News Stay informed about the latest enterprise technology news and product updates.

Do you speak geek? Part two

Are You a real Know-IT-All? This week we challenge you to find out. We've provided hints for ten of our most searched terms in our glossary. How many can you guess without peeking? We'd like to know.

Are You a real Know-IT-All? This week we challenge you to find out. We've provided hints for ten of our most searched terms in our glossary. How many can you guess without peeking? We've got a copy of Principles of Network and System Administration by Mark Burgess, published by Wiley to give away. We'll enter the first 25 respondents into our random drawing, and we'll announce our winner next week. E-mail us and let us know how you did. (Bookmark this URL and we'll announce the winner right here!) Good luck.


1. This is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.,294236,sid7_gci549087,00.html

2. This model describes seven layers of related functions that are needed at each end when a message is sent from one party to another party in a network.,294236,sid7_gci523729,00.html

3. Generally speaking, this is the popular term for a high-frequency wireless local area network (WLAN).,294236,sid7_gci838865,00.html

4. This is one of two basic modulation techniques used in spread spectrum signal transmission. It is the repeated switching of frequencies during radio transmission, often to minimize the effectiveness of "electronic warfare" - that is, the unauthorized interception or jamming of telecommunications.,294236,sid7_gci525695,00.html

5. A term used in asynchronous transfer mode (ATM) networks, this is a device that routes data packets between one or more local area networks (LANs) and an ATM backbone network, whether a campus network or a wide area network (WAN).,294236,sid7_gci212031,00.html

6. This is network bridge and a router combined in a single product.,294236,sid7_gci211707,00.html

7. This is an acronym for a categorical model of the working objectives of network management. (Hint: There are five levels.),294236,sid7_gci752173,00.html

8. This is a sequence of characters that uniquely names a wireless local area network (WLAN).,294236,sid7_gci853455,00.html

9. This is an encoding method used on T1 circuits that inserts two successive ones of the same voltage - referred to as a bipolar violation - into a signal whenever eight consecutive zeros are transmitted.,294236,sid7_gci752446,00.html

10. In an enterprise that uses the Internet, this is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service.,294236,sid7_gci212840,00.html

BONUS: This is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology.,294236,sid7_gci213790,00.html

Dig Deeper on Network Administration



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.