1,712
25
Essay, 3 pages (550 words)

Hardware chapter 15

IP AddressWhat is the name of a 32-bit or 128-bit number that is used to identify a device? PublicHow are IP addresses available to the Internet classified. dynamicWhich type of IP address is configured by a server when a device first initiates a connection to the network. subnet maskWhich is used to identify the network portion and the host portion of an IP address. ipconfigWhich command can be used to display TCP/IP configuration information and refresh the IP address. unicast addressBy using this type of address, packets are delivered to a single node on a network. TCPWhich protocol make a connection, checks whether the data is received and resets it if its not? virtual private networkThe solution for securing private data traveling over a public network such as the internet is a? Server Message Block (SMB)Which TCP/IP protocol is used by Windows to share file and printers on a network? Windows Network DiagnosticsWhich utility can be used to automatically diagnose a problem with a network connection? Alternate ConfigurationIf the computer you are using is a laptop that moves from one network to another, you can click this tab and configure a static IP address setting for a second network. SSIDWhat is used to identify a wireless access point? firewallWhat type of device can be used to block unwanted traffic initiated from the internet and can also restrict Internet access from an internal network? static IP addressWhat type of IP address should be configured on a wireless access point so that it can always be located by the devices that it serves? port filteringWhat is it called when a router is configured to open or close certain ports so they can or cannot be used? 5 GHzWhich wireless network radio frequency yields faster speeds but offers shorter range. packetsBefore data is transmitted on a network, it is broken into what? hardwareCommunication between two computers happens on what three levels (layers) and these levels include the application, operating system and what? Host NameWhat is another name for the name of a computer and can be used in place of a IP address? hostThe first part of an IPv4 address identifies the network, what does the last part identify? port forwardingUsing this, when a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer on the network. port triggeringWhen a firewall opens a port because a computer behind the firewall initiates communication on another port. ipconfigA command that can be used to display the TCP/IP configuration. Lightweight Directory Access Protocol (LDAP)A protocol used various client applications when the application needs to query a database. DHCP serverAssigns an IP address to a computer when it first attempts to initiate a connection to the network. workgroupA group of computers on a peer-to-peer network that are sharing resources. Secure Shell (SSH)Protocol used to pass login information to a remote computer and control that computer over a network. Wi-Fi Protected Setup (WPS)Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used. subnet maskUsed by a computer or other device to determine if an IP address of another computer is on its network or another network. virtual private networkA security technique that uses encrypted data packets between a private network and a computer on the Internet. Network Address TranslationA protocol used to convert private IP address on a LAN to a public IP address before a data packet is sent over the Internet. ONHARDWARE CHAPTER 15 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Hardware chapter 15. Page 1
Hardware chapter 15. Page 2
Hardware chapter 15. Page 3

This work, titled "Hardware chapter 15" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Hardware chapter 15'. 27 July.

Reference

AssignBuster. (2022, July 27). Hardware chapter 15. Retrieved from https://assignbuster.com/hardware-chapter-15/

References

AssignBuster. 2022. "Hardware chapter 15." July 27, 2022. https://assignbuster.com/hardware-chapter-15/.

1. AssignBuster. "Hardware chapter 15." July 27, 2022. https://assignbuster.com/hardware-chapter-15/.


Bibliography


AssignBuster. "Hardware chapter 15." July 27, 2022. https://assignbuster.com/hardware-chapter-15/.

Work Cited

"Hardware chapter 15." AssignBuster, 27 July 2022, assignbuster.com/hardware-chapter-15/.

Get in Touch

Please, let us know if you have any ideas on improving Hardware chapter 15, or our service. We will be happy to hear what you think: [email protected]