Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Ch. 14 Terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
802.11 a/b/g/n/ac   The collective name for the IEEE 802.11 standards for local wireless networking, which is the technical name for Wi-Fi  
🗑
adapter address   A 48-bit (6-byte) hardware address unique to each network interface card (NIC) or onboard network controller that is assigned by the manufacturer at the factory and embedded on the device.  
🗑
address reservation   When a DHCP server assigns a static IP address to a DHCP client  
🗑
AES (Advanced Encryption Standard)   An encryption standard used by WPA2 and is currently the strongest encryption used Wi-Fi  
🗑
AFP (Apple Filing Protocol)   An outdated file access protocol used by early editions of the MAC operating system by Apple and is one protocol in the suite of AppleTalk networking protocols.  
🗑
anycast address   Using TCP/IP version 6, a type of IP address used by routers and identifies multiple destinations.  
🗑
AppleTalk   An outdated suite of networking protocols used by early editions of the Apple Mac OS, and has been replaced by the TCP/IP suite of protocols.  
🗑
Automatic Private IP Address (APIPA)   In TCP/IP version 4, IP addresses in the range 169.254.x.y used by a computer when it cannot successfully lease an IP address from a DHCP server.  
🗑
beamforming   A technique supported by the IEEE 802.11ac Wi-Fi standard that can detect the location of connected devices and increase signal strength in that direction.  
🗑
best-effort protocol   A TCP/IP protocol such as UDP that works at the OSI Transport layer and does not guarantee delivery by first connecting and checking where data is received.  
🗑
CDMA (Code Division Multiple Access)   A protocol standard used by cellular WANs and cell phones for transmitting digital data over cellular networks.  
🗑
channel   A specific radio frequency within a broader frequency.  
🗑
CIDR notation   A shorthand notation for expressing an IPv4 address and subnet mask with the IP address followed by a / slash and the number of bits in the IP address that identifies the network.  
🗑
CIFS (Common Internet File System)   A file access protocol and the cross-platform version of SMB used between Windows, Linux, Mac OS, and other operating systems.  
🗑
client/server   Two computers communicating using a local network or the Internet. One computer makes requests to the other computer, which answers the requests.  
🗑
computer name   A name the identifies a computer, printer, or other device on the network.  
🗑
connection-oriented protocol   In networking, a TCP/IP protocol that confirms a good connection has been made before transmitting data to the other end, verifies data has been received, and resends it if it is not.  
🗑
default gateway   The gateway a computer on a network uses to access another network unless it knows to specifically use another gateway for quicker access to that network.  
🗑
Destination Network Address (DNAT)   When a firewall using Network Address Translation (NAT) allows uninitiated communication to a computer behind the firewall though a port that is normally closed.  
🗑
DHCP (Dynamic Host Configuration Protocol)   A protocol used by a server to assign a dynamic IP address to a computer when it first attempts to initiate a connection to the network and requests an IP address.  
🗑
DHCP client   A computer or other device (such as a network printer) that requests an IP address from a DHCP server  
🗑
DHCPv6 server   A DHCP server that serves up IPv6 addresses.  
🗑
DMZ (demilitarized zone)   Refers to removing firewall protection from a computer or network within an organization of protected computers and networks.  
🗑
DNS (Domain Name System or Domain Name Service)   A distributed pool of information that keeps track of assigned host names and domain names and their corresponding IP addresses.  
🗑
DNS client   When Windows queries the DNS server for a name resolution, which means to find an IP address for a computer when the fully qualified domain name is known.  
🗑
DNS server   A Domain Name Service server that uses a DNS protocol to find an IP address for a computer when the fully qualified domain name is known.  
🗑
domain name   A name that identifies a network and appears before the period in a website address.  
🗑
dynamic IP address   An IP address assigned by a DHCP server for the current session only, and is leased when the computer first connects to a network. When the session is terminated, the IP address is returned to the list of available addresses.  
🗑
firewall   Hardware and/or software that blocks unwanted traffic initiated from the Internet into a private network and can restrict Internet access for local computers behind the firewall.  
🗑
FTP (File Transfer Protocol)   A TCP/IP protocol and application that uses the Internet to transfer files between two computers  
🗑
FTP server   A server using the FTP or Secure FTP protocol that downloads or uploads files to remote computers.  
🗑
full duplex   Communication that happens in two directions at the same time.  
🗑
fully qualified domain name (FQDN)   Identifies a computer and the network to which it belongs and includes the computer name and domain name. For example, jsmith.amazon.com. Sometimes loosely referred to as a domain name.  
🗑
gateway   Any device or computer that network traffic can use to leave one network and go to a different network.  
🗑
global address   In TCP/IP version 6, an IP address that can be routed on the Internet. Also called global address.  
🗑
global unicast address   In TCP/IP version 6, an IP address that can be routed on the Internet. Also called global address.  
🗑
GSM (Global System for Mobile Communications)   An open standard for cellular networks and cell phones that uses digital communication of data and is accepted and used worldwide.  
🗑
half duplex   Communication between two devices whereby transmission takes place in only one direction at a time.  
🗑
hardware address   A 48-bit (6-byte) hardware address unique to each network interface card (NIC) or onboard network controller that is assigned by the manufacturer at the factory and embedded on the device.  
🗑
host name   A name the identifies a computer, printer, or other device on the network.  
🗑
HTTP (Hypertext Transfer Protocol)   The TCP/IP protocol used for the World Wide Web and used by web browsers and web servers to communicate.  
🗑
HTTPS (HTTP Secure)   The HTTP protocol working with a security protocol such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS), which is better than SSL, to create a secured socket that includes data encryption.  
🗑
IEEE 802.11ac   The latest Wi-Fi standard that supports up to 7 Gbps (actual speeds are currently about 1300Mbps) and uses 5.0-GHz radio frequency and beamforming.  
🗑
IEEE 802.11n   The latest Wi-Fi standard that supports up to 600 Mbps and uses 5.0-GHz or 2.4 GHz radio frequency and supports MIMO.  
🗑
IMAP4 (Internet Message Access Protocol version 4)   A protocol used by an email server and client that allows the client to manage email stored on the server without downloading the email.  
🗑
interface   In TCP/IP version 6, a node's attachment to a link. The attachment can be a physical attachment (for example, when using a network adapter) or a logical attachment (for example, when using a tunneling protocol). Each interface is assigned an IP address.  
🗑
interface ID   In TCP/IP version 6, the last 64 bits or 4 blocks of an IP address that identify the interface.  
🗑
Internet Protocol version 4 (IPv4)   A group of TCP/IP standards that uses IP addresses that have 32 bits.  
🗑
Internet Protocol version 6 (IPv6)   A group of TCP/IP standards that uses IP addresses that have 128 bits.  
🗑
intranet   Any private network that uses TCP/IP protocols. A large enterprise might support an intranet that is made up of several local networks.  
🗑
IP address   A 32-bit or 128-bit address used touniquely identify a device or interface on a network that uses TCP/IP protocols. Generally, the first numbers identify the network; the last numbers identify a host.  
🗑
ip config   A Windows command that displays TCP/IP configuration information and can refresh TCP/IP assignments to a connection, including its IP address.  
🗑
ISATAP   In TCP/IP version 6, a tunneling protocol that has been developed for IPv6 packets to travel over an IPv4 network and stands for Intra-Site Automatic Tunnel Addressing Protocol.  
🗑
Lightweight Directory Access Protocol (LDAP)   A protocol used by various client applications when the application needs to query a database.  
🗑
link (local link)   in TCP/IP version 6, a local area network or wide area network bounded by routers. Also called local link.  
🗑
link-local address   In TCP/IP version 6, an IP address used for communicating among nodes in the same link and is not allowed on the Internet. Also called local address and link-local address.  
🗑
link-local unicast address   In TCP/IP version 6, an IP address used for communicating among nodes in the same link and is not allowed on the Internet. Also called local address and link-local address.  
🗑
local area network (LAN)   A network bound by routers or other gateway devices.  
🗑
Long Term Evolution (LTE)   The latest standard used to transmit both voice and digital data over cellular networks and is expected to eventually replace CDMA and GSM.  
🗑
loopback address   An IP address that indicates your own computer and is used to test TCP/IPconfiguration on the computer.  
🗑
MAC (Media Access Control) address   A 48-bit (6-byte) hardware address unique to each network interface card (NIC) or onboard network controller that is assigned by the manufacturer at the factory and embedded on the device.  
🗑
MAC address filtering   A technique used by a router or wireless access point to allow access to a private network to only certain computers or devices identified by their MAC addresses.  
🗑
multicast address   in TCP/IP version 6, an IP address used when packets are delivered to a group of nodes on a network.  
🗑
multiple input/multiple output (MIMO)   A feature of the IEEE 802.11n/ac standards for wireless networking whereby two or more antennas are used at both ends of transmissions to improve performance.  
🗑
name resolution   The process of associating a character-based name with an IP address.  
🗑
NAT (Network Address Translation)   NAT (Network Address Translation) A technique that substitutes the public IP address of the router for the private IP address of computer on a private network when these computers need to communicate on the Internet.  
🗑
neighbors   In TCP/IP version 6, two or more nodes on the same link.  
🗑
NetBIOS   A legacy suite of protocols used by Windows before TCP/IP.  
🗑
NetBIOS over TCP/IP   A feature of Server Message Block (SMB) protocols that allows legacy NetBIOS applications to communicate on a TCP/IP network.  
🗑
network adapter   An expansion card that plugs into a computer's motherboard and provides a port on the back of the card to connect a computer to a network. Also called a network adapter.  
🗑
network interface card (NIC)   An expansion card that plugs into a computer's motherboard and provides a port on the back of the card to connect a computer to a network. Also called a network adapter.  
🗑
node   Any device that connects to the network, such as a computer, printer, or router.  
🗑
octet   In TCP/IP version 4, each of the four numbers that are separated by periods and make up a 32-bit IP address.  
🗑
onboard NIC   A network port embedded on the motherboard.  
🗑
OSI model   A model for understanding and developing computer-to-computer communication, it divides networking functions among seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.  
🗑
physical address   A 48-bit (6-byte) hardware address unique to each network interface card (NIC) or onboard network controller that is assigned by the manufacturer at the factory and embedded on the device.  
🗑
POP3 (Post Office Protocol, version 3)   The protocol that an email server and client use when the client requests the downloading of email messages.  
🗑
port   As applied to services running on a computer, a number assigned to a process on a computer so that a process can be found by TCP/IP.  
🗑
port address   As applied to services running on a computer, a number assigned to a process on a computer so that a process can be found by TCP/IP.  
🗑
port forwarding   To open or close certain ports so they can or cannot be used.  
🗑
port mapping   A technique that allows a computer on the Internet to reach a computer on a private network using a certain port when that network is protected by NAT.  
🗑
port number   As applied to services running on a computer, a number assigned to a process on a computer so that a process can be found by TCP/IP.  
🗑
port triggering   When a firewall opens a port because a computer behind the firewall initiates communication on another port.  
🗑
private IP address   In TCP/IP version 4, IP address that is used on a private network that is isolated from the Internet.  
🗑
protocol   A set of rules and standards that two entities use for communication.  
🗑
public IP address   In TCP/IP version 4, an IP address available to the Internet.  
🗑
Quality of Service (QoS)   A feature used by Windows and network hardware devices to improve network performance for an application that is not getting the best network performance.  
🗑
Remote Desktop Protocol (RDP)   The Windows tool that gives a user access to a Windows desktop from anywhere on the Internet.  
🗑
RJ-45   A port that looks like a large phone jack and uses a twisted -pair cable to connect to a wired network adapter or other hardware device.  
🗑
router   A device that manages traffic between two or more networks and can help find the best for traffic to get from one network to another.  
🗑
Secure FTP (SFTP)   A TCP/IP protocol used to transfer files from a FTP server to a n FTP client using encryption.  
🗑
Secure Shell (SSH)   A TCP/IP protocol that is used to pass login information to a remote computer and control that computer over a network using encryption.  
🗑
Server Message Block (SMB)   A protocol used by Windows to share files and printers on a network.  
🗑
Service Set Identifier (SSID)   The name of a wireless access point and wireless network.  
🗑
SIM (Subscriber Identification Module) card   A small flash memory card that contains all the information a device needs to connect to a GSM or LTE cellular network, including a password and other authentication information.  
🗑
Simple Network Management Protocol (SNMP)   A TCP/IP protocol used to monitor network traffic.  
🗑
SMB2   A file access protocol and the cross-platform version of SMB used between Windows, Linux, Mac OS, and other operating systems.  
🗑
SMTP (Simple Mail Transfer Protocol)   A TCP/IP protocol used by email clients to send email messages to an email server and on to the recipient's email server.  
🗑
socket   An established connection between a client and a server, such as the connection between a browser and web server.  
🗑
static IP address   A permanent IP address that is manually assigned to a computer.  
🗑
subnet   A group of local networks when several networks are tied together in a subsystem of the larger intranet.  
🗑
subnet ID   In TCP/IP version 6, the last block (16 bits) in the 64-bit prefix of an IP address.  
🗑
subnet mask   In TCP/IP version 4, 32 bits that include a series of 1s followed by 0s.  
🗑
switch   A device used to connect nodes on a network in a star network topology.  
🗑
TCP (Transmission Control Protocol)   The protocol in the TCP/IP suite of protocols that works at teh OSI Transport layer and establishes a session or connection between parties and guarentees packet delivery.  
🗑
TCP/IP (Transmission Control Protocol/Internet Protocol)   The group or suite of protocols used for almost all networks, including the Internet. Fundamentally, TCP is responsible for errorchecking transmissions, and IP is responsible for routing.  
🗑
Telnet   A TCP/IP protocol used by the Telnet client/server applications to allow an administrator or other user to control a computer remotely.  
🗑
Teredo   In TCP/IP version 6, a tunneling protocol to transmit TCP/IPv6 packets over a TCP/IPv4 network, named after the Teredo worm that bores holes in wood.  
🗑
TKIP (Temporal Key Integrity Protocol)   A type of encryption protocol used by WPA to secure a wireless Wi-Fi network.  
🗑
UDP (User Datagram Protocol)   A connectionless TCP/IP protocol that works at the OSI Transport layer and does not require a connection to send a packet or guarantee that the packet arrives at its destination.  
🗑
unicast address   Using TCP/IP version 6, an IP address assigned to a single node on a network.  
🗑
unique local address   In TCP/IP version 6, an address used to identify a specific site within a large organization.  
🗑
Universal Plug and Play (UPnP)   An unsecure method a router can use to allow unfiltered communication between nodes on a private network. Hackers sometimes are able to exploit UPnP, so use with caution.  
🗑
virtual private network (VPN)   A security technique that uses encrypted data packets between a private network and a computer somewhere on the Internet.  
🗑
Voice over LTE (VoLTE)   A technology used on cellular networks for LTE to support voice communication.  
🗑
Wake-on-LAN   Configuring a computer so that it will respond to network activity when the computer is in a sleep state.  
🗑
WEP (Wired Equivalent Privacy)   An encryption protocol used to secure transmissions on a Wi-Fi wireless network; however, it is no longer considered secure because the key used for encryption is static (it doesn't change).  
🗑
Wi-Fi (Wireless Fidelity)   The common name for standards for a local wireless network as defined by IEEE 802.11.  
🗑
Wi-Fi Protected Setup (WPS)   A method to make it easier for users to connect their computers to a secured wireless network when a hard-toremember SSID and security key are used, and is considered a security risk that should be used with caution.  
🗑
wireless access point (WAP)   A wireless device that is used to create and manage a wireless network.  
🗑
wireless LAN (WLAN)   A type of LAN that does not use wires or cables to create connections, but instead transmits data over radio or infrared waves.  
🗑
wireless wide area network (WWAN)   A wireless broadband network for computers and mobile devices that uses cellular towers for communication.  
🗑
WPA (Wi-Fi Protected Access)   A data encryption method for wireless networks that use the TKIP (Temporal Key Integrity Protocol) encryption method and the encryption keys are changed at set intervals while the wireless LAN is in use. WPA is stronger than WEP.  
🗑
WPA2 (Wi-Fi Protected Access 2)   A data encryption standard compliant with the IEEE 802.11i standard that uses the AES (Advanced Encryption Standard) protocol. WPA2 is currently the strongest wireless encryption standard.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: drewtang40
Popular Computers sets