Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
52 Cards in this Set
- Front
- Back
A program that controls a printer.
|
Printer driver |
|
A software application, network device or computer that can process print-related jobs on a network.
|
Print server |
|
Term that refers to placing jobs of any type into a buffer where another device can access them when it is ready. |
Spooling
|
|
The most common spooling application
|
Print spooling |
|
True/False In a small network environment it is acceptable for each client to connect directly to the printer. |
True |
|
For example: a "printer" that also scans, sends emails, photocopies, and faxes. |
Multi-Function Device (MFD) |
|
What's the easiest way to set up a printer on your server?
|
Use the "Add Printer Wizard" |
|
What is the most common type of network cabling used in homes and businesses?
|
"Twisted Pair" style
|
|
True/False Ethernet is another word for a twisted pair cable. |
The term Ethernet is actually an IEEE specification. It defines how data is to be sent through a wide range of cables, to include twisted pair. |
|
What is the oldest cable standard still in use? |
Coaxial network cable |
|
What cable is extremely durable and highly resistant to both Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI)?
|
Coaxial network cable
|
|
In regards to 10base5, What is its speed? Type of network? Max segment length before you'll need a repeater? |
10base5 Speed - 10Mbps Network - Baseband Max segment length - 500 meters (see page 55 for further explanation) |
|
Twisted pair transmission cables consist of ____ twisted pairs of _____ transmission wires (____ total wires) wrapped around each other, cushioned by and concealed within a thin, _____ housing.
|
Twisted pair transmission cables consist of four twisted pairs of copper transmission wires (eight total wires) wrapped around each other, cushioned by and concealed within a thin, plastic housing.
|
|
What IEEE standards define 10baseT, 100baseT, and 1000baseT twisted pair cables?
|
10baseT - 802.3i 100baseT - 802.3u 1000baseT - 802.3ab |
|
What are the two subcategories of Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) cables? |
Category 5e & Category 6 |
|
____ ____ _______ is a new technique for spinning internal cable wires, this method of creating transmission lines is considerably less expensive for manufacturers (aluminum is abundant, while copper is not).
|
Copper-Clad Aluminum (CCA)
|
|
____ ____ _______ cables are more brittle than copper cables, and do not conduct as well. For this reason, Cat6 requires the use of _____-_____ _____ transmission lines.
|
Copper-Clad Aluminum (CCA); solid-core copper
|
|
True/False Copper-Clad Aluminum (CCA)-constructed cable cannot be accurately labeled Cat6. |
True
|
|
Originally made of glass and extremely fragile, modern ____ ____ cables are flexible, due to internal construction with _____ optical fibers. Each cable is actually a pair of cables, one to ______, and one to _____. |
Originally made of glass and extremely fragile, modern fiber optic cables are flexible, due to internal construction with plastic optical fibers. Each cable is actually a pair of cables, one to transmit, and one to receive. |
|
Advantages of Fiber Optic Cables
|
- Broadband communications (multiplexer) - Immunity to EMI and RFI - Security |
|
What are the four most common fiber optic cable connectors? |
1) Ferrule Connector (FC) 2) Lucent (LC) 3) Subscriber (SC) 4) Straight Tip (ST) |
|
What are the three factors that impact Network connectivity?
|
2) Improper Handling 3) Bandwidth Issues |
|
A ____ allows the direct connection of a host to a network.
|
Network Interface Card (NIC) |
|
The NIC provides a workstation with a unique identification number called the _____ ______. |
Physical address (also known as the MAC address) |
|
True/False A NIC is limited physically, electronically, and functionally by the type of network it is connected to. |
True |
|
What are the keys to maintaining a problem-free network and the ability to isolate and fix a network fault quickly?
|
Documentation, planning, and communication!
|
|
_____ is a Windows utility used to display information about the TCP/IP configuration of local computers. With this command, you can get info about the IP address, subnet mask, and default gateway. |
Ipconfig
|
|
When you use the ipconfig command with the ____ options, a detailed configuration report is produced for all interfaces, including any configured serial ____.
|
/all ports |
|
Protocol used to automatically assign IP addresses to workstations.
|
DHCP |
|
"ipconfig /all" line-by-line explanation: ____ ____ is used to identify the computer. ___ _____ is the IP address of the DNS server. This will resolve human-friendly names into IP addresses. |
Host name DNS Servers |
|
"ipconfig /all" line-by-line explanation: ______ describes the Ethernet adapter type. _____ ____ describes the NIC MAC address. ____ _____ specifies if automatically assigned IP addresses is enabled. |
Description Physical address DHCP enabled |
|
"ipconfig /all" line-by-line explanation: ______ _____ specifies if workstation has an automatically assigned private IP address (APIPA) __ ______ identifies the "logical" address |
Autoconfiguration enabled IP address |
|
"ipconfig /all" line-by-line explanation: ____ ____ distinguishes network portion of IP address from the host portion. ____ ____ is the IP (logical) address associated with router interface that is connected to LAN |
Subnet mask Default gateway |
|
"ipconfig /all" line-by-line explanation: ____ ____ specifies IP address of DHCP Server. ___ ____ specifies IP address ofWindows Internet Name Service (WINS). Legacy, rarely used. _________ specifies lease period for IP address and related TCP/IP configurationinfo |
DHCP Server WINS Server Lease Obtained/Expires |
|
If the computer is DHCP-enabled and is using a DHCP server to obtain an IP address, you can immediately release that IP address back to the server by using the __________ option.
|
ipconfig /release |
|
This command will pull an available IP address from the DHCP server.
|
ipconfig /renew |
|
A utility that will verify a connection to remote hosts. Uses echo request/reply packets to determine whether a particular IP system on a network is functional.
|
Packet Internet Groper (PING) command |
|
Use ____ whenever you need to verify that a host computer can connect to the TCP/IP network and network resources.
|
PING |
|
If unable to PING remote host, you should perform what three steps? |
2) Ping IP address of default gateway to verify its functioning 3) Ping IP address of a remote host |
|
A route-tracing utility that not only verifies connections to a remote host but can also determine the path an IP packet takes to reach a destination.
|
Trace Route (tracert) |
|
The tracert command uses the IP _______ field and error messages to determine the route from one host to another through a network.
|
Time-to-Live (TTL)
|
|
Tracert will stop after ___ hops, or when the remote destination is _____.
|
30; reached |
|
You can use the _____ command to determine where an IP packet stopped on the network.
|
tracert
|
|
The _____ utility manipulates network routing tables. This utility works best on a network with _____ gateways. |
route multiple |
|
A command line tool that displays TCP/IP statistics and active connections to and from a computer.
|
Netstat |
|
The _____ command is used to display the Address Resolution Protocol (ARP) cache.
|
Address Resolution Protocol (ARP)
|
|
This command tracks the location of the various computers that were previously communicated with. It generates a table of entries that consists of logical (IP) addresses with their corresponding physical (MAC) addresses.
|
Address Resolution Protocol (ARP)
|
|
In PowerShell, what command would you enter in order to view the Address Resolution Protocol (ARP) cache?
|
arp -a
|
|
In troubleshooting, what are three ways to provide fault tolerance?
|
1) Use of Uninterruptible Power Supplies (UPSs) to safeguard workstations/critical servers 2) Frequently back up data or save work 3) Develop plans/procedures to preserve/restore critical devices/systems |
|
In troubleshooting, the key point is to attack problems in a ______, ______ manner.
|
consistent, logical |
|
What are two basic actions to always do when troubleshooting?
|
2) Reboot and/or physically unplug machine for a few seconds after shutting down. |
|
Multiple computers that have the same problem usually point to what?
|
A network error
|