Network ______________ _______________ (NIC) is installed in your computer to connect, or interface, your computer to the network. It provides the physical, electrical, and electronic connections to the network.
__________ _______________: These are used to transport use…
__________ _______________: These are used to transport user data through the internetwork. Protocols used to support data traffic are called routed protocols.
_______________ connect multiple segments of a network toge…
_______________ connect multiple segments of a network together much like hubs do, but with three significant differences—as it recognizes frames and pays attention to the source and destination MAC address
________________ ___________________ Protocol Secure (HTTPS…
________________ ___________________ Protocol Secure (HTTPS) is a secure version of HTTP that arms you with a whole bunch of security tools for keeping transactions secure between a web browser and a server.
Routing ____________________ is the time required by the r…
Routing ____________________ is the time required by the routing protocols to update the routing tables (forwarding tables) on all routers in the network.
Secure ____________ ____________ Protocol (SFTP) is used w…
Secure ____________ ____________ Protocol (SFTP) is used when you need to transfer files over an encrypted connection. It uses an SSH session (which was previously covered), which encrypts the connection, and SSH uses port 22
The router learns about remote networks from neighbor router…
The router learns about remote networks from neighbor routers or from an administrator. The router then builds a __________ ____________(a map of the internetwork) that describes how to find the remote networks.
If you were to implement a Map using a balanced binary searc…
If you were to implement a Map using a balanced binary search tree, what would be the worst-case running time (big O) to look up a key?
Port numbers are used at the Transport layer to identify the…
Port numbers are used at the Transport layer to identify the local host in this example. If we had to use IP addresses to identify the source hosts, that would be called ____________ ____, and we would run out of addresses.
A nurse is caring for a 28-year-old client who reports incre…
A nurse is caring for a 28-year-old client who reports increased stress related to balancing work and family responsibilities. Which of the following interventions should the nurse implement?