Match each term in the second column with its correct definition in the first column by writing the letter of the term on the blank line in front of the correct definition.
_____ 1. Two or more computers that share resources.
_____ 2. A personal computer that connects to a server.
_____ 3. A network that has all connected devices or nodes located in the same physical location.
_____ 4. Standards that define the way data is transmitted over a local area network.
_____ 5. Creates a private network through the public network (Internet), allowing remote users to access a local area network (LAN) securely without needing dedicated lines.
_____ 6. A device that connects two or more networks together.
_____ 7. The rules for communication between devices.
_____ 8. The act of gaining unauthorized access to a computer system or network.
_____ 9. Email messages and IMs that appear to be from those you do business with, designed to trick you into revealing information, such as usernames and passwords for your accounts.
_____ 10. A situation in which sensitive data is stolen or viewed by someone who is not authorized to do so.
A Client
B Computer network
C Data breach
D Ethernet
E Hacking
F Local area network (LAN)
G Phishing
H Protocols
I Router
J Virtual private network (VPN)
1. Two or more computers that share resources.
B. Computer network
2. A personal computer, and other devices, that connects to a server.
A. Client
3. A network that has all connected devices or nodes located in the same physical location.
F. Local area network (LAN)
4. Standards that define the way data is transmitted over a local area network.
D. Ethernet
5. Creates a private network through the public network (Internet), allowing remote users to access a local area network (LAN) securely without needing dedicated lines.
J. Virtual private network (VPN)
6. A device that connects two or more networks together.
I. Router
7. The rules for communication between devices.
H. Protocols
8. The act of gaining unauthorized access to a computer system or network.
E. Hacking
9. Email messages and IMs that appear to be from those you do business with, designed to trick you into revealing information, such as usernames and passwords for your accounts.
G. Phishing
10. A situation in which sensitive data is stolen or viewed by someone who is not authorized to do so.
C. Data breach
You might also like to view...
Sarah, as the head of a business division, wants to set up a network access account for a new employee. She should call the _____ to get this done.
Fill in the blank(s) with the appropriate word(s).
RAID relies on units of data called ________, which when combined into larger chunks are known as ________.
a) stripes, strips b) fields, blocks c) sectors, tracks d) strips, stripes
________ is a single spreadsheet that can contain formulas, functions, values, text and visual aids
Fill in the blank(s) with correct word
Motherboards used to use a simple error detection method called ____. Each byte of data in memory is accompanied by a ninth bit.
A. ECC B. Bit check C. Parity checking D. Free Willy