Just For Fun Quiz / Computers Networks

Random Just For Fun Quiz

Can you name the Computers Networks?

 Plays Quiz not verified by Sporcle

Support Sporcle.
Go Orange.
Score 0/123 Timer 10:00
a computer that shares its resources across the network. It responds to requests for informatin by providing the requested information to the requesting computer.
a computer that accesses shared resources. It requests information from another computer
usually refers to the cabling (metallic or fiber optic) that links computers on a network. It can also describe wireless networking
to access any network, computers must attach to the network medium with a physical interface
establishes and manages the computer's network connection. It packages all the bits into orderly collections called packets.
physical address for each node on a ethernet network is called___. it is set in the hardware of the NIC.
the logical address for each node on an ethernet network
permits a network adapter to communicate with a computer's operating system
the sets of rules for communicating across a network
carries signals that represent messages between the nodes
messages that are broken into smaller units. They can take turns using the channel, allowing sharing of the channel for different messages.
The communication channel is actually divided into segments, or _, with intermediate nodes between them that forward packets from one to the next.
A channel that carries messages in only one direction is known as a _ channel. Television broadcasting systems use this type of channel.
A channel that carries messages in both directions, but only one direction at a time is known as a ___ channel. An example of a device that uses this type of communication channel
A channel that carries signals simultaneously in both directions is known as a __ channel. An example of a device that uses this type of communication channel is a telephone call.
The ___ describes the fundamental layout used to interconnect the nodes in a local area network.
topology describes the cabling scheme of the network.
topology describes the data flow on the network between the individual nodes.
topology, there are multiple paths between the end nodes of each computer.
topology, a series of computers are connected along a single cable segment.
topology, computers are connected to form a loop. This topology uses a MAU.
topology, computers are connected via a central concentration point (hub or switch).
In a ring topology, all of the computers on the network are connected by cable segments to a central __. It contains an active interface for each node.
in a ring topology, the signals use a ___to travel in one direction around the ring
the channel access method (data getting on the network) on a ring topology that uses a token
A ring topology consists of a __ connection from each node on the network to the next. The last node is connected to the first to form a closed ring.
With the __ topology, the network is controlled by a central station that acts as a steering device, passing data from one node to another node as data is required. Each computer i
is a central point of concentration for a star network. It passes electronic signals to computers on the network.
hub in a star network regenerates the signals as it receives them and sends them along. It generally has many ports and is sometimes called a “multiport repeater”
is a special networking device that manages network connections between any pair of star-wired devices on a network. It organizes a group of devices into virtual LANs
is sometimes referred to as the network’s logical topology. It describes the network’s logical connections between nodes, rather than its physical connections.
is a component of a network’s logical topology that determines how connections are created between nodes.
switching is a type of network transport system in which the connection is established between two network nodes before they begin transmitting data. Data travels the same path in
switching is a type of network transfer system in which a connection is established between two devices in the connection path. One device transfers data to the other, then breaks
switching is a type of network transfer system in which the data are broken into packets before they are transported. These packets can travel any path on the network to their des
appears to the outside world as a single computing unit. Individual nodes are administered as part of the cluster and are not identifiable or individually accessible from the outsi
are individually identifiable and addressable. The workload in a network cannot be controlled in the same way because each node has its own access to the outside world.
is a collection of computers and other networked devices that fit within the scope of a single physical network. They provide the building blocks for internetworks and WANs.
network is used to interconnect local area networks. It can tie several local area networks together to provide for the passage of data between the individual networks and from the
is usually defined as a network larger in geographical scope than a local area network, but generally within a range of less than 30 miles or 50 kilometers. It would be used to con
Metropolitan area network 
consists of a number of interconnected local area networks operating over a limited geographic region consisting of several buildings clustered together such as on campus.
is a network designed to facilitate communications between users and applications over large distances. It is also referred to as internetworking because it ultimately represents
any computer can function as either a client or a server. No one computer has any higher priority to access shared resources on the network than another computer.
certain computers take specialized roles and function mostly as servers while other ordinary users’ machines tend to function mostly as clients.
supply the server side of client/server applications, and often the data that goes along with them, to network clients
handle the logon services and manage the collection of computers, users, etc. in a domain.
are the most common type of network servers. They provide basic networked file storage and retrieval services and access to networked printers. They also let users run applications
manage the flow of e-mail messages for network users. They commonly provide “store-and-forward” services.
are the combination of hardware and software that stores information that is accessible over the Internet via the World Wide Web.
model was proposed by the International Standards Organization (ISO) and is widely used. It supplies important network terminology.
is an influential set of networking standards and/or specifications. It encompasses most types of networking and is open-ended which allows the addition of new types of networks.
provide the software that enables computers to communicate across a network.
Data is broken into packets or payloads, called __, as it moves down the stack.
layer of the OSI model provides interfaces which permit applications to request and receive network services
layer of the OSI model handles data formatting. This layer controls the encryption & decryption of data. It also handles the compression & decompression of data. The network transl
layer of the OSI model allows two applications on different computers to open, use and close connections. This layer provides synchronization services between tasks on both ends of
layer of the OSI model ensures accurate delivery of data. It solves transmission problems and provides error-free reassembly of the data.
layer of the OSI model handles addressing messages for delivery. This layer translates logical network addresses and names into their physical counterparts.
layer of the OSI model acknowledges data frames and error checking. The MAC address (or physical address) is used here. The Media Access Control (MAC) sub layer of this layer conta
layer of the OSI model transmits and receives signals. It manages the computer’s interface to the network medium. It specifies the specific details of the cables, network adapte
The PDU at the Data Link layer is referred to as
The PDU at the Network layer is referred to as
The PDU at the Transport layer is referred to as
The PDU at the Session, Presentation and the Application layer are referred to as
sublayer of the Data Link layer defines logical interface points, called Service Access Points (SAPs) that transfer information from this sublayer to upper OSI layers. It also incl
sublayer of the Data Link layer communicates with the NIC to read physical addresses on the network.
IEEE 802.14 is the engineering standard for
IEEE 802.15 is the engineering standard for
IEEE 802.10 is the engineering standard for
IEEE 802.11 is the engineering standard for
IEEE 802.16 is the engineering standard for
is an unreliable, connectionless Network Layer protocol. It provides information about how and where data should be delivered. IP is responsible for the logical addressing and rou
is a connection-oriented Transport Layer protocol. It provides reliable data delivery services in the TCP/IP environment.
is a connectionless Transport layer protocol which offers no assurance that the packets will be received in the correct order or for that matter that the packets will be received a
which is a Network layer TCP/IP protocol, notifies the sender that something has gone wrong in the transmission process and that packets were not delivered. It has no error control
which is a Network layer TCP/IP protocol, obtains the MAC address of a host and then creates a local database mapping the MAC address to the host’s IP address. It asks the questi
is an Application layer protocol that is used to send and receive files in the TCP/IP protocol suite
is an Application layer protocol that is used to log on to remote hosts in the TCP/IP protocol suite
is an Application layer protocol that is responsible for moving messages from one e-mail server to another in the TCP/IP protocol suite.
is a logical address assigned to a device on a TCP/IP network.
Logicial addresses 
is the local address or physical address that is permanently embedded in a NIC. It uniquely identifies a device on a LAN. The physical address is expressed as six pairs of hexadeci
Physical addresses 
is any computer or any device with a network adapter that is connected to the network.
is any computer or any device with a network adapter that is connected to the network using the TCP/IP protocol suite
is a unique 32-bit number consisting of 0’s and 1’s divided into four groups of octets (8-bit bytes) which are separated by periods, i.e., 10010001.11000011.00001111.10101001
portion of an IP address is common to all nodes on the network. It indicates whether the device belongs to a Class A, B or C network
portion of an IP address is unique.
network is used by a few networks with a very large number of hosts per network.
network is used by moderate-size networks with a moderately large number of hosts per network
network is used by a very large number of networks with just a few hosts per network.
The IP addresses available to the Internet are called __ IP addresses.
IP addresses are IP addresses that are assigned by a network administrator for use on private intranets that are isolated from the Internet.
IP address is an IP address that is manually assigned to a device on a network.
IP address is an IP address that is dynamically assigned to a device on a network.
is a symbolic name that describes a TCP/IP device.
is a symbolic name that identifies an organization. They must be registered with the Internet naming authority, ICANN
are any hosts on the Internet that need to look up domain name information. They are computers searching for the IP address for a domain name.
are servers that contain databases of names and their associated IP addresses.
are the databases of information needed to resolve domain names and IP addresses.
The process of discovering an IP address for a given domain name is called
A name server keeps the entries for each domain name that it knows about in a
is an Application layer protocol that manages the dynamic distribution of IP addresses on a network. It allows automatic IP addresses and subnet mask assignment.
an agreement between the DHCP server and client on how long the client will borrow a DHCP-assigned address.
is a logical address assigned to a specific process running on a computer. Its address combines the computer’s IP address with the port number associated with a process.
is a number used to address software or services running on a computer. It is a number between 0 and 65,535 that identifies a program running on a computer.
define the rules that determine which computer can send data across the network, thereby preventing data loss. It is handled at the Media Access Control (MAC) sublayer of the Data
is a type of channel access method in which collisions are prevented by listening to the channel to see if another computer is sending data. If no data is sensed, the computer send
is a type of channel access method in which computers use collision avoidance to prevent collisions. The additional overhead created by the “intent-to-transmit” packages signif
is a type of channel access method in which equal access is ensured to all computers on a network through the use of a special packet called the token.
is a type of channel access method in which a primary device asks secondary devices in sequence whether they have data to send.
is a type of channel access method that uses a network switch to manage media or channel access. It usually avoids contention and allows connections to use the entire bandwidth. It
is a simple means of wiring a bussed Ethernet together. Logically it is still a bus network. It uses the CSMA-CD channel access method. Collision occurs when multiple nodes access
permits point-to-point connection of any pair of nodes. Multiple pairs can be connected simultaneously. It is possible to connect nodes in full-duplex mode.
is a variation in delay from packet to packet.
is an 8-bit (DS) field in the IP header and is set by the application at the sender or by the first node
such as routers can then prioritize and route packets based on the packet class.
keeps network and system resources free from unwanted users.
keeps the content of data private.
verifies the identity of a source of data being received.
protects the content of data communication against changes and verifies the source of the message
keeps network resources operational and restricts access to only those permitted to use them.

From the Vault

The Big Board: NFL

by bhenderson79

Sports 7m
We trust this big board more than Mel Kiper's.
Remove Ads.
Support Sporcle.
Get the best of Sporcle when you Go Orange. This ad-free experience offers more features, more stats, and more fun while also helping to support Sporcle. Thank you for becoming a member.

Show Comments


Created Oct 22, 2010ReportNominate

Top Quizzes Today

Score Distribution

Your Account Isn't Verified!

In order to create a playlist on Sporcle, you need to verify the email address you used during registration. Go to your Sporcle Settings to finish the process.

Report this User

Report this user for behavior that violates our Community Guidelines.