Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
56 Cards in this Set
- Front
- Back
- 3rd side (hint)
What are the 3 parts of a bus? |
Data bus, control bus, address bus |
Dac |
|
True or false; mass storage devices do not retain data when the computer is turned off. |
False |
|
|
___ is a series of computer devices or nodes interconnected by communication paths. |
Network |
"connected" |
|
A(n)___ is set of rules for that enables two computers to talk to each other. |
Protocol |
|
|
A system of linked networks that are worldwide in scope and facilitate data communication services that permit access to the world Wide Web and email. |
Internet |
|
|
The internet protocol uses unique addresses, simply called ___ addresses, to identify computers or devices in a network. |
IP |
|
|
___ is the division of a network into groups of computesr that have a common, designated IP address routing prefix. |
Subnetting |
|
|
The ___ IP address is an ode (a router) on a TCP/IP network taht serves as an access pointo t another network. |
Gateway |
|
|
The Internet protocol uses unique addresses, simply called___ addresses, to identify computers or devices in a network. |
Ip |
|
|
___ is the division of a network into groups of computers that have a common designated in address routing prefix. |
Subnetting |
|
|
The___ Ip address is a node (a router) to on a TCP/Ip network that serves as an access point to another network. |
Gateway |
|
|
The___ Ip address of the server provides domain name resolution. |
Dns |
"domain name resolution" |
|
A VPN (virtual private network) uses a technique known as___ to transfer data securely on the Internet to a remote access server on your workplace network. |
Tunneling |
"venomous penis 'nimal" |
|
The homegrown is protected with a(n)___ so you can always choose what you share with the group. |
Password |
|
|
To access the share in Linux, you must___ the share. |
Mount |
|
|
True or false: The Internet protocol suite network layer allows the Ip to transfer packets across a link. |
True |
|
|
Using UNC notation requires that you know the name or___ of the server and share. |
IP address |
|
|
POP3 (post office protocol 3) operates in the___ layer of the Internet protocol suite |
Application |
|
|
You can join an existing Windows network workgroup, by default called___ or you can create a new one. |
WORKGROUP |
|
|
Linux provides peer to peer networking with___, which is based on the common client/server protocol of server message block (Smb) |
Samba |
|
|
One way to view some of the Linux IPv4 settings is to use the___ command in a terminal window. |
Ifconfig |
|
|
True or false: In the absence of DHCP, all hosts on a network must be manually configured with static Ip addresses. |
True |
|
|
___ inherence occurs when you create or copy a sub folder or a file and the sub folder or file inherits the permissions of the parent folder by default. |
Permission |
|
|
For windows, only___ permits user accounts and user groups to be linked to folder and file permissions |
NTFS |
|
|
NTFS permissions are___ when a file or folder is moved or copied to a fat 16 or fat 32 formatted partition |
Removed |
|
|
Which fedora 13 file and directory permission provides dead and execute authority? |
R-x |
|
|
Which windows shared folder permission allows you to change file permissions and take of ownership of the file resources? |
Full control |
|
|
Used for sending and receiving email |
SMTP |
|
|
Provides a basis for file and printer sharing. |
Workgroup |
|
|
Allows web users to request web sites from remote servers |
HTTP |
|
|
The main networking protocol that allows for the communication of data across a network. |
Internet protocol |
|
|
Has become a central idea of networking |
Client/server model |
|
|
Makes it easy to share your libraries and printers on a home network |
Homegroup |
|
|
A computer networking protocol used by hosts (DHCP clients) to retrieve IP address assignments and other configuration information |
DHCP |
|
|
Allows for the rapid transfer of files across the web. |
FTP |
|
|
A private network that uses Internet type applications, but is a available only within a single organization. |
Intranet |
|
|
In Windows, the___ provides summary information for your computer |
System information tool |
|
|
___ cookies are deleted when you close your browser |
Local |
|
|
In a web browser, you can move from one web page to another by clicking___ |
Hyperlinks |
|
|
True or false: Linux provides a system information tool that resembles the one J windows |
True |
|
|
When running Internet Explorer, by default all web sites into the Internet zone are guarded with a___ level of security |
Medium-high |
|
|
You exchange certificates with servers using a secure transmission protocol, which provides____ and unaltered information |
Encrypted |
|
|
A(n)___ acts as a protective boundary between the internal networks and the outside world |
Firewall |
|
|
When using a web search engine, use the___ character to include other keywords that you would expect to find relevant documents. |
+ |
|
|
You can set up security___ from the security tab of the Internet options dialog box |
Zones |
|
|
Each page on a web is designated by an Internet address known as a(n) |
URL |
|
|
Most applications are___ to reduce size of the setup file. |
Compressed i |
|
|
Takes you to a different URL that indicates a different location in the web |
Hyperlinks |
|
|
Small files that collect and store personal information about you and your web surfing preferences |
Cookies |
|
|
Acts as intermediaries between computers and the Internet, and filter access to websites |
Proxy server |
|
|
Investigates the identity for organizations and people who obtain certificates |
Certification authority (ca) |
|
|
a scripting language that enables interactive functionality in web pages. |
Javascript |
|
|
A highly capable, feature rich programming language |
Perl |
|
|
A software program that you use to access and navigate the wrb |
Web browser |
|
|
By default, the recycling bin can only hold___ percent of the hard drives capacity |
10% |
|
|
Which windows Explorer control allows you to connect a drive letter to a shard resource on another computer |
Map network drive |
|