Technology in Action Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

biometric authentication device

A device that uses some unique characteristic of human biology to identify authorized users.

bridge

A device that's used to send data between different collision domains in a network, depending on where the recipient device is located.

bastion host

A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall.

access method

A method to control which computer is allowed to use transmission media at a certain time.

local area network (LAN)

A network in which the nodes are located within a small geographic area.

wide area network (WAN)

A network made up of local area networks (LANs) connected over long distances.

virtual private network (VPN)

A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.

Open Systems Interconnection (OSI)

A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.

intranet

A private network set up by a business or an organization that's used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.

What is a repeater?

A repeater connects multiple Ethernet segments. Each signal on a segment is listened to by the device and then repeated by the repeater. This is used to increase the diameter of a network.

What is a router?

A router is an advanced networking component that can divide a single network into two logically separate networks.

proxy server

A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).

application server

A server that acts as a repository for application software.

communications server

A server that handles all communications between the network and other networks, including managing Internet connectivity.

cloud server

A server that is maintained by a hosting company and that is connected to networks via the Internet.

authentication server

A server that keeps track of who's logging on to the network and which services on the network are available to each user.

print server

A server that manages all client-requested printing jobs for all printers on a network.

database server

A server that provides client computers with access to information stored in databases.

file server

A server that stores and manages files for network users or that acts as a storehouse for files that users can download.

dedicated server

A server used to fulfill one specific function, such as handling e-mail.

e-mail server

A server whose sole function is to process and deliver incoming and outgoing e-mail.

protocol

A set of rules for exchanging communications.

coaxial cable

A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service.

print queue

A software holding area for print jobs. Also called a print spooler.

token

A special data packet used to pass data in a ring topology network.

wireless network interface card (wireless NIC)

A special network adapter card that allows a computing device to connect to a network using wireless access.

jam signal

A special signal sent to network nodes alerting them that a data collision has occurred.

bus (linear bus) topology

A system of networking connections in which all devices are connected in sequence on a single cable.

What are authentication servers?

Authentication servers keep track of who is logging on to the network.

hybrid topology

Combining multiple topologies into one network.

Fiber-optic cable

Composed of glass or plastic fiber.

What allows the exchange of large amounts of business data in a standardized electronic format?

Electronic data interchange

information assurance

Ensuring that information systems contain accurate information and are adequately secured against tampering.

protocol most commonly used on star networks

Ethernet

Network operating systems need to be installed only on one client computer in order to "talk" to the entire network.

False

data collision avoidance method

CSMA/CD

Switches are used to route data between two different networks

False

The main advantage of a ring topology is that the failure of one computer does not affect the entire network

False

The three main cable types used in business networks are twisted-pair, coaxial, and electromagnetic cable.

False

twisted-pair cable

Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).

Which of the following is a private network setup by a business that's used exclusively by a select group of employees and suppliers?

Intranet

Network adapters send data packets based on a(n)

MAC address

Switch

Makes decisions as to where the data is to be sent and rebroadcasts it to the appropriate network node.

The ____ topology uses tokens to control data transmission

Ring

What distinguishes a router from some of the other network components?

Routers make connections between networks like your home network and the Internet.

_______ means that more users can be added to a network easily without affecting the performance of the other network nodes.

Scalability

Packet

Small segment of data transmitted via a network.

device driver

Software that facilitates the communication between a device and its operating system or between a network adapter and a server's operating system and the operating system of the computer in which the adapter is installed.

network operating system (NOS)

Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate.

Coaxial cable

Still used in some manufacturing facilities where machinery creates heavy electrical interference.

token method

The access method used by ring networks to avoid data collisions.

electronic data interchange (EDI)

The exchange of large amounts of data in a standardized electronic format.

tunneling

The main technology for achieving a virtual private network; the placement of data packets inside other data packets.

An e-mail server usually routes all its traffic to and from the server through a communications server.

True

Client/server networks are generally more secure than P2P networks

True

Facial recognition and palm prints can be defined as biometric authentication devices.

True

In ring topology, a device grabs the token when it needs to send data.

True

In the ring topology, data flows around the circle in one direction only.

True

In tunneling, data packets are placed inside other data packets.

True

More personnel are usually required to maintain business networks than stand-alone computers.

True

Most home networks use unshielded twisted-pair cable that does not have foil shielding

True

Most modern operating systems include some type of NOS functionality

True

Network topology refers to the physical or logical arrangement of computers, transmission media, and other network components.

True

shielded twisted-pair (STP)cable

Twisted-pair cable that contains a layer of foil shielded to reduce interference.

acts as a repository for software such as Microsoft Office

application server

To ensure only authorized users are logging onto a network, which server would a client/server network include?

authentication

To manage authorized connections to the internal network, which server would a client/server network include?

authentication

Keeps track of user logins to the network and which services are available to each user

authentication server

Correctly entering the user ID and password on your college network is an example of

authentication.

Which of the following is used to increase security on a client/server network?

bastion host

A __________ is specifically designed to transfer data between collision domains.

bridge

A(n) ____ transfers data between collision domains

bridge

Connecting computers on a single line is called a(n) ____ topology

bus

In a ____ topology, all computers are connected in a line on a single cable run

bus

In a(n) ____________ topology, all computers are connected in sequence on a single cable.

bus

Computer help desks often prioritize problems based on __________.

by importance

the help desk database are ranked

by importance

Which of the following is an advantage of installing a client/server network in a business?

centralization of network security protection

When working with a(n) ____ network, special network operating system (NOS) software may have to be installed on all computers.

client/server

Instead of maintaining a local server, a company may decide to use a(n) ____ server that is maintained by a hosting company and is connected to the network via the internet.

cloud

A(n) _____ server handles all messaging between a network and other networks, including internet connectivity.

communications

The __________is often the only device on the network connected to the Internet.

communications server

A ____ server provides client computers with access to stored information

database

allows client computers to access a database

database server

Which of the following is not an advantage of installing a network in a business?

decentralization of files and data

A(n)____________ server is used to fulfill one specific function on a network.

dedicated

In a network, ____ servers preform specific tasks such as handling e-mail or managing files.

dedicated

Servers such as print and database are examples of ___ servers that fulfill a specific network function

dedicated

processes and delivers incoming and outgoing e-mail

e-mail server

Fiber-optic cable most likely would be used in a business network when

electrical or magnetic interference is present.

Data in a ring topology network __________.

flows in one direction only

All of the following are considered dedicated servers EXCEPT ____

internal servers

The purpose of a token in a token ring network is to ____

prevent data collisions from occuring

Tokens are used in a token ring network to ________.

prevent data collisions from occurring

Providing adequate security on a corporate network involves all of the following except

proprietary software lockout

To remain current with fixes to problems, the Sound Byte suggests that technicians should do all of the following EXCEPT ________.

pursue an advanced degree

A brute force attack is an attempt to access an account by:

repeatedly trying different passwords.

On client/server networks, bridges

route data between two collision domains on a single network.

A ____________ is designed to send information between two networks.

router

A(n) ____ sends data between two networks

router

An example of a network navigation device is a __________.

router

Why are P2P networks not usually installed in businesses?

security is stronger on client/server networks

All of the following are navigation devices to move data around or between networks EXCEPT _____

spans

In a ____________ network, failure of one computer does not affect other computers on the network.

star

In the ____ topology, devices are connected together through a central switch.

star

Which type of network topology is most popular?

star

All of the following are network topologies EXCEPT ____

switch

directs signals to the intended device

switch

____ are called smart hubs, because the retransmit signals only to the devices that need to receive them

switches

When using a bus topology, to prevent signals from bouncing back to computers that have already received the signal, a __________ is used.

terminator

In the Sound Byte, the first thing a technician checked as part of a daily routine was __________.

the help desk problem database

A network technician can expect each of the following EXCEPT ____

the same challenges every day

special data packet

token

The different array of computers, peripherals, and media is called network _____

topology

A quick way to deploy software to a large number of computers is to __________.

use "ghosting" software to copy the image of one computer to another

A company would use a(n) _____ server to provide internet-based information.

web

A(n) ____ server is used to host an internet site

web

Hosts websites that can be accessed via the internet

web server

Some typical problems discussed in the Sound Byte that a network technician might need to solve include all of the following EXCEPT __________.

writing computer manuals

router

A device that routes packets of data between two or more networks.

Ethernet is similar to what IEEE standard?

802.3

What is a bridge?

A bridge connects two or more network segments, increasing the network diameter as a repeater does, but bridges also help regulate traffic.

fiber-optic cable

A cable that transmits data at close to the speed of light along glass or plastic fibers.

centralized

A characteristic of client/ server networks where the server, not the individual user, coordinates data security.

scalability

A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.

decentralized

A characteristic of peer-to-peer networks where the individual user coordinates data security.

web server

A computer running a specialized operating system that enables it to host web pages (and other information) and to provide requested web pages to clients.

honey pot

A computer system that's set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value.

switch

A device for transmitting data on a network. A switch makes decisions, based on the media access control address of the data, as to where the data is to be sent.

Terminator

A device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it.

terminator

A device that absorbs a signal so that it's not reflected back onto parts of the network that have already received it.

network adapter

A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.

Bridge

A device that is used to send data between different collision domains, depending on where the recipient device is located.

access card reader

A device that reads information from a magnetic strip on the back of a credit card-like access card.

client/server network (server-based network)

A type of network that uses servers to deliver services to computers that are requesting them (clients).

ring (loop) topology

A type of network topology where computers and peripherals are laid out in a configuration resembling a circle.

What are web servers?

A web server is used to host a website so it will be available through the Internet.

extranet

An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it.

brute force attack

An attempt to access an account by repeatedly trying different passwords.

How is an e-mail server different from a communications server?

An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing Internet connectivity.

possessed object

Any object that users carry to identify themselves and that grants them access to a computer system or facility.

A school network might use a(n) _____ server to store software such as Microsoft Office.

Application

Which type of server is designed to keep track of who is logging on to the network and which network services are available?

Authentication

_____ servers can act as overseers for the network, and they manage and coordinate the services that are available to each user

Authentication

Shielded twisted-pair (STP)

Copper wire cabling with a foil shielding to reduce interference.

Which of the following statements about ring topology is TRUE?

Data only flows in one direction

A communications server is used to host websites on a client/server network

False

A database server acts as a repository for application software.

False

A repeater moves data between two networks

False

An extranet allows for the exchange of large amounts of business data in a standardized electronic format.

False

Bus topology networks are becoming the most common type of network due to its efficiency.

False

In a bus topology, only the device for which a signal is intended can hear the sent data signal

False

What do file servers do?

File servers are used to store and manage files for network users.

wireless access point (WAP)

Gives wireless devices a sending and receiving connection point to the network.

frame

Groups of data packets that are sent together in a package.

communication server

Handles all communications between the network and other networks, including managing Internet connectivity.

packet screening

Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network.

Which of the following possible negative aspects of working as a technician was NOT discussed in the Sound Byte?

Having to work mandatory overtime

passive topology

In a network, a type of topology where the nodes do nothing to move data along the network.

active topology

In a network, a type of topology where the nodes participate in moving data through the network.

Internet data is transmitted in packets, and routers use some of the information in a packet to route the data to the correct recipient. List the four packet components mentioned on the website.

Information on the sender's address, the receiver's address, the package's place in the entire message, and how the receiving computer can be sure that the package arrived intact.

List two examples of configuration table information.

Information on which connections lead to particular groups of addresses Priorities for connections to be used Rules for handling both routine and special cases of traffic

Define the following Ethernet terms:

Medium: Usually fiber-optic or twisted pair cabling used to provide a path for electronic signals Segment: A single-shared medium Node: A device that attaches to a segment; also called a station Frame: Short messages the nodes use to communicate; variably sized chunks of information

What are the advantages of networking?

Networking enables one computer to send information to and receive information from another. A network enables the sharing of devices such as printers, scanners, fax machines, storage devices, and so on.

Do database servers manage the network databases?

Not really. Database servers provide client computers with access to information stored in a database.

network administrator

Person who maintains networks for businesses.

What manages all client-requested printing jobs for all printers on a network?

Print server

The software holding area for print jobs is called a print ____

Queue

CSMA/CD

The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals.

star topology

The most widely deployed client/server network topology, where the nodes connect to a central communications device called a switch in a pattern resembling a star.

My office has shifted to a client/server network and uses one server in the office—is that sufficient?

The number and types of servers you need depends on the workload your network experiences.

media access control (MAC) address

The physical address, similar to a serial number, of each network adapter.

network topology

The physical or logical arrangement of computers, transmission media (cable), and other network components.

authentication

The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network.

transmission media

The radio waves or the physical system (cable) that transports data on a network.

What are some examples of common, everyday uses of networks?

There are many types of networks surrounding us including the Internet, automatic teller machines (ATMs), and local phone lines.

Which of the following is NOT an advantage of star networks?

They are cheap to expand.

Why are client/server networks usually installed in businesses?

They are more scalable than P2P networks.

What do ring networks use to avoid data collisions?

Token method

A VPN uses the public Internet communications infrastructure to build a secure, private network among various locations.

True

Unshielded twisted-pair cable (UTP)

Used by most home networks.

virtualization

Using specialized software to make individual physical servers behave as though they are more than one physical device.

A network consisting of two LANs separated by great physical distances is known as a:

WAN

Which network is a combination of two or more LANs connected together over long distances?

WAN

data collision

When two computers send data at the same time and the sets of data collide somewhere in the connection media.

Do I need any special software to use dedicated servers?

Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate.

What server is used to store applications?

You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer.

One typical characteristic depicted in a day in the life of a technician would be __________.

a lot of face-to-face interaction with people

Star topology is considered a(n) __________ topology.

active

The Sound Byte suggests a network technician needs all of the following EXCEPT __________.

anger management

A(n) ____ server acts as a repository for software such as Microsoft Office.

application

Which of the following statements about using ghosting software is false?

it is difficult to use

All of the following are problems with the bus topology EXCEPT ____

it is expensive

All of the following are weaknesses of the bus topology EXCEPT __________.

it is expensive to implement

It can be difficult to fix a wireless connectivity problem because __________.

it might be difficult to replicate the problem

All of the following network topologies were discussed in the Sound Byte EXCEPT __________.

mesh

network device

node

The ranking of network problems by importance is usually determined by the ________.

number of affected users

The ranking of network problems by importance is usually determined by ____

number of users affected

NOS software is needed

on all computers in a client/server network.

A bus network in which attached devices cannot move data along the bus is referred to as a(n) __________ topology.

passive


Set pelajaran terkait

Policy Provisions and Contract Law

View Set

History Section 3 Review/ Chapter 15

View Set

Exam 4 med surg possible questions

View Set

Wordly Wise 3000® Level 8, Lesson 10

View Set

CPIM Part 1 Missed Questions pt. 1

View Set