60. Which of the following technologies provides data transfer at speeds up to 2.488 Gbps?

61. Which of the following statements about NAT is true? (Choose all that apply.)

but. Every computer on the internal network using NAT must have a registered IP address.

b. NAT is compatible with all applications.

in. NAT is not compatible with technologies that encrypt IP data.

d. NAT uses a special table to map private internal IP addresses to one or more public external addresses.

62. What is the basic component of network equipment connected to the computer?

but. Router.

b. Cable.

in. Network adapter.

g. Concentrator.

63. In what type of networks is the external transceiver used?

d. In all of the above.

64. Let's say you want to install a network adapter in a computer with a PS / 2 mouse, keyboard, printer, and two ID controllers. All of these devices use IRQs by default. Sound adapter assigned IRQ 10. What IRQ should be assigned to the network adapter?

65. Which cable meets the fire safety requirements when installed in the space between the false ceiling and the ceiling?

b. Thick coaxial cable.

in. Military specification.

plenum cable.

66. What type of cable is specified by the specifications of 10Base2 networks?

67. What type of cable is the vampire tooth connector used with?

but. Unshielded twisted pair.

b. Shielded twisted pair.

in. Thick coaxial cable.

d. Thin coaxial cable.

68. What is the name of the signal leakage from one wire to another, which can be reduced by twisting the wires?

but. Electromagnetic interference.

b. Attenuation.

in. Distortion.

d. Cross-talk.

69. What type of connector is used with an unshielded twisted pair cable on Ethernet networks?

in. BNC connector.

D. Connector F.

70. Which of the following statements about fiber-optic cable is correct? (Select all that apply.)

but. Of all cable types, fiber optic is the easiest to install and operate.

b. Fiber optic cable provides more data security than copper.

in. Fiber optic cable is more sensitive to attenuation than copper cable.

d. The throughput of fiber optic cable in single mode is higher than in multimode.

71. Test. What device is used to connect two segments of network cables and regenerate the transmitted signal to eliminate the effect of attenuation?

but. Cylindrical connector.

b. Patch panel.

in. Repeater.

d. Passive concentrator.

72. Which of the following protocols is a non-routable network and transport layer protocol that is easy and simple to configure?

73. Which part of the IPX address is based on the MAC address of the device?

but. Node number.

b. Network number.

in. Subnet number.

d. Host number.

74. Which of the following protocols are focused on establishing a connection? (Select all that apply.)

75. Which statement about IP addresses is true? (Select all that apply.)

but. An IP address consists of two octets.

b. An octet in an IP address consists of eight bits.

in. The IP address is a 32-bit binary number.

d. IP addresses are usually written in hexadecimal format.

76. What is the maximum number of computers in a class B network?

e. More than 16 million.

Test. 77. Which of the following is the default subnet mask for a class C network?

but. 255.255.255.255.

b. 255.255.255.0.

in. 255.255.0.0.

78. Which class address in the classful addressing method belongs to the IP address 190.23.20J.6?

but. Class A.

b. Class B.

in. Class C.

d. Class D.

79. Which routing method uses classless addressing?

80. What is the DHCP service for?

but. To map NetBIOS names to IP addresses.

b. To convert private IP addresses to public addresses.

in. To map IP addresses to MAC addresses.

d. To automatically assign IP addresses to client computers.

81. What utility can you use to view the cache of IP addresses mapped to MAC addresses?

82. The Internet backbone is a collection of communication channels used by local area networks to establish connections over long distances. What are the trunk connection points called?

in. Subnets.

d. Servers.

83. Where do the major ISPs connect to each other?

in. Supercomputers.

84. Which of the above is the defining characteristic of hypertext files, inherent only to them?

but. They are located on the web server.

b. They can be accessed via a URL.

d. They cannot include embedded graphics.

85. The following are examples of URLs entered into the browser for some Web sites. Which ones are correct?

but. http: \ www. acme \.

b. html: // www. acme. com.

in. http: // bigserver. acme. com /.

html: \ acme. com.

86. What is the name of the Web site that serves as the “starting point” for users from ISPs, online services, and primary search services?

but. Metasearch service.

b. Portal.

87. What Internet e-mail protocol is supported on the server that receives e-mails and allows users to view the headers and decide which of these messages should be downloaded to their computer?

88. What is NNTP used for?

b. To perform Novell NetWare procedures over TCP / IP.

in. To access newsgroups.

d. To establish a connection with a remote computer, view on it

files and application execution.

89. What is used to enter the chat room?

90. What does the ITU H.323 standard describe?

but. Format of Web pages.

b. Video conferencing.

in. File transfer over the Internet.

d. The work of search services.

91. Which of the following statements about the RIP protocol are true? (Select all that apply.)

but. RIP is a dynamic routing protocol.

b. In RIP, the network is divided into areas, including the backbone area to which all other areas are connected.

in. RIP is more efficient and extensible than OSPF.

d. RIP is a distance vector protocol.

92. Directory (directory services) is ... (choose defining term).

in. Database.

d. Storage method.

93. What type of database belongs to which information is distributed by the directory service to many computers?

but. Organized database.

b. Distributed database.

94. Which directory services use a flat (flat) namespace? (Select all that apply.)

in. Bindery by Novell.

d. Active Directory.

95. What is the name of the namespace in which the name of the parent is included in the name of the child?

but. Uniform (flat).

b. One generation.

in. Transitive.

d. Continuous.

96. Where are DSA (Directory System Agent), DUA (Directory User Agent) and DIB (Directory Information Base) used?

but. Windows 2000 Active Directory.

in. OSI X.500 specification.

d. LDAP client program.

97. What is the name of the path name of the form DC= net DC= tacteam OU- training CN= Users CN= John Doe, denoting an object in a directory?

but. Attribute.

b. Relative DN.

d. Common name.

98 - Tests. What is the name of an object in the NDS tree that represents a resource or the end of a branch, but not an object that contains other objects?

but. Sheet object.

b. The root object.

in. Stem object.

d. Parent object.

99. In which Active Directory file are scripts and strategies for grouping objects stored?

but. In the Active Directory log file.

b. In the script file.

in. In the group policy administrative file.

d. The file SysVol.

100. Which of the following statements about Windows 2000 domains located in the same domain tree is true?

but. There is no trusting relationship between them.

b. There is a two-way transitive trust relationship between them.

in. There is a one-way, non-transitive trust relationship between them.

d. A trust relationship can exist between them only if it is explicitly created by the administrator,

101. Where are all the access rights associated with an Active Directory object stored?

but. In a child object.

b. In a replication strategy.

in. In the access control list.

d. In the OU module.

102. Which of the following is the advantage of text-based operating systems? (Choose whatever works.)

but. Compared to systems with a graphical interface, they are faster.

b. They are less resource intensive than graphics systems.

in. They are easier to use than graphics systems.

d. Unlike graphical operating systems, they support multitasking.

103. Which of the following commands is used to display TCP / IP configuration information in Windows 95?

104. What is the name of the suffix of two or three characters, located after the period at the end of the file name?

but. File branch.

b. File table.

in. File type.

d. file extension.

105. Which of the following is the advantage of the FAT16 file system in the Microsoft operating system?

but. There are more operating systems with which it is compatible than any other file system.

b. It provides more security than other popular file systems.

in. It is more reliable (less prone to data loss) than any other popular file system.

d. It provides better performance than any other file system.

106. What is the maximum partition size supported by the NTFS file system?

but. 2 GB.

b. 4 GB.

in. 4 GB.

d. 16 GB.

107. Which of the following lines is a UNIX file system route?

but. c: / dir01 / subdir02 / myfile. ext.

b. \ dii01 \ subdii02 \ myfile. ext.

in. / dirOI / subdir02 / myfile. ext.

dir01 / subdir02 \ myfile. ext.

108. In which of the following file systems is the i-node numbering used?

b. UNIX file system.

in. Macintosh HFS.

109. Which component to install so that a Windows NT client computer user can log on directly to the NetWare server?

but. File and Print Services for NetWare.

b. Gateway Services for NetWare.

in. Client Services for NetWare. r. IPX / SPX.

110. How can a Linux client computer access Microsoft server files?

111. Which of the following operating systems uses the HPFS file system?

b. Windows 2000.

d. Windows NT 4.0.

112. What is another name for the protocol used to separate network files and resources?

but. Network / transport layer protocol.

b. Link layer protocol.

in. Kernel protocol.

d. Protocol level 2.

113. Which of the following statements about the IPX / SPX protocol are true?

but. IPX / SPX can only be used on NetWare networks.

b. IPX / SPX is routable.

in. IPX / SPX is not supported on NetWare 5. x.

d. IPX / SPX is slower and more difficult to configure than TCP / IP.

114. How does multiple protocols communicate with one network adapter, or one protocol communicates with multiple network adapters? (Choose all that apply.)

Test -115. Which of the following is used to share files on Microsoft networks?

116. Which of the above statements about GSNW (Gateway Service for NetWare) are true?

but. The GSNW service is installed on a NetWare server to provide Windows clients with access to resources on that server.

b. The GSNW service is included with the Windows NT Server and Windows 2000 Server operating systems.

in. The GSNW service allows Windows server clients to connect to a NetWare server without installing additional software on the client or configuring the NetWare server.

d. The GSNW service is installed on a Windows server so that clients on that server can access NetWare server resources.

117. Which of the following is a freeware third-party software product that allows Windows and UNIX users to communicate over the network?

in. Client Services for UNIX

118. What is the name of the programs that translate data between different protocols and allow computers to communicate, located in networks of different types?

but. Bridge software.

b. Server software.

in. Gateway software.

d. Router software.

119. What is the name of the software component that intercepts requests for resources?

but. Platform.

b. Client.

in. Director.

1 Test. What technology of long-distance communication was first implemented in France at the beginning of the 19th century?

but. Telephone network.

b. Optical telegraph network.

2. What network technology is used in the telephone network?

but. Packet switching.

b. Layer 2 switching.

in. Layer 3 switching.

d. Channel switching.

3. Which technology works best for the explosive nature of data transmission?

but. Packet switching.

b. Analog transmission.

in. Channel switching.

d. Patch panel technology.

4. Which of the following disadvantages are inherent in networks based on general purpose computers? (Choose whatever works.)

but. Mainframe hardware is much more expensive than personal computer hardware.

b. Personal computer servers can handle significantly more data than general purpose machines.

in. The failure of the universal machine causes the collapse of the entire system.

d. The terminals of general purpose machines provide a lower level of security than personal computers connected to a network.

5. Which of the following list can be shared between computers on the network? (Choose whatever works.)

but. Data.

b. Applications.

in. Printers.

d. Modems.

6. Which of these devices are input devices? (Check all that apply.)

but. Plotter.

in. Digital camera.

d. Printer.

7. Which of these names denotes a method developed in the 1980s for translating hostnames to IP addresses?

8.Test. What are the names of technologies that combine telecommunications and computing?

but. Mainframes.

b. Telephony.

9. Which computer is sending requests to another computer to gain access to its data and resources?

but. Server.

b. Work station.

in. Client computer.

Terminal.

10. Which computer sends requests to another computer to gain access to its data and resource am?

but. Server.

b. Work station.

in. Client computer.

Terminal.

11. What is the name of the set of rules that computers adhere to during the connection process?

but. Protocol.

b. The type of environment.

d. Topology.

12. Which of the following is the network type classified by physical scope?

b. WAN (Wide Area Network).

Ring.

13. Which of the following statements are true for a typical local area network?

but. A local area network is a large network made up of many small networks.

b. A local area network covers a wide geographic area with nodes in different cities, states and countries.

in. The local area network covers a limited area, its computers are located close to each other.

d. To simplify management tasks, the local network can be divided into working groups.

14. What is the name of a group of networks connected to each other?

d. Working group.

15. Which of the following statements are true for client / server networks?

but. Installing client / server networks is cheaper.

b. In client / server networks, data is stored centrally for easy backups.

in. A network administrator is needed to maintain client / server networks.

d. Client / server networks provide greater security.

16. What is the name of the server that performs registration authentication on a Microsoft client / server network?

b... Security Accounts Manager.

in. Domain controller.

d. Cluster server.

17. Which of these statements about peer-to-peer security are correct?

but. Security controls are centralized and controlled by the network administrator.

b. The security is higher than in a client / server environment, and it is more difficult to break the integrity and confidentiality of data.

in. Each computer in the workgroup has its own database with security settings.

d. Security is not provided at the user level, but at the level of shared resources.

18. Which of these statements about Windows 2000 domains are correct?

but. The foundation of Windows 2000 domains is a directory service called Active Directory.

b. The core of Windows 2000 domains is a directory service called Bindery.

in. Windows 2000 domains are called down-level domains.

d. A Windows 2000 domain can contain many domain controllers, all of which can read and write to the directory database.

19. Which of these statements about TCP / IP networks are correct?

but. TCP / IP networks are medium to large networks with many subnets.

b. The global Internet is a TCP / IP network.

in. There are few tools and utilities developed for TCP / IP networks.

d. TCP / IP networks are easier to administer than NetBEUI.

20. What is the name of a network topology in which the network has a beginning and an end, and terminators are used to prevent signal reflections?

but. Star-shaped.

b. Mixed honeycomb.

in. Tire.

21. What network architectures use unshielded twisted pairs?

22. What is the name of the number system in which 16 digits are used to represent numerical values?

but. Decimal.

b. Hexadecimal.

in. Binary.

d. Machine code.

23. What is the name of a digit in the binary number system?

gigabyte.

24. What number in decimal is equal to a binary number

25. What is the name of the small pieces of data into which the computer breaks down the data before transferring it to the network?

but. Hexadecimal numbers.

b. Packages.

in. Headings.

26. What is the name of the component that is placed in the trailer of the data packet in order to detect errors?

but. Check bit.

27. "A schematic description of a system, theory or phenomenon, including its known or studied properties and used in order to further study its characteristics." What is being determined here?

but. Protocol.

b. Model.

in. Process.

d. Level.

28. Which layer of the OSI model is divided into two sub-layers?

but. Physical.

b. Channel.

in. Network.

Transport.

29. Which layer of the OSI model does not add header information to the data packet as it moves down the stack?

but. Physical.

b. Channel.

in. Session.

Applied.

30. What protocol belongs to the session layer?

31. What is another name for a multi-station repeater?

b. Router.

in. Switch.

g. Concentrator.

32. What is the name of the process of converting zeros and ones representing computer data into electrical or light impulses?

but. Encryption.

b. Coding.

in. Security.

d. Cyclicity.

33. Which of these statements are true for digital signals?

but. The digital signal is a constantly changing electromagnetic wave.

b. The parameters of a digital signal are amplitude, frequency and phase.

in. The unit of measurement for digital signals is hertz.

d. A digital signal is a signal with discrete states.

34. Which of the following statements about the advantages of analog signals over digital ones are true? (Select all that apply.)

but. Analog signals are less susceptible to interference.

b. Analog devices are cheaper than digital ones.

in. Analog signals are easier to multiplex.

d. Analog signals are less susceptible to attenuation.

35. What is the name of a technology in which all the capabilities of the medium are used to transmit data over one channel?

but. Transfer of unmodulated signals.

b. Signal modulation.

in. Multiplexing.

d. Multi-connections.

36. Which of these statements are true for unmodulated signals? (Select all that apply.)

but. Unmodulated signals can be transmitted in both directions.

b. Unmodulated signals are used in cable television.

in. Unmodulated signals are unidirectional.

d. Digital signals are most often unmodulated.

37. What type of multiplexing is used in fiber optic networks, in which each signal is transmitted at its own wavelength of the light beam?

but. Frequency division of channels.

b. Time division of channels.

in. High density wavelength.

d. By wavelength frequency.

38. Which of these statements about asynchronous data transfer are true?

but. In asynchronous transmission, the internal clocks of the sending and receiving devices are coordinated by built-in mechanisms.

b. Asynchronous transmission uses state-guaranteed synchronization.

in. Gating is used for asynchronous transmission.

d. In asynchronous transmission, a start bit is used to synchronize the transmitting and receiving devices.

39. What systems use half-duplex method?

but. A television.

b. Broadcasting.

in. Telephone communications.

Test 40. Which signal carrier is most sensitive to electromagnetic interference?

but. Unshielded twisted pair.

b. Coaxial cable.

in. Fiber optic cable.

d. Shielded twisted pair.

41. What access method is used in Ethernet?

but. CSMA / CA.

in. Passing the token.

d. Priorities of requests.

42. What architecture is defined by the IEEE 802.3 specification?

43. What method of access to the network is used in Ethernet?

in. Passing the token.

d. Priorities of requests.

44. What is the maximum number of nodes per cable segment in Ethernet 10Base2?

45. What type of cable is the BNC connector used with?

but. Unshielded pair.

b. Thick coaxial cable.

in. Thin coaxial cable.

d. Fiber optic cable.

46. ​​What architecture is called standard Ethernet?

47. What is the maximum cable length specified for 10Base5 networks?

but. 100 meters.

b. 500 meters.

in. 100 feet.

d. 500 ft.

48. Which of the following statements is true for the Token Ring architecture? (Select all that apply.)

but. Token Ring topology is passive.

b. Token Ring bandwidth is 4 or 16 Mbps.

in. Token Ring hubs are called multiple access devices.

d. Token Ring networks use modulated signals.

49. What is the name of the looping signal sent by the host computer on the Token Ring network to detect a failed node and reconfigure the network to restore communication?

but. Marker.

b. Data frame.

50. What is the name of the data link protocol originally developed for AppleTalk networks?

51. What is the bandwidth of standard ARCnet?

but. 2.5 Mbps.

b. 25 Mbps.

in. 16 Mbps.

d. 10 Mbps.

52. Which of the following parameters should be configured for the internal modem?

but. I / O address.

b. IP address.

d. Communication port.

53. What is CSU / DSU or PAD?

but. ISDN terminal adapter.

b. User equipment.

in. Terminal identifier.

d. Concentrator-router.

54. In which networks are PSTN, ISDN, DSL, DDS and T-carriers used?

but. In circuit-switched networks.

b. In packet-switched networks.

in. Switched 59.

d. In local networks.

55. Which of the following statements about ISDN are true? (Choose all that apply.)

but. This is analog communication.

b. ISDN is more expensive than PSTN.

in. ISDN requires special equipment on the telephone

station and at the user.

d. ISDN line contains only one channel.

56. Which WAN topology provides the easiest scalability?

but. Point.

b. Ring.

in. Star.

d. All of the above are equally extensible.

57. What was the name of the very first packet-switched technology based on the ARPAnet 1822 protocol?

but. Frame Relay.

58. Which of the following characteristics of Frame Relay are different from those of X.25? (Choose all that apply.)

but. Frame Relay provides high performance.

b. Frame Relay uses packet switching.

in. Frame Relay uses digital signals.

d. Frame Relay does not have continuous error checking.

59. Which of the following is true for ATM? (Choose all that apply.)

but. Variable length packets are used.

b. Chunks of data with a length of 53 bytes are used, which are called cells.

d. Predefined channels are used.

e. This is the cheapest WAN technology.

Option number 1
1. What networks are used by a small group of employees
a) campus networks
b) corporate networks
c) department networks
2. What characteristic of the network shows the average time to process user requests
a) bandwidth
b) manageability
c) performance
3. What level of the OSI model is the lowest.
a) channel
b) physical
c) applied
4. What type of cable does single-mode cables belong to:
a) fiber optic
b) twisted pair
c) coaxial
5. What communication lines use wireless channels.
a) air
b) cable
c) radio channels
6. What signal coding belongs to analog modulation.
a) polar
b) Manchester code
c) phase
7. LAN is ...:
a) a set of computers for sharing information in
limited limits
b) a set of computers for sharing information on large
distances
c) a set of computers for transferring data from a common database
8. The network topology is ...:



9. What routers are intended for building a network of a central corporation:
a) trunk


10. What does not apply to mobile communications:
a) twisting
b) infrared communication
c) cellular telephony

11. Which networks serve to provide their services to a large number of subscribers,
located within a very large area of ​​a city, country, etc .:
a) global
b) local
c) corporate
12. Which device processes frames in parallel?
a) bridge
b) switch
c) hub
13. What switching uses information buffering:
a) channels
b) packages
c) messages
14. What does not apply to LAN tasks:
a) differentiation of information
b) file splitting
c) separation of peripheral devices
15. MODEM this device?
A) for storing information
B) to process information at a given time
C) for the transmission of information via telephone communication channels
16. A shared computer that includes all
resources called ...
A) file server.
B) workstation.
C) client server
17. List 3 basic network topologies:
Write down the answer:

Answer common bus, marker ring, star
18. On what topologies is the Ethernet technology based:
a) tire
b) star
c) ring
19. The global network is ...
a) a system of interconnected computers
b) a system of interconnected local networks
c) a system of interconnected local networks and individual computers
users
20. Which network component includes all the connection devices.
a) computers
b) network applications
c) communication equipment
21.
Which protocol ensures the transfer of messages from sender to recipient through

united systems of computer networks?
a) TCP
b) IP
c) IPX
22. What level guarantees the delivery of packets without errors.
a) network
b) channel
c) transport
23. The main function of which device is to repeat the frame on all ports:
a) hub
b) switch
c) network adapter
Option number 2
1. What is the topmost component of the network.
a) computers
b) operating system
c) network applications
2. Which layer of the OSI model is responsible for addressing the message and translating logical addresses into
physical.
a) channel
b) network
c) transport
3. What cable is most commonly used in a horizontal subsystem (within a floor)?
a) fiber optic
b) shielded twisted pair
c) unshielded twisted pair
4. What characteristic shows that the network performs all its functions.
a) performance
b) efficiency
c) reliability
5. Which communication lines do not use insulating shells
a) air
b) cable
c) radio channels
6. What coding of signals belongs to digital coding
a) polar
b) frequency
c) amplitude
7. Which device receives messages sent over the network and automatically monitors
errors:
a) hub
b) switch
c) network adapter

8. The access method is ...:
a) a logical diagram of the connection by communication channels of computers on the network
b) a set of rules governing the use of the data transmission channel
c) the scheme of data transmission over the network
9. How many layers does the OSI model have?
a) 5
b) 7
at 10 o'clock
10.What does not apply to wireless links:
a) communication in the wavelength range
b) radio communication
c) paging
11. What routers are designed to separate large local networks into
subsystems:
a) trunk
b) routers of remote offices
c) LAN routers
12. Provider is:


normal network operation
13. In which topology is a special format frame used?
a) common bus
b) marker ring
c) star
14. The concept of "point-to-point" transfer:
a) data transfer through the hub
b) data transfer from one network adapter to another
c) data transmission through a chain of computers
15. Standard Internet Protocol.
A) PPP.
B) SLIP.
C) TCP / IP.
16. A computer connected to the Internet must have:
Choose one of 3 answer options:
a) domain name
b) URL address
c) IP address
17. Communication channel providing high-speed transmission?
Write down the answer:
__________________________________________
Fiber optic
18. What topology the TokenRing technology is based on:
a) tire

b) star
c) ring
19. What components of a computer network are needed to organize a peer-to-peer
local network?
a) modem, computer server, workstations
b) network card, network software
c) file server, workstations, modem
20. What characteristic of the network hides the details of the network from the user.
a) extensibility
b) transparency
c) compatibility
21. What refers to the intermediate equipment of communication lines:
a) modem
b) hub
c) network adapter
22. What kind of switching allows you to divide data into parts:
a) channels
b) packages
c) messages
23. Which operating mode of the switch does not exist:
a) half-duplex
b) duplex
c) complex
Option number 3
1. In which network adapters part of the work is shifted to the driver:
a) client
b) server
c) mixed
2. Which layer of the OSI model is the highest.
a) physical
b) representative
c) applied
3. What network connects many networks of different departments of one enterprise.
a) department networks
b) local networks
c) corporate networks
4. What characteristics of the network can include a wide variety of software and
hardware.
a) manageability
b) compatibility
c) transparency
5. What does not apply to the characteristics of communication lines:
a) noise immunity

b) attenuation
c) noise immunity
6. What communication lines use multiple layers of insulating shells
a) air
b) cable
c) radio channels
7. What does not apply to LAN tasks:
a) access to information
b) file splitting
c) information protection
8. What topology is based on hubs
a) common bus
b) marker ring
c) star
9. What layer of the OSI model deals with the transmission of an unstructured stream over pipes
connections
a) physical
b) channel
c) network
10. What device is used in analog modulation:
a) network adapter
b) hub
c) modem
11. What bridge operation algorithm does not exist:
a) transparent bridge
b) source-routed bridge
c) source-buffered bridge
12. What the routing table contains:
a) information about router numbers
b) routes to all known networks connected to routers
c) graph of the transit time of the frame through the router
13. What function of the global network does not exist:
a) transport
b) multilevel
c) high-level
14. What level is presented in the form of various protocols with the help of which
the user is accessing resources
a) representative
b) applied
c) network
15.
The main reason for disabling a port on hubs is:
a) no response frame repetition on all ports
b) no response to a sequence of pulses sent to all ports.

c) if the port gives errors
16.
LAN configuration in which all PCs are connected to the same communication line.
A) Ring.
B) Tire.
D) Star.
Networks where all computers are equal
17.
Write down the answer:
__________________________________________
peer-to-peer
18. On what topology is FDDI technology based:
a) tire
b) star
c) ring
19. Which cable provides 100Mbps data transfer rate?
a) coaxial
b) twisted pair
c) fiber optic
1
2
20. In which topology all computers on the network can simultaneously transmit
information
a) common bus
b) marker ring
c) star
21. What characteristics of the network allows to increase the number of network nodes in
wide limits
a) extensibility
b) scalability
c) compatibility
22. What level allows you to insert breakpoints into long transmissions.
a) network
b) representative
c) session
23. What does not apply to mobile communications:
a) paging
b) radio communication
c) cellular telephony
Option number 4
1. Which device processes frames sequentially?
a) bridge
b) switch
c) hub
2.
... is a method of describing network environments that reflects the interactions between software and
hardware during the communication session.

a) topology
b) structuring
c) OSI model
3. What characteristic of the network serves for the ability to control the constituent elements
networks.
a) reliability
b) manageability
c) performance
4. Which layer of the OSI model deals with the form of transmission of information over the network, without changing when
this is its content, and also deals with data encryption.
a) applied
b) transport
c) representative
5. How are the network protocols implemented:
a) hardware
b) software modules
c) routing tables
6. What does not apply to the characteristics of communication lines:
a) reliability
b) bandwidth
c) bandwidth
7. What switching allows you to create a single transmission channel:
a) channels
b) packages
c) messages
8. What does not apply to LAN components:
a) network os
b) servers
c) switching equipment
9. In what topology do computers participate in packet transmission?
a) common bus
b) marker ring
c) star
10. The network operator is:
a) a company providing paid services to network subscribers
b) a company that maintains the normal operation of the network
c) a company that provides paid services to network subscribers and supports
normal network operation
11. What is the name of the characteristic that transmits data per unit of time
a) bandwidth
b) performance
c) reliability
12. Which networks are not subnetted
a) department networks
b) global networks

c) corporate networks
13. What does not apply to wireless communication lines:
a) infrared communication
b) radio communication
c) cellular telephony
14. The simplest method of protection against unauthorized access:
a) antiviruses
b) password protection
c) encryption
15. Which protocol performs packet fragmentation:
a) IP
b) TCP
c) IPX

16. Configuration of a local network based on a file server.
A) Ring.
B) Tire.
C) Star.
17. A computer presenting its resources to other PCs is called ...
Write down the answer:
__________________________________________
server
18. What kind of cable does not use TokenRing technology:
a) coaxial
b) twisted pair
c) fiber optic
19. Which of the following schemes for connecting computers is a closed chain?
20. In what way does the concentrator work:
a) Tire
b) Ring
c) Star
a) 4x hubs
b) bit
c) without a break
21. Which device transmits frames, while determining the optimal path for the frame:
a) hub
b) switch
c) router
22. A device that, on the transmitter side, provides digital conversion
computer signal into a modulated analog signal, and on the receiver side
performs reverse signal conversion.
A) Hub
B) Modem.
D) Switch.
called ...
23. Equipment located between networks using the same protocols,

A) Bridge.
B) AC adapter.
D) Gateway.
Option number 5
1. What network component forms the software platform
a) communication equipment.
b) network applications
c) operating systems
2. What characteristic of the network protects against unauthorized access.
a) reliability
b) safety
c) scalability
3. What function do network protocols not perform?
a) transmission of packets between end nodes of the network
b) protection against broadcast storms
c) selection of the packet transmission route
4. What level carries out the transmission of each frame, while waiting for confirmation
transmission.
a) channel
b) network
c) transport
5. What bandwidth is recorded in 1 second of time
a) instant
b) average
c) maximum
6. What concerns the main equipment of communication lines:
a) modem
b) switch
c) hub
7. What kind of switching allows the transmission of e-mail information:
a) channels
b) packages
c) messages
8. In what way does the switch work:
a) 4x hubs
b) bit
c) without a break
9. Which topology is most likely to cause collisions?
a) common bus
b) marker ring
c) star
10. What network component works at the link layer
a) hub
b) switch
c) network adapter

11.
Which protocol organizes the reliable and efficient operation of the composite network:
a) TCP
b) IP
c) IPX
Which component of the global network is installed in certain geographic locations,
12.
where divergence and merging of data streams is required:
a) multiplexer
b) switch
c) router
13. What characteristic of the network means mean mean time between failures
a) reliability
b) performance
c) compatibility
14. What topology is not used to build large LANs
a) common bus
b) marker ring
c) star
15.
What field is missing from the IP protocol?
16.
What is related to network equipment?
a) field "offset"
b) the "checksum" field
c) the "fragmentation" field
A) Hub.
C) Adapter.
C) All answers are correct.
17. Give a decryption of the LAN
Write down the answer:
__________________________________________
Local computing network
18. What kind of cable does FDDI technology use:
19. Select the correct IP address of the computer on the network
a) coaxial
b) twisted pair
c) fiber optic
a) 1. 108.214.198.112
b) 2.18.274.198.0
c) 1278.214.198
Networks where one of all computers is allocated, which manages all resources
20.
Write down the answer:
__________________________________________
client-server
21. What kind of cable does Ethernet technology use:
a) coaxial
b) twisted pair
c) fiber optic
d) all types of cables
22. Topology of a computer network in which all computers on the network are connected to
the central node is called

a) Tire
b) Ring
c) Star
23. What kind of networks is called peer-to-peer?
a) local network;
b) global network;
c) corporate network;

Option number 2.
Question 1. (Difficulty - A) The global network is ...
Answer 1.a system of interconnected computers
Answer 2.a system of interconnected local networks
Answer 3.a system of interconnected local telecommunication networks
* Answer 4.a system of interconnected local networks and computers of individual users

Question 2. (Difficulty - A) To connect two computers via telephone lines, you must have:
Answer 1.Modem
* Answer 2.two modems
Answer 3.phone, modem and special software
Answer 4. by modem on each computer and special software

Question 3. (Difficulty - A) E-mail is:
Answer 1.search program
Answer 2.name of the mail server
Answer 3.mail program
* Answer 4. Exchange of letters in computer networks (e-mail)

Question 4. (Complexity - A) The HTTP protocol serves to:
* Answer 1.Hypertext transfer
Answer 2.file transfer
Answer 3: messaging control
Answer 4.Run the program from a remote computer

Question 5. (Difficulty - A) What components of a computer network are required to organize a peer-to-peer local area network?
* Answer 1. modem, server computer
Answer 2.network card, network software
Answer 3. server computer, workstations,
Answer 4.Communication lines, network card, network software

Question 6. (Difficulty - A) To view the WEB-pages are intended:
Answer 1.search servers
* Answer 2.Browsers
Answer 3: teleconferencing
Answer 4.Providers

Question 7. (Difficulty - A) Which of the following schemes for connecting computers is a closed chain?
Answer 1. Bus
* Answer 2. Ring
Answer 3. Star

Question 8. (Difficulty - A) Which cable provides data transfer rates up to 10 Mbps?
* Answer 1.coaxial
Answer 2.twisted pair
Answer 3.Fiber optic
Answer 4. there is no correct answer

Question 9. (Difficulty - A) To transfer files over the network, the protocol is used ...
Answer 1. POP3
Response 2. HTTP
Answer 3. CMPT
* Answer 4. FTP

Question 10. (Difficulty - A) Choose the correct email address:
Answer 1. [email protected]
Answer 2.ivan_petrov.mail.ru
Answer 3.ivan petrov.mail.ru
* Answer 4. [email protected]

Question 11. (Difficulty - A) The data transfer rate is 6000Mb / min. This amounts to ... Mbps
Answer 1.10
* Answer 2.100
Answer 3.3600
Answer 4.36000

Question 12. (Difficulty - A) An Internet e-mail address is set: [email protected] What is the name of the mail server?
Answer 1. [email protected]
Answer 2. fortuna
* Answer 3.list.ru
Answer 4.list

Question 13. (Difficulty - A) A computer connected to the Internet must have
Answer 1. URL;
* Answer 2. IP address
Answer 3. WEB-page;
Answer 4. domain name;

Question 14. (Difficulty - A) Choose the correct IP address of the computer on the network
* Answer 1. 108.214.198.112
Answer 2.18.274.198.0
Answer 3. 1278.214.198
Answer 4.10,0,0,1225

Question 15. (Complexity - A) The topology of a computer network in which all computers on the network are connected to a central node is called
Answer 1. Bus
Answer 2. Ring
* Answer 3. Star
Answer 4. There is no correct answer

Q16. (Difficulty - A) Which top-level domain does "educational site" mean?
Answer 1. mil
Answer 2.gov
Answer 3.com
* Answer 4.edu

Question 17. (Difficulty - A) Determine the level 2 domain www.klyaksa.inform.net
Answer 1.klyaksa
Answer 2.inform
Answer 3.www
* Answer 4. net

Question 18. (Difficulty - B) Determine the computer number on the network by IP 215.128.255.106
Answer 1.215.128.255.106
Answer 2.128.255.106
Answer 3.255.106
* Answer 4.106

Question 19. (Difficulty - A) The protocol is ...
Answer 1.the ability of a computer to send files through information channels
Answer 2.device for LAN operation
* Answer 3.Standard for data transmission over a computer network
Answer 4.The standard for sending messages via email

Question 20. (Difficulty - B) How long will it take to transfer a 128KB file over a 128Kbps network?
* Answer 1.8 p.
Answer 2.1 s.
Answer 3.1 min.
Answer 4.10 p.

Test on the topic "Computer networks"

Question 1. (Difficulty - A) The global network is ...
Answer 1.a system of interconnected computers
Answer 2.a system of interconnected local networks
Answer 3.a system of interconnected local telecommunication networks
* Answer 4.a system of interconnected local networks and computers of individual users

Question 2. (Difficulty - A) To connect two computers via telephone lines, you must have:
Answer 1.Modem
* Answer 2.two modems
Answer 3.phone, modem and special software
Answer 4. by modem on each computer and special software

Question 3. (Difficulty - A) E-mail is:
Answer 1.search program
Answer 2.name of the mail server
Answer 3.mail program
* Answer 4. Exchange of letters in computer networks (e-mail)

Question 4. (Complexity - A) The HTTP protocol serves to:
* Answer 1.Hypertext transfer
Answer 2.file transfer
Answer 3: messaging control
Answer 4.Run the program from a remote computer

Question 5. (Difficulty - A) What components of a computer network are required to organize a peer-to-peer local area network?
* Answer 1. modem, server computer
Answer 2.network card, network software
Answer 3. server computer, workstations,
Answer 4.Communication lines, network card, network software

Question 6. (Difficulty - A) To view the WEB-pages are intended:
Answer 1.search servers
* Answer 2.Browsers
Answer 3: teleconferencing
Answer 4.Providers

Question 7. (Difficulty - A) Which of the following schemes for connecting computers is a closed chain?
Answer 1. Bus
* Answer 2. Ring
Answer 3. Star

Question 8. (Difficulty - A) Which cable provides data transfer rates up to 10 Mbps?
* Answer 1.coaxial
Answer 2.twisted pair
Answer 3.Fiber optic
Answer 4. there is no correct answer

Question 9. (Difficulty - A) To transfer files over the network, the protocol is used ...
Answer 1. POP3
Response 2. HTTP
Answer 3. CMPT
* Answer 4. FTP

Question 10. (Difficulty - A) Choose the correct email address:
Answer 1. [email protected]
Answer 2.ivan_petrov.mail.ru
Answer 3.ivan petrov.mail.ru
* Answer 4. [email protected]

Question 11. (Difficulty - A) The data transfer rate is 6000Mb / min. This amounts to ... Mbps
Answer 1.10
* Answer 2.100
Answer 3.3600
Answer 4.36000

Question 12. (Difficulty - A) An Internet e-mail address is set: [email protected] What is the name of the mail server?
Answer 1. [email protected]
Answer 2. fortuna
* Answer 3.list.ru
Answer 4.list

Question 13. (Difficulty - A) A computer connected to the Internet must have
Answer 1. URL;
* Answer 2. IP address
Answer 3. WEB-page;
Answer 4. domain name;

Question 14. (Difficulty - A) Choose the correct IP address of the computer on the network
* Answer 1. 108.214.198.112
Answer 2.18.274.198.0
Answer 3. 1278.214.198
Answer 4.10,0,0,1225
Question 15. (Complexity - A) The topology of a computer network in which all computers on the network are connected to a central node is called
Answer 1. Bus
Answer 2. Ring
* Answer 3. Star
Answer 4. There is no correct answer
Question 16. (Difficulty - B) Determine the computer number on the network by IP 215.128.255.106
Answer 1.215.128.255.106
Answer 2.128.255.106
Answer 3.255.106
* Answer 4.106
Question 19. (Difficulty - A) The protocol is ...
Answer 1.the ability of a computer to send files through information channels
Answer 2.device for LAN operation
* Answer 3.Standard for data transmission over a computer network
Answer 4.The standard for sending messages via email