Intro to IT
Which of the following was created for the transfer of hypertext documents across the Internet?
HTTP
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
ICANN
A(n) ________ address is the address that external entities use when communicating with your network.
IP
________ permits two or more people to communicate over the Internet in real time.
Instant messaging
The physical address assigned to each network adapter is called its ________ address.
MAC (media access control)
A large network designed to provide access to a specific geographic area, such as a large city, is a ________
MAN
Which protocol is used when sending files as attachments by e-mail?
Multipurpose Internet Mail Extensions (MIME)
A(n) ________ device facilitates file sharing and data backup.
NAS
Which of the following refers to the name of your wireless network?
SSID
The main suite of protocols used for transmitting data on the Internet is ________.
TCP/IP
Which of the following information is not contained in a packet sent over the Internet?
The size (in bytes) of the packet
________ is the actual speed of data transfer that is achieved between two nodes on a network
Throughput
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
The network architecture that spans the largest physical distance is called a ________.
WAN
________ describes the website content in terms of the data that is being described rather than how it is to be displayed.
XML
In public-key encryption, the two keys, one for coding and one for decoding, are known as ________.
a key pair
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
applet
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
authentification
The main path of the Internet along which data travels the fastest is known as the Internet ________.
backbone
_______ is the amount of data that can be transmitted across a transmission medium measured in bits per second.
bandwidth
A ________ sends data from one collision domain to another.
bridge
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
bus
Which of the following is not a major factor to consider when selecting network cabling?
cable diameter
A client/server network is an example of ________ administration.
central
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
circuit switching
You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.
device
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
dynamic
________ is the standard communications protocol used on most client/server networks.
ethernet
________ cable is not subject to electromagnetic interference or radio frequency interference.
fiber-optic
Which transmission medium transmits data the fastest?
fiber-optic cable
A(n) ________ server is a server that stores and manages files for network users.
file
The current standard for wired Ethernet networks is IEEE 802.3, also known as ________ Ethernet.
gigabit
A typical IpV6 address has the following format: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. what does each X represent?
hexadecimal digit
Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.
information assurance
A peer-to-peer (P2P) network is an example of ________ administration.
local
Routers and switches are example of network ________ devices.
navigation
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
network
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
network operating system (NOS)
IPv6 was introduced when IPv4 ________.
no longer had enough unique addresses
A ________ is any device connected to a network such as a computer, printer, or game console.
node
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
packet switching
Data are sent through a network in bundles called ________.
packets
To transfer data packets between two networks, a ________ is used.
router
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
spooler
Which of the following is the most commonly used client/server network topology?
star topology
An IP address that does not change and is usually assigned manually by a network administrator or an ISP is called a ________ address.
static
On a network, a(n) ________ helps prevent data packets from colliding with each other.
switch
If you want to access your home network from your distant garage, a ________ might help boost the signal.
wireless range extender
Strong encryption now requires ________-bit keys.
256
Which generation of wireless data is being rolled out as the latest mobile data service and also as a home Internet service?
5th
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
DNS
Which of the following would not be considered a possessed object?
password
In a ________ network, each node connected to the network communicates directly with every other node.
peer-to-peer
Individual Internet users connect to ISPs through a(n) ________.
point of presence (POP)
A network ________ is a set of rules for how information and communications are exchanged.
protocol
Wireless network devices use ________ to communicate with each other.
radio radiowaves
A ________ sends information between two networks.
router
Ring networks use the ________ method to avoid data collisions.
token
Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?
virtualization