For candidates who want to participate in the second half of the network administrator exam , the first half of 2016 network administrator exam real problem is the baby, the following Greek soft Test college for you to organize the morning real problem, for your reference study.
2016 first half network administrator exam morning real problem (1-25)
In a Windows system, to set the file "D:\user\my.doc" to a read-only property, you can do so by modifying the file's (). Setting a file as read-only property controls the user's modification of the file, which is called security management at the level of security management.
(1) A. Property
B Content
C Filename
D Path name
(2) A. User-level
B Catalog-level
C FILE-level
D System-Level
The e-mail address "[email protected]" in Linxin, @ and mail.ceiaec.org respectively indicate the user's mailbox ().
(3) A. Account number, mail receive server domain name and delimiter
B Account number, delimiter, and mail receive server domain name
C Mail receive server domain name, delimiter, and account number
D Mail receive server domain name, account number, and delimiter
The following is a statement about SRAM (static random memory) and DRAM (dynamic random memory), which is correct ().
(4) A. The contents of the SRAM are constant, and the contents of the DRAM are dynamically changing.
B The content is lost when the DRAM is powered off, and the contents of the SRAM remain memory after power loss
C The contents of the SRAM are read-only, and the contents of the DRAM are readable and writable.
D SRAM and DRAM are both readable and writable, but the contents of the DRAM need to be refreshed periodically
Zhang bought a registered trademark of the Application software CD, unauthorized copy of the sale, then its behavior violated ().
(5) A. Exclusive rights of registered trademarks
B Disc ownership
C Software copyright
D Software Copyrights and trademarks
The following is about the time the software copyright is produced, and the correct statement is ().
(6) A. Since the software was first published
B When developers have a development intent
C Since the software has been approved by the National Copyright Administration Department
D From the date the software development is completed
The sampling frequency for digital voice is defined as 8kHz, because ().
(7) A. Voice signal definition with a maximum frequency range of less than 4 kHz
B Voice signal definition with a maximum frequency range of less than 8kHz
C Digital voice transmission line with a bandwidth of only 8 kHz
D Normal sound card can only be sampled 8,000 times per second.
The GIF file type supports the () image storage format.
(8) A. True Color
B Pseudo Color
C Direct color
D Vector
Set the machine word length to 8, then 0 () is represented as 11111111.
(9) A. Anti-code
B Complement
C Original code
D Shift Code
In a network operating system environment, when user A's files or folders are shared (), this is because the person who accesses user A's computer or network ().
(Ten) A. Its security is improved when compared to unshared
B Its security is reduced when compared to unshared
C The reliability is improved when compared to non-shared
D The ease of use will be reduced when compared to unshared
(one) A. Can only read, not modify files in the shared folder
B May be able to read, but cannot copy or change files in a shared folder
C May be able to read, copy, or change files in a shared folder
D Cannot read, copy, or change files in a shared folder
The main features of the following operating systems () are the ability to support network systems and have transparency.
(b) A. Batch processing operating system
B Time-sharing operating system
C Distributed operating system
D Real-time Operating system
Each functional module of an application software can be written separately in different programming languages, compiled and generated (), and then followed () to form an executable program running on the computer.
(A). SOURCE program
B Target Program
C Assembler Program
D Sub-Program
(b) A. Assembly
B Anti-compilation
C Pretreatment
D Link
There is a relationship emp-sales (department number, department name, commodity number, number of sales), query each department sold at least 5 kinds of goods or department total sales number more than 2000 of the department number, department name and the average number of sales of SQL statements are as follows:
Select Department Number, department name, AVG (sales number) as average sales number
From Emp-sales
GROUP by ()
Having () or ();
(A). Department number
B Department Name
C Product number
D Number of Sales
(b) A. COUNT (Product code) >5
B COUNT (Product code) >=5
C COUNT (Distinct department number)) >=5
D COUNT (Distinct department number) >5
(+) A. SUM (number of sales) >2000
B SUM (number of sales) >=2000
C SUM (' Sales number ') >2000
D.sum (' Sales number ') >=2000
Using an image scanner to scan a 3x3-inch image at 300DPI resolution, you can get a digital image of ().
(b) A. 100x100
B 300x300
C 600x600
D 900x900
The maximum transmission rate can reach 100M b/s twisted pair is ().
(+) A. CAT3
B CAT 4
C CAT5
D CA T6
The multiplexing technology applied to optical fibers is ().
(A). Fdm
B Tdm
C Wdm
D SDMA
The following network, which belongs to the circuit-switched network is (), belongs to the packet-switched network (s).
(+) A. Vpn
B Pstn
C FRN
D Ppp
(A). Vpn
B Pstn
C FRN
D Ppp
The following is a description of the corresponding relationship between the network hierarchy and the main equipment, pairing is correct ().
(at) A. Network Layer--hub
B Data Link layer--Network bridge
C Transport Layer--router
D Session Layer--firewall
The following network protocol messages, which are transmitted over TCP (), are () transmitted over UDP.
(A). Snmp
B Bgp
C Rip
D Arp
(b) A. Snmp
B Bgp
C Rip
D Arp
2016 first half network administrator exam morning real title (1-25)