As part of CSMA/CD, a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.
Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.
____ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.
A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.
The ____ is a simple set of instructions that enables a computer to initially recognize its hardware.
The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU.
base I/O port
To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.
STP (Spanning Tree Protocol)
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
A computer's ____________________ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC.
A(n) ____________________ is software that enables an attached device to communicate with the computer's operating system.
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.
A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.
At the customer's demarcation point, either inside or outside the building, T-carrier wire pairs terminate with a ____.
Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.
SONET's extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.
The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.
OC (Optical Carrier) level
____ networking refers to dialing directly into a private network's or ISP's remote access server to log on to a network.
____ virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.
In wireless communication, to exchange information, two antennas must be tuned to the same ____.
In ____, a wireless signal splits into secondary waves when it encounters an obstruction.
____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.
In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.
____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.
____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.
____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.
If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.
____ satellites are the type used by the most popular satellite Internet access service providers.
The use of multiple frequencies to transmit a signal is known as ____________________ technology.
A piece of software called ____ translates requests and responses between a client and a server.
A(n) ____ is a list that organizes resources and associates them with their characteristics.
A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.
The term ____ memory refers to the RAM chips that are installed on the computer's system board and whose sole function is to provide memory to that machine.
The support and use of multiple processors to handle multiple threads is known as ____.
A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.
A workgroup is a group of interconnected computers that share each other's resources without relying on a central ____.
The directory containing information about objects in a domain resides on computers called ____ controllers.
Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.
A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.
The primary function of the UNIX ____ is to coordinate access to all your computer's hardware, such as the disks, memory, keyboard, and monitor.
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.
forward slash ( / )