The CompTIA A+ certification is for IT professionals that can support modern technologies like security, cloud, data management and more. CompTIA A+ is the industry standard for starting a career in the Information Technology sector. The 220-1001 exam is the first in the CompTIA A+ 1000 series (followed by 220-1002). The 220-1001 exam will cover the following objectives: Mobile Devices, Networking, Hardware, Virtualization & Cloud Computing, and Hardware & Network Troubleshooting.
Processors run calculations using threads and each processor core can only handle one thread at a time. Additional cores improve processor performance by enabling multiple threads to be run simultaneously. When an application uses multiple threads on a single core processor the threads do not execute simultaneously limiting performance.
A multi-core processor is a microprocessor on a single integrated circuit with two or more separate processing units, called cores, each of which reads and executes program instructions. The instructions are ordinary CPU instructions (such as add, move data, and branch) but the single processor can run instructions on separate cores at the same time, increasing overall speed for programs that support multithreading or other parallel computing techniques. Manufacturers typically integrate the cores onto a single integrated circuit die (known as a chip multiprocessor or CMP) or onto multiple dies in a single chip package. The microprocessors currently used in almost all personal computers are multi-core. A multi-core processor implements multiprocessing in a single physical package. Designers may couple cores in a multi-core device tightly or loosely. For example, cores may or may not share caches, and they may implement message passing or shared-memory inter-core communication methods. Common network topologies used to interconnect cores include bus, ring, two-dimensional mesh, and crossbar. Homogeneous multi-core systems include only identical cores; heterogeneous multi-core systems have cores that are not identical (e.g. big.LITTLE have heterogeneous cores that share the same instruction set, while AMD Accelerated Processing Units have cores that do not share the same instruction set). Just as with single-processor systems, cores in multi-core systems may implement architectures such as VLIW, superscalar, vector, or multithreading. Multi-core processors are widely used across many application domains, including general-purpose, embedded, network, digital signal processing (DSP), and graphics (GPU). Core count goes up to even dozens, and forMulti-core_processor - Wikipedia, the free encyclopedia
You are an IT Analyst for a large chain of stores. Your department has been asked to evaluate accepting payments through wireless transmission from mobile devices. Which standard technology are they referring to?
Near Field Communication (NFC) is the standard wireless protocol behind wireless payment options such as Android Pay and Apple Pay.
Near-Field Communication (NFC) is a set of communication protocols for communication between two electronic devices over a distance of 4 cm (11⁄2 in) or less NFC offers a low-speed connection with simple setup that can be used to bootstrap more-capable wireless connectionsNFC devices can act as electronic identity documents and keycards They are used in contactless payment systems and allow mobile payment replacing or supplementing systems such as credit cards and electronic ticket smart cards This is sometimes called NFC/CTLS or CTLS NFC, with contactless abbreviated CTLS NFC can be used for sharing small files such as contacts, and bootstrapping fast connections to share larger media such as photos, videos, and other filesNear_field_communication - Wikipedia, the free encyclopedia
Which of the following network topologies provides the most redundancy to protect against network outages?
In a Mesh network topology every network node (router, switch, hub, etc) is connected to every other network node. If a connection breaks, the node can easily communicate with another through multiple existing connections. In reality this is too complex to implement in a large network, but it is still very common to see a hybrid network with several mesh style layers.
A mesh network is a local area network topology in which the infrastructure nodes (i.e. bridges, switches, and other infrastructure devices) connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to efficiently route data to and from clients. This lack of dependency on one node allows for every node to participate in the relay of information. Mesh networks dynamically self-organize and self-configure, which can reduce installation overhead. The ability to self-configure enables dynamic distribution of workloads, particularly in the event a few nodes should fail. This in turn contributes to fault-tolerance and reduced maintenance costs.Mesh topology may be contrasted with conventional star/tree local network topologies in which the bridges/switches are directly linked to only a small subset of other bridges/switches, and the links between these infrastructure neighbours are hierarchical. While star-and-tree topologies are very well established, highly standardized and vendor-neutral, vendors of mesh network devices have not yet all agreed on common standards, and interoperability between devices from different vendors is not yet assured.Mesh_networking - Wikipedia, the free encyclopedia
One of your users travels often for work, utilizing their laptop as their main device. When in the office they desire more full functionality such as using additional monitors, a full-sized keyboard and a conventional mouse. Which of the following would best allow the user to have these things?
A docking station allows for peripherals to be connected by simply connecting a laptop via a docking port. Docking stations allow for conventional Desktop hardware to be used with a laptop.
In computing, a docking station or port replicator (hub) or dock provides a simplified way to plug-in a mobile device, such as a laptop, to common peripherals. Because a wide range of dockable devices—from mobile phones to wireless mouse—have different connectors, power signaling, and uses, docks are unstandardized and are therefore often designed for a specific type of device.A dock can allow some laptop computers to become a substitute for a desktop computer, without sacrificing the mobile computing functionality of the machine. Portable computers can dock and undock hot, cold or standby, depending on the abilities of the system. In a cold dock or undock, one completely shuts the computer down before docking/undocking. In a hot dock or undock, the computer remains running when docked/undocked. Standby docking or undocking, an intermediate style used in some designs, allows the computer to be docked/undocked while powered on, but requires that it be placed into a sleep mode prior to docking/undocking.Docking_station - Wikipedia, the free encyclopedia
You are a Desktop and Laptop Technician for a small computer repair shop. A customer on a limited budget has asked you to upgrade their laptop in order to increase performance. Which of the following components can be easily replaced or upgraded?
Laptop designs often make it difficult to upgrade or change components like video cards, processors and motherboards. RAM and Hard drives are typically easily accessible and cost effective to upgrade in a laptop.
Random-access memory (RAM; ) is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory, in contrast with other direct-access data storage media (such as hard disks, CD-RWs, DVD-RWs and the older magnetic tapes and drum memory), where the time required to read and write data items varies significantly depending on their physical locations on the recording medium, due to mechanical limitations such as media rotation speeds and arm movement. RAM contains multiplexing and demultiplexing circuitry, to connect the data lines to the addressed storage for reading or writing the entry. Usually more than one bit of storage is accessed by the same address, and RAM devices often have multiple data lines and are said to be "8-bit" or "16-bit", etc. devices.In today's technology, random-access memory takes the form of integrated circuit (IC) chips with MOS (metal-oxide-semiconductor) memory cells. RAM is normally associated with volatile types of memory where stored information is lost if power is removed. The two main types of volatile random-access semiconductor memory are static random-access memory (SRAM) and dynamic random-access memory (DRAM). Non-volatile RAM has also been developed and other types of non-volatile memories allow random access for read operations, but either do not allow write operations or have other kinds of limitations onRandom-access_memory - Wikipedia, the free encyclopedia
The Post Office Protocol 3 (POP3) is a protocol used by clients to download emails from a server. Another possible answer is the Internet Message Access Protocol (IMAP) which is not listed as an option. The Simple Mail Transfer Protocol (SMTP) is not correct as it is only used by clients to send email and by servers to transfer emails from one server to another. SMTP is not used to download email from a server to a client device like a mobile phone.
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use, and along with IMAP the most common protocols for email retrieval.Post_Office_Protocol - Wikipedia, the free encyclopedia
A cable tester is used to verify a cable can support necessary electrical connections. For example, an ethernet cable tester would verify cables are in the correct order.
A cable tester is an electronic device used to verify the electrical connections in a signal cable or other wired assembly. Basic cable testers are continuity testers that verify the existence of a conductive path between ends of the cable, and verify the correct wiring of connectors on the cable. More advanced cable testers can measure the signal transmission properties of the cable such as its resistance, signal attenuation, noise and interference.Cable_tester - Wikipedia, the free encyclopedia
Of the following connectors, which is the most common connector type used for a PCs power supply and other hardware components located inside the computer case?
While there is a variety of connectors for PCs, the pin (male) and socket (female) design of the Molex design has become recognized and very common for simplicity, reliability, and low cost.
Molex connector is the vernacular term for a two-piece pin and socket interconnection. Pioneered by Molex Connector Company, the two-piece design became an early electronic standard. Molex developed and patented the first examples of this connector style in the late 1950s and early 1960s. First used in home appliances, other industries soon began designing it into their products from automobiles to vending machines to minicomputers. In such a connector, cylindrical spring-metal pins fit into cylindrical spring-metal sockets. The pins and sockets are held in a rectangular matrix in a nylon shell. The connector typically has 2 to 24 contacts and is polarized or keyed to ensure correct orientation. Pins and sockets can be arranged in any combination in a single housing, and each housing can be either male or female. There are three typical pin sizes: 1.57 mm (0.062 in), 2.13 mm (0.084 in), and 2.36 mm (0.093 in). The 1.57 mm pin can carry 5 A of current, while the 2.36 mm can carry 8.5 A. Because the pins have a large contact surface area and fit tightly, these connectors are typically used for power. In October 1963, AMP (now TE Connectivity) introduced the Mate-n-Lok connector. The AMP connector was similar to the patented Molex connectors but not interchangeable. Both were widely used in the computer industry and the term "Molex connector" is often inaccurately used to refer to all nylon plugs and receptacles. The first 5.25-inch floppy disk drive, the Shugart SA400, introduced in August 1976, used the AMP Mate-n-Lok connector part number 350211-1. This connector became the standard for 5.25-inch formatMolex_connector - Wikipedia, the free encyclopedia
You are helping a friend build a new gaming PC. To save on costs they have opted to buy a new motherboard but keep their existing DDR2 memory from their previous PC. After having some trouble getting the memory to fit into the motherboard you check the motherboard manufacturer's documentation and find they recommend their own DDR3 memory. How should you proceed?
DDR2 and DDR3 memory are not compatible and will not physically fit into each other's slots on a motherboard. In this case you will need to purchase new DDR3 memory as the documentation states it uses DDR3. However as an open standard you do not need to purchase the memory from the same manufacturer as the motherboard. As long as both the memory and the motherboard support DDR3 any brand will be fine.
You are a desktop technician for a small office. You suspect that a user has opened their desktop PC case and made unauthorized changes to the device's hardware. Which of the following can be configured to identify this in the future?
Chassis Intrusion Detection is an option in for some desktop and BIOS systems that can detect when a computer's case has been opened.
A computer case, also known as a computer chassis, is the enclosure that contains most of the hardware of a personal computer. The components housed inside the case (such as the CPU, motherboard, memory, mass storage devices, power supply unit and various expansion cards) are referred as the internal hardware, while hardware outside the case (typically cable-linked or plug-and-play devices such as the display, speakers, keyboard, mouse and USB flash drives) are known as peripherals. Conventional computer cases are fully enclosed, with small holes (mostly in the back panel) that allow ventilation and cutout openings that provide access to plugs/sockets (back) and removable media drive bays (front). The structural frame (chassis) of a case is usually constructed from rigid metals such as steel (often SECC — steel, electrogalvanized, cold-rolled, coil) and aluminium alloy, with hardpoints and through holes for mounting internal hardware, case fans/coolers and for organizing cable management. The external case panels, at least one of which are removable, cover the chassis from the front, sides and top to shield the internal components from physical intrusion and dust collection, and are typically made from painted metallic and/or plastic material, while other materials such as mesh, tempered glass, acrylic, wood and even Lego bricks have appeared in many modern commercial or home-built cases. In recent years, open frame or open air cases that are only partly enclosed (with freer ventilation and thus theoretically better cooling) have become available in the premium gaming PC market.Computer_case - Wikipedia, the free encyclopedia
Servers should always be given a static IP Address to ensure it can be quickly resolved and any applications using the IP address do not need to be reconfigured.
An Internet Protocol address (IP address) is a numerical label such as 192.0.2.1 that is connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the mid-2000s. IP addresses are written and displayed in human-readable notations, such as 192.0.2.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated in CIDR notation by suffixing the address with the number of significant bits, e.g., 192.0.2.1/24, which is equivalent to the historically used subnet mask 255.255.255.0. The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by five regional Internet registries (RIRs) responsible in their designated territories for assignment to local Internet registries, such as Internet service providers (ISPs), and other end users. IPv4 addresses were distributed by IANA to the RIRs in blocks of approximately 16.8 million addresses each, but have been exhausted at the IANA level since 2011. Only one of the RIRs still has a supply for local assignments in Africa. Some IPv4 addresses are reserved for private networks and are not globally unique. Network administrators assign an IP address to each device connected to aIP_address - Wikipedia, the free encyclopedia
Fiber optic cable is immune from electromagnetic interference because it uses light and not electricity to transmit data. Of the remaining options Shielded Twisted Pair (STP) is the least susceptible but is not immune to electromagnetic interference.
An optical fiber, or optical fibre in Commonwealth English, is a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair. Optical fibers are used most often as a means to transmit light between the two ends of the fiber and find wide usage in fiber-optic communications, where they permit transmission over longer distances and at higher bandwidths (data transfer rates) than electrical cables. Fibers are used instead of metal wires because signals travel along them with less loss; in addition, fibers are immune to electromagnetic interference, a problem from which metal wires suffer. Fibers are also used for illumination and imaging, and are often wrapped in bundles so they may be used to carry light into, or images out of confined spaces, as in the case of a fiberscope. Specially designed fibers are also used for a variety of other applications, some of them being fiber optic sensors and fiber lasers.Optical fibers typically include a core surrounded by a transparent cladding material with a lower index of refraction. Light is kept in the core by the phenomenon of total internal reflection which causes the fiber to act as a waveguide. Fibers that support many propagation paths or transverse modes are called multi-mode fibers, while those that support a single mode are called single-mode fibers (SMF). Multi-mode fibers generally have a wider core diameter and are used for short-distance communication links and for applications where high power must beOptical_fiber - Wikipedia, the free encyclopedia
Which of the terms listed below refers to a situation where a single Central Processing Unit (CPU) appears as two virtual CPUs to the operating system?
Hyper-threading makes multitasking on your system much easier, allowing two or more processes to run using the same resources.
Hyper-threading (officially called Hyper-Threading Technology or HT Technology and abbreviated as HTT or HT) is Intel's proprietary simultaneous multithreading (SMT) implementation used to improve parallelization of computations (doing multiple tasks at once) performed on x86 microprocessors. It was introduced on Xeon server processors in February 2002 and on Pentium 4 desktop processors in November 2002. Since then, Intel has included this technology in Itanium, Atom, and Core 'i' Series CPUs, among others.For each processor core that is physically present, the operating system addresses two virtual (logical) cores and shares the workload between them when possible. The main function of hyper-threading is to increase the number of independent instructions in the pipeline; it takes advantage of superscalar architecture, in which multiple instructions operate on separate data in parallel. With HTT, one physical core appears as two processors to the operating system, allowing concurrent scheduling of two processes per core. In addition, two or more processes can use the same resources: If resources for one process are not available, then another process can continue if its resources are available. In addition to requiring simultaneous multithreading support in the operating system, hyper-threading can be properly utilized only with an operating system specifically optimized for it.Hyper-threading - Wikipedia, the free encyclopedia
M.2 drives mount directly to the motherboard without the use of power or data cables.
M.2, pronounced m dot two and formerly known as the Next Generation Form Factor (NGFF), is a specification for internally mounted computer expansion cards and associated connectors. M.2 replaces the mSATA standard, which uses the PCI Express Mini Card physical card layout and connectors. Employing a more flexible physical specification, M.2 allows different module widths and lengths, which, paired with the availability of more advanced interfacing features, makes M.2 more suitable than mSATA in general for solid-state storage applications, particularly in smaller devices such as ultrabooks and tablets.Computer bus interfaces provided through the M.2 connector are PCI Express x4 (up to four lanes), Serial ATA 3.0, and USB 3.0 (a single logical port for each of the latter two). It is up to the manufacturer of the M.2 host or module to select which interfaces are to be supported, depending on the desired level of host support and the module type. Different M.2 connector keying notches denote various purposes and capabilities of both the M.2 hosts and modules, and also prevent the M.2 modules from being inserted into incompatible host connectors.The M.2 specification supports NVM Express (NVMe) as the logical device interface for M.2 PCI Express SSDs, in addition to supporting legacy Advanced Host Controller Interface (AHCI) at the logical interface level. While the support for AHCI ensures software-level backward compatibility with legacy SATA devices and legacy operating systems, NVM Express is designed to fully utilize the capability of high-speed PCI Express storage devices to perform many I/OM.2 - Wikipedia, the free encyclopedia
A PC you are working on fails to boot it's OS. The OS is installed, but the PC cannot seem to access it. Your first course of action should be to:
Ensuring that the BIOS is selecting the primary storage partition with the OS installed via boot sequence should be verified when this issue occurs.
In computing, BIOS (, BY-oss, -ohss; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process (power-on startup). The BIOS firmware comes pre-installed on an IBM PC or IBM PC compatible's system board and exists in some UEFI-based systems to maintain compatibility with operating systems that do not support UEFI native operation. The name originates from the Basic Input/Output System used in the CP/M operating system in 1975. The BIOS originally proprietary to the IBM PC has been reverse engineered by some companies (such as Phoenix Technologies) looking to create compatible systems. The interface of that original system serves as a de facto standard. The BIOS in modern PCs initializes and tests the system hardware components (Power-on self-test), and loads a boot loader from a mass storage device which then initializes a kernel. In the era of DOS, the BIOS provided BIOS interrupt calls for the keyboard, display, storage, and other input/output (I/O) devices that standardized an interface to application programs and the operating system. More recent operating systems do not use the BIOS interrupt calls after startup.Most BIOS implementations are specifically designed to work with a particular computer or motherboard model, by interfacing with various devices especially system chipset. Originally, BIOS firmware was stored in a ROM chip on the PC motherboard. In later computer systems, the BIOS contents are stored on flashBIOS#Boot_priority - Wikipedia, the free encyclopedia
A USB Drive is the only device or component that can be used as a boot device. DDR2 is a type of Random Access Memory (RAM). HDMI (High-Definition Multimedia Interface) is audio/video interface. FDISK is a command on some operating systems that provides disk partitioning functions - but it is not a storage device as requested by the question.
USB drive may refer to: A USB flash drive or "thumb drive", a USB-connected computer storage using semiconductor non-volatile random-access memory A USB external drive, a hard drive fitted with a USB interface Secure Digital, a non-volatile memory card format CompactFlash, a flash memory mass storage device Memory Stick, a removable flash memory card formatUSB_drive - Wikipedia, the free encyclopedia
Plenum cabling is special cabling used in the plenum spacing of buildings. It has special fire-retardant properties to reduce fire's ability to spread.
Plenum cable is electrical cable that is laid in the plenum spaces of buildings. In the United States, plastics used in the construction of plenum cable are regulated under the National Fire Protection Association standard NFPA 90A: Standard for the Installation of Air Conditioning and Ventilating Systems. All materials intended for use on wire and cables to be placed in plenum spaces are designed to meet rigorous fire safety test standards in accordance with NFPA 262 and outlined in NFPA 90A. Plenum cable is jacketed with a fire-retardant plastic jacket of either a low-smoke polyvinyl chloride (PVC) or a fluorinated ethylene polymer (FEP). Polyolefin formulations, specifically based on polyethylene compounding had been developed by at least two companies in the early to mid-1990s; however, these were never commercialized, and development efforts continue in these yet-untapped product potentials. Development efforts on a non-halogen plenum compound were announced in 2007 citing new flame-retardant synergist packages that may provide an answer for a yet-underdeveloped plenum cable market outside the United States. In 2006, significant concern developed over the potential toxicity of FEP and related fluorochemicals including the process aid perfluorooctanoic acid (PFOA) or C8 such that California has proposed some of these materials as potential human carcinogens. The NFPA Technical Committee on Air Conditioning, in response to public comment, has referred the issue of toxicity of cabling materials to the NFPA Committee on Toxicity for review before 2008. In 2007, a development program specifically targeting the production of a non-halogen plenum cablePlenum_cable - Wikipedia, the free encyclopedia
You are setting up a new workstation and decided to use a twisted-pair copper cable to connect the PC to your switch. Which connector would best suit your needs?
RJ-45 is the common name for the 8-pin connector (8P8C) used for various Ethernet cables (CAT5, CAT5e, CAT6, etc), which come with twisted pairs for cross-talk (interference) resistance.
Ethernet () is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3. Ethernet has since been refined to support higher bit rates, a greater number of nodes, and longer link distances, but retains much backward compatibility. Over time, Ethernet has largely replaced competing wired LAN technologies such as Token Ring, FDDI and ARCNET. The original 10BASE5 Ethernet uses coaxial cable as a shared medium, while the newer Ethernet variants use twisted pair and fiber optic links in conjunction with switches. Over the course of its history, Ethernet data transfer rates have been increased from the original 2.94 Mbit/s to the latest 400 Gbit/s, with rates up to 1.6 Tbit/s under development. The Ethernet standards include several wiring and signaling variants of the OSI physical layer. Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses, and error-checking data so that damaged frames can be detected and discarded; most often, higher-layer protocols trigger retransmission of lost frames. Per the OSI model, Ethernet provides services up to and including the data link layer. The 48-bit MAC address was adopted by other IEEE 802 networking standards, including IEEE 802.11 (Wi-Fi), as well as by FDDI. EtherType values are also used in Subnetwork Access Protocol (SNAP) headers. Ethernet is widely used in homes and industry, and interworks well with wirelessEthernet - Wikipedia, the free encyclopedia
You are using the SMB protocol to share files and printers on a Windows network. Which of the following ports is used by the SMB protocol?
Server Message Block (SMB) protocol is a client-server protocol that allows system administrators to share printers, files and other resources. It is more common with Windows OS based environments but can be used on Linux and Mac as well.
Server Message Block (SMB) is a communication protocol originally developed in 1983 by Barry A. Feigenbaum at IBM and intended to provide shared access to files and printers across nodes on a network of systems running IBM's OS/2. It also provides an authenticated inter-process communication (IPC) mechanism. In 1987, Microsoft and 3Com implemented SMB in LAN Manager for OS/2, at which time SMB used the NetBIOS service atop the NetBIOS Frames protocol as its underlying transport. Later, Microsoft implemented SMB in Windows NT 3.1 and has been updating it ever since, adapting it to work with newer underlying transports: TCP/IP and NetBT. SMB implementation consists of two vaguely named Windows services: "Server" (ID: LanmanServer) and "Workstation" (ID: LanmanWorkstation). It uses NTLM or Kerberos protocols for user authentication. In 1996, Microsoft published a version of SMB 1.0 with minor modifications under the Common Internet File System (CIFS ) moniker. CIFS was compatible with even the earliest incarnation of SMB, including LAN Manager's. It supports symbolic links, hard links, and larger file size, but none of the features of SMB 2.0 and later. Microsoft's proposal, however, remained an Internet Draft and never achieved standard status. Microsoft has since discontinued use of the CIFS moniker but continues developing SMB and making subsequent specifications publicly available.Server_Message_Block - Wikipedia, the free encyclopedia
You work for a small enterprise with 3 on-premise servers and a shared private network. You are able to connect a new laptop to the wireless network but it has it has no network or internet connectivity. The servers on the same network are working as expected. You know these servers have static IPs. Based on this info, where should you start looking FIRST?
Based on the information given, it seems like the new device is not receiving an IP addresses and DHCP is the best place to start troubleshooting.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.The technology eliminates the need for individually configuring network devices manually, and consists of two network components, a centrally installed network DHCP server and client instances of the protocol stack on each computer or device. When connected to the network, and periodically thereafter, a client requests a set of parameters from the server using DHCP. DHCP can be implemented on networks ranging in size from residential networks to large campus networks and regional ISP networks. Many routers and residential gateways have DHCP server capability. Most residential network routers receive a unique IP address within the ISP network. Within a local network, a DHCP server assigns a local IP address to each device. DHCP services exist for networks running Internet Protocol version 4 (IPv4), as well as version 6 (IPv6). The IPv6 version of the DHCP protocol is commonly called DHCPv6.Dynamic_Host_Configuration_Protocol - Wikipedia, the free encyclopedia
Looks like thats it! You can go back and review your answers or click the button below to grade your test.