Browse Definitions:
Quiz

Quiz: Networking Hardware

Those parts of the system that you can hit with a hammer are called hardware; those program instructions that you can only curse at are called software. - Anonymous

This week's quiz has a slightly different format. Your goal will be to match the correct term in the left-hand column with its description in the right-hand column.

How to take the quiz:
- After reading the question, click on the answer that you think iscorrect to go to the whatis.com definition. If the answer you ve chosenis correct, you will see the question text somewhere in the defintion.
OR
- After reading the question, write down the letter of your answerchoice on scrap paper. Check your answers by using the answer key at theend of the quiz.

a) backbone
b) circuit
c) transistor
d) bus
e) twisted pair
f) trunk
g) coaxial cable
h) chip
i) interface device
j) motherboard
k) edge device
l) transponder
m) satellite
n) beep code
o) NIC
p) router
q) MAC address
r) repeater
s) peripheral
t) port number
u) acoustic coupler
v) physical unit
w) modem
x) LAN server
y) slot
z) surge suppressor
1._____ This is any computer device that is not partof the essential computer but is situated relatively close by.

2. _____This is a larger transmission line that carriesdata gathered from smaller lines that interconnect with it.

3._____ This is a computer circuit board or card thatis installed in a computer so that it can be connected to a network.

4._____ On a network, this is your computer's unique hardwarenumber.

5. _____This is the ordinary copper wire that connectshome and many business computers to the telephone company.

6. _____This is a physical device that can pass packetsbetween a legacy application type network (such as an Ethernet) and an ATM network by using data link layer and Network layer information.

7._____This consists of three layers of a semiconductormaterial, each capable of carrying a current.

8._____This is a device or, in some cases, software ina computer, that determines the next network point to which a packet shouldbe forwarded toward its destination.

9._____This is the physical arrangement in a computer that contains the computer's basic circuitry and components.

10.____This is a device that receives a signal onan electromagnetic or optical transmission medium, amplifies the signal,and then retransmits it along the next leg of the medium.



**************************************************************************
SCROLL DOWN FOR ANSWER KEY

















See the rest of our quiz topics

ANSWER KEY: 1s;2a;3o;4q;5e;6k;7c;8p;9j;10r
Let us know how you did and suggest a topic for a future quiz! contactus@whatis.com

This was last updated in July 2008

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close