CompTIA Tech+ (FC0-U71) glossary
Terms selected for CompTIA Tech+ (FC0-U71) based on common objective language and practice focus.
Bluetooth
Bluetooth is a wireless technology standard for exchanging data over short distances using radio waves.
Read full term ->Near Field Communication (NFC)
NFC is a set of communication protocols that enable two electronic devices to communicate when they are within a few centimeters of each other.
Read full term ->Troubleshooting Methodology
Structured process to identify, test, fix, verify, and document issues.
Read full term ->Authentication
Process of verifying a user or system identity.
Read full term ->Authorization
Process of granting permissions after identity is authenticated.
Read full term ->GUI
Graphical user interface enabling interaction via windows, icons, and menus.
Read full term ->Operating System
Core software managing hardware resources and providing services to applications.
Read full term ->Password Manager
Tool that securely stores and generates complex credentials.
Read full term ->Browser Cache
Locally stored web content used to speed up page loading.
Read full term ->Hypervisor
Software layer that creates and manages virtual machines on physical hardware.
Read full term ->Algorithm
Step-by-step procedure for solving a computational problem.
Read full term ->Application Software
Programs designed for end-user tasks such as writing, browsing, or communication.
Read full term ->Assembly Language
Low-level programming language closely mapped to processor instructions.
Read full term ->Availability
Availability is a security principle that ensures information and resources are accessible to authorized users when needed.
Read full term ->Bar Chart
Visualization that uses horizontal or vertical bars to compare categorical values.
Read full term ->Binary
Base-2 number system using digits 0 and 1.
Read full term ->Boolean Data Type
A Boolean data type is a data type with two possible values: true or false.
Read full term ->Boolean Logic
Logical system using true/false values and operators such as AND, OR, NOT.
Read full term ->Categorical Data
Data represented by labels or categories rather than numeric magnitude.
Read full term ->Command Line Interface (CLI)
A Command Line Interface is a text-based user interface used to operate software and operating systems by typing commands.
Read full term ->Cloud Computing
Cloud computing is the delivery of computing services over the internet, allowing for on-demand access to resources such as servers, storage, and applications.
Read full term ->Compiler
Tool that translates source code into machine-readable executable form.
Read full term ->Confidentiality
Confidentiality is a security principle that involves ensuring that information is accessible only to those authorized to have access.
Read full term ->CPU Core
Independent processing unit within a CPU capable of executing instructions.
Read full term ->Data Backup
Data backup is the process of copying and archiving computer data to ensure it can be restored in case of data loss.
Read full term ->Data Type
Data types define the type of data that can be stored and manipulated within a program, such as integers, strings, or booleans.
Read full term ->Decimal
Base-10 number system using digits 0 through 9.
Read full term ->Embedded Operating System
An embedded operating system is designed to operate on embedded systems, which are specialized computing devices that perform dedicated functions.
Read full term ->Encryption
The process of converting information or data into a code to prevent unauthorized access.
Read full term ->Flowchart
Diagram that visualizes process or algorithm steps and decision points.
Read full term ->Foreign Key
Column that references the primary key of another table to enforce referential integrity.
Read full term ->Generative AI
AI capability that creates new content such as text, images, code, or audio based on prompts and learned patterns.
Read full term ->Hexadecimal
Base-16 number system using digits 0-9 and letters A-F.
Read full term ->Histogram
Chart that groups continuous data into bins to show frequency distribution.
Read full term ->Input Device
An input device is a hardware component used to provide data and control signals to a computer system.
Read full term ->Integrity
Integrity is a security principle that ensures data is accurate and reliable, and has not been tampered with.
Read full term ->Interpreter
Runtime engine that executes source code line by line.
Read full term ->IoT
Internet of Things, network-connected physical devices that collect and exchange data.
Read full term ->JSON
Lightweight structured data format commonly used in APIs and data exchange.
Read full term ->LAN
Local Area Network connecting devices within a limited geographic area.
Read full term ->Logical Operator
Operator used to combine or invert boolean expressions in code.
Read full term ->Machine Learning
AI approach where models learn patterns from data for predictions or decisions.
Read full term ->Markup Language
Language that annotates content structure rather than performing computations.
Read full term ->Network Interface Card (NIC)
A Network Interface Card is a hardware component that connects a computer to a network.
Read full term ->Non-relational Database
A type of database that does not use the tabular schema of rows and columns found in most traditional database systems. It is often used for large sets of distributed data.
Read full term ->Non-Volatile Storage
Non-volatile storage retains data even when the power is turned off, such as a hard drive or SSD.
Read full term ->Octal
Base-8 number system using digits 0 through 7.
Read full term ->Object-Oriented Programming (OOP)
Object-Oriented Programming is a programming paradigm based on the concept of objects, which can contain data and code to manipulate that data.
Read full term ->Output Device
An output device is a hardware component that conveys information from a computer to a user or another device.
Read full term ->Pie Chart
Circular chart representing category proportions as slices.
Read full term ->Primary Key
Column or set of columns that uniquely identifies each row in a table.
Read full term ->Variable
Named storage location that holds data values in a program.
Read full term ->Pseudocode
Human-readable algorithm outline used for planning logic before coding.
Read full term ->Memory (RAM)
Temporary working storage used by active processes and applications.
Read full term ->Relational Database
Database that organizes data into tables with rows and columns linked by key relationships.
Read full term ->Router
Network device that forwards traffic between different IP networks.
Read full term ->Scatter Plot
Chart that plots individual data points on two axes to show relationships or clusters.
Read full term ->Schema
Defined structure and organization of data fields and relationships.
Read full term ->Scripting Language
A scripting language is a programming language used to write scripts, which are programs that automate tasks.
Read full term ->SQL Query
Structured request for reading or manipulating relational data.
Read full term ->Storage Device
A storage device is hardware used to store data permanently or temporarily.
Read full term ->Switch
Network device that forwards frames within a local network using MAC addresses.
Read full term ->Virtual Machine Monitor
Another term for hypervisor software controlling guest virtual machines.
Read full term ->Volatile Storage
Volatile storage refers to memory that requires power to maintain the stored information, such as RAM.
Read full term ->WAN
Wide Area Network connecting systems across large geographic distances.
Read full term ->Wireless Standard
Defined specification governing wireless protocol behavior and compatibility.
Read full term ->XML
Markup-based structured data format used in integration workflows.
Read full term ->
