Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

biometric

Facial recognition is an example of _________ authentication

peer-to-peer

In a __________ network, each node connected to the network communicates directly with every other node

screening

Packet ______ is a form of protection for your computer that looks at each packet that comes into your computer network

a method used to avoid data collisions

What is CSMA/CD?

Media access control (MAC)

What is another name for the physical address assigned to each network adapter?

hyperText Transfer protocol (HTTP)

Which is not a networking protocol---- Apple file protocol (AFP), NetBIOS Extended User Interface (NetBEUI), Internet Packet Exchange (IPX), HyperText Transfer Protocol (HTTP)

EMI

Which of the following causes interferences when a cable is exposed to strong electromagnetic fields

bridge

Which of the following devices sends data from one collision domain to another

cluster

Which of the following is NOT a common network topology--- star, cluste, bus, ring

cable diameter

Which of the following is NOT a factor to consider when selecting network cabling--- cable diameter, interference, maximum run length , bandwidth

Bus

Which of the following networks is most known for data collisions

client/server

________ networks contain servers as well as computer that individual users access and use

routers

__________ are often equipped to act as hardware firewalls

fiber-optic

___________ cable is NOT subject to electromagnetic interference or radio frequency interference

token

A ____ is passed from computer to computer around the ring of a ring topology network

PAN

A _______ is a network used by one person connection via wireless media

network

A ________ is a group of two more computers, or nodes, configured to share information

protocol

A ________ is a set of rules for how information and communication are exchanged

network operating system

A _________ needs to be installed on each each client computer and server connected to the network to provide the services necessary for them to communicate

VPN

A _________ uses the public internet communications infrastructure to build a secure, private network

queue

A print server uses a print _______ as a software holding area for printing jobs

terminator

the ends of the cable in a bus network use a ________ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal

switch

the star topology uses a central _________ to connect all network nodes


Set pelajaran terkait

Psychology Ch 1 Introduction to Contemporary Fields in Psychology

View Set

Accounting for Non-accounting Majors-Chapter 1 Role of Accounting in Business

View Set