Computer Vocab

Unlock all answers in this set

Unlock answers
question
The rate at which bits are transferred from place to another in a given amount of time. _______ is typically measured in bits per second (bps), kilobit per second (Kbps), and megabits per second (Mbps).
answer
Bitrate
question
A _______ is a unit of data storage. One _____ is eight binary bits (a series of eight zeroes and ones), which in turn means that one _____ can equal 256 values (2^8). _____ are often used to store specific data within a file such as characters or pixels.
answer
byte
question
Fraudulent text (SMS) messages similar to e-mail \"phishing\" hence SMS + phishing = _____.
answer
smishing
question
Hard drive _____ are where the actual data is recorded. A ______ is a flat disk that spins very fast (anywhere from 4200 to 15,000 RPM) inside the hard drive's metal housing. A hard drive may contain multiple ______ as needed to increase capacity.
answer
platter
question
A _____ is basically the partition used to start an operating system, although modern OS's such as Windows Vista and Windows 7 can be installed on any partition. The boot sector (the sector containing the boot flag) must be located on an active _______and only a _________ may be set as active.
answer
primary partition
question
When taking pictures with a digital camera, some photographers have the option to shoot in ________, which means the image is not compressed or processed in any way.
answer
RAW
question
_______ is used to create images on TVs and computer displays.
answer
RGB
question
Unlike a flat file database, a _____________ stores data in tables or relations, which are organized in rows (tuples) and columns (attributes).
answer
relational database
question
A __________ is a subdivision of a track on a magnetic or optical disk.
answer
disk sector
question
____________ is an I/O interface for connecting mass storage devices to a computer's motherboard. _______ was created in 2003 and superseded PATA.
answer
SATA
question
A computer expansion bus intended to replace PCI, PCI-X, and AGP. ______ implements a smaller I/O pin count, smaller physical size, higher data throughput, and more robust scaling, among many other notable improvements.
answer
PCIe
question
______ are data storage devices which use flash-based RAM to store data persistently, meaning that unlike volatile memory, _______ retain their contents even when unpowered. _______ have no moving parts so they are less prone to shock and because they can recall data almost instantly, they are much faster than traditional HDDs.
answer
SSDs
question
The ________________ is used for storing data on CDs. It is a standard published by the International Organization for Standardization (ISO) known as the ISO 9660 standard, which is readable on all popular platforms including Windows, Macintosh, and Linux.
answer
Compact Disc File System
question
_____ is the generic name applied to processors based on Intel's 8086 CPU. Subsequent processors iterations included the 286, 386, 486, and 586 (Pentium).
answer
x86
question
_______ are used to measure a CPU's floating point unit's (FPU) computing performance. A _______ is equal to 1000 gigaflops, or one trillion FLOPS, which means 1 trillion Floating Point Operations Per Second.
answer
Teraflops
question
A ____________ on a computer is a malicious attack (virus, worm, trojan horse, etc), which exploits a security hole before the vulnerability is addressed. In essence, the security issue is made public concurrently to the attack so the software developer has zero days to patch or fix the problem.
answer
zero day exploit
question
File system _____________ occurs when a file system does not store data on a disk in a sequential or contiguous manner. This increases the rate and time at which a hard disk must seek data and thus decreases throughput (the average rate data can be delivered or transmitted).
answer
fragmentation
question
FLOPS or __________ are units used to measure a computer's processing performance. Unlike megahertz, which are often marketed as an indicator of processor speed, FLOPS are actually a true indication of a CPU's raw processing power.
answer
Floating Point Operations Per Second
question
A ___________ is a program used to convert source code into machine code that the computer can understand.
answer
compiler
question
A __________ is a text file that contains a series of scripted commands that you would normally type manually at the command prompt.
answer
batch file
question
____________, also known as muxing, is when multiple analog or digital signals are combined into one signal over a shared medium, to use the most out of that connection.
answer
Multiplexing
question
________________ is a measure that compares the level of a signal to the level of background noise, to see how strong the signal actually is.
answer
Signal-to-noise ratio
question
The _____________ is the number of times per second that display hardware re-draws the data on the screen, which is different from the number of unique frames, or images, that are displayed.
answer
refresh rate
question
An ______________, usually abbreviated as AU, au, or ua, is a unit of length equal to the distance between the earth and the sun-that's 149,597,870,700 meters or 92,955,807.273 miles.
answer
astronomical unit
question
____________ are a section of memory storage used to temporarily hold data as it transmits from one point to another, to ensure the data can be used without \"skipping\" if there is a temporary hiccup in the transmission of the data.
answer
Buffers
question
The ____________ is a measurement of length that equals the distance that light can travel in a vacuum over the course of one year-about 6 trillion miles or almost 10 trillion kilometers.
answer
light year
question
____________ is an important measure of time delay in computer systems like networks and disk drives for how long the data takes to arrive.
answer
Latency
question
The ____________ is a test of a computer's ability to exhibit intelligent behavior, usually in the form of a natural language conversation between a judge, another person, and a computer designed to mimic a human.
answer
Turing test
question
_____________ is a form of logic processing that deals with values that aren't exactly true or false, but might have values that range in degrees between the two.
answer
Fuzzy logic
question
______________ is a field of computer science usually used by large companies to discover patterns in large sets of data. This allows companies like Walmart to figure out that people usually buy certain items together, and place them next to each other in the store. Perhaps the most controversial example is when Target used data mining on their customer's purchases to determine when women were pregnant, and started sending books of coupons to their door.
answer
Data mining
question
____________________ is a computer technology that takes scanned images of pages containing handwriting or printed text and converts them to text that can be read by a computer and manipulated by word processing programs.
answer
Optical character recognition
question
_______________ is a data encryption program that provides cryptographic privacy and authentication for sending data. It is often used for signing, encrypting and decrypting emails and files to increase the security of sending data over email.
answer
Pretty Good Privacy
question
A ________________ is a number with a set number of digits where the decimal point can be placed anywhere, as 10.5, 3.14, or -623.1231.
answer
floating point number
question
_______________ is the standard method of including metadata or other information about an image. _________________is supported by TIFF and JPEG but is most often seen in JPEG images as captured by digital cameras.
answer
Exchangeable Image File Format
question
BASIC, which stands for \"_______________________________\", is a programming language developed in the mid-1960s intended to provide computer students with a simple way to write programs. It eventually evolved into Microsoft's Visual BASIC, an easy-to-use but fairly slow development environment that made creating new functionality easy for junior developers, though not performant. These days, Visual Basic .NET compiles into standard .NET Framework executables that are interchangeable with other languages.
answer
Beginner's All-purpose Symbolic Instruction Code
question
Your _______________ is the hard drive partition which contains the boot flag. The role of the _________________ and by extension the boot flag, is to tell your computer which partition to boot.
answer
active partition
question
______________ is a high-speed I/O technology developed by Intel and introduced by Apple Computer to enable high-speed data transfer between your computer and hard drives, monitors, and other accessories.
answer
Thunderbolt
question
OpenGL or the _____________________ is a 3D graphics language developers can use to create graphics and special effects that will appear uniform across any operating system using any hardware, which supports OpenGL.
answer
Open Graphics Library
question
_________ are annoying programs apart from malicious software such as viruses, Trojan horses. ___________ may include spyware, adware, dialers, joke programs, remote access tools, and other types of programs that don't really damage your computer but slow things down, irritate you, and even worse: possibly steal your personal information.
answer
Grayware
question
A _______________ is a file that contains a range of functions and other shared code that can be accessed by a Windows executable.
answer
Dynamic Link Library
question
In older CRT monitors and TVs, magnetic charges would build up inside them causing a loss of color accuracy. To fix this problem, displays were equipped with a ____________ function which, when used, would discharge this magnetism.
answer
degauss
question
___ was a high-speed bus intended for connecting graphics cards to a computer's motherboard. _____ was created in 1996 and was highly popular until 2004 when it was superseded by PCI Express.
answer
AGP
question
_____________ is a data encryption feature included in the enterprise and Ultimate versions of Windows Vista and Windows 7 as well as the soon to be released Windows 8.
answer
Bitlocker
question
________________ is a type of CPU socket that permits easy replacement or upgrade of a processor. ZIF socket processors can be removed by pulling a small lever and lifting the chip out.
answer
Zero Insertion Force
question
Windows ____________ are typically used on large networks — corporate networks, school networks, and government networks. They aren't something you'll encounter at home unless you have a laptop provided by your employer or school.
answer
domain
question
the \\servershare format is called a UNC (_____________________) path, and it works just about anywhere in Windows. You can utilize it in the explorer address bar, file open and save dialog boxes, or anywhere that you'd normally use a file path.
answer
Universal Naming Convention
question
Any time you have a problem with an application, or something keeps freezing on your computer, or maybe you are trying to figure out what a particular DLL file is used for, _____________ is the tool for the job.
answer
Process Explorer
question
There are definitely a lot of colors in a typical _________________, which can be a little confusing for the beginner geek. It's really important to learn what all these colors mean, because they aren't there just for show — they each mean something important.
answer
Process Explorer list
question
_______________ has long been used as a powerful replacement for the previously anemic Task Manager application in every version of Windows prior to Windows 8, and assuming you want some real power in your hands, it works really well as a replacement in that version too.
answer
Process Explorer
question
Process Explorer has long been used as a powerful replacement for the previously anemic ______________ application in every version of Windows prior to Windows 8, and assuming you want some real power in your hands, it works really well as a replacement in that version too.
answer
Task Manager
question
One of the best features of ________________ is the ability to minimize it into the system tray, but instead of just a single icon, it can minimize into a full set of icons that can monitor CPU, I/O, Disk, Network, GPU, and RAM, or any combination of them. You can configure them to display separately, or not at all, if you prefer.
answer
Process Explorer
question
One of the best features of Process Explorer is the ability to minimize it into the ______________, but instead of just a single icon, it can minimize into a full set of icons that can monitor CPU, I/O, Disk, Network, GPU, and RAM, or any combination of them. You can configure them to display separately, or not at all, if you prefer.
answer
system tray
question
If you are working on a problem PC and want to figure out if a process is a virus, you can save yourself some time by using _______________________ or above, because they've added VirusTotal integration directly into the application. Just right-click on anything in the list to see the option.
answer
Process Explorer version 16
question
If you are working on a problem PC and want to figure out if a process is a virus, you can save yourself some time by using Process Explorer version 16 or above, because they've added ____________________ directly into the application. Just right-click on anything in the list to see the option.
answer
VirusTotal integration
question
So naturally, we wanted to do a bit of investigation into how some of these work, and there's no better place to start than the _______________ malware that has claimed hundreds of millions of computers worldwide. This nefarious awfulness hijacks your search engine in your browser, changes your home page, and most annoyingly, it takes over your New Tab page no matter what your browser is set to.
answer
Conduit Search
question
The ______________________ hijacker is one of the most persistent, awful, and terrible things that nearly every one of your relatives probably has on their computer. They bundle their software in shady ways with any freeware they can, and in many instances, even if you select to opt-out, the hijacker will still be installed.
answer
Conduit search
question
Conduit installs what they call \"_______________\", which they claim prevents malware from making changes to your browser. What they don't mention is that it also prevents you from making any changes to their browser unless you use their Search Protect panel to make those changes, which most people won't know about since it's buried in the system tray.
answer
Search Protect
question
_____________installs what they call \"Search Protect\", which they claim prevents malware from making changes to your browser. What they don't mention is that it also prevents you from making any changes to their browser unless you use their Search Protect panel to make those changes, which most people won't know about since it's buried in the system tray.
answer
Conduit
question
Unlike the Process Explorer utility that we've spent a few days covering, ___________________ is meant to be a passive look at everything that happens on your computer, not an active tool for killing processes or closing handles.
answer
Process Monitor
question
The ________________ utility was created by combining two different old-school utilities together, Filemon and Regmon, which were used to monitor files and registry activity as their names imply.
answer
Process Monitor
question
The Process Monitor utility was created by combining two different old-school utilities together, __________________, which were used to monitor files and registry activity as their names imply.
answer
Filemon and Regmon
question
It's also worth noting that ________________ always requires administrator mode because it loads a kernel driver under the hood to capture all of those events.
answer
Process Monitor
question
So ________________ can capture any type of I/O operation, whether that happens through the registry, file system, or even the network — although the actual data being written isn't captured.
answer
Process Monitor
question
?????So Process Monitor can capture any type of _______________, whether that happens through the registry, file system, or even the network — although the actual data being written isn't captured.
answer
I/O operation
question
_____________ is a Peer-to-Peer (P2P) file sharing protocol designed to reduce bandwith overhead and decentralize the distribution of files.
answer
BitTorrent
question
________ cards are a form of non-volatile memory used for storage in portable devices such as digital cameras, mobile phones, MP3 players, and other mobile electronics.
answer
Secure Digital
question
__________ is a digital audio storage format currently the de facto standard for both portable consumer audio devices and internet streaming audio.
answer
MPEG Audio Layer III
question
_________________________ is a digital cabling standard for audio/video transmission that replaced previously used analog cabling standards such as Component video cables.
answer
High-Definition Multimedia Interface
question
_________________ is an encryption technology most commonly used by web browsers to ensure that the information transmitted between the browser and the web server is private and unaltered.
answer
Secure Sockets Layer
question
________ is the common term used to denote the radio-frequency standards outlined by the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 protocol for wireless local area networks (WLAN).
answer
Wi-Fi
question
In computing terms, _______________ is the time it takes for a data packet to be received by the remote computer. Most computer users, and especially gamers, refer to this communication latency simply as lag.
answer
Communication Latency
question
__________________ are a sub-genre of role-playing video games focused on player interaction in a virtual world.
answer
Massively multiplayer online role-playing games
question
___________, when used in the computational terms, is the amount of data that can be transferred over a given connection in a set period of time.
answer
Bandwidth
question
_____________ is a scientific discipline concerned with studying the interaction of human beings with their environment.
answer
Ergonomics
question
Every time you interact with your computer, smart phone, or game console using a system of on-screen buttons, icons, and other interface elements to do so, you're experiencing one of the miracles of modern computing: the __________________.
answer
Graphic User Interface
question
A _______ is the smallest addressable element in a display device.
answer
pixel
question
__________________ is a cabling standard developed in the mid-1990s in order to decrease the number of peripheral interfaces on the market and create a streamlined standard for future peripherals and interfaces.
answer
Universal Serial Bus
question
___________ is when hackers or scammers attempt to steal personal information like usernames, passwords, or credit cards by pretending to be somebody else, usually through email or other electronic communications.
answer
Phishing
question
The _________________ is a hierarchical naming system for computers and web sites connected to the internet, which associates easy-to-remember names with the IP Address of the actual resource on the network or internet-for instance, the _____entry for www.howtogeek.com maps to the IP address 208.43.115.82. Imagine having to type in the IP address every time you wanted to browse our site!
answer
Domain Name System
question
____________ is a network protocol and a command-line application for virtually every operating system out there.
answer
Telnet
question
_______ is a collection of application program interfaces (API) created by Microsoft that contain a set of commands and functions that allow programmers to much more easily deal with multimedia and video games.
answer
DirectX
question
The ____________ is a type of denial-of-service attack that floods a network using spoofed broadcast ping messages. The attacker sends a large amount of ping requests to a router or server, but spoofs (fakes) the sending IP address, so the servers start sending messages back and forth, flooding the network with requests. They multiply the damage by using a broadcast ping, which requires sending a reply back to every server on the network-and when there are many servers sending messages to every server, the network quickly overloads.
answer
Smurf attack
question
__________ is a scripting language used to power web sites like How-To Geek, and is extremely popular because it is very easy to get a new site up and running compared to many other languages, and the system requirements are very low, so many web sites can be run on a single server.
answer
PHP
question
In computing terms, a ______ is a unit of data storage equal to half a byte-since a byte is 8 binary bits, a _____ is 4 bits. One ______ can be also represented with one hexadecimal character.
answer
nibble
question
___________________ is the protocol users must use before they can post a message and interact with a usenet newsgroup-created in 1986, the _____protocol is a lot like the SMTP protocol for email, but was tailored for exchanging newsgroup articles for groups instead of users. NNTP queries, distribute, posts, and retrieves articles to and from a newsgroup server.
answer
Network News Transfer Protocol
question
The _______ is a control character that that resets the position to the beginning of the line. In the old days, typewriters had a lever that would return to the beginning of the line once you were done typing the line, and then would usually also move down to the next line. In computer terms, the ___________ is usually used with a line feed (LF) that moves down to the next line-the combination is usually CRLF.
answer
carriage return
question
The _____________________ is used for sending email messages-desktop clients only use _____for sending messages-mail servers, on the other hand, use _____for both sending and receiving email from one server to another.
answer
Simple Mail Transfer Protocol
question
___________ is a term usually used for the RAM in your computer, and it refers to the amount of times the memory can be accessed while synchronized to the clock-double, in the case of regular DDR.
answer
Double Data Rate
question
A browser _______ is a small piece of data produced by a web site that you have visited, stored in your browser, and then sent back to the web site the next time you visit.
answer
cookie
question
________________ is a standard network protocol that enables file transfer between two TCP/IP-based computers.
answer
File Transfer Protocol
question
_________________ is a Unix-based file sharing protocol originally developed by Sun Microsystems in the early 1980s.
answer
Network File System
question
__________________ is a network protocol most commonly used by Windows machines to share access to files, printers, and other peripherals.
answer
Server Message Block
question
A ______________ is a copy of an existing disk that encompasses everything from the files to the file system.
answer
Disk Image
question
___________________ is the process of updating files in two different locations via a set of rules.
answer
File synchronization
question
__________ are small computer programs that extend the functionality of web browsers.
answer
Browser Extensions
question
A ________________ is a software-based tool that helps users manage passwords, pin codes, and other authentication methods.
answer
password manager
question
_________________ is a type of access control technique used by copyright holders, publishers, and hardware manufacturers to limit the use, manipulation, and distribution of digital content after the initial sale of that content.
answer
Digital Rights Management
question
_______________, a sub-set of cryptography, is the process of encoding data so that it is accessible only to authorized parties.
answer
Encryption
question
A ____________ is a collection of computers (or devices like smartphones) connected to the internet that are controlled by a third party for malicious purposes.
answer
botnet
question
_____________ significantly increases the difficulty of imitating a user or otherwise gaining unauthorized access to the user's account by requiring a second unique identifier before allowing access.
answer
Two-factor authentication
question
_______ is unsolicited commercial communication, most commonly in the form of email contact with the recipient.
answer
Spam
question
A ___________, more commonly referred to as simply a \"_________\", is a non-replicating malware application that masquerades as a useful application but instead allows unauthorized access to a user's system.
answer
Trojan Horse
question
_________ is a Unix networking tool (since ported to every major operating system) that is commonly referred to as a \"Swiss Army Knife for TCP/IP\". It was designed to be a reliable back-end tool that can be either directly accessed by the user or called by other applications.
answer
Netcat
question
___________________ is the text language that defines all of the content on every web page that you visit, and is even used in most email clients to display the text you're reading right now.
answer
HyperText Markup Language
question
The __________________ is one of the core networking protocols used to run the Internet. It differs from other transport protocols such as UDP and TCP in that it is not usually used to exchange data between systems but instead used as a diagnostic mechanism.
answer
Internet Control Message Protocol
question
____________ are a vital component of home and business network connectivity. While a simple hub or a network switch can do the job of linking your computers together into a local network (to share files, play LAN-enabled games, or share a printer), you need a ____________ for the critical task of linking two networks together.
answer
Routers
question
If you need to connect multiple wired devices to your network-such as a laser printer, computer, DVR, and so on-you need a _______. A network _______ is a telecommunication device that relays messages from devices connected to it and then transmits them only to the specified receiving device on the network.
answer
switch
question
____________________, is a form of storage technology that combines multiple disk drives into one logical storage unit.
answer
Redundant Array of Independent Disks
question
A ___________ is a network security tool designed to monitor network traffic and allow or block network activity based on a set of predetermined rules. It acts as a bridge between an internal network and an external network.
answer
firewall
question
The _________________ is one of the most critical components of a computer system. It is responsible for converting the mains AC into low-voltage and properly regulated DC power for the hardware components of the computer can safely utilize.
answer
Power Supply Unit
question
In computing, ______________ refers to the specifications of the motherboard and encompasses the physical size, mounting hole pattern, power supply type, the back-panel ports, and other design parameters.
answer
form factor
question
The _________________, is the proverbial brain of the computer. Modern ______________s are made from silicon and have a very high density of integrated circuits etched into silicon wafers.
answer
Central Processing Unit
question
______________ is a widely adopted wireless standard designed to replace cables for low-power data transmission over short spaces. The standard was developed by Swedish technology and telecommunications giant Ericsson in the early 1990s.
answer
Bluetooth
question
___________________ is a set of standards for close-proximity communication between smartphones and similar mobile electronics. It is built upon existing Radio-Frequency Identification (RFID) standards but expands functionality by enabling two-way communication and encryption.
answer
Near Field Communication
question
A ______________ is an element included in a computer or cryptographic system intended to allow the user to bypass normal authentication methods built into that system.
answer
backdoor
question
_________________ is the machine recognition of printed characters. The software takes a scanned document, photograph, or other digital source that includes printed text, and uses sophisticated algorithms to search out letter patterns in the text, converting it from a non-machine-readable image to a machine-readable (and human-editable) ASCII text.
answer
Optical Character Recognition
question
______________________, is a term used to encompass technological tools used to differentiate humans from computers during online interactions-usually with a focus on preventing automated computer systems from abusing email services, repeatedly trying to enter passwords, or otherwise creating undue strain or security problems for networked services.
answer
Completely Automated Public Turing test to tell Computers and Humans Apart
question
__________________ is data which describes other data, usually to provide additional information about the content of the original data. Digital cameras, for example, routinely include a wide range of metadata with each photograph they take. The photograph itself is the primary data, the metadata is data attached to that photograph such as the date of capture, the settings the camera used (EXIF data that includes such information as the shutter speed or aperture settings), and the file size.
answer
Metadata
question
_______________ is a portmanteau of the words Internet and etiquette. _____________ is broad term encompassing appropriate behavior on computer networks and the greater internet. Much like real-world etiquette governs things like appropriate dress, topics of discussion, methods of communication (such as wedding invitations and RSVP standards), and so on, ___________ seeks to provide similar structure to online interactions.
answer
Netiquette
question
___________________, is the convention by which domain names are combined with file path syntax to create human readable addresses for internet stored materials. This convention was proposed by Tim Berners-Lee, the creator of the World Wide Web, in 1994 as a method of making web-based resources more accessible.
answer
Universal Resource Locator
question
Historically, a ____________ referred to the blending of musical genres. While the term still retains that meaning in the music world, in computer lingo ____________ has come to refer to the blending of multiple web applications (and their data) into a single interface or application.
answer
mashup
question
__________________is a wireless non-contact data transfer system used for identification and tracking. The chip is a small electronic module roughly the size of a grain of rice that contains a unique serial number and other information about the object to which it is attached.
answer
Radio Frequency Identification
question
A ________________ is a computer network that connects computers and devices in a limited physical area such as a home, school, or commercial building.
answer
Local Area Network
question
An _______________, is the unique numeric identifier attached to all devices on an IP-based network. Every client, server, and network device is assigned a unique ______________ to ensure that it can send and receive data on the network without interfering or colliding with another networked device.
answer
Internet Protocol address
question
______________, also known as progressive scanning, is a way of displaying video wherein each line of the video display is drawn in sequence. This is a direct contrast to interlaced video wherein the odd and then even lines are refreshed.
answer
Progressive video
question
_________________ is a technique used to double the perceived frame rate of a video source without consuming extra bandwidth.
answer
Interlaced video
question
_______________ are designed to transmit data across geographic regions, countries, and even between continents. Large corporations routinely deploy _________ to connect geographically diverse employee populations, enabling them to connect easily to shared resources and conduct business as if they were sharing a massive company LAN.
answer
Wide area network
question
Network ___________ are simple pieces of network hardware that connect multiple Ethernet devices together so that they share a single physical Ethernet connection and function as a single network segment.
answer
hubs
question
___________________ is a popular image format developed by CompuServe in the late 1980s. Originally created to replace a previous CompuServe created format RLE (which could only display black and white), the original version of the _____________ was essentially just another image format in a sea of file formats.
answer
Graphics Interchange Format
question
_____________ is an internet communication protocol designed for real-time text messaging. The protocol was created in 1988 as a replacement for a BBS-based chat program called MultiUser Talk.
answer
Internet Relay Chat
question
_______________ is a set of operating instructions embedded in a computer system on a non-volatile memory chip. Common electronics like GPS units, network routers, and gaming consoles routinely have their operating instructions fully or partially stored as _______________.
answer
Firmware
question
_________________ is the process of bringing your monitor into alignment, or calibration, with a known state. Simply adjusting your monitor so that it displays contrast and color in a fashion pleasing to you is not true calibration, as calibration involves linking the output of your display with the output of a device.
answer
Monitor calibration
question
A ________________ is a passive heat exchanger added to computers and other heat-producing electronics to assist in cooling components. _____________ range from small and simple finned metal cubes attached to low-temperature components (such as embedded processors) to large tower-like structures with integrated fans attached to high-temperature components (multi-core CPUs and GPU chips).
answer
heat sink
question
A ____________ is a set of inputs mapped to a key, shortcut, or string of text so that the user is able to summon a large set of inputs with a minimal amount of input. Computer users create and deploy _____________ for everything from speeding up programming tasks to semi-automating repetitive and routine word processing entries.
answer
macro
question
The word ____________ is a portmanteau of \"coder-decoder\" and denotes the role of codecs in encoding/decoding digital data. Specifically, ______________ refer to the hardware and/or software that encode and decode digital audio and video streams, such as those used for watching local digital video, streaming video over the Internet, video conferencing, and other multimedia applications.
answer
codec
question
__________________ are a type of metadata appended to the end of computer file names to indicate to the operating system what format the file is in. It is by this mechanism that Windows knows to open File.txt with Notepad, File.doc with Microsoft Word, and to attempt to lauch File.exe as an application.
answer
File extensions
question
FAQ is an acronym for __________________.
answer
Frequently Asked Questions
question
In computing and gaming an ________________ is a piece of hardware or software designed to duplicate the behavior of another set of hardware/software.
answer
emulator
question
A ________________, more typically referred to simply as a driver, is a program routine that allows communication between the hardware components of a computer (including both internal and peripheral components) and the operating system.
answer
device driver
question
?????____________ is one of the most impressive tools that you can have in your toolkit, as there is almost no other way to see what an application is actually doing under the hood.
answer
Process Monitor
question
_________________ allows you to see nearly every single thing that is loaded automatically on your computer, and disable it as easy as clicking a checkbox. It's incredibly easy to use, and nearly self-explanatory, except for some of the really complicated things you need to know to understand what some of the tabs actually mean. That's what this lesson is going to teach.
answer
Autoruns
question
The _______________displays information on the desktop, and it works in a server environment as well — in fact, that's probably where it is the most useful, but it also works on anybody's computer, so you can test things out on your local machine before running the configuration on the server.
answer
BGInfo utility
question
If you've ever wanted to connect to another computer and run a command, quickly get information about processes running and optionally kill them, or even stop a service on another PC, you can use the ________________ to do all of these things and even more.
answer
PsTools utilities
question
The most important file-related tools in the kit to get to know are probably the __________________, but it would be wise to read through them all carefully.
answer
Sigcheck and Streams utilities
question
Shows information on the system CPU and all of the features. Ever wondered if your CPU is 64-bit or if it supports hardware-based virtualization? You can see all that and much, much more with the _______________. This can be really useful if you want to see whether an older computer can run the 64-bit version of Windows or not.
answer
coreinfo utility
question
This command line utility opens up the Registry Editor and navigates down to the key that you specify as an argument on the command line. No more manually clicking through the tree... assuming you use it. The syntax:
answer
regjump
question
____________________ is a security feature that helps prevent unauthorized system changes to your Windows computer or device.
answer
User Account Control
question
If you use Windows Vista or Windows 7, then ________________ is a security tool that protects your computer from spyware.
answer
Windows Defender
question
__________________ is an important security application that's built into Windows. One of its roles is to block unauthorized access to your computer. The second role is to permit authorized data communications to and from your computer.
answer
Windows Firewall
question
Put simply, ___________________________ is a management snap-in for the Windows Firewall from which you can control in a very detailed way, all the rules and exceptions that govern how the Windows Firewall works.
answer
Windows Firewall with Advanced Security
question
The __________________ analyzes all the web pages that you are visiting and the files that you are trying to download or run. If it finds them as being suspicious, you are informed about the possible risks you are exposing yourself to.
answer
SmartScreen Filter
question
The ________________ is a feature of Windows that continuously monitors the state of your system.
answer
Action Center
question
One of the most important steps in keeping your system secure is to leave ___________ turned on and working on a regular basis.
answer
Windows Update
question
?????________________ is one of the most popular free antivirus products. You can use it for free for 30 days, but if you want to use it longer you have to register an account with ___________!
answer
avast! Free Antivirus
question
A ______________ is a software or hardware tool that captures every key pressed on a computer's keyboard.
answer
keystroke logger
question
When the operating system of your computer or mobile device displays a small notification on your screen, you're experiencing a __________________.
answer
\"toast\" notification
question
An ________________is a decentralized wireless network.
answer
ad hoc network
question
An ____________ is a piece of hardware that bridges communication between wireless devices and a physical network. The Wi-Fi nodes found in coffee shops and other public spaces as well as the Wi-Fi enabled router found in many homes are examples of ____________.
answer
access point
question
_____ is shorthand for fourth generation cellular technology.
answer
4G
question
_____ is shorthand for the third generation of cellular technology.
answer
3G
question
______ is shorthand for the second generation of cellular technology.
answer
2G
question
__________________ is a derivative of Short Messaging Service (SMS), designed to break through the text-only/160 character limitation of SMS-powered text messages.
answer
Multimedia Messaging Service
question
_______________, or as most of us call it, texting, is the text messaging component of cellular communication networks. It's the most widely used communication protocol in the world, with billions of people the world over collectively sending six trillion text messages annually.
answer
Short Message Service
question
Jabber, later renamed the __________________, is an open standard for instant messaging. It was developed in the late 1990s and released for public use in 1999. Since then it has become the most popular instant messaging framework around, with everyone from small companies and universities deploying private Jabber servers to adoption by Google as the driving protocol for their enormous Google Talk system.
answer
Extensible Messaging and Presence Protocol
question
A __________ computer is a computer that has been taken over by some mechanism (Trojan virus, backdoor exploit, etc.) so that a remote party has access to the machine and is able to call upon the machine to perform some task.
answer
zombie
question
Historically, the term \"________\" was used to denote a part or piece of machine that was unidentified (or did not, for the purposes, need to be identified). In modern computer-slanted usage, a ________ is a small interface display designed to clearly convey information to the user.
answer
widget
question
Internet Service Providers, web sites that offer various services (especially communication related), and temporary providers of internet access (such as University and Public library computer labs) will generally have you sign off on an ______________ before allowing you to use their service.
answer
Acceptable Use Policy
question
The ______________ are the legal terms by which the user must agree with in order to use the service in question.
answer
Terms of Service
question
__________________, is an internet standard that extends the functionality of email to include non-text attachments, multi-part message bodies, and text in character sets other than ASCII.
answer
Multipurpose Internet Mail Extensions
question
A ___________ is a passive heat exchanger designed to disperse heat from electronic devices and help maintain stable operating temperatures. ___________ are designed to have a large surface area (usually achieved via fins, much like a radiator) to maximize the volume of cooling material (typically air) that comes in contact with the surface of the ___________.
answer
heat sink
question
The ______________ is a software tool included with an operating system to give users the ability to feed commands to the operating system for immediate execution.
answer
command line
question
The ____________ layout was created in the 1930s by Dr. August Dvorak and his brother in-law Dr. William Dealey. The two created the layout in order to alleviate problems with the popular QWERTY keyboard configuration (the very configuration still in use today by hundreds of millions of typists worldwide).
answer
Dvorak Keyboard
question
The _______________, called such because the first five keys in the top letter row form the word, is the standard English keyboard used by hundreds of millions of computer users world wide.
answer
QWERTY keyboard
question
_______________ are a recent innovation in computing. Historically, computers had a single core, or processing unit. All computations performed by the computer were directed through the single core in a linear fashion. The only way to increase the speed of the computer was to increase the power of the single processor-and this was precisely how desktop and server computing grew throughout the 1980s and 1990s.
answer
Multi-core processors
question
_______ is a phrase used to encapsulate the design choices of web sites from the early 2000s moving forward. Unlike earlier web design choices that presented users with static web pages and no chance for interaction or alteration, __________ sites are designed for a richer user experience.
answer
Web 2.0
question
In the early years of the web, sites were designed around what are now referred to as __________ elements. These elements included static pages (as oppose to user-generated content), segregated and inaccessible user data, use of frames and tables to position content on the page, prolific GIF buttons (also supported via tables), and email forms.
answer
Web 1.0
question
A _____________ occurs when a computer application acquires computer memory but fails to release it back to the operating system when the memory is no longer needed. Memory leaks diminish system performance by reducing the available pool of memory accessible to the operating system and other applications.
answer
memory leak
question
_____________ is the process of increasing the speed of a CPU or other computer component beyond the clock frequency specified by the manufacturer. This is achieved by increasing the clock rate, changing the chip multipliers, or manipulating timing cycles.
answer
Overclocking
question
?????This tool is used internally by Windows to run many tasks that only need to be run occasionally rather than always running.
answer
Task Scheduler
question
You might be thinking that the _________ is just a way to schedule an application to run at a certain time, but it is so much more than that, and has become an integral part of Windows.
answer
Task Scheduler
question
The biggest problem with __________ is that it can be really confusing - there are a lot of warnings, errors, and informational messages, and without knowing what it all means, you can assume (incorrectly) that your computer is broken or infected when there's nothing really wrong.
answer
Event Viewer
question
The _______________ seems fairly simple at first glance. There's a list of your hard drives combined with a graphical representation of the partitions on each one. You can create and edit partitions... but there is a lot more to do. You can create Spanned, Striped, or Mirrored volumes across multiple disks, or you can create and attach virtual hard drives.
answer
Disk Management utility
question
The ____________ is a hierarchical database that contains all of the configurations and settings used by components, services, applications, and pretty much everything in Windows.
answer
Windows Registry
question
Everybody knows how to use __________, including people that know almost nothing about Windows. They hit CTRL + ALT + DEL and then select ___________ from the list, because they don't know that you should use CTRL + SHIFT + ESC instead to launch it instantly. And then they close whatever process Windows says is hanging.
answer
task manager
question
This panel contains the settings for some important features in Windows, including virtual memory page file, system protection, data execution protection, processor scheduling, environment variables, and startup options for dual-boot configurations.
answer
System Properties
question
____________ are a special type of application that is configured to launch and run in the background, in some cases before the user has even logged in.
answer
Windows services
question
?????____________ are a really powerful way to setup a corporate network with each of the computers locked down so users can't mess them up with unwanted changes, and stop them from running unapproved software, among many other uses.
answer
Group Policies
question
_____________ is a phrase coined by blogger and productivity writer Merlin Mann in 2006 to refer to email management techniques and strategies designed to keep the user's email inbox as empty as possible.
answer
Inbox Zero
question
_______________ is a term used to describe a scorched earth approach to getting an overwhelming backlog of emails under control.
answer
Email bankruptcy
question
The _________________ is a unique hardware identification number assigned to network interfaces.
answer
Media Access Control address
question
_____________ are applications which run on modern multitasking computer operating systems as background processes rather than as foreground processes (visible to the user). These background processes sit idle waiting for input and then spring to life, performing their intended function.
answer
Daemons
question
_______________ is a Windows-based security infrastructure introduced with the release of Windows Vista/Windows Server 2008. The development of _______ was a move by Microsoft intended to introduce the concept of regular user/superuser security structures, common in Unix-like operating systems, to Windows.
answer
User Account Control
question
_________ is a program for Unix-like systems that allows users to run programs with the security privileges of another user-typically a user with a higher level of access such as the superuser/root account.
answer
Sudo
question
A ____________ is an organization or individual that profits from the manipulation of and speculation in the Domain Name market.
answer
Domainer
question
__________ is an ideological and language offshoot of the idea of Spam.
answer
Bacn
question
_______________ are companies that accept new (and maintain old) domain name records. Whether you're a major corporation or just an individual who wants to hold www.yourname.com for vanity purposes, you need to deal with a __________________ like Network Solutions or Dreamhost.
answer
Domain Name Registrars
question
In computer networking, a _______________ is a collection of computers on a local area network that share resources (such as shared folders and printer access). _________________ are best suited for small networks of 50 devices or less, such as a home or small office network. Beyond that number of devices, administration and management become unwieldy and setting up a domain system is advised.
answer
Workgroup
question
__________________ was founded in 1998 to ensure there was a non-profit, international, and impartial organization to coordinate all of the Internet's addressing and protocol systems, develop naming conventions, and accredit Domain Name Registrars to handle the commercial side of domain sales and distribution.
answer
The Internet Corporation for Assigned Names and Numbers
question
____________ is the standard networking convention for the local computer. Any time a computer needs to refer to itself for testing purposes or to direct TCP/IP-based commands back to itself, it can use \"_______________\" or the loopback address \"127.0.0.1″-an IP reserved specifically for the _______________.
answer
Localhost
question
A _____________ is a communications network in which each node shares at least two pathways with two other nodes (and thus has redundant access to the communication network). Mesh networks are extremely stable as they are resistant to decay if multiple nodes are damaged or removed from service.
answer
mesh network
question
______________ is the process of converting audio or video from its native format to another format for the purposes of reducing the file size and/or re-encoding it to play on a wider variety of devices.
answer
Ripping
question
In photography, the _____________ refers to the portion of a photograph that is in focus-specifically the distance between the nearest and farthest objects or surfaces in the photograph that appear acceptably sharp and in focus to the viewer.
answer
Depth of Field
question
At its most basic, an _____________ is simply a hole through which light travels-although the use of aperture to refer to any old portal through which light passes has certainly fallen out of a fashion. The term is most widely used in terms of optical systems such as cameras and telescopes.
answer
aperture
question
_____________ is a feature available on almost every digital camera-most point-and-shoot models and every DSLR-that allows the camera to properly register the color white within the lighting conditions under which the photo is taken.
answer
White balance
question
An ______________ is a program or script run on a mail server that automatically replies to emails.
answer
autoresponder
question
Many anti-virus and malware scanners have a ________________. This mode allows users to take a file that has been flagged as a potential threat and effectively lock it away temporarily while they investigate and determine if the file is a legitimate threat or if there was a false alert and the file needs to be restored to its previous location.
answer
quarantine mode
question
________________ is like putting your computer in a state of suspended animation. Unlike sleep mode, where the core system remains powered up (but the peripherals and hard disks are powered down), ________________ effectively powers down the system while preserving the work state over time.
answer
Hibernation mode
question
_____________ is power-saving state employed by both computers and mobile devices. While in _______________, a device will partially power down components and peripherals to save power, but will leave the core systems operational so that the user may get back to work as quickly as possible.
answer
Sleep mode
question
A ____________ is a symbol used to indicate any value is acceptable in that location when performing a task or search query.
answer
wild card
question
___________________ is a commonly used acronym within the tech support community to indicate that the reported problem with the system is not a failure of any software or hardware component, but is instead a wetware failure-the user of the computer is the source of the problem.
answer
Problem Exists Between Chair And Keyboard
question
?????A ______________ is a collection of settings and information that tells Windows which files and folders you can access, what you can do on your computer, what are your preferences, and what network resources you can access when connected to a network.
answer
user account
question
The ____________ is a collection of computers that are part of the same network. All the computers are peers and do not have control over another computer. The ____________ facilitates the detection of the computers that are part of it and the sharing of resources like folders or printers.
answer
workgroup
question
The _____________ is a folder that's found on all Windows computers by going to \"C:UsersPublic\".
answer
Public folder
question
The Public folder is a folder that's found on all Windows computers by going to \"___________________\".
answer
C:UsersPublic
question
A _______________'s purpose is to easily facilitate the sharing of files and printers with other people on a home network. This feature doesn't work on public or business networks because it is designed specifically for home users.
answer
Homegroup
question
?????_______________ is one way of sharing resources in Windows. It allows for detailed customization of the way you are sharing and it has the following characteristics: • You can use it to share folders, external hard drives and internal drives (your partitions, Blu-Ray or DVD drives). • You can use it to deny access to a specific resource for a specific user account or user group. • You can use it to limit the number of simultaneous users accessing a shared resource. • You can use it to share resources with one or more share names. • You cannot use \"________________\" for sharing libraries or printers.
answer
Advanced Sharing
question
DPI is a common term used primarily in regard to printers and their output. It stands for ______________ and represents the resolution number of __________ in digital printing. The actual print resolution can be calculated by squaring the DPI number. Thus a printer with 100 DPI rating is capable of printing 10,000 dots per square inch, and a printer with a 1200 DPI rating is capable of printing 1,440,00 dots per square inch.
answer
dots per inch
question
___________ designs have been pivotal in the development of powerful but energy efficient mobile electronics. Compared to a traditional computing system where functions are performed by discrete components (the CPU, GPU, sound processor, etc.), the __________ design packs everything onto a single chip. It is this miniaturization that allows a single chip in a modern smartphone to handle the core processing needs of the device as well as decode video, audio, and manage the extras on the device like motion sensors and cameras.
answer
System-on-Chip
question
A ___________ is special type of web browser bookmark that extends the functionality of the bookmark system. While a traditional bookmark is a static entry that contains the title and URL of the bookmarked page, ______________ instead contain snippets of JavaScript that acts upon the current web page in some manner.
answer
Bookmarklet
question
A _________ is a digitally stored location intended to facilitate the user's quick return to a previous location (just like a physical ___________ helps the user return to their last location in a book).
answer
bookmark
question
______________ are electronic devices that still draw power even when the device appears to be off. In some cases the the draw is quite small as is the case with an electronic transformer which carries a steady 1 watt load when the device attached to it is turned off. In other cases the draw can be surprisingly high, as is the case with many cable boxes and other media peripherals that consume a significant amount of power when they are powered off (as they do a variety of tasks behind the scenes such as updating programming schedules, recording and downloading content, etc.)
answer
Vampire devices
question
Compared to a traditional blog-wherein posts are usually developed like essays-______ quite tiny, focused on short snippets of content and typically only include very short commentary and/or photo, video, or other multimedia elements.
answer
microblogs
question
A _________ (a portmanteau of \"web\" and \"log\") is a website that contains stories and updates in reverse chronological order-the most recent entries appear at the top of the front page, and you browse backwards to move through the past articles.
answer
Blog
question
____________ are high-end subnotebooks. Although the term has become synonymous with very lightweight yet full size laptop computers, it's actually a trademark of computer company Intel and has specific criterion. The specifications cover battery life (5 hours or better), height (21 mm or thinner), time from hibernation resume (7 seconds or better) and, as you would expect, and Intel processor.
answer
Ultrabooks
question
____________ are a class of portable computers designed to be smaller and lighter than a typical laptop computer, yet still run a full fledged operating system (such as Windows 8) and not a lightweight mobile-device operating system (such as Windows CE).
answer
Subnotebooks
question
____________ systems rely on direct system-to-system connections without a central infrastructure or server system facilitating the transmission of data or resources. __________ systems are utilized in situations where it is ideal to distribute loads across many users. In the case of BitTorrent (a type of distributed file sharing system), files are not stored on a central server, but instead are shared piece-by-piece in a distributed network composed of many users. This makes it easy to get popular files quickly and it protects the network from being shut down by outside authorities.
answer
Peer-to-Peer
question
___________ are a special type on-screen button found within application user interfaces. A ________________ functions such that if you select one of the available options (say, printing in color instead of black and white), any other entry you made will be automatically deselected.
answer
Radio buttons
question
_____________ is an abstract mathematical system used to describe colors using numerical values
answer
Color space
question
_____________, are programs that search for information on the World Wide Web. ______________ are most widely employed by search engine companies and are used to create ever-growing indexes of web pages and their content. At its most elementary, a ____________ visits a known web page and then explores all the links on that web page (discovering new web pages in the process and repeating the sequence on them). Content that is not accessible to ___________ is known as the Deep Web.
answer
Web Crawlers
question
The _____________ is web-based content that is not found in search engine results. Unlike Darknets, wherein the content is explicitly encrypted and kept from public view, most of the _____________ content is invisible to search engines and their users simply because there are no links pointing the content.
answer
Deep Web
question
A ____________ is a network within a network operated expressly to facilitate the distribution of files, information, and communications while concealing the identity of participants.
answer
Darknet
question
______________ is the world's largest implementation of onion routing communication techniques. The TOR system is composed of thousands of volunteers around the world who run TOR proxy servers. When someone connects to the TOR proxy network, their communications are encrypted and passed through a series of TOR proxies. Any TCP-based application that supports standard SOCKS proxy protocols can be connected to the TOR network.
answer
The Onion Router
question
______________ is a method used for anonymous communication over wide area networks.
answer
Onion Routing
question
A common feature of email discussion lists and newsgroup discussions, a _________ is a daily or weekly summary distributed to the users. _____________ make it easy to read over all the new developments of that day (or week) at once instead of slogging through multiple individual emails or postings.
answer
digest
question
______________ is the process by which displays are lit via light shined through them towards the user. Smartphone screens, computer monitors, television sets, and other common display interfaces are lit by LED or fluorescent lights in this fashion.
answer
Backlighting
question
______________ is an optical interface that links audio-capable devices using the S/PDIF standard over fiber optic cables. __________ is capable of transfer rates of up to 1.2 Gbps. __________ ports are found on a wide variety of consumer electronics including DVD players, cable boxes, amplifiers, and other home audio/video equipment.
answer
Toshiba Link
question
______________ is a serial interface for transferring digital audio from DVD, CD, and other disc-based players to stereo amplifiers, television sets, and other equipment.
answer
Sony/Philips Digital InterFace
question
_______________ is the piece of hardware that provides a connection between the computer and a computer network. Historically, a ___________ was a discrete expansion card added into a computer to provide access to a hard wired network such as an Ethernet or Token Ring LAN.
answer
Network Interface Card
question
?????\"______________\" has been around in one form or another since Windows 9x because it's one of the easiest and fastest ways to clean up your hard disks without installing third-party software.
answer
Disk Cleanup
question
When it comes to keeping your system running well, hard drive optimization is important. Windows includes a great tool to keep your drives in tip-top condition.
answer
Drive Optimizer
question
The \"___________\" has always been the geek's go-to tool for diagnosing and alleviating system slowdowns. Windows 8.x continues this tradition with an attractive \"_______________\" makeover and improved diagnostic tools.
answer
Task Manager
question
We hear this so often that it seems to have lost most of its meaning. Luckily, Windows 8.x includes simple tools such as \"__________\" and \"___________\" so you can protect yourself from catastrophic data loss!
answer
File History, System Image
question
The cleanup tools that come with Windows work well, don't get us wrong, but if you're really pressed for space, then sometimes you need to dig a little deeper. __________ is a free program that you can download and install, which will root out all those space hogs and safely delete them.
answer
CCleaner
question
One of the best ways to unburden your computer and quickly free up resources, is to disable items that automatically launch when Windows boots. These startup items not only suck up system resources like little vampires, they also often cause your computer to boot longer. The old school way to deal with startup items is to use the \"System Configuration\" utility on Windows 7. Launch a \"Run\" window by typing \"WIN + R\" and then \"__________.\"
answer
msconfig
question
One of the best ways to unburden your computer and quickly free up resources, is to disable items that automatically launch when Windows boots. These startup items not only suck up system resources like little vampires, they also often cause your computer to boot longer. The old school way to deal with startup items is to use the \"__________\" utility on Windows 7. Launch a \"Run\" window by typing \"WIN + R\" and then \"msconfig.\"
answer
System Configuration
question
_____________ is a free program from Piriform software that takes the work out of cleaning up your computer. Make sure that you download the \"Slim\" installer version that doesn't contain any toolbars or other crapware.
answer
CCleaner
question
When it comes to recommending any one AV scanner, we still say do some reading and try a few things out. But, if you're simply looking for something to install right now and forget about, then you will be well protected with \"______________.\"
answer
Avast! Free Antivirus
question
?????Windows provides a utility, aptly named, \"_____________,\" that allows you to keep your system patched and secure (to an extent) from any malicious attempts to gain access and seize control of your computer.
answer
Windows Update
question
________, a portmanteau of advertisement and software, is a term used to denote a hybrid between freeware and shareware applications.
answer
Adware
question
____________, a portmanteau of share and software, is a popular term which denotes that a given application is intended to be freely shared and distributed but that some form of monetary compensation is due the author.
answer
Shareware
question
_________, a portmanteau of free and software, is a popular term which denotes that a given application is available for use either without monetary compensation to the author or owner of the application, or with a suggested donation (a sub-classification of freeware referred to as donationware).
answer
Freeware
question
__________ are text masks which help users manage their email as well as reduce spam.
answer
Email filters
question
A ________ is a small utility that loads before a computer loads its primary (or secondary) operating systems that allows you to select which (of multiple) operating systems you wish to load at the given moment.
answer
boot manager
question
The ___________ is the software component within a given web browser that renders the HTML code of fetched web pages into a human-readable interface.
answer
browser engine
question
__________ is the space that borders the main view portal of a web browser-including the menus, navigation bar, frame, scroll bars, and address bar.
answer
Browser chrome
question
____________ is a feature of modern web browsers wherein additional viewing portals may be opened within the same primary window.
answer
Tabbed browsing
question
_________ is the foundation of the World Wide Web and the browsing experience.
answer
Hypertext
question
The _________ is a mechanism for the temporary storage of web documents intended to reduce bandwidth usage, server load, and the user's perception of browser latency.
answer
web cache
question
____________ is a feature available on most modern web browsers wherein the user can access the web browser's cache and browse the pages there as if they were actively connected to the original web server.
answer
Offline browsing
question
Just like your spinal cord connects the tens of thousands of peripheral nerves in your body, massive high speed fiber optic lines connect major cities and regions. These \"_______________\" link the smaller networks built by individual Internet Service Providers, which in turn connect to the end user.
answer
internet backbones
question
An _________ is the company that provides internet access between the greater internet infrastructure and the end consumer.
answer
Internet Service Provider
question
The rise in popularity of Wi-Fi enabled devices has fueled an interest in _________-small devices that act as a hybrid cellular modem and Wi-Fi router.
answer
mobile hotspots
question
A ___________ is an add-on device for a mobile computer that plugs into a USB port or ExpressCard slot to provide cellular data service to the mobile computer.
answer
cellular modem
question
______is the process by which a computer is connected to a cellphone in order to provide internet access to the computer. _________was originally a wired process, wherein a cellphone would be connected to the computer via specialized cable (and later via standardized USB cable) in order to share its data connection with the secondary machine.
answer
Tethering
question
__________is the process of customizing software and accompanying documentation for a specific region, country, or social group. The process includes text translation, adaptation of user menus, and inclusion of specialty characters.
answer
Localization
question
A ___________ is a computer utility which allows the user to view the status of all running applications and background services. Typical features include the ability to monitor CPU and memory usage globally as well as on an app-by-app basis. In addition, users can request more information about individual applications and terminate applications which are not responding or otherwise non-functional.
answer
task manager
question
__________ is a conductive substance used to form a seal between two objects to ensure a consistent and thorough transfer of heat. .
answer
Thermal paste
question
The ____________, typically labeled F1 through F12, are hardware keys on a computer keyboard reserved by the operating system or the current application to perform a given function.
answer
function keys
question
An __________ is when a very large volume of email messages are sent within a very short span of time. This has the potential to temporarily cripple both the sending and receiving mail servers.
answer
email storm
question
___________is a designation of the number of discrete elements an electronic or printed image is comprised of.
answer
Resolution
question
___________ are an artifact left over from earlier versions of Windows. Prior to Windows 95, Windows stored critical system variables in INI files (which were essentially just text documents with variable lists in them). Starting with Windows 95, all these settings were found in the Windows Registry system and Microsoft encouraged software developers to do the same.
answer
Initialization files
question
A _________ is an indoor cellular access point that uses internet access at its location of installation to route cellular calls over the internet. __________ are powerful enough to cover the area of a large home or small business (roughly 4-5,000 square feet) and benefit both the user and the cellular provider in that they provide a better signal for the end user and decrease the load on the cell provider's tower system.
answer
femtocell
question
_____________ is a method of displaying text and graphics on computer in the same fashion they will either be rendered for the viewer on another computer or by a printer.
answer
What You See Is What You Get
question
__________ is a technique used by to smooth the appearance of jagged lines in graphical images.
answer
Anti-aliasing
question
A _________ is a pixel that, unlike a dead pixel, is not inactive but instead stuck on a single color and unresponsive to the attached computer's commands.
answer
hot pixel
question
A ________ is a pixel in a liquid crystal or other non-CRT display that no longer responds to input from the controlling computer and is incapable of displaying any colors.
answer
dead pixel
question
___________ are a fusion of traditional hard drive technology (magnetic platters) and newer solid state drive technology (flash memory).
answer
Hybrid drives
question
A ____________ is an electronic storage medium that uses flash memory instead of magnetic platters to store data.
answer
solid state drive
question
__________ is one speed measurement used to assess the performance of platter-based hard drives. The faster a drive platter spins, the faster the read/write assembly of the hard drive can access the data.
answer
Revolutions Per Minute
question
The __________ is the primary storage medium on most computers.
answer
hard drive
question
Like the Electronic Serial Number (ESN) and later Mobile Equipment Identifier (MEID) identify CDMA-band phones, the _______________ identifies GSM-band phones.
answer
International Mobile Station Equipment Identity
question
____________is the application of gaming principles to non-game environments, usually with the intention of increasing user engagement. Exercise programs that create game-like environments and achievement systems based on the amount and frequency of exercise, for example, have applied gaming principles to what would otherwise be regarded by most people as a mundane and unpleasant task.
answer
Gamification
question
The power transformers/adapters that many electronics require are, non-affectionately, referred to as ____________. The unpleasant sounding term pokes fun at the adapters which are generally ugly, bulky, and quite frequently block nearby electrical sockets.
answer
wall warts
question
A __________ is a means of attaching an easily understood and search-friendly identifier to instant messages, chats, tweets, and other searchable media. ___________are most commonly prefixed by the number sign and followed by a single entry (which may be a single word or multiple words condensed into one). For example, people discussing the Olympics on Twitter might tag their posts with #2014Olympics.
answer
hashtag
question
A _____________ is an account on a computer system that has the lowest level of access privileges.
answer
guest account
question
Although ____________ and user profiles seem interchangeable (and in many systems they are directly linked), the ___________ is distinct from the user profile in that the ____________ is primarily used to manage security permissions, while the user profile is used to manage superficial elements like the user interface.
answer
user accounts
question
___________ are sets of data stored on computers and gaming devices so that each individual user of the machine can have a unique experience.
answer
User profiles
question
_____________ is a specific peripheral class designed to input data to a computer.
answer
Human Interface Device
question
A ___________ is an application intended to conceal non-work activities in the workplace.
answer
boss screen
question
__________ are a physical screen panel or film mounted on to desktop monitor or laptop screen. These add-on panels feature special microscopic louvers within the material so that the angle of viewing available while using the monitor becomes extremely restricted for the purposes of keeping others from looking at the screen.
answer
Privacy screens
question
An __________is a set of ordered steps used to solve a problem. In the realm of computers and their associated functions, ________ are used to manage all manner of tasks including encoding and decoding video and other multimedia content, encrypting and decrypting secure transmissions, and otherwise automating the complex mathematics that underpin the modern computing experience.
answer
algorithm
question
___________ are a type of information appliance that is designed so that the user can quickly decode information without the necessity of reading any sort of digital or physical printout.
answer
Ambient Information Devices
question
A ____________ is a computer that runs Apple's Mac OS X operating system but is not (as is traditionally the case) an Apple-built computer.
answer
Hackintosh
question
__________ is a term applied to the stream of waste generated by discarded electronics such as monitors, cellphones, and other electronic devices large and small.
answer
Electronic Waste
question
________ is utility found on DOS, OS/2, and Windows-based machines. It is used to check file system integrity on hard disks and removable media and, in its modern form in Windows, can also check for physical errors and bad sectors.
answer
CHKDSK
question
_______ is a network data retrieval tool used to look up information about a given host.
answer
Whois
question
___________ is a computer network diagnostic tool that, as the name implies, traces the route packets of data take from the machine the command is executed on to the remote host.
answer
Traceroute
question
__________, also frequently called Name, is a simple network protocol used for the exchange of user status and contact information. Introduced in the 1970s, it was used to locate other users on a given computer network and see if they were logged in and/or available. While historically significant, its use declined steadily into the 1990s, as security concerns, other venues of contact information sharing, and incompatibility with NAT-based routing (such as commonly found in home and corporate routers) quickly made _______an unattractive communication tool.
answer
Finger
question
_________ is a common computer network administration tool used to test whether or not a host is reachable on an Internet Protocol (IP) based network and to measure the amount of time it took to reach that host and receive a reply.
answer
Ping
question
A ___________, or non-variable width font, is a font wherein each character in the font set is given equal spacing regardless of the size and shape of the letter.
answer
monospaced font
question
______________ are typeface fonts that employ a dynamic spacing system wherein the shape of the letters and other characters are considered when spacing the letters on the line. By this mechanism, a \"B\" takes up more room than an \"I\" and the letter \"a\" in the word \"Tan\" is nested slightly under the \"T\".
answer
Variable width fonts
question
Traditionally, a ______was a specific size, weight, and style of a given physical typeface (style of letters).
answer
font
question
One particular type of cookie is rather dangerous, however, and is outright banned by any properly coded web browser: the ____________. Wherein a normal cookie is assigned to a specific domain, such as a cookie that retains your display preferences on www.somemadeupwallpapersite.com, a _______________is a cookie that has been assigned to a top-level domain such as .gov or .com.
answer
super cookie
question
______________ is an umbrella term that refers to several modern telecommunication systems that encode and transmit traditional voice communications via the TCP/IP networking protocol-in essence, __________ is telephone over the Internet.
answer
Voice over IP
question
_____________ is a legacy file system that still remains in wide use today
answer
...
question
the naming of the system is a reference to the prominent role of the file index table which is created when the ____________ disk is formatted.
answer
File Allocation Table
question
In computer science, a ____________ is a data storage schema used to store, retrieve, and update files.
answer
File System
question
A _______________, is relative of the traditional computing Application Programming Interface (API). Just like an API helps different elements on a traditional computer talk to each other using common routines and tools, a _____________ allows clear communication between a web-based service (and its data set) and a third party tool (like a desktop widget).
answer
Web Application Programming Interface
question
______________ are sets of functions or routines that specify how software components should interact with each other. The ______ are, to the end user, entirely invisible and function behind the scenes, handling such tasks as process thread management, error handling, rendering output for graphic user interfaces (GUIs) and other core functions that are part of the computing experience.
answer
Application Programming Interfaces
question
____________search is used in applications and search engines that use ____________operators (AND, OR, and NOT) to restrict or expand search queries. For example, if you wanted to search for web pages that contained the phrases \"writing tips\" and \"starting a blog\" but not \"essay topics\", you could search with the following query: \"writing tips\" AND \"starting a blog\" NOT \"essay topics\" .
answer
Boolean
question
_________________ files are an ubiquitous way to package and share documents. The format was introduced in 1993 by Adobe Systems and remained a closed proprietary format (but free to use) until released as an open standard in 2008.
answer
Portable Document Format
question
___________electronics are capable of accepting additional or replacement hardware components to extend their functionality and lifespan.
answer
Upgradable
question
One of the first tasks given to a student studying a new programming language is to copy a simple program that outputs the phrase ____________ on the screen. This classic exercise helps familiarize the students with the basic structure of the new language they are studying.
answer
\"Hello, World\"
question
_______________ are a form of sandboxing wherein a computer and it's operating system are simulated, via software, within the operating system of another computer. This concept is distinct from multi-boot systems wherein the user can boot the machine entirely into different operating systems using a boot manager.
answer
Virtual machines
question
An ______________, or signature block, is a block of text appended to the end of an email communication which usually contains the sender's contact information (such as address, phone number, and social media contacts) as well as other information such as quotations, legal disclaimers, and other material.
answer
email signature
question
In contrast with the Random Access Memory (RAM) modules found in most computers and other devices, _______________ has a unique property-it retains the data contained within it even when the power is turned off.
answer
Non-volatile memory
question
____________________ is a family of video compression standards that encompasses everything from DVD encoding to satellite video transmission.
answer
Moving Pictures Expert Group
question
____________ is a popular video compression standard based on MPEG-4. It is widely used for both HD video sources like Blu-Ray discs and for streaming video from sites like YouTube using minimal bandwidth while maintaining quality video.
answer
H.264
question
The ____________ spectrum covers 30Mhz to 300Mhz and is used for a wide variety of communications including television broadcasting, FM radio, as well as traffic control and marine communications.
answer
Very High Frequency
question
The _____________ spectrum, or 700Mhz communication spectrum (technically 698-806Mhz), was historically used for television broadcasting. Starting in 2008, the FCC began auctioning off sections of the spectrum in anticipation of the 2009 switch from analog to digital TV broadcasts. Thanks to the suitability of 700Mhz spectrum broadcasts for long distance wireless communication, a significant portion of the available blocks were purchased by large telecommunication companies like Verizon Wireless and AT&T.
answer
Ultra High Frequency
question
A ___________ is a lightweight machine that offloads its processing and data handling tasks to a central machine.
answer
Thin Client
question
_____________ are computer games wherein humans (and computer opponents) complete their actions on set turns. The popular game franchise Civilization is an example of such a game style
answer
...
question
players are allowed a period of analysis and decision making before committing to actions.
answer
Turn-based strategy games
question
_____________ are video games wherein the action occurs in real time and all players must react on the fly to changes in the game with no downtime for game analysis and decision making.
answer
Real-Time Strategy Games
question
A ____________, in computing terms, is a secure space where programs can be tested and code can be contained. In gaming, however, a ___________refers to a game designed to be open and non-linear in nature so that the player may roam freely and interact with the environment more liberally than in a linear game where the action progresses from one level to the next.
answer
sandbox
question
_______________ means that a given medium is incapable of transmitting and receiving over the same channel simultaneously. Walkie-talkies and push-to-talk cellular services are examples of half-duplex communication in action
answer
...
question
one party can transmit communication to the other party but the receiving party must wait for the transmission to end before replying.
answer
Half-duplex
question
_____________ means that a given medium is capable of transmitting and receiving over the same channel simultaneously. A telephone call is an example of a simple ____________ communication: both parties can talk simultaneously as telephony technology is configured such that the line can transmit the audio in both directions at the same time.
answer
Full-duplex
question
_______________, also known as Volume Snapshot Service, is a data backup technology included in Microsoft Windows that allows the operating system to take snapshots of the system which include files which are locked or otherwise inaccessible to the user. The service can only be used on NTFS-based disks and interacts with the data at the block level.
answer
Shadow Copy
question
_______________ is a utility included in Windows since the release of Windows Me. The ____________ utility takes snapshots of the system including the state of the Windows registry, installed applications, system files, and system settings.
answer
System Restore
question
Historically, computer manufacturers shipped optical media (such as CD/DVDs) with each computer that contained recovery software the purchaser could use to restore the computer back to factory settings in the event of data corruption or other problems. As a cost cutting measure, most manufacturers have moved away from optical media and now simply partition off a portion of the machine's primary hard drive to serve as a _________________
answer
...
question
this partition is not directly accessible by the end user and houses recovery software as well as an image of the computer's hard drive as it was when it left the factory.
answer
recovery partition
question
A _______________ is a bootable optical disc (or discs) that typically contains the base operating system and applications that came pre-installed on a commercially produced computer. In the event of severe operating system failure, failed hard drive, or other problem, the end user can boot from the discs to perform a reinstallation of the operating system and the original applications, effectively returning the computer to the state it was in when it shipped from the factory.
answer
recovery disc
question
__________ is a feature in modern operating systems that allows you to enter a troubleshooting mode wherein only essential components (such as the OS kernel and basic drivers for the display and input devices) are active. While in _____________, problems with updated drivers, corrupt data, or other issues can be resolved.
answer
Safe mode
question
_____________, also referred to as cloning, is the process of duplicating the entire hard drive of a machine onto another machine. Although of limited utility to a home user, _____________is widely used in corporate and government settings as it is much faster to copy an operating system/software configuration across duplicate machines than it is to independently install and configure the software on each individual machine.
answer
Ghosting
question
__________________ are a trademarked (but widely used) type of matrix barcode. Instead of encoding the data in a series of vertical stripes (as the data is encoded in a traditional UPC barcode) the QR code data is encoded in a grid that looks like a plot of pixels.
answer
Quick Response Codes
question
____________ is a type of temporary email service, typically web-based, wherein a user can create an email address quickly with the intention of using it a handful of times (or even once). Many web sites require valid emails for simple tasks (e.g. downloading an application or a one-time registration) and people avoid the potential of future spam and unwanted email by providing a disposable address they can use, check to get the confirmation link, and then dispose of. One of the most popular _______________address services is Mailinator.com.
answer
Disposable email
question
________________ is an orientation wherein the display is positioned so that it is wider than it is tall. This is the orientation of movie screens, modern widescreen HDTV sets, and widescreen monitors.
answer
Landscape Mode
question
_____________ is the orientation of a display screen so that it is taller than it is wide. The default position of most smartphones is \"______________\" as the phone design is such that it is most frequently held in the hand via the long edge. _______________ orientation is not typically found on television screens or computer monitors outside of specialized applications.
answer
Portrait mode
question
The _________ is an electronic chip included with televisions (with 13″+ screens) and cable boxes manufactured after January 1 2000. The chip allows parents, via in-device menu, to set a lock on the type of broadcast/cable media displayed based on content ratings. The provisions regulating the inclusion of the __________ were part of President Clinton's Telecommunications Act of 1996.
answer
V-chip
question
___________________ is the protocol that automatically assigns IP addresses to each device on a network without interaction from a system administrator or user.
answer
Dynamic Host Configuration Protocol
question
________is a term used in cryptography and computer security to refer to text which has been run through an encryption algorithm.
answer
Ciphertext
question
_________is a term used in cryptography and computer security to refer to text which is transferred without encryption.
answer
Plaintext
question
The ____________ is set of rules an individual or organization must abide by in order to use a service.
answer
Terms of Service
question
In computer science, a ______is a hardware component that stores frequently used pieces of data for more rapid access.
answer
Cache
question
Within the context of video gaming, __________ refers to the speed at which the screen image is refreshed.
answer
frames per second
question
In computing, a _________is a portion of physical memory storage set aside to temporarily store data while it is being moved and/or processed in some fashion.
answer
Buffer
question
An ______________is a program designed to make it difficult to understand or reverse engineer source code.
answer
obfuscator
question
_______________is the process of shifting the encoding method of a given media file.
answer
Transcoding
question
Just as a compiler turns high-level programming languages into low-level programming languages in order to run them on the computer, a __________reverses the process and takes low-level programming language (like machine code) and translates it into higher-level programming languages (like C++).
answer
Decompiler
question
A __________is a computer program (or set of programs) that converts source code from the original programming language into another computer language. Typically, this process is used to convert a high-level programming language (such as C++) into a lower level language (such as machine code) so that the program can be run as an executable.
answer
Compiler
question
______________ are computer programming languages with a strong abstraction that provides a high degree of human readability.
answer
High-Level Programming Language
question
A ________________ is a programming language that provides little or no abstraction or divergence from the actual instructions the architecture of the computer uses to execute commands. Machine code is an example of _________________ and is the only programming language that allows for direct and untranslated interaction with a computer processor (despite being very difficult to work with and requiring an extreme attention to detail, it is still used when considerable speed and lightweight programming is required).
answer
Low-Level Programming Language
question
In computing, a ____________ is a software initiated reset of the hardware and software states. It is started by the operating system (either automatically or at the request of the user) and a set process is followed to shutdown applications, close out system files, and otherwise gracefully bring the system to a halt before starting it up again. _______ are preferred to hard resets (which halt all processes on the hardware level and can cause file corruption and system instability).
answer
Soft Reset
question
In computing, a ____________ is a hardware operation that restarts the system hardware and, in the process, ends all current software activity.
answer
Hard Reset
question
ANSI stands for the ___________________. The Institute is nearly a century old and responsible for maintaining a wide variety of standards across many industries including nuclear energy, chemical production, and health care information technology, but in computer lingo ANSI is used to refer to ANSI code standard.
answer
American National Standards Institute
question
ASCII, the_____________________, is a character encoding scheme based on the English alphabet that encodes 128 characters (numbers, upper and lower case letters, as well symbols and control codes), into 7-bit machine readable binary integers.
answer
American Standard Code for Information Interchange
question
An ______________is a string of ASCII text intended to represent a face or emotional state using common keyboard symbols. The most widely recognized emoticon is colon and curved bracket combined to form a smile shape, like so :)
answer
emoticon
question
A _________ is a piece of telecommunication hardware that receives a signal and retransmits it at a higher power. _________ are used in a wide variety of applications including radio transmission and Wi-FI network deployment.
answer
Repeater
question
_____________ is an internet utility that performs a function exactly like its name implies: it traces the route data takes from the local computer back to the remote host. The utility is useful for a variety of diagnostic tasks such as establishing where in a route the connection is lost and how long the route is.
answer
Traceroute
question
A __________, alternatively spelled is a neophyte in a given pursuit. The term refers to the lack of skills, experience, and understanding of conventions the individual has in the area in question. Thus one can be a \"__________\" to the world of competitive real-time strategies or tennis without being considered generally unskilled or incompetent.
answer
Newbie
question
_____________ are add-on circuit boards that expand the functionality of a computer.
answer
Expansion Card
question
In computer architecture, a bus is a communication system that transfers data between other components. _____ systems can be so small and buried in the hardware as to be invisible to the end-user (such as the address bus found within the CPU's architecture) or can have obvious manifestations that the end user can interact with such as USB (Universal Serial Bus), the ubiquitous computer input connection.
answer
Bus
question
In computer security, a ___________________ is a type of attack that relies on the attacker's ability to temporarily control or divert electronic communications so that they could observe and/or alter the communications.
answer
Man-in-the-Middle Attack
question
In computer security, ______________, like their real-world counterparts employed by law enforcement agencies, are traps set to detect or counteract authorized access to computer networks. ________________ can take the form of individual computers, data sets, or network sites that appear to be valuable or worth investigating to the intruding party but which are actually designed to entrap and/or monitor the attacker.
answer
Honeypots
question
_________________ is a form of data backup focused on ensuring continued future access to the digital information preserved by the backup process. Whereas a typical backup system is designed to simply duplicate the data so that it may be restored in the event the original data set or host computer is damaged, groups concerned with __________________ are not just concerned with creating redundant copies of data but ensuring that future generations will be able to access that data.
answer
Digital Preservation
question
A __________________ system backs up the changes made to a system between the initial backup and the current backup. Unlike an incremental backup system, wherein only the newest changes from the previous increment are recorded, the differential system backs up everything that has changed from the initial backup on each subsequent backup.
answer
Differential Backup
question
_______________s make it feasible to store a higher number of backups in a limited amount of space by building on an initial complete backup.
answer
Incremental Backup
question
A __________________, or system image, is a backup of a computer system that includes not only user data stored on the machine (such as documents and photographs), but the entire operating system and installed applications. A __________________allows for a complete restoration of the system in the event of catastrophic failure.
answer
Full Backup
question
_____________ is a backup that is not accessible to the computer that initiated the backup process after the process is completed. If, for example, you backed up your data to an external hard drive but then removed the external hard drive and stored it, then the backup would be considered offline, as a catastrophe that could destroy the original data set (such as a power surge or malicious software) would not be able to touch the offline backup.
answer
Offline Backup
question
An ________________ is a backup that is still accessible to the computer which initiated the backup process. For example, if you back up all your data from your personal computer to an external hard drive that remains attached to your personal computer at all times, it is, in the sense that it exists on two physical mediums, backed up.
answer
Online Backup
question
A _____________ is a duplicate copy of a data set or entire hard drive that is stored on a separate storage medium from the source file (or disk). If the original data (say, family photos) is stored on the primary drive of a computer and those photos are copied onto a secondary drive, the data set on the secondary drive is the __________.
answer
Backup
question
__________________ is a process by which text and graphics are applied to a medium, typically paper, via a controlled and cold application of ink through micro-nozzles.
answer
Inkjet Printing
question
___________________ is the process by which laser printers apply images to paper. Inside the laser printer, a laser beam passes over an electrostatically charged drum
answer
...
question
this laser beam changes the static charge on the drum to represent a portion of the image (be it text or graphics) sent to the printer. The drum then collects toner from the toner cartridge and the toner clings to the charged portion of the paper. The final step fuses the toner to the paper (if you've ever cleared a jam out of a laser printer and the toner dust wiped right off the page, the paper jammed before the fusing process).
answer
Electrostatic Digital Printing
question
A ________________ is a printer that uses heat to transfer ink onto the print medium as opposed to inkjet printing which sprays micro droplets of ink onto the surface of the medium. The name is derived from the process itself, during the heating and application process the dye sublimates from a solid material to a gas without transitioning through a solid state.
answer
dye-sublimation printer
question
__________________ are a hybridization of traditional mechanical hard drive technology and more modern solid-state drive technology. The drives combine the large storage capacity of a traditional magnetic hard drive with the speed of a solid-state drive. The drives typically contain a 4-24GB solid-state storage area mated with a 500-1000GB magnetic storage area.
answer
Hybrid Drives
question
____________ is a monitoring system built into modern hard drives designed to detect and report a set of indicators which allows the end user to assess the stability of the drive.
answer
S.M.A.R.T.
question
_________________ is the measurement that encompasses both the internal transfer speed of a hard drive (movement of data from the disk surface to the disk controller in the drive) and external transfer speed (data movement between the disk controller and the host operating system).
answer
Data Transfer Rate
question
_____________ refers to the amount of time it takes a hard drive to respond to a request for a particular piece of data. In traditional magnetic hard drives, the _____________includes both the electronic communication between the operating system, motherboard, and hard drive itself, as well as the physical movement of the components within the hard drive (such as the actuator arm that moves the read/write head). Typical ________________s for mechanical hard drives range from 4ms (for high speed server drives) to 15ms (for slower mobile or low-end consumer drives).
answer
Seek Time
question
The ________________ is a section of a hard disk that has been specially formatted and flagged so that it does not appear to the host operating system. This portion of the hard disk can be used for a variety of purposes including storing hidden data, security software to track stolen laptops, and vendor-specific utilities, but it is most typically used to house recovery software. Many desktop and laptop computers no longer ship with operating system reinstallation/recovery discs, for example, but instead include a large __________________ that houses a recovery program that is accessible from the computer's BIOS menu.
answer
Host Protected Area
question
The last step in preparing a hard disk for use, _________________ is the process of setting up an empty file system in a new partition for use by an operating system. For example, when you install a new hard disk into your desktop computer, the final step after creating the partition is to instruct your formatting tool to create a file system (such as NTFS) in the given hard disk so that your operating system can access the drive and use it for storage.
answer
High-level Formatting
question
________________ is the process of dividing a hard drive into a single logical storage unit or a series thereof. Partitioning allows a single physical disk to be divided into multiple logical disks for various purposes, including the separation of the operating system disk from the data storage disk, the installation of multiple operating systems, or other applications dependent on the division of data.
answer
Disk Partitioning
question
______________ is a hardware level process that marks the surface of the disk with a marker indicating the start of a recording block. This block is typically referred to as a sector marker and is referenced by the disk controller in order to read and write data to the disk.
answer
Low-level Formatting
question
____________ is the process of preparing a disk or other storage medium for use by a particular operating system. The formatting process is typically divided into three distinct operations. First, a low-level format prepares the media for use. Second the media is partitioned with one or more partitions. Third, a high-level format applies a file system (such as FAT32 or NTFS) to the newly created partition(s).
answer
Disk Formatting
question
_________________ is the process of overwriting data with a series of zeros. You partially or completely zero-fill a given storage container to either overwrite the space where a recently deleted file was on the hard disk or to completely wipe the hard disk and all the files, folders, and other data structures contained therein.
answer
Zero-filling
question
The _________________ is a an algorithm for securely erasing the contents of a computer hard drive.
answer
Gutmann Method
question
DBAN is an acronym for ______________, an open source project. DBAN is a designed to facilitate simple and secure erase of hard drives so that data is no longer recoverable. It uses random number overwrites and includes scripts for the Gutmann Method, Quick Erase, and Department of Defense approved overwrites (3 and 7 pass).
answer
Darik's Boot and Nuke
question
In cryptography, both analog and digital, a ________ is an algorithm for transforming plaintext to _____text (unencrypted to encrypted) and reversing the process. A _____ could be as easy as shifting the vowels of the alphabet forward one (a shift-______) so that A becomes B and B becomes C, all the way around until Z because A. Modern encryption relies on radically more sophisticated ________s that use advanced computations, split keys, and other cryptographic tricks only feasible with the aid of computers.
answer
Cipher
question
In a __________________, there are two distinct keys used to encrypt and decrypt data. The public key is used to encrypt data for the recipient and then the recipient's private key is used to decrypt it. Thus if someone wanted to send a secure email message to Bill Gates via the widely used Pretty Good Privacy (PGP) email encryption program, they could look up Mr. Gates' public key on a public key server, use that key to encrypt his message, and then only he could turn around and use his private key to decrypt it.
answer
public-key cryptographic scheme
question
Introduced in 2003, __________ is the successor of the widely adopted PC Card peripheral form factor and interface standard. Like the interface that preceded it, ____________ allows you to expand or upgrade notebook functionality by adding networking interface cards, sound cards, graphics cards, and other mobile upgrades.
answer
ExpressCard
question
____________ is a form factor standard peripheral interface standard for notebook computers introduced in 1990. Originally intended to provide expanded storage space for mobile computers, the interface was quickly adapted for network cards and other upgrades. Although it underwent numerous revisions (designated by roman numerals I-III), it was eventually superseded by the Express Card standard in 2003. Several companies with high volume sales to government agencies and institutions still offer ______________ slots for backwards compatibility with older equipment.
answer
PC Card
question
The ___________________ is an international standards body that defines, promotes, and oversees standards for notebook computer expansion devices such as models, external hard drives, and other peripherals. Over time the acronym _______________ has been applied not only to the organization itself but to the the form-factor of the physical PC cards used in notebook computers.
answer
Personal Computer Memory Card International Association
question
___________________ is a form of parallel computing. Unlike supercomputer setups that feature custom built hardware, _________________ uses off-the-shelf hardware and computers to minimize costs. Companies use __________________because the cost of entry is low, parts are easy to replace, software and drivers are readily available, and the computers share a base architecture (such as Intel x86 or x64).
answer
Commodity Computing
question
__________________ is a form of computation in which a large number of calculations are carried out simultaneously on hardware run in parallel. Parallel computation allows for some calculations and processes to be performed faster than serial computations (wherein each command must finish before the next is executed).
answer
Parallel Computing
question
In modern email clients, both browser-based and stand-alone, you'll find the digital answer to analog address books: ___________. The most basic __________s simply contain the name of the contact and their email address, but more robust contact lasts (such as those found in Outlook and Gmail) hold significantly more information like your contact's physical mailing address, phone numbers, and other relevant information, including notes.
answer
Contact List
question
In computing, a __________ is a list of items that a security algorithm or filter will always block. If you set up a filter in your email client to explicitly block the address of someone spamming you, for example, you've created a simple ____________.
answer
Black List
question
In computing, a ___________ is a list of items that a security algorithm or filter will always allow to pass through.
answer
White List
question
A _______________ is a software function that produces multiple documents (which could be printed form letters, emailed letters, printed labels, or other outputs) from a single template form using a structured data set as input.
answer
Mail Merge
question
__________________ is an advanced form of spam prevention deployed at the server/provider level. The algorithms work in two primary ways: email body __________________ and email attachment _________________.
answer
Fingerprinting
question
_____________ was one of the earliest and most influential electronic mailing list applications. Released in 1986, the application is still going strong and in wide use around the world. _____________ introduced a wide variety of email list management features we take for granted today, such as automated subscribing and unsubscribing without the intervention of a human list curator, message templates, and spam filtering.
answer
Listserv
question
An ___________________ is a method of using email that allows for easy and widespread distribution of information to members of the list. There are two common forms of ________________: distribution lists and announcement lists.
answer
Electronic Mailing List
question
The __________________ is a folder found in the inboxes of most modern email services where emails that have not been outright rejected by the email provider's global spam filters, but which appear suspicious (because they, for example, contain marketing terms and the sender is not in the recipients address book or address whitelist), are dumped for further review. This is why companies will frequently request you check your _____________for emails that you have reported as unreceived, as legitimate commercial communications can often end up accidentally caught in the spam-hunting algorithms.
answer
Junk Folder
question
A ______________ is a form of auto-response sent to the sender of an email when the email cannot be delivered to the intended recipient.
answer
Bounce Message
question
_________________are computer programs that automatically answer email.
answer
Email Autoresponders
question
A _____________is a web page or set of pages that traps any web crawler/search bot that comes across it. While some _____________s are unintentionally created (e.g. there is an element on the page such as a dynamic calendar with, essentially, infinite forward links for the crawler to follow), many __________________s are created with the intent of trapping spam crawlers looking for email addresses and other personal information. The heart of the trap, whether intentionally or unintentionally created, is series of links or a dynamic link system that a crawler gets stuck following (like a maze with no exit).
answer
Spider Trap
question
______________ is the process of amassing lists of email addresses, almost always to spam them, using disreputable practices such as purchasing email lists in bulk from resellers, using giveaway/contest websites to harvest emails, or using harvesting bots to crawl web pages, forum and usenet posts, and other publicly accessible locations, looking for email addresses to add to the list.
answer
Email Harvesting
question
An ______________ is a file sent along with the email message.
answer
Email Attachment
question
In email composition, the \"BCC:\" section, short for _______________ is a method of sending an email to additional addressees without alerting the primary addressees (and the potential secondary addresses in the \"CC:\" section) that the email has been shared beyond those listed on the email.
answer
Blind Carbon Copy
question
In email composition, the \"CC:\" section, short for ________________, is a method of sending an email to additional addressees without inserting them into the primary \"To:\" section.
answer
Carbon Copy
question
________________ is an attempt to make an email address difficult for spam bots to harvest and begin spamming.
answer
Email Obfuscation
question
____________ refers to the technology (both hardware and software) used to identify individuals based on their physical characteristics. Fingerprint scanners, facial recognition, and voice analysis are all methods of turning the user's physical characteristics into security checks.
answer
Biometrics
question
In computer security slang, a \"_______________\" is a malicious computer hacker. Unlike their counterpart, the \"white hat\" hacker, ______________s are those who would exploit security flaws for personal gain (or for the benefit of the corporation, organization, or nation state they work for).
answer
Black Hat
question
In computer security slang, a \"______________\" is an ethical hacker. The term ______________ is applied to individuals that seek out security flaws and then notify organizations so the security flaws can be remedied as well as hired security specialists who look over an organization's infrastructure to find the security flaws before malicious users do.
answer
White Hat
question
________________ is a branch of marketing research that focuses on helping websites to appear as high as possible in a search engine's rankings. The goal, if all goes as planned, is to help a website appear within the first or second page of results provided by a search engine, thus greatly increasing the traffic to, and popularity of, the website in question.
answer
Search Engine Optimization
question
The term _________ refers to the portion of HTML coding in a web page that provides a basic description about, or identifies the type of content a particular website contains. Two of the most important types of ____________s are 'keywords' and 'description' tags.
answer
Meta Tag
question
__________________refers to measuring the number of 'visitors' who browse away from, or leave, a web site after having viewed only one page. The lower the _______________ is, the more 'visitors' are interacting with a web site once they reach it.
answer
Bounce Rate
question
__________________ is a type of malware that will lock a computer user out of their computer, encrypt all their files and/or hard-drive, or severely restrict access to the infected system until the user pays the malware author a 'fee' to regain access to their files and/or system.
answer
Ransomware
question
__________________ refers to software that is used to take advantage of unsuspecting or naive computer users for profit or malicious purposes. The authors of ______________ seek to create a sense of panic, shock, or anxiety about a supposed problem or threat to the user's computer system, when in fact, there is no problem at all.
answer
Scareware
question
_________________ is software that anyone is free to redistribute for use by others. __________________ generally falls into two categories: free software that may be legally changed or modified as desired by a user, and proprietary software that may not be legally changed or modified by a user (i.e. freeware, shareware, demo/trial versions).
answer
Redistributable Software
question
________________ refers to a business model where software or online services are offered for free with a limited set of features or capabilities available for use, but can be upgraded to a paid version for access to the full set of features and functionality of the product.
answer
Freemium
question
______________ is the most frequently seen server-side error code in the HTTP status code canon. 503 stands for \"Service Unavailable\" and is the code returned when a user requests a web page from a server that is overloaded or down for maintenance. When visiting a link from a popular and heavily trafficked link aggregation site like Reddit or Stumble Upon, it's not uncommon to find that the deluge of traffic from the larger site had temporarily knocked the smaller web server offline.
answer
HTTP 503 Error
question
_______________ is perhaps the best known of all HTTP error codes. The code indicates that your browser client successfully communicated with the server, but that the content you were looking for is not where the browser request indicated it should be (e.g. the article is actually at /pages/1.html/ and you requested it at /page/1.html instead).
answer
HTTP 404 Error
question
______________ are two closely related HTTP status codes related to the server's inability to give you the data you are requesting. When the web site you are visiting gives you a 401 error, it means that you have no properly authenticated yourself with the server's security system in order to gain authorized access to the web page or data you wish to view. A 403 Forbidden error, by contrast, indicates that (authorized or not) you still do not have the proper access level for the material you wish to view.
answer
401 Unauthorized and 403 Forbidden
question
_______________ are a tool used by web servers to return information about the state of a server and/or the information it is serving up to the browser. The codes are divided into 5 general classes, each of which is signified by the first of the three digits. 1xx codes are informational and indicate a response from the server, 2xx codes indicate successful communication with the server, 3xx codes correspond to redirection requests, 4xx codes indicate a client error, and 5xx codes indicate a server error.
answer
HTTP Status Codes
question
______________ is a frustrating phenomenon on the world wide web wherein old or changed URLs no longer point to the resources they previously pointed to.
answer
Link Rot
question
The ________________ is a technical term for the portion of the browser window which actually displays the content of the web site you are browsing.
answer
Browser Viewport
question
A ___________ is a line of information, typically displayed at the bottom of a window in a graphical user interface. Although _________s have been around for decades, the most common place a typical computer user encounters a _________ is within a web browser. When hovering over a link, for example, such as this link to the front page of How-To Geek, most web browsers will display the actual address, http://www.howtogeek.com, in the _________ at the bottom of the window.
answer
Status Bar
question
_____________s, typically referred to simply as links, are a core component of the web browsing experience. ______________s take the form of text and images that, when activated by the user (or automatically by a script or web browser component), take the user to the document or file indicated by the link. Without the extensive use of _______________s, the smooth experience of jumping from one document to another on the web (such as jumping from the front page of How-To Geek to an article in the sidebar that interests you) would be greatly disrupted.
answer
Hyperlink
question
________________ is a feature included in modern web browsers that allows you to browse the web in a special window wherein no data will be stored locally. There will be no links in the browser history, no cookie data, and no stored images or page content.
answer
Private Browsing
question
A _________________ is the list of web sites you have visited using your web browser.
answer
Browser History
question
The _________________ is the GUI element of a web browser where the user inputs the web address (also known as a URL). In addition to web addresses, most web browsers also support additional protocols (such as ftp:// for FTP sites) and internal addressing (such as about:somefunction or chrome://) to access the internal workings of the web browser.
answer
Address Bar
question
In software engineering, _________________is a system design principle focused on allowing an application to grow and provide additional features in the future. Web browsers are the most widespread example of system ______________and even include bundles of additional features released as extensions, a direct nod to the design principle they are modeled after.
answer
Extensibility
question
_____________, like backwards compatibility, is a compatibility concept used in system and product design.
answer
Forward Compatibility
question
In computing, _________________is the ability of a device to accept input from a previous generation of the product or technology. _______________ is very important to consumers in a variety of industries as it allows them to use previously purchased content with newer technology and products.
answer
Backwards Compatibility
question
A ______________ is any expansion board that is attached to the motherboard. This includes any expansion board like a networking interface card, a soundcard, a RAID controller, or other hardware expansion which is added to a computer via motherboard expansion slot. ____________s are typically only found on desktop and server machines, as mobile computers such as notebook computers and smartphones are either only expandable via USB or not at all.
answer
Daughterboard
question
A ______________ is the main printed circuit board (PCB) found in computers and other expandable electronic systems. The term _______________specifically refers to printed boards with the potential for future expansion (as the ________________serves as the \"mother\" which hosts and supports the expansion cards). While the term ______________ has been adopted to refer to just about any main board, for applications where there is no expansion (such as the main circuit board in a washing machine), it would be more accurate to refer to the board as the system board or mainboard.
answer
Motherboard
question
______________ are plastic boards that mechanically support and electrically connect the electronic components mounted on the board. The printed circuit board is the ubquitious but often unseen foundation of the entire modern electronics and computing revolution. From the guts of a tiny USB flash drive to the much larger motherboard inside your desktop computer, _________________are everywhere.
answer
Printed circuit boards
question
__________________ refers to the unauthorized download of data and files from a computer using an iPod, other brand of mp3 player, flash drives, etc. The small size of these devices and ease of connection makes this method of data theft a quick and stealthy endeavor.
answer
Pod Slurping
question
POTS is an acronym that many of us may not be familiar with or have heard before, but it does stand for something we all know only too well: __________________.
answer
Plain Old Telephone System
question
_________________ refers to software that a company has bought, but has never used on their computers, thus leaving it to 'collect dust on a shelf'. __________________ can also refer to unsold software remaining on a retailer's or dealer's shelves.
answer
Shelfware
question
_________________ refers to the continued addition of new functions and features to a software or information system project during the development phase. The requests for new functions and/or features can come from the client's desire for a 'bigger and better' product, or from the developers' own desires to improve the product.
answer
Feature Creep
question
A ____________is the graphic image, text, and/or navigation links at the top of a web page. A ____________'identifies' the website, and at times may also 'identify' a specific sub-section or subject area (category) of the website in question.
answer
Masthead
question
_______________ refers to the inability to remember where a particular item of information was seen or heard. The temporarily forgotten information can come from a variety of sources such as: mail, e-mail, newspapers, magazines, websites, radio, and/or TV.
answer
Infonesia
question
_____________ is software that is set up to filter out and/or block access to websites containing: undesirable web content, age-inappropriate content, sexually explicit content, illegal download websites, social websites in work environments, etc. Parental controls and software that limit the websites children have access to also fall into this category of software.
answer
Censorware
question
__________________ refers to the use of a computer isolated from the main network with one or more anti-virus/anti-malware programs installed to check removable media for viruses or malware. The flash drives, portable hard discs, memory cards, CDs, etc. must clear this 'hurdle' before being allowed near the other computers or into a high security computing environment.
answer
Sheep Dipping
question
________________ refers to large scale industrial computer systems (hardware and software) that control and monitor industrial processes like the examples listed below: •Industrial Processes such as manufacturing, fabrication, or refining. •Infrastructure Equipment for water treatment, electrical power transmission/distribution, telecommunications, etc. •Conditions in facilities like heating, ventilation, energy consumption, or security.
answer
Supervisory Control And Data Acquisition
question
________________ refers to optical fiber and supporting infrastructure that is installed or laid in the ground, but is not currently in use. The ____________ may have been set up in anticipation of customer growth and demand in a given area, or for future 'internal' use by the company who installed it to connect their own offices.
answer
Dark Fiber
question
'________________' refers to the portion or sections of a web page that are visible to a visitor without scrolling. The portion or sections visible will vary in size due to different screen resolutions, choice of browser (combined with possible toolbars, etc.), zoom level and text size settings for the browser being used, and may even be 'affected' by the operating system installed on the computer.
answer
Above the Fold
question
A ________________ is a small website that may: contain just a few web pages, focus on a very specific singular topic or subject, serve a very special purpose, or be created for a short term purpose (such as a convention, event, or marketing campaign). The ______________ will have its own unique address that visitors or users will be encouraged to link to directly.
answer
Microsite
question
______________ is a 'general purpose' abbreviation that refers to the terms \"Anything as a Service\" and \"Everything as a Service\".
answer
XaaS
question
________________ refers to a type of computer program structure where the program code is written (set up) as independent modules (subsystems) that call on one another as needed.
answer
Ravioli Code
question
______________ is very similar to Hoteling, except focused on desks, cubicles, or work stations. These desks, cubicles, and work stations can be shared by multiple employees across different shifts, employees who are in the office at different times of the day, or simply be available to use as needed on a first come, first served basis without reservations ahead of time.
answer
Hot Desking
question
______________ refers to the use of unassigned seating and/or office space as needed by telecommuters or mobile office workers. Use of the unassigned seating and office space is set up ahead of time via a reservation-based system.
answer
Hoteling
question
_________________ refers to the use of technology by parents to track and monitor their children. At times this can, and does, include monitoring the people who help take care of children such as babysitters, nannies, school officials, etc.
answer
Big Mother
question
__________________ refers to the process of detecting incomplete, incorrect, inaccurate, misspelled, improperly formatted, duplicate, and/or irrelevant data in a database. Once the erroneous data has been found, it is modified, replaced, updated, and/or deleted as necessary in order to make the database as accurate and consistent as possible.
answer
Data Cleansing
question
________________ is software provided to users free of charge, but is licensed to benefit, or encourages the user to donate money to a particular charity of the software creator's or user's choice. Commercial grade _______________ includes a 'fee' collected for charity added to the price of the software.
answer
Careware
question
_________________ refers to the condition of data in a database or the processes conducted to ensure the accuracy (cleanliness) of data in a database. Clean data will be completely error free or contain very few errors. Dirty data however, will contain errors such as: duplication of information, incorrect spelling or punctuation (names and addresses), incomplete or outdated information, erroneous data (incorrect amounts or names), etc.
answer
Data Hygiene
question
_________________ is a slang term for an individual who is frequently away from their office traveling or on business, and engages in heavy use of their laptop and/or mobile phone while 'out and about'.
answer
Road Warrior
question
__________________ refers to the use of older computer hardware and software. For most individuals, _________________ is a recreational hobby, but for others the focus is on collecting rare or valuable hardware and software (sometimes for sentimental reasons).
answer
Retrocomputing
question
____________refers to the fear or anxiety an individual may feel when unable to obtain a signal from a mobile phone tower, forgetting to bring their mobile phone along, or having the battery run out of power, thus leaving them totally 'disconnected'. ______________is an abbreviation for \"no-mobile-phone phobia\".
answer
Nomophobia
question
_____________ is a slang term that refers to a website that has not been updated for a very long period of time.
answer
Cobweb Site
question
__________________ refers to the series of navigational steps taken to reach the desired location (information) in a website's content. _______________ are also found in file management software such as Windows Explorer, Mac OS Finder, Nautilus, Dolphin, etc.
answer
Breadcrumbs
question
A _______________ is a computer facility that remains in a 'lights out' condition the majority of the time, with all monitoring and administration of the facility being done remotely. The only time a _________________ has people active in it is to conduct maintenance or repair work.
answer
Dark Data Center
question
A ______________ is a web page that a user is presented with, and must interact with, before being allowed access to a particular network. ______________s can be as simple as: only requiring a set of log in credentials, present the user with a 'terms of use' policy that they must agree to in addition to entering log in credentials, and at times may even contain ads for the sponsors of a free network. _______________s are common for free Wi-Fi hot spots and can even be used as community bulletin boards.
answer
Captive Portal
question
______________ refers to the practice of minimizing the amount of information that a user is burdened with at any one time when interacting with technology. Most of the interaction between the user and the information occurs in a monitoring periphery state, allowing the user to focus on parts of the information flow as desired or needed, and make it the center of attention without being overwhelmed by the rest.
answer
Calm Technology
question
A _______________is a common word such as \"a, of, on, the\" that is not indexed and/or is ignored by search engines during a search query. The reason these words are not included is due to their frequent use in the language(s) individuals are using with a search engine. Excluding ______________s also helps save time when a search engine is returning results for a search query.
answer
Stop Word
question
__________________ refers to the practice of directly translating a printed brochure into a web page without utilising any of the capabilities a web page format offers. All that a visitor to the page will see is static text and images
answer
...
question
there will be no clickable links, image zoom, ability to leave feedback or see other visitors' opinions, video, etc. Literally, the only way to 'interact' with the page in any form is to print it out.
answer
Brochureware
question
_____________ refers to the practice of browsing the internet with an inverted color palette (i.e. white text on a black background). It was a highly favored practice to save energy when people used CRT monitors in the past. With the advent of LCD monitors however, there is no need for the practice since it makes little difference in the amount of energy used.
answer
Black Surfing
question
A ______________ (a.k.a. an Authentication Token) is a small hardware security device in the form of a swipeable card, key fob, or USB type of device. Once the _______________ has been activated in a manner appropriate to its physical form, the user will need to enter a personal identification number (PIN) or password, and may be required to enter an additional numerical code generated by the device. You can learn more about Two-Factor Authentication here.
answer
Security Token
question
An ________________ is the web-based equivalent of a bibliography. Taking things one step further, an annotated _________________is the web-based version of an annotated bibliography. Andrew J. Butrica of NASA was the person responsible for coining the term during his work on the history of NASA's X-33 project.
answer
Arachniography
question
________________ refers to hiding encrypted data or information inside of a common or completely innocent looking file such as an image, audio, or video file. For all intents and purposes, most people will never be aware that the file is more than it appears to be, thus providing a nice hiding place in plain sight. If someone does become aware of the 'extra data' in a file, it can be identified as encrypted data or information, but will be undecipherable without the decryption key.
answer
Steganography
question
__________________ refers to the ability of a website to encourage visitors to stay longer and/or return more often. The more interesting, useful, or fun the content of a website is, the more __________________ it has. The website in question may be a tech blog with daily content, a portal site like the Yahoo homepage, an information website like Wikipedia, a flash games website, etc.
answer
Stickiness
question
A ____________ is a waterproof wearable computer built specifically to withstand high underwater pressure. It allows divers to gather and enter data when conducting underwater studies, then transfer the data to a desktop computer via a serial cable after returning to the surface.
answer
WetPC
question
A ________________ is a program used to dial phone numbers and test them for a connection to a computer modem. The program then adds the numbers with a successful modem connection to a database. Depending on the complexity of the __________________program, the operating system of connected computers may be identified, and could be followed by automated penetration testing to break into the computers or network found.
answer
War Dialer
question
_______ is the term for spam that is delivered via instant messenger or chat services. While the volume of _____________ is not as bad as the volume of spam can be in our inboxes, it is more annoying in the sense that it displays directly when received, rather than being relegated to a junk or spam folder like it would in our inboxes.
answer
Spim
question
__________________ refers to the transfer of electronic information, data, images, etc. by physically carrying it via a flash drive or other storage medium between different computers or networks
answer
Sneakernet
question
________________ (UGC for short) refers to content such as information, data, news, reviews, blog posts, photos, videos, comments, etc. that an unpaid contributor has uploaded or provided to a website. Occasionally, the website in question will republish, promote, and/or possibly make a profit from ______________
answer
User-Generated Content
question
_________________ refers to the practice of registering slightly misspelled variants of popular 'brand name' URLs as domains. The hope is to catch people who mistype the URL of the official 'brand name' website, which then leads them to the 'false' one instead.
answer
Typosquatting
question
A __________________ is a temporary cookie that only exists as long as the browser is open. Once the browser has been closed, the ______________ is immediately erased and ceases to exist, unlike normal cookies that have a set 'expiration date' and remain on a computer after the browser is closed.
answer
Session Cookie
question
____________ is a slang term for the well-known Ctrl-Alt-Delete function that many of us might have used more times than we wanted to over the years.
answer
Three Finger Salute
question
A ________________ is a very basic level test of a program or new/repaired hardware that serves as an indicator of whether the rudimentary or most crucial functions are working. This could be as simple as seeing whether a new or freshly repaired computer will turn on at all without incident (i.e. smoke coming out of it literally), or seeing if a newly written program will at least run in some manner (even though it may not do much else at the moment).
answer
Smoke Test
question
__________ is an umbrella term that refers to any compact and/or very lightweight distribution of Linux such as Damn Small Linux and Puppy Linux for example. These versions of Linux are ideal for older hardware, hardware with limited resources, low-cost devices, etc.
answer
Skinny Linux
question
_____________________ refers to a work environment that focuses on the actual work done rather than the 'when and where' it is done.
answer
Results Only Work Environment
question
________________refers to malware that allows an attacker to have remote administrator level control of an infected operating system. Once the malware has compromised a system, the attacker is free to do whatever they please such as: stealing personal/financial information, taking screenshots, stealing/deleting/altering files, accessing the system's webcam if it has one, installing keyloggers, using the compromised system to infect other computers, etc.
answer
Remote Access Trojan
question
_________________ refers to the use of natural language (instead of programming language) to create a detailed outline of what a particular program or algorithm is supposed to do, just like creating a detailed outline for a major paper or report.
answer
Pseudocode
question
PUP (short for _______________) refers to an unwanted program or piece of software that may be installed along with the program or software that a user actually wants on their system.
answer
Potentially Unwanted Program
question
A _________________ refers to the blank areas (margins) on each side of bar codes. The _________________ 'tells' barcode readers where a barcode starts and stops, thus preventing the readers from 'seeing' other information that is not part of the bar codes, thus avoiding an inaccurate or unreadable scan.
answer
Quiet Zone
question
A __________________ is software that copies data and/or defeats copy protection schemes by copying/reading a file or disk one bit at a time.
answer
Bit Nibbler
question
An AIO (short for _______________) is a hardware device that combines many components, features, and/or abilities all into the same device housing. Two prominent examples are: AIO PCs, which have all the system components (except the keyboard and mouse) built into the monitor, and AIO Printers that combine printing, scanning, copying, and faxing all into the same device.
answer
All-In-One
question
_________________ is a GPS system that uses network resources and city-based cell towers in addition to regular satellite signals to provide the quickest, most efficient, and stable positioning data possible. The network resources and city-based cell towers are called upon whenever satellite signal conditions are poor, thus providing continuous positioning data without interruption.
answer
Assisted-GPS
question
A _____________ is an individual who loves testing and using beta-release versions of software. ____________s may be focused more on the testing (and breaking) side of things, or may be eager to try out new features that other users do not have access to yet.
answer
Betaphile
question
_______________ is a procedure to analyze network transmission efficiency and determine the error rate (bits received in error) of transmissions.
answer
Bit Error Rate Test
question
An _________________ is a website that 'observes' and adjusts to the interactions with, and habits of, its visitors. Once an ________________ has been able to establish patterns for its visitors, it will adjust the structure, content, and/or presentation of information in order to optimize the user experience for future interactions with those visitors.
answer
Adaptive Website
question
An _____________ is an area where a collection of cellular, microwave, radio, satellite, and/or TV transmitting/receiving antenna equipment is located together in a group. Grouping all the antenna equipment together like this makes it easier to perform maintenance and protect the equipment from theft.
answer
Antenna Farm
question
________________ refers to the theoretical concept of placing servers in the basements of residential homes, apartments, and offices as a source of heat for those buildings. Since servers generate large amounts of heat, it was theorized that a _______________ could be a cheaper source of heat for people while helping large companies save money in comparison to running full-blown data centers.
answer
Data Furnace
question
________ is the term used to 'describe' when a website receives a warning letter about copyright violations and/or is forced to remove copyrighted material from the website in question.
answer
Foxed
question
_______________ is a marketing strategy used to create a sense of insecurity in users and customers about a competitor's product. If effective, users and customers will be discouraged or hesitant about buying the competing product and stay with their current product supplier instead.
answer
Fear, Uncertainty, and Doubt
question
_________________is a network that has been specifically designed to withstand anomalies, disturbances, limitations, temporary (or intermittent) communications problems, and outages with as little impact as possible on regular network operations.
answer
Disruption Tolerant Network
question
A _________________is an individual or organization that searches for and registers well-known or popular website domains whose registration has lapsed by accident or forgetfulness. The _______________ will then offer to sell the domain back to the original registrants for a 'price'.
answer
Domain Sniper
question
An ___________________ is a private network or website that is not available to the general public, but is specifically set up for customers, partners, suppliers, vendors, etc. Access to an ________________ will require the appropriate login and password credentials, and can either be free or require a subscription.
answer
Extranet
question
An ________________ is a program that works its way through a network searching for software that needs to be updated and/or patches that need to be applied for known vulnerabilities. Like the malicious version, an ________________ will most likely operate on and update the computers in a network without users being aware of its presence.
answer
Ethical Worm
question
A ______________is a librarian who does most of their research and information retrieval via the internet, or an individual who specializes in using the internet as an information gathering and resource tool.
answer
Cybrarian
question
_____________refers to the practice of internally using a product or service a company has developed before offering or releasing it to the public.
answer
Dogfooding
question
A ________________ is a form of brute force attack used to discover passwords for user accounts, computers, and servers via the systematic entry of the words found in a dictionary.
answer
Dictionary Attack
question
_________________ refers to the elemental functions or processes that are conducted with a set of data or a persistent database.
answer
Create - Retrieve (or Read) - Update - Delete
question
_____________ refers to the density or number of typographic characters that will fit into an inch of printed line for a given font.
answer
Characters Per Inch
question
A ______________ is a method used by spammers in order to build a database of valid (working) e-mail addresses. This is done by generating lists of random or common names and sending them out to valid domains like Yahoo, Gmail, etc.
answer
Directory Harvest Attack
question
____________ is a nickname for an individual who enjoys spending time with people who are technical and/or more computer literate than they are.
answer
Droupie
question
________________ refers to raw data that has been analyzed, extracted, manipulated, organised, presented, and/or processed for further use.
answer
Cooked Data
question
____________ is a subset of standard HTML that was specifically adapted for use with small, 'limited ability' electronic devices such as mobile phones (older/earlier versions) and PDAs.
answer
C-HTML
question
________________ refers to data that is archived or kept for reference, and is rarely (or never) changed or updated. _________________ may be stored in encrypted form on a variety of sources such as: servers, backup storage, external backup mediums, an employee's hard drive, etc.
answer
Data At Rest
question
_________________ refers to the practice of using a search engine to see how many times and/or places your name is mentioned or cited on the internet.
answer
Ego-Surfing
question
______________ refers to ceasing all contact and interaction with the internet whether it be via computers, mobile phones, tablets, etc. so that an individual can de-stress and/or focus on actual physical contact or social interaction with people.
answer
Digital Detox
question
A __________, also referred to as an integrated circuit, is an unpackaged bare chip (a small block of semiconducting material on which a functional circuit has been fabricated).
answer
Die
question
_________________ refers to the \"questionable\" practice of adding the term \"cloud\" to the name of a hardware or software product in order to make it sound fresh, up to date, or as an attempt to re-brand it simply because of the cloud's popularity.
answer
Cloud Washing
question
________________ refers to the use of two or more cloud environments (public and/or private) for an application that requires a large amount of computing resources.
answer
Cloud Spanning
question
_____________refers to the act of removing an item or data from a Queue (temporary holding place for data). The opposite action (Enqueue) refers to the act of adding an item or data to a Queue.
answer
Dequeue
question
The original (and main) usage of the term ________________refers to the act of throwing someone or something out of a window. But when it comes to computers, the term ______________is humorously used to refer to the act of removing Microsoft Windows from a computer.
answer
Defenestration
question
_______________ refers to the sudden loss of an audio or video digital transmission signal. Unlike analog transmission signals which can fade in and out, digital transmission signals are an all-or-nothing deal...either there is enough signal strength to maintain the minimum signal threshold or there is not.
answer
Cliff Effect
question
_________________ refers to the percentage of customers who discontinue or cancel their mobile phone, online, subscription, or telephone service within a given period of time. The _________________is calculated by dividing the number of customers who discontinue or cancel their service by the average total number of customers for that time period.
answer
Churn Rate
question
A _____________ is a link to any web page of a given website that is not its home page (i.e. a link to a specific blog post rather than the blog's home page).
answer
Deep Link
question
_____________ refers to the 'moment of emergence' when an individual who has only observed a chat room, forum, etc. finally chooses to start actively participating and interacting with others.
answer
De-lurk
question
_______________ refers to decorative pieces of jewelry, personal adornments, household decorations, etc. that have been made out of outdated and/or scrapped electronic components.
answer
Chip Jewelry
question
A _________________ is a computer keyboard with flat, square keys with rounded corners that are reminiscent of Chiclets gum.
answer
Chiclet Keyboard
question
A ____________ is a specific or special subset/repository of data in a Data Warehouse that is for use by a specific department within a company, or for a particular function/need in a company's operations.
answer
Data Mart
question
________________ is a feature in most web browsers that lets an individual navigate a web page, select text, etc. with a \"|\" text cursor via their keyboard. The feature is also present in text editors, word processing programs, and desktop publishing programs.
answer
Caret Navigation
question
____________ refers to the practice of spelling out the names of hardware and/or software products using multiple capital letters such as BlackBerry, TiddlyWiki, etc. The use of _____________ can also be applied to long names or words where no spaces are allowed between the words entered/used on a computer system, thus making the words easier to read and understand versus an 'all capitals' or 'all lower-case' entry (i.e. JaneSmith versus JANESMITH versus janesmith).
answer
CamelCase
question
A _________________ can be either: A collection of blog posts that have been compiled, edited, and published as a printed book.
answer
Blook
question
_____________ refers to compulsive, excessive, and/or meaningless ranting/raving by an individual on a blog.
answer
Blogorrhea
question
______________ refers to the ability to use (operate) a computer mouse equally well with either one's left or right hand.
answer
Ambimoustrous
question
______________refers to the use of location services in smart phones by installed social media apps to constantly (and automatically) 'broadcast' your location to others in a given range. This is done with the intent of helping people find their friends so that they can do things together, or to meet new people in a given area who share similar interests. The constant 'broadcasting' of a person's location to friends and strangers alike does raise concerns about privacy, and in some cases, personal safety.
answer
Ambient Social Networking
question
_______________ refers to the practice of bribing and/or offering of desirable 'products' to bloggers in exchange for favorable write-ups, reviews, promoting, and/or mentions of a specific product or service on their blogs.
answer
Blogola
question
A _____________ is a list of recommended links to other blogs that are related to the blog in question, may be of interest to readers, or included as a show of support for the blog owner's personal interests or affiliations (i.e. political, etc.).
answer
Blogroll
question
______________ is a quotation from Roy Amara (1925 - 2007), a researcher, scientist, and past president of the 'Institute for the Future' regarding how we perceive the effects of technology. It goes: \"We tend to overestimate the effect of a technology in the short run and underestimate the effect in the long run.\"
answer
Amara's Law
question
__________________is a law enforcement technology that optically scans license plates on vehicles. The cameras come in two forms: fixed position cameras and mobile versions installed in vehicles.
answer
Automated License Plate Recognition
question
An ________________ is a somewhat sarcastic reference to a common computer error or problem caused by a user who had no idea what they were doing, and will most likely not admit to being the cause of.
answer
ID10T Error
question
_________________ refers to the recognition and translation of hand-printed, manually entered, or machine printed text characters into machine readable characters.
answer
Intelligent Character Recognition and Image Character Recognition
question
A ______________ refers to a serious hard-drive malfunction or the physical destruction of a hard-drive. This is due to problems such as contamination with dust particles, excessive 'jostling', faulty parts, high temperatures, misalignment, etc. that have caused the head to come into contact with the disk and either scratch or burn the disk, therefore destroying the data on it.
answer
Head Crash
question
A ______________ is a program that helps spammers to defeat spam filters. The __________________generates and inserts a unique string of text into each spam mail (i.e. the subject line, 'from' line, or message body). The random strings of text cause the spam mail to appear as negative results when converted to hash form and compared to the hashes of known spam samples.
answer
Hash Buster
question
________________ refers to being able to exit from the crashing of, or encountering of a major problem with, an application or program without having to restart the computer.
answer
Graceful Exit
question
________________ refers to the printing speed (measurement) of a printer when printing pages filled with or containing graphics.
answer
Graphics Pages Per Minute
question
______________ refers to the practice of bombarding a software program, operating system, or network with large amounts of random data to see if it will fail, reveal coding errors, and/or reveal security loopholes. If a problem is detected during the bombardment (test), then a program known as a fuzz tester may help to indicate or flag the cause(s). _________________is not the same as using carefully created data for formal testing (which comes later).
answer
Fuzz Testing
question
_________________ refers to a computer that is temporarily out of commission or malfunctioning due to hardware problems of some sort. A _________________ computer does not require new parts in order to be restored to working condition again, but simply tinkered with and/or repaired to resolve the problem(s).
answer
Frotzed
question
__________________ refers to software that has achieved a 'final, ready to go' status and is ready for release/sale to the public.
answer
Gold Code
question
_______________ refers to the full-out specialization and targeting of a product, service, and/or website to the language and culture of a particular country.
answer
Glocalization
question
A _______________ is a co-worker or work colleague that an individual has friended on a social network and/or become friends with outside of work.
answer
Frolleague
question
A __________________ is JavaScript code used in websites or web applications to prevent the content (web pages) from being displayed in HTML frames on other third party websites.
answer
Framekiller
question
A _____________ is a website that is no longer updated or maintained, but continues to remain online and viewable.
answer
Ghost Site
question
_______________ are Earth coordinates that are defined by their latitude, longitude, and elevation.
answer
Geodetic Coordinates
question
_____________________ refers to the updating of firmware, software, configuration settings, etc. on mobile phones, tablets, and other wireless hand-held devices via over-the-air code transfers.
answer
Firmware Over The Air
question
________________ refers to the practice of cleaning, deleting, moving, rearranging, and defragmentation of the various files on a computer in order to 'optimize' the file system on it.
answer
File Grooming
question
_____________ refers to the addition of geographical information such as latitude, longitude, altitude, bearing, and sometimes other types of information to images taken with a digital camera or mobile phone.
answer
Geotagging
question
__________________ refers to ready made software that is shrink-wrapped, produced in bulk, and can be purchased off the shelf in a variety of stores (offline and online). Examples of Generic Software are: various anti-virus suites, photo programs, typing programs, etc.
answer
Generic Software
question
Fiber Exhaust refers to a complete saturation of an optical fiber network
answer
...
question
in other words, that particular optical fiber network has no spare transmission capacity left for new or additional traffic. The effect of Fiber Exhaust can range from a single optical fiber all the way up to an internet level problem (as more devices and higher speed access becomes available to more people).
answer
Fiber Exhaust
question
______________ are search results that match (contain) the keyword(s) you were searching for, but have zero relevance to the information you were actually looking for. A simple example: Suppose you entered \"angel\" as your search term with the purpose of finding information about the 'Buffy spin-off' TV series, but in addition to the information you were actually looking for, you also got results for music videos for songs named Angel, Angel Stadium in Los Angeles, etc.
answer
False Drops
question
________________ is any software or program that has an expiration date or usage system 'built in'. The software or program will cease functioning or become unusable based on a specific date, number of days used, or number of times used by an individual.
answer
Expireware
question
_______________ is a computerized set of medical records that are shared by multiple healthcare agencies, facilities, and/or organizations.
answer
Electronic Health Record
question
_______________ refers to automatically falling back on (calling) a secondary system to take over when the primary one experiences a failure of some kind, or is 'down' for scheduled maintenance. The secondary system will have an up-to-date copy of all needed data and software ready to go for an immediate switch-over with as little interruption as possible to regular operations or work flow.
answer
Failover
question
__________________ refers to the ability of a system or hardware component (a hard-drive for example) to fail or stop working with a minimum of damage or destruction to the data or hardware component.
answer
Fail Soft
question
An _______________is a pseudo HTML tag that is used in place of emoticons or to convey feelings and actions in instant messengers, e-mail, comments, etc.
answer
Emotag
question
A ___________________ is a banner ad that is displayed on the results page when a search is done. The 'subject' material of the banner ad will be specifically related to the term(s) or information entered into the search engine in question.
answer
Meta Ad
question
________________refers to the sale of custom made and/or personalized products to customers by retailers with the majority of the transactions done via online interactions.
answer
Me-tailing
question
________________ refers to the use of advertisements to infect computers with malware. Such advertisements can be found on less than reputable sites and on trusted websites where malware authors have managed to sneak their specially crafted ads past the site's, or advertising network's, filters.
answer
Malvertising
question
A __________________is a group of websites created for the purpose of increasing search page rankings by cross-linking to each other. The incoming links shared between all the websites in the _________________work to create an 'appearance' of popularity for each other.
answer
Link Farm
question
______________ refers to software that engages in destructive, performance degrading, and/or spyware activities on a computer. The term _______________is a reference to the horror movie character Freddy Krueger from the \"Nightmare on Elm Street\" series.
answer
Kruegerware
question
A ________________ is a website that is set up so that the pages are linked one after another in a very specific order. This is done when the purpose is to teach a subject or to ensure that something is viewed in the order it is meant to be seen.
answer
Linear Website
question
____________ is a slang term for an individual who uses P2P (torrent) software and downloads files with little or nothing offered back in the way of uploads for other individuals to access.
answer
Leech
question
____________ is a term for an awkward, clumsy, crude, and/or inelegant solution to a hardware component, implementation, or program problem. Most of the time, a ____________ is a temporary or makeshift solution that will 'hold things together' until a better or more solid solution can be implemented.
answer
Kludge
question
_________________ refers to one thousand lines of program source code. KLOC can serve as a measure of the size of a program and programmer productivity, and defects per KLOC can be used to measure/evaluate code quality.
answer
Kilo Lines Of Code
question
_____________ refers to the process of 'transforming' technical subjects, jargon, and high-level communications into simpler, easier to understand terms and/or language for everyday people.
answer
Laymanize
question
__________________ refers to the use of location services (i.e. GPS) for the localization of products and services, or for business purposes in a mobile context.
answer
L-Commerce
question
_____________ refers to the practice of duplicating and/or inserting a large number of keywords into the meta tags and main content of web pages in order to increase page rankings in search results.
answer
Keyword Stuffing
question
___________________ refers to the process of setting up a specific key or key combination as a custom keyboard shortcut to suit a user's needs.
answer
Key Binding
question
______________ is another name for the internet and is based on the name of famous German highway 'The Autobahn'.
answer
Infobahn
question
_______________ are plain text Windows files that contains information used for installing 'items' such as: drivers for hardware, programs/software, and even Windows itself.
answer
INFormation Files
question
________refers to a jittery, shaking, or wobbly effect in video footage. A very common cause of ________is when '24 frames-per-second' video footage is converted to a '30 or 60 frames-per-second' format. The uneven division of 24 into a '30 or 60 frames-per-second' format means that some video frames have to be repeated an additional extra time to fill in the missing frames, therefore causing the ___________effect.
answer
Judder
question
A _________________ is an account where the user name (login name) and password are exactly identical. For example: User Name = foxygeek and Password = foxygeek.
answer
Joe Account
question
An ______________is a link found on a third-party website that leads people back to your website or a specific area/post on your website.
answer
Inbound Link
question
____________ refers to any data that is stored and/or transmitted without encryption. Such data can include: ATM/credit card information, audio files, documents, messages (i.e. chat or e-mail), sensor data, video files, etc.
answer
In The Clear
question
A _________________ is one which is able to function as a regular laptop, or when needed, can have the keyboard detached so that the device can be used as a tablet.
answer
Hybrid Laptop
question
A _______________ is a program that automatically surfs the internet while imitating the regular (or common) actions of a human user. It does this in order to detect exploits in websites, identify malicious activity, or look for unusual activities that may indicate a security problem.
answer
Honey Monkey
question
_______________ refers to the proper arrangement of pages on a printed sheet of paper so that all pages are in the correct order when cut and folded for the final product.
answer
Imposition
question
An ____________is graphic element such as an emoticon, icon, number, symbol (i.e. @), etc. that expresses, represents, or symbolizes, an idea.
answer
Ideogram
question
The ____________ are the keys in the middle (central) row of keys on a standard QWERTY keyboard.
answer
Home Row Keys
question
________________ is one of seven pre-defined root keys in Windows. It stores settings that are specific to the user who is currently logged in.
answer
HKey Current User
question
________________refers to the condition that arises when multiple devices, parts of a system, and/or users attempt to use or access a single/limited resource at the same time.
answer
Contention
question
A _____________ is an internet company that has gone out of business or is failing. The term originated during the stock market crash at the turn of the century that brought the dot-com bubble to an end.
answer
Dot Bomb
question
_____________ is a slang term for getting fired from a job for making less than flattering comments about the company one works for, the work environment, and/or about co-workers on a personal blog.
answer
Dooced
question
A ________________is a website that publishes a large volume of news and/or information that is specifically geared toward helping the website in question rank highly in search engine results. This is done for the sole purpose of generating revenue from the ads displayed on the website.
answer
Content Farm
question
A ___________________ is one that contains a combination of data elements such as text, photos, graphics, spreadsheets, sound clips, video clips, and/or other multi-media elements. Two examples of _________________ types are text/word documents (i.e. Microsoft Word for example) and html files.
answer
Compound Document
question
_______________ is the practice of purchasing multiple domain names (especially ones that are misspelled versions of popular domains), setting up home pages with ads, then tracking the new home pages (domains) to see which ones are profitable and which ones are not.
answer
Domain Tasting
question
________________refers to the practice of repeatedly registering and cancelling the same domain name over and over again. This allows a _______________ individual to exploit the five day grace period without charge or penalty, yet \"own\" the domain name for free.
answer
Domain Kiting
question
A ______________is a device that can compare two currents, two quantities, two streams of data, two voltages, the physical properties of two objects, or an object with a standard to determine their equality.
answer
Comparator
question
_______________ refers to the practice of disabling lines or sections of program code by surrounding them with the appropriate comment start/stop syntax. This could be done in order to find the source of an error in a batch of code or to totally 'exclude' that part of the code from functioning/working in the final product.
answer
Comment Out
question
____________refers to the descriptive word or phrase in a text document or item of information that identifies the content, provides a basic 'concept', or represents the general content of the document or information.
answer
Docuterm
question
A ________________ is a computer workstation that does not have a hard-disk. The operating system, programs, and data are all retrieved and loaded from a network server.
answer
Diskless Workstation
question
A _________________ is a reserved section of computer memory that has not been used, accessed, or received any data for a long period of time.
answer
Cold Buffer
question
________________ refers to programs that clean up the appearance of code (or text) by making corrections to color, contrast, line indentations, positioning, removal of blank lines and/or spaces, size, spacing, etc., therefore making the code and/or text easier to read for humans.
answer
Code Beautifier
question
______________ generally refers to the one hour period of each day when telephone and/or internet traffic is the heaviest. But depending on the location and circumstances, there may be more than one ______________ per 24 hour period, meaning that the current communication 'infrastructure' has reached a point of saturation each of those times.
answer
Busy Hour
question
__________refers to data transmissions or transfers that occur in abrupt and/or short, uneven bursts.
answer
Bursty
question
____________refers to the automatic flowing of text around an embedded image in a document or from one page to the next.
answer
Autoflow
question
__________________ is a loss or reduction in the strength of signal power in a transmission. __________________ can occur for any type of signal whether it is digital or analog in form.
answer
Attenuation
question
_________________ refers to businesses that are set up with physical store locations, websites, and catalogs that provide customers a variety of convenient ways to purchase products.
answer
Bricks, Clicks, And Flips
question
A ________________ is a special key on computer keyboards that will temporarily interrupt a computer's communications line (i.e. modem connection) or stop the execution of the program currently in use. Some keyboards may not have a ______________, and some programs may not respond to the use of the ________________.
answer
Break Key
question
__________________ refers to a computer or machine intelligence that is superior to humans in one or more areas of knowledge combined with an implicit will to use that intelligence.
answer
Artilect
question
An __________________ is a computer virus that has been engineered with large amounts of misleading logic, complicated and/or confusing code, and methods to hide its real location. While this makes an ________________ very large in size compared to its 'brethren', it is done with the intent of making it very difficult to analyze and/or reverse engineer it.
answer
Armored Virus
question
A _______________ is a software program that is essential to a particular business for it to be able to operate. Examples of ___________________s include: resource management software, sales software, warehousing software, etc.
answer
Bread-And-Butter Application
question
______________ refers to the degradation of a server's or network's performance when too many end users boot up their virtual desktops or start up their systems to log into the network at the same time. A ______________ is most likely to occur at the start of the work day or when a shift changes.
answer
Boot Storm
question
______________ refers to applications, programs, or other services that can be rented or are available for sale online for businesses and/or consumers. The businesses that provide ______________ are known as application service providers.
answer
Apps On Tap
question
An __________________ is a mobile device app that allows you to interact with physical devices such as a home environment control system, home theater, television, toys, etc.
answer
Appcessory
question
A _____________ is a newly invented word or term
answer
...
question
it may also refer to a new meaning for a pre-existing word or term. Rapid changes and progress in technology create a perfect environment for the invention of ___________.
answer
Neologism
question
________________ refers to the transmission of programs (video and/or audio) to a select group of individuals.
answer
Narrowcasting
question
_________________is the combination of mechanical and electronic systems that utilize microprocessors and software in robotics, industrial control systems, and human interfaces.
answer
Mechatronics
question
______________ is a slang term for the physical world and/or real life.
answer
Meatspace
question
An __________________ is a safety device that is capable of preventing an action from taking place and/or prevents activation during unsafe conditions.
answer
Interlock
question
An _______________ is a data form or application that has interactive elements, help screens, visual cues, and may even include a low level of artificial intelligence. These elements are meant to help a user fill out the form or work with the application as accurately and easily as possible.
answer
Intelligent Form
question
_______________ refers to the alignment of text between the left and right margins of a document. The alignment can be set along the left margin (flush left), the right margin (flush right), be justified (a.k.a. fully justified, where the text is evenly spaced across a line so that it is flush with the left and right margins), or centered.
answer
Justification
question
A _____________ (a.k.a Splash Page) is a temporary or permanent web page that serves as a 'jumping off' point that directs visitors to other web pages or websites. The _____________ may be nothing more than an index/list of links, serve to redirect visitors to a website's new URL, be set up for a promotion of some sort, or even exist as the starting point for a survey.
answer
Jump Page
question
______________ refers to operations, product development, and/or process development that occurs on-site using existing facilities, personnel, and supplies.
answer
In House
question
___________ sounds are sound waves with frequencies that fall below the audible hearing range of humans.
answer
Infrasonic
question
In desktop publishing and typography, a _________________ is the space between columns in a multiple column document.
answer
Gutter
question
___________ is shareware that attempts to elicit a purchase of the software in question via guilt tactics such as: collecting for a charity, reminding users of how hard the developers worked on the product, etc.
answer
Guiltware
question
_______________ is a combination of information and entertainment presented together in a program on radio and television, or via a delivery format such as websites on the internet, etc.
answer
Infotainment
question
__________________ is the mathematical and behavioral study of encoding, retrieving, storing, and transmitting data.
answer
Information Theory
question
A ___________ is an encryption (cryptographic) key that is used by everyone on a particular network or shared by a group of users.
answer
Group Key
question
______________ refers to unauthorized network-based applications that are downloaded and installed on a corporate network without permission from a company's IT department. Such applications include: instant messengers, peer-to-peer file sharing programs, streaming media players, RSS readers, and video call/conferencing programs.
answer
Greynet
question
_______________ refers to the period of time between information being gathered and when it becomes available to employees or the public.
answer
Information Float
question
An ________________ is an individual who is in business to gather and sell electronic information.
answer
Infopreneur
question
The term ______________ refers to the installation of new network equipment (hardware) and/or software with a focus on integrating with or taking into account existing hardware or software. Contrast with Greenfield.
answer
Brownfield
question
The term ________________ refers to an installation of new network equipment (hardware) and/or software without the need to integrate or take into account existing hardware or software. Contrast with Brownfield.
answer
Greenfield
question
A _____________is a series of typographical or special characters like #@%$! that are used to represent/replace profane words or phrases. American cartoonist Mort Walker ('Beetle Bailey' and 'Hi and Lois') is credited with the creation of the term.
answer
Grawlix
question
A _____________ is one where matches or items loosely related to the topic an end user is looking for are found even if users misspell words or enter partial words, etc. when looking for information.
answer
Fuzzy Search
question
______________ refers to the (directional) downloading of web pages, files, data, etc. from an online internet source to the end user.
answer
Downstream
question
A __________________ is a transmission from a satellite to an Earth-based station or a transmission from a cell tower to a mobile phone or device.
answer
Downlink
question
A _______________ is a computer file or other data that is not broken apart (fragmented) across a hard-disk. This makes it faster to read and write the file when working with it.
answer
Contiguous File
question
__________ refers to the practice of including too many hyperlinks in the text of a web page.
answer
Overlinking
question
_______________ refers to telecommunications operations that are almost synchronous. For example, if you have a transmission exchanged between two devices with different clock settings, the transmission may not arrive in the same time slot it was sent, but if it arrives within a set/defined time range it would be considered ______________.
answer
Plesiochronous
question
______________ refers to the barest minimum or simplest version of functions, etc. that are available in an application or system.
answer
Plain Vanilla
question
An _______________ is a graphical chart that shows the layers of a complete system, organization, or process in a set of concentric circles. Each circle in the chart shows its dependency on the part shown inside of that circle with the innermost circle being the core of the whole system.
answer
Onion Diagram
question
__________________ refers to a form of screen distortion where the sides of the on-screen visual display bow outward in a barrel-like shape. Contrast with Pincushioning.
answer
Barrel Distortion
question
________________ refers to a form of screen distortion where the sides of the on-screen visual display bow inward. Contrast with Barrel Distortion.
answer
Pincushioning
question
__________________ refers to telephone calls that a user is not aware of. __________________can occur when a preset number is accidentally pressed on a mobile phone or a computer application dials up via an Internet connection to send data out to a website.
answer
Phantom Dialing
question
_____________ refers to the process of removing an existing user from a company's identity and access management system or downgrading an existing user's privileges in the company's system. Contrast with Onboarding.
answer
Offboarding
question
______________ refers to the process of adding a new user to a company's identity and access management system or upgrading an existing user's privileges in the company's system. Contrast with Offboarding.
answer
Onboarding
question
A ______________ is a random snippet or chunk of irrelevant text (data) that is pasted into an online conversation in order confuse, disrupt, or irritate recipients on the other end.
answer
Paste Bomb
question
____________ refers to the retraction and locking of the read/write head of a hard disk to its home location in order to prevent damage prior to physically moving it. Modern disk drives support automatic __________ing, doing so whenever the hard disk is powered down.
answer
Park
question
________________ refers to the property of being oil resistant. _______________ coatings are helpful in repelling natural body oils that transfer to touch screens when touched with fingers during use.
answer
Oleophobic
question
An _______________ is the very short moment of time it takes you to realize that you just messed up in a big way while working on your computer. Some examples of ____________s are: accidentally clicking the No Button when you meant to save a document and end up losing all your work, clicking Send for an e-mail message before adding an important attachment, triggering a system shut down or restart while in the middle of something important, etc.
answer
Ohnosecond
question
__________________refers to data that may have been input erroneously, corrupted during processing, or unstructured text/data that can not be interpreted by machines.
answer
Noisy Data
question
A ________________occurs when a network is barely able to function or completely grinds to a halt due to excessive traffic. ______________s can be caused by an overload of legitimate traffic, erroneous conditions, malicious activity, or a lack of infrastructure able to accommodate such a high volume of traffic.
answer
Network Meltdown
question
______________refers to software that operates as a communication, conversion, and/or translation layer between two separate programs. Programs that need _______________may be running on different platforms, come from different software vendors, or both.
answer
Middleware
question
_______________refers to online transactions involving the exchange of very small amounts of money. An example of __________________ is a pay-per-view service that allows viewing of single articles or researching singular instances of information from an online encyclopedia.
answer
Microcommerce
question
A __________________ is an individual who displays deviant behavior on the Internet or uses the Internet to engage in psychologically dangerous behavior.
answer
Netopath
question
A ______________ is a user of the Internet or, if you prefer, a member of the community of Internet users.
answer
Netizen
question
A _________________is a web browser specifically designed for the display screens on mobile phones or similar small hand-held wireless devices.
answer
Microbrowser
question
A Mickey is the unit of measure for the smallest detectable movement of a mouse in any direction. The length of a Mickey will vary depending on the particular equipment, but generally falls between 0.0039 and 0.005 inches (0.09906 and 0.127 millimeters).
answer
Mickey
question
A __________________is an obsessive Internet user or individual who has a great passion for the Internet. _______________ can also refer to an individual who is involved with supporting the Internet, its flexibility and technical underpinnings, and/or is involved with data networks and packet switching.
answer
Nethead
question
____________ refers to the programming practice of embedding a loop, block of code, etc. in another object of the same type. __________ can also refer to the practice of adding sub-folders within a main folder to create a folder hierarchy.
answer
Nesting
question
MEO (short for ________________) is a term for communication satellites that orbit our planet in a range between 1,243 and 22,236 miles (2,000 and 35,786 km) above the surface with orbital periods between 2 and 24 hours. The most common uses for MEOs are navigation, communication, and geodetic/space environment science.
answer
Medium-Earth Orbit
question
______________ is software that allows an enterprise environment computer with Windows 7 to host one or more virtual operating systems, such as Windows XP, for use with legacy applications a company may have.
answer
Microsoft Enterprise Desktop-Virtualization
question
__________________refers to the practice of visiting a physical location (bricks and mortar store) to view and examine products in person, but with no intention of making a purchase at the store. If the _________________ individual likes the item, then they will shop for the same item online while attempting to find it for a lower price.
answer
Showrooming
question
________________ refers to the extra programs that come pre-installed on computers and offer little to no value to consumers, but may appear attractive to first-time buyers who 'feel' they are getting more with their purchase. A popular synonym for _____________ is Crapware.
answer
Shovelware
question
_______________ refers to the use of both thumbs to type or enter data on very small keyboards on hand-held devices.
answer
Thumbing
question
A ________________is an animated graphic that serves as an indicator that an operation is taking place. Some examples of these operations are an application loading, an individual's device is in the process of communicating with another device, a web page is loading, etc.
answer
Throbber
question
________________ refers to the practice of looking over another individual's shoulder in order to learn their passwords, PINs, security codes, or other private/personal information.
answer
Shoulder Surfing
question
________________ occurs when the number of servers in a data center continues to grow without an organized plan to make the most efficient use of them. Many of these servers take up space and consume resources without a beneficial return, otherwise, they are under-utilized and wasteful.
answer
Server Sprawl
question
_____________is a measurement of the number of telephones versus the number of individuals in a region.
answer
Teledensity
question
______________refers to a love of computers, electronics, high-tech gadgets, and new technologies.
answer
Technophilia
question
________________ is simply another way to refer to a Right-Click on a computer mouse (or a Left-Click on computer mice set up for left-handed individuals).
answer
Secondary Click
question
_____________ refers to the gathering of web data such as favorite songs or topics from a website's users, then using the data to help users find other individuals with similar interests and/or to help the website make recommendations to users.
answer
Scrobble
question
A ___________________ is detachable 'pop-up' program menu that can be moved from its starting (primary) position to another location on a user's screen as needed or desired.
answer
Tear-Off Menu
question
________________ refers to the ability of an RFID Reader to identify, encode, or read a specific/singular RFID Tag from among many that are grouped together (with no interference with or from the others in the group).
answer
Tag Singulation
question
A ___________________is a display of all relevant caller and account information that appears on-screen for an agent to view when an individual contacts a company's call center. Database information can be matched to the caller via methods such as Caller ID, voice response, or an automatic call distributor (ACD).
answer
Screen Pop
question
In the context of electronic data, _________ refers to process of removing sensitive or personal information from a database, information system, or file before allowing others to have access to it.
answer
Sanitize
question
In the context of word processing, _______________refers to the process of making changes in the appearance, page layout, and/or line breaks of text in a document. This can occur when working text around objects in an original document or creating a revised version of an original.
answer
Reflow
question
_____________ is the process of editing/preparing sensitive documents for publishing or release to the public.
answer
Redaction
question
________________ refers to a display standard with a resolution of 2,048 by 1,526 pixels (four times the number of pixels in the XGA standard of 1,024 by 768 pixels).
answer
Quantum Extended Graphics Array
question
______________ refers to slowing down (reducing) a computer, program, resource, or thread to an inactive state to conserve power but yet have the ______________ 'item' available and ready to go if need be.
answer
Quiesce
question
A _____________ is an electrical circuit or device used to convert alternating current (AC) into direct current (DC).
answer
Rectifier
question
_________________ is the process of making electronic components, products, and systems used in space, satellites, nuclear plants, and military applications resistant to damage or malfunctions from ionizing or high-energy electromagnetic radiation.
answer
Radiation Hardening
question
A __________________ is the limit for accurately measuring transmitted or sensed wavelengths in an optical system, such as lasers, optical receivers, and the human eye.
answer
Quantum Limit
question
A _________ is a tree structure (method) used to search and/or place files (records or keys) in a database. The starting branch point (node) in a ____________ will always have four branches and will continue to divide by four until the appropriate file is found or placed.
answer
Quad Tree
question
A ______________is an individual who is quite knowledgeable about a particular subject, thus leading them to have above normal knowledge about products related to that subject.
answer
Prosumer
question
A ______________ is an independent window that will appear beneath/behind the current browser window. Most of the time these ______________s are ads, but on occasion they do contain other content.
answer
Pop-Under
question
_______________ refers to excessive sharing of children's pictures, videos, and information on social media websites by parents.
answer
Oversharenting
question
______________ refers to any data that is not contained in a database. The Unstructured Data can be in the form of documents, PDF files, e-mail messages, web pages, etc.
answer
Unstructured Data
question
______________ are single-byte control codes that do not represent written symbols. Instead, they are used for controlling printers and serial communications.
answer
Unprintable Characters
question
In the context of tech support and customer service, ______________ is a condition affecting individuals who end up answering the same questions over and over again on a daily basis.
answer
Repetitive Brain Injury
question
A _____________ is a return transmission of data received to the originating source so that it may be verified and checked for errors.
answer
Remote Echo
question
In the context of word processing, ____________refers to deselecting a block of text, removing highlighting from text, or the removal of other special markings in a document.
answer
Unmark
question
______________ refers to the counting of separate (unique) individuals who visit a website within a given period of time. The time period may be as short as a day, week, month, etc. If a counted individual visits the website in question multiple times during the chosen time period, then those visits are counted as user sessions.
answer
Unique Visitors
question
___________refers to the process of taking the original version of an audio or video recording and enhancing the quality, adding effects, adding extra content, etc. to create an improved or expanded version.
answer
Remaster
question
A ____________ is a website that operates as an identity provider and allows users to log into multiple sites with a single set of credentials. Use of a Relying Party can save other websites from the hassle and headache of developing and maintaining their own login mechanisms. A good example of a Relying Party is OpenID.
answer
Relying Party
question
_____________refers to communication with others or the transfer/transmission of data in a single direction.
answer
Unidirectional
question
A ___________is communication or transmission of data between a single sender and a single receiver.
answer
Unicast
question
A __________ is a website that serves as an online resource of news, articles, and services focused on a specific industry such as IT, retail, etc. versus general purpose websites that focus on multiple industries or topics.
answer
Vortal
question
___________ refers to a messaging system where recorded video messages are sent as e-mail (rather than text-based messages).
answer
V-mail
question
___________refers to the inability of a computer to keep up with the read/write buffer's data requirements during the CD/DVD recording process. Causes for Underrunning may be a slow CD/DVD drive, limited memory, out-of-date drivers, etc.
answer
Underrun
question
___________ is a term used to refer to people who do not have bank accounts and/or are not served by banks in any manner. These individuals cash checks via non-bank sources, use money orders and/or money transfer services, and may even depend on pay day lending services.
answer
Unbanked
question
____________ is the process of recording an audio or video broadcast so that it may be listened to or watched at a later time.
answer
Time Shifting
question
___________ refers to a computer environment where multiple users are able to access and use a centralized computer, server, or cluster of servers via remote terminals.
answer
Time-Sharing
question
_____________ refers to the practice of visiting a physical location (bricks and mortar store) to view and examine products in person, but with no intention of making a purchase at the store. If the ____________individual likes the item, then they will shop for the same item online while attempting to find it for a lower price.
answer
Showrooming
question
_________refers to a mathematical sum known as a Sextillion (10 to the 21st power).
answer
Zetta
question
__________ refers to the removal of redundant zeroes from a number so that its legibility is greatly improved or to deal with storage, page, or display space constraints. Two examples of Zero Suppression are: 00093752 becomes 93752 54.194400000 becomes 54.1944
answer
Zero Suppression
question
_________ refers to a mathematical sum known as a Septillionth (10 to the -24th power). Contrast with Yotta.
answer
Yocto
question
__________refers to a mathematical sum known as a Septillion (10 to the 24th power). Contrast with Yocto.
answer
Yotta
question
___________ is a security exploit that allows an attacker to cause a web browser to execute a malicious script via a legitimate appearing link. Once these types of links are clicked on, the code is executed and the attacker can gain access to the user's computer.
answer
XSS
question
A _____________ is a service or network that controls or restricts a user's access to applications, channels, programs, services, web content, etc.
answer
Walled Garden
question
___________ refers to the period of time a program or processor waits for the completion of an event or operation to occur before resuming normal activity.
answer
Wait State
question
___________ refers to people who use Twitter whether they are tweet writers and/or just tweet followers.
answer
Tweeple
question
A ________________ is a computer generated document (with OCR fonts used during the creation process) that can have extra information added to it physically by an individual, then be scanned back into the system to update an account, generate bills, etc.
answer
Turnaround Document
question
_____________ refers to a group of people who are working on a 'public or secret' project outside the normal rules in order to achieve unique and/or unusual results.
answer
Skunkworks
question
A _____________ is a design feature that is copied or carried over from an older or original design/version of a product. A perfect example is the 'click sound' that a digital camera makes. It is unnecessary to the function of the camera, but it is a holdover from older cameras with shutters that actually made the sound.
answer
Skeuomorph
question
____________ refers to the transmission of data structured in one protocol within a differently structured protocol (embedding). This could be done to carry the data over an incompatible delivery network or to provide a secure path via an untrusted network.
answer
Tunneling
question
__________ is a compact Linux operating system commonly used as an emergency system for computers and/or to monitor or analyze networks and network problems.
answer
Trinux
question
A ____________is an individual who embraces the idea of an inevitable technology singularity (the ability of new technology to speed up the development rate of newer technology).
answer
Singularitarian
question
The term '_____________' refers to the potential risk of relying on a singular communications line, component, configuration, design, device, or implementation to keep an entire system running. One instance of a flaw appearing or complete failure of that singular 'piece' will bring the whole system down. Continuous operation of the entire system is ensured by having a backup in place and ready to go if a problem occurs.
answer
Single Point Of Failure
question
___________ refers to using a combination of non-digital (traditional) and computer-based methods to produce art, printed materials, and animations.
answer
Tradigital
question
TPI (short for __________) is a measurement of disk capacity or the density of the storage channels on a disk or tape.
answer
TPI
question
_________refers to a one way (unidirectional) transmission where the transmitter and receiver operate on the same frequency.
answer
Simplex
question
A __________ occurs when a program (or malware) runs an unattended installation process and does not display dialogue or message windows of any type during the procedure.
answer
Silent Installation
question
A ________ is heavily protected underground server (root site) that serves as the starting point (top of the distribution chain) for sharing and distributing copyrighted/pirated files such as movies, music, software, and games.
answer
Topsite
question
A __________ is a fixed amount of time chosen to complete each stage or aspect of an overall project. The Timebox for one stage of a project may be 60 days in length while a later stage would have a Timebox of only 30 days.
answer
Timebox
question
A ___________ is a text-based signature or file with relevant information such as a name, address, logo, quote, etc. that is attached to the end of e-mail or Usenet messages sent by an individual.
answer
Signature File
question
__________ refers to the process of installing an application on a mobile device from an online marketplace or repository that is not a part of the device manufacturer's official application distribution channel.
answer
Sideloading
question
A ____________ is a word or command (noun or verb) that is part of a programming language and can not be used to describe user data such as: the name of a variable, constant, function, or procedure.
answer
Reserved Word
question
________ refers to the process of duplicating, reprinting, or reproducing printed materials and/or graphics using electromechanical methods, photographic methods, or printing presses.
answer
Reprography
question
A _____________ is touch-screen tablet computer designed for light-duty Internet activities such as visiting websites and interacting with web applications.
answer
Web Pad
question
A ____________ is a group of topic-specific websites that are interlinked together in a circular-style manner. This allows easy navigation through the group of websites, and if you click through enough, you will end up back at the first website you started from.
answer
Web Ring
question
A _______________ is an electronic device capable of processing and/or storing data and designed in a form where it may be worn on a person's body or be incorporated into their clothing. Some well-known Wearable Computer 'forms' are: Smart watches, Google Glass, POV cameras, MP3 players, etc.
answer
Wearable Computer
question
_____________ refers to the process of reloading a computer's operating system via the restart function on its main menu or through the use of a special keyboard shortcut combination.
answer
Warm Boot
question
_____________ is the practice of publicly identifying open and/or unsecured Wi-Fi networks via special symbols 'written' on buildings or sidewalks using chalk.
answer
War Chalking
question
___________ refers to a mathematical sum known as a Sextillionth (10 to the -21st power). Contrast with Zetta.
answer
Zepto
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New