Home
Subjects
Solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (33)
personal area networks (PAN)
provide communication over a short distance that is intended for use with devices that are owned and operated by a single user
bluetooth
wireless PAN technology that transmits signals over short distances between cell phones, computers and other devices
wireless LAN (WLAN)
a local are network that uses radio signals to transmit and receive data over distances of a few hundred feet
wireless fidelity (Wi-Fi)
a means by which portable
access point
the computer or network device that serves as an interface between devices and the network
wireless access point
enables devices to connect ti a wireless network to communicate with each other
multiple-in/multiple-out technology
multiples transmitters and receivers allowing them to send and receive greater amounts of data than traditional networking devices
wireless MAN (WMAN)
a metropolitan are network that uses radio signals to transmit and receive data
worldwide interoperability for microwave access (WiMAX)
a communications technology aimed at providing high speed wireless data over metropolitan area networks
wireless WAN (WWAN)
a wide area network that uses radio signals to transmit and receive data
smart phone
offer more advanced computing ability and connectivity than basic cell phones
3G
a service that brings wireless broadband to mobile phones
streaming
a method of sending audio and video files over the internet
satellite
a space station that orbits the earth receiving and transmitting signals from earth based stations over a wide area
broadband over power line (BPL)
technology makes possible high -speed internet access over ordinary residential electric lines and offers and alternative to DSL high speed cable modems
packet
single unit of binary data routed through a network
standard packet formats
include a packet header, packet body containing the original message and a packet footer
packet header
lists the destination (for example, in the IP packets the destination is the IP address) along with the length of the message data
packet footer
represents the end of the packet or transmission end
protocol
a standard that specifies the format of data as well as the rules to be followed during transmission
file transfer protocol (FTP)
a simple network protocol that allows the transfer of files between two computers on the internet
transmission control protocol/internet protocol (TCP/IP)
provides the technical foundation for the public internet as well as for large numbers of private networks
IP address
a unique number that identifies where the form of xxx.xxx.xxx.xxx through each grouping can be as short as a single digit
Domain name system (DNS)
convert IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions
configuration protocol (DHCP)
allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network
network convergence
the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not poss
voice over IP (VoIP)
uses IP technology to transmit telephone calls
4 challenges associated with wireless networks
-preventing viruses on mobile devices
-addressing privacy concerns with RFID and LBS
-Protecting wireless connections
-protecting against theft
Internet Protocol TV (IPTV)
distributes digital video content using IP across the Internet and private IP networks
3 measurements of bandwidth
megabits, gigabits, kilobits
asset tracking
occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention
5 primary networking elements
-network categories
-network protocols
-network providers
-network convergence
-network access technologies
...
...
Recommended textbook solutionsComputer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Engineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Introduction to Java Programming, Comprehensive Version
10th EditionY. Daniel Liang
1,626 solutions
Sets with similar termsChapter 7- Networks: Mobile Business
82 terms
nathan_shaub
Chapter 7 ISYS
67 terms
marisa2012
chapter 7 MIS 180
90 terms
karlaa40
ISYS Chapter 7 Terms
87 terms
shelby_elkins
Sets found in the same folderMIS Final Questions - Ch. 7
25 terms
Elliot_Nebel
MINS 301 Ch. 7 Vocab
88 terms
ejossey
chapter 4
29 terms
vancecs4
ISOM 210 7B
50 terms
Taylor_Newsome2
Other sets by this creator431 Final
47 terms
jessasarie
Bahia
29 terms
jessasarie
396 P-Z
72 terms
jessasarie
foreign words A-
33 terms
jessasarie
Verified questionsCOMPUTER SCIENCE
Chapter 2 contains an algorithm that finds the largest value in a list of n values. a. What is the order of magnitude of the largest value algorithm, where the work unit is comparisons of values from the list? b. Suppose that you want to find the second-largest value in the list. Find the order of magnitude of the work done if you use the following algorithm: Sort the list, using selection sort, then directly get the second-largest value. c. Suppose that you want to find the second-largest value in the list. Find the order of magnitude of the work done if you use the following algorithm: Run the largest-value algorithm twice, first to find (and eliminate from the list) the largest value, then to find the second-largest value.
Verified answer
COMPUTER SCIENCE
Why should you be careful not to place a statement in the body of a for loop that changes the value of the loop’s counter variable?
Verified answer
COMPUTER SCIENCE
Write an if statement that prints the message “The number is valid” if the variable temperature is within the range −50 through 150.
Verified answer
COMPUTER SCIENCE
True/False. A linked list can change size while a program is running.
Verified answer
Other Quizlet sets
Chapter 12, 17 and 18 (18.1-18.3) Test Review
30 terms
jaylenemm922
ES vol 2
72 terms
Deja_Davis94
POL 241 Miami University Chapter 3 Quiz
25 terms
adambandola
Income Tax- Section 5 Quiz
10 terms
gdefiel
Related questionsQUESTION
Describe the difference between an IPv4 and IPv6 packet
2 answers
QUESTION
Referring to the above problem, suppose now that when a car arrives at the second tollbooth, it proceeds through the tollbooth without waiting for the cars behind it. What is the end-to-end delay?
2 answers
QUESTION
Ryan Calo describes 3 ways in which robots may pose challenges to privacy when used in everyday life. Identify and describe 2 of those ways, and give a relevant example of each.
5 answers
QUESTION
A network configuration in which all computers on the network are connected through a single circuit, such as twisted-pair cable. Messages are transmitted to all computers on the network, although only the targeted device responds to the message.
2 answers