Term
|
Definition
The directory service used by Windows servers. |
|
|
Term
|
Definition
A collection of wires that carry data from one place to another on a computers motherboard |
|
|
Term
|
Definition
Term used to describe an OS designed mainly to access network resources, a computers primary role in a network, and software that requests network resources from servers |
|
|
Term
|
Definition
An instance of a processor inside a single CPU chip |
|
|
Term
|
Definition
A username and password or another form of identity used to access a computer |
|
|
Term
|
Definition
The software that manages centralized access and security in a server based network |
|
|
Term
|
Definition
A collection of users and computers in a server based network whose accounts are managed by Windows servers called domain controllers |
|
|
Term
|
Definition
A computer running Windows Server with Active Directory installed; maintains a database of user and computer accounts as well as network access policies in a Windows domain |
|
|
Term
|
Definition
The process of adding header and trailer information to chunks of data |
|
|
Term
|
Definition
A private network that allows limited and controlled access to internal network resources by outside users, usually in a business-to-business situation. |
|
|
Term
|
Definition
A packet with source and destination MAC addresses added and an error checking code added to the back end. Frames are generated by and processed by the network interface |
|
|
Term
|
Definition
Information added to the front end of a chunk of data so that the data can be correctly interpreted and processed by network protocols |
|
|
Term
|
Definition
A worldwide public internetwork that uses standard protocols, such as TCP/IP, DNS and HTTP to transfer and view information. |
|
|
Term
|
Definition
A network collection of LANs tied together by devices such as routers |
|
|
Term
|
Definition
A small network, limited to a single collection of machines and linked by interconnecting devices in a small geographic area |
|
|
Term
Metropolitan Area Network (MAN) |
|
Definition
An internet work confined to a geographic region, such as a city or county; uses third party communication providers to provide connectivity between locations |
|
|
Term
|
Definition
A CPU containing two or more processing cores |
|
|
Term
|
Definition
A computer that stores names and addresses of computers on a network, allowing other computers to use computer names theater than addresses to communicate with one another |
|
|
Term
|
Definition
Two or more computers connected by a transmission medium that enables them to communicate |
|
|
Term
|
Definition
The application or OS service that can request information stored on another computer |
|
|
Term
|
Definition
A model defining how and where resources are shared and how access to these resources is regulated |
|
|
Term
|
Definition
The software defining the rules and formats a computer must use when sending information across the network |
|
|
Term
|
Definition
The software that allows a computer to share its resources by fielding requests generated by network clients |
|
|
Term
|
Definition
A chunk of data with source and destination IP addresses added to it. Packets are generated by and processed by network protocols |
|
|
Term
|
Definition
A network model in which all computers can function as clients or servers as needed, and there's no centralized control over network resources |
|
|
Term
|
Definition
Term used to describe an OS designed mainly to share network resources |
|
|
Term
|
Definition
A network modeling which servers taken on specialized roles to provide client computers with network services and to provide centralized control over network resources |
|
|
Term
|
Definition
A computer that doesn't have the necessary hardware or software to communicate on a network |
|
|
Term
|
Definition
Information added to the back end of a chunk of data so that the data can be correctly interpreted and processed by network protocols |
|
|
Term
|
Definition
Internetworks that are geographically dispersed and use third party communication providers to provide connectivity between locations |
|
|
Term
Which of the following is one of the three basic functions a computer performs? (Choose all that apply.) a. Processing b. Internet Access c. Input d. Graphics e. Output f. E-mail |
|
Definition
a. Processing c. Input e. Output |
|
|
Term
The __________ executes instructions provided by computer programs. a. CPU b. NIC c. hard drive d. USB |
|
Definition
|
|
Term
When a CPU is composed of two or more processors, each one is referred to as a(n) ________. a. I/O b. core c. OS d. flash |
|
Definition
|
|
Term
Which of the following is considered long-term storage? (Choose all that apply.) a. USB or flash drive b. RAM c. Working storage d. Hard drive |
|
Definition
|
|
Term
Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU? a. RAM slots b. IDE connectors c. Chipset d. PCI-Express |
|
Definition
|
|
Term
You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have? a. PCI b. SATA c. IDE d. PCI-Express |
|
Definition
|
|
Term
The time it takes for read/write heads to move to the correct spot on the platter is the ____________. a. Rotational delay b. Seek time c. Transfer time d. Access time |
|
Definition
|
|
Term
Which of the following is a task usually performed by the BIOS? (Choose all that apply.) a. Perform a Post b. Create an interrupt c. Store the operating procedure d. Begin the boot procedure |
|
Definition
|
|
Term
Place the following steps of the boot procedure in order. a. The OS is loaded into RAM b. CPU starts c. OS services are started d. Power is applied e. The post is executed f. Boot devices are searched |
|
Definition
|
|
Term
Which of the following requests information stored on another computer? a. NIC b. Network client c. Network server d. Network Protocol e. Device Driver |
|
Definition
|
|
Term
Choose the correct order for the process of a user attempting to access network resources: 1. Network Protocol 2. Application 3. Network Client 4. NIC driver a. 4,2,1,3 b. 3,2,1,4 c. 2,3,1,4 d. 3,1,2,4 |
|
Definition
|
|
Term
TCP/IP is an example of which of the following? a. NIC b. Network Client c. Network server d. Network protocol e. Device driver |
|
Definition
|
|
Term
n network communication, the ______________ address is used to deliver a frame to the correct computer on the network. (Choose all that apply.) a. MAC b. Logical c. IP d. Physical |
|
Definition
|
|
Term
A(n) ______________ message is used to determine whether a computer is listening on the network. a. MAC b. Ping c. IP d. TCP |
|
Definition
|
|
Term
TCP/IP uses _________ to look up a computer’s IP address, given its name. a. DNS b. ping c. MAC d. TCP |
|
Definition
|
|
Term
The unit of information containing MAC addresses and an error-checking code that’s processed by the network interface layer is referred to as a _______________. a. packet b. ping c. frame d. chunk |
|
Definition
|
|
Term
Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following a. Packetization b. Encapsulation c. Deencapsulation d. Layering |
|
Definition
|
|
Term
You’re the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You’re concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure? a. WAN b. MAN c. Internetwork d. Extended LAN |
|
Definition
|
|
Term
Which of the following best describes a client? a. A computer’s primary role in the network is to give other computers access to network resources and services. b. A computer’s primary role in the network is to run user applications and access network resources. c. It’s the software that responds to requests for network resources. d. The OS installed on a computer is designed mainly to share network resources. |
|
Definition
b. A computer’s primary role in the network is to run user applications and access network resources. |
|
|
Term
You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install? a. Server-based network b. Peer-to-peer network c. WPAN d. Storage area network |
|
Definition
|
|
Term
Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.) a. Decentralized data storage b. Inexpensive c. User-managed resources d. Centralized control e. Uses a directory service |
|
Definition
|
|
Term
A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following? a. LAN b. MAN c. WAN d. Internetwork |
|
Definition
|
|
Term
a company has just made an agreement with another organization to share their two network's resources by using TCP/IP protocols. What best describes this arrangement? a. MAN b. LAN c. Intranet d. Extranet |
|
Definition
|
|
Term
You have installed Windows Server 2012 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server? a. Naming services b. Application services c. Communication services d. Directory services |
|
Definition
|
|
Term
Peer-to-peer networks aren’t suitable in which of the following situations? a. Tight security is required. b. Five or fewer users need network access. c. Budget is the primary consideration. d. No one uses the network heavily. |
|
Definition
a. Tight security is required. |
|
|