• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
A PC makes a direct connection to a network by way of a _______
network adapter
Communication on a network follows rules of communication called network __________
protocols
The three variations of ethernet are primarily distinguished from one another by speed:_________, 100-Mbps or Fast Ethernet, and 1000-Mbps or gigabit Ethernet
10mbs
A windows ________ network is called a workgroup
peer to peer
A _________ makes one PC (the client) appear to have a new hard drive that is really hard drive space on another host computer (the server)
mapped drive
Most applications that use the Internet are _______ applications, which means that two computers and two applications are involved
client/server
Connecting to network, such as the Internet, using a modem and regular phone line is called ______ networking
dial up
Windows XP and Windows 98 use _______ to manage two or more networked computer that share a single internet connection.
ICS
On the client end, to configure a VPN using Windows XP, a VPN network connection is created using the Windows XP ________ window.
network connections
A _____ is a code assigned to you by a certificate authority such as Verisign that uniquely identifies you on the Internet and includes a public key
digital certificate
The _______ configures all legacy and Plug and Play devices and communicates these configurations to devices
configuration manager
A ______ install carries forward as much information as it can about what the current OS knows concerning installed hardware and software, user preferences, and other settings.
upgrade install
Windows3.x uses text files to hold custom settings that help control the loading process; these files are called ______ files
.Ini Files
________ allows you to monitor how system resources are being used by applications; it can monitor the file system, memory, the kernel, printer sharing services, and network performance data
system monitor
The ______ is the small area on the right side of the taskbar at the bottom of the screen
system tray
Marks the area for the swap file as uncompressible

a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash.log
DriveSpace
A hidden text file that Setup uses when recovering from a crash to determine how far it got in the installation

a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash.log
Setuplog.txt
A binary file Setup uses to help recover from a crash caused by a hardware problem

a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash.log
Detcrash.log
Keeps a record of hardware detected

a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash
Detlog.txt
Creates and manages virtual machines to provide access to hardware for software running in the VM

a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash.log
VxD
Traps errors in log files created by applications and takes a snapshot of the system to use for troubleshooting

a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash.log
Dr. Watson
A network that covers a large campus or city

a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
MAN
A network that covers a large geographical area and is made up of many smaller networks

a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
WAN
Covers a limited geographical area and is popular in places where networking cables are difficult to install

a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
WLAN
32-bit address consisting of a series of four 8-bit numbers separated by periods

a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
IP
Sends a signal to a remote computer; if the remote computer is online and hears the signal, it responds

a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
Ping
The protocol used for the World Wide Web and used by Web browsers and Web servers to communicate.

a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
HTTP
A connection-oriented protocol; used by applications such as Web browsers and e-mail

a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
TCP
Responsible for discovering the internet address of a host on a local network

a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
RARP
Displays the IP address of the host and other configuration information

a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
Ipconfig
A protocol that is used by Internet or intranet telephone networks to provide voice communication over a network

a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
VoIP
A protocol that
TCP/IP uses to translate IP addresses into physical
network addresses (MAC addresses).

a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
ARP
A connectionless
protocol that does not require a connection to
send a packet and does not guarantee that the
packet arrives at its destination.
a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
UDP
Uses a technique called tunneling, in which a packet of data is encrypted

a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
VPN
is a computer program used in Windows and Unix to query Domain Name System (DNS) servers to find DNS details, including IP addresses of a particular computer, MX records for a domain and the NS servers of a domain

a. ARP f. VPN
b. VoIP g. HTTP
c. RARP h. NSLookup
d. Ipconfig i. TCP
e. UDP
NSLookup
The Windows initialization file that contains
program configuration information needed for
running the Windows operating environment.

a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash.log
Win.ini
In Windows 9x/Me, a text file that contains
settings used by Io.sys during booting.
a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash.log
Msdos.sys
A Windows 9x/Me component
that controls the mouse, keyboard, ports, and
desktop.

a. Win.INI f. Msdos.sys
b. Detlog.txt g. user component
c. DriveSpace h. VxD
d. Dr. Watson i. Setuplog.txt
e. Detcrash.log
user component
The suite of protocols that supports
communication on the Internet.

a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
TCP/IP
An expansion card
that plugs into a computer’s motherboard and
provides a port on the back of the card to connect
a PC to a network
a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
network adapter
IEEE specifications for wireless
communication and data synchronization

a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
802.11b
A straight-through cable

a. MAN f. 802.11b
b. TCP/IP g. WAN
c. network adapter h. IP
d. Ping i. patch
e. WLAN
patch