Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IT/237

IT237

QuestionAnswer
Network two or more computers connected together to share resources such as files or a printer
Mainframes large, centralized computers used to store and organize data
Dumb Terminal a monitor to display data and a keyboard to input the data. DOES NOT PROCESS THE DATA.
Personal Computer (PC) meant to be used by one person and contain their own processing capabilities.
Distributed computer Consists of taking several computers and connecting them together with a cable. Done by individual PC's. MORE powerful than centralized.
File Sharing Access files on another computer without using a floppy disk or other forms of removable media.
Print sharing allows several people to send documents to a centrally located printer.
Network Interface Card (NIC) Computer connect to the network by using a special expansion card built into the motherboard.
NIC Communicates through a cable (twisted pair, coax or fiber) or wireless.
NIC Prepares and sends data to another computer, receives data and controls the flow of data
Protocols (TCP/IP, IPX and NetBEUI) Rules or standars that allow computers to connect to one another and that enable computers and peripheral devices to exchanged information with as little error as possible.
Common Protocol Suites{suites- set of protocols that work together. (Called Stacks) TCP/IP and IPX
Networks Characterized 1. Client/server network or p-p net 2. LAN,MAN or WAN
Server A service provider that allows acces to network resourches
Client A computer that requets services
Client/Server Network made up of serves and clients
C/S network Typically used on a medium or large network.
P/P Network (or workgroup) no dedicated servers, all computers are equal.
P/P Network provide and request services. Resources kept on personal computer.
Can be used to form peer-to-peer Windows 9x and Linux
Front End In client/server apps - the client part of the program
Back End In client/server apps - the server part
File Server manages user access to files stored on the server. Allows easy access to the data files from any computer and allow for easy backup of data files on the server.
Print Server Manages user access to printer resources connected to teh network, allowing one printer to be used by many people.
Application Server Similar to file and print, but does some of the processing as well.
Mail Server manages email between users
Fax Server Manages fax messages sent into and out of the network through a fax modem.
Remote Access Server hosts modems for inbound requests to connect to the network. Remote access serves provide remote users that are working at home or on the road with a connection to the network.
Telephony server functions as an intelligent answering machine for the network. It can also perform call center and call-routing functions.
Web Server runs WWW and FTP services for access by users of the intranet or Internet.
Proxy server performs a function on behalf of other computers. Typically used to provide intranet clients with access to the Internet while keeping the local intranet free from intruders.
Directory services servers used to local information about the network such as domains (logical divisions of the network) and other servers.
Local Area Networks (LAN) geographically close network, room, building or a group of adjacent buildings.
Metropolitan Area Network (MAN) designed for a town or city
Wide Area Network (WAN) users long-range telecommunication links to connect the network computers over long distances.
LAN typically connected through public networks such as public telephone system.
Enterprise WAN WAN that is owned by one company or organization
Global WAN not owned by any one company, can cross national boundaries. The Internet is an example.
Internetwork Internal to a company and is private. Several LAN's linked together.
Subnetworks or subnets Smaller LAN's
Intranet Network based on TCP/IP. belongs to a single organization and accessible only by the members. Website isolate by firewall.
Enterprise Any large organization that utilizes computers. Consists of multiple LAN's
Small Office/Home Office (SOHO) small network used primarily in home offices. Usually p-to-p
Value Added Network (VAN) special services such as electronic data interchange (EDI) or financial services such as credit card authorization or ATM translations.
Network Operating System (NOS) Operating system that includes specials functions for connecting computers and devices into a LAN
NOS to manage the resources and services of the network
NOS provide security for multiple users.
Client Software How work stations are attached to the network - through shells, redirectors or requestors.
File and Print Sharing Micro. OS's since 95 support f/p sharing through F/P Sharing for Micro Net and Client for Micro Net services
Internet information server (IIS) Provides web services (HTTP and FTP)
SQL server Provides database services
Microsoft Exchange Email services
NTFS Offers a robust, flexible file system that provides file security.
Active Directory (AD) uses the "tree" concept for managing resources on a network. Effective in Enterprises apps. Everything treated as an object- moved or edited across servers.
Internet connection sharing (ICS) Allows a single dial-up connection to be shared across the network. Great for SOHO's and home users with mult. machines since they will no longer need to purchase an app to provide the same feature.
Kerberos security A security protocol that is used for distributed security within a domain tree/forest
Clustering enables two or more servers to work together to keep server-based apps available.
.NET OS platform that incorporates distributed applications that bring users into the next generation of the Internet by conquering the deficiencies of the first gen and giving users a more enriched experience in using the web.
.NET (four main principles) 1. It erases the boundaries between applications and the Internet. Will connect the user to an array of computers and services that will exchange and combine objects and data.
.NET (four main principles) 2. Software will be rented as hosted service over the Internet instead of purchased on a store shelf.
.NET (four main principles) 3. Users will have access to their information on the Internet from any device, anytime, anywhere.
.NET (four main principles) 4. There will be new ways to interact with application data, such as speech and handwriting recognition.
UNIX a multiuser, multitasking OS. Developed by Bell Labs early 1970's.
UNIX Grandfather of NOS's
POSIX set of IEEE and ISO standards that define an interface between programs and UNIX.
Linux UNIX like OS designed to rpovide PC users a free or very low-cost OS comparable to traditional and usually more expensive UNIX systems.
Linux - Web Server Apache
Linux - Web Proxy To better control web usage and to allow for caching of frequently access pages. Squid.
Linux - File Sharing Linux can be made to look like and NT server with respect to file and print sharing. Samba
Linux - Email Linux excels at handling email. Sendmail is the most widley used mail transfer agent (MTA) Qmail and PostFix- alts
Linux - DNS The Domain Name System provides mappings between names and IP addresses, along with distributing network information (i.e. mail servers) BIND is the most widely used name server.
Novell NetWare Standard LAN-based NOS. Helped replace dumb terminals. Strong file/print server.
Novell Directory Services (NDS) global, distributed, replicated database that keeps track of users and resources and provides controlled access to network resources.
OS/2 First 32-bit GUI OS's originally developed by IBM and Micro. before Window's NT. Now owned and controlled by IBM.
TBS-Hardware Failure This occurs when one or more components fail inside the computer.
TBS-Hardware compatibility May appear to be a hardware failure, the real reason it occurs is because a component is not compatible with another.
TBS-Improper hardware config This error also will often appear to be a hardware failure. Instead, though, the reason for the failure is that the hardware has not been installed or configured properly.
TBS-Improper hardware config This happens often when the user does not read the manual or does not have the knowledge to make use of the manual
TBS-improper software config Maybe hardware, but happens when software(OS or app soft.) is not installed or config'd properly.
TBS-improper software config This happens often when the user does not read the manual or does not have the knowledge to make use of the manual
TBS-Software failure May appear as hardware fail.Cause is a glitch in the software. Can range from corrupted data to a flaw in the programming.
TBS-Software compat May also appear as hard. fail. Software may not be compatible with hardware or other software.
TBS-Environment May appear as hard. fail. The location of the computer and its environment (temp, airflow, etc) may affect reliability of PC.
TBS-User Error The user hits the wrong keys or is not familiar with the computer and/or software.
General TBS Strategy 1. Establish symptoms 2. Identify the affected area 3. Establish what has changed. 4. Select the most probably cause. 5. Implment a solution 6. Test the result 7. Recognize the potential effects of the solution. 8. Document the solution
Created by: vixxxey
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards