Technology in Action Chapter 12
biometric authentication device
A device that uses some unique characteristic of human biology to identify authorized users.
bridge
A device that's used to send data between different collision domains in a network, depending on where the recipient device is located.
bastion host
A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall.
access method
A method to control which computer is allowed to use transmission media at a certain time.
local area network (LAN)
A network in which the nodes are located within a small geographic area.
wide area network (WAN)
A network made up of local area networks (LANs) connected over long distances.
virtual private network (VPN)
A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.
Open Systems Interconnection (OSI)
A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.
intranet
A private network set up by a business or an organization that's used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
What is a repeater?
A repeater connects multiple Ethernet segments. Each signal on a segment is listened to by the device and then repeated by the repeater. This is used to increase the diameter of a network.
What is a router?
A router is an advanced networking component that can divide a single network into two logically separate networks.
proxy server
A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).
application server
A server that acts as a repository for application software.
communications server
A server that handles all communications between the network and other networks, including managing Internet connectivity.
cloud server
A server that is maintained by a hosting company and that is connected to networks via the Internet.
authentication server
A server that keeps track of who's logging on to the network and which services on the network are available to each user.
print server
A server that manages all client-requested printing jobs for all printers on a network.
database server
A server that provides client computers with access to information stored in databases.
file server
A server that stores and manages files for network users or that acts as a storehouse for files that users can download.
dedicated server
A server used to fulfill one specific function, such as handling e-mail.
e-mail server
A server whose sole function is to process and deliver incoming and outgoing e-mail.
protocol
A set of rules for exchanging communications.
coaxial cable
A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service.
print queue
A software holding area for print jobs. Also called a print spooler.
token
A special data packet used to pass data in a ring topology network.
wireless network interface card (wireless NIC)
A special network adapter card that allows a computing device to connect to a network using wireless access.
jam signal
A special signal sent to network nodes alerting them that a data collision has occurred.
bus (linear bus) topology
A system of networking connections in which all devices are connected in sequence on a single cable.
What are authentication servers?
Authentication servers keep track of who is logging on to the network.
hybrid topology
Combining multiple topologies into one network.
Fiber-optic cable
Composed of glass or plastic fiber.
What allows the exchange of large amounts of business data in a standardized electronic format?
Electronic data interchange
information assurance
Ensuring that information systems contain accurate information and are adequately secured against tampering.
protocol most commonly used on star networks
Ethernet
Network operating systems need to be installed only on one client computer in order to "talk" to the entire network.
False
data collision avoidance method
CSMA/CD
Switches are used to route data between two different networks
False
The main advantage of a ring topology is that the failure of one computer does not affect the entire network
False
The three main cable types used in business networks are twisted-pair, coaxial, and electromagnetic cable.
False
twisted-pair cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).
Which of the following is a private network setup by a business that's used exclusively by a select group of employees and suppliers?
Intranet
Network adapters send data packets based on a(n)
MAC address
Switch
Makes decisions as to where the data is to be sent and rebroadcasts it to the appropriate network node.
The ____ topology uses tokens to control data transmission
Ring
What distinguishes a router from some of the other network components?
Routers make connections between networks like your home network and the Internet.
_______ means that more users can be added to a network easily without affecting the performance of the other network nodes.
Scalability
Packet
Small segment of data transmitted via a network.
device driver
Software that facilitates the communication between a device and its operating system or between a network adapter and a server's operating system and the operating system of the computer in which the adapter is installed.
network operating system (NOS)
Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate.
Coaxial cable
Still used in some manufacturing facilities where machinery creates heavy electrical interference.
token method
The access method used by ring networks to avoid data collisions.
electronic data interchange (EDI)
The exchange of large amounts of data in a standardized electronic format.
tunneling
The main technology for achieving a virtual private network; the placement of data packets inside other data packets.
An e-mail server usually routes all its traffic to and from the server through a communications server.
True
Client/server networks are generally more secure than P2P networks
True
Facial recognition and palm prints can be defined as biometric authentication devices.
True
In ring topology, a device grabs the token when it needs to send data.
True
In the ring topology, data flows around the circle in one direction only.
True
In tunneling, data packets are placed inside other data packets.
True
More personnel are usually required to maintain business networks than stand-alone computers.
True
Most home networks use unshielded twisted-pair cable that does not have foil shielding
True
Most modern operating systems include some type of NOS functionality
True
Network topology refers to the physical or logical arrangement of computers, transmission media, and other network components.
True
shielded twisted-pair (STP)cable
Twisted-pair cable that contains a layer of foil shielded to reduce interference.
acts as a repository for software such as Microsoft Office
application server
To ensure only authorized users are logging onto a network, which server would a client/server network include?
authentication
To manage authorized connections to the internal network, which server would a client/server network include?
authentication
Keeps track of user logins to the network and which services are available to each user
authentication server
Correctly entering the user ID and password on your college network is an example of
authentication.
Which of the following is used to increase security on a client/server network?
bastion host
A __________ is specifically designed to transfer data between collision domains.
bridge
A(n) ____ transfers data between collision domains
bridge
Connecting computers on a single line is called a(n) ____ topology
bus
In a ____ topology, all computers are connected in a line on a single cable run
bus
In a(n) ____________ topology, all computers are connected in sequence on a single cable.
bus
Computer help desks often prioritize problems based on __________.
by importance
the help desk database are ranked
by importance
Which of the following is an advantage of installing a client/server network in a business?
centralization of network security protection
When working with a(n) ____ network, special network operating system (NOS) software may have to be installed on all computers.
client/server
Instead of maintaining a local server, a company may decide to use a(n) ____ server that is maintained by a hosting company and is connected to the network via the internet.
cloud
A(n) _____ server handles all messaging between a network and other networks, including internet connectivity.
communications
The __________is often the only device on the network connected to the Internet.
communications server
A ____ server provides client computers with access to stored information
database
allows client computers to access a database
database server
Which of the following is not an advantage of installing a network in a business?
decentralization of files and data
A(n)____________ server is used to fulfill one specific function on a network.
dedicated
In a network, ____ servers preform specific tasks such as handling e-mail or managing files.
dedicated
Servers such as print and database are examples of ___ servers that fulfill a specific network function
dedicated
processes and delivers incoming and outgoing e-mail
e-mail server
Fiber-optic cable most likely would be used in a business network when
electrical or magnetic interference is present.
Data in a ring topology network __________.
flows in one direction only
All of the following are considered dedicated servers EXCEPT ____
internal servers
The purpose of a token in a token ring network is to ____
prevent data collisions from occuring
Tokens are used in a token ring network to ________.
prevent data collisions from occurring
Providing adequate security on a corporate network involves all of the following except
proprietary software lockout
To remain current with fixes to problems, the Sound Byte suggests that technicians should do all of the following EXCEPT ________.
pursue an advanced degree
A brute force attack is an attempt to access an account by:
repeatedly trying different passwords.
On client/server networks, bridges
route data between two collision domains on a single network.
A ____________ is designed to send information between two networks.
router
A(n) ____ sends data between two networks
router
An example of a network navigation device is a __________.
router
Why are P2P networks not usually installed in businesses?
security is stronger on client/server networks
All of the following are navigation devices to move data around or between networks EXCEPT _____
spans
In a ____________ network, failure of one computer does not affect other computers on the network.
star
In the ____ topology, devices are connected together through a central switch.
star
Which type of network topology is most popular?
star
All of the following are network topologies EXCEPT ____
switch
directs signals to the intended device
switch
____ are called smart hubs, because the retransmit signals only to the devices that need to receive them
switches
When using a bus topology, to prevent signals from bouncing back to computers that have already received the signal, a __________ is used.
terminator
In the Sound Byte, the first thing a technician checked as part of a daily routine was __________.
the help desk problem database
A network technician can expect each of the following EXCEPT ____
the same challenges every day
special data packet
token
The different array of computers, peripherals, and media is called network _____
topology
A quick way to deploy software to a large number of computers is to __________.
use "ghosting" software to copy the image of one computer to another
A company would use a(n) _____ server to provide internet-based information.
web
A(n) ____ server is used to host an internet site
web
Hosts websites that can be accessed via the internet
web server
Some typical problems discussed in the Sound Byte that a network technician might need to solve include all of the following EXCEPT __________.
writing computer manuals
router
A device that routes packets of data between two or more networks.
Ethernet is similar to what IEEE standard?
802.3
What is a bridge?
A bridge connects two or more network segments, increasing the network diameter as a repeater does, but bridges also help regulate traffic.
fiber-optic cable
A cable that transmits data at close to the speed of light along glass or plastic fibers.
centralized
A characteristic of client/ server networks where the server, not the individual user, coordinates data security.
scalability
A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.
decentralized
A characteristic of peer-to-peer networks where the individual user coordinates data security.
web server
A computer running a specialized operating system that enables it to host web pages (and other information) and to provide requested web pages to clients.
honey pot
A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value.
switch
A device for transmitting data on a network. A switch makes decisions, based on the media access control address of the data, as to where the data is to be sent.
Terminator
A device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it.
terminator
A device that absorbs a signal so that it's not reflected back onto parts of the network that have already received it.
network adapter
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.
Bridge
A device that is used to send data between different collision domains, depending on where the recipient device is located.
access card reader
A device that reads information from a magnetic strip on the back of a credit card-like access card.
client/server network (server-based network)
A type of network that uses servers to deliver services to computers that are requesting them (clients).
ring (loop) topology
A type of network topology where computers and peripherals are laid out in a configuration resembling a circle.
What are web servers?
A web server is used to host a website so it will be available through the Internet.
extranet
An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it.
brute force attack
An attempt to access an account by repeatedly trying different passwords.
How is an e-mail server different from a communications server?
An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing Internet connectivity.
possessed object
Any object that users carry to identify themselves and that grants them access to a computer system or facility.
A school network might use a(n) _____ server to store software such as Microsoft Office.
Application
Which type of server is designed to keep track of who is logging on to the network and which network services are available?
Authentication
_____ servers can act as overseers for the network, and they manage and coordinate the services that are available to each user
Authentication
Shielded twisted-pair (STP)
Copper wire cabling with a foil shielding to reduce interference.
Which of the following statements about ring topology is TRUE?
Data only flows in one direction
A communications server is used to host websites on a client/server network
False
A database server acts as a repository for application software.
False
A repeater moves data between two networks
False
An extranet allows for the exchange of large amounts of business data in a standardized electronic format.
False
Bus topology networks are becoming the most common type of network due to its efficiency.
False
In a bus topology, only the device for which a signal is intended can hear the sent data signal
False
What do file servers do?
File servers are used to store and manage files for network users.
wireless access point (WAP)
Gives wireless devices a sending and receiving connection point to the network.
frame
Groups of data packets that are sent together in a package.
communication server
Handles all communications between the network and other networks, including managing Internet connectivity.
packet screening
Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network.
Which of the following possible negative aspects of working as a technician was NOT discussed in the Sound Byte?
Having to work mandatory overtime
passive topology
In a network, a type of topology where the nodes do nothing to move data along the network.
active topology
In a network, a type of topology where the nodes participate in moving data through the network.
Internet data is transmitted in packets, and routers use some of the information in a packet to route the data to the correct recipient. List the four packet components mentioned on the website.
Information on the sender's address, the receiver's address, the package's place in the entire message, and how the receiving computer can be sure that the package arrived intact.
List two examples of configuration table information.
Information on which connections lead to particular groups of addresses Priorities for connections to be used Rules for handling both routine and special cases of traffic
Define the following Ethernet terms:
Medium: Usually fiber-optic or twisted pair cabling used to provide a path for electronic signals Segment: A single-shared medium Node: A device that attaches to a segment; also called a station Frame: Short messages the nodes use to communicate; variably sized chunks of information
What are the advantages of networking?
Networking enables one computer to send information to and receive information from another. A network enables the sharing of devices such as printers, scanners, fax machines, storage devices, and so on.
Do database servers manage the network databases?
Not really. Database servers provide client computers with access to information stored in a database.
network administrator
Person who maintains networks for businesses.
What manages all client-requested printing jobs for all printers on a network?
Print server
The software holding area for print jobs is called a print ____
Queue
CSMA/CD
The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals.
star topology
The most widely deployed client/server network topology, where the nodes connect to a central communications device called a switch in a pattern resembling a star.
My office has shifted to a client/server network and uses one server in the office—is that sufficient?
The number and types of servers you need depends on the workload your network experiences.
media access control (MAC) address
The physical address, similar to a serial number, of each network adapter.
network topology
The physical or logical arrangement of computers, transmission media (cable), and other network components.
authentication
The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network.
transmission media
The radio waves or the physical system (cable) that transports data on a network.
What are some examples of common, everyday uses of networks?
There are many types of networks surrounding us including the Internet, automatic teller machines (ATMs), and local phone lines.
Which of the following is NOT an advantage of star networks?
They are cheap to expand.
Why are client/server networks usually installed in businesses?
They are more scalable than P2P networks.
What do ring networks use to avoid data collisions?
Token method
A VPN uses the public Internet communications infrastructure to build a secure, private network among various locations.
True
Unshielded twisted-pair cable (UTP)
Used by most home networks.
virtualization
Using specialized software to make individual physical servers behave as though they are more than one physical device.
A network consisting of two LANs separated by great physical distances is known as a:
WAN
Which network is a combination of two or more LANs connected together over long distances?
WAN
data collision
When two computers send data at the same time and the sets of data collide somewhere in the connection media.
Do I need any special software to use dedicated servers?
Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate.
What server is used to store applications?
You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer.
One typical characteristic depicted in a day in the life of a technician would be __________.
a lot of face-to-face interaction with people
Star topology is considered a(n) __________ topology.
active
The Sound Byte suggests a network technician needs all of the following EXCEPT __________.
anger management
A(n) ____ server acts as a repository for software such as Microsoft Office.
application
Which of the following statements about using ghosting software is false?
it is difficult to use
All of the following are problems with the bus topology EXCEPT ____
it is expensive
All of the following are weaknesses of the bus topology EXCEPT __________.
it is expensive to implement
It can be difficult to fix a wireless connectivity problem because __________.
it might be difficult to replicate the problem
All of the following network topologies were discussed in the Sound Byte EXCEPT __________.
mesh
network device
node
The ranking of network problems by importance is usually determined by the ________.
number of affected users
The ranking of network problems by importance is usually determined by ____
number of users affected
NOS software is needed
on all computers in a client/server network.
A bus network in which attached devices cannot move data along the bus is referred to as a(n) __________ topology.
passive