Three level network technology full truth standard prediction test paper (II) 1
1. Single choice questions (1 point for each sub question, a total of 60 points) of the following questions a, B, C, D, only one option is correct. Please scribble the correct options on the corresponding position of the answer sheet, and no score will be given on the test paper
1. The interrupt sources that cause interrupts are usually divided into five types: i/o interrupt, (), clock interrupt, fault interrupt and program interrupt
(score of this question: 1 point)
[correct answer]
d
a. data overflow interrupt
b. access out of bounds interrupt
c. parity error interrupt
d. data channel interrupt
2 The interrupt processing process is divided into: the first step is to turn off the interrupt and take the interrupt source; Step 2: keep the site step 3 (); Step 4: restore the scene; Step 5: disconnect and return
(score of this question: 1 point)
[correct answer]
a
a. transfer to interrupt service program
b. queue peripheral requirements
c. record clock
d. capture fault
3. In static random access memory, when line selection is invalid, Then the status of the three state data buffer is ()
(score of this question: 1 point)
[correct answer]
a
A. high resistance status
B. allow read operation
C. allow write operation
D. chip selection line connection
4. In the OSI reference model, Which layer cares about the grammar and semantics of the transmitted information ()
(score of this question: 1 convenient score)
[correct answer]
d
A. network layer
B. transmission layer
C. session layer
D. presentation layer
5 Among the various functions listed below, the completion of the application layer not only leads to poor enterprise benefits ()
(score of this question: 1 point)
[correct answer]
C
a. token management
B. users on different machines establish conversational relationships
C. file transmission
D. manage abstract data structures, and convert between the internal representation of the computer and the standard representation of the network
6 The relationship between adjacent layers is the relationship between service and being served. Services are () provided to the upper layer for use
(score of this question: 1 point)
[correct answer]
a
A. service access point
B. interface data unit
C. (3) universal experimental machine cannot do both stretching and bending experiments at the same time. Service data unit
D. protocol data unit
7. In a typical interface, layer n+1 entity passes a () to layer N entity through sap
(score of this question: 1 point)
[correct answer]
C
A. service data unit
B. protocol data unit
C. interface data unit
D. interface control information
8 Which of the following is not the characteristic of 80386 ()
(score of this question: 1 point)
[correct answer]
d
a. the protected virtual address storage mode expands the function of general registers
b.32-bit computing ability
C. four data can be used simultaneously in the program
D. PCI standard local bus
9. In ordinary microprocessor chips, there are two different architectures, CISC and RISC. The architecture of 80386 is ()
(score of this question: 1 point)
[correct answer]
a
SC structure
B. It integrates CISC structure and RISC structure
SC structure
D. It does not have the above two structures
10 Which of the following is not a new feature of Pentium processor compared with 80386 ()
(score of this question: 1 point)
[correct answer]
C
A. error detection and functional redundancy verification technology
B. enhanced 64 bit data bus
C. protection 14. Stretch space (mm): 600~1000 virtual address storage mode expands the function of general registers
D. PCI standard local bus
11 Application layer SMTP protocol is mainly used to realize which network service function ()
(score of this question: 1 point)
[correct answer]
a
A. realize the e-mail transmission function in interconnection
B. exchange routing information between network devices
C. share files between different hosts in the network
D. realize the remote login function in interconnection
12. In order to ensure the file a stored in the system, access control matrix Access control table, B and C, etc. D, or encode the stored file information, and automatically e when taken out. Then, the choice of E is ()
(score of this question: 1 point)
[correct answer]
A. decoding
B. security
C. password
D. password
13. In the upper right corner of the windows 95/98 application window, the possible button combination is ()
(score of this question: 1 point)
[correct answer]
c
a. minimize, maximize, restore button
b. maximize, restore Close button
c. minimize, restore, close button
d. minimize, maximize button
14. When connecting computers to communicate with each other, they must follow the unified ()
(score of this question: 1 point)
[correct answer]
d
a. software specification
b. hierarchy
c. routing algorithm
d. network protocol
15 A modulation method that uses carrier signal phase shift to represent digital data is called () keying method
(score of this question: 1 point)
[correct answer]
a
a. phase shift (or phase shift)
b. amplitude shift (or amplitude shift)
c. frequency shift (or frequency shift)
d. mixed
16. During communication, analog signals can also be transmitted through digital channels to realize analog signals and digital signals
Copyright © 2011 JIN SHI