欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    [计算机类试卷]软件水平考试(中级)网络工程师上午(基础知识)试题章节练习试卷2及答案与解析.doc

    • 资源ID:506984       资源大小:113.50KB        全文页数:38页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    [计算机类试卷]软件水平考试(中级)网络工程师上午(基础知识)试题章节练习试卷2及答案与解析.doc

    1、软件水平考试(中级)网络工程师上午(基础知识)试题章节练习试卷 2及答案与解析 1 以科学、技术和实践经验的综合成果为基础,对重复性事物和概念所做的统一规定,经有关方面协商一致,由一个公认机构或主管机构批准,以特定形式发布作为共同遵守的准则和依据,这是对 (1)的描述。 ( A)标准化 ( B)协议 ( C)标准 ( D)工作流程 2 我国在国家标准管理办法中规定,国家标准的有效期 (自标准实施之日起,至标准复审重新确认、修订或废止的时间 )一般为 (2)年。 (2) ( A) 3 ( B) 5 ( C) 7 ( D) 10 3 计算机软件产品开发编制指南 (GB 8567-1988)是 (3

    2、)标准。 ( A)强制性国家 ( B)推荐性国家 ( C)强制性行业 ( D)推荐性行业 4 下列各项 (4)制定的标准是国际标准。 ( A) IEEE、 CJB ( B) ISO、 IEEE ( C) ISO、 ANSI ( D) ISO、 IEC 5 代号 (5)按中央所属企业或地方企业分别由国务院有关行政主管部门或省、自治区、直辖市政府标准化行政主管部门会同同级有关行政主管部门加以规定,没有强制性和推荐之分。 ( A) Q/XXX ( B) DBXX ( C) QJ ( D) GSBXXX 6 我国国家标准代号由大写汉语拼音字母构成,标准编号的后两位数字表示国家标准发布的 (6)。 (

    3、A)代号 ( B)顺序号 ( C)编号 ( D)年号 7 IEEE802.5标准是指 (7)。 ( A)以太网 ( B)令牌总线网 ( C)令牌环网 ( D) FDDI网 8 我国信息产业部批准发布,在信息产业部门范围内统一使用的标准称为 (8) ( A)地方标准 ( B)部门标准 ( C)行业标准 ( D)企业标准 9 计算机软件产品开发文件编制指南 是 (9)标准 ( A)强制性国家 ( B)推荐性国家 ( C)强制性行业 ( D)推荐性行业 10 虚拟存储管理系统的基础是程序的 (30)理论。这个理论的基本含义是指程序执行往往会不均匀地访问主存储器单元。根据这个理论, Denning提出

    4、了工作集理论。工作集是进程运行时被频繁访问的页面集合。在进程运行时,如果它的工作集页面都在 (31)内,则能够使该进程有效地运行,否则会出现频繁的页面调入 /调出现象。 ( A)全局性 ( B)局部性 ( C)时间全局性 ( D)空间全局性 ( A)主存储器 ( B)虚拟 存储器 ( C)辅助存储器 ( D) U盘 12 在一个单 CPU的计算机系统中,有两台外部设备 R1、 R2和三个进程 P1、 P2、P3。系统采用可剥夺方式优先级的进程调度方案,且所有进程可以并行使用 I/O设备,三个进程的优先级、使用设备的先后顺序和占用设备时间如表 3.8所示。假设操作系统的开销忽略不计,三个进程从投

    5、入运行到全部完成, CPU的利用率约为 (32)%, R2的利用率约为 (33)%(设备的利用率指该设备的使用时间与进程组全部完成所占用时间的比率 )。 ( A) 60 ( B) 67 ( C) 78 ( D) 90 ( A) 70 ( B) 78 ( C) 80 ( D) 89 14 某仓库有两名发货员,一名审核员。当顾客提货时,只要发货员空闲,就允许顾客进入仓库提货,顾客离开时,审核员检验顾客提货是否正确。其工作流程如图3.16所示。为了利用 P/V操作正确地协调它们之间的工作,设置了两个信号量 S1和 S2,且 S1的初值为 2, S2的初值为 1。图 3.16中的 a应填写 (34),

    6、 b、 c和 d应分别填写 (35)。 ( A) P(S1) ( B) P(S2) ( C) V(S1) ( D) V(S2) ( A) P(S2)、 V(S2)和 V(S1) ( B) P(S1)、 V(S1)和 V(S2) ( C) V(S1)、 P(S2)和 V(S2) ( D) V(S2)、 P(S1)和 V(S1) 16 I/O系统主要有 (24)、 (25)和 (26)三种方式来与主机交换数据。其中 (24)主要用软件方法来实现, CPU的效率低; (25)要有硬件和软件两部分来实现,它利用专门的电路向 CPU中的控制器发出 I/O服务请求,控制器则 (27)转入执行相应的服务程序

    7、; (26)主要由硬件来实现,此时高速外设和内存之间进行数据交换丝 (28)。 ( A)程序查询方式 ( B)读 /写文件方 式 ( C)数据库方式 ( D)客户 /服务器方式 ( A) DMA方式 ( B)批处理方式 ( C)中断方式 ( D)数据通信方式 ( A)中断方式 ( B) DMA方式 ( C)并行方式 ( D)流水线方式 ( A)立即 ( B)在执行完当前一条指令后 ( C)在执行完当前的一段子程序后 ( D)在询问用户后 ( A)不通过 CPU的控制,不利用系统总线 ( B)不通过 CPU的控制,利用系统总线 ( C)通过 CPU的控制,不利用系统总线 ( D)通过 CPU的控

    8、制,利用系统总线 21 Networks can be interconnected by different devices in the physical layer networks can be connected by(1)or hubs. Which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at data link layer. They can accept(2)examine the M

    9、AC address and forward the frames to a different network while doing minor protocol translation in the process in me network layer, we have routers that can connect two networks, If two networks have(3)network layer, the router may be able to translate between the packer formats. In the transport la

    10、yer we find transport gateway, which can interface between two transport connections Finally, in the application layer, application gateways translate message(4). As an example, gateways between Internet e-mail and X.400 e-mail must(5)the e-mail message and change various header fields. ( A) reapers

    11、 ( B) relays ( C) packages ( D) modems ( A) frimes ( B) packets ( C) packages ( D) cells ( A) special ( B) dependent ( C) similar ( D) dissimilar ( A) syntax ( B) semantics ( C) language ( D) format ( A) analyze ( B) parse ( C) delete ( D) create 26 The purpose of the requirements definition phase i

    12、s to produce a clear, complete, consistent, and testable(6)of the technical requirements for the software product. During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed

    13、specification of each function that the software must perform and each(7)that it must meet. The starting point is usually a set of high level requirements from the(8) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for the system an

    14、d then defines(9)showing how the system will be operated publishes the system and operations concept document and conducts a system concept review(SCR).Following the SCR, the team derives(10)require merits for the system from the high level requirements and the system and operations conceptusing str

    15、uctured or object-oriented analysis, the team specifies the software functions and algorithms needed to satisfy each detailed requirement. ( A) function ( B) definition ( C) specification ( D) statement ( A) criterion ( B) standard ( C) model ( D) system ( A) producer ( B) customer ( C) programmer (

    16、 D) analyser ( A) rules ( B) principles ( C) scenarios ( D) scenes ( A) cotailed ( B) outlined ( C) total ( D) complete 31 For each blank, choose the best answer from the four choices and write down on the answer sheet.(11)is a protocol that a host uses to inform a router when it joins Or leaves an

    17、Internet multicast group.(12)is an error detection code that most data communication networks use.(13)is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(14)is a transfer mode in which all types of information are organized into fixed form cells on

    18、 an asynchronous or non-periodic basis over a range of media.(15)is an identifier of a web page. ( A) ICMP ( B) SMTP ( C) IGMP ( D) ARP ( A) 4B/SB ( B) CRC ( C) Manchester Code ( D) Huffman Code ( A) OSPF ( B) RIP ( C) RARP ( D) BGP ( A) ISDN ( B) X.25 ( C) Frame Relay ( D) ATM ( A) HTYP ( B) URL (

    19、C) HTML ( D) TAG 36 In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.Spread spectrum simply means that data is sent in small pieces over a number of the(16)frequencies available for use at any time in the specified range. Devices using(17

    20、)spread spectrum(DSSS) communicate by(18)each byte of data into several parts and sending them concurrently on different(19). DSSS uses a lot of the available(20), about 22 megahertz(MHz). ( A) continuous ( B) high ( C) low ( D) discrete ( A) direct-sequence ( B) discrete-sequence ( C) duplicate-seq

    21、uence ( D) dedicate-sequence ( A) splitting ( B) combining ( C) packing ( D) compacting ( A) bits ( B) frequencies ( C) packets ( D) messages ( A) rate ( B) velocity ( C) bandwidth ( D) period 41 For each blank, choose the best answer from the four choices and write down on the answer sheet.(21)is a

    22、 six bytes OSI layer 2 address which is burned into every networking evice that provides its unique identity for point to point communication.(22)is a professional organization of individuals in multiple professions which focuses on effort on lower-layer protocols.(23)functions with two layers of pr

    23、otocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(24)is the popular LAN developed under the direction of the IEEE802.5.(25)is the popular backbone technology for transmitting information at high speed with a high level of fault tolerance which i

    24、s developed under the direction of ANSI. ( A) The MAC address ( B) The IP address ( C) The subnet address ( D) The virtual address ( A) ISO ( B) ANSI ( C) CCYIT ( D) IEEE ( A) The hub ( B) The bridge ( C) The router ( D) The proxy ( A) Ethernet ( B) Token Bus ( C) Token Ring ( D) DQDB ( A) X.25 ( B)

    25、 ATM ( C) FDDI ( D) SMDS 46 In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.Microwave communication uses high-frequency(26)waves that travel in straightlines through the air. Because the waves cannot(27)with the curvature of the earth, t

    26、hey can be(28)only over short distance. Thus, microwave is a good(29)for sendingdata between buildings in a city or on a large college campus. For longer distances, the waves must be relayed by means of “dishes“ or(30). These can be installed on towers, high buildings, and mountain tops. ( A) optica

    27、l ( B) radio ( C) electrical ( D) magnetic ( A) reflex ( B) distort ( C) bend ( D) absorb ( A) transmitted ( B) transformed ( C) converted ( D) delivered ( A) material ( B) equipment ( C) medium ( D) channel ( A) repeaters ( B) radars ( C) telephones ( D) antennas 51 In the following essay, each bla

    28、nk has four choices. Choose the most suitable one from the four choices and write down in the answer sheet.A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(31)computers attached to the

    29、net-work. A socket(32)two addresses:(33). Sockets provide a(34)communication channel between one or more systems. There are(35)sockets separately using TCP and UDP. ( A) unique ( B) separate ( C) same ( D) dependent ( A) is made of ( B) composed of ( C) is composed of ( D) is consisted of ( A) Email

    30、 address and IP address ( B) MAC address and port address ( C) MAC address and IP address ( D) port number and IP address ( A) full-duplex ( B) half-duplex ( C) simplex ( D) complex ( A) message and packet ( B) packet and frame ( C) stream and datagram ( D) flow and block 56 In the following essay,

    31、each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet.Open Shortest Path First(OSPF) is a(36)routing algorithm that(37)work clone on the OSI IS-IS intradomain routing protocol. This routing, as compared to distance-vector routing, requires

    32、(38)processing power. The(39)algorithm is used to calculate routes. OSPF routing table updates only take place when necessary,(40)at regular intervals. ( A) distance-vector ( B) link-state ( C) flow-based ( D) selective flooding ( A) derived from ( B) deviated from ( C) was derived from ( D) was dev

    33、iated from ( A) more ( B) less ( C) same ( D) most ( A) Bellman-Ford ( B) Ford-Fulkerson ( C) Dijkstra ( D) RIP ( A) but rather ( B) rather too ( C) rather than ( D) rather that 61 Packet-switching wireless networks are preferable(41)when transmissions are(42)because of the way charges are(43)per pa

    34、cket. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are(44)for the(45)of time they use the net-work. ( A) to ( B) for ( C) than ( D) only ( A) long ( B) short ( C) large ( D) small ( A) computing ( B) incurious ( C) incurve

    35、d ( D) incurred ( A) charged ( B) fined ( C) free ( D) controlled ( A) point ( B) start ( C) length ( D) end 66 Multipurpose Internet Mail Extension (MIME) is a(46)document messaging standard in the Internet enviroment, with MIME, users can send(47)Email messages that include audio, video, graph-ice

    36、s, and text to any other user of a TCP/IP network. Richtext information can also be(48)into messages. It defines the fonts, formats, and(49)features of a document so the document can be easily(50)on many different types of systems. ( A) complete ( B) compound ( C) simple ( D) efficient ( A) analog (

    37、 B) many ( C) multmedia ( D) digital ( A) incorporated ( B) filled ( C) stored ( D) flied ( A) color ( B) size ( C) design ( D) layout ( A) restored ( B) redisplayed ( C) stored ( D) executed 71 Frame Relay is simplified form of(51), similar in principle to(52), in which synchronous, frames of data

    38、are routed to different destinations depending on header information.Packets are routed throught one or more Virtual Circuits known as(53). Most Virtual Circuits are(54), which means that the network provider sets up all DLCI connections at subscription time.(55)are also part of the Frame Relay spec

    39、ification. They privide a link that only lasts only as long as the session. ( A) Datagram Switching ( B) Datagram Routing ( C) Packet Switching ( D) packet Routing ( A) X.21 ( B) X.25 ( C) X.28 ( D) X.29 ( A) DLCIs ( B) HDLCs ( C) SDLCs ( D) DLs ( A) Permanent Circuits ( B) Permanent Virtual Circuit

    40、s ( C) Switched Virtual Circuits ( D) Switching Circuits ( A) Permanent Circuits ( B) Permanent Virtual Circuits ( C) Switched Virtual Circuits ( D) Switched Circuits 76 (56)is a one-way function that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string.(57)is

    41、a protocol that most USENET machines now use it to allow news articles to propagate from one machine to another over a reliable connection.(58)is an approach preferred by cable TV providers. In this solution the fiber terminates at an opto-electrical converter and the final segment is a shared coaxi

    42、al cable.(59)is a device used to connect two separate network that use different communication protocol.(60)is a digital-to-digital polar encoding method in which the signal level is always either positive or negative. ( A) MD ( B) RSA ( C) DES ( D) MIB ( A) RTP ( B) RTTP ( C) FTP ( D) NNTP ( A) ADS

    43、L ( B) FTTC ( C) HFC ( D) FTTH ( A) Router ( B) Gateway ( C) Bridge ( D) hub ( A) NNI ( B) NRZ ( C) NAK ( D) NVT 81 In low-speed network, it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down. In high-speed networks, this approach o

    44、ften works poorly, because in the(61)between sending the notification and notification arriving at the source, thousands of additional(62)may arrive. In ATM network, a major tool for preventing(63)is(64)control. When a host wants a new virtual(65), it must describe the traffic to be offered and the

    45、service expected. ( A) interval ( B) time ( C) slot ( D) delay ( A) packets ( B) cells ( C) message ( D) files ( A) collision ( B) congestion ( C) drop ( D) delay ( A) flow ( B) admission ( C) traffic ( D) time ( A) path ( B) rout ( C) circuit ( D) way 86 Flow control is a function that prevents net

    46、work congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent

    47、their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted. ( A) transmitting devices ( B) transmitted devices ( C) receiving devices ( D) received devices ( A) transmi

    48、tting devices ( B) transmitted devices ( C) receiving devices ( D) received devices ( A) Buffer ( B) Source-quench messages ( C) window ( D) Windowing ( E) Buffering ( A) Buffer ( B) Source-quench messages ( C) window ( D) Windowing ( E) Buffering ( A) Buffer ( B) Source-quench messages ( C) window

    49、( D) Windowing ( E) Buffering 91 SDLC was invented by IBM to replace the older Bisynchronous protocol for wide area connections between IBM equipment. A varietion of the(71)protocol called NRM is essentially the same as SDLC. SDLC is(72) protocol like HDLC, Frame Relay or X.25.An SDLC network is made up of(73)that controls all communications, and(74). It is capable of(75)operation, but almost all practical applications are strictly half duplex. ( A) HDLC ( B) Frame Relay ( C) X.25 ( D) X.21 ( A) a peer to peer ( B) a point-to-point ( C) not a peer to peer ( D) a peer to peers ( A) a primar


    注意事项

    本文([计算机类试卷]软件水平考试(中级)网络工程师上午(基础知识)试题章节练习试卷2及答案与解析.doc)为本站会员(eastlab115)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开