Computer network written test simulation test volume (3) (from "100,000 why" computer learning network http:www.why100

xiaoxiao2021-03-06  40

(The test time is 120 minutes, full of 100 points)

First, select questions (1 point for each small question, a total of 60 points) In the following questions A, B, C, D four options, only one option is correct. 1. The computer has experienced the stage during its development process. A) Mechanical computer, electronic computer B) Electric computer, electronic computer C) Mechanical computer, electric computer, electronic simulation computer, electronic digital computer D) electronic simulation computer, electronic digital computer 2. CPU frequency and speed relationship is. A) The higher the frequency, the higher the speed, the higher the frequency, the slower speed, the slower speed, the lower the frequency, the speed is fast, the speed is unrelated. 3. There is no correction with the incorrect cache. A) English name is Cache B) Its data access speed is much higher than normal memory c) price is not high D) The number of high-speed buffers can meet the CPU approximately 80% Access Demand 4. About resolution Incorrect narrative is. A) Pixel size of the resolution and display of the display B) pixel refers to a light-emitting unit C which can be independently present in the screen. Normally, a pixel on the display consists of three fluorescent powder points of red green yellow three fluorescent powder points D) pixel diameter It is usually 0.31mm, 0.28 mm, 0.15 mm. About the MCS-51 instruction register is correct. A) The CPU run is to calculate the address of the instruction to the register B) CPU to calculate the address of each instruction together with the PC increment, which can query the status of each bit, which affects the next step D) of the program. Setting the serial communication port 6. ORG 0100HMOV A, # 1EHMOV B, AMOV A, # 15HADD A, and the above section of the ORG 0100H statement is the correct description of the ORG 0100H statement. A) The start address of this program is 0108HB) The start address of this program is 0100HC) The start address of this program is 0102HD) The start address of this program is 0104H7. Batch produced in the mid-1950s. The processing work management program is called. A) First generation operating system B) The second generation operating system C) The third generation operating system D) the predecessor of the operating system 8. Processor management is called. A) Process Management B) Storage Management C) Device Management D) Job Management 9. The real-time operating system is classified by the operating system. A) Different processing mode b) Number of processing machines to the number of users D) Topology 10. Can support human-computer interaction, but also make computer systems can efficiently use the operating system of the processor. A) Batch Operating System B) Time Operating System C) Real-Time Operating System D) Distributed Operating System 11. Process is a program's execution process, which belongs to the process. A) Sportity B) Parallel C) Independent D) Asynchronous 12. The following narrative is incorrect. A) Process Control Block is the unique identification of the process B) After the process is completed, the process control block does not disappear C) The system is controlled and managed by the process control block based on the process control block perceived process. The process of transferring the ready queue in the initial process in the process control and scheduling is running. A) Advanced first out algorithm B) The highest priority algorithm is the highest priority algorithm 14. The system is always in a safe state, which is in the deadlock processing technology.

A) Dead-locking prevention B) deadlock avoids C) Death D) Deadlock Shield 15. Record when dynamic abnormal partitions. A) Partitioned address, partition size, partitioning end address B) Partition The first address C) Partition size D) The first address of the partition, the partition size 16. Computer network is constructed. A) Communication subnet, resource subnet B) resource subnet, communication link C) Communication subnet, communication link D) communication subnet, resource subnet, communication link 17. What kind of control should be issued to specific events Information, what kind of action, and what kind of response is called. A) Syntax B) Semantic C) Timing D) Control 18. In the topology of the network, there is only one root node, and its node has only one parent node. A) Star Structure B) Tree Structure C) Network Structure D) The Computer Network within 1 km of 1 km is called. A) LAN B) Metropolitan Network C) WAN D) Internet 20. Site to send the initial signal is called. A) Non-point B) Source C) Credit D) Channel 21. Decomposing a DC component amplitude, the frequency of the AC component, the amplitude, and the start phase of the AC component are called this signal. A) Signal bandwidth C) Signal Band C) Signal Type D) Signal Ingredient 22. Ohm's coaxial cable is often used to deliver baseband signals in a computer network. A) 25b) 50C) 60D) 7523. When the binary data is transmitted in the line, the transmission and reception of the data is required to represent a certain coding in accordance with certain ways. A) Data encoding technology b) Digital encoding technology C) Digital data Coding Technology D) Modulation Coding Technology of Digital Data 24. The sampling theorem pointed out that the sampling frequency is greater than or equal to the highest frequency component in the analog signal. A) 2B) 4C) 8D) 1025. The data transfer rate of the local area network is usually greater than BPS. A) 1MB) 10MC) 100md) 1G26. The core principle of Ethernet work is the method of media access control. A) Random contention B) token type C) token ring D) Random transmission type 27. The function of the physical layer in the IEEE 802 standard corresponds to the OSI reference model. A) Physical layer B) Data link layer C) Network layer D) Conference layer 28. In the IEEE 802 protocol, the specification of the metro network physical layer is included in the standard. A) IEEE 802.5B) IEEE 802.6c) IEEE 802.7D) IEEE 802.429. When adopting, the contact point oxidation causes contact failure, resulting in a network failure. A) Twisted pair B) Coaxial cable C) Optical fiber D) Microwave 30. 10BASE-5 BASE indicates that the signal is transmitted in the line. A) Baseband B) Broadband C) Broadband D) Narrow Trip 31. T 10Base-T indicates that the transmission medium type used is twisted pair. A) Baseband B) Belt C) Non-shielded D) Shield 32. In the component of the structured wiring system, it is called the central nervous of the building structured wiring system. A) Building trunk subsystem B) Equipment Subsystem C) Vertical Main Dry Subsystem D) Working Area Subsystem 33. The Internet commemorated.

A) ArpaNetb) NSFnetd) Intranet34. It is the foundation of the Internet. A) Main network B) Intermediate layer network C) subsequent intermediate network D) underlayer network 35. In the TCP / IP reference model, the layer transmission is a packet (package). A) Network interface layer B) Network Terminal C) Transport Layer D) Application Layer 36. The communication protocol belonging to the IP protocol. A) point-to-point, no connection, unreliable B) no connection, unreliable C) point, there is a connection, unreliable D) point, no connection, reliable 37. In the allocation of the IP address, medium allowed The number of networks is 126. A) Class A B) C) C) C) D) D) Class 38. In the IP protocol-based transmission protocol, the protocol that cannot be provided with reliable transmission is the protocol. A) TCPB) UDPC) DNSD) FTP39. It belongs to the transmission protocol. A) SMTPB) ACCC) POP3D) IMAP40. Help files belong to the file. A) Text b) Non-text C) Super Text D) Non-docuocon 41. In Internet service functions, the service will use the network computer as a terminal of the remote host, which can utilize various hardware and software resources of the remote host. A) w w wb) httpc) Telnetd) FTP42. Notebook connected to the Internet is called. A) Server B) Client C) Host D) Router 43. In the classification of the network information system, W W W is available. A) Network Information Resource System B) Management Information System C) Information Control System D) Information Classification System 44. In the hierarchy of the management information system, it is used both internal data and external data. A) Work information layer B) Tactical information layer C) Strategic information layer D) Management 45. Marketing belongs to. A) Structured decision B) Semi-structured decision C) Non-Structured Decision D) Random Decision 46. In the data distribution, the vertical distribution and horizontal distribution are combined. A) Vertical distribution B) Level distribution C) Export Distribution D) Mixed Distribution 47. The main content involved in e-commerce. A) Information, electronic data exchange and electronic fund transfer B) Electronic Data Exchange and Electronic Fund Transfer C) Information, Electronic Data Exchange D) Information, Electronic Data Exchange, Online Payment and Electronic Funds 48. In the classification of e-commerce, The company's e-commerce to the government is called. A) B2BB) B2CC) C2CD) B2G49. When the website is under construction, the process of making web pages is called. A) System implementation B) Web Page C) Website Function Design D) System Design 50. In the division of the computer system security level, the highest level is level. A) AB) B1C) C1D) D51. Ensure that the computer system is not in contact with the illegal person. A) Technical Safety B) Administration Security C) Policy Safety D) Legal Security 52. ​​In the network security policy, the information packets to the tool role in the network are identified.

A) Selective Access Control B) Mandatory Access Control C) Intrusion Detection D) Security Vulnerability Evaluation 53. There are two results in the transfer content encryption, including the two sides agree, and the original phrase Yes. A) Cipheet B) Brigado C) Key D) Find 54. Network management includes a function. A) 2b) 3C) 4D) 555. In network management, the relationship between the management of each object is the content. A) Configuration Management B) Fault Management C) Performance Management D) Safety Management 56. Track the content belonging to network activity. A) Configuration Management B) Fault Management C) Performance Management D) Safety Management 57. Improve communication speed is the most fundamental, the most thorough approach is in WAN. A) Reconstruction of existing communication devices and communication lines b) Improve the transfer efficiency of intermediate nodes to signals C) to improve data D) make full use of existing communication equipment 58. In the packet structure of the frame relay, the frame is fixed The boundary ends by one byte. A) 1B) 2C) 3D) 3.559. In the way communication speed, NGI belongs to the method. A) Reconstruction of existing communication devices and communication lines b) Improve the transfer efficiency of intermediate nodes to signals to increase data. The transmission efficiency D) is used to make full use of existing communication equipment 60. As one of the trends of network development, the current network is From the network-oriented network to development. A) High-speed network B) private network C) resource sharing network D) Packet switched network two, fill blanks (2 points for each empty, a total of 40 points) 1. Classify according to the size of the computer, the computer can be divided into, super large machine, Medium machine, miniature machine, microcomputer. 2. After the interrupt is executed, the step of the CPU to be executed before the interrupt service is executed. 3. It has become the basis for the development of operating system standards for international standardization organizations. 4. Methods of storage management include page storage management, segment storage management, and. 5. The computer system is composed of two parts from the software. 6. A computer network consists of subnet and resource subnet. 7. Synchronous techniques have bit synchronization and synchronization. 8. W AN is indicated. 9. The topology of the local area network is divided into: a variety of different types of rings, star and trees. 10. The server on the network has file servers, database servers, and servers. 11. Standard Ethernet card is used for desktop computer networking, while PCMCIA NIC is used in computer networking. 12. Internet is mainly composed of three layers: intermediate layer and underlying net. 13. The Internet is an example of a computer internet network, which is a global internet network that is distributed around the world, a global network formed by means of network interconnecting devices, interconnected. 14. The user's computer can be connected to the ISP through a variety of communication lines, but inductive can be divided into two categories: telephone lines and lines. 15. E-commerce is based on an open environment, business activities under the support of computer systems. 16. Key encryption technology is one of the main encryption techniques used in e-commerce systems. 17. In the W EB site and browser security communication, the site requires the browser to install it in order to verify the identity of the customer. 18. Network management is a complex process, which typically includes data processing, data analysis, and generating reports for managing networks. 19. Information security includes 5 basic elements: confidentiality, integrity, controllability, and reviewable. 20. One of the development trends in network technology is the three-network combination of cable TV and computer network.

转载请注明原文地址:https://www.9cbs.com/read-74892.html

New Post(0)