Basic computer questions and answers (2) Basic computer questions and answers (b) (1) Over the years, people are accustomed to from the host computer, the main components used in the development of the computer sub-generation, 4th generation computers use the so-called principal components is ________。 a) tube b) transistor c) small and medium-scale integrated circuit d) large-scale and ultra large scale integrated circuit Answer: d knowledge points: phases in the development of computers: the first generation of computer use 4 main components are large and ultra large scale integrated circuit. (2) Suppose cd disc storage capacity of 600mb, the above digital image can store 25 images per second, and each piece of the screen is 360 × 240 × 65536 resolution color l-hour broadcast, the digital image on cd disc The compression ratio is about ________。 a) 25 times more b) 10 times c) 50 times d) 100 times The answer: a knowledge-point: data compression technology assessment: 65536 16-bit color is the color, that is, 2 bytes per pixel. Now l frames have 360 × 240 = 86400 pixels point, need 172800 bytes of storage, 1 sec 25 requires 4,320,000 bytes of storage, l hour is 3600 seconds need to 15.552 billion (about 15000mb) bytes storage space. Now, that 15000mb data stored in the 600mb a disc, the compression ratio is not hard to figure out: About 15000/600 = 25 times. (3) internet mainly by ________, lines of communication, server and client, and information resources in four parts. a) Gateway b) router c) Bridge d) Hub Answer: b knowledge points: internet services, the basic structure of the main Analysis: internet key component of ① communication line; ② router: ③ server and client; ④ information resources. (4) in the ip protocol used for multicast address ip address of ________. a) a type b) c class c) d class d) e class Answer: c knowledge points: tcp / ip Protocol Analysis: In the tcp / ip protocol, the ip address into Category 5. Where a, b, c class address as a single project delivery address. e class addresses reserved for future special uses, and d class address as a multicast address. (5) The file server has a time-sharing system, file management, all of the features that can provide users with comprehensive information, documents and ________。 a) directory service b) video transmission services, c) database services d) switched network services Answer: a Knowledge point: the functions of the operating system Comment: time-sharing system, file server should have all the file management features, it supports the concept of files and standard file operations, to provide Internet users access to files, directories, concurrency control and security measures. Therefore, the file server should have a sound document management capabilities to network-wide unified document management, the workstation user can not participate in document management. File server can provide a comprehensive data network users, file and directory services. (6) half a century, the stage of computer development have had a variety of descriptions. The following statement in a more complete description is ________。 a) the computer through the four stages, tube stage, the transistor stage, the IC phase, very large scale integrated circuit b) the development of the computer through the Si Duan, ie mainframe, mid-sized machines, minicomputers, microcomputers c) the development of the computer through the three sections, namely, mainframes, microcomputers, networking machine d) the development of the computer through the five sections, namely, mainframes, minicomputers, microcomputers, LAN, WAN Answer: d Knowledge Points: computer development stage Comment: 50 years, the computer has experienced five major stages: mainframe, minicomputer, microcomputer, client / server (LAN), Internet stage (WAN). (7) the following options correctly describes the domain of conflict is ________。 a) send a network packet conflict areas b) to bridges, routers, switches, network for the border region c) Install a router and hub of the network area d) application of the filter network of regional Answer: a Knowledge Points: LAN Classification and basic working principle Analysis: Conflict is in the same segment, the same time only one signal is sent, otherwise the two signals interfere with each other, that conflict. Conflict will prevent the normal frames to send. Domain of conflict is conflict that can segment. Big field of conflict, could lead to a series of conflicts, leading to signal transmission failure. (8) resource management and user interface, the operating system&#39;s main features include: processor management, storage management, device management and _______。 a) time management b) document management c) Transaction Manager d) Database management Answer: b Knowledge point: the functions of the operating system Comment: In terms of resource management and user interface, operating system, the main features include: ① processor management: key to solve the processor allocation and scheduling; ② storage management: key is to manage the main memory resources; ③ Device Manager: Responsible for the effective management of various peripheral devices; ④ document management: support file access, modification and other operations and to address the data storage, sharing, confidentiality, and protection. (9) unix system, input / output devices are as the following four documents _______。 a) a regular file b) List of documents c) index file d) special file Answer: d Knowledge Points: unix operating system Comments: unix file system will treat as an external device, called a special file (or a special file, device file), the unified management by the file system. This keeps the input / output interface hardware interfaces consistent with the general file. (10) An important function of the operating system process management. To this end, the operating system must provide a mechanism to start the process. In the following narrative, is not correct _______。 a) In dos, this mechanism is the exec function b) start the process in windows function is createprocess c) in the os / 2 to start the process function is createprocess d) Start the process in dos function is createprocess Answer: d Knowledge point: the basic functions of the operating system Comment: The operating system must provide a mechanism to launch the process. In dos, this mechanism is the exec function. In windows and os / 2 to start the process function is createprocess, its code is stored in the operating system kernel, in the kernel32.dll file. When createprocess to accept an executable file name, it can load the file and begin. But exec is different createprocess almost immediately after the call to return, so that more programs can be started. Because the windows and os / 2 is a multitasking operating system, which allows multiple programs running simultaneously. (11) In the following, a computer network of three main components of _______。 1, a number of database 2, a communication subnet 3, a communication protocol 4, a number of host 5, the telephone network 6, a large number of terminals a) 1,2,3 b) 2,3,4 c) 3,4,5 d) 2,4,6 Answer: b Knowledge Points: computer network composed of 265ks.com Comment: A computer network includes three main components: ① a number of hosts (host), it can be all types of computers used to provide services to users; ② a communication subnet, which consists of a number of communications circuits and nodes switches, used for data communication; ③ a communication agreements, which is the host and the host, the host and communications subnet or subnets in communication between each node communications, the agreement is good communication both prior agreement and must comply with the rules, it is an integral part of computer networks. (12) strands synthesized by the two mutually insulated stranded wire thread-like composition. The following narrative on the twisted pair, the right is _______。 l, It can transmit analog signals, digital signals can be transmitted 2, easy, cheap 3, less susceptible to external interference, bit error rate 4, normally used only for building the local network communication medium a) 1,2,3 b) 1,2,4 c) 2,3,4 d) All Answer: b Knowledge Points: network transmission medium Comments: twisted-pair synthesis by the two mutually insulated stranded wire composed of thread-like, its advantages: not only can transmit analog signals, when the transmission distance can not transmit digital signals, cheap, easy to install. Disadvantages are: vulnerable to external high frequency electromagnetic interference, while the line itself would generate some noise, error rate is high, a larger long-distance transmission signal attenuation. Given these characteristics, twisted pair usually used only for building the local network communication medium. (13) the so-called information highway in the national information infrastructure is composed of five parts, in addition to information and applications and development information officers, the other three components of _______。 l, 2 computers and other hardware devices, digital communication network 3, the database 4, high-speed information network 5, software, 6, www repository a) 1,4,5 b) 1,2,3 c) 2,5,6 d) 1,3,5 Answer: a Knowledge point: the composition of the National Information Infrastructure Comment: September 15, 1993, the U.S. government formally nii (national information infrastructure) projects, namely the national information infrastructure, the plan: the National Information Infrastructure consists of 5 parts: ① computers and other hardware devices; ② high-speed information network ; ③ software; ④ information and applications; ⑤ development of information personnel. (14) Frame Relay (frame relay) exchange is exchanged in units of frames, which is conducted in the _______. a) physical layer b) data link layer c) network layer d) transport layer Answer: b Knowledge Point: Data communications technology Assessment Analysis: common data transmission mode: Packet switching: the message as a unit, the network layer; Packet switching: The group as a unit, the network layer; Frame Relay Exchange: by frame, in the data link layer; Asynchronous Transfer Mode (atm): to cell as a unit, the data link layer. (15) the merits of the network topology design will directly affect the network performance, reliability and _______。 a) network protocol b) communication costs c) types of equipment d) Host type Answer: b Knowledge Points: network topology and characteristics of Analysis: computer network topology by the network nodes and communication lines, said geometric relationship between the network structure, reflecting the network structure of relations between the entities. Topology design is the first step in building a computer network is the foundation to achieve a variety of network protocols, its network performance, system reliability and communication costs have a significant impact. (16) tcp / ip ip protocol interconnect layer, which is equivalent to osi reference model network layer _______。 a) No connection-oriented network service b) connection-oriented network service c) Transmission Control Protocol d) x. 25 Agreement Answer: a Knowledge Points: network architecture and protocol Comments: tcp / ip reference model osi reference model Internet layer is equivalent to the network layer connectionless network services. (17) netware network users can be divided into network administrators, network operators, ordinary Internet users and _______。 a) system administrator b) the server administrator c) file manager d) Section Manager Answer: b Knowledge point: The basic function of network operating systems Comments: netware network users can be divided into network administrators, network operators, ordinary Internet users and server administrator. (18) lines of communication with point point subnet has four kinds of basic topological structure, they are _______。 a) star, ring, tree and mesh-type b) bus type, ring, tree and mesh-type c) star, bus type, tree and mesh-type d) star, ring, tree and bus-type Answer: a Knowledge Points: network topology Comment: star, ring, tree and mesh-type point is used. Point of the basic line of communication subnet topology. (19) in the osi reference model of each layer, to provide a reliable end to end (end-to-end) services, transparent transmission of messages is ________。 a) the application layer b) data link layer c) transport layer d) network layer Answer: c Knowledge Points: osi transport layer features Comment: In the osi reference model of each layer, transport layer&#39;s main task is to provide a reliable end to end (end-to-end) services, transparent transmission of messages. It is the uncovering of the lower level details of data communications, computer communications architecture which is the most critical layer. (20) The main purpose of computer networks is to achieve a shared computer resources, computer resources, mainly referring to the computer ________。 a) software and database b) servers, workstations and software c) hardware, software and data d) communication subnet and subnet Resources Answer: c Knowledge point: the characteristics of computer networks Comment: The main purpose of computer networks is to achieve a shared computer resources, computer resources are mainly refers to computer hardware, software and data. Internet users can use the local computer resources, network access via a remote networked computer resources, you can also call the Internet a few different computers together to complete a task. (21) in the concept of e-business model, not the elements of e-commerce is ________。 a) Internet b) Transactions subject c) Transactions Services d) electronic market Answer: a Knowledge point: the basic concepts of Electronic Business and System Structure Comment: The concept of e-commerce model, the main trading and electronic trading services market and the three elements of e-commerce, electronic market, includes the concept of the Internet. 265ks.com (22) computer network is composed of multiple interconnected nodes, the nodes should be between the orderly exchange of data, each node must comply with certain pre-agreed principles of good. These rules, conventions and standards known as Internet Protocol (protoc01). Network protocol mainly consists of the following three elements ________。 a) syntax, grammar, and Architecture b) hardware, software and data c) syntax, grammar, and the timing d) architecture, levels and grammar Answer: c Knowledge point: the basic concepts of network protocols Comment: network protocol mainly consists of the following three elements: ① syntax: user data and control information that the structure and format; ② semantics: the need to control the issue of what kind of information, and the completion of the action and make the response; ③ Timing: that the order of events to achieve a detailed description. (23) for connection to the computer network computer ________。 a) follow their own network protocol b) allocation of work by the network operating system c) an integral part of a logical d) all computer users need to understand what resources Answer: d Knowledge point: the characteristics of computer networks Comment: A computer network is a shared resource on the secondary objective is to build communication systems. The computer network is &quot;self-computer&quot;, &quot;autonomy&quot; means that you can work independently from the network. They can not follow their own protocols, but to follow a unified whole network network protocol. Unlike a distributed computer network system, distributed system is a single logical entity, its internal structure transparent to the user, the system can be dynamically allocated to each computer work. Computer network is a geographically distributed &quot;autonomous computers,&quot; the consortium, not by the system of work allocation. Therefore, the user wants to use network resources, it must know which computer on resources. (24) in the osi seven agreements, provide a connection and orderly method of transferring data layer is ________。 a) transport layer b) said layer c) session layer d) the application layer Answer: c Knowledge Points: osi model layers function Comments: osi reference model while not a true industry standard, but the model agreement for the actual function of the underlying great reference value. Understand the various layers in the transmission of data unit, and for understanding the role of hierarchical layers of functional help. iso of the osi reference model, the role of all levels generally more than one, the session layer provides the connection and orderly transfer data. (25) in the computer network architecture, the reason to use hierarchical structure is ________。 a) can simplify the implementation of computer network b) functions of each independent, each layer due to technological progress and the changes do not affect other layers, thereby maintaining the stability of the architecture c) better than the module structure. d) only allows each layer and its upper and lower adjacent layers into contact Answer: b Knowledge Points: Computer Network Architecture Comments: hierarchical structure and module structure, the different characteristics. Computer software makes the software for the module structure can be achieved relatively independent modules; as long as the external function unchanged, the changes within the module does not affect other modules; but modules can call each other, the module structure is not determined only allowed on each floor and its , contact occurs between adjacent layers. The stratified structure of the advantages of both a module structure, but also ensure that only allows each layer and its upper and lower adjacent layers into contact, or that the hierarchy is a special kind of modular structure, the core content is the layer between relative independence. (26) aims to establish computer network ________。 a) sharing of resources b) the establishment of communication system c) the establishment of automated office systems d) the establishment of reliable management information system Answer: a Knowledge point: the functions of computer network Comment: The purpose of the establishment of computer networks to share resources, the secondary purpose is to build communication systems. (27) connected to the computer on the network computer is ________。 a) high-performance computers b) a computer with communications capability c) autonomous computer d) master from the computer Answer: c Knowledge point: a computer connected to the network characteristics Comment: The computer network is &quot;self-government computer&quot;, &quot;autonomy&quot; means that you can work independently from the network. (28) to decide several key characteristics of LAN technology, the most important thing is ________。 a) transmission medium b) medium access control method c) topology d) lan protocol Answer: b Knowledge Points: LAN features Comment: The main technical characteristics of the decision is local area network transmission medium, topology and media access control method, the most important is the media access control method. (29) in the choice of LAN topology, the abundance should be considered to be factors do not include ________。 a) Low cost b) reliability c) flexibility d) real-time Answer: d Knowledge Points: LAN topology Comment: in the choice of topology should be taken into account three main factors: low cost, flexibility and reliability. (30) 10base-5-type lan running speed and the maximum length supported is ________。 Culan a) lombps, 100m b) 10mbps, 200m c) 10mbps, 500m d) 16mbps, 500m Answer: c Knowledge Points: 10base-5-type lan properties Comments: 10base-5, 10, said data rate 10mbps, base is the base-band transmission, 500m is the maximum transmission distance. 10base-5 network cable and use rg-8 clamp terminals. Clamp terminals can be directly fixed to the cable, the cable connection into the linear bus to provide 10mbps transfer rate possible. (31) fddi adopt a new coding technology that is ________。 a) Manchester encoding b) 4b/5b encoding c) zero coding d) non-zero coding Answer: b Knowledge Points: fddi the main features of Comment: In this code in each of the four data coding, data encoded in four of five symbols. Differential Manchester encoding is a change to the median time to use the encoding scheme. Data through the data bits to represent the beginning of change, Token Ring LAN is to use differential Manchester encoding scheme. 265ks.com (32) the threat of Trojan horse attack type is _______。 a) authorize the violation of a threat b) implantation of a threat c) penetration threat d) pass control threat Answer: b Knowledge Points: Network Security Technology Comment: The main computer network threats can be realized are: ① infiltration threat: fake, bypass control, authorization violation. ② implantation threats: Trojan horses, trap doors. (33) ieee802.5 standards, by _______ to control the use of free tokens each node to send data frames with different priorities occupied time. a) single-token protocol b) priority bits c) monitoring stations d) Appointment indicator Answer: d Knowledge Points: ieee802.5 protocol standards Comments: ieee802.5 standards, is by appointment indicator to control the use of free tokens each node to send data frames with different priorities occupied time. (34) Broadband Integrated Services Digital Network b-isdn data communication services mainly _______。 a) Frame Relay technology b) atm Technology c) switched telephone network technology d) x. 25 Network Technology Answer: b Knowledge Point: b-isdn data communications technology Comments: Integrated Services Digital Network (isdn), there are two: Broadband Integrated Services Digital Network (b-isdn) and narrowband integrated services digital network (n-isdn). N-isdn traditional synchronous time division multiplexing different, b-isdn is used in asynchronous transmission technology (atm technology). (35) to Internal LAN access to internet (Internet) access equipment is required to use _______。 a) Firewall b) hub c) router d) relay transponder Answer: c Knowledge Points: Network Interconnection Devices Review: routers work on the network layer in the network, when the data package to the different protocols, different network architecture between the network equipment, routers can be routed not only to choose can also be used packet format conversion Yi meet this transmit . (36) If Culan to connect two hubs, build 10base-t Ethernet, the two machines can reach the most remote _______ a) 500m b) 100m c) 700m d) 300m Answer: c Knowledge Points: LAN features Comment: According to 10base-t Ethernet protocol provides for the use of twisted pair as a communication medium, the computer connected to the maximum length of twisted pair hub 100m. If you are using twisted pair to connect two hubs. The two machines can reach the most distance 300m. 10base-5 Ethernet protocol according to the provisions of thick coaxial cable should be used as a communication medium, the maximum length of each coaxial cable is 500m. The repeater is connected, the distance between the two computers up to 2500m (up through the middle of the four relay). If Culan to connect two hubs, build 10base-t Ethernet, the distance between two hubs for the 500m, hub to the computer&#39;s cable length to comply with the provisions of 100m, total length of 700m. (37) The following criteria for 100mbps Fast Ethernet standard is _______。 a) 802.7 b) 802.8 c) 802.9 d) 802.3u Answer: d Knowledge Points: LAN Applications Comment: 802.7 is the development of optical transmission technology standard lan. 802.8 is the time to slice the standards set by separating ring. 802.9 Ethernet, etc. is to develop standards. 802.3u Fast Ethernet is 100mbps formulate standards. (38) relay run in _______。 a) physical layer b) Network layer c) data link layer d) transport layer Answer: a Knowledge Points: Network Interconnection Devices Comments: repeater is the simplest extension of LAN equipment operating in the physical layer, which osi the bottom. (39) tcp / ip reference model, application layer protocol commonly used are _______。 a) telnet, Ftp, smtp and http b) telnet, ftp, smtp and tcp c) ip, ftp, smtp and http d) ip, ftp, dns and http Answer: a Knowledge point: internet communication protocol --tcp/ip Comments: tcp / ip reference model, application layer protocol commonly used are telnet, ftp, smtp and http. (40) The following statement on the wrong accounting management is _______。 a) accounting management can be better under the circumstances to provide users with the necessary resources b) in non-commercial networks do not need to billing management functions. c) billing management to statistical network users use the network resources d) enables users to check billing case Answer: b Knowledge Points: Network management Comment: Billing Management is responsible for recording the use of network resources, billing management, also known as accounting audit management, including the collection and processing network accounting information. ① billing management purposes: to track individual and group users of network resources usage, its charge reasonable fees; control and monitoring network operations costs and costs. ② The main function of accounting management: measure and report on individuals or groups based on the user&#39;s billing information, allocate resources and calculate the user cost of transmitting data through the network, and then billed to the user. ③ accounting management functions include: establishing and maintaining billing database, can Renyiyitai billing machine: the establishment and management of appropriate billing strategy; to limit control of the designated address, when more than use the limit of its blockade ; and allows the use of units or individuals according to time, address and other information check the network usage. (41) file transfer protocol is the use of the following _______. 265ks.com a) smtp b) ftp c) udp d) telnet Answer: b Knowledge Point: File Transfer Protocol Comments: smtp Simple Mail Transfer Protocol is the (simple mail transfer protocol), ftp is file transfer protocol (file transfer protocol), udp is the User Datagram Protocol (user datagram protocol), telnet is a remote terminal access protocol (telecommunication network). Is to use the ftp file transfer protocol. (42) network remote login protocol is _______。 a) http b) ftp c) pop3 d) telnet Answer: d Knowledge Points: Remote Login Service Comment: http is the hypertext transfer protocol; ftp is file transfer protocol; pop3 protocol is to receive an e-mail; telnet remote login. (43) Home computer users can use Internet technology is _______。 l, telephone line with modem 2, cable cable cable modem with 3, telephone line with ADSL 4, fiber to the home (ftth) a) 1,3 b) 2,3 c) 2,3,4 d) 1,2,3,4 Answer: d Knowledge point: internet access method Comment: Home computer users can use a variety of Internet technologies, mainly in the following categories: ① telephone line with modem; ② Cable TV cable with cable modem; ③ line with adsl; ④ FTTH (ftth). (44) modem (modem) its modulation can be divided into three categories, which are _______。 l, 2 built-in modem, external modem 3, 4, baseband modem, audio, modem 5, 6, wireless modem, high-speed modem 7, low-speed modem a) 1,2,3 b) 5,6,7 c) 3,4,5 d) 3,6,7 Answer: c Knowledge point: the category Modem Comment: Modem (modem) its modulation can be divided into the following three categories: ① baseband modem; ② audio modem; ③ wireless modem. (45) at the following URL ,________ four www www website URL does not comply with written rules. a) www. 163. com b) www. nk. cn. edu c) www. 863. org. cn d) www. tj. net.jp Answer: b Knowledge point: internet based Comment: www URL, used to represent the country&#39;s name should be on the last part. Therefore, this issue of b do not meet the rules for writing web site www. (46) ip address, ip address on the c class is right is ________。 a) can be used in medium-sized networks, b) in a network can connect up to 256 devices c) ip address of such transmission for multi-destination address d) reserved for future use such addresses Answer: b Knowledge Points: ip address Comment: c class ip address before the three binary number 110, said, with a 2l-bit (No. 3 ~ 23-bit) binary number, said network address, host address with 8 bits in a network can connect up to 256 equipment, therefore, suitable for smaller networks. b class ip address can be used in the scale of the network; d class ip address for multi-destination address to send; e class ip address is reserved for future use. (47) www hyperlink location to locate information using a ________。 a) hypertext (hypertext) technology b) uniform resource locator (url, uniform resource locators) c) hypermedia (hypermedia) techniques d) HTML html Answer: b Knowledge point: the use of the Internet Review: Internet in a number of www servers, and then each server contains multiple pages, the user how to specify a page to get it? This requires recourse to url (Uniform Resource Locator, uniform resource locators), url by the following three parts: protocol type, host name and path and file name. (48) If the real-time requirements of data is relatively high, but relatively low accuracy of the data requirements (such as online movie) Generally used in the transport layer protocol ________. a) udp b) tcp c) Ftp d) ip Answer: a Knowledge Points: tcp / ip protocol Comments: udp protocol is a single work-oriented connectionless, unreliable transport layer protocol. As the need to connect, in fact, than when the nature of tcp protocol, but less reliable, generally used to transmit real-time strong, but the accuracy of the less demanding situations. tcp and udp protocol of general use in the demanding accuracy of the occasion. ftp for file transfer protocol, the protocol for the application layer. ip for the network layer protocol that is used to achieve interconnection across different subnets. (49) ipv4 total ________ version of the Internet address of the network were a class. a) 65000 b) 200 万 c) 126 d) 128 Answer: c Knowledge Points: ip address format Comment: a class of network address part of the network accounts for 8, including the first 0, and then removed to retain all o and all l, 126 left. (50) the following four ip address, the address is d class is ________。 a) 10.10.5.168 b) 126.96.36.199 c) 188.8.131.52 d) 202.1 19.130.80 Answer: c Knowledge Points: ip address Categories Assessment Analysis: 184.108.40.206 address is c class. 220.127.116.11 is a class b address. 18.104.22.168 is the address of d class. 10.10.5.168 is a class A address.