(1) 1959 10 A general large electron tube computer successfully developed in China is
A) 103 computer
B) 104 computer
C) 720 computer
D)l30 computer [Answer discussion]
(2) In the description of computer application, the mistake is that
A) Simulated nuclear explosion is a special research method.
B) The weather forecast uses supercomputers to process data.
C) The economic operation model cannot be simulated by computer.
D) Low-level microprocessor chips can be used for process control [answer discussion]
(3) In the description of the server, it is correct that
A) According to the architecture, it is divided into entry-level, department-level and enterprise-level servers.
B) According to the purpose, it is divided into desktop, rack and cabinet servers.
C) According to the processor type, it is divided into file server and database server.
D) Each blade of the blade server is a system motherboard [answer discussion]
(4) In the description of computer configuration, the mistake is that
A) The number of server chassis is 1u/2u/3u/…/8u.
B) The popular serial hard disk is SATA hard disk.
C) Redundant array of independent disks is referred to as disk array for short.
D) serial SCSI hard disk is abbreviated as SAS hard disk.
(5) In the description of software development, it is correct that
A) The software life cycle includes two stages: planning and development.
B) Conduct demand analysis, overall design and detailed design at the initial stage of development.
C) Coding, testing and maintenance in the later stage of development.
D) Documents formed during the operation and use of the software [Answer Discussion]
(6) In the description of multimedia, the mistake is that
A) Multimedia data is very large and must be compressed to be practical.
B) Multimedia information has a lot of redundancy, which is the basis of compression.
C) Information entropy coding provides lossless compression.
D) The commonly used prediction coding is transform coding [answer discussion]
(7) In the description of datagram exchange mode, the mistake is that
A) establishing a virtual circuit between a source node and a destination node before message transmission
B) Different packets of the same message can be transmitted through different paths.
C) There should be a source address and a destination address in each packet of the same message.
D) Different packets of the same message may arrive at the destination node out of order [answer discussion]
(8) In the media access control method of IEEE 802. 1 1 WLAN, the size of the inter-frame interval depends on
A) access point
B) switch
C) frame size
D) Frame Type [Answer Discussion]
(9) The following network applications that do not belong to Web applications are
A) e-commerce
B) domain name resolution
C) e-government
D) Blog [Answer Discussion]
(10) In the description of Gigabit Ethernet, the error is
A) Adopt the same frame structure as traditional Ethernet.
B) The standard defines a dedicated interface for gigabit media.
C) Only optical fiber is used as the transmission medium.
D) GMII is used to separate the MAC sublayer from the physical layer [answer discussion]
(1 1) The technical basis of virtual local area network is
A) routing technology
B) bandwidth allocation
C) exchange technology
D) conflict detection [answer discussion]
(12) In the description of the OSI reference model, it is correct that
A) The high level provides the required services for the low level.
B) The high level needs to know the implementation method of the low level.
C) Different nodes in the same layer have the same function.
D) Different nodes need the same operating system [Answer discussion]
(13) If the network node needs 1× 10-8s to transmit I0bit data, the data transmission rate of the network is
A) 10Mbps
B) 1Gbps
C) 100Mbps
D) 10 Gbps [Answer discussion]
(14) In the description of traditional Ethernet, the mistake is that
A) This is a typical bus LAN.
B) The node sends data through factory broadcast.
C) Media access control needs to be solved.
D) the media access control mode is csma/ca [answer discussion]
(15) The network interconnection level realized by the bridge is
A) data link layer
B) transport layer
C) network layer
D) application layer [answer discussion]
(16) In the TCP/IP reference model, the protocols responsible for providing connection-oriented services are
A)FTP
B) domain name system
C)TCP
D) UDP [Answer Discussion]
(17) Which of the following is not the physical layer transmission mode specified in IEEE 802. 1 1?
A) direct sequence spread spectrum
B) frequency hopping broadcasting
C) bluetooth
D) infrared [answer discussion]
(18) In the description of the network layer, it is correct that
A) The basic data transmission unit is a frame.
B) The main function is to provide routing.
C) Complete the conversion of application layer information format.
D) Provide end-to-end transmission service [Answer discussion]
The transmission media supported by (19) 1000BASE-T standard are
A) single-mode optical fiber
B) multimode optical fiber
C) unshielded twisted pair
D) Shielded twisted pair [answer discussion]
(20) E-mail transmission protocol is
A)DHCP
B)FTP
CMIP
D) SMTP [Answer Discussion]
(2 1) In the description of IEEE 802 model, it is correct that
A) the network layer corresponding to the OSI model
B) The data link layer is divided into LLC and MAC sublayer.
C) Only one LAN protocol is included.
D) For WAN environment [Answer discussion]
(22) In the description of the Ad Hoc network, the mistake is that
A) It is a peer-to-peer wireless mobile network.
B) developed on the basis of WLAN.
C) adopt the communication mode without base station.
D) widely used in the military field [answer discussion]
(23) The following P2P applications do not belong to the file enjoyment category.
A)Skype
B)Gnutella
Napster
D) BitTorrent [Answer the discussion]
(24) In the description of the server operating system, the error is that
A) It is a multi-user and multi-task system.
B) Multithreading is usually used.
C) Threads need less system overhead than processes.
D) thread management is more complicated than process management [answer discussion]
(25) In the description of the basic functions of Windows Server, it is correct that
A)Windows 2000 began to integrate IE and get rid of DOS.
B)Windows 2003 basics. NET architecture has greatly improved NT technology.
C) c) The reliability of Windows 2003 R2 has been improved, but the security is still insufficient.
D)Windows 2008 focuses on security, and other functions are similar to the previous version.
(26) In the description of the active directory, the mistake is that
A) Active Directory includes daily records and directory services.
B) Domain is the basic management unit, and it is usually not subdivided.
C) The active directory adopts a tree-like logical structure.
D) Form trees through domains, and trees form forests [Answer discussion]
(27) in the description of Unix operating system, it is correct that
A)Unix consists of a kernel and a shell.
B) The kernel consists of a file subsystem and a directory subsystem.
C) The shell consists of a process subsystem and a thread subsystem.
D) The operating primitive of the kernel part acts on the user program [answer discussion]
(28) In the description of Linux operating system, the mistake is that
A) The kernel code is different from Unix.
B) Suitable as an Internet service platform.
C) The file system is a mesh structure.
D) the user interface mainly includes KDE and gnome (answer discussion)
(29) In the description of TCP/IP protocol set, the error is that
A) It consists of two protocols: TCP and IP.
B) Specify the addressing mode of hosts in the Internet.
C) The transmission rules of information in the Internet are specified.
D) specifies the naming mechanism of hosts in the Internet [answer discussion]
(30) In the description of IP Internet, the mistake is that
A) Hide the details of the lower physical network.
B) In IP Internet, data can be transmitted across networks.
C) Require complete interconnection between physical networks.
D) All computers use a unified address description method.
(3 1) Which of the following addresses is a loopback address?
A) 128.0.0. 1
B) 127.0.0. 1
C) 126.0.0. 1
D) 125.0.0. 1
(32) If the IP address of the host is 20.22.25.6 and the subnet mask is 255.255.255.0, the host number of the host is.
A)6
B)25
C)22
D) 20 【 Answer discussion 】
(33) Routers connecting two Ethernet networks receive IP datagrams. If the datagram needs to be forwarded to a host with an IP address of 202.123.1.1,which protocol can the router use to find the MAC address of the destination host?
A) intellectual property rights
B)ARP
C) domain name system
D)TCP
(34) If there is no option and padding, the value of the header length field of IPv4 datagram should be
A)3
B)4
C)5
D)6
(35) The main purpose of dividing IP datagrams is
A) improve the performance of the internet
B) improve the security of the internet.
C) Adapting to different address lengths of each physical network.
D) Adapting to different MTU lengths of each physical network.
(36) When describing the characteristics of ICMP error messages, the error lies in
A) enjoy special priority and reliability
B) The data contains the first 64 bits of the data area of the failed IP datagram.
C) If a datagram with a drop error is generated.
D) The destination address is usually the source address of the dropped datagram.
37) The routing table of the router is shown below. If the router receives a message with a destination of 1P and an address of 10. 1.2.5, it should send the message to.
A) 10. 1.0
B) 10.2.0.5
C) 10.4.0.0
10.3.0.7
(38) In the description of RIP and OSPF protocols, it is correct that
A)RIP and OSPF both use vector distance algorithm.
B)RIP and OSPF both use link state algorithm.
C)RIP adopts vector distance algorithm and OSPF adopts link state algorithm.
D)RIP adopts link state algorithm and OSPF adopts vector distance algorithm.
(39) In order to ensure the reliable establishment of the connection, the technology adopted by TCP is
A)4 retransmissions
B) three retransmissions
C)4 handshakes
D) shake hands three times
(40) In the description of client/server mode, it is correct that
A) The client actively requests and the server passively waits.
B) both the client and the server actively request
C) The client waits passively and the server requests actively.
D) Both the client and the server passively wait [answer the discussion]
(4 1) In the description of the Internet domain name system, the mistake is that
A) Domain name resolution requires a group of independent and cooperative domain name servers.
B) Domain name servers logically form a certain hierarchical structure.
C) Domain name resolution always starts from the root domain name server.
D) Recursive resolution is a way of domain name resolution.
(42)pwd is an FTP user interface command, which means
A) requesting the user to enter a password
B) Displays the current working directory of the remote host.
C) Create a directory in the remote host.
D) Enter the active transmission mode.
(43) In order to transmit binary information by e-mail, the extension standard of RFC822 is as follows
A)RFC823
B)SNMP
dumb show
D) certificate
(44) In the description of WWW service system, the mistake is that
A)WWW adopts client/server mode.
B) b) The transmission protocol of WWW adopts HTML.
C) page-to-page link information is maintained by URL.
D) The client application is called browser [Answer Discussion]
(45) Which of the following is not an Internet network management protocol?
A)SNMPv 1
B)SNMPv2
C)SNMPv3
D)SNMPv4
(46) According to the Classification Standard for Security Protection of Computer Information Systems, the highest security requirement for protection level is
A) guide the level of protection
B) compulsory protection level
C) level of supervision and protection
D) special control protection level
(47) Which of the following attacks is a passive attack?
A) flow analysis
B) data camouflage
C) message playback
D) message tampering
(48) The packet length processed by AES encryption algorithm is
A)56 bits
B)64-bit
C) 128 bit
D)256 bits
(49)RC5 encryption algorithm does not use the basic operation is
A) exclusive or
B) circulation
C) replacement
D) add
(50) In the description of message authentication, the error is:
A) Message authentication is called integrity check.
B) Used to identify the authenticity of information sources.
C) Message authentication is real-time.
D) Message authentication can be achieved by authentication.
(5 1) In the description of RSA cryptosystem, it is correct that
A) security is based on elliptic curve problem
B) It is a symmetric cryptosystem.
C) the encryption speed is very fast.
D) usually used for digital signatures.
(52) In the description of the given Kerberos authentication system, the mistake is that
A) There is a database containing all user keys.
B) The user key is an encrypted password.
C) The encryption algorithm must use DES.
D)Kerberos provides session key [answer discussion]
(53) When encrypting with RSA algorithm, it is known that the public key is (e=7, n=20) and the private key is (d=3, n=20), and the message M=3 is encrypted with the public key, and the obtained ciphertext is
A) 19
B) 13
C) 12
D)7
(54) Which of the following addresses is not a multicast address?
224.0. 1. 1
B)232.0.0. 1
C)233.255.255. 1
D)240.255.255. 1
(55) Which of the following P2P network topologies is not distributed unstructured?
A)Gnutella
B) maze
Lime line
D) share [answer discussion]
(56) In the description of instant messaging, it is correct that
A) Only works in client/server mode.
B)QQ is the earliest instant messaging software.
C)QQ chat communication is encrypted.
D) Instant messaging systems all adopt SIP protocol.
(57) Which of the following services does not belong to IPTV communication service?
A) voice over A)IP services
B) instant messaging service
C) distance education services
D) TV short message service
(58) From the perspective of technical development, the earliest working mode of IP telephone is
A) computer to computer
B) computer to mobile phone
C) telephone to computer
D) Phone-to-phone [answer discussion]
(59) Digital rights management mainly adopts data encryption, copyright protection, digital signature and
A) authentication technology
B) digital watermarking technology
C) access control technology
D) Anti-tampering technology [answer discussion]
(60) Web full-text search engines usually include searchers, retrievers, user interfaces and
A) indexer
B) robots
reptile
D) spiders
II. Fill in the blanks (2 points for each blank, ***40 points)
(1) The abbreviation of reduced instruction set computer is 1.
(2) Streaming media data stream is continuous, real-time and 2.
(3)00-60-38-00-08-A6 is a 3-address.
(4) Ethernet V2.0 stipulates that the maximum length of a frame's data field is 4.
(5)RIP protocol is used to exchange information between network devices.
(6) The three elements of a network protocol are 6. Semantics and timing.
(7) The host network layer of TCP/IP reference model corresponds to the physical layer of OSI reference model and 7.
(8) An Ethernet switch provides 24 full-duplex ports of 100Mbps and 1 full-duplex ports of 1Gbps. When the switch is fully configured, the total bandwidth can reach 8.
(9)Web OS is running in 9. [Answer the discussion]
(10)Novell acquired SUSE and further developed the network operating system business through professional products of SUSE 10. [Answer the discussion]
The three characteristics of (1 1)IP service are unreliable, connection-oriented and 1 1. [Answer the discussion]
(12) If a host with an IP address of10/.2.20 and a subnet mask of 255.255.255.0 needs to send a limited broadcast datagram, its destination address is 12. [Answer the discussion]
(13) The address length of IPv6 is13 bits. [Answer the discussion]
The browser structure of (14) consists of a 14 and a series of client units and interpretation units. [Answer the discussion]
(15) In order to solve the system differences, Telnet protocol introduces 15 to shield the differences of keyboard input interpretation between different computer systems. [Answer the discussion]
(16) There are two methods for SNMP to collect data from managed devices: the method based on16 and the method based on interrupt. [Answer the discussion]
(17) Digital signature is a simulation of handwritten signature, which is used to confirm the identity of the sender. It is the message digest of 17. [Answer the discussion]
(18) The packet filtering firewall processes the received IP packet according to the rules and decides whether it is 18 or discarded. [Answer the discussion]
(19) Multicast allows one sender to send packets to multiple receivers. Regardless of the number of receiving group members, the data source only sends 19 packets. [Answer the discussion]
(20) There are four main types of P2P networks, and Napster is the representative of 20 directory structure.
answer
Answer:?
First, multiple-choice questions?
( 1)B (2)C (3)D (4)A (5)B
(6)D (7)A (8)D (9)B ( 10)C?
( 1 1)C( 12)C( 13)B( 14)D( 15)A?
( 16)C( 17)C( 18)B( 19)C(20)D?
(2 1)B (22)B (23)A (24)D (25)B?
26)B (27)A (28)C (29)A (30)C?
(3 1)B (32)A (33)B (34)C (35)D?
(36) A (37) B (38) C (39) D (40) A
(4 1)C (42)B (43)C (44)B (45)D?
D (47)A (48)C (49)C (50)C?
(5 1)D (52)C (53)D (54)D (55)B?
(56)C (57)C (58)A (59)B (60)A?
Second, fill in the blanks?
( 1)RISC?
(2) timing?
(3) Ethernet physical address (MAC)?
(4) 1500B?
(5) routing?
(6) grammar?
(7) Data link layer?
(8)6.8Gbps?
(9) Web browser?
( 10)Linux?
(1 1) Do your best to deliver the goods?
( 12)255.255.255.255 ?
( 13) 128 ?
(14) control unit?
(15) Network Virtual Terminal NVT?
(16) Polling?
(17) encryption?
(18) Forward?
(19) Once?
(20) concentration?
/ncre/kszt/
It's full of real questions