Technology in Action Chapter 12

Flashcard maker : Lily Taylor
access card reader
A device that reads information from a magnetic strip on the back of a credit card-like access card.
access method
A method to control which computer is allowed to use transmission media at a certain time.
active topology
In a network, a type of topology where the nodes participate in moving data through the network.
application server
A server that acts as a repository for application software.
authentication server
A server that keeps track of who’s logging on to the network and which services on the network are available to each user.
authentication
The process of identifying a computer user, based on a login or username and password. The computer system determines whether the computer user is authorized and what level of access is to be granted on the network.
bastion host
A heavily secured server located on a special perimeter network between the company’s secure internal network and its firewall.
biometric authentication device
A device that uses some unique characteristic of human biology to identify authorized users.
bridge
A device that’s used to send data between different collision domains in a network, depending on where the recipient device is located.
brute force attack
An attempt to access an account by repeatedly trying different passwords.
bus (linear bus) topology
A system of networking connections in which all devices are connected in sequence on a single cable.
centralized
A characteristic of client/ server networks where the server, not the individual user, coordinates data security.
client/server network (server-based network)
A type of network that uses servers to deliver services to computers that are requesting them (clients).
cloud server
A server that is maintained by a hosting company and that is connected to networks via the Internet.
coaxial cable
A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly in cable television and cable Internet service.
communications server
A server that handles all communications between the network and other networks, including managing Internet connectivity.
CSMA/CD
The method used on Ethernet networks to avoid data collisions; short for carrier sense multiple access with collision detection. A node connected to the network uses carrier sense to verify that no other nodes are currently transmitting data signals.
data collision
When two computers send data at the same time and the sets of data collide somewhere in the connection media.
database server
A server that provides client computers with access to information stored in databases.
decentralized
A characteristic of peer-to-peer networks where the individual user coordinates data security.
dedicated server
A server used to fulfill one specific function, such as handling e-mail.
device driver
Software that facilitates the communication between a device and its operating system or between a network adapter and a server’s operating system and the operating system of the computer in which the adapter is installed.
electronic data interchange (EDI)
The exchange of large amounts of data in a standardized electronic format.
e-mail server
A server whose sole function is to process and deliver incoming and outgoing e-mail.
extranet
An area of an intranet that only certain corporations or individuals can access; the owner of the extranet decides who will be permitted to access it.
fiber-optic cable
A cable that transmits data at close to the speed of light along glass or plastic fibers.
file server
A server that stores and manages files for network users or that acts as a storehouse for files that users can download.
frame
Groups of data packets that are sent together in a package.
honey pot
A computer system that’s set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value.
hybrid topology
Combining multiple topologies into one network.
information assurance
Ensuring that information systems contain accurate information and are adequately secured against tampering.
intranet
A private network set up by a business or an organization that’s used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
jam signal
A special signal sent to network nodes alerting them that a data collision has occurred.
local area network (LAN)
A network in which the nodes are located within a small geographic area.
media access control (MAC) address
The physical address, similar to a serial number, of each network adapter.
network adapter
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol.
network administrator
Person who maintains networks for businesses.
network operating system (NOS)
Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate.
network topology
The physical or logical arrangement of computers, transmission media (cable), and other network components.
Open Systems Interconnection (OSI)
A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.
packet screening
Having an external screening router examine incoming data packets to ensure they originated from or are authorized by valid users on the internal network.
passive topology
In a network, a type of topology where the nodes do nothing to move data along the network.
possessed object
Any object that users carry to identify themselves and that grants them access to a computer system or facility.
print queue
A software holding area for print jobs. Also called a print spooler.
print server
A server that manages all client-requested printing jobs for all printers on a network.
protocol
A set of rules for exchanging communications.
proxy server
A server that acts as a go-between, connecting computers on the internal network with those on the external network (the Internet).
ring (loop) topology
A type of network topology where computers and peripherals are laid out in a configuration resembling a circle.
router
A device that routes packets of data between two or more networks.
scalability
A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.
shielded twisted-pair (STP)cable
Twisted-pair cable that contains a layer of foil shielded to reduce interference.
star topology
The most widely deployed client/server network topology, where the nodes connect to a central communications device called a switch in a pattern resembling a star.
switch
A device for transmitting data on a network. A switch makes decisions, based on the media access control address of the data, as to where the data is to be sent.
terminator
A device that absorbs a signal so that it’s not reflected back onto parts of the network that have already received it.
token
A special data packet used to pass data in a ring topology network.
token method
The access method used by ring networks to avoid data collisions.
transmission media
The radio waves or the physical system (cable) that transports data on a network.
tunneling
The main technology for achieving a virtual private network; the placement of data packets inside other data packets.
twisted-pair cable
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire).
virtual private network (VPN)
A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.
virtualization
Using specialized software to make individual physical servers behave as though they are more than one physical device.
web server
A computer running a specialized operating system that enables it to host web pages (and other information) and to provide requested web pages to clients.
wide area network (WAN)
A network made up of local area networks (LANs) connected over long distances.
wireless access point (WAP)
Gives wireless devices a sending and receiving connection point to the network.
wireless network interface card (wireless NIC)
A special network adapter card that allows a computing device to connect to a network using wireless access.
My office has shifted to a client/server network and uses one server in the office—is that sufficient?
The number and types of servers you need depends on the workload your network experiences.
What do file servers do?
File servers are used to store and manage files for network users.
What server is used to store applications?
You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer.
What are authentication servers?
Authentication servers keep track of who is logging on to the network.
Do database servers manage the network databases?
Not really. Database servers provide client computers with access to information stored in a database.
What are web servers?
A web server is used to host a website so it will be available through the Internet.
How is an e-mail server different from a communications server?
An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing Internet connectivity.
Do I need any special software to use dedicated servers?
Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate.
application server
A server that acts as a repository for application software.
authentication server
A server that keeps track of who is logging on to the network and which services on the network are available to each user.
cloud server
Servers that are maintained by hosting companies and are connected to networks via the Internet.
communication server
Handles all communications between the network and other networks, including managing Internet connectivity.
database server
A server that provides client computers with access to information stored in databases.
dedicated server
A server used to fulfill one specific function, such as handling e-mail.
e-mail server
A server with the sole function to process and deliver incoming and outgoing e-mail.
file server
A server that stores and manages files for network users.
network operating system (NOS)
Special software that needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.
print server
A server that manages all client requested printing jobs for all printers on a network, which helps client computers to complete more productive work by relieving them of printing duties.
print queue
A software holding area for print jobs. When the print server receives a job (a printing request) from a client computer, it puts the job into a print queue on the print server.
web server
Used to host a website so it will be available through the Internet.
Which type of server is designed to keep track of who is logging on to the network and which network services are available?
Authentication
A school network might use a(n) _____ server to store software such as Microsoft Office.
Application
All of the following are considered dedicated servers EXCEPT ____
internal servers
A company would use a(n) _____ server to provide internet-based information.
web
Servers such as print and database are examples of ___ servers that fulfill a specific network function
dedicated
Instead of maintaining a local server, a company may decide to use a(n) ____ server that is maintained by a hosting company and is connected to the network via the internet.
cloud
A ____ server provides client computers with access to stored information
database
A(n) _____ server handles all messaging between a network and other networks, including internet connectivity.
communications
In a network, ____ servers preform specific tasks such as handling e-mail or managing files.
dedicated
A(n) ____ server is used to host an internet site
web
When working with a(n) ____ network, special network operating system (NOS) software may have to be installed on all computers.
client/server
_____ servers can act as overseers for the network, and they manage and coordinate the services that are available to each user
Authentication
The software holding area for print jobs is called a print ____
Queue
A(n) ____ server acts as a repository for software such as Microsoft Office.
application
Keeps track of user logins to the network and which services are available to each user
authentication server
Hosts websites that can be accessed via the internet
web server
processes and delivers incoming and outgoing e-mail
e-mail server
allows client computers to access a database
database server
acts as a repository for software such as Microsoft Office
application server
All of the following network topologies were discussed in the Sound Byte EXCEPT __________.
mesh
An example of a network navigation device is a __________.
router
A bus network in which attached devices cannot move data along the bus is referred to as a(n) __________ topology.
passive
Which of the following is NOT an advantage of star networks?
They are cheap to expand.
All of the following are weaknesses of the bus topology EXCEPT __________.
it is expensive to implement
When using a bus topology, to prevent signals from bouncing back to computers that have already received the signal, a __________ is used.
terminator
Tokens are used in a token ring network to ________.
prevent data collisions from occurring
Star topology is considered a(n) __________ topology.
active
Data in a ring topology network __________.
flows in one direction only
A __________ is specifically designed to transfer data between collision domains.
bridge
What distinguishes a router from some of the other network components?
Routers make connections between networks like your home network and the Internet.
List two examples of configuration table information.
Information on which connections lead to particular groups of addresses Priorities for connections to be used Rules for handling both routine and special cases of traffic
Internet data is transmitted in packets, and routers use some of the information in a packet to route the data to the correct recipient. List the four packet components mentioned on the website.
Information on the sender’s address, the receiver’s address, the package’s place in the entire message, and how the receiving computer can be sure that the package arrived intact.
What are the advantages of networking?
Networking enables one computer to send information to and receive information from another. A network enables the sharing of devices such as printers, scanners, fax machines, storage devices, and so on.
What are some examples of common, everyday uses of networks?
There are many types of networks surrounding us including the Internet, automatic teller machines (ATMs), and local phone lines.
Define the following Ethernet terms:
Medium: Usually fiber-optic or twisted pair cabling used to provide a path for electronic signals Segment: A single-shared medium Node: A device that attaches to a segment; also called a station Frame: Short messages the nodes use to communicate; variably sized chunks of information
What is a repeater?
A repeater connects multiple Ethernet segments. Each signal on a segment is listened to by the device and then repeated by the repeater. This is used to increase the diameter of a network.
What is a bridge?
A bridge connects two or more network segments, increasing the network diameter as a repeater does, but bridges also help regulate traffic.
What is a router?
A router is an advanced networking component that can divide a single network into two logically separate networks.
Ethernet is similar to what IEEE standard?
802.3
The different array of computers, peripherals, and media is called network _____
topology
In the ____ topology, devices are connected together through a central switch.
star
Which of the following statements about ring topology is TRUE?
Data only flows in one direction
The purpose of a token in a token ring network is to ____
prevent data collisions from occuring
All of the following are network topologies EXCEPT ____
switch
All of the following are problems with the bus topology EXCEPT ____
it is expensive
In a ____ topology, all computers are connected in a line on a single cable run
bus
All of the following are navigation devices to move data around or between networks EXCEPT _____
spans
Connecting computers on a single line is called a(n) ____ topology
bus
A(n) ____ transfers data between collision domains
bridge
A(n) ____ sends data between two networks
router
____ are called smart hubs, because the retransmit signals only to the devices that need to receive them
switches
The ____ topology uses tokens to control data transmission
Ring
A repeater moves data between two networks
False
In a bus topology, only the device for which a signal is intended can hear the sent data signal
False
In the ring topology, data flows around the circle in one direction only.
True
In ring topology, a device grabs the token when it needs to send data.
True
The main advantage of a ring topology is that the failure of one computer does not affect the entire network
False
data collision avoidance method
CSMA/CD
special data packet
token
network device
node
protocol most commonly used on star networks
Ethernet
directs signals to the intended device
switch
One typical characteristic depicted in a day in the life of a technician would be __________.
a lot of face-to-face interaction with people
Computer help desks often prioritize problems based on __________.
by importance
In the Sound Byte, the first thing a technician checked as part of a daily routine was __________.
the help desk problem database
The ranking of network problems by importance is usually determined by the ________.
number of affected users
Some typical problems discussed in the Sound Byte that a network technician might need to solve include all of the following EXCEPT __________.
writing computer manuals
It can be difficult to fix a wireless connectivity problem because __________.
it might be difficult to replicate the problem
A quick way to deploy software to a large number of computers is to __________.
use “ghosting” software to copy the image of one computer to another
To remain current with fixes to problems, the Sound Byte suggests that technicians should do all of the following EXCEPT ________.
pursue an advanced degree
Which of the following possible negative aspects of working as a technician was NOT discussed in the Sound Byte?
Having to work mandatory overtime
The Sound Byte suggests a network technician needs all of the following EXCEPT __________.
anger management
A network technician can expect each of the following EXCEPT ____
the same challenges every day
the help desk database are ranked
by importance
The ranking of network problems by importance is usually determined by ____
number of users affected
Which of the following statements about using ghosting software is false?
it is difficult to use
Which of the following is not an advantage of installing a network in a business?
decentralization of files and data
Why are client/server networks usually installed in businesses?
They are more scalable than P2P networks.
To manage authorized connections to the internal network, which server would a client/server network include?
authentication
Which type of network topology is most popular?
star
A network consisting of two LANs separated by great physical distances is known as a:
WAN
Which of the following is used to increase security on a client/server network?
bastion host
Fiber-optic cable most likely would be used in a business network when
electrical or magnetic interference is present.
NOS software is needed
on all computers in a client/server network.
On client/server networks, bridges
route data between two collision domains on a single network.
Correctly entering the user ID and password on your college network is an example of
authentication.
A(n)____________ server is used to fulfill one specific function on a network.
dedicated
What allows the exchange of large amounts of business data in a standardized electronic format?
Electronic data interchange
The __________is often the only device on the network connected to the Internet.
communications server
In a(n) ____________ topology, all computers are connected in sequence on a single cable.
bus
In a ____________ network, failure of one computer does not affect other computers on the network.
star
What do ring networks use to avoid data collisions?
Token method
What manages all client-requested printing jobs for all printers on a network?
Print server
Which network is a combination of two or more LANs connected together over long distances?
WAN
_______ means that more users can be added to a network easily without affecting the performance of the other network nodes.
Scalability
A ____________ is designed to send information between two networks.
router
A brute force attack is an attempt to access an account by:
repeatedly trying different passwords.
More personnel are usually required to maintain business networks than stand-alone computers.
True
An e-mail server usually routes all its traffic to and from the server through a communications server.
True
Facial recognition and palm prints can be defined as biometric authentication devices.
True
A database server acts as a repository for application software.
False
In tunneling, data packets are placed inside other data packets.
True
Network operating systems need to be installed only on one client computer in order to “talk” to the entire network.
False
The three main cable types used in business networks are twisted-pair, coaxial, and electromagnetic cable.
False
Most home networks use unshielded twisted-pair cable that does not have foil shielding
True
Network topology refers to the physical or logical arrangement of computers, transmission media, and other network components.
True
Bus topology networks are becoming the most common type of network due to its efficiency.
False
An extranet allows for the exchange of large amounts of business data in a standardized electronic format.
False
A VPN uses the public Internet communications infrastructure to build a secure, private network among various locations.
True
Bridge
A device that is used to send data between different collision domains, depending on where the recipient device is located.
Switch
Makes decisions as to where the data is to be sent and rebroadcasts it to the appropriate network node.
Packet
Small segment of data transmitted via a network.
Terminator
A device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it.
Fiber-optic cable
Composed of glass or plastic fiber.
Shielded twisted-pair (STP)
Copper wire cabling with a foil shielding to reduce interference.
Coaxial cable
Still used in some manufacturing facilities where machinery creates heavy electrical interference.
Unshielded twisted-pair cable (UTP)
Used by most home networks.
Which of the following is an advantage of installing a client/server network in a business?
centralization of network security protection
Why are P2P networks not usually installed in businesses?
security is stronger on client/server networks
To ensure only authorized users are logging onto a network, which server would a client/server network include?
authentication
Which of the following is a private network setup by a business that’s used exclusively by a select group of employees and suppliers?
Intranet
Network adapters send data packets based on a(n)
MAC address
Providing adequate security on a corporate network involves all of the following except
proprietary software lockout
Client/server networks are generally more secure than P2P networks
True
A communications server is used to host websites on a client/server network
False
Switches are used to route data between two different networks
False
Most modern operating systems include some type of NOS functionality
True

Get instant access to
all materials

Become a Member