What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (72)

Sets with similar terms

Other sets by this creator

Verified questions

COMPUTER SCIENCE

Verified answer

COMPUTER SCIENCE

Relate to a recursive sorting algorithm called QuickSort, which is described as follows: A one-element list is already sorted; no further work is required. Otherwise, take the first element in the list, call it the pivot element, then walk through the original list to create two new sublists, $L_{1}$ and $L_{2}.$ $L_{1}$ consists of all elements that are less than the pivot element and $L_{2}$ consists of all elements that are greater than the pivot element. Put the pivot element between $L_{1}$ and $L_{2}.$ Sort each of L1 and L2 using QuickSort (this is the recursive part). Eventually all lists will consist of 1 element sublists separated by previous pivot elements, and at this point the entire original list is in sorted order. This is a little confusing, so here is an example, where pivot elements are shown in brackets: Original list: 6, 2, 1, 7, 9, 4, 8; After 1st pass: 2, 1, 4, [6], 7, 9, 8; After 2nd pass: 1, [2], 4, [6], [7], 9, 8; After 3rd pass: 1, [2], 4, [6], [7], 8, [9] Sorted. How many comparisons between list elements are required for pass 1 of QuickSort on an n-element list?

Verified answer

COMPUTER SCIENCE

Verified answer

COMPUTER SCIENCE

Verified answer

Recommended textbook solutions

What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

Other Quizlet sets

Related questions

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (72)

LAN

connects a group of computers in close proximity, such as in an office building, school, or home. LANs allow sharing of files, printers, games, and other resources. A LAN also often connects to other LANs and to wide area networks.

WAN

spans a large geographic area such as a state, province, or country. Perhaps the best example is the Internet. WANs are essential for carrying out the day-to-day activities of many companies and government organizations, allowing them to transmit and receive information among their employees, customers, suppliers, business partners, and other organizations across cities, regions, and countries and around the world
wide area network

attenuation

represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.

repeater

receives and repeats a signal to reduce its attenuation and extend its range.

metropolitan area network

a large computer network usually spanning a city. Most colleges, universities, and large companies that span a campus use an infrastructure supported by a MAN

national service providers

private companies that own and maintain the worldwide backbone that supports the Internet. These include Sprint, Verizon, MCI

internet service provider

which specializes in providing management, support, and maintenance to a network. ISPs vary services provided and available bandwidth rates
Major ISPs in the United States include AOL, AT&T, Comcast, Earthlink, and NetZero

regional service provider

offer Internet service by connecting to NSPs, but they also can connect directly to each other.

modem

a device that enables a computer to transmit and receive data. A connection with a traditional telephone line and a modem, which most residential users had in the 1990s, is called dial-up access. Today, many users in underdeveloped countries and in rural areas in developed countries still use dial-up

broadband

a high-speed Internet connection that is always connected. High-speed in this case refers to any bandwidth greater than 2 Mbps.

digital subscriber line

provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines.

high speed internet cable connections

provide Internet access using a cable television company's infrastructure and a special cable modem.

cable modem

a type of digital modem used with high-speed cable Internet service. Cable modems connect a home computer (or network of home computers) to residential cable TV service; DSL modems connect to residential public telephone service.

packet

a single unit of binary data routed through a network.
Packets directly affect network performance and reliability by subdividing an electronic message into smaller, more manageable packets.

broadband over power line

technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems. BPL works by transmitting data over electrical lines using signaling frequencies higher than the electrical (or voice in the case of DSL) signals. BPL allows computer data to be sent back and forth across the network with no disruption to power output in the home

standard packet formats

include a packet header, packet body containing the original message, and packet footer.

packet header

lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data.

packet footer

represents the end of the packet or transmission end

traceroute

a utility application that monitors the network path of packet data sent to a remote computer. Traceroute programs send a series of test messages over the network (using the name or IP address) until the last message finally reaches its destination. When finished, traceroute displays the path from the initial computer to the destination computer

proxy

software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons.

protocol

a standard that specifies the format of data as well as the rules to be followed during transmission. Computers using the same protocol can communicate easily, providing accessibility, scalability, and connectability between networks

file transfer protocol

a simple network protocol that allows the transfer of files between two computers on the Internet.

transmission control protocol/Internet protocol (TCP/IP),

provides the technical foundation for the public Internet as well as for large numbers of private networks.
ensures that the size of the data packet is the same throughout its transmission and can even retransmit data until delivered correctly.

IP address

a unique number that identifies where computers are located on the network. IP addresses appear in the form of xxx.xxx.xxx.xxx, though each grouping can be as short as a single digit.
verifies that the data are sent to the correct IP address, numbers represented by four strings of numbers ranging from 0 to 255 separated by periods. For example, the IP address of www.apple.com is 97.17.237.15.

Dynamic Host Configuration Protocol (DHCP)

allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network. DHCP allows a computer to access and locate information about a computer on the server, enabling users to locate and renew their IP address

domain name system (DNS)

to convert IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions. Therefore, instead of trying to remember 97.17.237.15, users can simply specify a domain name to access a computer or website, such as www.apple.com

unified communications

the integration of communication channels into a single service. UC integrates communication channels, allowing participants to communicate using the method that is most convenient for them. UC merges instant messaging, videoconferencing, email, voice mail, and Voice over IP (VoIP)

voice over IP

uses IP technology to transmit telephone calls. For the first time in more than 100 years, VoIP is providing an opportunity to bring about significant change in the way people communicate using the telephone. VoIP service providers—specialists as well as traditional telephone and cable companies and some ISPs—allow users to call anyone with a telephone number, whether local, long distance, cellular, or international.

peer 2 peer

a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server

Internet Protocol TV (IPTV)

distributes digital video content using IP across the Internet and private IP networks. Comcast provides an example of a private IP network that also acts as a cable TV provider. Traditional television sends all program signals simultaneously to the television, allowing the user to select the program by selecting a channel. With IPTV, the user selects a channel and the service provider sends only that single program to the television. Like cable TV, IPTV uses a box that acts like a modem to send and receive the content

intranet

a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes

extranet

an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.

virtual private network

Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a private tunnel within the Internet,

secure sockets layer

a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private
Millions of websites use SSL to protect their online transactions with their customers.

SSL Certificate

an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

Secure hypertext transfer protocol (SHTTP or HTTPS)

a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
protects against interception of communications, transferring credit card information safely and securely with special encryption techniques. When a user enters a web address using https://, the browser will encrypt the message. However, the server receiving the message must be configured to receive HTTPS messages.

digital divide

a worldwide gap giving advantage to those with access to technology
helping to make them knowledgeable about computers, programs, and the Internet

mobile

means the technology can travel with the user; for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference. Information collected while on the road can be synchronized with a PC or company server.

wireless

refers to any type of operation accomplished without the use of a hard-wired connectio

personal area network

provides communication for devices owned by a single user that work over a short distance. PANs are used to transfer files, including email, calendar appointments, digital photos, and music. A PAN can provide communication between a wireless headset and a cell phone or between a computer and a wireless mouse or keyboard. Personal area networks generally cover a range of less than 10 meters

bluetooth

a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.

wireless lan

a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.

access point

the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network

wireless access point

enables devices to connect to a wireless network to communicate with each other.

multiple-in/multiple-out (MIMO) technology

have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices.

wireless fidelty

a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

wifi infrastructure

includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal

hotspots

are designated locations where Wi-Fi access points are publicly available. Hotspots are found in places such as restaurants, airports, and hotels—places where business professionals tend to gather.

wireless MAN

a metropolitan area network that uses radio signals to transmit and receive data. WMAN technologies have not been highly successful to date, mainly because they are not widely available, at least in the United States.

Worldwide Interoperability for Microwave Access

a communications technology aimed at providing high-speed wireless data over metropolitan area networks

wireless WAN (WWAN)

a wide area network that uses radio signals to transmit and receive data. WWAN technologies can be divided into two categories: cellular communication systems and satellite communication systems.

Voice over LTE (VoLTE)

allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls. One easy way to think of VoLTE is as, essentially, a VoIP call on your mobile phone. The functionality is still the same, but the data transfers in a faster and more efficient manner.

Wired equivalent privacy (WEP)

an encryption algorithm designed to protect wireless transmission data. If you are using a Wi-Fi connection, WEP encrypts the data by using a key that converts the data to a nonhuman readable form. The purpose of WEP was to provide wireless networks with the equivalent level of security as wired networks. Unfortunately, the technology behind WEP has been demonstrated to be relatively insecure compared to newer protocols such as WPA.

Wi-Fi protected access (WPA)

a wireless security protocol to protect Wi-Fi networks. It is an improvement on the original Wi-Fi security standard, Wired Equivalent Privacy (WEP) and provides more sophisticated data encryption and user authentication. Anyone who wants to use an access point must know the WPA encryption key to access the Wi-Fi connection.

war chalking

the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured.

war driving

deliberately searching for Wi-Fi signals while driving by in a vehicle. Many individuals who participate in war driving simply map where Wi-Fi networks are available. Other individuals have a more malicious intent and use war driving to hack or break into these networks.

IT consumerization

the blending of personal and business use of technology devices and applications

mobile device management

remotely controls smart phones and tablets, ensuring data security. MIS departments implement MDM by requiring passcodes on organizational smart phones to ensure data encryption and, in the event of a lost smart phone, that all data on the device can be deleted remotely. MDM tools can also enforce policies, track inventory, and perform real-time monitoring and reporting.

mobile application management

administers and delivers applications to corporate and personal smart phones and tablets. MAM software assists with software delivery, licensing, and maintenance and can limit how sensitive data can be shared among apps. An important feature of MAM is that it provides corporate network administrators with the ability to wipe corporate mobile apps from an end user's device remotely.

radio frequency identification

uses electronic tags and labels to identify objects wirelessly over short distances. It holds the promise of replacing existing identification technologies such as the bar code.

RFID tag

an electronic identification device that is made up of a chip and antenna

RFID reader

a transmitter/receiver that reads the contents of RFID tags in the area.

Semi-passive RFID tags

use a battery to run the microchip's circuitry but communicate by drawing power from the RFID reader

asset tracking

when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention. Asset tracking allows a company to focus on its supply chain, reduce theft, identify the last known user of assets, and automate maintenance routines

RFID accelerometer

a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds

RFID tags

use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip.

global positioning system (GPS)

satellite-based navigation system providing extremely accurate position, time, and speed information

geographic information system (GIS)

stores, views, and analyzes geographic data, creating multidimensional charts or maps. For example, GISs are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.

Cartography

the science and art of making an illustrated map or chart

Edge matching (warping, rubber sheeting)

occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match. Edge matching is a critical component of creating a GIS database because map misalignments occur frequently for many reasons, including survey error and cartographic errors.

GIS map automation

links business assets to a centralized system where they can be tracked and monitored over time.

GIS map automation

links business assets to a centralized system where they can be tracked and monitored over time.

Sets with similar terms

MIS Chapter 7

66 terms

alexis_klotz

Chapter 7- Networks: Mobile Business

82 terms

nathan_shaub

ISYS Chapter 7 Terms

87 terms

shelby_elkins

Chapter 7

88 terms

juliajfleming

Sets found in the same folder

MIS ch 6

47 terms

myguardiangel123

MIS Ch 8

53 terms

myguardiangel123

org behavior test 2

68 terms

micareo

MIS ch 9

51 terms

myguardiangel123

Other sets by this creator

MIS ch 5

55 terms

myguardiangel123

MIS ch 4

59 terms

myguardiangel123

MIS-ch 3

56 terms

myguardiangel123

MIS-ch 2

56 terms

myguardiangel123

Verified questions

COMPUTER SCIENCE

T F The exit function can only be called from main.

Verified answer

COMPUTER SCIENCE

T F You cannot use the = operator to assign one object’s values to another object, unless you overload the operator.

Verified answer

COMPUTER SCIENCE

Illustrate the operation of HEAP-EXTRACT-MAX on the heap A = ⟨15, 13, 9, 5, 12, 8, 7, 4, 0, 6, 2, 1⟩.

Verified answer

COMPUTER SCIENCE

What are the benefits of a journaling file system such as Linux’s ext3? What are the costs? Why does ext3 provide the option to journal only metadata?

Verified answer

Recommended textbook solutions

What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

C Programming: From Problem Analysis to Program Design

8th EditionD. S. Malik

1,886 solutions

What is designed to connect a group of computers and proximity to each other such as an office building a school or home quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Other Quizlet sets

SLHS chp 7-8

37 terms

madison_miles49

Davis Edge quiz questions for NUR 121 test 3

63 terms

Lea_KrogmanPLUS

PSYC324 Final Exam: Lecture 9

24 terms

Lovefoot12

Christ of the Covenants Ch 1-2

19 terms

gpgp4kwqpj

Related questions

QUESTION

LDAP or non-SAML compliant auth should implement a custom solution and use STS to issue short-lived AWS credentials?

2 answers

QUESTION

A characteristic or quality that describes a particular database or entity is called.....?

11 answers

QUESTION

You need to grant your EC2 Instances the ability to upload and download images from an S3 bucket. Which IAM feature enables you to grant your EC2 instances the ability to access Amazon S3?

4 answers

QUESTION

​Current estimates suggest that there are more than 40 million hosts (computer sites that store and deliver Web pages) connected to the Internet.

2 answers

What is designed to connect a group of computers in proximity to each other such as in an office building a school or a home?

A local area network (LAN) is a collection of devices connected together in one physical location, such as a building, office, or home. A LAN can be small or large, ranging from a home network with one user to an enterprise network with thousands of users and devices in an office or school.

What connects a group of computers in close proximity such as in a school or office setting?

A wide area network (WAN) connects a group of computers in close proximity, such as in an office building, school, or home.

What is designed to connect a group of computers?

A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office building, or closely positioned group of buildings. Wired LANs are most commonly based on Ethernet technology.

What is it called when one computer can connect to another?

When two or more computers are connected together so they can communicate with one another, they form a network.