Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 15 Terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
Protocols   Methods and rules for communication  
🗑
Client/server   most communication between computers use the client server model  
🗑
TCP/IP (Transmission Control Protocol/internet protocol)   a group of suite protocols  
🗑
Packet   transmitted data  
🗑
Network Adapter   makes your machine capable of getting on the internet  
🗑
MAC (Media Access Control)   a number written in hex that represents your network card  
🗑
Local Area Network (LAN)   a network bound by routers and gateways  
🗑
Router   a device that manages traffic between two or more networks  
🗑
Gateway   any device or computer that network traffic can use to leave one network and go to a different model  
🗑
IP Address   a 32 or 128 bit address that is assigned to a network connection  
🗑
Port number, Port, Port Address   each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer  
🗑
Dynamic IP Address   an IP address that is assigned to by a server each time it connects to the network  
🗑
Static IP Address   an IP address that is permanently assigned to a computer or device  
🗑
DHCP Dynamic Host Configuration Protocol   gives an IP address to a computer when it first attempts to initiate a connection to the network and request an IP address  
🗑
DHCP Client   a computer or other device such as a printer that requires a DHCP Address  
🗑
Internet Protocol Version 4 IPv4   created about 4 billion potential IP addresses but they are all used up  
🗑
Internet Protocol Version 6 IPv6   uses 128 bit address in Hex format  
🗑
Class A   is a single network octet  
🗑
Class B   is 2 octets used for network  
🗑
Class C   using 3 octets for network portion  
🗑
Class D   used for Multicasting  
🗑
Multicasting   in which one host sends messages to multiple hosts  
🗑
Loopback Address   127.0.0.1  
🗑
Subnet Mask   used with IPv4 identifies what portion is network and what portion is host  
🗑
Classful Subnet Mask   if you don't divide a network into subnets the default subnet is used  
🗑
Classless Subnet Mask   does not align with the network id with the network octets assigned by the class license  
🗑
Public IP Addresses   the IP Addresses that are open to the public  
🗑
Private IP Addresses   a group of IP addresses that are available on private company internet servers  
🗑
NAT Network Address Translation   a program that substitutes public IP addresses for Private Addresses  
🗑
Automatic Private IP Addresses APIPA   when the computer cannot lease an IP address it uses an APIPA  
🗑
Link or local link   a LAN or Wan that has a router boundry  
🗑
Interface   a nodes attachment link  
🗑
Interface ID   the last 64 bits or 4 blocks of an IP addresses  
🗑
ISATAP   Intra-Site Automatic Tunnel Addressing Protocol  
🗑
Teredo   named after the teredo worm that bores holes in wood if IPv6 addresses intended to be used by this protocol always begin with the same 32 bit prefix  
🗑
6TO4   an older tunneling protocol  
🗑
Unicast Address   packets are delivered to a single node on the network  
🗑
Multicast Address   Packets are delivered to all nodes on a network  
🗑
Anycast Address   used by routers  
🗑
Global unicast Address or Global Address   can be routed on the internet  
🗑
Link-Local Unicast Address or Link-Local Address   can be used for communicating with nodes in the same link  
🗑
Unique Local Unicast Address or Unique Local Address   used to identify a specific site within a large organization  
🗑
Host Name or Computer Name   a name of a computer and can be used in place of its IP address  
🗑
Domain Name   identifys a network  
🗑
Fully Qualified Domain Name   identifies a computer and the network it belongs to  
🗑
DNS Domain Name Server   used by a dns server to find an IP address  
🗑
Name Resolution   associating a name with an IP address  
🗑
Host File   what is loaded at startup  
🗑
DNS Client   when windows queries the DNS Server  
🗑
TCP   the protocol that guarantees packet delivery  
🗑
Connection Oriented Protocol   checks to insure packet delivery  
🗑
UDP   does not guarantee packet delivery  
🗑
Connectionless Protocol or best effort protocol   checks to insure packet delivery  
🗑
HTTP   a protocol used for web browsers  
🗑
HTTPS   a secure version of HTTP  
🗑
SMTP   used to send emails  
🗑
SMTP AUTH   used to authenticate email servers  
🗑
POP3 or IMAP4   used to deliver email messages  
🗑
Telnet   used by an Admin to access a computer remotely  
🗑
LDAP   is used by various client applications when the application needs to query a database  
🗑
SMB   a protocol used by windows to share files and printers on a network  
🗑
FTP   used to transfer files between two computers  
🗑
SSH   is used to pass login information to a remote computer  
🗑
SFTP   used to transfer files from client to server  
🗑
SNMP   used to monitor network traffic  
🗑
RDP   used by windows to remote onto a desktop  
🗑
Alternate IP Address   When you manually assign an IP address  
🗑
Wireless Access Point   creates wireless networks  
🗑
SSID   when the wireless device does not broadcast its name  
🗑
Wireless Wide Area Network   to connect a computer using mobile broadband to a cellular network  
🗑
SIM   small flash memory card  
🗑
Virtual Private Network   used by employees when they work away from the corporate office  
🗑
QOS   used to improve network performance  
🗑
Port Filtering   is used to open and close certain ports  
🗑
Port Forwarding   means when the firewall receives a request for communication from the internet to a specific computer and port  
🗑
Port Triggering   opens a port when a Pc on the network initiates communication through another port  
🗑
WIFI   Wireless internet connection  
🗑
802.11 a/b/g/n   Standards for wireless connectivity  
🗑
Multiple input/Multiple Output   can use 2 or more antennas to improve performance  
🗑
Radio Frequency   the frequency of waves generated by a radio signal  
🗑
Channel   a specific radio frequency within a broader frequency  
🗑
WEP   no longer considered a secure because the key used for encryption is static  
🗑
WPA   More secure than wep and designed to replace it also called TKIP  
🗑
TKIP   More secure than wep and designed to replace it also called WPA  
🗑
WPA2   also called the 802.11i standard is the best wireless encryption standard  
🗑
AES   improved the way TKIP generated encryption keys  
🗑
WPS   makes it easier for uses to connect their computers to a wireless network  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: 1019660571411816
Popular Computers sets