Study sets, textbooks, questions
Upgrade to remove ads
MTA MOBILITY DEVICES
Terms in this set (69)
Online file storage location where you can store your documents and media files. At the time of this publication, Microsoft provides OneDrive members with 15 GB of free online storage space for personal use.
A subscription service we receive that offers online apps and storage in the OneDrive.
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
A program that lets you make phone calls over the internet. You can also view users on webcam, chat to them through an instant messenger service and send files. You can talk to other Skype users for free, or pay if you want to call ordinary telephones.
a program that appears desirable but actually contains something harmful
Access Control List (ACL)
A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
A type of software firewall installed on a host and used to protect the host from network-based attacks.
distinct network-based publics are online public sphere
verifying the identity of the person or device attempting to access the system
The apparent machine that the operating system presents to the user, achieved by hiding the complexities of the hardware behind layers of operating system software.
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
is Microsoft's task automation framework, consisting of a command-line shell and associated scripting language built on top of, and integrated with, the .NET Framework
A feature of Windows 7 that quickly links creates a peer-to-peer network for sharing files and printers.
Software that helps protect a computer from malicious code
Most large companies use this type of database. e.g. Google, YouTube, PayPal, ebay.
a communication tool that provides IM, audio and video conferencing, a shared whiteboard for team members to write on, and other shared facilities
Dynamic Access Control (DAC)
allows you to identify data by using data classifications (both automatic and manual) and then to control access to these files based on these classifications.
using the public internet to build a secure, private network connecting distant locations
Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.
A global network connecting millions of computers, making it possible to exchange information.
A private electronic network that links a company with its suppliers and customers
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
A combination of hardware and software that filters traffic between private networks or between a private network and a public network, such as the Internet.
Process of converting readable data into unreadable characters to prevent unauthorized access.
a process that reverses encryption, taking a secret message and reproducing the original plain text
File allocation table that uses 32 bits to address and index clusters. Commonly
used with USB flash-media drives and versions of Windows prior to XP.
_is often referred to as a "journaling" file system because it keeps track of transactions performed when working with files and directories.
a. FAT c. MFT
b. NTFS d. EFS
Allows you to connect to Azure cloud services using Remote Desktop Services (RDS) from your corporation on-premises. With Azure it, users can securely access applications from different devices.
A tool in Windows 7 that lists errors and issues that need attention.
Active Directory (AD)
The centralized directory database that contains user account information and security for the entire group of computers on a network.
BitLocker Drive Encryption
A utility in Windows 8/7/Vista that is used to lock down a hard drive by encrypting the entire Windows volume and any other volume on the drive.
The Windows 10 personal assistant that helps search the Web and your PC, and can also assist with reminders, tasks, and other activities.
A program accessed from the Windows Start menu that provides specialized features used to change the way Windows looks and behaves.
This node contains settings that are applied to the computer regardless of who logs on to the computer. By default, computer settings are applied when the computer is started.
A software program that provides the instructions your computer needs to communicate with a device, such as a scanner.
Utility that enables techs to examine and configure all the hardware and drivers in a Windows PC.
The Jump List displays:
Destinations and tasks from a program's taskbar button.
Live preview shows you how your document will look with the selected feature.
an area on your hard drive disk that holds deleted files until you remove them permanently
Transport Layer Security (TLS)
A data encryption technology used for securing data transmitted over the Internet. TLS succeeded SSL. (13)
A pointer to an application or document file; double-clicking the shortcut icon opens the actual item to which the shortcut is pointing.
A collection of files and settings about a user account that enables the user's personal data, desktop settings, and other operating parameters to be retained from one session to another.
Microsoft application used to keep Windows operating systems up to date with the latest patches or enhancements. (See Automatic Updates.)
Secure Sockets Layer (SSL)
A Protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data.
mandatory user profile
A user profile set up by the server administrator that is loaded from the server to the client each time the user logs on; changes that the user makes to the profile are not saved.
Resource access for individuals takes place through their ______.
Trusted Platform Module (TPM)
A chip on the motherboard of the computer that provides cryptographic services.
Windows Easy Transfer
Windows method of transferring files and settings to a new PC.
User State Migration Tool (USMT)
A Windows utility that helps you migrate user files and preferences from one computer to another to help a user make a smooth transition from one computer to another.
Allows a user to access resources on a computer and on Microsoft cloud computing services.
local user account
List of user names and their associated passwords with access to
a system, contained in an encrypted database.
Microsoft routinely releases security updates on the second Tuesday of each month.
roaming user profile
A copy of a local user profile that is stored on a shared server drive, making it accessible from anywhere on the network.
Group Policy Object (GPO)
A list of settings that administrators use to configure user and computer operating environments remotely through Active Directory.
A centralized configuration management
feature available for Active Directory on
Windows Server systems.
One of the keys used in asymmetric encryption systems. It is widely distributed and available to everyone.
promotes massive, global, and industry wide applications offered to the general public
A Windows folder that's set up for sharing files and folders with other users on an attached network. Windows 7 Public folders include Public Documents, Public Music, and others.
public key cryptography
uses two keys: A public key the sender uses to create encrypted messages, and a mathematically-related private key that the receiver can use to decrypt messages encrypted by that public key.
The first CA installed in a network. Clients are configured to trust the root CA's certificate, and then implicitly trust the certificate of any CA that's subordinate to the root.
An electronic funds transfer tool that is a combination credit card, debit card, phone card, driver's license card, and more.
Folder that has been set up so other users can access it and its contents.
to allow something
Cloud storage designed for large-scale applications, including providing a storage foundation for Azure virtual machines.
An administrator who has access to all administrative features. This is the person who signs up for Office 365.
An administrator who manages purchases, support tickets, and subscriptions and monitors the overall health of the services.
a function that is deterministic but randomizing, i.e. whose output is a relatively small integer that appears to be a random function of the key value.
There are a variety of routing algorithms that are used by routers for network management and the selection of the most appropriate path through a network. The protocol that typically manages routing based between AS's is:
The term Internet Message Access Protocol (IMAP) describes a protocol used to receive e-mail that works on port 143.
Which connection type is a wireless method of sending information using radio waves?
True or False: Amplitude shift keying is susceptible to sudden noise impulses such as the static charges created by a lightning storm.
Sets found in the same folder
MTA Mobility and Devices
MTA Operating System (101-110)
MTA MOBILITY FLASH CARDS
MTA Operating System Fundamentals
Sets with similar terms
Authentication, Authorization, and Accounting
CMIS Ch. 5
CMIS Ch. 5
Other sets by this creator
MTA VOCAB 2
Other Quizlet sets
Peds emergency drugs
Microbiology Lecture 3 - Part 2
Fine Arts, Health, & Physical Education Practice T…
MAA MOD B UNIT 1 TERMINOLOGY
Compare symmetric and asymmetric encryption schemes, and discuss the circumstances under which a distributed system would use one or the other.
Write an applet that draws a smiling face. Give the face a nose, ears, a mouth, and eyes with pupils.
Describe the three main architectural layers of the Windows kernel.
True/False: Loops are more general than recursion.