60. Which of the following technologies provides data transfer at speeds up to 2.488 Gbps?

61. Which of the following statements about NAT is true? (Choose all that apply.)

but. Every computer on the internal network using NAT must have a registered IP address.

b. NAT is compatible with all applications.

in. NAT is not compatible with technologies that encrypt IP data.

d. NAT uses a special table to map private internal IP addresses to one or more public external addresses.

62. What is the basic component of network equipment connected to the computer?

but. Router.

b. Cable.

in. Network adapter.

g. Concentrator.

63. In what type of networks is the external transceiver used?

d. In all of the above.

64. Let's say you want to install a network adapter in a computer with a PS / 2 mouse, keyboard, printer, and two ID controllers. All of these devices use IRQs by default. Sound adapter assigned IRQ 10. What IRQ should be assigned to the network adapter?

65. Which cable meets the fire safety requirements when installed in the space between the false ceiling and the ceiling?

b. Thick coaxial cable.

in. Military specification.

plenum cable.

66. What type of cable is specified by the specifications of 10Base2 networks?

67. What type of cable is the vampire tooth connector used with?

but. Unshielded twisted pair.

b. Shielded twisted pair.

in. Thick coaxial cable.

d. Thin coaxial cable.

68. What is the name of the signal leakage from one wire to another, which can be reduced by twisting the wires?

but. Electromagnetic interference.

b. Attenuation.

in. Distortion.

d. Cross-talk.

69. What type of connector is used with an unshielded twisted pair cable on Ethernet networks?

in. BNC connector.

D. Connector F.

70. Which of the following statements about fiber-optic cable is correct? (Select all that apply.)

but. Of all cable types, fiber optic is the easiest to install and operate.

b. Fiber optic cable provides more data security than copper.

in. Fiber optic cable is more sensitive to attenuation than copper cable.

d. The throughput of fiber optic cable in single mode is higher than in multimode.

71. Test. What device is used to connect two segments of network cables and regenerate the transmitted signal to eliminate the effect of attenuation?

but. Cylindrical connector.

b. Patch panel.

in. Repeater.

d. Passive concentrator.

72. Which of the following protocols is a non-routable network and transport layer protocol that is easy and simple to configure?

73. Which part of the IPX address is based on the MAC address of the device?

but. Node number.

b. Network number.

in. Subnet number.

d. Host number.

74. Which of the following protocols are focused on establishing a connection? (Select all that apply.)

75. Which statement about IP addresses is true? (Select all that apply.)

but. The IP address consists of two octets.

b. An octet in an IP address consists of eight bits.

in. The IP address is a 32-bit binary number.

d. IP addresses are usually written in hexadecimal format.

76. What is the maximum number of computers in a class B network?

e. More than 16 million.

Test. 77. Which of the following is the default subnet mask for a class C network?

but. 255.255.255.255.

b. 255.255.255.0.

in. 255.255.0.0.

78. Which class address in the classful addressing method belongs to the IP address 190.23.20J.6?

but. Class A.

b. Class B.

in. Class C.

d. Class D.

79. Which routing method uses classless addressing?

80. What is the DHCP service for?

but. To map NetBIOS names to IP addresses.

b. To convert private IP addresses to public addresses.

in. To map IP addresses to MAC addresses.

d. To automatically assign IP addresses to client computers.

81. What utility can you use to view the cache of IP addresses mapped to MAC addresses?

82. The Internet backbone is a collection of communication channels used by local area networks to establish connections over long distances. What are the trunk connection points called?

in. Subnets.

d. Servers.

83. Where do the major ISPs connect to each other?

in. Supercomputers.

84. Which of the above is the defining characteristic of hypertext files, inherent only to them?

but. They are located on the web server.

b. They can be accessed via a URL.

d. They cannot include embedded graphics.

85. The following are examples of URLs entered into the browser for some Web sites. Which ones are correct?

but. http: \ www. acme \.

b. html: // www. acme. com.

in. http: // bigserver. acme. com /.

html: \ acme. com.

86. What is the name of the Web site that serves as the “starting point” for users from ISPs, back-office services, and primary search services?

but. Metasearch service.

b. Portal.

87. What Internet e-mail protocol is supported on the server that receives e-mails and allows users to view the headers and decide which of these messages should be downloaded to their computer?

88. What is NNTP used for?

b. To perform Novell NetWare procedures over TCP / IP.

in. To access newsgroups.

d. To establish a connection with a remote computer, view on it

files and application execution.

89. What is used to enter the chat room?

90. What does the ITU H.323 standard describe?

but. Format of Web pages.

b. Video conferencing.

in. File transfer over the Internet.

d. Search services.

91. Which of the following statements about the RIP protocol are true? (Select all that apply.)

but. RIP is a dynamic routing protocol.

b. In RIP, the network is divided into areas, including the backbone area to which all other areas are connected.

in. RIP is more efficient and extensible than OSPF.

d. RIP is a distance vector protocol.

92. Directory (directory services) is ... (choose defining term).

in. Database.

d. Storage method.

93. What type of database belongs to which information is distributed by the directory service to many computers?

but. Organized database.

b. Distributed database.

94. Which directory services use a flat (flat) namespace? (Select all that apply.)

in. Bindery by Novell.

d. Active Directory.

95. What is the name of the namespace in which the name of the parent is included in the name of the child?

but. Uniform (flat).

b. One generation.

in. Transitive.

d. Continuous.

96. Where are DSA (Directory System Agent), DUA (Directory User Agent) and DIB (Directory Information Base) used?

but. Windows 2000 Active Directory.

in. OSI X.500 specification.

d. LDAP client program.

97. What is the name of the path name of the form DC= net DC= tacteam OU- training CN= Users CN= John Doe, denoting an object in a directory?

but. Attribute.

b. Relative DN.

d. Common name.

98 - Tests. What is the name of an object in the NDS tree that represents a resource or the end of a branch, but not an object that contains other objects?

but. Sheet object.

b. The root object.

in. Stem object.

d. Parent object.

99. In which Active Directory file are scripts and strategies for grouping objects stored?

but. In the Active Directory log file.

b. In the script file.

in. In the group policy administrative file.

d. The file SysVol.

100. Which of the following statements about Windows 2000 domains located in the same domain tree is true?

but. There is no trusting relationship between them.

b. There is a two-way transitive trust relationship between them.

in. There is a one-way, non-transitive trust relationship between them.

d. A trust relationship can exist between them only if it is explicitly created by the administrator,

101. Where are all the access rights associated with an Active Directory object stored?

but. In a child object.

b. In a replication strategy.

in. In the access control list.

d. In the OU module.

102. Which of the following is the advantage of text-based operating systems? (Choose whatever works.)

but. Compared to systems with a graphical interface, they are faster.

b. They are less resource intensive than graphics systems.

in. They are easier to use than graphics systems.

d. Unlike graphical operating systems, they support multitasking.

103. Which of the following commands is used to display TCP / IP configuration information in Windows 95?

104. What is the name of the suffix of two or three characters located after the period at the end of the file name?

but. File branch.

b. File table.

in. File type.

d. file extension.

105. Which of the following is the advantage of the FAT16 file system in the Microsoft operating system?

but. There are more operating systems with which it is compatible than any other file system.

b. It provides more security than other popular file systems.

in. It is more reliable (less prone to data loss) than any other popular file system.

d. It provides better performance than any other file system.

106. What is the maximum partition size supported by the NTFS file system?

but. 2 GB.

b. 4 GB.

in. 4 GB.

d. 16 GB.

107. Which of the following lines is a UNIX file system route?

but. c: / dir01 / subdir02 / myfile. ext.

b. \ dii01 \ subdii02 \ myfile. ext.

in. / dirOI / subdir02 / myfile. ext.

dir01 / subdir02 \ myfile. ext.

108. In which of the following file systems is the i-node numbering used?

b. UNIX file system.

in. Macintosh HFS.

109. Which component to install so that a Windows NT client computer user can log on directly to the NetWare server?

but. File and Print Services for NetWare.

b. Gateway Services for NetWare.

in. Client Services for NetWare. r. IPX / SPX.

110. How can a Linux client computer access Microsoft server files?

111. Which of the following operating systems uses the HPFS file system?

b. Windows 2000.

d. Windows NT 4.0.

112. What is the other name for the protocol used to separate network files and resources?

but. Network / transport layer protocol.

b. Link layer protocol.

in. Kernel protocol.

d. Protocol level 2.

113. Which of the following statements about the IPX / SPX protocol are true?

but. IPX / SPX can only be used on NetWare networks.

b. IPX / SPX is routable.

in. IPX / SPX is not supported on NetWare 5. x.

d. IPX / SPX is slower and more difficult to configure than TCP / IP.

114. How does multiple protocols communicate with one network adapter, or one protocol communicates with multiple network adapters? (Choose all that apply.)

Test -115. Which of the following is used to share files on Microsoft networks?

116. Which of the above statements about GSNW (Gateway Service for NetWare) are true?

but. The GSNW service is installed on a NetWare server to provide Windows clients with access to resources on that server.

b. The GSNW service is included with the Windows NT Server and Windows 2000 Server operating systems.

in. The GSNW service allows Windows server clients to connect to a NetWare server without installing additional software on the client or configuring the NetWare server.

d. The GSNW service is installed on a Windows server so that clients on that server can access NetWare server resources.

117. Which of the following is a freeware third-party software product that allows Windows and UNIX users to communicate over the network?

in. Client Services for UNIX

118. What is the name of the programs that translate data between different protocols and allow computers to communicate, located in networks of different types?

but. Bridge software.

b. Server software.

in. Gateway software.

d. Router software.

119. What is the name of the software component that intercepts requests for resources?

but. Platform.

b. Client.

in. Director.

Question. What is this site?
Answer. site is a site containing informatics lessons, informatics tests, informatics lectures, is intended for students and those who are interested in modern IT technologies and computer science. Anyone can get knowledge in informatics here.
Also, the site contains tests for monitoring the knowledge of college students, schoolchildren, or even employees of enterprises. Our mission is to provide affordable computer science teaching materials.

Question. I think I found an error in the test / article, how can I tell about it / I want to write to the administration
Answer. You can write to us using or leave a comment at the bottom of the test / article.

Question.I want to publish my test, how can I do it?
Answer. To do this, you can contact the administrator use. In the future, each user will be able to add an article to the site, but the functionality is still under development.

We use cookies to provide the best presentation of our website and to improve the service provided. If you continue to use the site, we will assume that you are satisfied with it.

Test on the topic "Computer networks"

Question 1. (Difficulty - A) The global network is ...
Answer 1.a system of interconnected computers
Answer 2.a system of interconnected local networks
Answer 3.a system of interconnected local telecommunication networks
* Answer 4.a system of interconnected local networks and computers of individual users

Question 2. (Difficulty - A) To connect two computers via telephone lines, you must have:
Answer 1.Modem
* Answer 2.two modems
Answer 3.phone, modem and special software
Answer 4. by modem on each computer and special software

Question 3. (Difficulty - A) E-mail is:
Answer 1.search program
Answer 2.name of the mail server
Answer 3.mail program
* Answer 4. Exchange of letters in computer networks (e-mail)

Question 4. (Complexity - A) The HTTP protocol serves to:
* Answer 1.Hypertext transfer
Answer 2.file transfer
Answer 3: messaging control
Answer 4.Run the program from a remote computer

Question 5. (Difficulty - A) What components of a computer network are needed to organize a peer-to-peer local area network?
* Answer 1. modem, server computer
Answer 2.Network card, network software
Answer 3. server computer, workstations,
Answer 4.Communication lines, network card, network software

Question 6. (Difficulty - A) To view the WEB-pages are intended:
Answer 1.search servers
* Answer 2.Browsers
Answer 3: teleconferencing
Answer 4.Providers

Question 7. (Difficulty - A) Which of the following schemes for connecting computers is a closed chain?
Answer 1. Bus
* Answer 2. Ring
Answer 3. Star

Question 8. (Difficulty - A) Which cable provides data transfer rates up to 10 Mbps?
* Answer 1.coaxial
Answer 2.twisted pair
Answer 3.Fiber optic
Answer 4. there is no correct answer

Question 9. (Difficulty - A) To transfer files over the network, the protocol is used ...
Answer 1. POP3
Response 2. HTTP
Answer 3. CMPT
* Answer 4. FTP

Question 10. (Difficulty - A) Choose the correct email address:
Answer 1. [email protected]
Answer 2.ivan_petrov.mail.ru
Answer 3.ivan petrov.mail.ru
* Answer 4. [email protected]

Question 11. (Difficulty - A) The data transfer rate is 6000Mb / min. This amounts to ... Mbps
Answer 1.10
* Answer 2.100
Answer 3.3600
Answer 4.36000

Question 12. (Difficulty - A) An Internet e-mail address is set: [email protected] What is the name of the mail server?
Answer 1. [email protected]
Answer 2. fortuna
* Answer 3.list.ru
Answer 4.list

Question 13. (Difficulty - A) A computer connected to the Internet must have
Answer 1. URL;
* Answer 2. IP address
Answer 3. WEB-page;
Answer 4. domain name;

Question 14. (Difficulty - A) Choose the correct IP address of the computer on the network
* Answer 1.08.214.198.112
Answer 2.18.274.198.0
Answer 3. 1278.214.198
Answer 4.10,0,0,1225
Question 15. (Complexity - A) The topology of a computer network in which all computers on the network are connected to a central node is called
Answer 1. Bus
Answer 2. Ring
* Answer 3. Star
Answer 4. There is no correct answer
Question 16. (Difficulty - B) Determine the computer number on the network by IP 215.128.255.106
Answer 1.215.128.255.106
Answer 2.128.255.106
Answer 3.255.106
* Answer 4.106
Question 19. (Difficulty - A) The protocol is ...
Answer 1.the ability of a computer to send files through information channels
Answer 2.device for working local network
* Answer 3.Standard for data transmission over a computer network
Answer 4.The standard for sending messages via email

Option number 1
1. What networks are used by a small group of employees
a) campus networks
b) corporate networks
c) department networks
2. What characteristic of the network shows the average time to process user requests
a) bandwidth
b) manageability
c) performance
3. What level of the OSI model is the lowest.
a) channel
b) physical
c) applied
4. What type of cable does single-mode cables belong to:
a) fiber optic
b) twisted pair
c) coaxial
5. What communication lines use wireless channels.
a) air
b) cable
c) radio channels
6. What signal coding belongs to analog modulation.
a) polar
b) Manchester code
c) phase
7. LAN is ...:
a) a set of computers for sharing information in
limited limits
b) a set of computers for sharing information on large
distances
c) a set of computers for transferring data from a common database
8. The network topology is ...:



9. What routers are intended for building a network of a central corporation:
a) trunk


10. What does not apply to mobile communications:
a) twisting
b) infrared communication
c) cellular telephony

11. Which networks serve to provide their services to a large number of subscribers,
located within a very large area of ​​a city, country, etc .:
a) global
b) local
c) corporate
12. Which device processes frames in parallel?
a) bridge
b) switch
c) hub
13. What switching uses information buffering:
a) channels
b) packages
c) messages
14. What does not apply to LAN tasks:
a) differentiation of information
b) file splitting
c) separation of peripheral devices
15. MODEM this device?
A) for storing information
B) to process information at a given time
C) for the transmission of information via telephone communication channels
16. A shared computer that includes all
resources called ...
A) file server.
B) workstation.
C) client server
17. List 3 basic network topologies:
Write down the answer:

Answer common bus, marker ring, star
18. What topologies is the Ethernet technology based on:
a) tire
b) star
c) ring
19. The global network is ...
a) a system of interconnected computers
b) a system of interconnected local networks
c) a system of interconnected local networks and individual computers
users
20. Which network component includes all the connection devices.
a) computers
b) network applications
c) communication equipment
21.
Which protocol ensures the transfer of messages from sender to recipient through

united systems of computer networks?
a) TCP
b) IP
c) IPX
22. What level guarantees the delivery of packets without errors.
a) network
b) channel
c) transport
23. The main function of which device is to repeat the frame on all ports:
a) hub
b) switch
c) network adapter
Option number 2
1. What is the topmost component of the network.
a) computers
b) operating system
c) network applications
2. Which layer of the OSI model is responsible for addressing the message and translating logical addresses into
physical.
a) channel
b) network
c) transport
3. What cable is most commonly used in a horizontal subsystem (within a floor)?
a) fiber optic
b) shielded twisted pair
c) unshielded twisted pair
4. What characteristic shows that the network performs all its functions.
a) performance
b) efficiency
c) reliability
5. Which communication lines do not use insulating shells
a) air
b) cable
c) radio channels
6. What coding of signals belongs to digital coding
a) polar
b) frequency
c) amplitude
7. Which device receives messages sent over the network and automatically monitors
errors:
a) hub
b) switch
c) network adapter

8. The access method is ...:
a) a logical diagram of the connection by communication channels of network computers
b) a set of rules governing the use of the data transmission channel
c) the scheme of data transmission over the network
9. How many layers does the OSI model have?
a) 5
b) 7
at 10 o'clock
10.What does not apply to wireless links:
a) communication in the wavelength range
b) radio communication
c) paging
11. What routers are designed to separate large local networks into
subsystems:
a) trunk
b) routers of remote offices
c) LAN routers
12. Provider is:


normal network operation
13. In which topology is a special format frame used?
a) common bus
b) marker ring
c) star
14. The concept of "point-to-point" transfer:
a) data transfer through the hub
b) data transfer from one network adapter to another
c) data transmission through a chain of computers
15. Standard Internet Protocol.
A) PPP.
B) SLIP.
C) TCP / IP.
16. A computer connected to the Internet must have:
Choose one of 3 answer options:
a) domain name
b) URL address
c) IP address
17. Communication channel providing high-speed transmission?
Write down the answer:
__________________________________________
Fiber optic
18. On what topology the TokenRing technology is based:
a) tire

b) star
c) ring
19. What components of a computer network are needed to organize a peer-to-peer
local network?
a) modem, computer server, workstations
b) network card, network software
c) file server, workstations, modem
20. What characteristic of the network hides the details of the network from the user.
a) extensibility
b) transparency
c) compatibility
21. What refers to the intermediate equipment of communication lines:
a) modem
b) hub
c) network adapter
22. What kind of switching allows you to divide data into parts:
a) channels
b) packages
c) messages
23. Which operating mode of the switch does not exist:
a) half-duplex
b) duplex
c) complex
Option number 3
1. In which network adapters part of the work is shifted to the driver:
a) client
b) server
c) mixed
2. Which layer of the OSI model is the highest.
a) physical
b) representative
c) applied
3. What network connects many networks of different departments of one enterprise.
a) department networks
b) local networks
c) corporate networks
4. What characteristics of the network can include a wide variety of software and
hardware.
a) manageability
b) compatibility
c) transparency
5. What does not apply to the characteristics of communication lines:
a) noise immunity

b) attenuation
c) noise immunity
6. What communication lines use multiple layers of insulating shells
a) air
b) cable
c) radio channels
7. What does not apply to LAN tasks:
a) access to information
b) file splitting
c) information protection
8. What topology is based on hubs
a) common bus
b) marker ring
c) star
9. What layer of the OSI model deals with the transmission of an unstructured stream over pipes
connections
a) physical
b) channel
c) network
10. What device is used in analog modulation:
a) network adapter
b) hub
c) modem
11. What bridge operation algorithm does not exist:
a) transparent bridge
b) source-routed bridge
c) source-buffered bridge
12. What the routing table contains:
a) information about router numbers
b) routes to all known networks connected to routers
c) graph of the transit time of the frame through the router
13. What function of the global network does not exist:
a) transport
b) multilevel
c) high-level
14. What level is presented in the form of various protocols with the help of which
the user is accessing resources
a) representative
b) applied
c) network
15.
The main reason for disabling a port on hubs is:
a) no response frame repetition on all ports
b) no response to a sequence of pulses sent to all ports.

c) if the port gives errors
16.
LAN configuration in which all PCs are connected to the same communication line.
A) Ring.
B) Tire.
D) Star.
Networks where all computers are equal
17.
Write down the answer:
__________________________________________
peer-to-peer
18. On what topology is FDDI technology based:
a) tire
b) star
c) ring
19. Which cable provides 100Mbps data transfer rate?
a) coaxial
b) twisted pair
c) fiber optic
1
2
20. In which topology all computers on the network can simultaneously transmit
information
a) common bus
b) marker ring
c) star
21. What characteristics of the network allows to increase the number of network nodes in
wide limits
a) extensibility
b) scalability
c) compatibility
22. What level allows you to insert breakpoints into long transmissions.
a) network
b) representative
c) session
23. What does not apply to mobile communications:
a) paging
b) radio communication
c) cellular telephony
Option number 4
1. Which device processes frames sequentially?
a) bridge
b) switch
c) hub
2.
... is a method of describing network environments that reflects the interactions between software and
hardware during the communication session.

a) topology
b) structuring
c) OSI model
3. What characteristic of the network serves for the ability to control the constituent elements
networks.
a) reliability
b) manageability
c) performance
4. Which layer of the OSI model deals with the form of transmission of information over the network, without changing when
this is its content, and also deals with data encryption.
a) applied
b) transport
c) representative
5. How are the network protocols implemented:
a) hardware
b) software modules
c) routing tables
6. What does not apply to the characteristics of communication lines:
a) reliability
b) bandwidth
c) bandwidth
7. What switching allows you to create a single transmission channel:
a) channels
b) packages
c) messages
8. What does not apply to LAN components:
a) network os
b) servers
c) switching equipment
9. In what topology do computers participate in packet transmission?
a) common bus
b) marker ring
c) star
10. The network operator is:
a) a company providing paid services to network subscribers
b) a company that maintains the normal operation of the network
c) a company that provides paid services to network subscribers and supports
normal network operation
11. What is the name of the characteristic that transmits data per unit of time
a) bandwidth
b) performance
c) reliability
12. Which networks are not subnetted
a) department networks
b) global networks

c) corporate networks
13. What does not apply to wireless communication lines:
a) infrared communication
b) radio communication
c) cellular telephony
14. The simplest method of protection against unauthorized access:
a) antiviruses
b) password protection
c) encryption
15. Which protocol performs packet fragmentation:
a) IP
b) TCP
c) IPX

16. Configuration of a local network based on a file server.
A) Ring.
B) Tire.
C) Star.
17. A computer presenting its resources to other PCs is called ...
Write down the answer:
__________________________________________
server
18. What kind of cable does not use TokenRing technology:
a) coaxial
b) twisted pair
c) fiber optic
19. Which of the following schemes for connecting computers is a closed chain?
20. In what way does the concentrator work:
a) Tire
b) Ring
c) Star
a) 4x hubs
b) bit
c) without a break
21. Which device transmits frames, while determining the optimal path for the frame:
a) hub
b) switch
c) router
22. A device that, on the side of the transmitter, provides digital conversion
computer signal into a modulated analog signal, and on the receiver side
performs reverse signal conversion.
A) Hub
B) Modem.
D) Switch.
called ...
23. Equipment located between networks using the same protocols,

A) Bridge.
B) AC adapter.
D) Gateway.
Option number 5
1. What network component forms the software platform
a) communication equipment.
b) network applications
c) operating systems
2. What characteristic of the network protects against unauthorized access.
a) reliability
b) safety
c) scalability
3. What function do network protocols not perform?
a) transmission of packets between end nodes of the network
b) protection against broadcast storms
c) the choice of the packet transmission route
4. What level carries out the transmission of each frame, while waiting for confirmation
transmission.
a) channel
b) network
c) transport
5. What bandwidth is recorded in 1 second of time
a) instant
b) average
c) maximum
6. What concerns the main equipment of communication lines:
a) modem
b) switch
c) hub
7. What kind of switching allows the transmission of e-mail information:
a) channels
b) packages
c) messages
8. In what way does the switch work:
a) 4x hubs
b) bit
c) without a break
9. Which topology is most likely to cause collisions?
a) common bus
b) marker ring
c) star
10. Which network component works at the link layer
a) hub
b) switch
c) network adapter

11.
Which protocol organizes the reliable and efficient operation of the composite network:
a) TCP
b) IP
c) IPX
Which component of the global network is installed in certain geographic locations,
12.
where divergence and merging of data streams is required:
a) multiplexer
b) switch
c) router
13. What characteristic of the network means mean mean time between failures
a) reliability
b) performance
c) compatibility
14. What topology is not used to build large LANs
a) common bus
b) marker ring
c) star
15.
What field is missing from the IP protocol?
16.
What is related to network equipment?
a) field "offset"
b) the "checksum" field
c) the "fragmentation" field
A) Hub.
C) Adapter.
C) All answers are correct.
17. Give the decryption of the LAN
Write down the answer:
__________________________________________
Local computing network
18. What kind of cable does FDDI technology use:
19. Select the correct IP address of the computer on the network
a) coaxial
b) twisted pair
c) fiber optic
a) 1. 108.214.198.112
b) 2.18.274.198.0
c) 1278.214.198
Networks where one of all computers is allocated, which manages all resources
20.
Write down the answer:
__________________________________________
client-server
21. What kind of cable does Ethernet technology use:
a) coaxial
b) twisted pair
c) fiber optic
d) all types of cables
22. Topology of a computer network in which all computers on the network are connected to
the central node is called

a) Tire
b) Ring
c) Star
23. What kind of networks is called peer-to-peer?
a) local network;
b) global network;
c) corporate network;

Preparing for testing

When testing, there should be no unforeseen circumstances that reduce the reliability of test results. Therefore, during the preparation phase, the conditions that ensure the uniformity of the testing procedure, as well as those in which the tests are performed, should be standardized as much as possible. It is important to think about how to put together test materials for distribution to students, prepare special spare materials: answer forms, pens or pencils, etc., so as not to distract students from working on the test.

Prior to testing, it is advisable to conduct a rehearsal session, familiarizing students with the assignment forms and the steps to fill out the answer forms, especially if students have never completed tests before.

Requirements for forms for answers to test items. The form should be designed in such a way as to make it as understandable as possible for the subjects and to minimize the time spent looking for a place for answers. In tasks with a choice of answer, the symbol must be offered, p. which marks the correct answer. It is also necessary to identify possible corrections that students have the right to make on the form if the answer changes.

If the registration form is not attached separately, a space should be left at the beginning of the answer sheet for student data.

Conditions under which testing should be carried out. The preliminary preparation for testing concerns not only the materials used, but also the environment. It is necessary to select a room for testing in advance. It should be quiet enough, with good lighting, ventilation and comfortable working areas. When testing large groups of students, the room should provide examiners with free access to the students' seating, provide for the possibility of single-seater boarding of the test subjects and exclude situations that are convenient for cheating when the same version of the test is found in front or on the side of a student sitting on the side.

If testing is carried out in specialized auditoriums (classes of mathematics, physics, etc.), then it is necessary to remove (close) stands, posters and other materials with reference information on the relevant disciplines. Lists of students in the testing room and warning signs prohibiting entry into the premises under any circumstance other than an emergency are usually posted on the door. Assistants must be placed at the doors of the premises to stop access to the room for late students after the start of the tests.

Testing Instructions and Procedure

In the instructions before testing, which can be carried out 2-3 days or on the eve of the test, the teacher must:

1) explain to students why the test is needed, inform how its results will be used;

2) explain why the subjects should make maximum efforts to complete the test, focus the subjects' attention on the possibility of testing their strengths and emphasize the competitive motive;

4) give the subjects the opportunity to practice, to independently solve one or more sample problems. Check if the instruction is understood correctly by analyzing the results of the example assignments right at the consultation;

5) inform about the temporary resource of the test, about the rules for correcting mistakes made, tell about who to contact in case of questions, explain which questions should not wait for answers.

Instructions for students

The test consists of 10 questions. It takes 15 minutes to complete it. Read all assignments carefully before proceeding. Enter your FI data, group number in the answer form. It is recommended to complete the tasks in order. If the task cannot be completed immediately, go to the next one. If time remains, return to missed assignments. Mark the correct answers on the answer sheet.

Test

1. Consolidation of computers for information exchange and sharing. resources called

  1. a) computer network

    b) graphic editor

    c) transmission medium

2. The global computer network is:

  1. a) information system by hyperlinks;

    b) many computers connected by data transmission channels and located within one room;

    c) a set of local networks and computers located at long distances and connected into a single system

3. Set the correspondence:

Computer networks are classified by:

4. A modem that transmits information at a rate of 28800 bit / s, for 1 s. can transmit two pages of text (3600 bytes) within ...

a) 1 second

b) 1 minute

5. The server is:

a) a personal computer connected to the network through which the user gains access to its resources;

b) a computer (program) connected to the network, managing a separate resource;

c) user's personal computer

6. Computer network protocol is:

a) a program that allows you to convert information into binary code;

b) a set of rules that determine the procedure for exchanging information in the network;

c) integration of computer networks

7. For each computer connected to the Internet, two addresses are set:

  1. a) digital and custom;

    b) digital and domain;

    c) symbolic and domain

8. Select all answer options:

You can attach to an email:

  1. a) text files

    b) graphic files

    c) sound files

    d) video files

    e) transmission media

9. The WEB-page has the extension:

10. Choose the correct answer:

To access the Internet, use

b) terminator

c) connector

Standards for answers

Test description

The test is intended for first-year students of open source software, for a quick test of knowledge in the "Computer networks" section. On a blank sheet, the test taker puts down the correct answers and his data.

Assessment indicators

Maximum points

confidently uses terminology and symbols;

owns the fundamental concepts;

uses basic intelligent operations to solve assigned tasks

Satisfactorily

owns the fundamental concepts;

is not confident in using terminology and symbols when explaining processes;

Unsatisfactory

does not know the basic concepts;

is not confident in using terminology and symbols when explaining processes;