Match each item with a statement below.
A. A central database of computers, users, shared printers, shared folders, other network resources, and resource groupings that is used to manage a network and enable users to quickly find a particular resource.
B. Used to automatically configure the TCP/IP settings for a computer, assigning an IP address within the range of 169.254.0.1-169.254.255.254, if a DHCP server is unavailable.
C. An operating environment that enables applications to run in an isolated fashion and provides the ability to execute multiple applications on one computer system.
D. The IP address of the router that has a connection to other networks. The default gateway address is used when the host computer you are trying to contact exists on another network.
E. A feature of Windows Server 2016 that enables monitoring of specific server states and roles to ensure that desired server states are not inadvertently altered.
F. The most commonly used version of IP, which has been in use for many years. It has a limitation in that it was not designed to anticipate the vast numbers of networks and network users currently in existence.
G. The newest version of IP that is designed for enhanced security and that can handle the addressing needs of growing networks.
H. An essential set of programs and computer code that allows a computer operating system to control processor, disk, memory, and other functions central to its basic operation.
I. Also called a physical or device address, the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer (a communications sublayer for controlling how computers share communications on the same network).
J. Used to distinguish between the network part and the host part of the IP address and to enable networks to be divided into subnets.
A. Active Directory
B. Automatic Private IP Addressing (APIPA)
C. container
D. default gateway
E. Desired State Configuration
F. Internet Protocol Version 4 (IPv4)
G. Internet Protocol Version 6 (IPv6)
H. kernel
I. media access control (MAC) address
J. subnet mask
You might also like to view...
Trace the retrieval algorithm for an indexed external file when the searchkey is less than all keys in the index. Assume that the index file stores the index recordssequentially, sorted by their search keys, and contains 20 blocks of 50 records each. Alsoassume that the data file contains 100 blocks, and that each block contains 10 employeerecords. List the calls to the various functions in the order in which they occur.
What will be an ideal response?
PNG stands for ________
A) Picture Normalized Graphics B) Pixel Normalized Graphics C) Portable Network Graphics D) Pattern Naturalized Graphics
The program that enables another program to run within Internet Explorer is called a(n):
A) script B) ActiveX control C) keystroke logger D) patch
A(n) ____________________ is also known as a general security policy, an IT security policy, or an information security policy.
Fill in the blank(s) with the appropriate word(s).