Current location - Plastic Surgery and Aesthetics Network - Plastic surgery and medical aesthetics - Zhejiang province 08 computer three-level network technology problem!
Zhejiang province 08 computer three-level network technology problem!
True or false questions, multiple-choice questions, network programming questions, network server configuration questions, and network application questions.

In the spring of 2007, universities in Zhejiang Province

Computer Grade Examination Paper (Three-level Network Technology and Application)

Note: (1) Candidates should fill in the answers to all questions on the answer sheet, otherwise it will be invalid;

(2) The test question 1 is a true or false question, with √ and × indicating right or wrong;

(3) For multiple-choice questions, please fill in "√" in the corresponding position of each item on the answer sheet;

(4) Please fill in the last five digits of your admission ticket number at the designated position in the lower right corner of the answer sheet;

(5) Examination time 120 minutes.

Question 1 is right or wrong with √ and × (each small question 1 point, * * *1point).

1. Internet uses TCP/IP protocol to connect networks of different systems. ( 1)

2. In the ring topology network, only the target node can receive the data transmitted in the ring. ( 2)

3. The maximum transmission rate of twisted-pair Category 5 cable is 100Mbps. ( 3)

An effective way to deal with hackers is to install a firewall, which can prevent the host from being accessed maliciously and without permission.

( 4)

5. The data communication mode in the network is divided into synchronous transmission mode and asynchronous transmission mode according to synchronous mode, and the synchronous transmission mode has high transmission rate.

( 5)

6. Network security management is also responsible for the security of managed network objects and network management itself. ( 6)

7. Computer networks can be divided into LAN, MAN and Internet according to their coverage. ( 7)

8. Repeaters are used to amplify and transmit the received signals on the physical layer of the same network. ( 8)

9. Twisted pair can only be used for analog signal transmission in telephone communication. ( 9)

10. The connection between FTP and Internet can be established without knowing the address of the remote host. ( 10)

Take 2 multiple-choice questions (2 points for each small question, 50 points for * * *).

1, China Education and Research Computer Network (1).

A.NCFC

The most outstanding advantage of computer network is that it is based on communication.

A.* * * Enjoy software and hardware resources B. Run fast.

C. accurate and safe transmission D. large storage capacity

3, a school office building computer networking, this network belongs to (3).

A. Wan B. Lan C. Man D. Gan

4.(4) In TCP/IP, it is equivalent to the set of application layer, presentation layer and session layer in ISO/OSI model.

A. Network layer B. Network interface layer C. Transport layer D. Application layer

5. In digital communication, the technology to keep the time base of the sender and the receiver consistent is (5).

A. switching technology B. synchronization technology C. coding technology D. transmission technology

6, computer network hardware system generally consists of (6), etc. A. computers, switches and repeaters B. computers, bridges and gateways C. computers, transmission media and network interconnection devices D. network cards and network transmission media

7. At present, (7) is the most widely used on the Internet.

A.FTP service B.WWW service C.Telnet service D.Gopher service

8. To convert data into characters and numbers, and compress data, it needs to be implemented on OSI( 8) layer.

A. Network layer B. Transport layer C. Session layer D. Presentation layer

9. When the campus network is interconnected with the external network, the commonly used interconnection equipment is (9).

A. Hub B. Bridge C. Router D. Repeater

10, which of the following statements is correct (10)?

A. the hub can amplify the received signal. B. hub has the function of information filtering.

C. the hub has the function of path detection. Hub has switching function.

1 1. In the domain name system, the domain name is (1 1).

A. Tree naming mechanism B. Star naming mechanism

C. Hierarchical naming mechanism D. Mesh naming mechanism

12. The following domain names belong to an educational institution (12).

A.ftp.bta.net.cn· ftp.cnc.ac.cn

C.www.ioa.ac.cn· www.pku.edu.cn

13. The protocol standard used by token ring network is (13).

802.3 b . 802.4 c . 802.5d . 802. 16

14. Among the following items, the one that cannot be used as an IP address is (14).

a . 202 . 96 . 0 . 17 b . 202 . 123 . 7 . 12 c . 1 12 . 258 . 23 . 8d . 159 . 225 . 1 . 18

15. If the IP address is 202.130.191.33 and the mask is 255.255.255.0, what is the network address? ( 15 )

a . 202. 130.0 . 0 b . 202.0 . 0.0 c . 202. 130. 19 1.33d . 202. 130. 19 1.0

16. Regarding the IP protocol, the following statement is incorrect (16).

A. the IP protocol specifies the specific format of the IP address.

B.ip protocol stipulates the corresponding relationship between IP address and its domain name.

C.IP protocol specifies the specific format of IP datagram.

D.IP protocol specifies the principle of IP datagram fragmentation and reassembly.

17, the application layer FTP protocol is mainly used to realize (17) network services.

A. Remote login function in the Internet B. File transfer function in the Internet

C. Exchange routing information between network devices D. Share files between different hosts in the network.

18. Regarding e-mail, the following statement is incorrect (18).

A. an email address is required to send an email. B. The sender must have his own e-mail account.

C the recipient must have his own postal code d and the e-mail address of the recipient must be known.

19. The transport layer protocol used by the email SMTP server on the Internet is (19).

A.IP C.TCP D.UDP

20. The statement about ADSL error is (20).

The main difference between A.A.ADSL and the previous modem technology is that its uplink and downlink rates are asymmetric, that is, the uplink and downlink rates.

No, wait.

B the characteristic of ADSL is that after the ADSL modem is connected to the telephone line, three information channels are generated on the telephone line.

They are: high-speed downlink channel, medium-speed duplex channel and ordinary telephone service channel.

C. At present, there are three international standards for ADSL ***, which provide two different transmission speeds.

D the key of ADSL is to separate the effective bandwidth on the telephone line and generate multiple channels, which are mainly modulated by ADSL.

Demodulators are generally realized in two ways: time division multiplexing (modem) or echo cancellation.

Except technology.

2 1. Web pages can not only provide text, but also transmit images conveniently. Usually images, texts, tables and other elements are the same.

When displayed on the home page, this image is called (2 1).

A. external image B. embedded image C. connected image D. marked image

22. E-commerce, based on working mode (22), is a new business mode to realize online shopping, trading and online payment.

A. browser/server B. symmetric processor C. digital signature D. client/server

23. Which of the following statements is incorrect about the responsibilities of a network administrator? ( 23 )

A. the network administrator should plan the overall layout of the network.

B. the network administrator should fix the network fault.

Network administrators should optimize the configuration of network devices.

Network administrators should be responsible for writing network applications for users.

24, the purpose of network fault management is to ensure that the network can provide continuous and reliable services, mainly (24).

A. Release of fault information

B. Formulation of emergency plan for network failure

C. protection of network fault points

D discovery and diagnosis, recovery and troubleshooting of faulty equipment, etc.

25.(25) is a route tracking utility, which is used to determine the path of IP packet access target.

A.Ipconfig B.Tracert C.Telnet D.Arp

The third question: basic questions of network programming (2 points for each small question, 26~28, 29~30 and 3 1~32 are required, and all questions are subject to 29~30, * * 10).

26. The extension of the static web page file is (26).

A.asp· B.jsp· C.htm

27. Title format tags can be used to set different font sizes, which can be divided into (27) titles in a web page.

a3 b . 4 c . 5d . 6

28. Use HTML controls to form a design webpage, such as "student number", "name" and "education: master's degree, bachelor's degree".

The most suitable control combination of subjects, specialties and five hobbies is (28).

A. Text boxes, text boxes, radio buttons and drop-down menus

B. Text box, text box, radio button, multiple options

C. Text box, text box, text box, text box

D. Tables, text boxes, radio buttons and drop-down menus

Basic problems of VbScript programming;

29. Which of the following is not the naming rule of VbScript: (29)

Variable names must start with a letter and can only consist of letters, numbers and underscores.

The variable name cannot exceed one line.

C. You can use reserved words as variable names.

D. variable names are case-sensitive.

30. The shaded part below is a simple dynamic webpage: ASP 1. asp。

& lt html & gt< head & gt< title & gt VBScript example

& ltbody & gt

& lt% Dim Sum, I

Sum =0

For i= 1 to 5

sum=sum+i^2

then

Response.write "sum ="&sum.

% & gt& lt/body & gt; & lt/html & gt;

The result of running this webpage is: (30) In the text area of the browser.

A.sum = 55 b.sum = 54 sum =15 c.d. Program error without result.

Basic problems of JavaScript programming:

3 1. Which of the following is not a naming rule for JavaScript: (3 1)

Variable names must start with a letter and can only consist of letters, numbers and underscores.

The variable name cannot exceed one line.

C.JavaScript reserved words cannot be used as variable names.

D. the letters of variable names are not case-sensitive.

32. When the browser accesses the following dynamic webpage, the output result is (32).

& lthtml & gt& lthead & gt

& lttitle & gtJsp programming

& lt/head & gt;

& ltbody bgcolor = " # FFFFFF " & gt

& lt scripting language = "JavaScript">

var a=32,b = 20

If (a & gtb) document.write("a+b: ",a+b);

else document.write("a-b:",a-b);

& lt/script & gt; & lt/body & gt; & lt/html & gt;

Available options:

a . a+b:52 b . a-b: 12 c . 52d . 12

Question 4: Network server configuration (this question 10, 2 points for each small question)

Let the IP address of a network DNS be 172.85.96. 1 and the gateway be172.85.96.253; There is an off-network host with an IP of 61.175.193.61and a domain name of www.zju.edu.cn. Now there is a host in the network, and the IP of the network card is set to 172.85.99.67. Combined with the above network settings, analyze the following questions and give the corresponding answers.

33. The gateway works in the OSI reference model (33), supports the conversion between different protocols, and realizes communication and information sharing between networks with different protocols.

A. physical layer B. data link layer C. network layer D. transport layer and above.

34. In order to optimize DNS performance, the following measures can be taken (34).

A. mostly use the auxiliary server B. DNS cache.

C. use multiple DNS servers to work at the same time. D. use TCP protocol to improve reliability.

35.ping the IP address of the host in the network successfully, but failed to ping its domain name. Which of the following conditions will cause this problem (35)?

A. Address or name resolution error B. Network cable failure

C. Operating system failure D. The network card is broken

36. The command statement to verify whether the network card works normally is: (36)

A.c:\ & gt; Ping 172.85.99.67 BC: \ >; Ping 61.175.193.61

C.c:\ & gt; Ping 172.85.96.253. Ping 172.85.96. 1

37. The command statement to verify whether the network DNS works normally is: (37)

A.c:\ & gt; Ping 61.175.193.61. Ping 172.85.99.67

C.c:\ & gt; Ping zju.edu.cn Special Zone: \> Ping www.zju.edu.cn

Test 5 Network Application (20 points for this question)

1.1980 In February, the American Electrical and Electronics Industry Association put forward the IEEE802 standard for local area networks, which has become an international standard and is now adopted by most local area networks.

1) according to the IEEE802 standard, what are the parts of the LAN architecture? (4 points)

2) Which part encodes and decodes the signal? (2 points)

3) What two access control methods are commonly used in LAN? What topology do they usually use? (4 points)

2. When a PC accesses a Web page on a web server through a browser, please list A to I in a reasonable order according to the communication process, give the Chinese meaning of URL, and briefly describe the domain name resolution process of DNS. (10)

A) parsing the URL of the Web page to obtain the domain name of the web server

B) obtain the IP address of the Web server through the DNS server.

C) obtaining the document specified by the URL from the network server.

D) get the IP address of the personal computer.

E) establish an HTTP connection with the Web server.

F) establishing a data link with the access router

G) The browser interprets the page document and displays it on the screen.

H) Establish physical connection with the access router by dialing through the telephone network.

I) establish a TCP connection with the Web server.