Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. User watching an episode of TV show over the internet is what kind of communication






2. Zeroconf






3. Faster wireless standard 20-25






4. Transport Layer






5. Hardware device typically used to connect multiple LANs






6. Layer 3 Troubleshooting






7. Modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal






8. Large networks 1-126






9. Slow wireless standard 11-18 throughput






10. This layer in the OSI network model breaks up the files into packets to allow them to be sent around the network.






11. BERT






12. LPD






13. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la






14. IMAP - internet message access protocol






15. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer






16. Device that enables networks or segments using different media to interconnect and exchange signals






17. Secure Shell






18. Name Of Layer 3






19. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times






20. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.






21. A network on which any computer can communicate with other networked computers on an equal (peer) basic without going though an intermediary - such as a server. Peer-to-Peer networking enables each computer to offer and access shared resoures - such






22. Frequency Division Multiple Access






23. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.






24. Secure CoPy-utility that allows you to copy files securely from host to another






25. Protocol data unit






26. Ppp tunneling protocol






27. Wireless standard






28. Power loss - the amount of signal that is lost as it travels though the communication medium from the source (transmitting node) to the receiving node.






29. SSH - secure shell






30. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.






31. A process in which a digital signature is placed in a driver. The digital signature helps ensure that the driver is tested and is compatible with the operating system and device for which it is written.






32. The process of validating a user.






33. The capacity to send and receive signals at the same time on the same medium.






34. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations






35. Telnet






36. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances






37. A computer on a network that requests services or resources from another computer on a network






38. What early protocol allows users to access machines remotley that has no security implemented within it?






39. RSA






40. MAC Protocols






41. Hardware that constitutes the enterprise-wide cabling system






42. IP






43. FTP is an application that enables the transfer of data from one remote device to another - using TCP/IP






44. The _____________ allows certain bits of the IP address to be ignored when checking to see if an IP address matches the destination network address.






45. Application layer protocol that formulates and interprets requests between Web clients and servers






46. LPR






47. Prevents two nodes transmitting at the same time






48. What does POP3 stand for?






49. Encompasses actions an organization takes when intrusion is detected






50. 1000 representatives from industry and gov't who determine standards for electronics - chemical and nuclear engineering - health and safety - and construction