Netword+ A Plus Guide to Networks Chapter 1
Terms in this set (50)
Servers that have a NOS installed require less memory, processing power, and storage capacity that clients because servers are called on to handle only light processing loads and requests from multiple clients.
The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.
After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.
Static electricity is an electrical charge in motion.
The protocol data unit for the Physical layer of the OSI model is payload, or data
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
What is the name for the protocol data unit (PDU) of the Data Link layer?
The segment or datagram protocol data unit exists at what layer of the OSI model?
In what network topology are devices daisy-chained together in a single line?
What physical network topology consists of all connected devices connecting to one central device, such as a switch?
The device where a telecommunications service provider network ends and an organization's network begins is referred to as what option below?
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?
Material Safety Data Sheet (MSDS)
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?
A standard network switch operates at what layer of the OSI model?
Which of the following is not one of the disadvantages of peer-to-peer networks?
They centralize user account logins
Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as:
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read:
If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as:
The process of adding a header to the data inherited from the layer above is called what option below?
When using a Windows domain, what is the domain-level account for each user known as?
What mail protocol is used to send mail messages to a server?
What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event?
Any computer or device on a network that can be addressed on the local network is referred to as a:
What two encryption protocols are commonly used with the Hypertext Transfer Protocol?
What two mail delivery protocols below can be used by a client application to receive e-mail from a server?
Which two protocols can be used to gain remote access specifically to a server's command line interface, securely and unsecurely?
What are the two main Transport Layer protocols?
Static electricity can cause what two types of damage in electronic components?
___________ is an unsecured client server application / protocol that transfers files between two computers.
The smallest network is a ______________________, which is a network of personal devices, such as the network you use when you sync your cell phone and your computer.
PAN (Personal Area Network)
The Network layer header identifies sending and receiving hosts by their _________________.
The centralized directory database that contains user account information and security for the entire group of computers in a Windows domain is called _________________.
Active Directory (AD)
Voice and video transmissions are _______________, meaning you don't want to hear breaks in your conversation or see a buffering message when you watch a movie over the Internet.
The point of division between a telecommunications service carrier's network and a building's internal network.
The use of data networks to carry voice, video, and other communications services in addition to data.
(1) A unit of data that results from subdividing a larger protocol data unit. (2) A part of a network. Usually, a segment is composed of a group of nodes that share the same communications channel for all their traffic
System default that allows access during a system or network failure.
The transfer of electrical charge between two bodies, such as when a technician touches a computer component.
electrostatic discharge (ESD)
A user's domain-level account, also called a global username or network ID, which is assigned by the network administrator and is kept in Active Directory.
(1) The amount of traffic, or data transmission activity, on a network. (2) A measure of the difference between the highest and lowest frequencies that a medium can transmit.
Damage that can shorten the life of a component and/or cause intermittent errors.
System default that denies access during a system or network failure.
Data that is passed between applications or utility programs and the operating system, and includes control information.
Explain the differences between a physical topology and a logical topology.
A physical topology is how they are actually interconnected with wires and cables. For example, in a shared Ethernet network that uses hubs rather than switches, the logical topology appears as if every node is connected to a common bus that runs from node to node
Describe how the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) differ from each other, and provide examples of where each might be used.
TCP As a message makes its way across the internet (Links to an external site.) from one computer to another. This is connection based
UDP is also a protocol used in message transport or transfer. This is not connection based which means that one program can send a load of packets to another and that would be the end of the relationship
How can you prevent damage to a component prior to touching it?
you can purchase an antistatic wrist strap. Be sure to turn its power completely off using the main power switch on the power supply
What are some general OSHA guidelines to use when using power (electric) tools or other hand tools in the workplace?
Inspect tools for any damage prior to each use.Inspect cords for defects:
check the power cord for cracking, fraying, and other signs of wear or faults in the cord insulation.
Explain the two different categories of Application layer protocols, and then detail the PDU used at this layer.
Presentation layer reformatting and compressing data
Session layer how applications are synced and recovered.
YOU MIGHT ALSO LIKE...
Network+ Guide to Networks (8th Edition) - Chapter 1 Key Terms
Chapter 1: Introduction to Networking
Chapter 1: Introduction to Networking
OTHER SETS BY THIS CREATOR
ASDV 2440 Test2
ASDV 2440 Test1
Network+ Guide to Networks Chapter 2
THIS SET IS OFTEN IN FOLDERS WITH...
Networking Study Guide
Unit 9: Network Security (OSI)