(The test time is 120 minutes, full of 100 points)
First, select questions (1 point for each small question, a total of 60 points) In the following questions A, B, C, D four options, only one option is correct. 1. The following describes the incorrect microcomputer hardware is. A) Hardware refers to various devices, components, equipment, etc. of microcomputer systems. All of them are visible, not necessarily hardware C) keyboard and mouse are also hardware D) within the internal memory and external memory belong to Hardware 2. Another performance indicator extension capability of the motherboard is mainly reflected. A) Slot number, applicable Industrial Standard B) Slot Number C) Applicable Industrial Standard D) The number of interfaces. 3. The following describes the incorrect disc related to the disc. A) Small groove B made of mechanical methods or other methods on the surface of the optical disk) When the laser beam is shifted into the groove, the reflected light is different from the plane, which can make the received signal into 0. And 1C) The main technical indicators of the optical disc drive are the data transfer speed D) a single speed optical drive data transmission speed is 80kbps4. The data that can be processed for the CPU is stored. A) Memory B) Register C) Cache d) Cache 5. The following statements regarding the MCS-51 timer logic register are incorrect. A) Through it can set the timer length B) By it can set the external count size of the timer C), it can set the effect of the timer on the interrupt D) can be set to the serial communication port through the program 6. The following ORG 0100H MOV A, # 1EH MOV B, A MOV A, # 15h Add A, BEND above a piece of code, the incorrect description of the ADD A, B statement is. A) The resulting result should be that the decimal 51b) result is a positive number and the two features that do not have more than 255 to obtain a C) in the identification register, each bit in the identity register can also be learned. D) The address of this instruction is 0104H7. DOS applied to Apple belongs to the bit operating system. A) 4B) 8C) 16D) 328. Tasks for the management of software and data resources. A) Process management b) Storage Management C) File Management D) Job Management 9. The DOS operating system is. A) Multi-user operating system B) Multi-task operating system C) single task operating system D) Network Operating System 10. The main task of network operating systems is. A) Communication, resource sharing, network management, security management b) Communication, resource sharing, and network management D) network communication, network management, security management, network management, network management, network management, network management, network management, network management, network management, network management, network management, network management, network management, network management, network management, network management, network management 11. The following narrative the correct one is. A) Thread is part of the process of the process is a part of the thread. C) Process and thread independent D) Process and threads are the same concept 12. If a resource is not used, then its seematic amount is. A) -1B) -2C) 0D) 113. Various data belongs to. A) Permanent Resource B) Temporary Resource C) Unavailable Resource D) Available Resources 14. The storage management object of the operating system is mainly. A) System area b) User Zone C) CPUD) Hard Disk 15. The idle page is placed. A) User Program Page B) Idle Page Table C) User Program Page D) Snap Table 16. The terminals of the host and the terminal of the application resource are constituted. A) Communication subnet B) Resource Subnet C) Network Node D) Communication Link 17. In the topology of the network, the end of the upper layer is called.
A) Father node B) Sub Node C) Root Node D) Leaf Joint Point 18. In the topology of the network, only one node has a fault, and the network communication is unprofitted. A) Star Structure B) Tree Structure C) Net Structure D) Ring Structure 19. The exchange local area network belongs to. A) Broadcast network B) Point-to-point network C) Star Network D) Tree network 20. Communication for continuous signals at time and value is called. A) Simulation Communication B) Digital Communication C) Serial Communication D) Parallel Communication 21. Under the general communication requirements, the signals within the range are not enlarged. A) a few hundred meters b) one kilometer C) a few kilometers D) more than ten kilometers 22. It can completely avoid electromagnetic interference. A) Fiber B) Coaxial cable C) Twisted pair D) 75 ohm coaxial cable 23. The system is measured once a fixed time interval is measured. A) Sampling B) Quantization C) Code D) Draw 24. In the never zero code, the data "0" is indicated by negative level, called. A) Full wide single pole code B) Full Wide Double Distlode C) Manchester Code D) Differential Manchester Code 25. The topology of the data unilateral transmission is. A) Bus type structure B) Ring Structure C) Star Structure D) Tree Structure 26. Allows some sites to have priority. A) Bus type network B) Ethernet C) ring network D) token bus network 27. In the IEEE 802 protocol, the network interconnection of the LAN is included in the standard. A) IEEE 802.1B) IEEE 802.2c) IEEE 802.3D) IEEE 802.428. In the IEEE 802 protocol, standard defines a local area network security specification. A) IEEE 802.9 B) IEEE 802.7 d) IEEE 802.7 D) IEEE 802.829. According to the agreement, the maximum connection distance of the Ethernet network segment is M. A) 100B) 300C) 500D) 150030. When using the coaxial cable network, the total number of trunk lines from any workstation arrive at another workstation cannot exceed one. A) 3 b) 4 c) 5 d) 631. When using the twisted wire network, there is more than one workstation on the network without using the bridge. A) 256B) 768C) 1023D) 102432. In the component of the structured wiring system, it is used to place the telecommunication wiring system. A) Administrative subsystem B) Equipment Subsystem C) Vertical Main Dry Subsystem D) Working Area Subsystem 33. In the Internet, every node to seek the communication link should have a storage transition function, which is for. A) Destination B) to the Internet B) to ensure that the communication network will still be able to communicate with the network after destruction of the network, which is still able to communicate with the network. Decrease the network's communication cost 34. Campus network belongs to. A) Main network B) Intermediate layer network C) subsequent intermediate layer network D) underlayer network 35. In the TCP / IP reference model, the UDP protocol belongs to.
A) Network interface layer B) Network Terminal C) Transport Layer D) Application Layer 36. When the data is received, if the node is the routing node, it is required. A) Data report group B) Perform data report to pay the datagram to take the datagram to make routing processing 37. In the allocation of the IP address, the address is reserved. A) Class D b) E C) c) c class D) G class 38. Internet service provider is called. A) OCPB) ODIC) ISPD) ASP39. Mainly to "see" files are files. A) Text b) Non-text C) Super Text D) Super Media 40. In http://www.sohu.com /index.htm, INDEX.HTM is. A) Access Type B) Host Domain Name C) File Name D) Access Method 41. The program written by Java language can be divided into two categories, and Java Applet is responsible. A) Operating system B) browser C) CPUD) Compiler 42. In the service that the network layer running the IP protocol is the service provided by its high-level users, when an error occurs, there is no mechanism to ensure that the sender and the recipient can be notified. The service is called. A) Unreliable data delivery service B) Facing non-connected transmission service c) Do your best to deliver service D) Fast delivery service 43. Because a website is to do it, it is very difficult, so a information resource website must be successful. Operating, must. A) A clear purpose and feature B) has the corresponding technical support C) has the corresponding financial support D) Sustainable development guarantee 44. In the hierarchy of the management information system, it is used to statistically. A) Work information layer B) Tactical information layer C) Strategic information layer D) Operating layer 45. The latest form of database development is. A) PC Databases B) LAN Version Database C) Internet Version Database D) Based on Distributed Database 46. In the type of distributed database, there is a central station in the network, and there is all in this site. Data, this type is. A) Hierarchical B) Federal C) Full-scale D) Hybrid 47. During the transaction process of e-commerce, banks pay funds according to the contract. A) Before the transaction b) transaction C) D) After paying 48. The technique of e-commerce activities is required. A) Website construction, safety control technology, online payment technology, online marketing technology b) Website construction, data encryption technology, online payment technology, online marketing technology C) Website construction, data encryption technology, online payment technology D) Website construction, network Certification technology, online payment technology, online marketing technology 49. In a message sent to another company, make a summary method along with the message and signature. A) Digital Signature B) Digital Fingerprint C) Certification System D) Digital Timestamp 50. The current product can do with the highest level of security. A) ab) B1C) B2D) B351. Read the content belonging carefully. A) Data Encryption B) Construction Firewall C) Patch D) System Audit 52. In the network security policy, the method of semi-active network security policies is.
A) Selective Access Control B) Mandatory Access Control C) Intrusion Detection D) Hidden Service 53. "Ilove You" is encrypted into "l evioouy" algorithm belongs to. A) Conversion method B) Replacement method C) Submergence D) Open Key Algorithm 54. After network completion, the user changes to demand may affect the entire network plan, which requires administrators to communicate networks. A) Construction B) Maintenance C) Optimization D) Extended 55. In the fault report, the device runs an error status. A) Yellow b) blue c) orange d) Purple 56. Not currently mainly used standard network management protocols. A) SNMPB) CMIS / CMIP C) LMMPD) UCT57. X.25 Protocol and the lower layer in the OSI model. A) 1b) 2C) 3D) 458. In ATM technology, a cell head is composed of bytes. A) 2b) 3C) 4D) 559. The existing Internet uses the service method. A) BESTEFFECTB) QoSC) Target D) Users who pay a large cost can get better service 60. Photo TV belongs to the content. A) Telecommunications network B) Cable TV network C) computer network D) Wireless network two, filling blanks (2 points per empty, a total of 40 points) 1. The English name of the motherboard bus is. 2. Stack is a data structure that performs an algorithm. 3. The characteristics of the operating system are: and sharedness. 4. In the file management, according to the information flow in the file is divided into: Enter file, output file, and. 5. The software is to allow users to use and give full play to various programs and collectors of computer performance and efficiency. 6. Computer network protocol consists of three elements: grammar, and timing. 7. There are two main categories: check code and redundant check code. 8. In the FDDI high-speed backbone, the number of nodes of the network should be less than. 9. Ethernet is a topological structure of a random contention medium access control method. 10. The browser / server computing mode contains three levels of clients, servers, and database servers. 11. The transmission medium used by 100 base-fx standard is. 12. Internet is a network system on a building based on protocol clusters. 13. Network layers running the IP protocol can provide the following three services for its high-level users: unreliable data delivery services, no connection-free transport services, delivery services. 14. The transmission rate of the phone dialing line is low, and the highest transmission rate of the current line can reach Kbps. 15. Indicates electronic data exchange, is the most typical and most basic application of e-commerce activities between enterprises and enterprises. 16. In an e-commerce application system, the system is in public Internet and bank internal networks. 17. The means to ensure email security is used. 18. In terms of network management, the management model generally adopted. 19. The Security Guidelines defined by the US Department of Defense define a security level. 20. RBB represents the network.
Answer 1, select questions 1. B 2. A 3. D 4. B 5. D 6. D 7. B 8. C 9. C 10. A 11. A 12. D 13. A 14. B 15. B 16. B 17. A 18. D 19. B 20. A 21. C 22. A 23. A 24. B 25. B 26. D 27. A 28. B 29. C 30. C 31. C 32. A 33. B 34. D 35. C 36. D 37. B 38. C 39. A 40. C 41. B 42. A 43. A 44. B 45. D 46. A 47. C 48. A 49 . B 50. D 51. D 52. D 53. A 54. D 55. B 56. D 57. C 58. D 59. a 60. B II, fill in the blank question 1. BUS 2. Back first out 3. Concurrent Sex 4. Input Output File 5. Data 6. Semantic 7. Parity 8. 1000 9. Bus Type 10. Application 11. Cable 12. TCP / IP 13. That is the maximum effort 14. 56 15. EDI 16. Payment gateway 17. Digital Certificate 18. Managers - Agents 19. 4 20. Community Broadband ------------------------------------- ------------- Editor's: Zhang Qing Zhangking@263.net QQ: 9365822 MSN: zhangking@hotmail.com Person: http://www.why100000.com ("100,000 Why "Computer Learning Network) Other Website: http://sogo99.com (" Sogou 99 "Network Portal) http://neteye.blogchina.com (" Meet "Blog China) 2004.12.30