Chapter 1: Internal and External factors affecting successful communication Flashcards

CHAPTER 1 PG. 37

1
Q

A common computer used in a home or office

A

Desktop Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A portable computer

A

Laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer dedicated to providing application services to end
users on a network

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A digital telephone that carries voice as data over data networks instead of analog phone lines

A

IP phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Local-area network media, usually copper cable

A

LAN media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Depicts local-area network wireless access

A

Wireless Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most common device for interconnecting local-area networks

A

LAN Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A device that provides security to networks

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A device that helps direct messages between networks

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A specific type of router often found in home networks

A

Wireless Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A symbol used to summarize a group of networking devices out of local management control, often the Internet itself

A

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One form of wide-area network (WAN) interconnection, represented by the lightning bolt–shaped line

A

WAN Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP/IP

A

IP (Internet Protocol) and TCP (Transmission Control Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP

What service is this protocol for?

A

Hypertext Transport Protocol

WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SMTP

What service is this protocol for?

A

Simple Mail Transport Protocol

E-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP

What service is this protocol for?

A

Post Office Protocol

E-mail

17
Q

XMPP

What service is this protocol for?

A

Extensible Messaging and Presence Protocol

Instant Message

18
Q

OSCAR

What service is this protocol for?

A

Open System for Communication in Realtime

iNSTANT MESSAGE

19
Q

SIP

What service is this protocol for?

A

Session Initiation Protocol

IP telephony

20
Q

Elements of a Network

[BLANK] govern how the messages are sent, directed, received, and interpreted.

A

Rules or agreements (protocols)

21
Q

Elements of a Network

[BLANK] or units of information travel from one device to another.

22
Q

Elements of a Network

[BLANK] is a means of interconnecting these devices that can transport the messages from one device to another.

23
Q

Elements of a Network

[BLANK] on the network exchange messages with each other.

24
Q

These software programs that support communication functions are called [BLANK]

25
Q

VoIP

A

Voice Over Internet Protocol

26
Q

Examples of priority decisions for an organization might include

Increase priority for services like telephony or video distribution.

A

Time-sensitive communication

27
Q

Examples of priority decisions for an organization might include

Decrease priority for web page retrieval or e-mail.

A

Non-time-sensitive communication:

28
Q

Examples of priority decisions for an organization might include

Increase priority for production control or business transaction data.

A

High importance to organization

29
Q

Examples of priority decisions for an organization might include

Decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.

A

Undesirable communication

30
Q

A network security breach can lead to a variety of serious consequences, including what?

NLTE

A
  • Network outage, causing a loss of communication and business transactions
  • Loss of personal or business funds
  • Theft of intellectual property such as project bids, patents, and strategic plans
  • Exposure of confidential customer data
31
Q

To provide security, a network manager must address two areas which are?

A

Network infrastructure security and Content security

32
Q

Network Security

[BLANK] means protection of data stored on network devices and the protection of packets carrying data into or out of the network. Meaning, this means ensures confidentiality, maintaining communication integrity, and ensuring network availability.

A

Content Security

33
Q

Network Security

[BLANK] means protecting the devices from outside contact. Locking computer room doors and using quality password protection on network equipment and software.

A

Network infrastructure security

34
Q

[BLANK] is maintained by allowing only the intended and authorized recipients—individuals, processes, or devices—to read the data.

A

Data Privacy

35
Q

[BLANK] means having the assurance that the information has not been altered in transmission, from origin to destination.

It can be compromised when information
has been corrupted—willfully or accidentally—before the intended recipient receives it.

A

Data Integrity

36
Q

[BLANK] is the assurance that the identity of the sender has been validated.

It is compromised when a user or device fakes its identity and supplies incorrect
information to a recipient.

A

Source Integrity