Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Info Tech Ch. 6

TermDefinition
Network Interface A computer component that provides a port (usually RJ-45) where a network cable can be connected
Network Cable A cable that provides connectivity between network devices. A common network cable connects a computer's network interface with a wall jack
Wall Jack A device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected. On the hidden side of a wall jack is wiring to a patch panel or to a network device
Local Area Network (LAN) A group of networked computers that are physically close together, usually in the same building
Wide Area Network (WAN) A network of interconnected LANs across a large geographical location
Metropolitan Area Network (MAN) A MAN connects smaller LANs into a larger, centralized network. MANs are commonly used to describe networks in large university campuses, large cities, or a collection of cities and towns in a geographical area
Internet Service Providers (ISP) Internet Service Providers (ISP) are organizations that provide many services for accessing and using the Internet
Bus Topology A network topology in which all the devices are connected to each other by a single central cable
Ring Topology A network topology in which each host is connected to two other hosts in a circle
Star Topology A network topology in which devices are not connected to each other but rather to a centralized device called a switch
Mesh Topology A network topology where each network device has a point-to-point connection to every other network device. It was previously theoretical until devices could communicate directly using radio signals and wireless network adapters
Physical Address The unique, burned-into read-only memory address of a network interface. This is also called the media access control address, or MAC address. This makes it virtually impossible to change the device's MAC address
Logical Address An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses
Default Address Class A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address
Internet Protocol (IP) The principal communications protocol in the internet protocol suite that is used to route information over the internet
Modem Short for modulator/demodulator, a network device that converts digital signals used by modern networks to analog signals that are typically carried by telephone or cable television lines
Router A network device that moves traffic between two different IP networks
Switch A network device that moves traffic within an IP network
Access Point A network device that connects wireless devices to a wired network
Firewall A network security device that protects a network by examining the traffic before transferring it to the network
Home Router A small network device with modem, firewall, routing, and switching features that is used in homes and small businesses
Registered Jack 11 (RJ-11) Interface A network interface or connection with four pins and a clip to hold the plug into a wall socket. RJ-11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack
Registered Jack 45 (RJ-45) Interface A network interface or connection with eight pins, that is similar, but wider than RJ-11 connectors. RJ-45 is used to create a wired connection between a computer and a network
Bluetooth A technology used to create wireless connections between computers and devices
Radio Frequency ID (RFID) Radio Frequency ID (RFID) is a technology typically used for tracking objects. RFID can be passive (does not require power) or active (does require power). Passive RFID tags can be embedded in labels and sticker which is helpful for tracking objects
Near Field Communications (NFC) A technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store
File Server A computer that provides network access to shared disk storage
Mail Server A computer that provides email services to a network
Web Server A computer that stores web pages and hypertext documents and transmits them to devices requesting these pages
Database Server A computer that stores databases, which are huge repositories of organized data
Gaming Server A computer that provides a gaming environment that tracks events in multiplayer video games
Client A host on a network that consumes network services
Server A host on a network that provides network services
Client-Server Model A computing model where computer servers supply network and computational services (such as email, file sharing, online gaming, and VoIP) that are consumed by client computers
SOHO A LAN that only services a home or small business, it is sometimes referred to as a Small Office Home Office, or SOHO
Coaxial Cable A cable that provides transmission on a network through its inner wire in the form of electrical signals. The wire is made up of four components: an inner conductor, an insulator made of flexible PVC, a metallic shield, and a plastic jacket coating
Twisted Pair Cable A cable that transmits data through electrical signals and provides better signals because of its eight unique plastic-coated copper wires that are twisted into four pairs
Electromagnetic Interference When an electrical current passes through any kind of copper wire, that creates an electromagnetic field just outside the wire
Twisted Pair Category The different types of twisted pair cabling that are defined by the several aspects of a cable, including its transmission specifications and intended use. Common categories include Cat 5e and Cat 6
Fiber Optic Cable A cable that uses light pulses to transmit data instead of electrical signals
Ethernet Any wired network that conforms to the 802.3 protocols developed and maintained by the IEEE
IEEE 802 Standards A family of standards that mostly dictate with how data is transferred between hosts in a local area network (LAN)
IEEE 802.11 Standards A family of standards under the 802 standards that dictate how data is transferred between hosts in a wireless network. Popular 802.11 standards are 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac
IEEE 802.11 Encryption Protocols Security protocols that govern how data in a wireless network is secured by encryption. Examples of these protocols are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2
Frequency A characteristic of a radio signal that carries digital information in a wireless network. 802.11 standards specify two frequencies, 2.4 GHz and 5 GHz
Attenuation A feature of radio waves where the signal becomes weaker as the wave travels further from its point of origin. 802.11 standards require that signals are strong enough to cover a specific distance
Interference Dense material (such as steel) or electronic devices (such as cordless phones) that reduce or block Wi-Fi signals
Speed A characteristic of 802.11 protocols that requires them to transfer data at a specific number of bits per second
Wi-Fi A technology that uses radio signals to connect a device to an access point
Dial up A technology used in the early days of the internet that required a computer to make a phone call to the ISP to establish internet connectivity
A technology used in the early days of the internet that required a computer to make a phone call to the ISP to establish internet connectivity A technology that uses phone lines to establish high-speed connectivity to the internet through an ISP.
Cable A technology that uses cable TV lines to establish high-speed connectivity to the internet through an ISP
Fiber optic A technology that uses fiber optic cables that carry light signals to establish high-speed connectivity to the internet through an ISP
Satellite A technology that sends signals to and from a satellite to establish connectivity to the internet through an ISP
Cellular A technology that uses cellular radio signals to establish connectivity to the internet
Virtual Private Network (VPN) A tool that allows internet users to create a secure, private network when using a public internet connection. A VPN masks a user's IP address to make actions untraceable and shields the user's data from others
Uplink The data being transferred from your computer to the ISP
Downlink The data being transferred from the ISP to your computer.
Hotspot/tethering The process of providing access to a computer through the mobile device's cellular connection
Transmission Control Protocol (TCP) An important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.
User Datagram Protocol (UDP) An important protocol in the internet protocol suite that is generally used when speed in transmission is more important than accuracy since the sending computer doesn't verify that the packets were correctly received
Domain Name System (DNS) A protocol that helps internet users and network devices discover other devices using a human-readable hostname instead of numeric IP addresses
Hypertext Transfer Protocol (HTTP) A protocol that governs the transfer of web content between computers
Hypertext Transfer Protocol Secure (HTTPS) A protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely transfer web content between computers
Simple Mail Transfer Protocol (SMTP) A protocol used to send email
Post Office Protocol 3 (POP3) A protocol used to receive email. With POP3, email is deleted from a server after it is downloaded to a client
Internet Message Access Protocol (IMAP) A protocol used to receive email. With IMAP, email is saved on a server even after it is downloaded to a client
HTTP Method A command that tells the server what the user wants to do. The most common methods are POST, GET, PATCH, and DELETE. These methods are used for CRUD operations which stand for Create, Read, Update, and Delete
Dynamic Host Configuration Protocol (DHCP) A network management protocol that assigns IP addresses on a network. It is part of the larger set of built-in networking protocols known as TCP/IP
Subnetting Dividing a network into smaller subnets
Subnet Mask A value given to an address in a subnetted network that tells a computer which numbers are part of the network or subnet address and which are part of the host address
Local Installation The traditional method for delivering applications by installing them on individual desktop computer systems
Network Hosting A method of delivering applications by installing them on the local network
Cloud Hosting A method of delivering applications by hosting them in the cloud
Software as a Service (SaaS) A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud
One Tier An application architecture model where programs run as standalone applications on a single computer
Two Tier An application architecture model with two separate tiers (a client and a server) where applications store and retrieve data from a central repository
Three Tier An application architecture model with three separate tiers where an app presents the user interface on a client workstation, data is processed on an app server, and information is retrieved from a database management system on a database server
n-Tier An application architecture model where application developers add as many tiers as they need to create the most efficient services and processes on a network
Platform Compatibility A concern with using enterprise software in a network with multiple computer platforms and operating systems
Proprietary Software Software that isn't owned but requires the purchase of a license to use the software
Personal License A software license given to home and small business customers that allows them to install the software on a limited number of systems
Enterprise License A software license, often called a volume license or a site license, that allows the customer to install the software without restriction using the same activation code, typically until a maximum cap is reached
Open Source Software Software that can be downloaded, installed, and used without paying a licensing fee. The source code can also be downloaded, modified, and compiled and given to others as long as it is not resold for profit
Software Subscription Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates
Windows Update A feature of the Windows operating system that keeps the system up to date
Ping A utility that sends a single packet to a specified network address and waits for a reply. It's typically used to determine whether an IP address is accessible
Tracert A utility that shows the exact path a packet takes between two hosts on different networks
Network Administrator A person that maintains and expands a company's network, install and configure network media, create and manage user accounts, implement firewalls and other security, manage an organization's mail system, configure network printers, and maintain Internet
Network Architect A person that develops and implements an organization's communication network, including the hardware and software components needed for both physical and wireless connections
Network Technician A person that works with network administrators to ensure uninterrupted access to the company network. They troubleshoot problems and assist users in resolving network problems, like replacing defective network cables and modifying Wi-Fi settings
Created by: acrusey
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards