Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

As part of CSMA/CD, a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.


Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.

data transceiver

By far, the most popular expansion board NIC is one that uses a(n) ____ bus.


PCIe slots vary depending on the number of ____ they support.


CompactFlash is an example of a peripheral device attached to the computer's ____ bus.


The primary difference between the two USB standards is ____.


____ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).


Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.


If the ____ NIC LED indicator is blinking, the NIC is functioning and receiving frames.


A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.


____ is a type of microchip that requires very little energy to operate.


The ____ is a simple set of instructions that enables a computer to initially recognize its hardware.


The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU.

base I/O port

A NIC's transmission characteristics are held in the adapter's ____.


A ____ is a repeater with more than one output port.


____ hubs possess internal processing capabilities.


Switches can create ____ by grouping a number of ports into a broadcast domain.


To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

STP (Spanning Tree Protocol)

Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.


A ____ is a multiport connectivity device that directs data between nodes on a network.


____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.


____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.


A computer's ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC.


A(n) ____________________ NIC is integrated into the motherboard.


A(n) ____________________ is software that enables an attached device to communicate with the computer's operating system.

device driver

WANs typically send data over ____ available communications networks.


The individual geographic locations connected by a WAN are known as ____.

WAN sites

Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.


On most modern WANs, a ring topology relies on ____ rings to carry data.


The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.

local loop

A PSTN offers ____ security.


____ is an updated, digital version of X.25 that also relies on packet switching.

Frame relay

In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.


A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.

terminal adapter

ISDN PRI uses ____ B channels and one 64-Kbps D channel.


The speed of a T-carrier depends on its ____ level.


At the customer's demarcation point, either inside or outside the building, T-carrier wire pairs terminate with a ____.

smart jack

A ____ aggregates multiple DSL subscriber lines and connects them to the carrier's CO.


Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.


What sets ATM apart from Ethernet is its ____ size.

fixed packet

SONET's extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.

fault tolerance

The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.

OC (Optical Carrier) level

____ networking refers to dialing directly into a private network's or ISP's remote access server to log on to a network.


____ is the preferred communications protocol for remote access communications.


____ is the standard for connecting home computers to an ISP via DSL or broadband cable.


____ virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.


In wireless communication, to exchange information, two antennas must be tuned to the same ____.


A directional antenna issues wireless signals along a(n) ____ direction.


In ____, a wireless signal splits into secondary waves when it encounters an obstruction.


____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.


In ____ wireless systems, the result is a point-to-point link.


In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.


A unique characteristic of the 802.11 data frame is its ____ field.

Sequence Control

The average geographic range for an 802.11a antenna is ____ meters.


____ is the least popular WLAN standard.


An 802.11g antenna has a geographic range of ____ meters.


____ may use either the 2.4-GHz or 5-GHz frequency range.


____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.

Channel bonding

____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.

Frame aggregation

Using Bluetooth version 2.0, communicating nodes can be as far as ____ meters apart.


____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.


If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.


LEO satellites orbit the Earth with an altitude as low as ____ miles.


____ satellites are the type used by the most popular satellite Internet access service providers.

Geosynchronous orbiting

Satellite Internet access providers typically use frequencies in the C- or ____ bands.


Dial return satellite Internet access is a(n) ____ technology.


Satellite return Internet access is a(n) ____ technology.


The use of multiple frequencies to transmit a signal is known as ____________________ technology.

spread- spectrum

____ is one of the most important functions an NOS provides.

Client support

A piece of software called ____ translates requests and responses between a client and a server.


A(n) ____ is a list that organizes resources and associates them with their characteristics.


A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.


The printer queue is a ____ representation of the printer's input and output.


The term ____ memory refers to the RAM chips that are installed on the computer's system board and whose sole function is to provide memory to that machine.


____ memory may be logically carved out of space on the hard drive for temporary use.


A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.


A(n) ____ is a self-contained, well-defined task within a process.


The support and use of multiple processors to handle multiple threads is known as ____.


A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.


A workgroup is a group of interconnected computers that share each other's resources without relying on a central ____.


The directory containing information about objects in a domain resides on computers called ____ controllers.


The process of copying directory data to multiple domain controllers is known as ____.


Active Directory organizes multiple domains hierarchically in a domain ____.


Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.


A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.


The primary function of the UNIX ____ is to coordinate access to all your computer's hardware, such as the disks, memory, keyboard, and monitor.


UNIX was one of the first operating systems to implement a ____ file system.


Solaris employs the file system called ____ for its native file system type.


Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.


A class ____ network class is reserved for special purposes.


In ____ addressing, only Class A, Class B, and Class C addresses are recognized.


In classful addressing, the Class B IPv4 address network ID is located in the ____.

first 16 bits

In classful addressing, Class C IPv4 address host information is located in the ____.

last 8 bits

Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.


Within a classful addressing, ____ is the default subnet mask for a Class C address.

When using classful IPv4 addressing, a network ID always ends with an octet of ____.


Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.


CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.

forward slash ( / )

The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.


Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording