The flashcards below were created by user slc53 on FreezingBlue Flashcards.

  1. Access point
    A designated point of entry within a network where wireless devices send and receive transmissions.
  2. Addressing
    How computers are able to identify and recognize each other on a network.
  3. Application service providers (ASPs)
    Companies that develop and sell applications that are used over the Internet.
    Acronym for Attached Resource Computer Network. ARCNET is an outdated networking protocol that was used in the 1980s for office automation tasks.
  5. Authentication mechanisms
    Ways that the network can validate who is and who isn’t allowed access to the network.
  6. Backbone network
    A large, central network that can be used to connect LANs to form MANs, and also connect other backbone networks, MANs, and even WANs.
  7. Bandwidth
    The capacity on a given network for data transmission.
  8. Biometric device
    Device that uses physical features such as fingerprint or retinal pattern, to authenticate network users.
  9. Bridge
    A network communication device used to connect physical networks and provide a level of filtering between networks.
  10. Broadband
    A type of high-speed data transmission circuit.
  11. Brouter
    A network communication device that combines the functionality of routers and bridges.
  12. Client operating system
    The control program installed on the client PC.
  13. Client/server network
    Network model that connects multiple PCs, called clients, to a single computer, called a server, which distributes data and resources to the network.
  14. Connection
    The process of having two computers recognize each other and open a communication channel between them.
  15. Convergence
    Integration of voice, video, and data communication.
  16. Data communications
    Movement of computer information from one point to another by means of electrical or optical transmission systems.
  17. Directory services network
    A network model in which everything on the network, including users, computers, and shared resources, is maintained in a centralized directory. Also known as a directory-based network.
  18. Dumb terminal
    A screen and a keyboard with all data storage, processing, and control occurring at the mainframe.
  19. Ethernet
    A protocol defining the wired connections within a network. Most commonly used networking standard with support for speeds ranging from 10 Mbps to 10 Gbps in current implementations.
  20. Extranet
    A private network that allows specific external users access over the Internet.
  21. Fiber optic
    Transmission media using glass or plastic fibers to carry light (laser) signals.
  22. File server
    A server on a network whose primary function is to serve as a repository for network user files.
  23. Gateway
    A connection device that is used to connect networks and devices that would not otherwise be able to communicate with each other.
  24. Handshaking
    The process used by computers for establishing a connection to each other.
  25. High-level protocol
    The rules for how data is transferred from one device to another.
  26. Hub
    A connection device that allows multiple connections to the network.
  27. Information utilities
    Companies that sell information services.
  28. Internet service provider (ISP)
    Companies providing Internet access for a fee.
  29. Intranet
    A closed private LAN used for internal communication.
  30. Local area network (LAN)
    A relatively small network of computers, printers, and other devices covering a small geographic area.
  31. Long-haul transmission lines
    Telephone cables within a wide area network used to transmit over long distances.
  32. Low-level protocol
    A system of rules for how network connection is achieved.
  33. Media player
    Small portable digital device used for playing audio and video files.
  34. Metropolitan area network (MAN)
    A high-speed internetwork of LANs deployed in a metropolitan area.
  35. Modem
    Devices that enables computers to communicate over dial-up telephone lines.
  36. NetBEUI
    High-level protocol originally used on Microsoft networks.
  37. Network
    Computers connected in such a way that they can communicate with each other.
  38. Network adapter
    The hardware that enables a computer to connect to a network.
  39. Network administrator
    An IT expert specializing in the upkeep and support of networks.
  40. Network interface card (NIC)
    Another name for a network adapter; the hardware that enables a computer to connect to a network.
  41. Network system
    The path over which servers and clients communicate.
  42. Node
    A uniquely identifiable device.
  43. Packet
    Block of data formatted for transmission over a network.
  44. Peer server
    The PCs in a peer-to-peer network that act as both client and server.
  45. Peer-to-peer network
    A small network architecture in which individual computers are connected directly to one another and can act as both a server and a client.
  46. Print server
    A server on a network whose primary function is to control network user access to shared printers.
  47. Protocol
    Rules or standards that define the way in which devices communicate on a network, such as signal strength and format.
  48. Regional carriers
    Regional telephone companies.
  49. Router
    A network communication device used to connect two or more networks or network types.
  50. Server
    A computer that stores and provides resources and data to the network.
  51. Server operating system
    The control program installed on the server. Also known as a network operating system.
  52. Smart phone
    Any device capable of placing phone calls and advanced computing functions including web browsing, e-mail transmission, media playing, document viewing, and schedule maintenance.
  53. Smart terminal
    A connection device that has onboard memory and processing capabilities.
  54. Switch
    A connection device similar to a hub but more sophisticated including functionality that allows it to control and manage data transmissions.
  55. Telecommunications
    The transmission of voice and video (images and graphics) as well as data; usually implies longer distances.
  56. Token ring
    A topology in which a data packet is sent around a ring of computers until it reaches its intended destination.
  57. Transmission Control Protocol/ Internet Protocol (TCP/IP)
    High-level protocol suite developed for use on the Internet and currently the de facto standard PC network protocol.
  58. Transmission media
    The media that carries network signals—either copper wire, fiber optic line, or radio transmission.
  59. Virtual private network (VPN)
    An private communication path over the public Internet acting as a secure network within a larger or public network.
  60. Voice over IP (VOIP)
    The technology that enables Internet-based telephone services.
  61. Web browser
    Software that enables a computer to render and display documents published from a Web server.
  62. Web server
    Network server that stores documents and graphics published to the Internet.
  63. Wide area network (WAN)
    LANs connected over a wide large geographic area, traditionally connecting LANs using the public switched telephone network but more commonly connecting through the Internet.
  64. Wired network
    A network consisting of PCs and servers, which are physically connected by cables.
  65. Wireless network
    Use radio transmission instead of cables to communicate.
  66. Workgroup
    A logical peer-to-peer network grouping.
  67. 1.1.1. List two benefits of modern networks.
    The primary benefits are resource sharing, communication, and security.
  68. 1.1.2. How are PC networks similar to older mainframe networks? How are they different?
    Mainframe systems have all processing power and storage located within the central mainframe while each PC and server has its own processor, memory and disk storage. Client/server and mainframe share similar architecture in terms of resource flow.
  69. 1.1.3. Why is security for PC networks a concern?
    Hackers and ID thieves have tools that can easily penetrate PC and server operating systems and retrieve sensitive information. Encryption methods and access prevention tools can mitigate this threat.
  70. 1.1.4. What are some of the access control methods used to protect networked information?
    Some access control methods include usernames, passwords, and biometrics such as fingerprint scanners or retinal scanners.
  71. 1.2.1. Compare the roles of network clients and network servers.
    Network servers provide resources to the network. Network clients consume the resources provided by servers.
  72. 1.2.2. How is a router used in a network?
    A router is used to connect two or more networks.
  73. 1.2.3. Compare the client/server, directory services, and peer-to-peer network models.
    The client/server model uses computers acting specifically in client and server roles and provides centralized security. The directory services model maintains everything in the network in a central directory and also provides centralized security. The peer-to-peer model uses peer-servers and does not have centralized security control.
  74. 1.3.1. Define data communications.
    The movement of computer information from one point to another.
  75. 1.3.2. How have newer systems taken advantage of the merging of data communications and telecommunications?
    Data communications networks facilitate more efficient use of computers and improve the day-to-day control of a business by providing faster information flow. They also provide message transfer services to allow computer users to talk to one another via electronic mail, chat, and video streaming.
  76. 1.3.3. Compare the role of low-level and high-level protocols.
    Low-level protocols define hardware-level communication standards such as signal strength and physical connection hardware. High-level protocols operate at the software level and handle activities such as establishing connections and formatting data for transmission.
  77. 1.4.1. Compare characteristics of LANs, CANs, MANs, and WANs:
    • LAN:
    • * Used within small areas (such as in an office building).
    • * Offer high-speed communication—typically, 100Mbps or faster.
    • * Provide access for many devices.
    • * Use LAN-specific equipment such as hubs and network interface cards.
    • CAN:
    • * Connects several LANs within a building or small geographical area
    • * Larger than a LAN but smaller than a WAN
    • MAN:
    • * Sites are dispersed across a city and perhaps the surrounding area as well.
    • * Historically slow connections (56Kbps–1.5Mbps) have given way to communication at hundreds of megabits per second and even gigabit speeds.
    • * Provide single points of connection between each LAN.
    • * Use devices such as routers, telephone switches, and microwave antennas as parts of their communication infrastructure.
    • WAN
    • * Can cover a very large geographical area—even span the world.
    • * Usually communicate at slow speeds (compared to LANs).
    • * Access to the WAN is limited—a LAN usually has only one WAN link that is shared by all devices.
    • * Use devices such as routers, modems, and WAN switches, connectivity devices specific to LANs and used to connection to long-haul transmission media.
  78. 1.4.2. How are intranets and extranets similar? How are they different?
    Intranets and extranets are similar because they are both based on Internet technologies. They differ because intranets use Internet technology to facilitate internal communications while extranets provide connectivity for external users.
  79. 1.5.1. Describe the process of convergence.
    Convergence is the integration of voice, video, and data communications. Carriers such as AT&T provide telecommunication services that support data and voice transmission over the same circuits—instead of transmitting video, voice, and data signals separately on different networks—and hardware manufacturers provide the infrastructure needed to meet the changing definition of data.
  80. 1.5.2. What is an information utility and how has it evolved?
    An information utility is a company that provides a wide range of standardized information services.
  81. 1.5.3. What challenges do organizations face in relation to the information made available by the Internet?
    • * Assessing the accuracy and value of information
    • * Assimilating the information we decide is useful
    • * Using the information effectively.
  82. 1.mc.1. Broadband includes a wide range of frequencies to increase the volume of data communication. True or false?
  83. 1.mc.2. Which of the following refers to a network deployed in the smallest geographic area?(a) WAN (b) MAN (c) CAN (d) LAN
    (d) LAN
  84. 1.mc.3. What is the primary shared resource on large PC networks? (a) Data (b) Audio speakers (c) Scanners (d) None of the above
    (a) Data
  85. 1.mc.4. A ______________ is a device used to connect network devices like computers and printers.
    (a) Node (b) Router (c) Switch (d) Gateway
    (c) Switch
  86. 1.mc.5. What is the device used to connect two or more LANs?
    (a) node (b) router (c) hub (d) gateway
    (b) router
  87. 1.mc.6. Which network model does not support centralized security?
    (a) Client/server (b) Directory services (c) Peer-to-peer
    (c) Peer-to-peer
  88. 1.mc.7. Microsoft Internet Explorer is an example of a Web server. True or false?
  89. 1.mc.8. What is distinctive about fiber-optic cable compared to other transmission media types?
    a) It carries digital data.(b) It uses radio-frequency communication transmissions.(c) It contains copper wire.(d) It uses glass or plastic to carry the data signal.
  90. (d) It uses glass or plastic to carry the data signal.
  91. 1.mc.9. What is the term used to refer to any uniquely identifiable device on a network?
    (a) Node(b) Host(c) Server(d) Gateway
    (a) Node
  92. 1.mc.10. What is the device that makes a physical connection between a computer and the network cable in a traditional wired network?
    (a) Switch(b) Network interface card(c) Brouter(d) Access point
    (b) Network interface card
  93. 1.mc.11. What is the most commonly used low-level protocol on PC networks?
    (a) ARCNET(b) Token Ring(c) Ethernet(d) NetBEUI
    (c) Ethernet
  94. 1.mc.12. Which of the following is defined by a high-level protocol?
    (a) Physical connection to the network(b) Signal strength(c) Connection procedures(d) Cable plant structure
    (c) Connection procedures
  95. 1.mc.13. Which protocol is the de facto standard for PC networking?
    (a) IPX/SPX(b) AppleTalk(c) NetBEUI(d) TCP/IP
    (d) TCP/IP
  96. 1.mc.14. What type of network would you use to connect various locations in San Francisco through existing phone company-owned cables?
    (a) CAN (b) LAN (c) MAN (d) WAN
    (c) MAN
  97. 1.mc.15. An extranet is a network that uses Internet technologies to allow access to invited users from outside the organization. True or false?
  98. 1.mc.16. What is the term referring to the integration of voice, video, and data communications?
    (a) Convergence(b) Pervasive networking(c) Information utility(d) Extranet
    (a) Convergence
  99. 1.mc.17. What is an ASP?
    (a) A company that provides public access to the Internet.(b) A company that develops specific systems and services.(c) A company that provides telecommunication infrastructure for purchase or lease.(d) A company the designs and develops connection devices.
    (b) A company that develops specific systems and services.
  100. 1.mc.18. Which of the following refers to a private communication path over a public network?
    (a) BN(b) MAN(c) ASP(d) VPN
    (d) VPN
  101. 1.mc.19. What is the device used to connect a wireless and wired network?
    (a) Access point(b) Switch(c) Gateway(d) Modem
    (a) Access point
  102. 1.mc.20. Why would you deploy a peer server on a peer-to-peer network?
    (A) Peer services provide centralized access authentication.
    (B) Peer servers act in the role of both server and client.
    (C) Peer servers cannot be used on other types of networks.
    (D) Peer servers are dedicated sources services optimized for peer-to-peer use.
    (B) Peer servers act in the role of both server and client.
    (this multiple choice question has been scrambled)
Card Set:
2016-01-17 05:06:43

Networking Basics 2e Chapter 1
Show Answers: