1. Write the line sequence of 568a and 568b.
2. sort by data access speed: hard disk, CPU, optical drive, memory
3. write out the default ports POP3, SMTP, and FTP used by the following services.
4. What is the MAC of the NIC composed of six groups?
5. What is the ISO/OSI Layer 7 model?
6. Definitions of C/S and B/S
7. What does rfc950 define?
8. What is integrated wiring?
9. vrouters and vswitches belong to several layers of devices
10. Total number of ports on the computer
11. What is cache and what is buffer? What is the difference?
12. What is MBR?
13. How do you obtain the MAC address of IP 192.168.1.2 In the lan?
14. View and edit the local policy.
15. What is the command to convert FAT32 to NTFS partition?
16. manually update the IP address assigned by DHCP
17. What is the hidden directory of system volume information name under each partition of XP? Is there a pagefile. SYS file?
18. by default, XP file sharing cannot set user permissions. Only one option that allows network users to change my files requires different user permissions for this shared folder, what should I do?
19. What is the basic network transmission protocol used by QQ and other instant messaging software?
20. Which folders are displayed under drive C of the newly installed XP system?
21. What are the important files in the root directory of the C drive on Windows XP system disk (hidden files)
22. Briefly describe the working process of the motherboard from power-on to system startup of the computer, in the order displayed on the screen
23. When the computer is turned on, the host sends a beep and the monitor does not have any signal. What may cause this phenomenon? How can this problem be solved?
24. If the computer system is paralyzed (the XP system disk is C), the system cannot be started normally, and the C disk contains important files. How can I solve this problem?
25. What should I pay attention to before reinstalling the system and formatting the C drive? (Prerequisite for system running)
26. How to set up a Broadband Router (basic steps)
27. How to improve computer security
28. How to restrict large-volume multi-thread downloading software and P2P downloading software by using ADSL shared connection to the Internet on the peer network to ensure the normal operation of other users on the network
Reference answer
1 568b orange white orange green white blue white green brown white Brown
568a green white green orange white blue white orange brown white Brown
2. Hard drive with CPU memory
3 POP3 110 SMTP 25 FTP 21 (20)
4 consists of hexadecimal data. The first three groups represent manufacturers, which are allocated by IEEE and can be subdivided into three
The serial number of a network product (such as a NIC) manufactured by the manufacturer.
5 application layer, presentation layer, Session Layer, transmission layer, network layer, data link layer, and Physical Layer
6 c/s indicates that the Client/Server mode C is client, and S is server. B/S is based on Browsing
Server/Server mode. B is browser, S is server, and C in the former is another client program.
. The latter is implemented based on browsers, such as IE.
7 rfc950 defines IP policy (Allocation Policy) and application specifications.
8 Integrated Wiring includes six subsystems:
Building Group connection Subsystem
Device connection Subsystem
Trunk (vertical) subsystem
Management Subsystem
Level Subsystem
Workspace Subsystem
Including network cabling system, monitoring system, closed-circuit television system
9 A vro belongs to a layer-3 device, and a vswitch (usually referred to as) belongs to a layer-2 device.
10 TCP0-65535, UDP0-65535 is 65536*2 = 131072 ports
11 cache: a high-speed cache memory with hardware. Coordinates the processing speed between devices.
. For example, the CPU L2, L1, and memory functions.
Buffer is a buffer, which is implemented by software in Ram. Accelerate the response speed. Example
For example, Web Cache, cache in various application software, and queue.
All of them are implemented in Ram, but they are implemented in different ways.
12 MBR, Master Boot Record, and Master Boot Record. Boot OS.
13. My method is to ping 192.168.1.2 first.
Run the ARP-a command to view the ARP list and obtain [kiwicsj Note: NBTSTAT-A 192.168.1.2 is available]
14 gpedit. MSC
15 convert X:/Fs: ntfs x: indicates the partition to be converted.
16 ipconfig/Renew
17 system volume information this directory is used by the XP Auto-restore function.
Yes. Pagefile. sys is a PF, virtual memory file.
18 open Resource Manager --- tools --- Folder Options --- view --- use simple file sharing (recommended)
Remove the preceding check box, or open the Group Policy Editor-Computer Configuration-Windows Settings-this
Local policy --- security option --- Network Access: shared security mode of the local account. Change this attribute
The typical mode is also supported.
19. UDP and TCP are used, while QQ mainly uses UDP. In some cases, TCP is used, and most instant messages use UDP.
20 only windows, program files, documents and settings, system volume
Information (with hidden attributes) and recycler (with hidden attributes ).
21 ntldr, ntdetect.com, Boot. ini
22 power-on-[self-check]-BIOS information-video card parameters-CPU parameters-memory parameters-Hard Disk
Parameters --- parameters of the optical drive --- display other I/O parameters of the PCI and other boards ---- (if there is a RAID card
Step should be displayed) ---- BIOS will update escd and finally give (Verifying DMI poll
Data ...... Update Success) --- read MBR record ----- call ntldr for a series
Operation (at this time, the control is transferred from BIOS to the hard disk/OS) --- read the boot. ini file (display Operation System
Select the menu) to enter the specified operation-and a series of other operations are part of the operating system, not
Scope of the problem --- the desktop is finally displayed
23 may be caused by memory problems. Generally, the memory is loose and the dust is high. It can be used for dust cleaning and re-inserted
Good memory and other operations. Other hardware problems can also be determined based on different tweets.
24 The simplest thing is to mount the hard disk to another computer and copy the important files directly.
The partition is fat. You can use the boot disk to enter the DOS mode for file copy operations. If the disk partition is
NTFS, you can use the tool disk to start to load ntfsdos under DOS to copy the NTFS partition.
.
25 it is recommended that you back up the entire Windows directory in disk space. Mainly back up the program files directory, I
The documents directory, Documents and Settings directory. Also, back up the installation information of some software.
26 steps to configure a broadband route
Set the dialing attribute, which is generally pppoe and the user name and password provided by the ISP.
Set valid Intranet IP addresses
We recommend that you enable the firewall function.
27. Update operating system and application software patches, anti-virus, and firewall applications on a regular and irregular basis. All of these
It is passive. The key is to have a set of feasible administrative measures.
28. As far as I know, this problem can only be implemented using third-party software, such as p2p Terminator, a series
Management software.
1. What are the basic functions of a vro?
2. What are the two remote access methods for Win2000?
3. Two English questions are given, such as: What about your company before? And why did you leave that company? Or what is big-5 and GB code? What are their differences?
4. write out the color order of the eight lines of the standard network line and the order of making the cross-over line (that is, the hub-level line without the uplink interface.
5. How can I detect a problem with a Nic?
6. How to Create a Windows NT4.0 Emergency Repair Disk?
7. What is a VLAN, how to add a VLAN to a Cisco switch, and how to delete it?
8. What does 10.201.40.0/23 represent?
9. What types of disk RAID levels are available? Which of the following are your general descriptions and differences.
10. What are the differences between configuring the NT primary domain controller and the 2000 Domain controller? What should I pay attention to when upgrading the NT domain controller to 2000.
11. If a company's servers need to work 24 hours a day without interruption, such as hospitals, how can you do this? There are several ways to explain the basic principles.
12. If the router loop test passes, does it mean that the route is smooth? Why?
13. A client connected to a 100 m switch cannot go to M. There are multiple reasons. Please state the two.
14. Do you know the popular San network platform? It is mainly a solution proposed for the computer field?
The answer is as follows:
1. Data Packet forwarding function.
2. Dial-up remote access and VPN (Virtual Private Network ).
3. My company is very perfect? I'm better than it?
4. The color order of standard network lines is as follows:
568a standard: 1: white green, 2: Green, 3: White orange, 4: blue, 5: white blue, 6: Orange, 7: White Brown, 8: Brown
568b standard: 1: White orange, 2: Orange, 3: white green, 4: blue, 5: white blue, 6: Green, 7: White Brown, 8: Comprehensive
To create a hub-level connection without uplink interfaces, the 568a standard is used for one end of the network cable and 568b standard for the other end.
5. install it on a machine that can access the Internet normally, and check whether the indicator lights are flashing. The indicator lights should be red or green in normal access status, then, use the ping command to check whether the host on the network can be pinged. If the general rule is normal, if the NIC driver is installed correctly and the ping command is not available, it can be determined that the NIC is broken.
7. VLAN, also known as virtual LAN, refers to the division of the LAN at the network layer. a vlan forms a logical subnet, that is, an independent broadcast domain, the broadcast network traffic generated by each subnet is restricted within each subnet to reduce the collision rate of data frames. It can cover multiple network devices, allows network users in different geographic locations to join a logical subnet. add VLAN 2 to a Cisco switch and run the following command:
Switch> enable
Switch # VLAN Database
Switch (VLAN) # VLAN 2
.
.
.
Switch (VLAN) # exit
// Set the VLAN port as follows:
Switch (config) # int E0/6 // set port 6 sub-VLAN 2
Switch1 (config-If) # VLAN-membership static 2
Switch # VLAN Database
Switch (VLAN) # No VLAN 2
Switch (VLAN) # exit
Switch> NO int VLAN 2 t
8. 10.201.40.0/23 indicates a Class a ip address. Its subnet mask is 1 at the first 23 locations, that is, 11111111111111111111111000000000. It is represented in decimal format as 255.254.0.
9. RAID levels include nraid, jbod, raid0, raid1, raid0 + 1, raid3, and RAID5. Currently, RAID 0, raid1, raid3, RAID5, and RAID (0 + 1) are commonly used ). Their differences are roughly as follows:
RAID 0 has the fastest access speed but no fault tolerance
Raid 1 is completely fault tolerant, but the cost is relatively high, and the disk utilization is 50%
RAID 3 has the best write performance but no multi-task functionality.
RAID 5 has multi-task and fault tolerance functions. overhead is available when writing data.
RAID 0 + 1 fast, completely fault tolerant, but high cost
10. the Active Directory of Windows is no different from the master Domain Controller and backup Domain Controller. All Domain Controllers are the same in terms of user access and service provision.
Note the following when upgrading the NT4 domain to the Win2000 domain:
A. The primary domain controller must be a file system that uses NTFS.
B. You cannot return to the NT4 environment after upgrading Win2000.
C. You must first back up important data and prepare for the task.
D. Upgrade PDC before BDC.
E. The installer will have an active directory database. The log file and sysvol directories will require that the directory path be set under the NTFS file system.
11. A master server and a backup server are used. They usually work on the master server. When a problem occurs on the master server, they are replaced with the backup server. In addition, you can use a large backup device to back up the data on the server several times. When the storage device on the server encounters a problem, immediately replace it with a backup storage device.
12. Not necessarily. If the local loop test of the vro passes, it only indicates that the local line device is correct, but it cannot indicate that the access provider is normal.
13.
A: If cascade links are used between the vswitch and the core vswitch of the network, when the data transmission volume of the terminal is large, the cascade link may be congested, resulting in slow client network speed. The solution is to replace cascade links with Ethernet channels.
B: When the client's network transmission device does not reach 100 m, if it is only 10 m, then the client cannot reach M.
14. San refers to a storage area network, which is a high-speed network or a sub-network that provides data transmission between a computer and a storage system. A San network consists of the communication structure of the network connection, the management layer of the Organization and connection, the storage components, and the computer system, so as to ensure the security and strength of data transmission.