As part of CSMA/CD, a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.
Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.
By far, the most popular expansion board NIC is one that uses a(n) ____ bus.
PCIe slots vary depending on the number of ____ they support.
CompactFlash is an example of a peripheral device attached to the computer's ____ bus.
The primary difference between the two USB standards is ____.
____ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.
If the ____ NIC LED indicator is blinking, the NIC is functioning and receiving frames.
A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.
____ is a type of microchip that requires very little energy to operate.
The ____ is a simple set of instructions that enables a computer to initially recognize its hardware.
The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU.
base I/O port
A NIC's transmission characteristics are held in the adapter's ____.
A ____ is a repeater with more than one output port.
____ hubs possess internal processing capabilities.
Switches can create ____ by grouping a number of ports into a broadcast domain.
To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.
STP (Spanning Tree Protocol)
Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.
A ____ is a multiport connectivity device that directs data between nodes on a network.
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
A computer's ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC.
A(n) ____________________ NIC is integrated into the motherboard.
A(n) ____________________ is software that enables an attached device to communicate with the computer's operating system.
WANs typically send data over ____ available communications networks.
The individual geographic locations connected by a WAN are known as ____.
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
On most modern WANs, a ring topology relies on ____ rings to carry data.
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
A PSTN offers ____ security.
____ is an updated, digital version of X.25 that also relies on packet switching.
In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.
A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.
ISDN PRI uses ____ B channels and one 64-Kbps D channel.
The speed of a T-carrier depends on its ____ level.
At the customer's demarcation point, either inside or outside the building, T-carrier wire pairs terminate with a ____.
A ____ aggregates multiple DSL subscriber lines and connects them to the carrier's CO.
Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.
What sets ATM apart from Ethernet is its ____ size.
SONET's extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.
The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.
OC (Optical Carrier) level
____ networking refers to dialing directly into a private network's or ISP's remote access server to log on to a network.
____ is the preferred communications protocol for remote access communications.
____ is the standard for connecting home computers to an ISP via DSL or broadband cable.
____ virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.
In wireless communication, to exchange information, two antennas must be tuned to the same ____.
A directional antenna issues wireless signals along a(n) ____ direction.
In ____, a wireless signal splits into secondary waves when it encounters an obstruction.
____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.
In ____ wireless systems, the result is a point-to-point link.
In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.
A unique characteristic of the 802.11 data frame is its ____ field.
The average geographic range for an 802.11a antenna is ____ meters.
____ is the least popular WLAN standard.
An 802.11g antenna has a geographic range of ____ meters.
____ may use either the 2.4-GHz or 5-GHz frequency range.
____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.
____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.
Using Bluetooth version 2.0, communicating nodes can be as far as ____ meters apart.
____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.
If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.
LEO satellites orbit the Earth with an altitude as low as ____ miles.
____ satellites are the type used by the most popular satellite Internet access service providers.
Satellite Internet access providers typically use frequencies in the C- or ____ bands.
Dial return satellite Internet access is a(n) ____ technology.
Satellite return Internet access is a(n) ____ technology.
The use of multiple frequencies to transmit a signal is known as ____________________ technology.
____ is one of the most important functions an NOS provides.
A piece of software called ____ translates requests and responses between a client and a server.
A(n) ____ is a list that organizes resources and associates them with their characteristics.
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.
The printer queue is a ____ representation of the printer's input and output.
The term ____ memory refers to the RAM chips that are installed on the computer's system board and whose sole function is to provide memory to that machine.
____ memory may be logically carved out of space on the hard drive for temporary use.
A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.
A(n) ____ is a self-contained, well-defined task within a process.
The support and use of multiple processors to handle multiple threads is known as ____.
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.
A workgroup is a group of interconnected computers that share each other's resources without relying on a central ____.
The directory containing information about objects in a domain resides on computers called ____ controllers.
The process of copying directory data to multiple domain controllers is known as ____.
Active Directory organizes multiple domains hierarchically in a domain ____.
Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.
A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.
The primary function of the UNIX ____ is to coordinate access to all your computer's hardware, such as the disks, memory, keyboard, and monitor.
UNIX was one of the first operating systems to implement a ____ file system.
Solaris employs the file system called ____ for its native file system type.
Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
A class ____ network class is reserved for special purposes.
In ____ addressing, only Class A, Class B, and Class C addresses are recognized.
In classful addressing, the Class B IPv4 address network ID is located in the ____.
first 16 bits
In classful addressing, Class C IPv4 address host information is located in the ____.
last 8 bits
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
Within a classful addressing, ____ is the default subnet mask for a Class C address.
When using classful IPv4 addressing, a network ID always ends with an octet of ____.
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
forward slash ( / )
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.