0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
13 Ansichten3 Seiten
A network is a group of computers that can be accessed and administered with a common set of rules. An operating system is software that runs on computers and manages resources to enable application software. A router routes data between networks and only allows authorized devices to connect. An IP address uniquely identifies devices on a network and provides location addressing.
A network is a group of computers that can be accessed and administered with a common set of rules. An operating system is software that runs on computers and manages resources to enable application software. A router routes data between networks and only allows authorized devices to connect. An IP address uniquely identifies devices on a network and provides location addressing.
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als DOC, PDF, TXT herunterladen oder online auf Scribd lesen
A network is a group of computers that can be accessed and administered with a common set of rules. An operating system is software that runs on computers and manages resources to enable application software. A router routes data between networks and only allows authorized devices to connect. An IP address uniquely identifies devices on a network and provides location addressing.
Copyright:
Attribution Non-Commercial (BY-NC)
Verfügbare Formate
Als DOC, PDF, TXT herunterladen oder online auf Scribd lesen
1. Contains a group of computers that can be accessed and
administered with a common set of rules
2. Is software, consisting of programs and data, that runs on
computers and manages computer hardware resources and provides common services for efficient execution of various application software.
3. Is a hardware device that routes data from a local area
network (LAN) to another network connection. Acts like a coin sorting machine, allowing only authorized machines to connect to other computer
4. Is usually a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for communication. Serves two principal functions: host or network interface identification and location addressing.
5. Use to identify the computer and is useful in connecting to
shared folders and devices.
6. Is the address of a specific Web site or file on the Internet.
7. Is a computer program which reproduces. The term is
commonly used to refer to a range of malware. To distribute itself, it needs to execute or otherwise be interpreted. Often hide themselves inside other programs to be executed. It reproduces by making, possibly evolved, copies of itself in the computer's memory, storage, or over a net.
8. Is a private computer network that uses Internet protocols,
network connectivity, and possibly the public telecommunication system to securely share part of an organization's information or operations with its employees.
9. Is the most common cable used in computer networking. It is
a variant of twisted pair cabling. Are often called ethernet cables after Ethernet, the most common data networking standard. 10. Is a group of computers and associated devices that share a common communications line or wireless link.
11.Is a name that uniquely identifies someone on a computer
system
12.Is a string of characters used for authenticating a user on a
computer system.
13.the command line interpreter in Windows operating systems
14.is a part of the Microsoft Windows graphical user interface
which allows users to view and manipulate basic system settings and controls via applets, such as adding hardware, adding and removing software, controlling user accounts, and changing accessibility options.
15.Is a software application for retrieving, presenting, and
traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content.
16.Is a device or set of devices designed to permit or deny
network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
17.Shows installed printers and fax printers and helps you add new ones
18.Change the appearance of your desktop , such as the
background , screen saver, fonts, sizes and screen resolution .
19.Configures administrative settings for your computer
20.Add, removes and configures Open Database Connectivity
databases sources and drives.
II. INDICATE THE SHORTCUT KEYS OF THE FOLLOWING COMMONLY USED