The _________topology consists of two distinct and terminated ends, with each of its computers connecting to one unbroken cable running its entire length.
The local school district decided at its last school board m…
The local school district decided at its last school board meeting to install a wired LAN in the district high school. The high school has 250 stand-alone computers. For each computer to communicate on a wired LAN, the network person must install a(n) ____________ in each computer.
_________________________ are used at the Data Link layer…
_________________________ are used at the Data Link layer to encapsulate packets handed down from the Network layer for transmission on a type of physical media access.
The _____________________discovers the identity of the IP ad…
The _____________________discovers the identity of the IP address for diskless machines by sending out a packet that includes its MAC address and a request for the IP address assigned to that MAC address.
the _________________________ does two important things: it…
the _________________________ does two important things: it sends bits and receives bits.
A_________________(a map of the internetwork) describes how…
A_________________(a map of the internetwork) describes how to find the remote networks. If a network is directly connected, then the router already knows how to get to it.
A_______________________ uses aspects of both distance vect…
A_______________________ uses aspects of both distance vector and link state, and formerly, EIGRP was the only one you needed to understand to meet the Network+ objectives.
A_______is one binary digit, either a 1 or a 0.
A_______is one binary digit, either a 1 or a 0.
_____________ is a virtual terminal protocol utility that a…
_____________ is a virtual terminal protocol utility that allows you to make connections to remote devices, gather information, and run programs.
The __________ takes large blocks of information from an ap…
The __________ takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment so that the destination’s process can put the segments back into the order the application intended.