things like
their most sensitive proprietary technologies on a private cloud or on premise while entrusting their less sensitive servers to a public cloud
Hypervisor: A piece of software that runs and manages virtual machines while also offering guests a virtual operating platform that's indistinguishable from actual hardware
Hard link: When created in NTFS, an
entry is added to the MFT that points to the linked file record number, not the
name of the file. This means the file name of the target can change and the
hard link will still point to it
Hardware ID: A special string of characters
assigned to hardware
Having dependencies: A process of counting on other pieces of software to make an application
work since one bit of code depends on another in order to work
Hidden files: A set of files that are not
visible either to avoid alteration or simply because you don’t want someone to
see them
Hot key: A keyboard shortcut that does
a particular task
I
Information technology: The use
of digital technology, like computers and the internet, to store and process
data into useful information
Input/Output device: A device
that performs input and output, including monitors, keyboards, mice, hard disk
drives, speakers, bluetooth headsets, webcams, and network adapters
Install image: A downloadable
operating system image used to install an operating system on a device
Instruction set: A list of
instructions that our CPU is able to run
Internet: A worldwide system of
interconnected networks
Internet Corporation for Assigned Names and Numbers
(ICANN): Where
website names are registered
Internet Protocol version 4 (IPv4): An address that consists
of 32 bits separated into four groups
Internet Protocol version 6 (IPv6): An address that consist
of a 128 bits, four times the amount that IPv4 uses
Internet service provider (ISP):
A company that provides a
consumer an internet connection
Internet of Things (IoT): The concept that more and more
devices are connected to the internet in a smarter fashion such as smart
thermostats that turn off the air conditioner when you leave and turn it on
when you come back
Interpreted programming language: A language that isn't compiled ahead of time
I/O management: Anything that can give us input or that we can use
for output of data
iOS: A mobile operating system
developed by Apple Inc.
IP address: The most common protocol used in the network layer,
used to helps us route information
ITX
(Information Technology eXtended): A form factor for motherboards that is much smaller
than ATX boards
IANA: The Internet Assigned Numbers Authority,
is a non-profit organization that helps manage things like IP address
allocation
ICMP: Internet control message protocol is used by router or remote hosts to communicate error messages when network problems prevent delivery of IP packets
ICMP payload: Piece of the packet which lets the recipient of the message knows which of their transmissions caused the error being reported
Identification field: It is a 16-bit number that's used to group messages together
Infrastructure as a Service (IaaS): A subset of cloud computing where a network and servers are provided for customers to run their services
Instantiation: The actual implementation of something defined elsewhere
Interface: For a router, the port where a router connects to a network. A router gives and receives data through its interfaces. These are also used as part of the routing table
Interior gateway: Interior gateway protocols are used by
routers to share information within a single autonomous system
Internet Protocol (IP): The most common protocol used in the
network layer
Internet Service Provider (ISP): A
company that provides a consumer an internet connection
Internetwork: A collection of networks connected
together through routers - the most famous of these being the Internet
IP datagram: a highly structured series of fields
that are strictly defined
IP masquerading: The
NAT obscures the sender's IP address from the receiver
IP options field: An optional field and is used to set special
characteristics for datagrams primarily used for testing purposes
IPv6 tunnel: IPv6 tunnel servers on either end of a
connection take incoming IPv6 traffic and encapsulate it within traditional
IPv4 datagrams
IPv6 tunnel brokers: Companies that provide IPv6 tunneling
endpoints for you, so you don't have to introduce additional equipment to your
network
Inherit only: A permission group that
means that a DACL will be inherited, but not applied to a container
Inode: A file structure for metadata
and files
Installing from source: A process of installing from a source
Interactive mode: When the parted tool launches you into a separate program
I/O Streams: An input stream handles data
flowing into and out of a program
J
–
K
Kernel: The main core of an operating system
that creates processes, efficiently schedules them, and manages how processes
are terminated
Kernel module: It extends the kernel's
functionality so developers don't have to actually touch the Linux kernel
L
Land Grid Array (LGA): It is a type of CPU socket that
stick out of the motherboard
Lightning adaptor: One of the standard power, data and
display connector types used in mobile devices
Linux OS: Linux is one of the largest an open
source operating system used heavily in business infrastructure and in the
consumer space
Logic gates: Allow transistors to do more complex tasks, like decide where to
send electrical signals depending on logical conditions
Logs: Files that record system events on
our computer
Line coding: Modulation used for computer
networks
Link-local unicast address: Allow for local network segment communications and are configured based upon a host's MAC address
Listen: It means that a TCP socket is ready and listening for incoming connections
Local Area Network (LAN): A single network in which multiple
devices are connected
Loopback address: An IP address that always points to
itself. This type of address is used to test internal pathing through the
TCP/IP protocols
Library: A way to package a bunch of useful
code that someone else wrote
List folder
contents: A command that
will execute and list folder contents and is an alias for Read and Execute
Logging: The act of creating log events
Log rotation: A way for the OS to clean out
log files to make room for new ones
M
Mac OS: Apple's operating system
Mb/s: megabit per second, which is a unit
of data transfer rate
Memory controller chip
(MCC): A bridge
between the CPU and the RAM
Memory usage: The amount of memory available in your system as well as what
memory is currently being used by other applications
Memory management: One of the functions that a kernel performs; it optimizes memory
usage and make sure our applications have enough memory to run
Metadata: Tells us everything we need to know
about a file, including who created it, when it was last modified, who has
access to it, and what type of file it is.
Micro display port: One of the standard power, data and
display connector types used in mobile devices
Micro HDMI: One of the standard power, data and
display connector types used in mobile devices
Micro USB: One of the standard power, data and
display connector types used in mobile devices
Microsoft Terminal
Services Client: A
client program used to create RDP connections to remote computers
Mini HDMI: One of the standard power, data and
display connector types used in mobile devices
Mini USB: One of the standard power, data and
display connector types used in mobile devices
Motherboard: The body or circulatory system of the
computer that connects all the pieces together
MAC(Media Access Control) address: A
globally unique identifier attached to an individual network interface. It's a
48-bit number normally represented by six groupings of two hexadecimal numbers
MAC filtering: Access points are configured to only
allow for connections from a specific set of MAC addresses belonging to devices
you trust
Mesh networks: Like ad-hoc networks, lots of devices
communicate with each other device, forming a mesh if you were to draw lines
for all the links between all the nodes
Metered connection: An internet connection where all data
transfer usage is tracked. Cell phone plans that have a limit on data usage per
month or that charge based on usage are examples of metered connections
Modulation: A way of varying the voltage of a
constant electrical charge moving across a standard copper network cable
Multicast: A way of addressing groups of hosts all
at once
Multicast frame: If the least significant bit in the
first octet of a destination address is set to one, it means you're dealing
with a multicast frame. A multicast frame is similarly set to all devices on
the local network signal, and it will be accepted or discarded by each device
depending on criteria aside from their own hardware MAC address
Multiplexing: It means that nodes on the network have
the ability to direct traffic toward many different receiving services
MX record: It stands for mail exchange and this
resource record is used in order to deliver email to the correct server
Manifest: A library used if an
application needs to use a shared library
Master boot
record (MBR): a traditional partition table within a storage disk that lets you
have volume sizes of 2 terabytes or less and is mostly used in the Windows OS
Master file table
(MFT): A way NTFS stores
and represents the files you’re working with on your operating system
Memory manager: A Windows OS program that helps
manage virtual memory
Metadata: Tells us everything we need to
know about a file, including who created it, when it was last modified, who has
access to it, and what type of file it is.
Microsoft Install
Package(.msi) and MSI files: Microsoft Install Package is
a file extension used to guide a program called Windows Installer in the
installation, maintenance, and removal of programs of the windows operating
systems. MSI files are a combination of of databases that contain installation
instructions in different tables along with all the files
Mobile
applications: Software that is distributed on mobile OS devices
Mobile device
management: A system used to apply and enforce rules about how the device has
to be configured and used
Modify: An umbrella permission that
includes read and execute and write
Mounting: Making a file or hard disk
accessible to the computer
Multilingual user
interface: Interface that offers and support different languages
N
Network: The interconnection of computers
Network Address
Translation (NAT): A
mitigation tool that lets organizations use one public IP address and many
private IP addresses within the network
Network stack: A set of hardware or software that
provides the infrastructure for a computer
Networking: Managing, building and designing
networks
Networking protocols: A set of rules for how we transfer
data in a network
Northbridge: interconnects stuff like RAM and
video cards.
NVMe (NVM Express): interface standard which allows
greater throughput of data and increased efficiency.
Name resolution: This process of using DNS to turn a
domain name into an IP address
Network Address Translation (NAT): A mitigation tool that lets organizations
use one public IP address and many private IP addresses within the network
Network layer: It's the layer that allows different
networks to communicate with each other through devices known as routers. It is
responsible for getting data delivered across a collection of networks
Network port: The physical connector to be able to
connect a device to the network. This may be attached directly to a device on a
computer network, or could also be located on a wall or on a patch panel
Network switch: It is a level 2 or data link device that
can connect to many devices so they can communicate. It can inspect the
contents of the Ethernet protocol data being sent around the network, determine
which system the data is intended for and then only send that data to that one
system
Next header field: Defines what kind of header is
immediately after this current one
Next hop: The IP address of the next router that
should receive data intended for the destination networking question or this
could just state the network is directly connected and that there aren't any
additional hops needed. Defined as part of the routing table
Node: Any device connected to a network. On
most networks, each node will typically act as a server or a client
Non-metered connection: A connection where your data usage is not
tracked or limited, instead you are charged a flat fee for unlimited and
unrestricted usage. A Wi-Fi connection is an example of a non-metered connection
Non-routable address space: They are ranges of IPs set aside for use
by anyone that cannot be routed to
NS record: It indicates other name servers that may
also be responsible for a particular zone
NTP servers: Used to keep all computers on a network
synchronized in time
O
Open SSH: The most popular program to use SSH
within Linux
Open Source: This means the developers will let
other developers share, modify, and distribute their software for free
Operating system: The whole package that manages our
computers resources and lets us interact with it
Overclocking: it increases the rate of your CPU
clock cycles in order to perform more tasks
Octet: Any number that can be represented by 8
bits
Optical
Network Terminator: Converts data from protocols the fiber
network can
understand to those that are more traditional twisted pair copper networks can understand
Options field: It is sometimes used for more complicated flow control protocols
Organizationally Unique Identifier (OUI): The
first three octets of a MAC address
OSI model: A model used to define how network
devices communicate. This model has seven layers that stack on top of each
other: Physical, Data Link, Network, Transport, Session, Presentation, and
Application
OTA update: A type of update that is
installed by the mobile device itself
P
PC:
It means personal
computer, which technically means a computer that one person uses
PCI Express: Peripheral Component Interconnect
Express
PDA (Personal Digital
Assistant): Allows
computing to go mobile
Peripherals: the external devices which we
connect to our computer that add functionality, like: a mouse, a keyboard, and
a monitor
Permission denied: An error message you might find when
accessing a protected file
Pin Grid Array (PGA): CPU socket where the pins are
located on the processor itself
Plink (PuTTY Link): A tool built into the command line
after PuTTY is installed that is used to make remote SSH connections
Ports: Connection points that we can
connect devices to that extend the functionality of our computer
POST (Power On Self
Test): It figures
out what hardware is on the computer
Powershell: A shell (program that interprets text
commands) for Windows
Power supply: Converts electricity from our wall
outlet onto a format that our computer can use
Power user: Above average computer users
Process management:
The capacity to manage
the many programs in a system - when to run them, the order they run in, how
many resources they take up, how long they run, etcetera
Process scheduler: The part of the kernel that makes
multitasking possible
Programming:
Coding in a programming
language
Programming language: Special languages that software
developers use to write instructions for computers to execute
Programs: Basic instructions that tell the
computer what to do
Punch cards: A sequence of cards with holes in
them to automatically perform calculations instead of manually entering them by
hand
Padding field: A series of zeros used to ensure the
header is the correct total size
Pairing: When a wireless peripheral connects to a
mobile device, and the two devices exchange information, sometimes including a
PIN or password, so that they can remember each other
Patch panel: A device containing many physical network
ports
Payload: The actual data being transported, which
is everything that isn't a header
Payload length field: 16-bit field that defines how long the
data payload section of the datagram is
Physical layer: It represents the physical devices that
interconnect computers
Platform as a service: A subset of cloud computing where a
platform is provided for customers to run their services
Point-To-Point VPN: Establishes a VPN tunnel between two
sites but VPN tunneling logic is handled by network devices at either side, so
that users don't all have to establish their own connections
Pointer resource record: It resolves an IP to a name
Port: It is a 16-bit number that's used to
direct traffic to specific services running on a networked computer
Port forwarding: A technique where specific destination
ports can be configured to always be delivered to specific nodes
Port preservation: A technique where the source port
chosen by a client, is the same port used by the router
Preamble: The first part of an Ethernet frame, it
is 8 bytes or 64 bits long and can itself be split into two sections
Presentation layer: It is responsible for making sure that
the unencapsulated application layer data is actually able to be understood by
the application in question
Private cloud: When a company owns
the services and the rest of the cloud infrastructure, whether on-site or in a
remote data center
Protocol: A defined set of standards that computers
must follow in order to communicate properly is called a protocol
Protocol field: A protocol field is an 8-bit field that
contains data about what transport layer protocol is being used
Proxy service: A server that acts on behalf of a client
in order to access another service
PSH flag: One of the TCP control flags. PSH is short
for push. This flag means that the transmitting device wants the receiving
device to push currently- buffered data to the application on the receiving end
as soon as possible
Public cloud: The cloud services provided by a third party
Public DNS servers: Name servers specifically set up so that
anyone can use them for free
Packaged
archives: The core or
source software files that are compressed into one file
Packaged
managers: An application that
makes package installation and removal easier
Parameter: A value that is associated with
a command
Parent directory
& child directories: A parent directory is a directory that houses all subsequent child
directories
Partition: A logical division of a hard
disk that is treated as a separate unit by operating systems and file systems
Partition table: How the disk is partitioned on
an OS
Paths:
A main directory
that branches off and holds other directories and files
Personal package
archives: A software
repository for uploading source packages to be built and published
Portable
Executable (PE) format: Windows unique version of .exe
Primary account: The initial account you made
during setup
Processes: Help the computer run programs
Process Explorer:
A utility
Microsoft created to let IT support specialists and system administrators look
at running processes
Process ID: Unique identifier for processes
on your computer
Process
monitoring: A way of monitoring what processes are happening during
installation
Programs: The applications that we can
run
Prompt: A prompt shows you which
directory you’re currently in
Q
Qwiklabs: An online platform which provides
training in cloud services
Quad A (AAAA) record: It is very similar to an A record except
that it returns in IPv6 address instead of an IPv4 address
R
RAM: Random Access Memory
Registers: An accessible location for storing
the data that our CPU works with
Reimaging: The process of reimaging involves wiping and reinstalling
an operating system using a disk image which is a copy of an operating system
Remote connection: The
ability to connect an authorized person to a computer or network remotely;
allows us to manage multiple machines from anywhere in the world
Remote Desktop Protocol
(RDP): A secure
network communication protocol developed by Microsoft that allows a user to
connect to another device remotely
Return merchandise
authorization (RMA): The
process of receiving returned merchandise and authorizing a refund
RGB model: RGB or red, green, and blue model is
the basic model of representing colors
ROM chip (Read Only
Memory): A read-only
memory chip where the BIOS is stored
Root cause: The main factor that's causing a
range of issues
Router: A device that knows how to forward
data between independent networks
RPM: Revolutions per minute
Receiving address: The MAC address of the access point that
should receive the frame
Recursive name servers: Servers that perform full DNS resolution
requests
Registrar: An organization responsible for assigning
individual domain names to other organizations or individuals
Reverse lookup zone files: They let DNS resolvers ask for an IP, and
get the FQDN associated with it returned
Reverse proxy: A service that might appear to be a single
server to external clients, but actually represents many servers living behind
it
Round robin: It is a concept that involves iterating
over a list of items one by one in an orderly fashion
Router: A device that knows how to forward data
between independent networks
Routing protocols: Special protocols the routers use to speak
to each other in order to share what information they might have
RST flag: One of the TCP control flags. RST is short
for reset. This flag means that one of the sides in a TCP connection hasn't
been able to properly recover from a series of missing or malformed segments
Read and execute permission: Permissions that grant you access to read the file that exists and
execute it if its runnable
Read permission: Permissions that grant you access to read the file that exists
Re-flash: A way to preserve end-user data on a device that you plan on resetting
Regular expression: A pattern matching language that describes words, phrases, or more
complicated patterns; regular expressions are used to help you do advanced
pattern based selection
Relative path: It is a path from your current directory
Remote connection: The ability to connect an authorized person to a computer or network
remotely; allows us to manage multiple machines from anywhere in the world
Repository: A server that acts like a central storage location for packages
Resource monitoring: The most common way to quickly take a peek at how system resources are
doing
Root directory: A parent directory for all other directories in a file system
Root user: It is the first user that gets automatically created when we install a
Linux OS and has all the privileges on the OS. Also called the super user.
There's technically only one superuser or root account, but anyone that's
granted access to use their powers can be called a superuser too
S
SATA: The most popular serial ATA drive,
which uses one cable for data transfers
Safe operating
temperature: The
temperature range in which rechargeable batteries must be kept in order to
avoid demanage
Scalability: The measure of a system’s ability to
increase or decrease in performance and cost in response to varying loads in
system processing demands
SDRAM: It stands for Synchronous DRAM, this
type of RAM is synchronized to our systems' clock speed allowing quicker
processing of data
Server logs: Text files that contains recorded
information about activities performed on a specific web server in a defined
period of time
Servers: Devices that provide data to other
devices that request that data, also known as a client
Scripting:
Coding in a scripting
language
Script: It is run by an interpreter, which
interprets the code into CPU instructions just in time to run them
Scripts: Mainly used to perform a single or
limited range task
Shell: A program that interprets text
commands and sends them to the OS to execute
Standoffs: Used to raise and attach your
motherboard to the case
SOC (System On a Chip):
Packs the CPU, Ram,
and sometimes even the storage onto a single chip
Software: The intangible instructions that
tell the hardware what to do
Software bug:
An error in software
that causes unexpected results
Software management: A broad term used to refer to any and
all kinds of software that are designed to manage or help manage some sort of
project or task
Southbridge: It maintains our IO or input/output
controllers, like hard drives and USB devices that input and output data.
SSH (Secure shell): A
protocol implemented by other programs to securely access one computer from
another.
SSH authentication key: A
secure authentication method for accessing a computer from other device
SSH client: A program you must have
installed on your device in order to establish an SSH connection with another
device
SSH server: Software installed on a
machine that allows for that device to accept an SSH connection
Standardization: A systematic way of naming hosts
Swap space: The allocated space where the
virtual memory is stored on the hard drive when the amount of physical memory
space is used up or full
SSD: Solid State Drive
Switches: Devices that help our data travel
System: A
system refers to a group of hardware components and software components that
work together to fun the programs or processes in the computer
System settings:
Settings like display
resolution, user accounts, network, devices, etc
System software: Software used to keep our core system
running, like operating system tools and utilities
Sequence control field: A field that is 16 bits long and mainly
contains a sequence number used to keep track of ordering the frames
Sequence number: A 32-bit number that's used to keep track
of where in a sequence of TCP segments this one is expected to be
Server: A device that provides data to another
device that is requesting that data, also known as a client
Server or Service: A program running on a computer waiting to
be asked for data
Service type field: A eight bit field that can be used to
specify details about quality of service or QoS technologies
Session layer: The network layer responsible for
facilitating the communication between actual applications and the transport
layer
Short-range wireless network: It is what mobile devices uses to connect to their peripherals
Simplex communication: A form of data communication that only
goes in one direction across a cable
Socket: The instantiation of an endpoint in a
potential TCP connection
Software as a Service (SaaS):
A way of licensing the use of
software to others while keeping that software centrally hosted and managed
Source MAC address: The hardware address of the device that
sent the ethernet frame or data packet. In the data packet it follows the
destination MAC address
Source port: A high numbered port chosen from a special
section of ports known as ephemeral ports
SRV record: A service record used to define the
location of various specific services
Start Frame Delimiter (SFD): The last byte in the preamble, that signals
to a receiving device that the preamble is over and that the actual frame
contents will now follow
Start of authority: A declaration of the zone and the name of
the name server that is authoritative for it
Static IP address: An IP address that must be manually
configured on a node
Subnet mask: 32-bit numbers that are normally written as
four octets of decimal numbers
Subnetting: The process of taking a large network and
splitting it up into many individual smaller sub networks or subnets
Symmetric Digital Subscriber
Line (SDSL): A
device that establishes data connections across phone lines and has upload and
download speeds that are the same
SYN flag: One of the TCP flags. SYN stands for
synchronize. This flag is used when first establishing a TCP connection and
make sure the receiving end knows to examine the sequence number field
SYN_RECEIVED: A TCP socket state that means that a socket
previously in a listener state, has received a synchronization request and sent
a SYN_ACK back
SYN_SENT: A TCP
socket state that means
that a synchronization request has been sent, but the connection hasn't been
established yet
SACL’s: System Access Control List
SD devices: Mass storage devices like hard
drives
Secure copy: A command you can use in Linux
to copy files between computers on a network
Security patch: A piece of software that is
meant to fix up a security hole
Session manager
subsystem: Process that is in charge of setting some stuff up to work for the
OS
Shared folders: A way to share files between
computers on the same network on Windows
Shell:
A
shell is a command line interpreter for Linux
Shortcut: An entry in the MFT that has a
reference to some destination, so that when you open it up, you get taken to
that destination
Side-by-side
assemblies: A system that manages most shared libraries and resources on
Windows and supports access to multiple versions of the same shared library
automatically
Side-loading: A process of installing mobile
apps directly without using an app store
Signal: A way to tell a process that
something has just happened
Simple
permissions: Special or specific permissions
Single sign on
(SSO): An account that
grants you access to multiple accounts without require constant entry of a
password or username
Softlinks: A shortcut in Linux, that allows us to link to another file using a file
name
SSH (Secure shell): A protocol implemented by other programs to securely access one
computer from another
SSH authentication key: A secure authentication method for accessing a computer from other
devices
Standard error
(stderr): A data stream that redirect the output of error messages
in a different output stream. It works both in Linux and Windows
Standard In
(stdin): A data stream in
which the input that you provide through the keyboard goes to the standard in
stream of the process that
you're interacting with. It works both in Linux and Windows
Standard out
(stdout): A data stream that when a process
creates output, it adds data to the standard out stream, which flows out of the
process. It works both in Linux and Windows
Standard user: A user who is given access to
the machine but has restricted access to do thing like install software or
change certain setting
Standard error (stderr): An output stream where error messages are sent from a program or process
Standard in (stdin): An input stream where data is sent into a program or process
Standard out (stdout): An output stream where data is sent from a program or process
Subdirectories: A directory below or at a
deeper level in the directory hierarchy
Suspended apps: A command that will tell the OS
to suspend background mobile apps
Swap space: The allocated space where the
virtual memory is stored on the hard drive when the amount of physical memory
space is used up or full
Symbolic links: Work similarly to shortcuts,
but at the file system level. The key difference is that the operating system
treats them like substitutes for the file they're linked to in almost every
meaningful way
Sysinternals
package: A set of tools
released by Microsoft that can help you troubleshoot
System
properties: A control panel applet that allows you to edit the size and number
and location of paging files
T
Task bar: It gives us quick options and
shows us information like network connectivity, the date, system notifications,
sound etc
Terminal: A text based interface to the
computer
Thermal paste: A substance used to better
connect our CPU and heat sink, so the heat transfers from to the other better
Time slice: A very short interval of time
that gets allocated to a process for CPU execution
Transfer Control
Protocol (TCP): A protocol that handles reliable delivery of information from one
network to another
Troubleshooting: The ability to diagnose and
resolve a problem
Type-C connector:
A type of USB
connector meant to replace many peripheral connections
T-Carrier technologies: Technologies Invented to transmit multiple
phone calls over a single link. Eventually, they also became common
transmission systems to transfer data much faster than any dial-up connection
could handle
TCP checksum: A mechanism that makes sure that no data
is lost or corrupted during a transfer
TCP segment: A payload section of an IP datagram made up
of a TCP header and a data section
TCP window: The range of sequence numbers that might be
sent before an acknowledgement is required
Time-To-Live field (TTL): An 8-bit field that indicates how many
router hops a datagram can traverse before it's thrown away
Top Level Domain (TLD): The top level of the DNS or the last part
of a domain name. For example, the “com” in www.weather.com
Total hops: The total number of devices data passes
through to get from its source to its destination. Routers try to choose the
shortest path, so fewest hops possible. The routing table is used to keep track
of this
Total length field: A 16-bit field that indicates the total
length of the IP datagram it's attached to
Traffic class field: An 8-bit
field that defines the type of traffic contained within the IP datagram and
allows for different classes of traffic to receive different priorities
Transmission Control Protocol
(TCP): The data transfer protocol
most commonly used in the fourth layer. This protocol requires an established
connection between the client and server
Transmitter address: The MAC address of whatever has just
transmitted the frame
Transport layer: The network layer that sorts out which
client and server programs are supposed to get the data
TTL: The lifetime limit of data given in
seconds. This number can be configured by the owner of a domain name for how
long a name server is allowed to cache in entry before it should discard it and
perform a full resolution again
Twisted pair cable: The most common type of cabling used for
connecting computing devices. It features pairs of copper wires that are
twisted together
Two-factor authentication: A technique where more than just a username
and password are required to authenticate. Usually, a short-lived numerical
token is generated by the user through a specialized piece of hardware or
software
TXT record: It stands for text and was originally
intended to be used only for associating some descriptive text with a domain
name for human consumption
Types of DNS servers: There are five primary types of DNS
servers; caching name servers, recursive name servers, root name servers, TLD
name servers, and authoritative name servers
Tab completion: A way to auto-complete a
command or file names and directories
Task Manager: A Windows utility that allows
you to gain information about what tasks you have running in the background
Termination
signal: A kill command
that will stop whatever process you tell it to
Trim: A command to delete unused data
blocks so the space can be used for the computer’s storage needs
U
Ubuntu: The most popular Linux consumer
distribution
UEFI: United Extensible Firmware
Interface
USB (Universal
Serial Bus): A connection standard for connecting peripherals to devices such
as computers
USB-C adapter: One of the standard power, data
and display connector types used in mobile devices
UTF-8: The most prevalent encoding
standard used today
Uniform Resource
Locator (URL): A web address similar to a home address
User name: A unique identifier for a user
account
User space: The aspect of an operating
system that humans interact with directly like programs, such as text editors,
music players, system settings, user interfaces, etcetera
Unicast transmission: A unicast transmission is always meant for
just one receiving address
Urgent pointer field: A field used in conjunction with one of the
TCP control flags to point out particular segments that might be more important
than others
URG flag: One of the TCP control flags. URG is short
for urgent. A value of one here indicates that the segment is considered urgent
and that the urgent pointer field has more data about this
User Datagram Protocol (UDP): A transfer protocol that does not rely on
connections. This protocol does not support the concept of an acknowledgement.
With UDP, you just set a destination port and send the data packet
Unix epoch: It is the number of seconds
since midnight on January first, 1970. It's a 'Zero Hour' for Unix based
computers to anchor their concept of time
UUID: Universally Unique ID
V
Virtual Box: An application you can use to
install Linux and have it completely isolated from your machine
Virtual machine
(VM): An application
that uses physical resources like memory, CPU and storage, but they offer the
added benefit of running multiple operating systems at once
Virtual memory: A combination of hard drive
space and RAM that acts like memory which our processes can use
VPN (Virtual
private network): A secure method of connecting a device to a private network over
the internet
Version field: First field in an IP header that specifies
the version of IP
Virtual LAN (VLAN): It is a technique that lets you have
multiple logical LANs operating on the same physical equipment
Virtual Private Network
(VPN): A technology that allows for
the extension of a private or local network, to a host that might not work on
that same local network
Virtualization: A single physical machine called a host
runs many individual virtual instances called guests
VLAN header: A piece of data that indicates what the
frame itself is. In a data packet it is followed by the EtherType
Variable: Files that constantly change
Virtual instance:
A single virtual
machine
Virtual memory: A combination of hard drive
space and RAM that acts like memory which our processes can use
Volume: A format for a filesystem on a
partition
VPN (Virtual private network): A secure method of connecting a device to a private network over the
internet
W
WannaCry Attack: A cyber attack that started in
Europe and infected hundreds of thousands of computers across the world
Wireless
networking (Wi-Fi): Networks you connect to through radios and antennas
World Wide Web
(WWW): The information
system that enables documents and other web resources to be accessed over the
Internet
Wide area network: Acts like a single network but spans across
multiple physical locations. WAN technologies usually require that you contract
a link across the Internet with your ISP
Wi-Fi Protected Access (WPA):
A security program that uses
a 128-bit key to protect wireless computer networks, which makes it more
difficult to crack than WEP
Wired Equivalence Privacy
(WEP): An encryption technology that
provides a very low level of privacy. WEP should really only be seen as being
as safe as sending unencrypted data over a wired connection
Wireless access point: A device that bridges the wireless and
wired portions of a network
Wireless LANS (WLANS): One or more access points act as a bridge
between a wireless and a wired network
Wireless networking: Networks you connect to through radios and
antennas
Wildcard: A character that is used to
help select files based on a certain pattern
Windows domain: A network of computers and
users that are added to a central database
Windows Search
service: A service that
indexes files on your computer by looking through them on a schedule
Windows store: A Windows store is an
application repository or warehouse where you can download and instal universal
Windows platform apps
Windows update
client service: System that runs in the background on your computer to download
and install updates and patches for your operating system
Write permission:
A permission that
allows you to make changes to a file
Z
Zone Files: Simple configuration files that declare all
resource records for a particular zone