Chapter 1; Introduction to Networks

1234567891011121314151617181920
Across
  1. 2. The type of computer whose primary role in the network is to give client computers access to network resources and services. The computers that most often fit this description are usually in the IT room or locked away in a closet.
  2. 6. Information added to the back end of a chunk of data so that the data can be correctly interpreted and processed by network protocols.
  3. 8. The acronym for a type of low-power memory that is used to store configuration information for a PC.
  4. 9. A collection of users and computers in a server-based network whose accounts are managed by Windows servers called “domain controllers.”
  5. 11. A type of computer memory in which continual electrical power is required to maintain the data stored in it.
  6. 13. A chunk of data sent over a network containing source IP address, a destination IP address, and other IP protocol.
  7. 14. A private network that allows limited and controlled access to internal network resources by outside users, usually in a business-to-business situation.
  8. 17. A collection of wires that carry data from one place to another on a computer’s motherboard.
  9. 18. The prefix used to measure data that indicates a Billion bytes.
  10. 19. The type of CPU containing two or more processing cores.
  11. 20. A network model in which all computers can function as clients or servers as needed, and there’s no centralized control over network resources.
Down
  1. 1. A computer program stored in nonvolatile memory that is executed when a computer is first powered on.
  2. 3. The process of adding IP addresses and then MAC addresses to chunks of data, either at the front or the end.
  3. 4. A component on a motherboard that controls data transfers between memory, expansion slots, I/O devices, and the CPU.
  4. 5. _____ protocols.The software defining the rules and formats a computer must use when sending information across a network.
  5. 7. OS The OS installed on a computer that is designed mainly to access network resources, even though it might be capable of sharing its own. Mac OS and Windows 10 fit this description.
  6. 10. A networked collection of LANs tied together by devices such as routers.
  7. 12. ____ Service. The software that manages centralized access and security in a server-based network.
  8. 15. The term for the username-password pair that must be given to access a computer on a network.
  9. 16. A packet with source and destination MAC addresses added and an error-checking code added to the back end. Frames are generated and processed by the network interface.