Test tasks for schoolchildren: computer networks. Testing on the topic "computer networks"

1 Test. What long-distance communication technology was first implemented in France in the early 19th century?

A. Telephone network.

b. Optical telegraph network.

2. What network technology is used in the telephone network?

A. Packet switching.

b. Layer 2 switching.

V. Layer 3 switching.

d. Channel switching.

3. Which technology works best in the explosive nature of data transfer??

A. Packet switching.

b. Analog transmission.

V. Channel switching.

d. Technology with patch panels.

4. Which of the following disadvantages are inherent in networks based on general purpose computers? (Select all that apply.)

A. Mainframe hardware is much more expensive than personal computer hardware.

b. Servers based on personal computers can process a significantly larger volume of data than universal machines.

V. The failure of the universal machine causes the collapse of the entire system.

d. General purpose machine terminals provide a lower level of security than networked personal computers.

5. Which of the following lists can be shared between computers on a network? (Select all that apply.)

A. Data.

b. Applications.

V. Printers.

g. Modems.

6. Which of these devices are input devices? (Check all that apply.)

A. Plotter.

V. Digital camera.

g. Printer.

7. Which of these names refers to a method developed in the 1980s for converting host names to IP addresses?

8.Test. What are the technologies that combine telecommunications and computing called?

A. Mainframes.

b. Telephony.

9. Which computer sends requests to another computer to gain access to its data and resources?

A. Server.

b. Work station.

V. Client computer.

Terminal.

10. Which computer sends requests to another computer to gain access to its data and resource um?

A. Server.

b. Work station.

V. Client computer.

Terminal.

11. What is the name of the set of rules that computers adhere to during the connection process?

A. Protocol.

b. Environment type.

d. Topology.

12. Which of the following is a network type classified by physical scope?

b. WAN (wide area network).

Ring town.

13. Which of the following statements are true for a typical local network?

A. A local network is a large network consisting of many small networks.

b. The local network covers a wide geographic area with nodes in different cities, states, and countries.

V. A local network covers a limited area, its computers are located close to each other.

d. To simplify management tasks, the local network can be divided into working groups.

14. What is a group of networks connected to each other called?

d. Working group.

15. Which of the following statements are true for client/server networks?

A. Client/server networks are cheaper to install.

b. In client/server networks, data is stored centrally, making backups easy.

V. To maintain client/server networks, a network administrator is needed.

d. Client/server networks provide greater security.

16. What is the name of the server that performs client/server registration authentication on the Microsoft network?

b. Security Accounts Manager.

V. Domain controller.

d. Cluster server.

17. Which of these statements about peer-to-peer security are true?

A. Security controls are centralized and controlled by the network administrator.

b. Security is higher than in a client/server environment, and it is more difficult to violate the integrity and confidentiality of data.

V. Each workgroup computer stores its own database with security settings.

d. Security is ensured not at the user level, but at the level of shared resources.

18. Which of these statements about Windows 2000 domains are true?

A. The basis of Windows 2000 domains is a directory service called Active Directory.

b. The core of Windows 2000 domains is a directory service called Bindery.

V. Windows 2000 domains are called sublevel domains.

d. A Windows 2000 domain can contain many domain controllers, all of which can read and write to a database containing directory information.

19. Which of these statements about TCP/IP networks are true?

A. TCP/IP networks are medium to large sized networks containing many subnets.

b. The Internet is a TCP/IP network.

V. The number of tools and utilities developed for TCP/IP networks is small.

d. TCP/IP networks are easier to administer than NetBEUI.

20. What is the name of a network topology in which the network has a beginning and an end, and terminators are used to prevent signal reflection?

A. Star-shaped.

b. Mixed cellular.

V. Tire.

21. Which network architectures use unshielded twisted pair cables?

22. What is the name of a number system that uses 16 digits to represent numerical values?

A. Decimal.

b. Hexadecimal.

V. Binary.

g. Machine code.

23. What is the name of a number in the binary number system?

Gigabyte.

24. What number in decimal is equal to binary number

25. What are the names of the small pieces of data into which a computer breaks data before transmitting it to the network?

A. Hexadecimal numbers.

b. Packages.

V. Headings.

26. What is the name of the component that is placed in the data packet trailer for the purpose of error detection?

A. Check bit.

27. “A schematic description of a system, theory, or phenomenon, including its known or studied properties and used for the purpose of further study of its characteristics.” What is being defined here?

A. Protocol.

b. Model.

V. Process.

d. Level.

28. Which layer of the OSI model is divided into two sublayers?

A. Physical.

b. Duct.

V. Network.

Transportny.

29. Which layer of the OSI model does not add header information to a data packet as it moves down the stack?

A. Physical.

b. Duct.

V. Sessional.

Applied.

30. Which protocol belongs to the session layer?

31. What is another name for a multi-station repeater?

b. Router.

V. Switch.

Concentrator.

32. What is the name of the process of turning the zeros and ones representing computer data into electrical or light impulses?

A. Encryption.

b. Coding.

V. Security.

d. Cyclicity.

33. Which of these statements are true for digital signals?

A. A digital signal is a constantly changing electromagnetic wave.

b. The parameters of a digital signal are amplitude, frequency and phase.

V. The unit of measurement for digital signals is the hertz.

d. A digital signal is a signal with discrete states.

34. Which of the following statements about the advantages of analog signals over digital signals are true? (Select all that apply.)

A. Analogue signals are less susceptible to interference.

b. Analogue devices are cheaper than digital ones.

V. Analogue signals are easier to multiplex.

d. Analog signals are less susceptible to attenuation.

35. What is the name of the technology in which all the capabilities of the medium are used to transmit data over one channel?

A. Transmission of unmodulated signals.

b. Modulation of signals.

V. Multiplexing.

d. Multi-connections.

36. Which of these statements are true for unmodulated signals? (Select all that apply.)

A. Unmodulated signals can be transmitted in both directions.

b. Unmodulated signals are used in cable television.

V. Unmodulated signals are unidirectional.

d. Digital signals are most often unmodulated.

37. What type of multiplexing is used in fiber optic networks, in which each signal is transmitted at a different wavelength of the light beam?

A. Frequency division of channels.

b. Time division of channels.

V. High density wavelength.

d. By wavelength frequency.

38. Which of these statements about asynchronous data transfer are true?

A. In asynchronous transmission, the internal clocks of the sending and receiving devices are coordinated by built-in mechanisms.

b. Asynchronous transmission uses synchronization with guaranteed state changes.

V. Asynchronous transmission uses gating.

d. In asynchronous transmission, a start bit is used to synchronize the sending and receiving devices.

39. Which systems use the half-duplex method?

A. A television.

b. Broadcasting.

V. Telephone communications.

Test 40. Which signal carrier is most sensitive to electromagnetic interference?

A. Unshielded twisted pair.

b. Coaxial cable.

V. Fiber optic cable.

d. Shielded twisted pair.

41. What access method is used in Ethernet?

A. CSMA/CA.

V. Passing the token.

d. Request priorities.

42. What architecture is defined by the IEEE 802.3 specification?

43. What network access method is used in Ethernet?

V. Passing the token.

d. Request priorities.

44. What is the maximum number of nodes per cable segment in 10Base2 Ethernet?

45. What type of cable is used with the BNC connector?

A. Unshielded pair.

b. Thick coaxial cable.

V. Thin coaxial cable.

g. Fiber optic cable.

46. ​​What architecture is called standard Ethernet?

47. What is the maximum cable length specified for 10Base5 networks?

A. 100 meters.

b. 500 meters.

V. 100 feet.

g. 500 feet.

48. Which of the following statements is true for the Token Ring architecture? (Select all that apply.)

A. The Token Ring topology is passive.

b. The throughput of the Token Ring network is 4 or 16 Mbit/s.

V. Token Ring hubs are called multiple access devices.

d. Token Ring networks use modulated signals.

49. What is the name of the circular signal sent by the control computer in the Token Ring network to detect a failed node and reconfigure the network in order to restore communication?

A. Marker.

b. Data frame.

50. What is the name of the link layer protocol originally developed for AppleTalk networks?

51. What is the throughput of standard ARCnet?

A. 2.5 Mbit/s.

b. 25 Mbit/s.

V. 16 Mbit/s.

10 Mbit/s.

52. Which of the following parameters should be configured for the internal modem?

A. I/O address.

b. IP address.

Communication port.

53. What is CSU/DSU or PAD?

A. ISDN terminal adapter.

b. User equipment.

V. Terminal ID.

d. Hub-router.

54. What networks use PSTN, ISDN, DSL, DDS and T-carrier lines?

A. In circuit switched networks.

b. In packet switching networks.

V. There are 59 Switched networks.

d. In local networks.

55. Which of the following statements about ISDN are true? (Select all that apply.)

A. This is an analog connection.

b. ISDN is more expensive than PSTN.

V. ISDN requires special equipment at the telephone line

station and the user.

d. An ISDN line contains only one channel.

56. Which WAN topology provides the easiest scalability?

A. Spot.

b. Ring.

V. Star.

d. All of the above are equally extensible.

57. What was the name of the very first packet switching technology based on the ARPAnet 1822 protocol?

A. Frame Relay.

58. Which of the following characteristics of Frame Relay differs from the characteristics of X.25? (Select all that apply.)

A. Frame Relay provides high performance.

b. Frame Relay uses packet switching.

V. Frame Relay uses digital signals.

d. Frame Relay does not have continuous error checking.

59. Which of the following is true for ATM? (Select all that apply.)

A. Variable length packets are used.

b. It uses 53-byte chunks of data called cells.

d. Predefined channels are used.

d. This is the cheapest global network technology.

Question. What is this site?
Answer. site is a site containing computer science lessons, computer science tests, computer science lectures, intended for students and those interested in modern IT technologies and computer science. Here anyone can gain knowledge in computer science.
Also on the site are tests for monitoring the knowledge of college students, schoolchildren, or even enterprise employees. Our mission is to provide accessible computer science educational materials.

Question. It seems I found an error in the test/article, how can I tell about it/I want to write to the administration
Answer. You can write to us using or leave a comment at the bottom of the test/article.

Question.I want to publish my test, how can I do this?
Answer. To do this, you can contact the administrator using . In the future, each user will be able to add an article to the site, but the functionality is still under development.

We use cookies to provide the best possible presentation of our website and improve the service we provide. If you continue to use the site we will assume that you are happy with it.

Test on the topic "Computer networks"

Question 1. (Difficulty - A) The global network is...
Answer 1. a system of interconnected computers
Answer 2. system of interconnected local networks
Answer 3. a system of interconnected local telecommunications networks
*Answer 4. a system of interconnected local networks and computers of individual users

Question 2. (Difficulty - A) To connect two computers via telephone lines you must have:
Answer 1. modem
* Answer 2. two modems
Answer 3. telephone, modem and special software
Answer 4. via modem on each computer and special software

Question 3. (Difficulty - A) E-mail is:
Answer 1. search program
Answer 2. mail server name
Answer 3. mail program
*Answer 4. exchange of letters on computer networks (e-mail)

Question 4. (Difficulty - A) The HTTP protocol is used to:
*Answer 1. Hypertext transmission
Answer 2: File Transfer
Answer 3: Messaging Control
Answer 4. Run the program from a remote computer

Question 5. (Difficulty - A) What components of a computer network are needed to organize a peer-to-peer local network?
*Answer 1. modem, server computer
Answer 2: network card, network software
Answer 3. server computer, workstations,
Answer 4. communication lines, network card, network software

Question 6. (Difficulty - A) The following are intended for viewing WEB pages:
Answer 1. search engines
*Answer 2. browsers
Answer 3. teleconferences
Answer 4. providers

Question 7. (Difficulty - A) Which of the following computer connection diagrams is a closed chain?
Answer 1. Tire
*Answer 2. Ring
Answer 3. Star

Question 8. (Difficulty - A) Which cable provides data transfer speeds of up to 10 Mbit/s?
*Answer 1. coaxial
Answer 2. twisted pair
Answer 3: fiber optic
Answer 4. There is no correct answer.

Question 9. (Difficulty - A) The protocol is used to transfer files over the network...
Answer 1. POP3
Answer 2. HTTP
Answer 3. CMPT
*Answer 4. FTP

Question 10. (Difficulty - A) Select the correct email address:
Answer 1. ivanpetrov@mail
Answer 2. ivan_petrov.mail.ru
Answer 3. ivan petrov.mail.ru
*Answer 4. [email protected]

Question 11. (Difficulty - A) The data transfer speed is 6000 Mbit/min. This amounts to... Mbit/s
Answer 1. 10
*Answer 2. 100
Answer 3. 3600
Answer 4. 36000

Question 12. (Difficulty - A) The email address on the Internet is given: [email protected]. What is the mail server name?
Answer 1. [email protected]
Answer 2. fortune
*Answer 3. list.ru
Answer 4. list

Question 13. (Difficulty - A) A computer connected to the Internet must have
Answer 1. URL;
*Answer 2. IP address
Answer 3. WEB page;
Answer 4. domain name;

Question 14. (Difficulty - A) Select the correct IP address of the computer on the network
*Answer 1. 108.214.198.112
Answer 2. 18.274.198.0
Answer 3. 1278.214.198
Answer 4. 10,0,0,1225
Question 15. (Difficulty - A) The topology of a computer network in which all computers on the network are connected to a central node is called
Answer 1. Tire
Answer 2. Ring
*Answer 3. Star
Answer 4. There is no correct answer
Question 16. (Difficulty - B) Determine the computer number on the network by IP 215.128.255.106
Answer 1. 215.128.255.106
Answer 2. 128.255.106
Answer 3. 255.106
*Answer 4. 106
Question 19. (Difficulty - A) A protocol is...
Answer 1. the ability of a computer to send files through communication channels
Answer 2. device for running a local network
*Answer 3. standard for data transmission over a computer network
Answer 4: standard for sending messages via email

Preparing for testing

During testing, unforeseen circumstances should not arise that reduce the reliability of test results. Therefore, at the preparation stage, it is necessary to standardize as much as possible those conditions that ensure uniformity of the testing procedure, as well as those in which the tests are performed. It is important to think about how to arrange test materials for distribution to students, to prepare special spare materials: answer forms, pens or pencils, etc., so as not to distract students from working on the test.

Before testing begins, it is advisable to conduct a rehearsal session, familiarizing students with the forms of tasks and steps to fill out answer forms, especially if students have never taken tests before.

Requirements for answer forms for test tasks. The form should be designed in such a way as to make it as understandable as possible for test takers and minimize the time spent searching for answers. In multiple-choice tasks, the symbol s must be offered. which marks the correct answer. It is also necessary to determine possible corrections that students have the right to make on the form if the answer changes.

If the registration form is not included separately, space should be left at the beginning of the answer sheet for student information.

Conditions under which testing should be carried out. Preliminary preparation for testing concerns not only the materials used, but also the environment. It is necessary to select a testing room in advance. It should be fairly quiet, have good lighting, ventilation and comfortable work areas. When testing large groups of students, the room should provide examiners with free access to students’ seats, provide for the possibility of single-seat seating for test takers, and eliminate situations convenient for cheating when a student sitting in front or to the side has the same version of the test.

If testing is carried out in specialized classrooms (mathematics, physics classes, etc.), then it is necessary to remove (close) stands, posters and other materials with reference information on the relevant disciplines. Lists of students in the testing area and warning signs prohibiting entry into the area under any circumstances except in emergencies are usually posted on the door. Assistants must be placed at the doors of the premises to prevent late students from entering the premises after the start of the tests.

Testing instructions and procedure

In instructing before testing, which can be carried out 2-3 days before or on the eve of the test, the teacher must:

1) explain to students why the test is needed, inform how its results will be used;

2) explain why subjects must make maximum efforts to complete the test, focus the subjects’ attention on the opportunity to test their strength and emphasize the competitive motive;

4) give the subjects the opportunity to practice and solve one or more sample problems on their own. Check whether the instructions are understood correctly by analyzing the results of completing sample tasks directly during the consultation;

5) inform about the temporary resource for completing the test, about the rules for correcting mistakes, tell about who to contact if you have questions, explain what questions you should not wait for answers to.

Instructions for students

The test consists of 10 questions. It takes 15 minutes to complete. Read all assignments carefully before starting work. Enter your personal name and group number in the answer form. It is recommended to complete the tasks in order. If the task cannot be completed immediately, move on to the next one. If you have time, go back to the tasks you missed. Mark the correct answers on your answer sheet.

Test

1. Connecting computers for information exchange and sharing. resources is called

  1. a) computer network

    b) graphic editor

    c) transmission medium

2. Global computer network is:

  1. a) hyperlink information system;

    b) many computers connected by data transmission channels and located within the same room;

    c) a set of local networks and computers located over long distances and connected into a single system

3. Match:

Computer networks are classified by:

4. A modem that transmits information at a speed of 28800 bps in 1 s. can transmit two pages of text (3600 bytes) within...

a) 1 second

b) 1 minute

5. Server is:

a) a personal computer connected to the network through which the user gains access to its resources;

b) a computer (program) connected to the network that controls a separate resource;

c) user’s personal computer

6. Computer network protocol is:

a) a program that allows you to convert information into binary code;

b) a set of rules that determine the order of information exchange on the network;

c) unification of computer networks

7. For each computer connected to the Internet, two addresses are set:

  1. a) digital and custom;

    b) digital and domain;

    c) character and domain

8. Select all answer options:

You can attach to an email:

  1. a) text files

    b) graphic files

    c) sound files

    d) video files

    e) transmission media

9. WEB page has the extension:

10. Choose the correct answer:

To access the Internet it is used

b) terminator

c) connector

Sample answers

Test Description

The test is intended for first-year students of secondary vocational education to quickly test their knowledge in the “Computer Networks” section. On a blank sheet, the test taker writes down the correct answers and his/her data.

Evaluation indicators

Maximum points

confidently uses terminology and symbolism;

masters fundamental concepts;

uses basic intellectual operations to solve assigned problems

Satisfactorily

masters fundamental concepts;

does not confidently use terminology and symbolism when explaining processes;

Unsatisfactory

does not know basic concepts;

does not confidently use terminology and symbolism when explaining processes;

Option 1.

1) The routing protocol (IP) provides:

1. control of data transmission equipment and communication channels

2. preservation of mechanical, functional parameters of physical communication in a computer network

3. interpretation of data and preparation of it for the user level

4. delivery of information from the sending computer to the recipient computer

2) Transport protocol (TCP) provides:

1. reception, transmission and delivery of one communication session

2. splitting files into IP packets during transmission and assembling files during reception

4. delivery of information from the sending computer to the recipient computer

3) The capacity of the information transmission channel is measured in:

4. KB/s

4) The configuration (topology) of a local network in which all workstations are connected to a server (file server) is called

2. ring

4. tree-like

5) A set of computers connected by information exchange channels and located within one (or several) premises or building is called:

1. global computer network

2. local computer network

3. information system with hyperlinks

4. by email

6) Local computer networks are used as a means of communication

2. only for data exchange between several users

3. to communicate with people directly

7) Network protocol is:

1. sequential recording of events occurring on a computer network

2. a set of agreements on interactions in a computer network

3. rules for interpreting data transmitted over the network

8) Global computer network is:

1. information system with hyperlinks

3. a set of local networks and computers located over long distances and connected via communication channels into a single system

9) Global computer networks appeared as a means of communication

1. when the social need for communication between people living in different parts of the planet has matured and the corresponding technical capabilities have appeared (computer communication systems and networks)

2. when computers appeared

4. when the social need for communication between people living in different parts of the planet has matured

10) To store files intended for public access by network users, the following is used:

1. host computer

2. client-server

3. file server

4. switch

11) The Internet email address has been set: [email protected]. What is the name of the owner of this email address?

12) Postal address includes:

1. username and password

2. server name and password

3. username, server name, password

4. username and server name

Topic: Computer communications. Types of networks

Option 2.

1) Global computer networks appeared as a means of communication

1. when did computers appear?

2. when the social need for communication between people living in different parts of the planet has matured

3. when did the scientific and technological revolution take place?

4. when the social need for communication between people living in different parts of the planet has matured, and the corresponding technical capabilities have appeared (computer communication systems and networks)

2) A set of computers connected by information exchange channels and located within one (or several) premises or building is called:

1. information system with hyperlinks

2. global computer network

3. by email

4. local computer network

3) The configuration (topology) of a local computer network, in which all workstations are connected in series to each other, is called:

1. network

2. ring

4. tree-like

4) The capacity of the information transmission channel is measured in:

3. KB/s

5) Local computer networks are used as a means of communication:

1. to organize access to common input devices for all users - printers, plotters and general information resources of local importance

2. only for organizing access to information resources common to all users

3. only for data exchange between several users

4. to exchange data between several users, to organize access to output devices (printers) common to all users, as well as to common information resources of local importance

6) The configuration (topology) of a local network in which all workstations are connected to a server (file server) is called

2. ring

4. tree-like

7) Global computer network is:

1. a set of local networks and computers located over long distances and connected via communication channels into a single system

2. many computers connected by information transmission channels and located within the same room or building

3. a set of host computers and file servers

4. a system for exchanging information on a specific topic

8) Transport protocol (TCP) provides:

1. delivery of information from the sending computer to the recipient computer

2. reception, transmission and delivery of one communication session

3. user access to processed information

4. splitting files into IP packets during transmission and assembling files during receiving

9) To store files intended for public access by network users, the following is used:

1. file server

2. host computer

3. switch

4. client-server

10) Network protocol is:

1. rules for interpreting data transmitted over the network

2. sequential recording of events occurring on a computer network

3. a set of agreements on interactions in a computer network

4. rules for establishing communication between two network computers

11) WWW.yandex.ru is

1. browser

2. search engine

3. home page

12) Searching for information on the Internet using keywords involves

1. entering a word (phrase) into the search bar

2. entering a word (phrase) in the address bar

Answers

Option #1