click below
click below
Normal Size Small Size show me how
IT/237
IT237
| Question | Answer |
|---|---|
| Network | two or more computers connected together to share resources such as files or a printer |
| Mainframes | large, centralized computers used to store and organize data |
| Dumb Terminal | a monitor to display data and a keyboard to input the data. DOES NOT PROCESS THE DATA. |
| Personal Computer (PC) | meant to be used by one person and contain their own processing capabilities. |
| Distributed computer | Consists of taking several computers and connecting them together with a cable. Done by individual PC's. MORE powerful than centralized. |
| File Sharing | Access files on another computer without using a floppy disk or other forms of removable media. |
| Print sharing | allows several people to send documents to a centrally located printer. |
| Network Interface Card (NIC) | Computer connect to the network by using a special expansion card built into the motherboard. |
| NIC | Communicates through a cable (twisted pair, coax or fiber) or wireless. |
| NIC | Prepares and sends data to another computer, receives data and controls the flow of data |
| Protocols (TCP/IP, IPX and NetBEUI) | Rules or standars that allow computers to connect to one another and that enable computers and peripheral devices to exchanged information with as little error as possible. |
| Common Protocol Suites{suites- set of protocols that work together. (Called Stacks) | TCP/IP and IPX |
| Networks Characterized | 1. Client/server network or p-p net 2. LAN,MAN or WAN |
| Server | A service provider that allows acces to network resourches |
| Client | A computer that requets services |
| Client/Server Network | made up of serves and clients |
| C/S network | Typically used on a medium or large network. |
| P/P Network (or workgroup) | no dedicated servers, all computers are equal. |
| P/P Network | provide and request services. Resources kept on personal computer. |
| Can be used to form peer-to-peer | Windows 9x and Linux |
| Front End | In client/server apps - the client part of the program |
| Back End | In client/server apps - the server part |
| File Server | manages user access to files stored on the server. Allows easy access to the data files from any computer and allow for easy backup of data files on the server. |
| Print Server | Manages user access to printer resources connected to teh network, allowing one printer to be used by many people. |
| Application Server | Similar to file and print, but does some of the processing as well. |
| Mail Server | manages email between users |
| Fax Server | Manages fax messages sent into and out of the network through a fax modem. |
| Remote Access Server | hosts modems for inbound requests to connect to the network. Remote access serves provide remote users that are working at home or on the road with a connection to the network. |
| Telephony server | functions as an intelligent answering machine for the network. It can also perform call center and call-routing functions. |
| Web Server | runs WWW and FTP services for access by users of the intranet or Internet. |
| Proxy server | performs a function on behalf of other computers. Typically used to provide intranet clients with access to the Internet while keeping the local intranet free from intruders. |
| Directory services servers | used to local information about the network such as domains (logical divisions of the network) and other servers. |
| Local Area Networks (LAN) | geographically close network, room, building or a group of adjacent buildings. |
| Metropolitan Area Network (MAN) | designed for a town or city |
| Wide Area Network (WAN) | users long-range telecommunication links to connect the network computers over long distances. |
| LAN | typically connected through public networks such as public telephone system. |
| Enterprise WAN | WAN that is owned by one company or organization |
| Global WAN | not owned by any one company, can cross national boundaries. The Internet is an example. |
| Internetwork | Internal to a company and is private. Several LAN's linked together. |
| Subnetworks or subnets | Smaller LAN's |
| Intranet | Network based on TCP/IP. belongs to a single organization and accessible only by the members. Website isolate by firewall. |
| Enterprise | Any large organization that utilizes computers. Consists of multiple LAN's |
| Small Office/Home Office (SOHO) | small network used primarily in home offices. Usually p-to-p |
| Value Added Network (VAN) | special services such as electronic data interchange (EDI) or financial services such as credit card authorization or ATM translations. |
| Network Operating System (NOS) | Operating system that includes specials functions for connecting computers and devices into a LAN |
| NOS | to manage the resources and services of the network |
| NOS | provide security for multiple users. |
| Client Software | How work stations are attached to the network - through shells, redirectors or requestors. |
| File and Print Sharing | Micro. OS's since 95 support f/p sharing through F/P Sharing for Micro Net and Client for Micro Net services |
| Internet information server (IIS) | Provides web services (HTTP and FTP) |
| SQL server | Provides database services |
| Microsoft Exchange | Email services |
| NTFS | Offers a robust, flexible file system that provides file security. |
| Active Directory (AD) | uses the "tree" concept for managing resources on a network. Effective in Enterprises apps. Everything treated as an object- moved or edited across servers. |
| Internet connection sharing (ICS) | Allows a single dial-up connection to be shared across the network. Great for SOHO's and home users with mult. machines since they will no longer need to purchase an app to provide the same feature. |
| Kerberos security | A security protocol that is used for distributed security within a domain tree/forest |
| Clustering | enables two or more servers to work together to keep server-based apps available. |
| .NET | OS platform that incorporates distributed applications that bring users into the next generation of the Internet by conquering the deficiencies of the first gen and giving users a more enriched experience in using the web. |
| .NET (four main principles) | 1. It erases the boundaries between applications and the Internet. Will connect the user to an array of computers and services that will exchange and combine objects and data. |
| .NET (four main principles) | 2. Software will be rented as hosted service over the Internet instead of purchased on a store shelf. |
| .NET (four main principles) | 3. Users will have access to their information on the Internet from any device, anytime, anywhere. |
| .NET (four main principles) | 4. There will be new ways to interact with application data, such as speech and handwriting recognition. |
| UNIX | a multiuser, multitasking OS. Developed by Bell Labs early 1970's. |
| UNIX | Grandfather of NOS's |
| POSIX | set of IEEE and ISO standards that define an interface between programs and UNIX. |
| Linux | UNIX like OS designed to rpovide PC users a free or very low-cost OS comparable to traditional and usually more expensive UNIX systems. |
| Linux - Web Server | Apache |
| Linux - Web Proxy | To better control web usage and to allow for caching of frequently access pages. Squid. |
| Linux - File Sharing | Linux can be made to look like and NT server with respect to file and print sharing. Samba |
| Linux - Email | Linux excels at handling email. Sendmail is the most widley used mail transfer agent (MTA) Qmail and PostFix- alts |
| Linux - DNS | The Domain Name System provides mappings between names and IP addresses, along with distributing network information (i.e. mail servers) BIND is the most widely used name server. |
| Novell NetWare | Standard LAN-based NOS. Helped replace dumb terminals. Strong file/print server. |
| Novell Directory Services (NDS) | global, distributed, replicated database that keeps track of users and resources and provides controlled access to network resources. |
| OS/2 | First 32-bit GUI OS's originally developed by IBM and Micro. before Window's NT. Now owned and controlled by IBM. |
| TBS-Hardware Failure | This occurs when one or more components fail inside the computer. |
| TBS-Hardware compatibility | May appear to be a hardware failure, the real reason it occurs is because a component is not compatible with another. |
| TBS-Improper hardware config | This error also will often appear to be a hardware failure. Instead, though, the reason for the failure is that the hardware has not been installed or configured properly. |
| TBS-Improper hardware config | This happens often when the user does not read the manual or does not have the knowledge to make use of the manual |
| TBS-improper software config | Maybe hardware, but happens when software(OS or app soft.) is not installed or config'd properly. |
| TBS-improper software config | This happens often when the user does not read the manual or does not have the knowledge to make use of the manual |
| TBS-Software failure | May appear as hardware fail.Cause is a glitch in the software. Can range from corrupted data to a flaw in the programming. |
| TBS-Software compat | May also appear as hard. fail. Software may not be compatible with hardware or other software. |
| TBS-Environment | May appear as hard. fail. The location of the computer and its environment (temp, airflow, etc) may affect reliability of PC. |
| TBS-User Error | The user hits the wrong keys or is not familiar with the computer and/or software. |
| General TBS Strategy | 1. Establish symptoms 2. Identify the affected area 3. Establish what has changed. 4. Select the most probably cause. 5. Implment a solution 6. Test the result 7. Recognize the potential effects of the solution. 8. Document the solution |