Tashkent university of information technologies named after muhammad al-kwarizmi abdiyeva saida


Fill in the blanks while listening to the text about Basic Networks



Download 1,09 Mb.
bet63/183
Sana20.09.2021
Hajmi1,09 Mb.
#179607
1   ...   59   60   61   62   63   64   65   66   ...   183
Bog'liq
The coursebook Saida. 2020. Latest

Fill in the blanks while listening to the text about Basic Networks.

In the simplest explanation, networking is just computers talking to each other. They do this by sending data packets using various protocols and transmission mediums such as 1. _____________ cable or Wi-Fi connections. Computers must also know how to find other computers on the network. To put it briefly, every computer on the network needs a unique address so messages know where to go after they are sent.

Networks exist for many reasons including distributed computing in a client-server or peer-to-peer networking architecture, centralized data security and authentication,

2.__ ______________ of risk of computer downtime, combining computers into a single domain to facilitate groupware applications and system administration tasks, communication and fun! The types of networks you deal with on a daily basis include 3. ______________ area networks (LANs) and 4. ___________ area networks (WANs). Many people today have LANs in their schools, offices, and even their homes. LANs are especially good for sharing Internet access and commonly used files and databases.

Users can also connect to wide area networks ( WANS ) as well, which are just large LANS spread out over several physical locations. The Internet itself is basically a large WAN, with each 5. _______ on the network having it's own unique IP address. As you may have read in books or seen in movies, security considerations play a large role when designing networks. Technology such as 6. _____________ can both block and filter unwanted network traffic. Virtual private networks (VPNs) are used to connect remote users to office networks without jeopardizing security. VPNs use strong data encryption to hide data as it is moving between routers over the Internet.

7. _______________ is not something you can master in a week or even a month. Hundreds of books have been written about the subject and many more hundreds will come in the future as technologies 8._________ and evolve. If you work on networks for a living, you are called a network engineer, and you will probably take certification exams by networking companies such as 9. _______________.

There are other 10. _______________ of networking as well which are not always between PCs and servers. An example is Bluetooth technology, which is optimized for networking between common consumer electronics such as mobile phones, mp3 players, and similar devices.


Download 1,09 Mb.

Do'stlaringiz bilan baham:
1   ...   59   60   61   62   63   64   65   66   ...   183




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish