Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
42 Cards in this Set
- Front
- Back
A PC makes a direct connection to a network by way of a _______
|
network adapter
|
|
Communication on a network follows rules of communication called network __________
|
protocols
|
|
The three variations of ethernet are primarily distinguished from one another by speed:_________, 100-Mbps or Fast Ethernet, and 1000-Mbps or gigabit Ethernet
|
10mbs
|
|
A windows ________ network is called a workgroup
|
peer to peer
|
|
A _________ makes one PC (the client) appear to have a new hard drive that is really hard drive space on another host computer (the server)
|
mapped drive
|
|
Most applications that use the Internet are _______ applications, which means that two computers and two applications are involved
|
client/server
|
|
Connecting to network, such as the Internet, using a modem and regular phone line is called ______ networking
|
dial up
|
|
Windows XP and Windows 98 use _______ to manage two or more networked computer that share a single internet connection.
|
ICS
|
|
On the client end, to configure a VPN using Windows XP, a VPN network connection is created using the Windows XP ________ window.
|
network connections
|
|
A _____ is a code assigned to you by a certificate authority such as Verisign that uniquely identifies you on the Internet and includes a public key
|
digital certificate
|
|
The _______ configures all legacy and Plug and Play devices and communicates these configurations to devices
|
configuration manager
|
|
A ______ install carries forward as much information as it can about what the current OS knows concerning installed hardware and software, user preferences, and other settings.
|
upgrade install
|
|
Windows3.x uses text files to hold custom settings that help control the loading process; these files are called ______ files
|
.Ini Files
|
|
________ allows you to monitor how system resources are being used by applications; it can monitor the file system, memory, the kernel, printer sharing services, and network performance data
|
system monitor
|
|
The ______ is the small area on the right side of the taskbar at the bottom of the screen
|
system tray
|
|
Marks the area for the swap file as uncompressible
a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash.log |
DriveSpace
|
|
A hidden text file that Setup uses when recovering from a crash to determine how far it got in the installation
a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash.log |
Setuplog.txt
|
|
A binary file Setup uses to help recover from a crash caused by a hardware problem
a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash.log |
Detcrash.log
|
|
Keeps a record of hardware detected
a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash |
Detlog.txt
|
|
Creates and manages virtual machines to provide access to hardware for software running in the VM
a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash.log |
VxD
|
|
Traps errors in log files created by applications and takes a snapshot of the system to use for troubleshooting
a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash.log |
Dr. Watson
|
|
A network that covers a large campus or city
a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
MAN
|
|
A network that covers a large geographical area and is made up of many smaller networks
a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
WAN
|
|
Covers a limited geographical area and is popular in places where networking cables are difficult to install
a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
WLAN
|
|
32-bit address consisting of a series of four 8-bit numbers separated by periods
a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
IP
|
|
Sends a signal to a remote computer; if the remote computer is online and hears the signal, it responds
a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
Ping
|
|
The protocol used for the World Wide Web and used by Web browsers and Web servers to communicate.
a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
HTTP
|
|
A connection-oriented protocol; used by applications such as Web browsers and e-mail
a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
TCP
|
|
Responsible for discovering the internet address of a host on a local network
a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
RARP
|
|
Displays the IP address of the host and other configuration information
a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
Ipconfig
|
|
A protocol that is used by Internet or intranet telephone networks to provide voice communication over a network
a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
VoIP
|
|
A protocol that
TCP/IP uses to translate IP addresses into physical network addresses (MAC addresses). a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
ARP
|
|
A connectionless
protocol that does not require a connection to send a packet and does not guarantee that the packet arrives at its destination. a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
UDP
|
|
Uses a technique called tunneling, in which a packet of data is encrypted
a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
VPN
|
|
is a computer program used in Windows and Unix to query Domain Name System (DNS) servers to find DNS details, including IP addresses of a particular computer, MX records for a domain and the NS servers of a domain
a. ARP f. VPN b. VoIP g. HTTP c. RARP h. NSLookup d. Ipconfig i. TCP e. UDP |
NSLookup
|
|
The Windows initialization file that contains
program configuration information needed for running the Windows operating environment. a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash.log |
Win.ini
|
|
In Windows 9x/Me, a text file that contains
settings used by Io.sys during booting. a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash.log |
Msdos.sys
|
|
A Windows 9x/Me component
that controls the mouse, keyboard, ports, and desktop. a. Win.INI f. Msdos.sys b. Detlog.txt g. user component c. DriveSpace h. VxD d. Dr. Watson i. Setuplog.txt e. Detcrash.log |
user component
|
|
The suite of protocols that supports
communication on the Internet. a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
TCP/IP
|
|
An expansion card
that plugs into a computer’s motherboard and provides a port on the back of the card to connect a PC to a network a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
network adapter
|
|
IEEE specifications for wireless
communication and data synchronization a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
802.11b
|
|
A straight-through cable
a. MAN f. 802.11b b. TCP/IP g. WAN c. network adapter h. IP d. Ping i. patch e. WLAN |
patch
|