,Business Data Networks and Security, 9e (Panko)
Chapter 1 Welcome to the Cloud
1) Google Docs, a cloud-based word processing program, is an example of a ________.
A) cloud data service
B) cloud synchronization service
C) cloud software service
D) None of the above
Answer: C
2) What did Claire learn about individual access points?
A) SSIDs
B) BSSIDs
C) Both A and B
D) Neither A nor B
Answer: C
3) The Ethernet address of an access point is its ________.
A) SSID
B) BSSID
C) Both A and B
D) Neither A nor B
Answer: B
4) An unauthorized access point is a(n) ________.
A) SSID
B) BSSID
C) rogue access point
D) evil twin access point
Answer: C
5) A network is a system that permits networked applications on a host to work together.
Answer: FALSE
6) Which of the following is a networked application?
A) The Internet.
B) The World Wide Web.
C) Both A and B
D) Neither A nor B
Answer: B
7) Which of the following is a networked application?
A) E-mail.
B) The World Wide Web.
C) Both A and B
D) Neither A nor B
Answer: C
1
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
,8) Users create or enhance website content in ________ applications.
A) Web-based
B) WWW
C) Web 2.0
D) streaming media
Answer: C
9) Social media applications facilitate the creation of group relationships.
Answer: TRUE
10) A device attached to a network is called a ________.
A) client
B) server
C) host
D) Either A or B
Answer: C
11) Which of the following is a host when it is on a network?
A) A client PC.
B) A server.
C) A mobile phone.
D) All of the above
Answer: D
12) If a laptop PC is connected to a network, it is a host.
Answer: TRUE
13) A smartphone connected to the Internet is a host.
Answer: TRUE
14) To emphasize the fact that the user does not have to see how it works internally, the
________ is often drawn as a cloud.
A) network core
B) access link
C) host
D) server
Answer: A
15) Network speeds usually are measured in ________.
A) bits per second
B) bytes per second
C) Both A and B
D) Neither A nor B
Answer: A
2
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
, 16) 20,000 bits per second is ________.
A) 20 kbps
B) 20 Mbps
C) 20 Gbps
D) None of the above
Answer: A
17) 200,000 bits per second is ________.
A) 20 kbps
B) 200 kbps
C) 200 Gbps
D) None of the above
Answer: B
18) 320,000 kbps is ________.
A) 320 bps
B) 320 Mbps
C) 320 Gbps
D) None of the above
Answer: B
19) The correct metric prefix for kilo is K.
Answer: FALSE
20) Packet switching is most efficient for ________ data.
A) relatively constant
B) bursty
C) high-priority
D) All of the above
Answer: B
21) Fragmentation is done on the ________.
A) source host
B) destination host
C) Both A and B
D) Neither A nor B
Answer: A
22) A typical packet is about ________ long.
A) 100 bits
B) 100 bytes
C) 1,000 bytes
D) 40 bytes
Answer: B
3
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 1 Welcome to the Cloud
1) Google Docs, a cloud-based word processing program, is an example of a ________.
A) cloud data service
B) cloud synchronization service
C) cloud software service
D) None of the above
Answer: C
2) What did Claire learn about individual access points?
A) SSIDs
B) BSSIDs
C) Both A and B
D) Neither A nor B
Answer: C
3) The Ethernet address of an access point is its ________.
A) SSID
B) BSSID
C) Both A and B
D) Neither A nor B
Answer: B
4) An unauthorized access point is a(n) ________.
A) SSID
B) BSSID
C) rogue access point
D) evil twin access point
Answer: C
5) A network is a system that permits networked applications on a host to work together.
Answer: FALSE
6) Which of the following is a networked application?
A) The Internet.
B) The World Wide Web.
C) Both A and B
D) Neither A nor B
Answer: B
7) Which of the following is a networked application?
A) E-mail.
B) The World Wide Web.
C) Both A and B
D) Neither A nor B
Answer: C
1
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
,8) Users create or enhance website content in ________ applications.
A) Web-based
B) WWW
C) Web 2.0
D) streaming media
Answer: C
9) Social media applications facilitate the creation of group relationships.
Answer: TRUE
10) A device attached to a network is called a ________.
A) client
B) server
C) host
D) Either A or B
Answer: C
11) Which of the following is a host when it is on a network?
A) A client PC.
B) A server.
C) A mobile phone.
D) All of the above
Answer: D
12) If a laptop PC is connected to a network, it is a host.
Answer: TRUE
13) A smartphone connected to the Internet is a host.
Answer: TRUE
14) To emphasize the fact that the user does not have to see how it works internally, the
________ is often drawn as a cloud.
A) network core
B) access link
C) host
D) server
Answer: A
15) Network speeds usually are measured in ________.
A) bits per second
B) bytes per second
C) Both A and B
D) Neither A nor B
Answer: A
2
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
, 16) 20,000 bits per second is ________.
A) 20 kbps
B) 20 Mbps
C) 20 Gbps
D) None of the above
Answer: A
17) 200,000 bits per second is ________.
A) 20 kbps
B) 200 kbps
C) 200 Gbps
D) None of the above
Answer: B
18) 320,000 kbps is ________.
A) 320 bps
B) 320 Mbps
C) 320 Gbps
D) None of the above
Answer: B
19) The correct metric prefix for kilo is K.
Answer: FALSE
20) Packet switching is most efficient for ________ data.
A) relatively constant
B) bursty
C) high-priority
D) All of the above
Answer: B
21) Fragmentation is done on the ________.
A) source host
B) destination host
C) Both A and B
D) Neither A nor B
Answer: A
22) A typical packet is about ________ long.
A) 100 bits
B) 100 bytes
C) 1,000 bytes
D) 40 bytes
Answer: B
3
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall