Computer network written test simulation test volume (1) (from "100,000" computer learning network http:www.why100000.

xiaoxiao2021-03-06  43

(The test time is 120 minutes, full of 100 points)

First, the choice questions (1 point for each small question, a total of 60 points) Among the following questions A, B, C, D, only one option is correct

of. 1. The word length of the Pentium series and its compatible machine is. A) 16-bit b) 32-bit C) 64-bit D) 128 bit 2. The following describes the incorrect memory. A) Memory is a random memory b) memory capacity is C) 1000MB of 1GBD in bytes. The larger memory capacity, the more

It is conducive to microcomputer to function 3. The CTR display and the liquid crystal display are incorrect. A) Radiation height B) Low C) Price Low D) High resolution 4. The CPU of microcomputer has reached. A) 8-bit b) 16-bit C) 32-bit D) 128 bits 5. 0100 741E0102 F5F0 is the correct description of the above code. A) a column of data on the left represents the machine of each instruction

A column of data b) The left side of the data represents the start address of each instruction C) A column of data on the right indicates the starting address of each instruction.

D) 741E is an octal number 6. The following is the correct description of the 8086 CPU execution unit. A) The action of the execution unit is to execute the instruction B) inside the unit

Contains an arithmetic logic unit C) Execution unit inside the included register D) The inside of the execution unit includes a stack pointer register 7. The following description is incorrect. A) Operating system is a component of the CPU b) Task of the operating system is to unify and efficiently manage the various resources of the computer. The task of the operating system is to control and organize the execution of the program. The operating system is the user and computer system. The work interface 8. Time-time operating system is classified according to the operating system. A) Different processing mode b) Treated to the user's number C)

Number of machine D) Topology 9. The operating system for setting a small period of time is. A) Batch Operating System B) Time Operation System C) Real Time Operation

Union D) Distributed Operating System 10. The following narrative is incorrect. A) Process is a b) process based on the operating system in accordance with the program. There is no lifecycle C)

The stop d) will be revoked after the process is completed. The following narrative is incorrect. A) Process Control Block is the unique identity of the process B) When the computer system creates a process,

Configure three process control blocks for each process to use process control based on the presence of process control block perceived process.

Block controls and manages the process 12. Problems with process machine competition for each process belong. A) Process Queen Management B) Semicone Operation C) Processes Inter-Processes D) Process

Control and scheduling 13. All resources needed for a one-time allocation process belong to deadlock processing technology. A) Dead lock prevention B) Dead lock avoidance C

Defense lock D) Dead lock shield 14. In the distribution mode of memory, the partition size is uncertain, called. A) Static and other long-partition b) static abnormal partition c) dynamic equal length

Partition d) Dynamic abnormal partition 15. Segment storage management is used. A) Static equipped part B) Unregulated variable partition C) Dynamic equal length partition D) Differential partition 16. The structure and format of communication data and control information are called. A) Semantic B) Semantic C) Timing D) Control 17. In the topology of the network, once the central node is faulty, it will cause the entire network. A) Star Structure B) Tree Structure C) Network Structure D) Ring Structure 18. W AN Representation. A) LAN B) Metropolitan Network C) WAN DVING 19. In the communication domain, the voltage, current, or other physical quantity of the representative data appearing in the communication line is called. A)

Data B) Packet C) Signal D) Information 20. The number of signal waveforms transmitted per second is called. A) Data Transmission Rate B) Modulation Rate C) Spectroscopy Rate D) Bandwidth Rate 21. The structure of coaxial cable can be divided into. A) Inner layer wire, insulating bracket, outer wire, outer insulation protection layer B) insulation bracket,

Wire, outer insulated protective layer C) Inner layer wire, outer wire, outer insulation protection layer D) inner wire, insulating bracket, outer layer guide

Line 22. The storage and transmission of various signals must be converted to binary data in the calculation.

Change method. A) Data encoding technology b) Digital data coding technology D) Digital Data Coding Technology D) Digital Data

Modulation coding technology 23. The last step of converting an analog data into digital data is. A) Sampling B) Quantization C) Code D) Draw 24. The channel can be divided into. A) Low pass, high-pass, Tong B) high pass, Tong C) low pass, high pass D

) Low pass, high pass, bandpass, broadband 25. Become the most influential network topology type. A) Bus type B) Star C) Tree type D) The function of the medium access control sublayer in the IEEE 802 standard corresponds to the OSI reference model. A) Physical layer B) data chain

Road layer C) Network layer D) Conference layer 27. In the IEEE 802 protocol, the specification of the token ring physical layer is included in the standard. A) IEEE 802.5B) IEEE 802.6c)

IEEE 802.7D) IEEE 802.428. When using a 5-class twisted pair, the length of the twisted pair is limited to the maximum effective length does not exceed M. A) 50B) 100C) 150D) 20029. 10 of 10BASE-5 indicates that the data transmission rate is. A) 10Mbpsb) 100Mbpsc) 1Gbpsd) 10Gbps30. When using twisted pair network, the twisted pair used is generally rooted in a cable. A) 4b) 8C) 10D) 3231. In the component of the structured wiring system, it is a systematic heart. A) Building trunk subsystem B) Equipment Subsystem

C) Vertical main dry subsystem D) Working zone system 32. The device with the reception of the frame is. A) Repeater B) Bridge C) Router D) Gateway 33. The Internet is mainly composed. A) Main network, intermediate layer network, underlying network B) main network, intermediate layer network C) main network, underlying

Network D) Main Network, Intermediate Layer Network, Secondary Intermediate Network, Underline Network 34. In TCP / IP Reference Model, error control is responsible for. A) Network interface layer B) Internet layer C) Transport layer D) Application layer 35. In the TCP / IP reference model, the protocol specifies the format of the data and its interpretation. A) TCPB) IPC) ftpd) HTTP36. In the allocation of the IP address, the address is suitable for large networks. A) Class A B) C) C) C) D) D) D) 37. In the IP protocol-based transmission protocol, the protocols suitable for sending real-time requirements greater than the correctness requirements are protocols. A) TCPB) UDPC) DNSD) FTP38. Transfer protocols that can transmit images are. A) SMTPB) MIMEC) POP3D) IMAP39. The source program file belongs to the file. A) Text b) Non-text c) Document D) Non-instrument 40. In file transfer services, there is a subordinate process. A) 1b) 2C) 3D) Several 41. The giant machine of accessing the Internet is called. A) Server B) Client C) Host D) Router 42. 202.93.120.44 is a Class C IP address, and the last byte is. A) Network number b) host number C) port number D)

Subnet mask 43. In the hierarchy of the management information system, it is supported for the leadership. A) Work information layer B) Tactical information

Layer C) Strategic Information Layer D) Management 44. Production capacity scheduling belongs to. A) Structured decision B) Semi-structured decision C) Non-Structured Decision D) Random Decision 45. In the data distribution, the data in this relationship is fractionated in accordance with the conditions in other relationships. A) vertical distribution B) water

Flat distribution C) Export Distribution D) Mixed Distribution 46. The e-commerce now is an e-commerce. A) The first generation b) second generation C) third generation D) The fourth generation 47. In the classification of e-commerce, consumers are called consumers' e-commerce. A) B2BB) B2CC) C2CD) B2G48. When the website is under construction, the next step after system analysis is. A) Market survey b) demand analysis c) Website function design D

System Design 49. The network marketing process can be roughly divided into several stages. A) Advertising and browsing, ordering, payment, delivery B) browsing, ordering, payment, confirmation, delivery C) advertising, order, payment, delivery

Shipment D) Advertising and browsing, ordering, confirmation, payment, delivery 50. Ensure that the hardware is not physically damaged. A) Technical security

B) Manage Security C) Policy Safety D) Legal Security 51. In the network security policy, the method for encrypting network software resources and data resources belongs to. A) selective access

Control B) Mandatory Access Control C) Intrusion Detection D) Safety Vulnerability Evaluation 52. There are two results in the transmission content encryption, it is difficult to decipher. A) Ciphertext B) Briefs C) Key D) Believed 53. In the network management system, the software that provides information is provided with the management end, which can be associated with the management terminal, providing information for network management.

" A) Administration Process B) Administration Agent c) Management Information Library D) Management Interface 54. In network management, the addition of new resources is. A) Configuration Management B) Fault Management C) Performance Management D) Safety Management 55. Monitor the content belonging to the network's error rate. A) Configuration Management B) Fault Management C) Performance Management D) Safety Management 56. High Security Network Management Protocol is. A) SNMPB) CMIS / CMIPC) LMMPD) UCT57. In the packet structure of the frame relay, the frame setting starts to occupy one byte. A) 1B) 2C) 3D) 3.558. In the way communication speeds, Internet2 belongs to the method of Internet2. A) Reconstruction of existing communication devices and communication lines b) Improve the intermediate node to signal forwarding efficiency C) Simplify intermediate nodes to the signal process D) make full use of existing communication

Equipment 59. Community Broadband Network belongs to. A) Telecommunications network B) Cable TV Network C) Computer Network D) Integrated Network 60. The cable TV network uses topologies. A) Point-to-point B) Broadcast C) ring type D) tree type

Second, fill in the blanks (2 points per empty, a total of 40 points) 1. 1MB is KB. 2. After restoring the site, the step of the CPU to perform is. 3. In accordance with different processing methods of the process, the operating system is divided into:, time-time system, real-time system. 4. In the UNIX system, the file is divided into: directory files and special files. 5. Procedure prepared to solve a particular problem. 6. LAN said. 7. There are three types of error control methods:, forward error correction and feedback test. 8. FDDI is a high-speed backbone network as a transmission medium. 9. In the token bus network, the node having the request to send information must be held "". 10. The IEEE 802 standard data link layer function is divided into logical link control sub-layers and sub-layers. 11. Put the nodes on the network into a number of "logical working groups" according to the nature and needs, then a logical working group is one

Network. 12. _____ protocol is the basis of TCP / IP protocol. 13. In practical applications, you need to divide the part in the IP address, divided into subnet numbers and host numbers. 14. Previously, US Advanced Networks and Services Corporation is the main network of the Internet. 15. The architecture of e-commerce can be divided into four levels of network basic platforms, security structures, and business systems. 16. Digital envelope technology is a technology that guarantees data security, which uses key encryption and common key encryption.

Guarantee the security of data. 17. The parties involved in the SET protocol include certification institutions, merchants, banks, and payment gateways. 18. A manager can exchange information with a proxy. 19. In the Security Guidelines defined by the US Department of Defense (TCSEC), the level is the lowest. 20. B-ISDN represents the network.

Answer 1, select questions 1. C2. C3. B4. C5. B6. A7. A8. A9. B10. C11. B12. D13. A14. D15. B16. A17.

A23. C24. A25. A26. A30. A26. A30.

A57. A56. B57. A55. A56. B57. A55. A56................................................................................................................ D60. D II, filling the blanking 1. 10242. Open interrupt 3. Batch operating system 4. Normal file 5. Application software 6. LAN 7. Automatic request

Reissue 8. Optical fiber 9. Token 10. Media Access Control 11. Virtual 12. IP13. Host number 14. ANSNET15. Payment system 16. Private 17. Cardholders 18. Multi 19. D120. Broadband integrated business Digital - ---------------------------------------------- Editor: Zhang Qing ZhangKing@263.net QQ: 9365822 msn: zhangking@hotmail.com Personal: http://www.why100000.com ("100,000 Why" Computer Learning Network) Other Website: http://sogo99.com (" Sogou 99 "Network Portal) http://neteye.blogchina.com (" Meet "Blog China) 2004.12.30

转载请注明原文地址:https://www.9cbs.com/read-74933.html

New Post(0)