Job Recruitment Website - Recruitment portal - Computer maintenance personnel recruitment written examination questions

Computer maintenance personnel recruitment written examination questions

Computer assembly and maintenance problems:

1. Multiple choice questions (2 points for each small question, * * * 50 points)

1. The most widely used and relatively traditional mainstream network structure at present is: ()

A. Tree topology B. Ring topology

C. Bus topology D. Bus/star topology

2.OSI model has seven functional layers, and the fourth layer from bottom to top is: () 23: 14 AM 2005-7-28.

A. Physical layer B. Session layer C. Network layer D. Transport layer

3.IBM token ring network mainly adopts () medium.

A. Coaxial cable and optical fiber B. Twisted pair

C. Optical fiber D. Twisted pair and optical fiber

4. The following are not network protocol failures: ()

A. the computer cannot log on to the server.

B the computer can't see itself in the network neighborhood and can't access other computers in the network.

Network cable, jumper or information socket failure.

D. the computer cannot access the internet through the local area network.

5. The following can be regarded as the characteristics of network security: ()

A. confidentiality B. *** enjoyment C. integrity D. controllability

6. The main technical factors that determine locality are: media access control method, transmission media and ().

A. Network expansion B. Architecture C. Database software D. Server software

7. The basic task of the network operating system is to shield the difference between local resources and network resources, provide users with various basic network service functions, complete the management of network resources, and provide () of the network system.

A.www service B.security service C.multimedia service D.e-mail service

8. The wiring system is closely related to ().

A. Network architecture B. Local area network

C.d. transmission media

9. The main function of the network card does not include ()

A. connecting a computer to a communication medium B. network interconnection

C, electrical signal matching, D, data transmission.

10. Computer network is the product of the combination of computer and ().

A. Telephone B. Line C. Various protocols D. Communication technology

1 1. The factor that has an important influence on the design, function, reliability and cost of the whole network is ().

A. bit error rate B. topology C. network distance D. network transmission rate

12. The functions of the network layer in the OSI reference model are mainly realized by the network device ().

A. Gateway B. Network card C. Bridge D. Router

13. What does not belong to the TCP/IP layered model is ().

A.IP layer B. Application layer C. Session layer D.TCP layer

14. There are several main types of IP addresses: ()

a4 b . 5 c . 6d . 7

15. Unshielded twisted pair consists of four twisted pairs, and eight wires are covered with protective layers. The colors of the eight lines are different. Where the green and white-green line pairs are () line pairs.

A. 1、2 B.7、8 C. 6、3 D. 4、5

16. The performance and function of high-speed local area network are improved by ().

A. hardware and software B. network operating system C. transmission speed of network cable D. performance of computer CPU

17. At present, the popular network operating systems are: ()

A.NetWare, Windows NT and Windows 2000

B.Windows XP, Windows NT and Windows 2000

C.NetWare, Windows XP and Windows 2000

D.NetWare, Windows NT and Windows XP

18. LANs usually use IP address segments dedicated to LANs to specify IP addresses. The following IP addresses do not meet the requirements: ()

a . 192. 168.0 . 254 b . 192. 168.255

c . 192. 168.255 . 254d . 192. 168.0 . 256

19. When laying a thick cable, the distance between two workstations installed on the thick cable is ().

An integer multiple of A .2.5m B. 2.5 and an integer multiple of c.25md.25m

20.ftp command parameters, () parameters limit FTP automatic login.

Answer. –v b–n c–d d–g

2 1.ping command shows that the time unit between sending echo request and returning echo reply is: ()

A. millisecond b second c minute d hour

22. The main advantages of peer-to-peer network are low network cost, network configuration and ().

A. Simple maintenance B. Good data confidentiality C. High network performance D. Less computer resources.

23. The topological structure of the Internet is ().

A. bus B. star C. ring D. mesh

24. There are many kinds of dedicated lines to access the Internet, among which digital communication channels such as optical fiber, copper wire, digital microwave or satellite are used to provide permanent or semi-permanent connection circuits. The transmission networks used to transmit digital signals are as follows: ()

A.DDN mode B. ISDN mode C.xDSL mode D. Modem mode

25. The firewall is a barrier between trusted network and untrusted network, and its function is ().

A. protect the network from viruses.

B. make one network independent of another.

C. protect the network from another network.

D. none of the above is true

2. Fill in the blanks (each small question 1 point, * * *1point)

1. In the common commands of Windows 2000, the _ _ command starts configuration and fault recovery.

2. In enterprises and institutions, most of the computers are scattered in different rooms, and some of them are scattered in various buildings of the building complex, or _ _ _ wiring design is adopted in each floor of the building.

3. The _ _ command is used to display statistical data related to IP, TCP, UDP and ICMP protocols, and is generally used to check the network connection of each port of this machine.

4. If your computer network needs to connect to the Internet, you should install the _ _ _ protocol.

5._ _ _ refers to the geometry of the cable used for computer network connection.

6. LAN can be divided into two categories from the perspective of media access control mode: * * media sharing LAN and _ _ LAN.

7.7 Media Access Control Method CSM/CD. Ethernet belongs to the _ _ method.

Physical structure of 8.8. Novell network includes _ _, network workstation, network server, network operating system software and gateway.

9. At present, the commonly used network connectors mainly include repeaters, bridges, _ _ and gateways.

10. In the computer network, the device that realizes the conversion between digital signal and analog signal is _ _ _

Three. Short answer questions (5 points for each short answer question, * * * 20 points)

What is the 5-4-3 rule of 1. 10 Mb/s Ethernet?

2. What is the biggest difference between a prefix and a suffix in an 2.IP address?

3. What are the main services of the Internet (at least five)?

4. What related hardware must be configured for peer-to-peer networks?

4. Comprehensive questions (65438+ 00 points for each small question, ***20 points)

1. 100 distribution of stations is on a 4KM long bus. This protocol adopts CSMA/ CD. The bus speed is 5Mb/s and the average frame length is 1000bit. Try to estimate the maximum average number of frames sent by each station per second. The propagation delay is 5μs/km. ..

2. What are the similarities and differences between searching the IP address of the host computer through the domain name system and searching the telephone number of a company through the telephone directory of 1 14 on the Internet?

Answers to mock questions (1)

I. Multiple choice questions

1.C 2。 D 3。 A 4。 C 5。 B 6。 A seven. D 8。 A nine. B 10。 D

1 1.B 12。 D 13。 C 14。 B 15。 C 16。 A 17。 A 18。 D 19。 B 20。 B

2 1 .22. A handful of 23. C 24。 A handful of 25. A

Step 2 fill in the blanks

/kloc-0 1.bootcfg2 Decentralization 3. Netstat 4.tcp/ip5.topology

6. Switch 7. Random competition 8. Network card and transmission medium. router

10. Modem

Three. Short Answer Questions

1. Answer: 10 Mb/s Ethernet can only have 5 segments and 4 repeaters at most, of which only 3 segments are allowed.

The other two are just extensions of transmission distance. In 10BASE-T, only 4 cascaded hubs are allowed.

2. Answer: (1) Prefixes are assigned by Internet management organizations, and suffixes are divided by the units assigned to prefixes.

Yes (2) IP datagram addressing is to find the destination network according to the prefix, and then find the destination host according to the suffix after finding the destination network.

A: E-mail, remote login, FTP and WWW.

Bulletin board system service (BBS), network news (USENET), MUD, etc.

4. Answer: For the peer-to-peer network, the relevant hardware that must be configured includes: installing a network card on the computer, connecting the computer, installing network services, and installing the correct network protocol.

Four. Comprehensive problem

1.a=0. 1。 The maximum average number of frames sent by each workstation per second is 34.

2. A: Similarities:

Telephone system: You can only dial the phone number of the called party on the phone to communicate. 1 14 directory assistance converts the name of the called user into a telephone number and informs the calling user.

Internet: The IP address of the destination host must be filled in the IP datagram before it can be sent out. DNS domain name system resolves (i.e. translates) the name of the destination host into a 32-bit IP address and returns it to the source host.

Difference:

Telephone system: the calling user must dial 1 14 to check the number. If you want to find a phone number outside the city, you must make a long distance call. For example, if you want to find the telephone number of the civil aviation ticket office in Beijing in Nanjing, Nanjing Radio 1 14 can't give you the answer. When you are in Nanjing, you must dial 0 10- 1 14 (long distance call).

Internet: As long as the application on the source host needs to convert the name of the destination host into the IP address of the destination host, the source host will automatically send a DNS query message to the domain name server. No matter how far the DNS server that finally resolves the host domain name is from the source host, it can automatically return the resolution result to the source host. All these complicated query processes are transparent to users. Users don't know the domain name resolution process.

There is a way to make users realize that domain name resolution takes some time. When using a browser to visit a remote website, change the domain name in the URL to its dotted decimal IP address to see if it will save some time when looking for this website.