• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

What are the 3 parts of a bus?

Data bus, control bus, address bus

Dac

True or false; mass storage devices do not retain data when the computer is turned off.

False

___ is a series of computer devices or nodes interconnected by communication paths.

Network

"connected"

A(n)___ is set of rules for that enables two computers to talk to each other.

Protocol

A system of linked networks that are worldwide in scope and facilitate data communication services that permit access to the world Wide Web and email.

Internet

The internet protocol uses unique addresses, simply called ___ addresses, to identify computers or devices in a network.

IP

___ is the division of a network into groups of computesr that have a common, designated IP address routing prefix.

Subnetting

The ___ IP address is an ode (a router) on a TCP/IP network taht serves as an access pointo t another network.

Gateway

The Internet protocol uses unique addresses, simply called___ addresses, to identify computers or devices in a network.

Ip

___ is the division of a network into groups of computers that have a common designated in address routing prefix.

Subnetting

The___ Ip address is a node (a router) to on a TCP/Ip network that serves as an access point to another network.

Gateway

The___ Ip address of the server provides domain name resolution.

Dns

"domain name resolution"

A VPN (virtual private network) uses a technique known as___ to transfer data securely on the Internet to a remote access server on your workplace network.

Tunneling

"venomous penis 'nimal"

The homegrown is protected with a(n)___ so you can always choose what you share with the group.

Password

To access the share in Linux, you must___ the share.

Mount

True or false: The Internet protocol suite network layer allows the Ip to transfer packets across a link.

True

Using UNC notation requires that you know the name or___ of the server and share.

IP address

POP3 (post office protocol 3) operates in the___ layer of the Internet protocol suite

Application

You can join an existing Windows network workgroup, by default called___ or you can create a new one.

WORKGROUP

Linux provides peer to peer networking with___, which is based on the common client/server protocol of server message block (Smb)

Samba

One way to view some of the Linux IPv4 settings is to use the___ command in a terminal window.

Ifconfig

True or false: In the absence of DHCP, all hosts on a network must be manually configured with static Ip addresses.

True

___ inherence occurs when you create or copy a sub folder or a file and the sub folder or file inherits the permissions of the parent folder by default.

Permission

For windows, only___ permits user accounts and user groups to be linked to folder and file permissions

NTFS

NTFS permissions are___ when a file or folder is moved or copied to a fat 16 or fat 32 formatted partition

Removed

Which fedora 13 file and directory permission provides dead and execute authority?

R-x

Which windows shared folder permission allows you to change file permissions and take of ownership of the file resources?

Full control

Used for sending and receiving email

SMTP

Provides a basis for file and printer sharing.

Workgroup

Allows web users to request web sites from remote servers

HTTP

The main networking protocol that allows for the communication of data across a network.

Internet protocol

Has become a central idea of networking

Client/server model

Makes it easy to share your libraries and printers on a home network

Homegroup

A computer networking protocol used by hosts (DHCP clients) to retrieve IP address assignments and other configuration information

DHCP

Allows for the rapid transfer of files across the web.

FTP

A private network that uses Internet type applications, but is a available only within a single organization.

Intranet

In Windows, the___ provides summary information for your computer

System information tool

___ cookies are deleted when you close your browser

Local

In a web browser, you can move from one web page to another by clicking___

Hyperlinks

True or false: Linux provides a system information tool that resembles the one J windows

True

When running Internet Explorer, by default all web sites into the Internet zone are guarded with a___ level of security

Medium-high

You exchange certificates with servers using a secure transmission protocol, which provides____ and unaltered information

Encrypted

A(n)___ acts as a protective boundary between the internal networks and the outside world

Firewall

When using a web search engine, use the___ character to include other keywords that you would expect to find relevant documents.

+

You can set up security___ from the security tab of the Internet options dialog box

Zones

Each page on a web is designated by an Internet address known as a(n)

URL

Most applications are___ to reduce size of the setup file.

Compressed i

Takes you to a different URL that indicates a different location in the web

Hyperlinks

Small files that collect and store personal information about you and your web surfing preferences

Cookies

Acts as intermediaries between computers and the Internet, and filter access to websites

Proxy server

Investigates the identity for organizations and people who obtain certificates

Certification authority (ca)

a scripting language that enables interactive functionality in web pages.

Javascript

A highly capable, feature rich programming language

Perl

A software program that you use to access and navigate the wrb

Web browser

By default, the recycling bin can only hold___ percent of the hard drives capacity

10%

Which windows Explorer control allows you to connect a drive letter to a shard resource on another computer

Map network drive