Episode 8 – Glossary Part 1
Before we begin reviewing the glossary terms in this episode, it is worth taking a moment to recognize that learning a new technical certification is a bit like learning a new language. The terminology used throughout the A Plus certification can sometimes feel unfamiliar at first, especially if you are new to the field. That is completely normal. Many of these terms will appear again and again in later episodes, often without much explanation. So taking time to become familiar with the vocabulary now can make the rest of your study journey much smoother.
You do not have to memorize everything on the first listen. These glossary episodes are here for you to return to at any time. As you move through topics like hardware components, command-line tools, or security protocols, you may find that certain terms come up again in context. When that happens, you can always revisit this episode for a clearer understanding. Treat this glossary as a supportive foundation—something you can build on as your confidence grows. Let’s begin reviewing the selected terms, starting with the letter group covered in this episode.
A A A stands for Authentication, Authorization, and Accounting. These are the three foundational principles used to manage and track user access in network security. Authentication verifies identity, authorization controls what actions a user can perform, and accounting logs those actions for review or auditing.
A C stands for Alternating Current. This is the type of electrical current that flows in both directions and is commonly used in wall outlets and building power systems. It contrasts with direct current, or D C, which flows in one direction and is typically used in battery-powered devices.
A C L stands for Access Control List. It is a set of rules applied to network resources like files, folders, or routers to control which users or devices can access them. Each entry in an access control list defines permissions for a specific user or group.
A D F stands for Automatic Document Feeder. It is a hardware feature commonly found on printers and scanners that allows multiple pages to be loaded and processed automatically. This is especially useful for scanning or copying large documents without manual input.
A E S stands for Advanced Encryption Standard. It is a symmetric encryption algorithm widely used to secure sensitive data across many technologies, including wireless communication, secure storage, and encrypted files. The standard supports key lengths of one hundred twenty-eight, one hundred ninety-two, and two hundred fifty-six bits.
A P stands for Access Point. This is a network device that allows wireless devices to connect to a wired network using Wi-Fi standards. It serves as the bridge between wireless clients and the main network infrastructure.
A P F S stands for Apple File System. It is the default file system used in modern versions of mac O S and i O S, designed for speed, reliability, and encryption. It replaces the older H F S Plus system used in earlier Apple devices.
A P I P A stands for Automatic Private IP Addressing. It is a fallback mechanism used by devices when they cannot obtain an IP address from a DHCP server. These addresses usually start with one sixty-nine dot two fifty-four and allow basic local communication on small networks.
A P K stands for Android Package. It is the file format used by the Android operating system to distribute and install mobile applications. These packages contain all the components required for an app to function properly on Android devices.
A R M stands for Advanced RISC Machine. It is a type of processor architecture known for low power consumption and high efficiency, commonly used in smartphones, tablets, and embedded systems. A R M processors are different from traditional x eighty-six processors used in desktops and laptops.
A R P stands for Address Resolution Protocol. It is used to map IP addresses to physical MAC addresses on a local network. When a device wants to communicate on a local subnet, it uses A R P to discover the hardware address associated with an IP address.
A T A stands for Advanced Technology Attachment. It is a standard interface used to connect storage devices such as hard drives and optical drives to a computer’s motherboard. A T A has largely been replaced by Serial A T A, or S A T A, in modern systems.
A T M stands for Asynchronous Transfer Mode. It is a high-speed networking standard that transmits data in fixed-size cells rather than variable-length packets. Though mostly obsolete today, it was once used in wide area networks for voice, video, and data transmission.
A T X stands for Advanced Technology Extended. This is a widely used motherboard form factor standard that defines the physical dimensions, mounting points, and power connections of a motherboard. It allows for easier standardization and compatibility in computer cases and components.
A U P stands for Acceptable Use Policy. This is a document that outlines the rules and guidelines for how users may use an organization's information systems and resources. It is typically signed by users as part of onboarding or system access procedures.
B I O S stands for Basic Input Output System. It is firmware stored on a motherboard chip that initializes hardware during the boot process and hands off control to the operating system. In modern systems, B I O S is often replaced by or integrated with U E F I firmware.
B S O D stands for Blue Screen of Death. It refers to a critical system error screen displayed by Windows operating systems when the system encounters a fatal error and must shut down. The B S O D provides a stop code that helps identify the cause of the failure.
B Y O D stands for Bring Your Own Device. It is a policy that allows employees to use their personal devices such as smartphones, tablets, or laptops for work-related tasks. While convenient, B Y O D introduces security challenges related to access control and data protection.
C A D stands for Computer-Aided Design. It refers to software applications used by engineers, architects, and designers to create precision drawings and technical illustrations. C A D programs are used in fields such as architecture, electronics, and mechanical engineering.
C A P T C H A stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It is a challenge-response system used to prevent automated bots from accessing websites or services. Common forms include distorted text, image recognition, or checkbox confirmations.
C D stands for Compact Disc. It is an optical storage medium used to store data, music, or software. Although less common today, C D technology helped popularize digital media distribution in the late twentieth century.
C D F S stands for Compact Disc File System. It is a file system standard used for organizing and accessing data on compact discs. C D F S allows operating systems to treat the contents of a C D like a standard file system with directories and files.
C D M A stands for Code Division Multiple Access. It is a digital cellular technology used in some mobile networks to allow multiple users to share the same frequency band. Unlike G S M, it assigns unique codes to each call to keep communications separate.
C E R T stands for Computer Emergency Response Team. It is a group responsible for identifying, managing, and responding to cybersecurity incidents within an organization or at a national level. These teams help coordinate recovery efforts and improve security readiness.
C I F S stands for Common Internet File System. It is a protocol that allows file sharing across a network, primarily used in Windows environments. C I F S operates over T C P and provides access to files, printers, and serial ports.
C M D stands for Command Prompt. It is the command-line interpreter in Windows operating systems that allows users to execute commands, run scripts, and manage system tasks. The command prompt is a key tool for troubleshooting and administrative tasks.
C M O S stands for Complementary Metal Oxide Semiconductor. It is a type of low-power memory used to store B I O S settings such as system time, date, and hardware configuration. C M O S settings are maintained by a small battery on the motherboard.
C P U stands for Central Processing Unit. It is often referred to as the brain of the computer, responsible for executing instructions and managing tasks within a system. Modern systems may include multiple cores to enhance processing efficiency.
C R L stands for Certificate Revocation List. It is a list of digital certificates that have been revoked by a certificate authority before their expiration date. C R Ls are used in secure communications to prevent the use of compromised or invalid certificates.
D C stands for Direct Current. It is a type of electrical current that flows in one direction, typically used in battery-powered devices. Unlike alternating current, direct current provides a steady voltage level ideal for electronics.
D D R stands for Double Data Rate. It is a type of synchronous dynamic random-access memory that can transfer data on both the rising and falling edges of the clock signal. This effectively doubles the data rate compared to earlier memory technologies.
D D o S stands for Distributed Denial of Service. It is a cyberattack in which multiple systems flood a target with traffic, overwhelming its resources and causing service disruption. D D o S attacks are often difficult to mitigate due to their distributed nature.
D H C P stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses and other network settings to devices on a network. D H C P simplifies network administration and ensures consistent addressing.
D I M M stands for Dual Inline Memory Module. It is a type of computer memory module used in desktops, servers, and some laptops. D I M M modules contain RAM chips and connect to the motherboard’s memory slots.
D K I M stands for Domain Keys Identified Mail. It is an email authentication method that uses cryptographic signatures to verify that messages were not altered in transit. D K I M helps protect against email spoofing and improves trustworthiness of messages.
D M A stands for Direct Memory Access. It is a system feature that allows certain hardware components to access system memory directly, bypassing the central processing unit. This improves efficiency by reducing CPU overhead during data transfers.
D M A R C stands for Domain-based Message Authentication, Reporting, and Conformance. It is a protocol that builds on S P F and D K I M to verify the legitimacy of email messages. D M A R C also provides instructions for how to handle messages that fail validation.
D N S stands for Domain Name System. It is the hierarchical system used to translate human-readable domain names like example dot com into IP addresses. Without D N S, users would need to remember numerical addresses to reach websites and services.
D R A M stands for Dynamic Random Access Memory. It is the main type of volatile memory used in computers and other digital devices. D R A M requires constant refreshing to maintain stored data and is used for active processes and tasks.
D R M stands for Digital Rights Management. It refers to technologies used to control how digital content is used, copied, and distributed. D R M is commonly applied to software, music, video, and eBooks to protect intellectual property rights.
D S L stands for Digital Subscriber Line. It is a technology used to transmit digital data over traditional telephone lines, allowing for simultaneous voice and internet access. D S L is often used for residential broadband connections and supports various speed tiers.
D V I stands for Digital Visual Interface. It is a video display interface used to connect a video source, like a computer, to a display device such as a monitor. D V I supports both digital and analog signals, depending on the version and cable type.
D V I dash D stands for Digital Visual Interface Digital. It is a specific type of D V I connection that supports only digital signals, providing a cleaner image and higher resolution compared to analog connections. This interface is commonly used in modern monitors and graphics cards.
D o S stands for Denial of Service. It is a type of cyberattack where a system or service is intentionally overwhelmed with traffic or requests, rendering it unavailable to users. Unlike a D D o S attack, a D o S attack typically originates from a single source.
E C C stands for Error-Correcting Code. It is a type of memory that can detect and correct certain types of data corruption. E C C memory is often used in servers and critical systems where data integrity is essential.
E F S stands for Encrypting File System. It is a feature in some versions of the Windows operating system that allows users to encrypt individual files and folders. E F S helps protect sensitive data from unauthorized access, especially on lost or stolen devices.
E M I stands for Electromagnetic Interference. It refers to unwanted electrical noise or signals that can disrupt the performance of electronic equipment. Shielded cables and proper grounding are often used to reduce E M I in data transmission environments.
E O L stands for End of Life. This term is used when a product, service, or software version is no longer supported by its manufacturer. Once a product reaches E O L, it no longer receives updates, including security patches.
E S D stands for Electrostatic Discharge. It is the sudden transfer of static electricity between two objects, which can damage sensitive electronic components. E S D precautions, such as wrist straps and grounded mats, are essential during hardware repairs or installations.
E U L A stands for End User License Agreement. It is a legal contract between the software provider and the user, outlining how the software may be used. Accepting the E U L A is typically required before installing or using commercial software.
E X T stands for Extended File System. It is a family of file systems used primarily in Linux-based operating systems. Variants like E X T two, E X T three, and E X T four offer increasing levels of performance, journaling, and reliability.
E S A T A stands for External Serial Advanced Technology Attachment. It is an extension of the S A T A interface designed for connecting external storage devices. E S A T A offers high-speed data transfer while maintaining compatibility with internal S A T A standards.
E X F A T stands for Extended File Allocation Table. It is a Microsoft-developed file system optimized for flash drives and external storage. E X F A T supports large file sizes and is compatible across multiple operating systems.
F A T stands for File Allocation Table. It is a legacy file system originally used in DOS and early versions of Windows. Variants like F A T twelve, F A T sixteen, and F A T thirty-two determine file size and volume limits.
F A T twelve is the earliest version of the File Allocation Table system, typically used on floppy disks. It supports small volumes and a limited number of files, making it obsolete for modern storage needs.
F A T sixteen improved upon F A T twelve by supporting larger volumes and more files. It was commonly used in early hard drives but is now largely replaced by more advanced file systems.
F A T thirty-two is a widely used file system that supports larger volumes and files up to four gigabytes. It is still used in USB flash drives and memory cards due to its broad compatibility.
F S B stands for Front Side Bus. It is the communication pathway between the CPU and the main memory or chipset. The speed of the F S B affects overall system performance, especially in older computer architectures.
F T P stands for File Transfer Protocol. It is a standard protocol used to transfer files between a client and a server over a network. F T P can operate in active or passive mode and may require authentication for access.
G F S stands for Global File System. It is a shared disk file system used in clustered computing environments where multiple systems need concurrent access to the same storage. G F S ensures consistency and coordination across nodes.
G P S stands for Global Positioning System. It is a satellite-based navigation system that provides location and time data to receivers on Earth. G P S is used in a wide range of applications, from mapping and transportation to mobile device tracking.
G P T stands for GUID Partition Table. It is a modern partitioning scheme used on storage devices, supporting large disk sizes and more partitions than the older M B R system. G P T is required for disks larger than two terabytes and is part of the U E F I standard.
G P U stands for Graphics Processing Unit. It is a specialized processor designed to handle rendering and image processing tasks. G P Us are essential in gaming, video editing, and machine learning due to their parallel processing capabilities.
That concludes our review of acronyms A through D for the A Plus certification. Remember, learning these terms is not about memorizing them all at once, but about becoming comfortable with the language used throughout the exam. As you continue through the prep cast, many of these acronyms will come up again in different contexts, reinforcing your understanding over time. Feel free to revisit this glossary anytime you need a refresher, and continue building your foundation for success in this certification journey.
