Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
pan   consists of personal devices at close range such as a cell phone  
🗑
lan   covers a small area such as a home or office  
🗑
wlan   covers a limited geographical area and is popular in places where networking cableare difficult to install such as outdoors  
🗑
man   covers a large campus or city  
🗑
wan   covers a large geographical area and is made up of many smaller networks  
🗑
bandwidth   the theoretical number of bits that can be transmitted over a network at one time,similiar to the number of lanes on a highway  
🗑
internet service providers   earthlink comcast  
🗑
ieee   creates standards for computer and electronic industries  
🗑
tcp/ip   a group of protocols that control many different aspects of communication  
🗑
isdn   an outdated broadband technology developed in the 1980s that uses regular phone lines and is accessed by a dialup connection  
🗑
computer   when two or more computers communiate with each other  
🗑
data throughput   actual speed of a network  
🗑
latency   delay in network transmissions  
🗑
broadband   networking technology that carries more then one signal such as dsl or telephone  
🗑
packet   data segment  
🗑
header   info at the beginning of the packet  
🗑
trailer   info at the end of the packet  
🗑
cable modem   converts pc digital signal to analog when sending them and converts incoming analog data to digital  
🗑
dsl   group of broadband technologies that covers a wide range of speeds  
🗑
dsl   uses ordinary copper phone lines and a range of frequencies on that copper wire that re not used by voice  
🗑
adsl   uses one upload speed from the consumer to an isp and a faster download speed  
🗑
sdsl   uses equal bandwiths in both directions  
🗑
disadvantage of using satellite for an internet connection   delays in transmission  
🗑
wireless networks   uses radio waves or infrared light instead of cables or wires to connect computers or ther devices  
🗑
802.11   most popular technology for for wireless local networks  
🗑
802.11g   freguency range 2.4 ghz distance 100 meters  
🗑
802.11b   freguency range 2.4 ghz distance 100 meters  
🗑
mimo   two or more atennas are used at both ends of transmission  
🗑
802.11n   compatible with 802.11b/g  
🗑
802.11n   can use the 5ghz range  
🗑
802.11a   works in the 5ghz range 50 meters  
🗑
802.11k   help manage connections between wireless devices and access points  
🗑
802.11k   defines how wireless network traffic can better be distributed over multiple access points covering a wide area so that the strongest signal is not overloaded  
🗑
802.11r   defines how a mobile wireless device can easily and quickly transition as it moves out of range from one access point snd into the range of another  
🗑
802.11d   designed to run in countries outside the united states  
🗑
three main protocols for encryption for 802.11 networks   wep wpa wpa2  
🗑
ssid   name of the wireless access point  
🗑
mac address   six byte number that uniquely identifies a network adapter on a computer  
🗑
802.16d   wimax  
🗑
802.16e   supports up to 75 Mbps range of several miles uses 2 to 11 ghz frequency  
🗑
base station   fixed transceiver and antenna  
🗑
wpa2   802.11i standard  
🗑
aes   advanced encryption standard  
🗑
tkip encryption   temporal key integrity protocol  
🗑
bluetooth   range of 10 meters 2.4 ghz range transfer data up to 3 mbps  
🗑
gsm   uses att open standard that uses digital communication of data and accepted worldwide  
🗑
cdma   used by cell phone providers in the us only  
🗑
tdma   older outdated technology  
🗑
full duplex   simultaneous send and receive at the same time  
🗑
half duplex   only send or receive  
🗑
point to point   send data packets over phone lines line protocol  
🗑
dial up networking   plain old telephone service  
🗑
modem standard   v92  
🗑
cellular internet card   air card  
🗑
air card   works like a cell phone to connect to a cellular wan to give you computer access  
🗑
mobile satellite broadband   requires portable satellie dish  
🗑
100BaseT   an ethernet standard that operates at 100 Mbps and uses twisted pair cabling up to 100 meters-328 feet also called fast ethernet  
🗑
10Base2   an outdated ethernet standard that operates at 10mbps and uses small coaxial cable up to 500 meters long.also called thinnet  
🗑
10Base5   an outdated ethnernet standard that operates at 10Mbps and uses thick coaxial cable up to 500 meters long also called thicknet  
🗑
10BaseT   an ethernet standard that operates at 10mbps and uses twisted pair cables up to 100 meters or 328 feet  
🗑
coaxial cable   single copper wire down the middle and a braided shield around it  
🗑
fiber optic   transmits signals as pulses of light over glass strands inside protected tubing  
🗑
fiber optic cable   single mode and multimode  
🗑
ethernet cabling   unshielded and shielded twisted pair  
🗑
ethernet types   10mbps 100mbps 1000Mbps 10Gbps  
🗑
fiber optic cables   straight tip standard connector local connector mechanical transfer rj  
🗑
1000Mbps   gigabit ethernet  
🗑
100BaseT   100BaseTX and 100BaseFX  
🗑
100BaseFX   uses fiber optic cable  
🗑
100Mbps   fast Ethernet  
🗑
twisted pair cable   most popular cabling for local networks  
🗑
fiber optic   transmits signals as pulses of light over glass strands inside protective tubing  
🗑
coaxial   single copper wire down the middle and a braided shield around it  
🗑
10Base2   185meters or 607 feet  
🗑
10Base5   500 meters or 607 feet  
🗑
10BaseT   100 meters or 328 feet  
🗑
hub   pass thru device tp connect nodes on a network  
🗑
bus toplogy   nodes are all strung together in a daisy chain with terminators at each end  
🗑
star topology   nodes are connected to a centralized hub or switch  
🗑
switch   keeps a table of all devices connected to it  
🗑
switch   uses a table to decide which path to use when sending packets  
🗑
hub   no egard for data  
🗑
network cables   patch cable or crossover table  
🗑
patch cable   straight thru cable  
🗑
patch cable   connects computer to hub or switch  
🗑
hub   data overload because everyone gets the request or the data  
🗑
ethernet hub   transmits the data packet to every device except the device that sent the transmission  
🗑
crossover cable   used to connect two like devices such as a switch to a switch or a pc to a pc  
🗑
hub   sends data to everyone  
🗑
switch   sends data to specific people  
🗑
patch cable   connect two different devices  
🗑
crossover cable   connect two like devices  
🗑
ad hoc mode   wireless devices commnicate directly pc to pc  
🗑
router   device that manages traffic between two networks  
🗑
router   gateway to the Internet  
🗑
crossover   transmit and receiv lines are reversed  
🗑
router   a device that connects one device to another  
🗑
dhcp   dynamic host configuration protocol  
🗑
dhcp server   gives ip addresses to computers on the network when they attempt to initiate a connection to the network and request an ip address  
🗑
access points   provide coverage  
🗑
wireless access points   allow wireless device connection to a lan  
🗑
firewall   blocks unwanted traffic initiated from the internet  
🗑
router   connection between two networks  
🗑
nat   network address translation  
🗑
nat   protocol that substitutes the ip address of the router for the ip address of other computers inside the network when these computers need to communicate on the internet  
🗑
dynamic ip addressing   an assigned ip address used for the current session only,when the session is terminated , the ip address returns to a list of available addresses  
🗑
dhcp server   provides ip addresses out to network computers  
🗑
router functions   router switch dhcp server wireless access point firewall with or without nat redirection  
🗑
port 20   ftp  
🗑
port 22   ssh  
🗑
port 23   telne  
🗑
port 25   smtp  
🗑
port 53   dns  
🗑
port 80   http  
🗑
port 110   pop3  
🗑
port 143   imap  
🗑
port 443   https  
🗑
port 3389   rdp  
🗑
client server applications   two computers and two applications are involved  
🗑
server   any computer or application that brings up data when that data is requested  
🗑
wireless access point   a computer can connect to the network using a wireless device  
🗑
three levels where communication happens between a client and server application   hardware application operating system  
🗑
protocols   predetermines rules for communicqtion  
🗑
hardware level   root level of communication  
🗑
ip address   a thirty two bit string used to identify a computer on the network  
🗑
the largest possible bit number   two hundred and fifty five  
🗑
two kinds of network addressing   static dynamic  
🗑
static addressing   a unique IP address that never changes  
🗑
dynamic addressing   each time the computer connects to the network it gets a new ip address from the dhcp server which is called leasing the address  
🗑
ip address   used to identify a computer both inside and outside its local network  
🗑
operating system   responsible for managing communication between itself and another computer using rules for communication that both operating systems understand  
🗑
application level   when you use the internet to surf the web or download your email you need to use an  
🗑
client   requests information  
🗑
server   has information requested  
🗑
hardware level   includes the mac address  
🗑
port number   uniquely identifies an application on your computer  
🗑
mac address   local address  
🗑
ip address   long distance address  
🗑
socket   endpoint of an inter-process communication flow across a computer network  
🗑
application level   client communicationg with another application  
🗑
socket   ip address followed by a colon and a port number  
🗑
pop3   post office protocol version 3 used by a client to receive mail  
🗑
dns   domain name service used to find an ip address when a coomputers character based name is unknown  
🗑
imap   stays on the server you can check your email from phone or internet and the email is always there  
🗑
pop3   deleted off the server as it is being sent to me it is the only copy  
🗑
telnet   has no encryption  
🗑
https   has encryption  
🗑
ip address   32 bits long made up of 4 bytes each 8 bits long  
🗑
intranet   private network that uses he tcp/ip protocols  
🗑
octet   eight bits  
🗑
class A   127 possibilities  
🗑
class B   16,000 possibilities  
🗑
class C   2 million possibilities  
🗑
first part of an IP address   identifies the network  
🗑
last part of an IP address   identifies the host  
🗑
IPv4   32 bits  
🗑
IPv6   128 bits  
🗑
when data is routed over interconnected networks   the network portion of the ip address is used to locate the right network  
🗑
after the data arrives at the local network   the host portion of the ip address is used to identify the one computer on the network that is to receive the data  
🗑
ICANN   responsible for keeping track of assigned ip addresses and domain names  
🗑
class D   multicasting  
🗑
class d   octets 224 thru 239  
🗑
class e   research  
🗑
class e    
🗑
subnet mask   tells the os which part of an ip address is the network portion and which part is the host  
🗑
subnet mask   a computer or other device can know if an ip address of another computer is on its network or another network  
🗑
classful subnet masks   contain all ones or all zeros  
🗑
classless subnet mask   contains a mix of ones and zeros  
🗑
public ip addresses   ip addresses available on the internet  
🗑
private ip addresses   ip addresses not available on the internet  
🗑
cidr   classless interdomain routing  
🗑
nat redirection   the device substitutes its own public ip address for the private ip address of a computer behind the firewall  
🗑
apipa   automatic private ip adress  
🗑
dynamic ip address   assigned for current connection only  
🗑
dhcp server   manages dynamically assigned ip adresses on a network  
🗑
dhcp clients   workstations that work with dhcp servers  
🗑
apipa   automatic private ip address  
🗑
apipa   an ip address used by a computer when it cannot successfully lease an ip address from a dhcp server  
🗑
host name   computer name  
🗑
host name   name of a computer and can be used in place of its ip address  
🗑
netbios   network basic input output system  
🗑
netbios name   can be up to 15 characters  
🗑
netbeui   windows networking protocol  
🗑
domain name   identifies a network  
🗑
fully qualified domain name   identifies a computer and the network to which it belongs  
🗑
name resolution   the process of associating a character based name with an ip address  
🗑
apipa address that means there is a network problem somewhere   169.254.x.y.  
🗑
apipa address   can still have a peer to peer network  
🗑
domain name system   domain name service  
🗑
domain name system   the protocol and service used to track these character based names with ip addresses  
🗑
chracter based names   substitute for ip addresses  
🗑
netbios name   a fifteen character name used on legacy system  
🗑
dns server   finds ip address when fdqn known  
🗑
hosts file   contains computer names and their associated ip addresses on the local network  
🗑
http   protocol used for the www and is used by web browsers and servers to communicate  
🗑
wins   windows internet naming service  
🗑
wins   used to track netbios names  
🗑
https   protocol used by web browsers and servers to encrypt the data before it is sent and then decrypt it before the data is processed  
🗑
ftp   transfers files between two computers  
🗑
api   application programming interface  
🗑
api   the way applications ask the operating system to do something  
🗑
smtp   used to send an email to a recipients mail server  
🗑
smtp auth   protocol is used to authenticate a user to an email server when the email client first tries to connect to the email server to send email  
🗑
pop3 or imap4   used to download email to the client  
🗑
ping   packet internet groper  
🗑
ping   tests connectivity by sending an echo request to a computer  
🗑
ipconfig   can display tcp ip configuration and refresh the ip address  
🗑
telnet   a user connects to a remote computer and controls it through the command prompt window  
🗑
tcp and udp   control communication on the network  
🗑
imap   leaves a copy on the server  
🗑
pop3   look at it and it is gone  
🗑
tcp   guarantees packet delivery  
🗑
udp   no guarantee of delivery  
🗑
tcp   connection oriented protocol  
🗑
udp   connectionless protocol  
🗑
tcp   makes a connection checks whether the data was received and if not it resends  
🗑
udp   best effort protocol primarily used for broadcasting  
🗑
udp   does not check if the connection checks whether the data was received and if not it resends  
🗑
arp   address resolution protocol  
🗑
arp   locating a host on a local network  
🗑
rarp   discovering internet address on a local network  
🗑
telnet   allows user connection to a remote computer  
🗑
ping -a   tests for name resolution  
🗑
ping -t   pings until it is interrupted  
🗑
ping 127.0.0.1   loopback address  
🗑
ping -l   changes the size of the data packet sent with the ping  
🗑
ipconfig /all   displays tcp ip information  
🗑
ipconfig /release   release the ip address  
🗑
ipconfig /renew   lease a new address from a dhcp server  
🗑
ipconfig /displaydns   displays info about name resolutions that windows currently hold in the dns resolver cache  
🗑
vpn   secures private data traveling over a public network  
🗑
vpn tunneling protocols   pptp L2tp ssl ipsec  
🗑
point to point protocol   weakest protocol  
🗑
strongest tunneling protocol   layer two tunneling protocol over ipsec  
🗑
subnet mask   group of four dotted decimal numbers that tells tcp ip if a computers ip address is on the same network  
🗑
gateway   device that allows a computer on one network to communicate with another network  
🗑
default gateway   is the gateway a computer uses to access another network if it does not have a better option  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: cgeaski
Popular Computers sets