|
楼主 |
发表于 2004-5-8 16:55:52
|
显示全部楼层
<b><FONT size=2>8-1. Multiple choices</FONT></b> <><FONT size=2> 1. The end equipment in a communication system includes ____</FONT> <BLOCKQUOTE><><FONT size=2>a. computers c. CRTs</FONT> <><FONT size=2>b.</FONT> <FONT size=2>printers d. keyboards</FONT> </P></BLOCKQUOTE><P><FONT size=2> 2. The equipment ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. manipulates digital information internally in serial form</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>manipulates digital information internally in word units</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>transfers the number of bits in parallel</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>transfers the number of bits in serial form</FONT> </P></BLOCKQUOTE><P><FONT size=2> 3. Data terminal equipment(DTE) is used to ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. perform parallel-to-serial conversion for transmission</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>perform parallel-to-serial conversion for reception</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>perform serial-to-parallel conversion for transmission</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>perform serial-to-parallel conversion for reception</FONT> </P></BLOCKQUOTE><P><FONT size=2> 4. Front-end processor(FEP) is a ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. line control unit without associated software</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>station controller</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>LCU with associated software</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>Telco</FONT> </P></BLOCKQUOTE><P><FONT size=2> 5. DCE is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. abbreviation of Data communication equipment</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>abbreviation of Data circuit-terminating equipment</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>used to accept the serial data stream from DTE</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>used to accept the analog signal</FONT> </P></BLOCKQUOTE><P><FONT size=2> 6. Modem is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a modulator c. a modulator/demodulator</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a demodulator d. a data set</FONT> </P></BLOCKQUOTE><P><FONT size=2> 7. The modem can be considered ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a form of digital-to-analog converter at the receive end</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a form of digital-to-analog converter at the transmit end</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>a form of analog-to-digital converter at the receive end</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>a form of analog-to-digital converter at the transmit end</FONT> </P></BLOCKQUOTE><P><FONT size=2> 8. The most common mode of modulation by modems is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. ASK c. FSK</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>PSK d. QAM</FONT> </P></BLOCKQUOTE><P><FONT size=2> 9. To transmit digital data we can use ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. Digital T-carrier c. microwave</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>satellite d. telephone line without modems</FONT> </P></BLOCKQUOTE><P><FONT size=2> 10. RS-232 standard ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. is an interface standard between the DTE and computer</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>uses a 25-pin cable</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>uses specified signal levels</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>will be replaced by an updated standard</FONT> </P></BLOCKQUOTE><P><FONT size=2> <B>8-2. Match the following terms to the appropriate definition</B></FONT> <P><FONT size=2> 1. The purpose of computer network is ____</FONT> <P><FONT size=2> 2. Network architecture is called as ____</FONT> <P><FONT size=2> 3. There are two important network architectures ____</FONT> <P><FONT size=2> 4. OSI reference model is proposed by ____</FONT> <P><FONT size=2> 5. OSI deals with connecting</FONT> <P><FONT size=2> 6. TCP/IP reference model has two parts ____</FONT> <P><FONT size=2> 7. Two end-to-end protocols in the transport layer are ____</FONT> <P><FONT size=2> 8. UDP is a ____</FONT> <P><FONT size=2> 9. TCP is ____</FONT> <P><FONT size=2> 10. The job of the network layer is to deliver ____</FONT> <P><FONT size=2> 11. On top of the transport layer is the ____</FONT> <P><FONT size=2> 12. The application layer contains all the higher-level protocols, such as ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. connectionless protocol</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>open system</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>application layer</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>FTP, SMTP and so on</FONT> <P><FONT size=2>e.</FONT> <FONT size=2>Data communication and resource sharing</FONT> <P><FONT size=2>f. Connection-oriented protocol</FONT> <P><FONT size=2>g. The OSI reference model and the TCP/IP reference model</FONT> <P><FONT size=2>h. TCP and IP</FONT> <P><FONT size=2>i. a set of layers and protocols</FONT> <P><FONT size=2>j. TCP and UDP</FONT> <P><FONT size=2>k. IP packets</FONT> <P><FONT size=2>l. ISO</FONT> </P></BLOCKQUOTE><P><FONT size=2> <B>8-3. True or false</B></FONT> <P><FONT size=2> 1. ____ A wide area network (WAN) spans a small geographical area</FONT> <P><FONT size=2> 2. ____ We usually call the computers in a WAN hosts or end systems</FONT> <P><FONT size=2> 3. ____ The job of the communication subnet is to carry messages from host to host</FONT> <P><FONT size=2> 4. ____ Separating the subnet from the hosts simplifies the design of network</FONT> <P><FONT size=2> 5. ____ Telephone network is a packet switching network</FONT> <P><FONT size=2> 6. ____ The network complied with X.25 standard is a circuit switched network</FONT> <P><FONT size=2> 7. ____ We can use the public switched telephone network to transmit voice and data</FONT> <P><FONT size=2> 8. ____ Using the dedicated network, we need a inter-switch</FONT> <P><FONT size=2> 9. ____ Advantage of private network is its short response time</FONT> <P><FONT size=2> 10. ____ Structuring a packet network, we should use a equipment that assembles and disassembles packets</FONT> <P><FONT size=2> <B>8-4. Multiple choices</B></FONT> <P><FONT size=2> 1. Local Area Network(LAN) is structured within</FONT> <BLOCKQUOTE><P><FONT size=2>a. a single building c. a country</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a localized group of buildings d. a campus</FONT> </P></BLOCKQUOTE><P><FONT size=2> 2. Comparing with WAN, LAN can provide ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. lower data transmission rates c. the same transmission rates</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>higher data transmission rates d. very high transmission rates</FONT> </P></BLOCKQUOTE><P><FONT size=2> 3. There are several topologies in LAN, they are ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. star c. ring</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>bus d. mesh</FONT> </P></BLOCKQUOTE><P><FONT size=2> 4. Hub topology is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a ring c. the most widespread topology for LANs</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a variation of the bus d. called hub/tree topology sometimes</FONT> </P></BLOCKQUOTE><P><FONT size=2> 5.The transmission media used to build a LAN may be ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. twisted pair c. coaxial cable</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>microwave d. optical fiber</FONT> </P></BLOCKQUOTE><P><FONT size=2> 6.Technique of control token can be used to the ____ networks</FONT> <BLOCKQUOTE><P><FONT size=2>a. bus c. ring</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>hub d. tree</FONT> </P></BLOCKQUOTE><P><FONT size=2> 7. A collision should be happened, when ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a station is listening while other stations are waiting</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a station is sending while another is receiving</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>no stations attempt to access the network</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>two stations try to send a message at exactly the same time</FONT> </P></BLOCKQUOTE><P><FONT size=2> 8. A station in control token network wants to access the network, it may ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. possess the token</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>release the token</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>pass the token to another station after transmitting a data frame</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>take the token</FONT> </P></BLOCKQUOTE><P><FONT size=2> 9. The bodies to make network standards include ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. ISO c. IEEE</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>EIA d. NBS</FONT> </P></BLOCKQUOTE><P><FONT size=2> 10 Methods of medium access control can be ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. DQDB c. token</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>CSMA/CD d. others</FONT> </P></BLOCKQUOTE><P><FONT size=2> <B>8-5. Fill in the blanks with appropriate words or phrases</B></FONT> <P><FONT size=2> 1. Windows NT supports variety of networking media, such as ____</FONT> <P><FONT size=2> 2 A Windows NT workstation can access remotely Windows NT server by ____</FONT> <P><FONT size=2> 3. NDIS is used to access ____ by the upper layers</FONT> <P><FONT size=2> 4. Windows NT supports most industry standard protocols, such as ____</FONT> <P><FONT size=2> 5. Windows NT has built-in drives, they are ____</FONT> <P><FONT size=2> 6. We can access the network resources in Windows NT environments by a set of ____</FONT> <P><FONT size=2> 7. To tight control over user access, we might use ____</FONT> <P><FONT size=2> 8. A ____ i ____ validates each user's logon and access rights to all resources in the domain</FONT> <P><FONT size=2> 9. In some network systems an user has an ____ for each server</FONT> <P><FONT size=2> 10. There are four security features: ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. domain</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>the redirector and the file server</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>secure logon, discretionary access control, auditing, and memory protection</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>Ethernet, Token, and FDDI</FONT> <P><FONT size=2>e.</FONT> <FONT size=2>APIs</FONT> <P><FONT size=2>f. MAC drivers</FONT> <P><FONT size=2>g. Account</FONT> <P><FONT size=2>h. RAS</FONT> <P><FONT size=2>i. domain controller</FONT> <P><FONT size=2>j. NetBEUI, TCP/IP, AppleTalk and so on</FONT> </P></BLOCKQUOTE><P><FONT size=2> <B>8-6. True or false</B></FONT> <P><FONT size=2> 1. ____ ISDN provides universal end-to-end connectivity over digital lines</FONT> <P><FONT size=2> 2. ____ We can send data, voice, image and fax via ISDN</FONT> <P><FONT size=2> 3. ____ ISDN system for home user includes three parts</FONT> <P><FONT size=2> 4. ____ From the customer's point of view, the ISDN network boundary is the T point</FONT> <P><FONT size=2> 5. ____ The main device in the ISDN carrier's office is the ISDN exchange</FONT> <P><FONT size=2> 6. ____ There are three types of services in the ISDN</FONT> <P><FONT size=2> 7. ____ Bearer services provide the means to change or process the contents of the data</FONT> <P><FONT size=2> 8. ____ bearer services can be supported by circuit-switched, packet-switched, frame-relay, or cell-relay networks</FONT> <P><FONT size=2> 9. ____ Teleservices rely on the facilities of the bearer services</FONT> <P><FONT size=2> 10. ____ Teleservices provide the means to transfer information</FONT> <P><FONT size=2> 11. ____ Reverse charging, call-waiting and message handling are the supplementary services</FONT> <P><FONT size=2> 12. ____ ISDN provides three services to users</FONT> </P> |
|