欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    【计算机类职业资格】网络工程师-计算机专业英语(二)及答案解析.doc

    • 资源ID:1336493       资源大小:72.50KB        全文页数:15页
    • 资源格式: DOC        下载积分:5000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要5000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    【计算机类职业资格】网络工程师-计算机专业英语(二)及答案解析.doc

    1、网络工程师-计算机专业英语(二)及答案解析(总分:40.00,做题时间:90 分钟)Flow control is a function that prevents network congestion by ensuring that (66) do not over-whelm (67) with data. There are three commonly used methods for handling network congestion. (68) is used by network devices to temporarily store bursts of excess d

    2、ata in memory until they can be processed. (69) are used by receiving devices to help prevent their buffers from overflowing. (70) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(分数:5.00)(1).

    3、A. transmitting devices B. transmitted devicesC. receiving devices D. received devices(分数:1.00)A.B.C.D.(2).A. .transmitting devices B. transmitted devicesC. receiving devices D. received devices(分数:1.00)A.B.C.D.(3).A. Buffer B. Source-quench messagesC. window D. Windowing E. Buffering(分数:1.00)A.B.C.

    4、D.E.(4).A. Buffer B. Source-quench messagesC. window D. Windowing E. Buffering(分数:1.00)A.B.C.D.E.(5).A. Buffer B. Source-quench messagesC. window D. Windowing E. Buffering(分数:1.00)A.B.C.D.E.Multipurpose Internet Mail Extension (MIME) is a (46) document messaging standard in the Internet enviroment,

    5、with MIME, users can send (47) Email messages that include audio, video, graph-ices, and text to any other user of a TCP/IP network. Richtext information can also be (48) into messages. It defines the fonts, formats, and (49) features of a document so the document can be easily (50) on many differen

    6、t types of systems.(分数:5.00)(1).A. complete B. compound C. simple D. efficient(分数:1.00)A.B.C.D.(2).A. analog B. many C. multmedia D. digital(分数:1.00)A.B.C.D.(3).A. incorporated B. filled C. stored D. flied(分数:1.00)A.B.C.D.(4).A. color B. size C. design D. layout(分数:1.00)A.B.C.D.(5).A. restored B. re

    7、displayed C. stored D. executed(分数:1.00)A.B.C.D.(56) is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(57) is a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a r

    8、eliable connection.(58) is an approach preferred by cable TV providers. In this solution the fiber terminates at an opto-electrical converter and the final segment is a shared coaxial cable.(59) is a device used to connect two separate network that use different communication protocol.(60) is a digi

    9、tal-to-digital polar encoding method in which the signal level is always either positive or negative.(分数:5.00)(1).A. MD B. RSA C. DES D. MIB(分数:1.00)A.B.C.D.(2).A. RTP B. RTTP C. FTP D. NNTP(分数:1.00)A.B.C.D.(3).A. ADSL B. FTTC C. HFC D. FTTH(分数:1.00)A.B.C.D.(4).A. Router B. Gateway C. Bridge D. hub(

    10、分数:1.00)A.B.C.D.(5).A. NNI B. NRZ C. NAK D. NVT(分数:1.00)A.B.C.D.In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet.The key to SNMP (76) is its simplicity. It has a small command set that does a good job of collec

    11、ting information from (77) any network device. In a SNMP environment, (78) of the work is handled by the network management system. Devices that are being managed are not (79) with processing (80) that might affect their performance.(分数:5.00)(1).A. many B. almost C. a lot of D. nearly(分数:1.00)A.B.C.

    12、D.(2).A. most B. many C. much D. a lot(分数:1.00)A.B.C.D.(3).A. burdened B. influenced C. destroyed D. mitigated(分数:1.00)A.B.C.D.(4).A. time B. power C. speed D. overhead(分数:1.00)A.B.C.D.(5).A. popularity B. function C. efficiency D. power(分数:1.00)A.B.C.D.In the following essay, each blank has four ch

    13、oices. Choose the most suitable one from the four choices and write down in the answer sheet.A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on (31) computers attached to the net-work. A

    14、socket (32) two addresses: (33) . Sockets provide a (34) communication channel between one or more systems. There are (35) sockets separately using TCP and UDP.(分数:5.00)(1).A. unique B. separate C. same D. dependent(分数:1.00)A.B.C.D.(2).A. is made of B. composed ofC. is composed of D. is consisted of

    15、(分数:1.00)A.B.C.D.(3).A. Email address and IP address B. MAC address and port addressC. MAC address and IP address D. port number and IP address(分数:1.00)A.B.C.D.(4).A. full-duplex B. half-duplex C. simplex D. complex(分数:1.00)A.B.C.D.(5).A. message and packet B. packet and frameC. stream and datagram

    16、D. flow and block(分数:1.00)A.B.C.D.For each blank, choose the best answer from the four choices and write down on the answer sheet.(21) is a six bytes OSI layer 2 address which is burned into every networkingdevice that provides its unique identity for point to point communication.(22) is a professio

    17、nal organization of individuals in multiple professions which focuses on effort on lower-layer protocols.(23) functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(24) is the popular LAN developed under the direction o

    18、f the IEEE802.5.(25) is the popular backbone technology for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.(分数:5.00)(1).A. The MAC address B. The IP addressC. The subnet address D. The virtual address(分数:1.00)A.B.C.D.(2).A.

    19、ISO B. ANSI C. CCYIT D. IEEE(分数:1.00)A.B.C.D.(3).A. The hub B. The bridge C. The router D. The proxy(分数:1.00)A.B.C.D.(4).A. Ethernet B. Token Bus C. Token Ring D. DQDB(分数:1.00)A.B.C.D.(5).A. X.25 B. ATM C. FDDI D. SMDS(分数:1.00)A.B.C.D.Frame Relay is simplified form of (51) , similar in principle to

    20、(52) , in which synchronous, frames of data are routed to different destinations depending on header information.Packets are routed throught one or more Virtual Circuits known as (53) . Most Virtual Circuits are (54) , which means that the network provider sets up all DLCI connections at subscriptio

    21、n time. (55) are also part of the Frame Relay specification. They privide a link that only lasts only as long as the session.(分数:5.00)(1).A. Datagram Switching B. Datagram RoutingC. Packet Switching D. packet Routing(分数:1.00)A.B.C.D.(2).A. X.21 B. X.25 C. X.28 D. X.29(分数:1.00)A.B.C.D.(3).A. DLCIs B.

    22、 HDLCs C. SDLCs D. DLs(分数:1.00)A.B.C.D.(4).A. Permanent Circuits B. Permanent Virtual CircuitsC. Switched Virtual Circuits D. Switching Circuits(分数:1.00)A.B.C.D.(5).A. Permanent Circuits B. Permanent Virtual CircuitsC. Switched Virtual Circuits D. Switched Circuits(分数:1.00)A.B.C.D.SDLC was invented

    23、by IBM to replace the older Bisynchronous protocol for wide area connections between IBM equipment. A varietion of the (71) protocol called NRM is essentially the same as SDLC. SDLC is (72) protocol like HDLC, Frame Relay or X.25.An SDLC network is made up of (73) that controls all communications, a

    24、nd (74) . It is capable of (75) operation, but almost all practical applications are strictly half duplex.(分数:5.00)(1).A. HDLC B. Frame Relay C. X.25 D. X.21(分数:1.00)A.B.C.D.(2).A. a peer to peer B. a point-to-pointC. not a peer to peer D. a peer to peers(分数:1.00)A.B.C.D.(3).A. a primary station B.

    25、one or more primary stationsC. a secondary station D. one or more secondary stations(分数:1.00)A.B.C.D.(4).A. a primary station B. one or more primary stationsC. a secondary station D. one or more secondary stations(分数:1.00)A.B.C.D.(5).A. half duplex B. full duplexC. half or full duplex D. half and fu

    26、ll duplex(分数:1.00)A.B.C.D.网络工程师-计算机专业英语(二)答案解析(总分:40.00,做题时间:90 分钟)Flow control is a function that prevents network congestion by ensuring that (66) do not over-whelm (67) with data. There are three commonly used methods for handling network congestion. (68) is used by network devices to temporarily

    27、 store bursts of excess data in memory until they can be processed. (69) are used by receiving devices to help prevent their buffers from overflowing. (70) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been

    28、transmitted.(分数:5.00)(1).A. transmitting devices B. transmitted devicesC. receiving devices D. received devices(分数:1.00)A. B.C.D.解析:(2).A. .transmitting devices B. transmitted devicesC. receiving devices D. received devices(分数:1.00)A.B.C. D.解析:(3).A. Buffer B. Source-quench messagesC. window D. Wind

    29、owing E. Buffering(分数:1.00)A.B.C.D.E. 解析:(4).A. Buffer B. Source-quench messagesC. window D. Windowing E. Buffering(分数:1.00)A.B. C.D.E.解析:(5).A. Buffer B. Source-quench messagesC. window D. Windowing E. Buffering(分数:1.00)A.B.C.D. E.解析:解析 流量控制是一种通过确保(66)的数据不淹没(67)的防止网络拥塞的功能。通常有三种方法来解决网络拥富。网络设备用(68)来暂

    30、存内存中过多的数据只到其得到处理;接收设备用(69)来帮助防止缓冲区溢出。(70)是一种流量控制策略,在这种策略中,源端收到目标端发来的确认信息,确定所发送的某一数据包已传输。Multipurpose Internet Mail Extension (MIME) is a (46) document messaging standard in the Internet enviroment, with MIME, users can send (47) Email messages that include audio, video, graph-ices, and text to any o

    31、ther user of a TCP/IP network. Richtext information can also be (48) into messages. It defines the fonts, formats, and (49) features of a document so the document can be easily (50) on many different types of systems.(分数:5.00)(1).A. complete B. compound C. simple D. efficient(分数:1.00)A.B. C.D.解析:(2)

    32、.A. analog B. many C. multmedia D. digital(分数:1.00)A.B.C. D.解析:(3).A. incorporated B. filled C. stored D. flied(分数:1.00)A. B.C.D.解析:(4).A. color B. size C. design D. layout(分数:1.00)A.B.C.D. 解析:(5).A. restored B. redisplayed C. stored D. executed(分数:1.00)A.B. C.D.解析:解析 MIME 是一种在 Internet 环境下混合式的文档消息传

    33、递标准,使用 MIME,用户能够向TCP/IP 网络中的任何使用者发送多媒体的 E-mail 消息,包括视频、音频、图片和文本,其中还有丰富的文本消息,它定义了文档的字型、格式和版面特征,因此,这种文档可以很容易的在多种操作系统中解码。(56) is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(57) is a protocol that most USENET machines now use it to

    34、 allow news articles to propagate from one machine to another over a reliable connection.(58) is an approach preferred by cable TV providers. In this solution the fiber terminates at an opto-electrical converter and the final segment is a shared coaxial cable.(59) is a device used to connect two sep

    35、arate network that use different communication protocol.(60) is a digital-to-digital polar encoding method in which the signal level is always either positive or negative.(分数:5.00)(1).A. MD B. RSA C. DES D. MIB(分数:1.00)A. B.C.D.解析:解析 是一种单行道功能,他接受一个任意长度的信息,然后由它计算出一个固定长度的位串。(2).A. RTP B. RTTP C. FTP D

    36、. NNTP(分数:1.00)A.B.C.D. 解析:解析 是一种协议,现在大多数 USENET 新闻网设备利用它通过可靠的连接将新闻文章从一台设备传播到另一台设备。(3).A. ADSL B. FTTC C. HFC D. FTTH(分数:1.00)A.B.C. D.解析:解析 是有线电视提供商的首选途径,在这种解决办法中光纤止于光电转炉,最后一段使用同轴电缆。(4).A. Router B. Gateway C. Bridge D. hub(分数:1.00)A.B. C.D.解析:解析 是一种用来连接两个使用不同协议的独立网络的设备。(5).A. NNI B. NRZ C. NAK D.

    37、NVT(分数:1.00)A.B. C.D.解析:解析 是一种数到数的极性编码方法,在这种方法中信号总是正的或负的。In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet.The key to SNMP (76) is its simplicity. It has a small command set that does a good job of collecting in

    38、formation from (77) any network device. In a SNMP environment, (78) of the work is handled by the network management system. Devices that are being managed are not (79) with processing (80) that might affect their performance.(分数:5.00)(1).A. many B. almost C. a lot of D. nearly(分数:1.00)A.B. C.D.解析:(

    39、2).A. most B. many C. much D. a lot(分数:1.00)A. B.C.D.解析:(3).A. burdened B. influenced C. destroyed D. mitigated(分数:1.00)A. B.C.D.解析:(4).A. time B. power C. speed D. overhead(分数:1.00)A.B.C.D. 解析:解析 每个空有四个选项,选择最适合的答案SNMP(76)的关键是简易。有一小组指令来做从(77)任何网络设备收集信息的大部分工作。在一个 SNMP 环境中,有(78)工作是由网络管理系统来解决的。被管理的设备不会

    40、(79)可能影响性能的处理(80)。(5).A. popularity B. function C. efficiency D. power(分数:1.00)A. B.C.D.解析:In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet.A socket is basically an end point of a communication link between two

    41、 applications. Sockets that extend over a network connect two or more applications running on (31) computers attached to the net-work. A socket (32) two addresses: (33) . Sockets provide a (34) communication channel between one or more systems. There are (35) sockets separately using TCP and UDP.(分数

    42、:5.00)(1).A. unique B. separate C. same D. dependent(分数:1.00)A.B. C.D.解析:(2).A. is made of B. composed ofC. is composed of D. is consisted of(分数:1.00)A.B.C. D.解析:(3).A. Email address and IP address B. MAC address and port addressC. MAC address and IP address D. port number and IP address(分数:1.00)A.B

    43、.C.D. 解析:(4).A. full-duplex B. half-duplex C. simplex D. complex(分数:1.00)A. B.C.D.解析:(5).A. message and packet B. packet and frameC. stream and datagram D. flow and block(分数:1.00)A.B.C. D.解析:解析 socket 套接字基本上是两个不同主机的应用程序进程之间的通信的端点。在网络上扩展的socket 连接两个或者多个应用程序,这些应用运行在网路上的各个主机上。socket 需要两个地址:IP 地址和端口号。So

    44、cket 在一个或者多个系统之间提供了全双工(full-duplex)的通信方式。有流式套接字和数据报式套接字,它们分别使用 TCP 和 UDP。For each blank, choose the best answer from the four choices and write down on the answer sheet.(21) is a six bytes OSI layer 2 address which is burned into every networkingdevice that provides its unique identity for point to

    45、point communication.(22) is a professional organization of individuals in multiple professions which focuses on effort on lower-layer protocols.(23) functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(24) is the popu

    46、lar LAN developed under the direction of the IEEE802.5.(25) is the popular backbone technology for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.(分数:5.00)(1).A. The MAC address B. The IP addressC. The subnet address D. The

    47、virtual address(分数:1.00)A. B.C.D.解析:(2).A. ISO B. ANSI C. CCYIT D. IEEE(分数:1.00)A.B.C.D. 解析:(3).A. The hub B. The bridge C. The router D. The proxy(分数:1.00)A.B. C.D.解析:(4).A. Ethernet B. Token Bus C. Token Ring D. DQDB(分数:1.00)A.B.C. D.解析:(5).A. X.25 B. ATM C. FDDI D. SMDS(分数:1.00)A.B.C. D.解析:解析 MAC

    48、 地址是 6 字节的 OSI 模型二层地址,它用来唯一标识提供点到点通信的设备;IEEE 是一个多领域的专门组织,他们致力于底层协议的制定;网桥跟两层协议一起,连接两个不同速率的网络,能够适应不断扩展的网络环境;令牌环是一种符合 IEEES02.5 标准的被广泛应用的网络;FDDI 是一种符合 ANSI 标准的高速信息传递骨干网技术,它具有很强的容错能力。Frame Relay is simplified form of (51) , similar in principle to (52) , in which synchronous, frames of data are routed t

    49、o different destinations depending on header information.Packets are routed throught one or more Virtual Circuits known as (53) . Most Virtual Circuits are (54) , which means that the network provider sets up all DLCI connections at subscription time. (55) are also part of the Frame Relay specification. They privide a link that only lasts only as long as the session.(分数:5.00)(1).A. Datagram Switching B. Datagram RoutingC. Packet Switching D. packet Routing(分数:1.00)A.B.C. D.解析:(2).A. X.21 B. X.25 C. X.28 D. X.29(分数:1.00)A.B. C.D.解析:(3).A. DLCI


    注意事项

    本文(【计算机类职业资格】网络工程师-计算机专业英语(二)及答案解析.doc)为本站会员(inwarn120)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开