Chapter 12 notes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Token

A _____ is passed from computer to computer around the ring of a ring topology network.

Network

A ________ allows multiple users to connect to the Internet through one connection.

Network

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

Pan

A ________ is a network used by one person connected via wireless media.

Protocol

A ________ is a set of rules for how information and communication are exchanged.

Firewall

A ________ keeps your computer safe by confirming who is trying to access it.

Hybrid

A ________ topology is created when more than one topology is used to build a network.

Vpn

A ________ uses the public Internet communications infrastructure to build a secure, private network.

Queue

A print server uses a print ________ as a software holding area for printing jobs

IP

A(n) ________ address is the address external entities use to communicate with your network.

intranet

A(n) ________ is used exclusively within a corporation or organization.

Network operating system

A(n) ________ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.

Bastion host

A(n) ________ server is a heavily secured server located on a special perimeter network between a company's secure internal network and its firewall.

Files

A(n) ________ server is a server that stores and manages files for network users.

authentication

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

Biometric

Facial recognition is an example of ________ authentication.

Duplex

For business networks, which of the following is NOT a main cable type?

Ring

If fair allocation of network access is a major requirement of the network, choose a(n) ________ topology.

Jam

In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ________ signal.

Peer-to-peer

In a(n) ________ network, each node connected to the network communicates directly with every other node.

10

P2P networks become difficult to manage when they are expanded beyond ________ users

Screening

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

Token

Ring networks use the ________ method to avoid data collisions

Terminator

The ends of the cable in a bus network use a(n) ________ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal.

Ethernet

The standard communications protocol used on most client/server networks is ______.

Switch

The star topology uses a central ________ to connect all network nodes.

A method used to avoid data collisions

What is CSMA/CD?

Media access control

What is another name for the physical address assigned to each network adapter?

Application

When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ________ server delivers the software to the client computer.

Fiber optic

Which cable type is the most costly to install?

HyperText transfer protocol

Which is NOT a networking protocol?

Emi

Which of the following causes interference when a cable is exposed to strong electromagnetic fields?

Bridge

Which of the following devices sends data from one collision domain to another?

All networks require at least two servers

Which of the following is FALSE about servers?

Cluster

Which of the following is NOT a common network topology?

Cable diameter

Which of the following is NOT a factor to consider when selecting network cabling?

Ease of maintenance and administration

Which of the following is NOT an advantage of using networks as compared to a stand-alone computer?

(It verifies that all information transmitted from the computer is correctly received by the)

Which of the following is something a network adapter does NOT do?

Star

Which of the following is the most commonly used client/server network topology?

Star

Which of the following networks has high scalability?

Bis

Which of the following networks is most known for data collisions?

Routers

________ are devices used to send data between two networks.

Routers

________ are often equipped to act as hardware firewalls.

Fiber-optic

________ cable is NOT subject to electromagnetic interference or radio frequency interference.

Electromagnetic

________ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers.

Cladding

________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection.

Client/server

________ networks contain servers as well as computers that individual users access and use.


Ensembles d'études connexes

6.3: Defense Against Infectious Disease

View Set

Visual Basic 2 Test 1 Chapter 1 & 2

View Set

Unit 4 - Weather & Climate - CONTENT Review

View Set

Chapter 24 Alterations in Genitourinary Function

View Set

The Preamble to the U.S. Constitution

View Set

Vertebral Column and Muscles of the Back

View Set