Chapter 17 stack 4
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Ping (Packet Internet Groper) | A Windows and
Unix command used to troubleshoot network
connections. It verifies that the host can
communicate with another host on the
network.
🗑
|
||||
private IP address proxy server | An IP address that is used on a
private TCP/IP network that is isolated from the
Internet
🗑
|
||||
repeater |
🗑
|
||||
ring topology |
🗑
|
||||
shielded twisted-pair cable |
🗑
|
||||
shielded twisted-pair cable |
🗑
|
||||
star ring topology |
🗑
|
||||
star topology |
🗑
|
||||
static IP address | An IP address permanently assigned
to a workstation.
🗑
|
||||
subnet mask | A group of four numbers (dotted
decimal numbers) that tell TCP/IP if a remote
computer is on the same or a different network.
🗑
|
||||
switch | A device used to segment a network. It can
decide which network segment is to receive a
packet, on the basis of the packet’s destination
MAC address.
🗑
|
||||
TCP/IP (Transmission Control Protocol/Internet Protocol | The suite of protocols that supports
communication on the Internet. TCP is responsible
for error checking, and IP is responsible for routing.
🗑
|
||||
ThickNet | See 10Base5.
🗑
|
||||
ThinNet |
🗑
|
||||
Token Ring |
🗑
|
||||
unshielded twisted pair cable | A cable that is
made of one or more twisted pairs of wires and is
not surrounded by shielding.
🗑
|
||||
WAN (wide area networkWEP (Wired | A network or group of
networks that span a large geographical area.
🗑
|
||||
Wi-Fi | See IEEE 802.11
🗑
|
||||
WINS (Windows Internet Naming Service | A
Microsoft resolution service with a database that tracks relationships between NetBIOS
names and IP addresses. Compare to DNS.
🗑
|
||||
wireless LAN (WLAN) | A type of LAN that does not
use wires or cables to create connections, but
instead transmits data over radio or infrared
waves.
🗑
|
||||
WPA (WiFi Protected Access | A data encryption
method for wireless networks that use the TKIP
(Temporal Key Integrity Protocol) encryption
method and the encryption keys are changed at set
intervals while the wireless LAN is in use.
🗑
|
||||
WPA2 (WiFi Protected Access | A data encryption
standard compliant with the IEEE802.11i standard
that uses the AES (Advanced Encryption Standard)
protocol. WPA2 is currently the strongest wireless
encryption standard.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
JReilly26
Popular Computers sets