CH8 - CNET Key Terms

  1. The OS-level association NIC's protocols, and services to fine-tune network operation and performance.
  2. A type of software designed for workstations, that enables the use of network resources.
    client network software
  3. A form of multitasking in which each process controls the length of time it maintains exclusive control over the CPU.
    cooperative multitasking
  4. This NOS software component aids in network resource interation and drive mapping. orking in coordination with a redirector, it exchanges the locally mapped drive letter with the correct network address of a directory share inside a resouce request.
  5. A comprehensive network service than managesinformation about network ser4vices, resources, users, groups, and other objects, so that users can access resources and services by browsing for them by type, along with maintaining and enforcing access control information for directory objects.
    directory service
  6. The convention of association a local drive letter with a network directory share to simplify access to the remote resource.
    Drive mapping
  7. The method by which an operation system stores, organizes, and manages access to files on a mass storage device, such as a hard drive.
    File system
  8. A type of network application in which multiple users can simultaneously interact with each other and with data files.
  9. And internet email standard that might replace POP3 because of its advanced message controls and fault-tolerance features. The appeal of ____ (a more modern client message transfer protocol) is that it permits clients to read and manage locally leaving them stored on the server.
    Internet Message Access Protocol (IMAP)
  10. Any server on a Windows NT or Server 2000/2003 network that's not responsible for user authentication.
    Member server
  11. A Novell-developed standard that's similar to X.400.
    Message Handling System (MHS)
  12. A mode of CPU operation in which a computer processes more than one task at a time. In most instances, ______ is an illusion created through the use of time slicing.
  13. A predetermined schema for naming objects within network space. It simplifies the location and identification of objects.
    Naming Convention
  14. Enhanced software programs made possible through the communication system of network. Examples include email, scheduling, and groupware.
    Network applications
  15. Resources offered by a network that aren’t formally found in a standalone OS.
    Network services
  16. A logical separation of disk space that is viewed as a separate logical drive.
  17. An internet message transfer protocol that email clients use to copy messages from an email server to a client machine to be read and managed on the local desktop.
    Post Office Protocol version 3 (POP3)
  18. A form of multitasking in which the NOS or OS retains control over the length of time each process can maintain exclusive use of the CPU.
    Preemptive multitasking
  19. A type of software designed for server computer; this software enables hosting of resources for clients to access.
    Server network software
  20. A network resource made available for remote access by clients.
  21. A method of granting CPU cycles to different processes by limiting the amount of time each process has exclusive use of the CPU.
    Time slicing
  22. A standard method for naming network resources; it takes the form \\servername\sharname
    Universal Naming Convention (UNC)
  23. A hardware and software- independent message-handling protocol.
  24. An improved message-handling protocol that can communicate across networks and maintain a global database of addresses.
Card Set
CH8 - CNET Key Terms
key terms