Deck 3: Using Network Communication Protocols

Full screen (f)
exit full mode
Question
For two computers to fully communicate, they must use the same protocol.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ was the first protocol developed as a means for IBM, DEC, and other host computers to communicate.

A)NCP
B)TCP
C)IP
D)NetBEUI
Question
You can assign a network number to a computer or any other host on the network.
Question
If you have generated the IP address 165.100.18.44/18 by using CIDR, what is the number of bits needed for the host identifier?

A)14
B)18
C)44
D)100
Question
The required header length of a TCP frame must be divisible by 32.
Question
Each network node has a ____-bit address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.

A)16
B)32
C)48
D)64
Question
AppleTalk Phase II supports as many as ____ nodes on a single logical network.

A)100
B)150
C)253
D)300
Question
____ enables a packet to reach different subnetworks on a LAN and different networks on a WAN.

A)IP
B)TCP
C)DNS
D)FTP
Question
Packets that begin with ____ in the first octet are used for network testing.

A)1
B)126
C)127
D)128
Question
FTP cannot transfer a portion of a file or records within a file.
Question
The ____ field in a TCP frame header consists of the number of bytes that can be transmitted before the sender receives an acknowledgment of receipt.

A)flags/control
B)checksum
C)padding
D)window
Question
TCP/IP consists of nearly ____ nonproprietary protocols that interconnect computer systems efficiently and reliably.

A)100
B)200
C)300
D)500
Question
Telnet uses TCP port ____ at the sender and receiver for dedicated communications.

A)21
B)22
C)23
D)80
Question
The ____ protocol is connectionless and is intended for the transfer of small files when data transmission errors are not critical and there is no need for security.

A)TFTP
B)NFS
C)NCP
D)FTP
Question
The Network layer equivalent in TCP/IP is TCP.
Question
____, specified in RFC 793,was initially designed for point-to-point communications between computers on the same network.

A)IP
B)TCP
C)NCP
D)UDP
Question
A ____ communication sends a message to all points on a specific network.

A)multicast
B)unicast
C)simulcast
D)broadcast
Question
The ____ protocol is used by network-monitoring applications that do not require the same level of reliability as offered by TCP.

A)IP
B)UDP
C)FTP
D)NCP
Question
The ____ field in an IP packet header contains information that prevents a packet from continuously circulating around a network.

A)flags
B)fragment Offset
C)time to live (TTL)
D)protocol
Question
Today, ____ remains the LAN protocol of preference for NetWare 6 and above.

A)IPX/SPX
B)XNS
C)NetBEUI
D)TCP/IP
Question
Identify four capabilities included in the properties of a LAN protocol.
Question
The _________________________ is a TCP/IP service that converts a computer or domain name to an IP address or that converts an IP address to a computer or domain name.
Question
What is IP addressing and why is it important?
Question
The number of data bytes transmitted in a frame is called the ____________________ window.
Question
A ____ is a logical grouping of network resources such as computers, printers, and network devices.

A)container
B)class
C)range
D)domain
Question
What are the disadvantages and advantages of UDP (User Datagram Protocol)?
Question
________________________________________ enables remote communications to networks, intranets, virtual private networks, and extranets by way of the Internet.
Question
Describe how zones help organize the tables used by DNS servers.
Question
Identify five advantages of TCP/IP (Transmission Control Protocol/Internet Protocol)
Question
____________________ is the time it takes for networked information to travel from the transmitting device to the receiving device.
Question
The ____ protocol enables the sending node to obtain the MAC addresses of the intended recipient before packets are sent.

A)SNMP
B)DHCP
C)ARP
D)SMTP
Question
When a TCP segment is formatted with additional IP header information, the entire unit is called a(n)____________________.
Question
There are 13 ____ servers on the Internet that are used to find TLDs, for example, .com or .net.

A)parent
B)root
C)primary DNS
D)secondary DNS
Question
____ enables the establishment of a Web connection and provides for the exchange of resources, such as displaying Web pages in your browser.

A)Telnet
B)HTTP
C)FTP
D)SMTP
Question
What are the advantages and disadvantages of having multiple LAN protocols?
Question
The ____ protocol sets up the fastest communications route between different kinds of telecommunications-based WANs.

A)PPP
B)PPTP
C)SS7
D)L2TP
Question
The ____ protocol supports connection authentication and encryption for security.

A)SLIP
B)NCP
C)CSLIP
D)PPP
Question
Describe an advantage of FTP over TFTP and NFS.
Question
How are Ethernet and token ring access methods facilitated in AppleTalk Phase II networks?
Question
What are five prominent features of IPv6 (IP version 6)?
Question
Match between columns
protocol developed by Novell for the NetWare operating system.
Internetwork Package Exchange (IPX)
protocol developed by Novell for the NetWare operating system.
AppleTalk
protocol developed by Novell for the NetWare operating system.
TCP port
protocol developed by Novell for the NetWare operating system.
checksum
protocol developed by Novell for the NetWare operating system.
dotted decimal notation address
protocol developed by Novell for the NetWare operating system.
anycast packet
protocol developed by Novell for the NetWare operating system.
terminal emulation
protocol developed by Novell for the NetWare operating system.
Simple Mail Transfer Protocol (SMTP)
protocol developed by Novell for the NetWare operating system.
namespace
logical area on a network that contains a list of named objects and performs name resolution.
Internetwork Package Exchange (IPX)
logical area on a network that contains a list of named objects and performs name resolution.
AppleTalk
logical area on a network that contains a list of named objects and performs name resolution.
TCP port
logical area on a network that contains a list of named objects and performs name resolution.
checksum
logical area on a network that contains a list of named objects and performs name resolution.
dotted decimal notation address
logical area on a network that contains a list of named objects and performs name resolution.
anycast packet
logical area on a network that contains a list of named objects and performs name resolution.
terminal emulation
logical area on a network that contains a list of named objects and performs name resolution.
Simple Mail Transfer Protocol (SMTP)
logical area on a network that contains a list of named objects and performs name resolution.
namespace
contains a destination address that is associated with multiple interfaces, usually on different nodes.
Internetwork Package Exchange (IPX)
contains a destination address that is associated with multiple interfaces, usually on different nodes.
AppleTalk
contains a destination address that is associated with multiple interfaces, usually on different nodes.
TCP port
contains a destination address that is associated with multiple interfaces, usually on different nodes.
checksum
contains a destination address that is associated with multiple interfaces, usually on different nodes.
dotted decimal notation address
contains a destination address that is associated with multiple interfaces, usually on different nodes.
anycast packet
contains a destination address that is associated with multiple interfaces, usually on different nodes.
terminal emulation
contains a destination address that is associated with multiple interfaces, usually on different nodes.
Simple Mail Transfer Protocol (SMTP)
contains a destination address that is associated with multiple interfaces, usually on different nodes.
namespace
involves using software to make a computer, such as a PC, behave as though it were a terminal.
Internetwork Package Exchange (IPX)
involves using software to make a computer, such as a PC, behave as though it were a terminal.
AppleTalk
involves using software to make a computer, such as a PC, behave as though it were a terminal.
TCP port
involves using software to make a computer, such as a PC, behave as though it were a terminal.
checksum
involves using software to make a computer, such as a PC, behave as though it were a terminal.
dotted decimal notation address
involves using software to make a computer, such as a PC, behave as though it were a terminal.
anycast packet
involves using software to make a computer, such as a PC, behave as though it were a terminal.
terminal emulation
involves using software to make a computer, such as a PC, behave as though it were a terminal.
Simple Mail Transfer Protocol (SMTP)
involves using software to make a computer, such as a PC, behave as though it were a terminal.
namespace
provides an alternative to FTP for sending a file from one computer system to another.
Internetwork Package Exchange (IPX)
provides an alternative to FTP for sending a file from one computer system to another.
AppleTalk
provides an alternative to FTP for sending a file from one computer system to another.
TCP port
provides an alternative to FTP for sending a file from one computer system to another.
checksum
provides an alternative to FTP for sending a file from one computer system to another.
dotted decimal notation address
provides an alternative to FTP for sending a file from one computer system to another.
anycast packet
provides an alternative to FTP for sending a file from one computer system to another.
terminal emulation
provides an alternative to FTP for sending a file from one computer system to another.
Simple Mail Transfer Protocol (SMTP)
provides an alternative to FTP for sending a file from one computer system to another.
namespace
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
Internetwork Package Exchange (IPX)
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
AppleTalk
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
TCP port
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
checksum
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
dotted decimal notation address
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
anycast packet
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
terminal emulation
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
Simple Mail Transfer Protocol (SMTP)
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
namespace
IP address format
Internetwork Package Exchange (IPX)
IP address format
AppleTalk
IP address format
TCP port
IP address format
checksum
IP address format
dotted decimal notation address
IP address format
anycast packet
IP address format
terminal emulation
IP address format
Simple Mail Transfer Protocol (SMTP)
IP address format
namespace
peer-to-peer network protocol especially designed for Macintosh computers.
Internetwork Package Exchange (IPX)
peer-to-peer network protocol especially designed for Macintosh computers.
AppleTalk
peer-to-peer network protocol especially designed for Macintosh computers.
TCP port
peer-to-peer network protocol especially designed for Macintosh computers.
checksum
peer-to-peer network protocol especially designed for Macintosh computers.
dotted decimal notation address
peer-to-peer network protocol especially designed for Macintosh computers.
anycast packet
peer-to-peer network protocol especially designed for Macintosh computers.
terminal emulation
peer-to-peer network protocol especially designed for Macintosh computers.
Simple Mail Transfer Protocol (SMTP)
peer-to-peer network protocol especially designed for Macintosh computers.
namespace
similar to a virtual circuit between two communicating processes on two different nodes.
Internetwork Package Exchange (IPX)
similar to a virtual circuit between two communicating processes on two different nodes.
AppleTalk
similar to a virtual circuit between two communicating processes on two different nodes.
TCP port
similar to a virtual circuit between two communicating processes on two different nodes.
checksum
similar to a virtual circuit between two communicating processes on two different nodes.
dotted decimal notation address
similar to a virtual circuit between two communicating processes on two different nodes.
anycast packet
similar to a virtual circuit between two communicating processes on two different nodes.
terminal emulation
similar to a virtual circuit between two communicating processes on two different nodes.
Simple Mail Transfer Protocol (SMTP)
similar to a virtual circuit between two communicating processes on two different nodes.
namespace
Question
How is the Dynamic Host Configuration Protocol (DHCP)used?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Using Network Communication Protocols
1
For two computers to fully communicate, they must use the same protocol.
True
2
____ was the first protocol developed as a means for IBM, DEC, and other host computers to communicate.

A)NCP
B)TCP
C)IP
D)NetBEUI
A
3
You can assign a network number to a computer or any other host on the network.
False
4
If you have generated the IP address 165.100.18.44/18 by using CIDR, what is the number of bits needed for the host identifier?

A)14
B)18
C)44
D)100
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The required header length of a TCP frame must be divisible by 32.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Each network node has a ____-bit address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.

A)16
B)32
C)48
D)64
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
AppleTalk Phase II supports as many as ____ nodes on a single logical network.

A)100
B)150
C)253
D)300
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ enables a packet to reach different subnetworks on a LAN and different networks on a WAN.

A)IP
B)TCP
C)DNS
D)FTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Packets that begin with ____ in the first octet are used for network testing.

A)1
B)126
C)127
D)128
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
FTP cannot transfer a portion of a file or records within a file.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ field in a TCP frame header consists of the number of bytes that can be transmitted before the sender receives an acknowledgment of receipt.

A)flags/control
B)checksum
C)padding
D)window
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
TCP/IP consists of nearly ____ nonproprietary protocols that interconnect computer systems efficiently and reliably.

A)100
B)200
C)300
D)500
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Telnet uses TCP port ____ at the sender and receiver for dedicated communications.

A)21
B)22
C)23
D)80
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ protocol is connectionless and is intended for the transfer of small files when data transmission errors are not critical and there is no need for security.

A)TFTP
B)NFS
C)NCP
D)FTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The Network layer equivalent in TCP/IP is TCP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____, specified in RFC 793,was initially designed for point-to-point communications between computers on the same network.

A)IP
B)TCP
C)NCP
D)UDP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A ____ communication sends a message to all points on a specific network.

A)multicast
B)unicast
C)simulcast
D)broadcast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The ____ protocol is used by network-monitoring applications that do not require the same level of reliability as offered by TCP.

A)IP
B)UDP
C)FTP
D)NCP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The ____ field in an IP packet header contains information that prevents a packet from continuously circulating around a network.

A)flags
B)fragment Offset
C)time to live (TTL)
D)protocol
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Today, ____ remains the LAN protocol of preference for NetWare 6 and above.

A)IPX/SPX
B)XNS
C)NetBEUI
D)TCP/IP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Identify four capabilities included in the properties of a LAN protocol.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The _________________________ is a TCP/IP service that converts a computer or domain name to an IP address or that converts an IP address to a computer or domain name.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What is IP addressing and why is it important?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The number of data bytes transmitted in a frame is called the ____________________ window.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A ____ is a logical grouping of network resources such as computers, printers, and network devices.

A)container
B)class
C)range
D)domain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the disadvantages and advantages of UDP (User Datagram Protocol)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
________________________________________ enables remote communications to networks, intranets, virtual private networks, and extranets by way of the Internet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Describe how zones help organize the tables used by DNS servers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Identify five advantages of TCP/IP (Transmission Control Protocol/Internet Protocol)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ is the time it takes for networked information to travel from the transmitting device to the receiving device.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The ____ protocol enables the sending node to obtain the MAC addresses of the intended recipient before packets are sent.

A)SNMP
B)DHCP
C)ARP
D)SMTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
When a TCP segment is formatted with additional IP header information, the entire unit is called a(n)____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
There are 13 ____ servers on the Internet that are used to find TLDs, for example, .com or .net.

A)parent
B)root
C)primary DNS
D)secondary DNS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ enables the establishment of a Web connection and provides for the exchange of resources, such as displaying Web pages in your browser.

A)Telnet
B)HTTP
C)FTP
D)SMTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the advantages and disadvantages of having multiple LAN protocols?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The ____ protocol sets up the fastest communications route between different kinds of telecommunications-based WANs.

A)PPP
B)PPTP
C)SS7
D)L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ protocol supports connection authentication and encryption for security.

A)SLIP
B)NCP
C)CSLIP
D)PPP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Describe an advantage of FTP over TFTP and NFS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
How are Ethernet and token ring access methods facilitated in AppleTalk Phase II networks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are five prominent features of IPv6 (IP version 6)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
protocol developed by Novell for the NetWare operating system.
Internetwork Package Exchange (IPX)
protocol developed by Novell for the NetWare operating system.
AppleTalk
protocol developed by Novell for the NetWare operating system.
TCP port
protocol developed by Novell for the NetWare operating system.
checksum
protocol developed by Novell for the NetWare operating system.
dotted decimal notation address
protocol developed by Novell for the NetWare operating system.
anycast packet
protocol developed by Novell for the NetWare operating system.
terminal emulation
protocol developed by Novell for the NetWare operating system.
Simple Mail Transfer Protocol (SMTP)
protocol developed by Novell for the NetWare operating system.
namespace
logical area on a network that contains a list of named objects and performs name resolution.
Internetwork Package Exchange (IPX)
logical area on a network that contains a list of named objects and performs name resolution.
AppleTalk
logical area on a network that contains a list of named objects and performs name resolution.
TCP port
logical area on a network that contains a list of named objects and performs name resolution.
checksum
logical area on a network that contains a list of named objects and performs name resolution.
dotted decimal notation address
logical area on a network that contains a list of named objects and performs name resolution.
anycast packet
logical area on a network that contains a list of named objects and performs name resolution.
terminal emulation
logical area on a network that contains a list of named objects and performs name resolution.
Simple Mail Transfer Protocol (SMTP)
logical area on a network that contains a list of named objects and performs name resolution.
namespace
contains a destination address that is associated with multiple interfaces, usually on different nodes.
Internetwork Package Exchange (IPX)
contains a destination address that is associated with multiple interfaces, usually on different nodes.
AppleTalk
contains a destination address that is associated with multiple interfaces, usually on different nodes.
TCP port
contains a destination address that is associated with multiple interfaces, usually on different nodes.
checksum
contains a destination address that is associated with multiple interfaces, usually on different nodes.
dotted decimal notation address
contains a destination address that is associated with multiple interfaces, usually on different nodes.
anycast packet
contains a destination address that is associated with multiple interfaces, usually on different nodes.
terminal emulation
contains a destination address that is associated with multiple interfaces, usually on different nodes.
Simple Mail Transfer Protocol (SMTP)
contains a destination address that is associated with multiple interfaces, usually on different nodes.
namespace
involves using software to make a computer, such as a PC, behave as though it were a terminal.
Internetwork Package Exchange (IPX)
involves using software to make a computer, such as a PC, behave as though it were a terminal.
AppleTalk
involves using software to make a computer, such as a PC, behave as though it were a terminal.
TCP port
involves using software to make a computer, such as a PC, behave as though it were a terminal.
checksum
involves using software to make a computer, such as a PC, behave as though it were a terminal.
dotted decimal notation address
involves using software to make a computer, such as a PC, behave as though it were a terminal.
anycast packet
involves using software to make a computer, such as a PC, behave as though it were a terminal.
terminal emulation
involves using software to make a computer, such as a PC, behave as though it were a terminal.
Simple Mail Transfer Protocol (SMTP)
involves using software to make a computer, such as a PC, behave as though it were a terminal.
namespace
provides an alternative to FTP for sending a file from one computer system to another.
Internetwork Package Exchange (IPX)
provides an alternative to FTP for sending a file from one computer system to another.
AppleTalk
provides an alternative to FTP for sending a file from one computer system to another.
TCP port
provides an alternative to FTP for sending a file from one computer system to another.
checksum
provides an alternative to FTP for sending a file from one computer system to another.
dotted decimal notation address
provides an alternative to FTP for sending a file from one computer system to another.
anycast packet
provides an alternative to FTP for sending a file from one computer system to another.
terminal emulation
provides an alternative to FTP for sending a file from one computer system to another.
Simple Mail Transfer Protocol (SMTP)
provides an alternative to FTP for sending a file from one computer system to another.
namespace
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
Internetwork Package Exchange (IPX)
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
AppleTalk
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
TCP port
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
checksum
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
dotted decimal notation address
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
anycast packet
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
terminal emulation
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
Simple Mail Transfer Protocol (SMTP)
16-bit cyclic redundancy check based on length of all TCP header fields and the data payload field
namespace
IP address format
Internetwork Package Exchange (IPX)
IP address format
AppleTalk
IP address format
TCP port
IP address format
checksum
IP address format
dotted decimal notation address
IP address format
anycast packet
IP address format
terminal emulation
IP address format
Simple Mail Transfer Protocol (SMTP)
IP address format
namespace
peer-to-peer network protocol especially designed for Macintosh computers.
Internetwork Package Exchange (IPX)
peer-to-peer network protocol especially designed for Macintosh computers.
AppleTalk
peer-to-peer network protocol especially designed for Macintosh computers.
TCP port
peer-to-peer network protocol especially designed for Macintosh computers.
checksum
peer-to-peer network protocol especially designed for Macintosh computers.
dotted decimal notation address
peer-to-peer network protocol especially designed for Macintosh computers.
anycast packet
peer-to-peer network protocol especially designed for Macintosh computers.
terminal emulation
peer-to-peer network protocol especially designed for Macintosh computers.
Simple Mail Transfer Protocol (SMTP)
peer-to-peer network protocol especially designed for Macintosh computers.
namespace
similar to a virtual circuit between two communicating processes on two different nodes.
Internetwork Package Exchange (IPX)
similar to a virtual circuit between two communicating processes on two different nodes.
AppleTalk
similar to a virtual circuit between two communicating processes on two different nodes.
TCP port
similar to a virtual circuit between two communicating processes on two different nodes.
checksum
similar to a virtual circuit between two communicating processes on two different nodes.
dotted decimal notation address
similar to a virtual circuit between two communicating processes on two different nodes.
anycast packet
similar to a virtual circuit between two communicating processes on two different nodes.
terminal emulation
similar to a virtual circuit between two communicating processes on two different nodes.
Simple Mail Transfer Protocol (SMTP)
similar to a virtual circuit between two communicating processes on two different nodes.
namespace
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
How is the Dynamic Host Configuration Protocol (DHCP)used?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.