Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

chaper 14 terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show The collective name for the IEEE 802.11 standards for local wireless networking, which is the technical name for Wi-Fi.  
🗑
Adapter address   show
🗑
Address Reservation   show
🗑
show An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi.  
🗑
show An outdated file access protocol used by early editions of the Mac operating system by Apple and is one protocol in the suite of AppleTalk networking protocols.  
🗑
show Using TCP/IP version 6, a type of IP address used by routers and identifies multiple destinations. Packets are delivered to the closest destination.  
🗑
show An outdated suite of networking protocols used by early editions of the Apple Mac OS, and has been replaced by the TCP/IP suite of protocols.  
🗑
Automatic Private IP Address (APIPA)   show
🗑
show A technique supported by the IEEE 802.11ac Wi-Fi standard that can detect the location of connected devices and increase signal strength in that direction.  
🗑
show A TCP/IP protocol such as UDP that works at the OSI Transport layer and does not guarantee delivery by first connecting and checking where data is received. Can be used for broadcasting.  
🗑
CDMA (Code Division Multiple Access)   show
🗑
show A specific radio frequency within a broader frequency.  
🗑
CIDR Notation   show
🗑
show A file access protocol and the cross-platform version of SMB used between Windows, Linux, Mac OS, and other operating systems. Also called SMB2.  
🗑
Client/Server   show
🗑
show A name that identifies a computer, printer, or other device on a network, which can be used instead of the computer's IP address to address the computer on the network.  
🗑
show A TCP/IP protocol such as UDP that works at the OSI Transport layer and does not guarantee delivery by first connecting and checking where data is received. It might be used for broadcasting. Also called a best-effort protocol.  
🗑
show In networking, a TCP/IP protocol that confirms a good connection has been made before transmitting data to the other end, verifies data was received, and resends it if it is not. An example of a connection-oriented protocol is TCP.  
🗑
show The gateway a computer on a network uses to access another network unless it knows to specifically use another gateway for quicker access to that network.  
🗑
Destination Network Address Translation (DNAT)   show
🗑
show A protocol used by a server to assign a dynamic IP address to a computer when it first attempts to initiate a connection to the network and requests an IP address.  
🗑
show A computer or other device (such as a network printer) that requests an IP address from a DHCP server.  
🗑
DHCPv6 Server   show
🗑
DMZ (Demilitarized Zone)   show
🗑
show A distributed pool of information that keeps track of assigned host names and domain names and their corresponding IP addresses. DNS also refers to the system that allows a host to locate information in the pool and the protocol the system uses.  
🗑
DNS Client   show
🗑
show A Doman Name Service server that uses a DNS protocol to find an IP address for a computer when the fully qualified domain name is known. An Internet service provider is responsible for providing access to DNS servers to provide Internet access.  
🗑
show A name that identifies a network and appears before the period in a website address such as microsoft.com. A fully qualified domain name is sometimes loosely called a domain name. Also see fully qualified domain name  
🗑
Dynamic IP Address   show
🗑
show Hardware and/or software that blocks unwanted traffic initiated from the Internet into a private network and can restrict Internet access for local computers behind the firewall.  
🗑
show A TCP/IP protocol and application that uses the Internet to transfer files between two computers  
🗑
show A server using the FTP or Secure FTP protocol that downloads or uploads files to remote computers.  
🗑
Full Duplex   show
🗑
show Identifies a computer and the network to which it belongs and includes the computer name and domain name.  
🗑
Gateway   show
🗑
show In TCP/IP version 6, an IP address that can be routed on the Internet.  
🗑
show In TCP/IP version 6, an IP address that can be routed on the Internet. Also called global address.  
🗑
GSM (Global System for Mobile Communications)   show
🗑
show Communication between two devices whereby transmission takes place in only one direction at a time  
🗑
Hardware Address   show
🗑
show A name that identifies a computer, printer, or other device on a network, which can be used instead of the computer's IP address to address the computer on the network. Also called computer name.  
🗑
HTTP (Hypertext Transfer Protocol)   show
🗑
HTTPS (Hypertext Transfer Protocol Secure)   show
🗑
show The latest Wi-Fi standard that supports up to 7 Gbps (actual speeds are currently about 1300 Mbps) and uses 5.0-GHz radio frequency and beamforming.  
🗑
IEEE 802.11n   show
🗑
IMAP4 (Internet Message Access Protocol version 4)   show
🗑
Interface   show
🗑
Interface ID   show
🗑
show A group of TCP/IP standards that uses IP addresses that have 32 bits.  
🗑
Internet Protocol version 6 (IPv6)   show
🗑
Intranet   show
🗑
IP Address   show
🗑
Ipconfig   show
🗑
show In TCP/IP version 6, a tunneling protocol that has been developed for IPv6 packets to travel over an IPv4 network and stands for Intra-Site Automatic Tunnel Addressing Protocol  
🗑
show A protocol used by various client applications when the application needs to query a database.  
🗑
Link (local link)   show
🗑
show In TCP/IP version 6, an IP address used for communicating among nodes in the same link and is not allowed on the Internet.  
🗑
Link-Local Unicast Address   show
🗑
show A network bound by routers or other gateway devices.  
🗑
show The latest standard used to transmit both voice and digital data over cellular networks and is expected to eventually replace CDMA and GSM.  
🗑
show An IP address that indicates your own computer and is used to test TCP/IPconfiguration on the computer.  
🗑
show A 48-bit hardware address unique to each NIC assigned by the manufacturer and embedded on the device. The address is often printed as hexadecimal numbers. Also called a physical address, an adapter address, or a hardware address.  
🗑
show A technique used by a router or wireless access point to allow access to a private network to only certain computers or devices identified by their MAC addresses.  
🗑
Multicast Address   show
🗑
show A feature of the IEEE 802.11n/ac standards for wireless networking whereby two or more antennas are used at both ends of transmissions to improve performance.  
🗑
Name Resolution   show
🗑
NAT (Network Address Translation)   show
🗑
show In TCP/IP version 6, two or more nodes on the same link  
🗑
NetBIOS   show
🗑
NetBIOS over TCP/IP   show
🗑
show An expansion card that plugs into a computer's motherboard and provides a port on the back of the card to connect a computer to a network.  
🗑
show An expansion card that plugs into a computer's motherboard and provides a port on the back of the card to connect a computer to a network. Also called a network adapter.  
🗑
show Any device that connects to the network, such as a computer, printer, or router.  
🗑
show In TCP/IP version 4, each of the four numbers that are separated by periods and make up a 32-bit IP address. One octet is 8 bits  
🗑
Onboard NIC   show
🗑
show A model for understanding and developing computer-to-computer communication, it divides networking functions among seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application  
🗑
show A 48-bit hardware address unique to each NIC assigned by the manufacturer and embedded on the device. The address is often printed as hexadecimal numbers. Also called an adapter address, or a hardware address.  
🗑
show The protocol that an email server and client use when the client requests the downloading of email messages. The most recent version is POP version 3. Compare with IMAP4.  
🗑
show As applied to services running on a computer, a number assigned to a process on a computer so that the process can be found by TCP/IP. Also called a port address or port number.  
🗑
show As applied to services running on a computer, a number assigned to a process on a computer so that the process can be found by TCP/IP. Also called port number  
🗑
show A technique that allows a computer on the Internet to reach a computer on a private network using a certain port when the private network is protected by NAT and a firewall that controls the use of ports. Also called port mapping  
🗑
show A technique that allows a computer on the Internet to reach a computer on a private network using a certain port when the private network is protected by NAT and a firewall that controls the use of ports.  
🗑
Port Number   show
🗑
show When a firewall opens a port because a computer behind the firewall initiates communication on another port.  
🗑
Private IP Address   show
🗑
show A set of rules and standards that two entities use for communication. For example, TCP/IP is a suite or group of protocols that define many types of communication on a TCP/IP network.  
🗑
show In TCP/IP version 4, an IP address available to the Internet. Compare with private IP address.  
🗑
Quality of Service (QoS)   show
🗑
Remote Desktop Protocol (RDP)   show
🗑
show A port that looks like a large phone jack and is used by twisted-pair cable to connect to a wired network adapter or other hardware device. RJ stands for registered jack. Also called Ethernet port.  
🗑
show A device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another  
🗑
show TCP/IP protocol used to transfer files from an FTP server to an FTP client using encryption.  
🗑
show A protocol that is used to pass login information to a remote computer and control that computer over a network using encryption.  
🗑
show A protocol used by Windows to share files and printers on a network.  
🗑
Service Set Identifier (SSID)   show
🗑
show Small flash memory card that contains all of the information a device needs to connect to a GSM or LTE cellular network, including a password and other authentication information needed to access the network.  
🗑
show A TCP/IP protocol used to monitor network traffic.  
🗑
show A file access protocol and the cross-platform version of SMB used between Windows, Linux, Mac OS, and other operating systems.  
🗑
SMTP (Simple MAil Transfer Protocol)   show
🗑
Socket   show
🗑
Static IP Address   show
🗑
Subnet   show
🗑
Subnet ID   show
🗑
show In TCP/IP version 4, 32 bits that include a series of 1s and 0s. The 1s identify the network portion of an IP address, 0s identify the host portion of an IP address. The subnet mask tells Windows if a remote computer is on the same or different network.  
🗑
show A device used to connect nodes on a network in a star network topology. When it receives a packet, it uses its table of MAC addresses to decide where to send the packet.  
🗑
TCP (Transmission Control Protocol)   show
🗑
show The group or suite of protocols used for almost all networks, including the Internet. Fundamentally, TCP is responsible for errorchecking transmissions, and IP is responsible for routing.  
🗑
Telnet   show
🗑
show In TCP/IP version 6, a tunneling protocol to transmit TCP/IPv6 packets over a TCP/IPv4 network, named after the Teredo worm that bores holes in wood. Teredo IP addresses begin with 2001, and the prefix is written as 2001::/32.  
🗑
TKIP (Temporal Key Integrity Protocol)   show
🗑
UDP (User Datagram Protocol)   show
🗑
show Using TCP/IP version 6, an IP address assigned to a single node on a network.  
🗑
Unique Local Address   show
🗑
show An unsecure method a router can use to allow unfiltered communication between nodes on a private network. Hackers sometimes are able to exploit UPnP, so use with caution.  
🗑
show A security technique that uses encrypted data packets between a private network and a computer somewhere on the Internet.  
🗑
show A technology used on cellular networks for LTE to support voice communication.  
🗑
show Configuring a computer so that it will respond to network activity when the computer is in a sleep state.  
🗑
WEP (Wired Equivalent Privacy)   show
🗑
Wi-Fi (Wireless Fidelity)   show
🗑
WI-Fi Protected Setup (WPS)   show
🗑
show A wireless device that is used to create and manage a wireless network  
🗑
show A type of LAN that does not use wires or cables to create connections, but instead transmits data over radio or infrared waves.  
🗑
Wireless Wide Area Network (WWAN)   show
🗑
WPA (Wi-Fi Protected Access)   show
🗑
WPA2 (Wi-Fi Protected Access 2)   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: tsuchi
Popular Computers sets