Computer Acronyms

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which protocol is responsible for transferring files over the internet?

  • HTTP
  • TCP
  • IP
  • FTP (correct)

A peer-to-peer network requires a dedicated server for resource sharing.

False (B)

What type of memory retains data even when the power is turned off?

Non-Volatile Memory

_____ refers to a networking device that forwards data packets between computer networks.

<p>Router</p> Signup and view all the answers

Match the following network types with their descriptions:

<p>LAN = A network within a single physical location WAN = A network that interconnects multiple local area networks MAN = A network covering a metropolitan area PAN = A network for personal devices in close proximity</p> Signup and view all the answers

Which of the following describes the function of a GPU?

<p>Graphical Processing Unit (D)</p> Signup and view all the answers

BIOS is stored in volatile memory.

<p>False (B)</p> Signup and view all the answers

What does the acronym SATA stand for?

<p>Serial Advanced Technology Attachment</p> Signup and view all the answers

A _____ is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area.

<p>Campus Area Network</p> Signup and view all the answers

Match the following abbreviations to its description:

<p>SSD = Solid State Drive HDD = Hard Disk Drive RAM = Random Access Memory CPU = Central Processing Unit</p> Signup and view all the answers

Which type of network is used for connecting devices in a small personal space without wires?

<p>WPAN (C)</p> Signup and view all the answers

The term 'LIF' stands for 'Large Insertion Force'.

<p>False (B)</p> Signup and view all the answers

What is the purpose of a CMOS battery on a motherboard?

<p>To power the BIOS chip</p> Signup and view all the answers

The term _____ refers to an automated software program that executes certain commands when it receives a specific input.

<p>BOT</p> Signup and view all the answers

Match the following wireless technology with its description:

<p>WiFi = Wireless Fidelity SSID = Service Set Identifier WPA2 = Wi-Fi Protected Access 2 CLI = Command Line Interface</p> Signup and view all the answers

What is the function of 'CHKDSK' command in the Recovery Console?

<p>To examine and repair volume errors (A)</p> Signup and view all the answers

In Windows, a single physical hard drive cannot be divided into multiple logical hard drives.

<p>False (B)</p> Signup and view all the answers

What hardware component allows a computer to connect to a network?

<p>Network Interface Card</p> Signup and view all the answers

The acronym _____ refers to disk image also known as _____.

<p>ISO Image</p> Signup and view all the answers

Match the following Windows boot-up modes with its descriptions:

<p>Normal Booting = The system is functional Safe Mode = Used for troubleshooting problems preventing normal boot-up Repair Computer = Accesses recovery options, booting into the recovery partition</p> Signup and view all the answers

Which of the following tools is an extension of the Microsoft Management Console used to manage hardware devices?

<p>Device Manager (B)</p> Signup and view all the answers

A cross-over cable uses the same wiring standard (e.g., T568A) on both ends.

<p>False (B)</p> Signup and view all the answers

In a power supply, what is the voltage rating of the yellow wire?

<p>+12v</p> Signup and view all the answers

The term _____ pertains to the maximum data transfer rate on a network or internet connection.

<p>Bandwidth</p> Signup and view all the answers

Match the following Windows command-line tools with its functions

<p>PING = Tests network reachability NETSTAT = Displays network connections and routing tables NSLOOKUP = Finds IP address corresponding to a host or domain name DISKPART = Used for creating bootable flash drive</p> Signup and view all the answers

Which of the following is a disk image?

<p>ISO (A)</p> Signup and view all the answers

The minimum RAM requirement of Server 2008 R2 is 1 GB.

<p>False (B)</p> Signup and view all the answers

What command-line utility is used to export and import Active Directory object information?

<p>ldifde.exe and csvde.exe</p> Signup and view all the answers

Electrically, a _______ is an electronic component that needs to be discharged before replacement to prevent electric shocks.

<p>capacitor</p> Signup and view all the answers

Match the following USB specifications with its description:

<p>USB 2.0 = Has a maximum cable length of 5 meters USB 3.0 = Has a blue connector in Standard A receptacles and plugs</p> Signup and view all the answers

What type of server enables large number of users to exchange information near instantaneously and was formerly known as Internet Relay Chat (IRC) Servers.

<p>Real-Time Communication Server (C)</p> Signup and view all the answers

In Windows 7, a LAN connection icon with a yellow color indicator signifies 'No Connectivity'.

<p>False (B)</p> Signup and view all the answers

What is the ideal voltage on the YELLOW wire of a Molex Connector?

<p>+12V</p> Signup and view all the answers

______ allows to define a list of devices and only allow those devices on Wi-Fi network

<p>MAC address filtering</p> Signup and view all the answers

Match the classes of IP addressing to the correct IP address:

<p>Class A = 10.10.10.1 Class B = 172.168.10.1 Class C = 192.168.0.1</p> Signup and view all the answers

What is the purpose of thermal paste?

<p>To prevent overheating of CPU (A)</p> Signup and view all the answers

LoJack is a type of connector for USB devices

<p>False (B)</p> Signup and view all the answers

In networking, what term refers to pieces of related information that are transferred through a network?

<p>Connection</p> Signup and view all the answers

The acronym SSD refers to _____

<p>Solid State Drive</p> Signup and view all the answers

Match the media types of 10-megabit Ethernet with its correct description:

<p>10Base-36 = Composes of broadband coaxial cable carrying multiple baseband channels for a maximum length of 3,600 meters</p> Signup and view all the answers

Flashcards

HTTP

A set of rules for transferring files (text, images, video) on the World Wide Web.

WPA 2-PERSONAL

Protects unauthorized network access using a setup password.

PING

Tests if a host is reachable across an IP network.

Thermal Paste

Used to prevent CPU overheating.

Signup and view all the flashcards

ISO Image

A complete copy of data stored on an optical disc.

Signup and view all the flashcards

Network Interface Card

Connects computers to a network.

Signup and view all the flashcards

Router

A networking device forwarding data packets between networks.

Signup and view all the flashcards

Wireless Fidelity (WiFi)

Uses radio frequencies to send signals between devices and a router.

Signup and view all the flashcards

Anti-Virus Software

A computer program used for preventing, detecting, and removing threats.

Signup and view all the flashcards

Peer To Peer Network

Two or more PCs connected, sharing resources without a server.

Signup and view all the flashcards

Network Administrator

Monitors network security, operation, and users.

Signup and view all the flashcards

File Server

It stores user documents with a lot of memory and storage space

Signup and view all the flashcards

Dynamic Host Control Protocol (DHCP)

Provides IP address distribution on a network automatically.

Signup and view all the flashcards

NSLOOKUP

Finds the IP address that goes with a host or domain name

Signup and view all the flashcards

CrystalDiskInfo

A tool used for checking the condition of the hard drive

Signup and view all the flashcards

Software Troubleshooting

A process of resolving problems, errors and bug in software.

Signup and view all the flashcards

Access Point

A Device that acts as a bridge between wireless clients and wired network

Signup and view all the flashcards

Latency

Time between data sent and received.

Signup and view all the flashcards

Integrity

Ensures information and programs are changing only in an authorized manner.

Signup and view all the flashcards

NETSTAT

Displays network connections and routing tables.

Signup and view all the flashcards

Study Notes

  • CSS stands for Computer Systems Servicing.
  • TCP/IP stands for Transmission Control Protocol/Internet Protocol.
  • ISA stands for Instruction Set Architecture/Industrial Standard Architecture.
  • CMOS stands for Complementary Metal Oxide Semiconductor.
  • BIOS stands for Basic Input Output Setup.
  • PCB stands for Printed Circuit Board.
  • SATA stands for Serial Advanced Technology Attachment.
  • IDE stands for Integrated Device Electronic.
  • USB stands for Universal Serial Bus.
  • GPU stands for Graphical Processing Unit.
  • CPU stands for Central Processing Unit.
  • GUI stands for Graphical User Interface.
  • VGA stands for Video Graphic Array.
  • PS/2 stands for Personal System 2.
  • LPT stands for Line Print Terminal Parallel Port.
  • LIF stands for Low Insertion Force.
  • ZIF stands for Zero Insertion Force.
  • AVR stands for Automatic Voltage Regulator.
  • DDR RAM stands for Double Data Rate RAM.
  • SD RAM stands for Synchronous Dynamic RAM.
  • DVD ROM stands for Digital Versatile Disk-Read Only Memory.
  • PCI stands for Peripheral Component Interconnect.
  • PCI-E stands for Peripheral Component Interconnect Express.
  • MS-DOS stands for Microsoft Disk Operating System.
  • ATX stands for Advanced Technology-Extended.
  • FTP stands for File Transfer Protocol.
  • HTTP stands for Hypertext Transfer Protocol.
  • PAN stands for Personal Area Network.
  • WPAN stands for Wireless Personal Area Network.
  • WAN stands for Wide Area Network.
  • SAN stands for Storage Area Network.
  • MAN stands for Metropolitan Area Network.
  • HAN stands for Home Area Network.
  • CAN stands for Campus Area Network.
  • WIFI stands for Wireless Fidelity.
  • HDD stands for Hard Disk Drive.
  • FDD stands for Floppy Disk Drive.
  • SSD stands for Solid State Drive.
  • NVMe stands for Non-Volatile Memory Express.
  • ROMBIOS stands for Read-Only Basic Input Output Setup.
  • AGP stands for Accelerated Graphics Port.
  • RAM stands for Random Access Memory.
  • DIMM stands for Dual Inline Memory Module.
  • SIMM stands for Single Inline Memory Module.
  • RIMM stands for Rambus Inline Memory Module.
  • API stands for Application Program Interface.
  • CLI stands for Command Line Interface.
  • HTML stands for Hypertext Markup Language.
  • SSID stands for Service Set Identifier.
  • RJ45 stands for Registered Jack 45.
  • HDMI stands for High Definition Multimedia Interface.
  • LED stands for Light-Emitting Diode.
  • CRT stands for Cathode Ray Tube.
  • LCD stands for Liquid Crystal Display.
  • CD stands for Compact Disc.
  • DVD stands for Digital Video Disc.
  • URL stands for Uniform Resource Locator.
  • NTFS stands for New Technology File System.
  • FAT stands for File Allocation Table.
  • CSU stands for Computer System Unit.

Networking & Security Concepts

  • WPA2-Enterprise verifies network users through a server, requiring a more complex setup for additional security.
  • Port number identifies a specific process to which a network message is forwarded on a server.
  • A bot is an automated software program executing commands upon receiving specific input.
  • File System Quota enables administrators to configure storage thresholds on data sets stored on server NTFS volumes.
  • Failover in Windows Server allows workload migration between source and target clusters.
  • Counter Logs record performance statistics based on objects and instances available in Performance Monitor.
  • CHKDSK is a Recovery Console command that examines and repairs volume errors.
  • Normal booting indicates a functional computer system.
  • Safe Mode in Windows helps users resolve boot-up problems.
  • Repair Computer starts recovery options, booting into the recovery partition of the main hard drive.
  • A single physical hard drive can be divided into multiple logical hard drives.
  • The BIOS is originally stored in Read-Only Memory (ROM) in a standard PC.
  • An ISO Image is a complete copy of everything stored on a physical optical disc.
  • A Network Interface Card (NIC) connects a computer to a network.
  • A router is a networking device that forwards data packets between computer networks.
  • IEEE 802.11 is the standard behind the Wi-Fi trademark.
  • Local Area Network (LAN) connects devices in one physical location.
  • Wide Area Network (WAN) interconnects multiple local area networks.
  • Anti-virus software prevents, detects, and removes threats to a computer system.
  • Peer-to-peer network connects two or more PCs to share resources without a separate server.
  • Provider Address is the IP Address used by a virtual machine to communicate on a physical network.
  • WPA2-Personal protects unauthorized network access using a setup password.
  • Access Control List (ACL) consists of user matrices and capability tables governing user rights and privileges.
  • Information extortion occurs when an attacker steals data and demands compensation for its return.
  • Continuous assessment monitors the initial security accreditation of an information system, tracking changes.
  • Remote Storage Service in Windows Server migrates data to lower-cost and tape media on file servers.
  • A Virtual Cluster Server application group contains a Client Access Point and at least one application-specific resource.
  • Ping is a utility tool to test if a host is reachable across an IP network.
  • F5 is not appropriate to enter BIOS setup
  • Device Manager manages hardware devices and drivers in Microsoft Management Console.
  • The yellow wire in a power supply has a +12V rating.
  • A Yost cable is also known as a roll-over, Cisco cable, or console cable.
  • No connectivity is indicated by a yellow color for the LAN connection icon in Server 2008.
  • A Networking Interface Card (NIC) has 2 Light Emitting Diode (LED) lights.
  • Port forwarding redirects a communication request from one address and port number to another.
  • Wireless Fidelity utilizes radio frequencies as an alternative for wired connections to send signals between devices and a rooter.
  • Campus Area Network (CAN) is a network of LANs within a limited geographical area.
  • System Area Network (SAN) applies to the interconnection of LANs in a city over 5 to 50 kilometers.
  • A Network Administrator monitors network security, operation, and users.
  • A File Server is used to store user documents with a large amount of memory and storage space.
  • Lightweight Directory Access Protocol (LDAP) is an Active Directory protocol used to access data from a database.
  • Thermal paste prevents CPU overheating.
  • The maximum cable length for USB 2.0 is 5 meters.
  • Firmware is a software program stored in Read-Only Memory (ROM).
  • An ISO image is also known as a disc image.
  • The minimum RAM requirement for Windows 10 is 1 GB for 32-bit or 2 GB for 64-bit.
  • Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA) are two types of interfaces used to communicate between the hard drive and the computer motherboard.
  • The World Wide Web (WWW) is a spider-like interconnection of information located on computers in cyberspace.
  • A blue connector is common for USB 3.0 Standard-A receptacles and plugs.
  • The minimum hard disk drive capacity for Windows 10 is 16 GB for 32-bit OS or 20 GB for 64-bit OS.
  • Windows device drivers are stored in the Registry.
  • The red wire in a power supply has a voltage rating of +5V.
  • A crossover cable has one end wired as T568-A and the other as T568-B.
  • A LAN connection with a cross and red indicator in Windows 7 signifies a problem with the LAN driver.
  • A Fully Automatic Windows Update downloads and installs the latest versions.
  • A Bad Sector is a physically damaged cluster of storage on the hard drive.
  • Windows Ultimate is a Windows edition capable of restricting other users from accessing certain programs.
  • Device drivers can be found in the System32 folder.
  • Ideal Molex connector voltage ranges are Red=5V, Yellow=12V.
  • Straight-thru Ethernet cables connect computers to hubs and switches.
  • A network interface controller is also known as a LAN card.
  • 192.168.0.1 is a Class C IP address.
  • Hypertext Transfer Protocol (HTTP) transfers files on the World Wide Web (WWW).
  • Windows Folder Sharing traditionally accesses server data using the server message block protocol over TCP/IP.
  • LDIFDE.EXE and CSVDE.EXE are command-line utilities to export and import Active Directory object information.
  • A Gateway is a node that allows data to flow from one discrete network to another.
  • Resistance is measured when performing continuity testing of twisted-pair cables.
  • Local backup uses hard drives, discs, flash drives, and external drives housed on site.
  • Startup Repair in Windows fixes and scans for computer problems preventing booting.
  • Windows Recovery Environment runs commands for troubleshooting an unbootable operating system.
  • Capacitors need to be discharged electrically before replacement.
  • 802.11n is a current wireless networking standard compatible with older networks.
  • A core router operates in the Internet backbone.
  • MAC address filtering defines a list of allowed devices on a Wi-Fi network.
  • Wireless Personal Area Network connects through short range radio signals, e.g. infrared.
  • Wireless Local Area Network allows users to move while maintaining a network connection.
  • NetBackup is an enterprise-level backup and recovery suite.
  • A Directory Server centrally manages network users and resources.
  • Loss refers to an information asset suffering damage, modification, or disclosure.
  • The minimum cable length for USB 3.0 using a non-twisted pair is 3 meters.
  • M.2 is a storage drive form factor.
  • The Real-Time Clock/Non-Volatile RAM (RTC/NVRAM) chip stores BIOS settings.
  • An ISO file substitutes for an actual disc, allowing users to run software without loading a CD/DVD.
  • Dynamic Host Control Protocol (DHCP) centrally manages IP address distribution in a network.
  • The NSLOOKUP command-line tool finds a host or domain name's IP address.
  • A CMOS battery failure causes time and date resets.
  • CrystalDiskInfo checks the condition of hard drives, with status indications.
  • Implementing the Solution is the task after planning to fix a network.
  • Software Troubleshooting scans, identifies, diagnoses, and resolves problems in software.
  • 10.10.10.1 is a Class A IP address.
  • 250 devices can connect to a wireless router.
  • An Access Point bridges wireless clients and wired networks.
  • Virtual Local Area Network is a logical subnetwork grouping devices from the same switch.
  • Latency is the time lapse between data sent and received.
  • A Stress test pushes components to their limits.
  • Malicious code attacks execute viruses, worms, Trojan horses to destroy or steal information.
  • Diskpart is a text-based command for creating bootable flash drives.
  • The minimum RAM for Server 2008 R2 is 512MB.
  • If standard video is displayed it indicates a video driver has not installed properly in Windows 7.
  • A voltmeter reading Zero volt indicates a shorted diode.
  • A Real-Time Communication Server enables near-instantaneous information exchange.
  • Integrity ensures authorized changes to information and programs.
  • NETSTAT displays network connections for TCP and routing tables.
  • Communications Protocol defines how software and hardware interact within a network.
  • Cable Splicing joins two cable ends together.
  • FireWire is an interface standard for high-speed serial communication.
  • The Input/Output Controller Hub manages data communications between a CPU and a motherboard.
  • LoJack is a UEFI/BIOS setup option that allows security settings to perform tasks for locating the devices.
  • A terminal server connects serial devices across a network.
  • View Current Activity displays real-time system performance statistics.
  • A Network Interface Card (NIC) is a peripheral card with a media access control address.
  • Vertical Cross Connect is a main patch panel linking to telecommunication rooms.
  • A Raceway protects, routes, and hides cables and wires.
  • Universal Serial Bus (USB) C Thunderbolt is a 24-pin USB Connector system with a rotationally symmetrical connector.
  • The chipset facilitates communication between the CPU and devices.
  • Voltage in BIOS/UEFI is used to overclock computers.
  • The Minimum byte capacity of a bootable flash drive for Windows 10 is 8GB.
  • Minimum RAM requirement of Sever 2012 R2 is 512MB
  • In Windows 7, Windows and Security is located in Settings.
  • An IP Address Conflict occurs when two or more devices share the same IP address.
  • A hard disk should be replaced for frequent errors while moving files/booting.
  • FIXMBR writes a new master boot record on the hard disk drive.
  • The ATX12V P1 connector provides 3.3V, 5V, and 12V for the motherboard.
  • ANSI/TIA-587 defines structured network cabling standards.
  • Connection refers to transferring related information through a network.
  • 172.168.10.1 is a Class B IP address.
  • An Edge router connects an internal network to an external network.
  • Bandwidth describes the maximum data transfer rate of a network.
  • A Storage Area Network (SAN) is a high-speed network for hosts and interconnects.
  • Customer Premises Equipment (CPE) is a border router for corporate sites.
  • Authentication recognizes a user’s identity.
  • A Loopback Test verifies communication device operation.
  • A Frequency Analyzer monitors and intercepts traffic over the network.
  • Infinite Ohms resistance reading indicates an open wire.
  • An Application Server occupies computing territory between the database server and end user.
  • Access is a privilege or permission for using computer data or resources.
  • 10BASE-36 uses broadband coaxial cable with multiple baseband channels for a maximum length of 3,600 meters.
  • A Firewall monitors and controls network traffic based on security rules.
  • Downtime is when a system is unavailable.
  • NSLOOKUP certifies peer name resolution in Active Directory.
  • Flash Memory stores as a Solid State Drive (SSD).
  • A Boot slid before crimping is used to reduce strain in a patch cable.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Computer Science Acronyms Quiz
12 questions
Computer History and Acronyms Quiz
6 questions
Computer Acronyms Quiz
24 questions

Computer Acronyms Quiz

HardWorkingRubidium avatar
HardWorkingRubidium
Essential Computer Architecture Acronyms
20 questions
Use Quizgecko on...
Browser
Browser