A ________ is a group of two or more computers, or nodes, designed to share information and resources.
In a ________ network, each node connected to the network communicates directly with every other node.
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
A(n) ________ address is the address that external entities use when communicating with your network.
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
A(n) ________ server is a heavily secured server located between a company”s secure internal network and its firewall.
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
________ means that additional users can easily be added without affecting the performance of the other network nodes.
Read more: wow addon healers have to die
A(n) ________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters.
A(n) ________ is an area of an intranet to which only certain corporations or individuals can access.
A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet.
Because of its centralized design, a(n) ________ topology is the simplest to troubleshoot and repair.
Fluorescent lights and machinery with motors or transformers are common sources of ________ emissions.
________ interference is a type of network interference for cable transmission media that can be caused by nearby television or radio signals.
A(n) ________ provides wireless devices with a sending and receiving connection point to the network.
A(n) ________ is a device that reads information from a magnetic strip on the back of a credit card-like identification card.
________ is the process that requires users to prove that they have permission to access a computer network.
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
In a client/server network, each network node communicates directly with every other node on the network.
Transmission media comprise the physical system that data take to flow between devices on the network.
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
DeutschEnglish (UK)English (USA)EspañolFrançais (FR)Français (QC/CA)Bahasa IndonesiaItalianoNederlandspolskiPortuguês (BR)РусскийTürkçeTiếng Việt한국어中文 (简体)中文 (繁體)日本語