Intro to IT

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following was created for the transfer of hypertext documents across the Internet?

HTTP

The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.

ICANN

A(n) ________ address is the address that external entities use when communicating with your network.

IP

________ permits two or more people to communicate over the Internet in real time.

Instant messaging

The physical address assigned to each network adapter is called its ________ address.

MAC (media access control)

A large network designed to provide access to a specific geographic area, such as a large city, is a ________

MAN

Which protocol is used when sending files as attachments by e-mail?

Multipurpose Internet Mail Extensions (MIME)

A(n) ________ device facilitates file sharing and data backup.

NAS

Which of the following refers to the name of your wireless network?

SSID

The main suite of protocols used for transmitting data on the Internet is ________.

TCP/IP

Which of the following information is not contained in a packet sent over the Internet?

The size (in bytes) of the packet

________ is the actual speed of data transfer that is achieved between two nodes on a network

Throughput

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

The network architecture that spans the largest physical distance is called a ________.

WAN

________ describes the website content in terms of the data that is being described rather than how it is to be displayed.

XML

In public-key encryption, the two keys, one for coding and one for decoding, are known as ________.

a key pair

A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

applet

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

authentification

The main path of the Internet along which data travels the fastest is known as the Internet ________.

backbone

_______ is the amount of data that can be transmitted across a transmission medium measured in bits per second.

bandwidth

A ________ sends data from one collision domain to another.

bridge

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

bus

Which of the following is not a major factor to consider when selecting network cabling?

cable diameter

A client/server network is an example of ________ administration.

central

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

circuit switching

You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.

device

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.

dynamic

________ is the standard communications protocol used on most client/server networks.

ethernet

________ cable is not subject to electromagnetic interference or radio frequency interference.

fiber-optic

Which transmission medium transmits data the fastest?

fiber-optic cable

A(n) ________ server is a server that stores and manages files for network users.

file

The current standard for wired Ethernet networks is IEEE 802.3, also known as ________ Ethernet.

gigabit

A typical IpV6 address has the following format: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. what does each X represent?

hexadecimal digit

Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.

information assurance

A peer-to-peer (P2P) network is an example of ________ administration.

local

Routers and switches are example of network ________ devices.

navigation

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

network

Client/server networks are controlled by a central server that runs specialized software called a(n) ________.

network operating system (NOS)

IPv6 was introduced when IPv4 ________.

no longer had enough unique addresses

A ________ is any device connected to a network such as a computer, printer, or game console.

node

________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.

packet switching

Data are sent through a network in bundles called ________.

packets

To transfer data packets between two networks, a ________ is used.

router

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

spooler

Which of the following is the most commonly used client/server network topology?

star topology

An IP address that does not change and is usually assigned manually by a network administrator or an ISP is called a ________ address.

static

On a network, a(n) ________ helps prevent data packets from colliding with each other.

switch

If you want to access your home network from your distant garage, a ________ might help boost the signal.

wireless range extender

Strong encryption now requires ________-bit keys.

256

Which generation of wireless data is being rolled out as the latest mobile data service and also as a home Internet service?

5th

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.

DNS

Which of the following would not be considered a possessed object?

password

In a ________ network, each node connected to the network communicates directly with every other node.

peer-to-peer

Individual Internet users connect to ISPs through a(n) ________.

point of presence (POP)

A network ________ is a set of rules for how information and communications are exchanged.

protocol

Wireless network devices use ________ to communicate with each other.

radio radiowaves

A ________ sends information between two networks.

router

Ring networks use the ________ method to avoid data collisions.

token

Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?

virtualization


Conjuntos de estudio relacionados

Econ Midterm 1 - Correct Answers

View Set

Managing Databases with MySQL (10C)

View Set

IM 6th Grade Unit 8 - Data Sets & Distribution

View Set

1 Pediatric GI/GU Problems/Mobility

View Set