CIS Ch 3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Hotspot

A Wi-Fi ______ is a wireless local area network that provides Internet access to the public.

Port

A communication ______ is a virtual end point for data entering and leaving a digital device.

Extension

A domain name ends with a(n) ________ that indicates its top-level domain.

dial-up, cable, DSL

A modem is required for ________________ Internet access.

SSID

A(n) ________ is the broadcasted name of a wireless network.

Guest

A(n) ________ network allows visitors to access the Internet through a LAN but doesn't allow them to access other resources and data on the network.

Fixed

DSL is an example of what type of Internet access?

DHCP (Dynamic Host Configuration Protocol)

IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by _________. (Hint: Use the acronym.)

IP

Internet addresses are controlled by which one of the following protocols?

Dynamic addresses

Internet addresses that are temporarily assigned are called ________ addresses.

ISPs

Networks that form the Internet are maintained by ____________.

Latency

On a network, _______ is the elapsed time for data to make a round-trip from point A to point B and back to point A.

DTE (data terminal equipment)

On a network, any device that stores or generates data is considered to be a(n) _________.

TCP

On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?

packets

Parcels of data that are sent over a network are called ________.

Static

Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?

bits per second (bps)

The bandwidth of a channel that carries digital data is usually measured in ___________.

ICANN (Internet Corporation for Assigned Names and Numbers)

The organization that supervises Internet addressing is ___________.

Spoofing

Unauthorized changes to the DNS are called DNS ________.

ICANN (Internet Corporation for Assigned Names and Numbers)

What organization is the top-level authority for supervising domain name requests?

asymetric

What type of Internet connection do you have when upload speed differs from download speed?

Public

When a router connects to and communicates over the Internet, it has a(n) ________ IP address that is routable over the Internet.

Error Correction

When network protocols clean a corrupted signal, the process is called ______________.

DTE (data terminal equipment)

When you connect to a Wi-Fi hotspot, your digital device is classified as a(n) _______________.

Hub

Which DCE would you use if you wanted to extend a wired network by adding more ports?

BitTorrent

Which file-sharing protocol distributes the role of a file server across a collection of dispersed computers?

Tier I

Which network tier forms the Internet backbone?

Online shopping

Which of the following is a common use of server-side scripting?

more secure, more dependable, and faster speeds

Which of the following is an advantage of wired connections?

router, modem, and hub

Which of the following is an example of a DCE?

Mobile

Which type of broadband Internet access involves using cellular data networks?

fiber-optic cable

Which type of cable is used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications?

Arrival

Which type of communication protocol converts data into standard formats that can be used by applications?

4G

Which type of mobile broadband service has maximum download rates of 300 Mbps and upload rates of 75 Mbps?

PAN (Personal Area Network)

Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables?

WAN

Which type of network covers a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies?

Mesh

Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?

point-to-point

Which type of network topology connects a peripheral device to a host device?

Star

Which type of network topology connects multiple devices to a central device?

FTP

Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet?

Encryption

Wireless _______ scrambles the data transmitted between wireless devices.

LANs

_______ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.

Ethernet

________ is a wired network technology that is defined by IEEE 802.3 standards.

Ping

________ is utility software designed to measure responsiveness and availability of an Internet connection.

Packet Switching

_________ technology divides a message into several packets that can be routed independently to their destination.

Ethernet

__________ LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers.

IPv6 (Internet Protocol version 6)

__________ uses 128-bit addresses to uniquely identify devices connected to the Internet.

IPv4

__________ uses 32-bit addresses to uniquely identify devices connected to the Internet.

Traceroute

_____________ is a network diagnostic tool that shows you each router and server that your data encounters as it travels over the Internet.


Kaugnay na mga set ng pag-aaral

Chapter 67: Management of Patients With Cerebrovascular Disorders

View Set