Term
A _____ is a group of computers and other devices that are connected by some type of transmission media. |
|
Definition
|
|
Term
In a _____ network, every computer can communicate directly with any other computer. |
|
Definition
|
|
Term
Which of the following terms describes a network of computers and other devices that is confined to a relatively small space, such as one building or even one office? |
|
Definition
|
|
Term
The _____ is the main circuit that controls the computer. |
|
Definition
|
|
Term
_____ ensure thtat data are transferred whole, in sequence, and without error from one node on the network to another. |
|
Definition
|
|
Term
_____ coordinate the storage and transfer of e-mail between users on a netowrk. |
|
Definition
|
|
Term
A(n) _____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand. |
|
Definition
|
|
Term
The term _____ refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities. |
|
Definition
|
|
Term
_____ refers to the capability of a server to share data files, applications, and disk storage space. |
|
Definition
|
|
Term
_____ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed. |
|
Definition
|
|
Term
Protocols at the _____ layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host. |
|
Definition
|
|
Term
_____ is a networking technology originally developed at Xerox in the early 1970s and improved by Digital Equipment Corporation, Intel, and Xerox. |
|
Definition
|
|
Term
_____ is a method of identifying segments that belong to the same group of subdivided data. |
|
Definition
|
|
Term
_____ protocols ensure that data arrives exactly as it was sent by establishing a connection with another node before they begin transmitting data. |
|
Definition
|
|
Term
Transport layer protocols break large data units received from the Session layer into multiple smaller units called _____. |
|
Definition
|
|
Term
Network layer addresses are also called _____. |
|
Definition
|
|
Term
The _____ is the lowest, or first, layer of the OSI model. |
|
Definition
|
|
Term
_____ layer services manage data encryption and decryption. |
|
Definition
|
|
Term
A wave's _____ is a measure of its strngth at any given point in time. |
|
Definition
|
|
Term
A(n) _____ is a distinct communication path between nodes. |
|
Definition
|
|
Term
The most common way to measure latency on data networks is by caalculating a packet's _____. |
|
Definition
|
|
Term
A(n) _____ issues and receives wireless signals with equal strength and clarity in all directions. |
|
Definition
|
|
Term
A(n) _____ is a device that accepts wireless signals from multiple nodes and retransmits them to the rest of the network. |
|
Definition
|
|
Term
The distance between corresponding points on a wave's cycle is called its _____. |
|
Definition
|
|
Term
_____ is a term used by network professionals to descrive the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network. |
|
Definition
|
|
Term
_____ occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable. |
|
Definition
|
|
Term
_____ is the capacity for a component or system to continue functioning despite damage or partial malfunction. |
|
Definition
|
|
Term
A _____ is a rule that governs how networks communicate. |
|
Definition
|
|
Term
_____ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address. |
|
Definition
Address Resolution Protocol |
|
|
Term
_____ contain databases of associated names and IP addresses and provide this information to resolvers on request. |
|
Definition
|
|
Term
The _____ provides a means of resolving NetBIOS names to IP addresses. |
|
Definition
Windows Internet Naming Service |
|
|
Term
_____ is the process of assigning one network component to work with another. |
|
Definition
|
|
Term
_____ allows one device to send data to a specific group of devices. |
|
Definition
|
|
Term
A(n) ______ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the segment or network to which it is attached. |
|
Definition
|
|
Term
_____ are any hosts on the Internet that need to look up domain name information. |
|
Definition
|
|
Term
_____ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite. |
|
Definition
|
|
Term
The _____ is a simple Application layer protocol used to synchronize the clocks of computers on a network. |
|
Definition
Network Time Protocol, NTP |
|
|
Term
_____ are connectivity devices that enable a workstation, server, printerr, or toher node to receive and transmit data over the network media. |
|
Definition
Network Interface Cards, NIC |
|
|
Term
A computer's _____ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC. |
|
Definition
|
|
Term
_____ is a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NICs. |
|
Definition
|
|
Term
_____ are physically designed to be linked with other hubs in a single telecommunications closet. |
|
Definition
|
|
Term
_____ are connectivity devices that subdivide a network into smaller logical pieces. |
|
Definition
|
|
Term
A(n) _____ is a small, removable piece of plastic that contains a metal receptacle. |
|
Definition
|
|
Term
A(n) _____ is a message to the computer that instructs it to stop what it is doing and pay attention to something else. |
|
Definition
|
|
Term
The _____ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchanging, or buffering, data. |
|
Definition
|
|
Term
A(n) _____ is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accommodate data collisions. |
|
Definition
|
|
Term
A _____ toplogy does not specify device types, connectivity methods, or addressing schemes for the network. |
|
Definition
|
|
Term
The term _____ topology refers to the way in which data is transmitted between nodes, rather than the physical layout of the paths that data takes. |
|
Definition
|
|
Term
In _____, a connection is established between two network nodes before they begin transmitting data. |
|
Definition
|
|
Term
_____ is a network technology whose standards were originally specified by ANSI in the mid-1980s and later refined by ISO. |
|
Definition
|
|
Term
_____ is an ITU networking standard descriving Data Link layer protocols for both network access and signal multiplexing. |
|
Definition
Asynchronous Transfer Mode |
|
|
Term
A network's _____ is its method of controlling how network nodes access the communications channel. |
|
Definition
|
|
Term
_____ enables multiple nodes to simultaneously transmit and receive data over different logical network segments. |
|
Definition
|
|
Term
In _____, a 3-byte packet, called a token, is transmitted from one node to another in a circular fashion around the ring. |
|
Definition
|
|
Term
A WAN in which each site is directly connected to no more than two other sites in a serial fashion is known as a _____. |
|
Definition
|
|
Term
_____ is an updated, digital version of X.25 that relies on packet switching. |
|
Definition
|
|
Term
A _____ modulates outgoing signals and emodulates incoming signals. |
|
Definition
|
|
Term
A(n) _____ is a network that traverses some distance and usually connects LANs, whether across the city or across the nation. |
|
Definition
|
|
Term
A(n) _____ converts digital signals into analog signals for use with ISDN phones and other analog devices. |
|
Definition
|
|
Term
A(n) _____ is the creation of a communications channel for a transmission from an earth-based transmitter to an orbiting satellite. |
|
Definition
|
|
Term
To better organize and manage objects, a network administrator places objects in _____. |
|
Definition
|
|
Term
_____ is the ability of a processor to perform many different operations in a very brief period of time. |
|
Definition
|
|
Term
A _____ is a routine of sequential instructions that runs until it has achieved its goal. |
|
Definition
|
|
Term
______ is the orginal PC file system that was designed in the 1970s to support floppy disks and, later, hard disks. |
|
Definition
|
|
Term
_____ involves associating a letter, such as M: or T:, with a disk, directory, or other resource. |
|
Definition
|
|
Term
The _____ account is a predefined user account that has the most extensive privileges for resources both on the computer and on the domain that it controls. |
|
Definition
|
|
Term
The _____ lists all computer componts proven to be compatible with Windows Server 2003. |
|
Definition
Hardware Compatability List, HCL |
|
|
Term
The relationship between two domains in which one allows the other to authenticate its users is known as a(n) _____. |
|
Definition
|
|
Term
On a Linux or Solaris system, the _____ command creates a new group ID and makes the group available for use. |
|
Definition
|
|
Term
Any modern client running the TCP/IP protocol suite will be capable of connecting to a UNIX-type of a host via _____. |
|
Definition
|
|
Term
_____ is equivalent to using wildcards in Windows and DOS. |
|
Definition
|
|
Term
Every UNIX-type system contains full documentation of UNIX commands in the _____. |
|
Definition
|
|
Term
The core of all UNIX-type systems is called the _____. |
|
Definition
|
|
Term
A(n) _____ is a file that contains instructions for performing a specific task, such as reading data from and writing data to a hard drive. |
|
Definition
|
|
Term
In UNIX, two or more commands connected by a pipe are called a(n) _____. |
|
Definition
|
|
Term
The _____ tool is used to access console commands through a web browser on another computer on the network. |
|
Definition
|
|
Term
A(n) _____ consists of the objects, classes, and properties a network typically needs. |
|
Definition
|
|
Term
_____ separates a network into multiple logically defined segments. |
|
Definition
|
|
Term
A(n) _____ facilitates communication between different networks or subnets. |
|
Definition
|
|
Term
_____ is a simple subprotocol, incapable of doing anything more than transporting mail or holding it in a queue. |
|
Definition
|
|
Term
The _____ utility displays TCP/IP statistics and details about TCP/IP components and connections on a host. |
|
Definition
|
|
Term
On networks that run NetBIOS over TCP/IP, the _____ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses. |
|
Definition
|
|
Term
To calculate a host's network ID given its IP address and subnet mask, you follow a logical process of combining bits known as ____. |
|
Definition
|
|
Term
A network or part of a network that uses browser-based services to exchange information within an enterprise is known as a(n) _____. |
|
Definition
|
|
Term
The utility that allows you to query the DNS registration database and obtain information about a domain name is called _____. |
|
Definition
|
|
Term
The _____ utility uses ICMP to trace the path from one networked node to another, identifying all intermediate hops between the two nodes. |
|
Definition
|
|
Term
On UNIX-type systems, the _____ utility allows you to modify TCP/IP settings for a network interface, release and renew DHCP-assigned addresses, or simply check the status of you machine's TCP/IP settings. |
|
Definition
|
|
Term
_____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network. |
|
Definition
|
|
Term
A ____ is a record of how the network operates under normal conditions. |
|
Definition
|
|
Term
_____ is a device that handles electrical signals improperly, usually afftecing the rest of the network. |
|
Definition
|
|
Term
A _____ is a tool that can be used to assess the quality of a wireless signal. |
|
Definition
|
|
Term
A(n) _____ is a process or program that provides support personnel with a centralized means of documenting changes to the network. |
|
Definition
|
|
Term
A(n) _____ cable is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals properly. |
|
Definition
|
|
Term
Resistance is measured in _____. |
|
Definition
|
|
Term
_____ refers to the soundness of a network's programs, data, services, devices, and connections. |
|
Definition
|
|
Term
The term _____ refers to an implementation in which more than one component is installed and ready to use for storing, processing, or transporting data. |
|
Definition
|
|
Term
______ implies a fluctuation in voltage levels caused by other devices on the network or electromagnetic interference. |
|
Definition
|
|
Term
_____ is a specialized storage device or group of storage devices that provides centralized faoul-tolerant data storage for a network. |
|
Definition
|
|
Term
A _____ is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated or connected. |
|
Definition
|
|
Term
_____ viruses propagate themselves via network protocols, commands, messaging, programs, and data links. |
|
Definition
|
|
Term
A momentary decrease in voltage is known as a(n) _____. |
|
Definition
|
|
Term
The term _____ refers to identical components that can be changed while a machine is still running. |
|
Definition
|
|
Term
_____ is a fault-tolerance technique that links multiple servers together to act as a single server. |
|
Definition
|
|
Term
______ refers to a thorough examination of each aspect of a network to determine how it might be copmromised. |
|
Definition
|
|
Term
The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm is known as _____. |
|
Definition
|
|
Term
Trying a number of possible character combinations to find the key that will decrypt encrypted data is known as a _____. |
|
Definition
|
|
Term
A _____ is a password-protected and encrypted file that holds an individual's identification information, including a public key. |
|
Definition
|
|
Term
_____ occurs when a hacker farges name server records to falsify his host's identity. |
|
Definition
|
|
Term
A(n) _____ occurs when a system becomes unable to function becuase it has been deluged with data transmissions or otherwise disrupted data. |
|
Definition
|
|