NETW311 Flashcards

1
Q

Every computer on a network is called a ____ or ___ ______.

A

host, end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Servers are computers that provide information to end devices:

A

email, web, and file servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Email server runs ______ ______ ______.

A

email server software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Clients use ______ ______ to access email.

A

client software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Web server runs ___ server software.

A

web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clients use _______ _______ to access web pages.

A

browser software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File server stores _____ and ____ files.

A

corporate and user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is possible to have a device be a client and a server. This type of network design is only recommended for very small networks.

A

peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An ___ ______ is where a message originates from or where it is received.

A

end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ originates with an end device, flows through the network, and arrives at an end device.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An _______ _______ interconnects end devices.

A

intermediary device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examples of intermediary devices are: switches, wireless access points, routers, and ________.

A

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Communication across a network is carried through a medium which allows a message to travel from _____ to ________.

A

source to destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Metal wires within cables uses ________ __________.

A

electrical impulses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Glass or plastic fibers within cables (fiber-optic cable)
uses ______ __ ______

A

pulses of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless transmission uses modulation of specific frequencies of __________ ______.

A

electromagnetic waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network diagrams, often called _______ ________, use symbols to represent devices within the network.

A

topology diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NIC stands for ____________

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_______ topology diagrams illustrate the physical location of intermediary devices and cable installation.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

________ topology diagrams illustrate devices, ports, and the addressing scheme of the network.

A

logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It connect a few computers to each other and the Internet.

A

Small Home Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It enables computer within a home or remote office to connect to a corporate network.

A

Small Office/Home Office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It has many locations with hundreds or thousands of interconnected computers

A

Medium to Large Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

It connects hundreds of millions of computers world-wide – such as the internet

A

World Wide Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The two most common types of network are ___ and ___
LAN and WAN
26
It is a network infrastructure that spans a small geographical area.
Local Area Network (LAN)
27
It is a network infrastructure that spans a wide geographical area.
Wide Area Network (WAN)
28
It is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
Intranet
29
_____ has high bandwidth, always on, internet offered by cable television service providers.
cable
30
___ has high bandwidth, always on, internet connection that runs over a telephone line.
DSL
31
It uses a cell phone network to connect to the internet.
cellular
32
A major benefit to rural areas without Internet Service Providers.
satellite
33
An inexpensive, low bandwidth option using a modem.
dial-up telephone
34
This extends LAN access technology into the WAN.
Ethernet WAN
35
These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.
Dedicated Leased Line
36
Converged data networks carry multiple services on one link including:
data, voice, video
37
It refers to the technologies that support the infrastructure that moves data across the network.
Network Architecture
38
It limits the impact of a failure by limiting the number of affected devices. Multiple paths are required for fault tolerance.
fault tolerant network
39
It splits traffic into packets that are routed over a network.
packet switching
40
It can expand quickly and easily to support new users and applications without impacting the performance of services to existing users.
scalable network
41
It is the primary mechanism used to ensure reliable delivery of content for all users.
Quality of Service
42
It allows us to store personal files or backup our data on servers over the internet.
Cloud Computing
43
Available to the general public through a pay-per-use model or for free.
public clouds
44
Intended for a specific organization or entity such as the government.
private cloud
45
Made up of two or more Cloud types – for example, part custom and part public.
hybrid clouds
46
Built to meet the needs of a specific industry, such as healthcare or media.
custom clouds
47
A growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices.
Smart Home Technology
48
It allow devices to connect to a LAN where data network cables or wireless communications
Powerline Networking
49
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
Shell
50
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Kernel
51
Allows the user to interact with the system using an environment of graphical icons, menus, and windows.
GUI
52
A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.
console
53
Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)
Telnet
54
Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)
Secure Shell
55
Used to connect to a network device by either a console port or by an SSH/Telnet connection.
Terminal emulation programs
56
Allows access to only a limited number of basic monitoring commands using (>) symbol
user EXEC mode
57
Allows access to all commands and features using (#) symbol
privileged EXEC mode
58
Used to access configuration options on the device
Global Configuration Mode
59
Used to configure console, SSH, Telnet or AUX access
Line Configuration Mode
60
Used to configure a switch port or router interface
Interface Configuration Mode
61
This is a specific parameter defined in the operating system (in the figure, ip protocols).
Keyword
62
This is not predefined; it is a value or variable defined by the user
Argument
63
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot.
startup-config
64
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately.
running-config
65
The use of ___________ is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet.
IP addresses
66
A 32-bit value that differentiates the network portion of the address from the host portion.
IPv4 subnet mask
67
128 bits in length and written as a string of hexadecimal values. They are not case-sensitive and can be written in either lowercase or uppercase.
IPv6 addresses
68
The process of converting information into another acceptable form for transmission.
Encoding
69
Reverses encoding process to interpret the information.
Decoding
70
Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
Flow Control
71
Manages how long a device waits when it does not hear a reply from the destination.
Response Timeout
72
Determines when someone can send a message.
Access method
73
one to one communication
unicast
74
one to many, typically not all
multicast
75
one to all
broadcast
76
Governs the way a web server and a web client interact
Hypertext transfer protocol (HTTP)
77
Manages the individual conversations
Transmission Control Protocol (TCP)
78
Delivers messages globally from the sender to the receiver
Internet Protocol (IP)
79
Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN)
Ethernet
80
The most common protocol suite and maintained
Internet Protocol Suite or TCP/IP-
81
Developed by the International Organization for Standardization (ISO) and the International Telecommunications Union (ITU)
Open Systems Interconnection (OSI) protocols-
82
Proprietary suite release by Apple Inc.
AppleTalk
83
Proprietary suite developed by Novell Inc.
Novell NetWare
84
Develops, updates, and maintains internet and TCP/IP technologies
Internet Engineering Task Force (IETF) 
85
Focused on long-term research related to internet and TCP/IP protocols
Internet Research Task Force (IRTF) 
86
Responsible for management and development of internet standards
Internet Architecture Board (IAB) 
87
Promotes the open development and evolution of internet
Internet Society (ISOC) 
88
The capacity at which a medium can carry data.
bandwidth
89
Amount of time, including delays, for data to travel from one given point to another
Latency
90
The measure of the transfer of bits across the media over a given period of time
throughput
91
The measure of usable data transferred over a given period of time
goodput
92
The most common type of cabling used in networks today. It is inexpensive, easy to install, and has low resistance to electrical current flow.
Copper cabling
93
UTP stands for
Unshielded Twisted Pair
94
STP stands for
Shielded Twisted Pair