Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 17 Terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Active X Control   A small app or add-on that can be downloaded from a web site along with a web page and is executed by a browser to enhance the web page.  
🗑
Administrative Shares   The folder that are shared by default on a network domain that Administrator accounts can access.  
🗑
Administrators Group   A type of user group. When a user account is assigned to this group, the account is granted rights that are assigned to an administrator account.  
🗑
Application Proxy   A program that is intended to work on a client computer when the computer application is on a server.  
🗑
Authenticated Users Group   All user accounts that have been authenticated to access the system except the guest account.  
🗑
Backup Operators   A type of Windows user account group. When a user account belongs to this group it can back up and restore any files on the system regardless of its having access to these files  
🗑
Cable tester   A tool used to test a cable to find out if it is good or to find out what type of cable it is if the cable is not labeled.  
🗑
Everyone Group   In Windows, the Authenticated Users group as well as the Guest account. When you share a file or folder on the network, windows, by default, gives access to the Everyone Group.  
🗑
Ferrite Clamp   A clamp installed on a network cable to protect against electrical interferrence  
🗑
File Server   A computer dedicated to storing and serving up data fles and folders.  
🗑
Group Policy   GPEDIT.MSC A console available only in Windows profesional and business editions that is used to control what users can and how the system can be used.  
🗑
Guests Group   A type of user group in Windows. User accounts that belong to this group have limited rights to the system and are given a temporary profile that is deleted after the user logs off.  
🗑
Hidden Share   Aj folder who's folder name ends with a $ symbol. When you share the folder, it does not appear in the Network window or My Network Places window.  
🗑
Inherited Permissions   Permissions assigned by Windows that are attained from a parent object.  
🗑
Internet Options   A dialog box used to manage Internet Explorer options.  
🗑
IPconfig   IP Configuration. A command that displays TCP/IP configuration information and can refresh TCP/IP assignments to a connection including its IP address.  
🗑
Limited Account   A type of Windows XP user group, also konwn as the Users group in Windows 2000. Accounts in this group have read-write access only on their own folders, Read Only access on to most system folders, and no access to other users' data. In Widnows 7/jVista a  
🗑
Local Shares   Folders on a computer that are shared with others on the network by using a folder's properites box. Local shares are used with a work group and not with a domain.  
🗑
Loopback Plug   A device used to test a port in a comptuer or other device to make sure the port is working and might also test the throughput or speed of the port.  
🗑
MSTSC   A comand that allows you to start remote desktop connection to remote into your host computer using remote desktop.  
🗑
NBTstat   (NetBIOS over TCIP/IP Statistics) A tcp/ip commend that is used to display staticsts about the NetBT protocol.  
🗑
Net Use   A TCP/IP command that connects or disconnects a computer from a shared resource or can display information about he connections.  
🗑
Net User   A TCP/IP command used to manage user accounts.  
🗑
Netstat   Network Statistics. A tcp/ip command that gives statistics about ticp/ip and network activity and includes several parameters.  
🗑
Network Drive Map   Mounting a drive to a computer such as drive E, that is actually hard drive space on another host computer on the network  
🗑
Nslookup   (Name Space Lookup) A tcp/ip command that lets you read information from the interent name space by requesting information about domain name resolutions from the DNS server's zone data.  
🗑
NTSF permisssions   A methond to share a folder or file over a network and can apply to local users and network users. the folder or file must be on an NTSF volume.  
🗑
Permission Propagation   When Windows passes permissions from parent objects to child objects  
🗑
Permissions   Varying degrees of access assigned to a folder or file and given to auser account or user group. Access can include full control, write, delete or read only.  
🗑
Ping   (Packet Internet Groper) a tcp/ip command used to troubleshoot network communication. it verifies that the host can communicate with another host on the network  
🗑
Power User Group   A type of user account group. Accounts assigned to this grop can read from, and write to parts of the system other than thier own user profile folders. install applications, and perform limited administrative tasks.  
🗑
Prniciple of Least Privilege   An approach where computer users are classified and the rights assigned are the minimum rights required to do their job.  
🗑
Proxy Server   A comptuer that intercepts requests that a browser makes of a server and serves up the request from a cache it maintains in order to improve performance on a large network.  
🗑
Remote Admins   Gives an administrator access to the Windows folder on a remote computer.  
🗑
Remote Application   An application that is installed and executed on a server and is presented to a user working at a client computer.  
🗑
Remote Desktop   A windows tool that gives a user accessto his or her Windows desktop from anywhere on the internet.  
🗑
Remote Desktop Service   Software included in Windows 2008 and later that uses the RDP protocol to present a remote application and its data to the client. Prior to Windows 2008, the software was called Terminal Services.  
🗑
Remote App and Desktop Connections   A tool used to install a remote application on a client computer using either an application proxy file or a URL to the server application.  
🗑
Reverse Lookup   To find the host name when you know a computer's IP address. The Nslookup command can perform a reverse lookup.  
🗑
Share Permissions   A method to share a folder (Not individual files) to remote users on the network, including assigning varying degrees of access to specific user accounts and user groups. does not apply to local shares and can be used on an NTSF or FAT volume.  
🗑
Simple File Sharing   A windows XP technique to share folders or files with remote network users where you have no control over who has access to the shared folder or file.  
🗑
Terminal Services   (Remote Desktop Service) Software included in Windows 2008 and later that uses the RDP protocol to present a remote application and its data to the client. Prior to Windows 2008, the software was called Terminal Services.  
🗑
Tracert   (Trace Route) a tcp/ip command that enables you to resolve a connectivity problem when attempting to reach a destination host such as a website.  
🗑
Users Group   The group of standard user accounts.  
🗑
Wake on Lan   Configuring a computer so that it will respond to network activity when the computer is in a sleep state  
🗑
Wireless Locator   A tool that can locate a Wi-Fi hotspot and tell you the strength of the RF signal.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Popular Computers sets