Telecommunication technologies and networks test questions. Lecture. Unified State Examination tasks. Test. Telecommunication technologies. Criteria for assessing knowledge control tests
Computer network refers to several computers and network devices connected to each other by some kind of data transmission medium (media) for the exchange of information between computers. Data transmission media refers to any physical medium in use that is capable of carrying signals. Maybe cable (several varieties of copper cables or varieties of fiber optic cables) or wireless.
Distinguish:
Local computer networks or LAN (LAN, Local Area Network) - networks that are geographically small in size (a room, a floor of a building, a building or several nearby buildings). As environment transfers data are usually used cable. However, in Lately Wireless networks are gaining popularity. The close location of computers is dictated physical laws transmission of signals via the cables used in the LAN or the power of the wireless signal transmitter. LANs can connect from several units to several hundred computers.
The simplest LAN, for example, can consist of two PCs connected by a cable or wireless adapters.
Internets or network complexes are two or more LANs united by special devices to support large LANs. They are, in essence, networks of networks.
Global networks - (WAN, Wide Area Network) LANs connected by means of remote data transfer.
Corporate networks - global networks operated by one organization.
From point of view logical organization there are networks peer-to-peer And hierarchical.
IN peer-to-peer In networks, all computers have equal rights in terms of distribution and use of network resources. An example of a peer-to-peer network would be working group in the operating systemMicrosoft Windows. In such networks each user is responsible for the state and availability of data for other network users and there are no dedicated server computers.
Server called a network computer that provides its resources(data or peripherals) other computers on the network. From this point of view, all computers in a peer-to-peer network can be both servers and clients, that is, computers that use the server's resources.
In addition to the hardware concept of a server, there is also a software concept. A part is called a server software, which implements requests from the client part with which the user works. The software client implements the ability to organize a request to the server and display its results.
In hierarchical networks, there are special server computers whose resources can be accessed by all network users and whose operation is monitored by the network administrator.
For a computer to operate on a network, it must have a network operating system (NOS, Network Operating System) installed. Moreover, the operating systems for the server and for the workstation differ.
Protocols
The interaction of computers on a network is regulated by protocols, that is sets of formal rules and encodings, which determine how devices on a network exchange data. These protocols describe any moment of interaction - from the characteristics of signals transmitted through the data transmission medium to query languages that allow applications running on different computers to exchange messages. Computers on a network use a set of protocols called a stack, which covers everything from the application's user interface to the physical interface of the network.
TCP/IP protocol stack (Transmission Control Protocol/Internet Protocol) was developed specifically for the creation of the global Internet. The main requirement for this stack was its ability to communicate with different LANs running different protocol stacks.
It was this versatility and ease of settings that became one of the main reasons why TCP/IP began to be used in LANs. Among the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocolIP organizes work with logical addressing in the network , and the protocol TCP refers to a group of protocols that prepare data for transmission. In some cases instead of TCP used different stack protocol - UDP
(User Datagram Protocol).
These two protocols are responsible for dividing the entire amount of data into small segments to prevent exclusive takeover of the network by two workstations, the type of transmission (reliable or unreliable) and, in the case of reliable transmission, restoring the full amount of data from the segments. different stack protocol - Protocol is protocol transfers data and his task is only Preparation segments data For sending to the network. That's why, works, usually, With multimedia traffic (voice, video).
These two protocols are responsible for dividing the entire amount of data into small segments to prevent exclusive takeover of the network by two workstations, the type of transmission (reliable or unreliable) and, in the case of reliable transmission, restoring the full amount of data from the segments. instead of provides reliable delivery data, requires confirmation receiving data host side, allows transmitting And host parties pick up optimal speed transfers data, changing depending on the network situation (flow control) and a number of other useful functions. Used for transmissionfiles (FTP ), letters electronic mail , Vwork With WWW .
These two protocols are responsible for dividing the entire amount of data into small segments to prevent exclusive takeover of the network by two workstations, the type of transmission (reliable or unreliable) and, in the case of reliable transmission, restoring the full amount of data from the segments. Among the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol . To identify computers in TCP/IP it is used Among the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol-addressing. Among the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol-address definitely defines net and network node, where the data packet should be delivered. This information is contained in every packet that is transmitted over the network. Among the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol-address is 32 bits long And depicted as four decimal numbers separated by a dot. Each number wears Name octet or quadrant And Maybe change ranging from 0 to 255. Among the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol-address Always highlights Part bits For identification networks And Part For identification computer . This the quantity is not always the same And depends from quantities nodes networks. For instructions appointments everyone bat IP addresses each TCP/IP -system It has also mask subnets , given Also 32 bits . Positionally the bits correspondAmong the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol-address, But organized like this, What the value of the first bits is always 1, and the trailing bits are always 0. Moreover alternating 0 and 1 is prohibited. By superimposing the IP address and the subnet mask in binary form, a boundary is drawn between the network address and the address of the host on the network in the IP address. Technically overlayAmong the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol-addresses per mask are carried out by logical multiplication of binary typesAmong the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol-addresses on the mask. The bits of the IP address, which correspond to mask bits with a value of 1, determine the network address, the rest - the host address (host bits). It's obvious that within the same network, the subnet mask must match on all nodes and then result works any addresses on mask V within one networks is the same And called more Among the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol-network.
Internet
Internet is a global telecommunications network that unites many local, regional and corporate networks.
From an implementation point of view, global networks differ from local channels communications, allowing data to be transmitted over much longer distances and, as a consequence of changes in communication channels, protocols that take into account the operating features of these channels. An association sets networks became Maybe with the advent stack protocols TCP/IP and IP addressing. On joints networks can stand software or hardware routers, implementing the principle of routing data packets based on the destination IP address. Router accepts from a network directly connected to it plastic bag And automatically forwards it to another directly connected network segment. Thus, after sending plastic bag Maybe get in or V net appointments, or on neighboring router, which Also will forward his further.
Plastic bag data in IP protocol Not takes into account channels communications, i.e. is channel -independent . Thanks to this concept, laid down basis for protocol developmentAmong the protocols that make up the TCP/IP stack, the two most familiar to the uninitiated are TCP and IP. Of these, the protocol, appeared opportunity transmit plastic bag By different physical channels communications.
But most of all in everyday life Internet associated Not With the physical network itself, and with set services, which it implements. The most famous of them is WWW(world wide web) with which many consider it their duty confuse the Internet itself.
Services ( Services ) Internet
WWW (World Wide Web)
WWW - World Wide Web - hypertext information system for searching Internet resources and accessing them.
Hypertext - an information structure that allows you to establish semantic connections between elements of text on a computer screen in such a way that you can easily transition from one element to another. All system contentsWWWcomprisesweb-pages, combined into sites. Are being created They using hypertext markup language HTML(HyperText Markup Language). For work Browser programs are used with WWW(for example, Internet Explorer).
Find page in Internet or do on her link Can by using universal pointer resources (addresses pages ). Universal Resource Locator ( URL - Universal Resource Locator) includes into yourself way access to the document, Name servers, on which the document is located, and also the path to the file(document).
To access a document required indicate used protocol transfers data and put chain characters ":// ". Next is indicated server and the path to the document. For example, to access web pages it is used protocol hypertext transmission - HTTP(HyperText Transfer Protocol), part of the TCP/IP protocol stack:
The concept of URL is closely related to the domain name system.
Domain system names
Domain name system (DNS - Domain Name System) serves to organize a unique correspondence between the IP address and domain name. All Job V networks Internet coming on basis IP addresses, What is for a large number of users serious inconvenience. To an ordinary person easier communicate with letter strings, how with an abstract set of IP address numbers. This opportunity provided service DNS. At treatment user to resource By his domain name request follows to DNS server, which in response returns Resource IP address and all exchange the data goes By IP address. The DNS server's response time to a request is very short and this has virtually no effect on the speed of access to the resource.
Herself system is yourself distributed base data, stored on many DNS servers, and which periodically updated. That's why, at emergence new resource with a new domain name, He for some time Maybe be not available By domain name, But straightaway available By IP address.
Domain names are registered V Center network information Internet (InterNIC).
The rightmost group of letters represents the top-level domain. Top level domains there are two types: geographical(two-letter) and administrative(three-letter).
Administrative |
Geographical |
||
commercial organization |
Germany |
||
Educational organization |
|||
International organization |
Former USSR |
||
Network organization |
Great Britain |
||
Non-profit organization |
Second-level domain names of geographical type are registered by national centers.
Electronic mail ( e - mail )
Email (electronic mail, E-mail) is one of the first and most widespread Internet services, providing message transfer between network users (subscribers). It can also be used as a kind of database of documents, records of appointments, news, etc.
To use this service user must have an email address and know the recipient's email address.
E-mail address (email address) - subscriber's address, which Maybe be received from:
- provider at conclusion with him agreement, stipulating Creation "postal box";
- administrator networks organizations, in which the user works or generated independently on any of the mail servers, offering this service for free.
Mailbox - allocated to the user Part disk space on a mail server to store email messages. For access the user must access his mailbox indicate his Name and password.
Mail server - computer online, sending, receiving and storing email messages.
Electronic address consists of two parts separated by the @ symbol (commercial at):
username@ hostname. domain, Where username - This network pseudonym user (login ). It can be one or more strings of characters, each of which must consist of English letters, Arabic numerals. Chains are separated by the characters dot, dash, and underscore. There is a separator after the username @ .
hostname - Name hosta (postal servers ).
domain - domain address .
Telecommunication technologies
161. /2.7.1/ The ftp.net file located on the txt.org server is accessed via the http protocol. In the table, fragments of the file address are encoded with letters from A to J. Write down the sequence of these letters that encodes the address of the specified file on the Internet.
162. /2.7.1/ The http.txt file located on the www.net server is accessed via the ftp protocol. In the table, fragments of the file address are encoded with letters from A to J. Write down the sequence of these letters encoding the address of the specified file.
163. /2.7.1/ The uk.net file located on the org.de server is accessed via the ftp protocol. In the table, fragments of the file address are encoded with letters from A to J. Write down the sequence of these letters that encodes the address of the specified file on the Internet.
164. /2.7.1/
165. /2.7.3/
sale | printers |
|
service | sale | printers | scanners |
|
(sale | printers) & (service | scanners) |
166. /2.7.3/
To indicate logical operation"OR" in the query uses the symbol |, and for the logical operation "AND" - &.
(printers & scanners) | sale |
|
printers & scanners & sales & service |
|
printers & sales |
|
service | printers | scanners |
167. /2.7.3/ The table shows queries to the search server. Arrange the query symbols in ascending order of the number of pages that the search engine will find for each query.
The symbol used to denote the logical "OR" operation in a query is |, and the symbol "AND" is used to indicate the logical operation.
168. /2.7.3/ The table shows queries to the search server. Arrange the query symbols in ascending order of the number of pages that the search engine will find for each query.
The logical "OR" operation is represented by the | symbol in a query, and the logical "AND" operation is represented by the & symbol.
2.28(UTM)
ftp :// home . net / www . doc
Which part of this identifier is the name of the server on which the resource is located?
2.27 (DV-2004, UTM)
The identifier of some Internet resource has the following form:
http :// www . ftp . ru / index . html
Which part of this identifier indicates the protocol used to transfer the resource?
1)www 2)ftp 3)http 4)html
2.29 (UTM)
Access to the net.edu file located on the ru.com server is carried out via the ftp protocol. In the table, fragments of the file address are encoded with letters from A to J. Write down the sequence of these letters encoding the address of the specified file.
2.30 (UTM)
Access to the text.net file located on the www.ru server is carried out via the http protocol. In the table, fragments of the file address are encoded with letters from A to J. Write down the sequence of these letters encoding the address of the specified file.
2.31 (OS)
Access to the www.txt file located on the ftp.net server is carried out via the http protocol. In the table, fragments of the file address are encoded with letters from A to J. Write down the sequence of these letters encoding the address of the specified file.
2.32(DV-2004)
What condition should be used to search the Internet for information about flowers growing on the islands of Taiwan or Honshu (the logical "OR" operation is represented by the | symbol, and the "AND" symbol is used for the "AND" operation)?
- flowers & (Taiwan | Honshu)
- flowers & Taiwan & Honshu
- flowers | Taiwan | Honshu
- flowers & (island | Taiwan | Honshu)
2.33 (UTM)
On the Internet you need to find information about the great white shark (another common name for this shark is Carcharodon). Formulate a query to the search engine, taking into account that the symbol “OR” is used in the query to denote the logical operation “OR”, and the symbol “AND” is used to denote the logical operation “AND”.
2.34 (UTM)
The table shows queries to the search server. Arrange the query symbols in ascending order of the number of pages that the search engine will find for each query.
The symbol used to denote the logical "OR" operation in a query is |, and the symbol "AND" is used to indicate the logical operation.
breeding & keeping & swordtails & catfish |
|
2.35 (OS)
The table shows queries to the search server. Arrange the query designations in descending order of the number of pages that the search engine will find for each query.
To indicate the logical operation "OR" in the query, the symbol is used, and for the logical operation "AND" the symbol & is used.
Tasks To section "Telecommunications technologies"
1 Please indicate what is in your email address [email protected] is the user's alias?
A) prostokvashino B) kot-matroskin C) net D) kot
2. Specify what's in your email address [email protected] is the mail server name?
7 Which of the following character strings could be a valid email address?
8 Which of the following character strings could be a valid email address?
9 Which of the following is the correct IP address?
B) 22.22.22.22.22
B)192.168.257.24
D) all are correct
10 Which of the following is an incorrect IP address?
B) 172.16.24.264
D) all are correct
11 Which of the following is an incorrect IP address?
B) 172.16.124.24
D) all are correct
12 Recover from individual parts of a URL
13 Recover from individual parts of a URL
D) //my_files.docs.
14 Recover from individual parts of a URL
15 Recover from individual parts of a URL
16 Recover from individual parts of a URL
A) //my_first_site.
17 Recover from individual parts of a URL
18 Recover from individual parts of a URL
19 Recover from individual parts of a URL
E) .my site.nar
20 (Demo version, 2009)
Petya wrote down the IP address of the school server on a piece of paper and put it in his jacket pocket. Petya's mother accidentally washed her jacket along with the note. After washing, Petya found four pieces of paper in his pocket with fragments of an IP address. These fragments are designated by the letters A, B, C and D. Recover the IP address.
In your answer, provide the sequence of letters representing the fragments in order corresponding to the IP address.
21 The employee was dictated by phone 215628319, he wrote it down, but did not put dividing points. In your answer, write this IP address with dots.
22 The employee was dictated by phone 25218327239, he wrote it down, but did not put dividing points. In your answer, write this IP address with dots.
23 Specify a number that cannot be used in the IP address. 155.271.1.205
24 Specify a number that cannot be used in the IP address. 231,0,217,282
25 Specify a number that cannot be used in the IP address. 256, 10,2,0
26 How many different addresses can be encoded using an IP address?
A) 4,000,000 B)4*2 30 C) 1024000 D)2 31
27 (Demo version 2008, task B7)
31. VZHBDEDGDA. 32. BGEJVDA.
Topic: Answers to the Computer Science test information technology
Type: Test | Size: 20.44K | Downloads: 72 | Added 11/13/13 at 09:00 | Rating: 0 | More Tests
TEST
Communication systems and networks with mobile objects
Principles of building telecommunication systems various types and distribution of information in communication networks:
Work principles, specifications and design features of the communication means used;
Discrete Messaging Basics:
Principles of building computer networks; local and global networks;
Multichannel telecommunication systems
Communication networks and switching systems
Digital transmission systems
Basics of building telecommunication systems and networks:
1. Features of the transmission of various signals through channels and paths of telecommunication systems:
1. Specify the characteristics of the telephone signal
A) frequency from 0.3 to 3.4 kHz dynamic range 26…35 dB
B) frequency from 0.05 to 10 kHz dynamic range 20…30 dB
C) frequency from 50Hz to 6MHz dynamic range about 40dB
D) frequency from 10-15 Hz to 10-15 kHz dynamic range 86...96 dB
E) frequency from 1Hz to 4kHz dynamic range 20…35 dB
2. A chain of transmitting and receiving stations located at stable communication distances within the line of sight of antennas is called
A) Tropospheric radio relay link
B) Radio relay line of sight
C) Satellite communication system
D) Cellular communication system
E) Radio navigation system
3. The medium used to transmit the modulated signal from the transmitter to the receiver (wire, waveguide, ether) is
A) communication line
B) object of transfer
C) equipment type
D) receiving object
E) method of transmission
4. The basis of pulse amplitude modulation (PAM) is the transmission of signals in the form
5. Pulse width modulation (PWM) is based on the transmission of signals in the form
A) time modulated pulses
B) phase modulated pulses
C) frequency modulated pulses
D) pulses modulated in amplitude
E) pulses modulated in duration
6. With delta modulation, information about
A) pulse amplitude
B) about the pulse duration
C) change in pulse amplitude relative to the previous one
D) change in the position of the pulse over time
E) pulse arrival time
7. The noise that occurs when an analog signal is digitized is called
A) quantization noise
B) receiver noise
C) white noise
D) isometric noise
E) concentrated noise.
8. Noise immunity of a communication system is -
A) communication stability limit
B) signal-to-noise ratio
C) synchronization stability limit
D) when there is completely no incorrect data at the system input
E) the ability of the system to restore signals with a given reliability
9. What is noise-resistant coding?
A) error detection and fixing
B) data transmission current state equipment
C) error detection and counting
D) error detection and correction coding
E) error detection and reception disabling
10. Why is a zigzag arrangement of stations used when constructing RRL?
A) Georeferencing.
B) Avoiding possible obstacles.
C) Allows reuse of operating frequencies, avoiding additional induction of electromagnetic interference to neighboring stations
D) Link to populated areas.
E) There is no such arrangement.
11. The phenomenon of refraction in radio communications is due to
A) the presence of a gradient of magnetic permeability of the atmosphere
B) the presence of a gradient of dielectric constant of the atmosphere
WITH) magnetic field Earth
D) unevenness of the earth's surface
E) the presence of precipitation
12. Telephone channel capacity (PCM-VRK mode)
A) 100 bps
B) 10 Mbit/s
C) 2 Kbit/s
D) 64 Kbps
E) 256 Kbps
13. The largest international satellite organization, of which the Republic of Kazakhstan is a member
A) Intersputnik
B) Inmarsat
C) Newskays
D) Intelsat
E) Arabsat
Management in telecommunications:
14. What is the procedure for obtaining permits for activities in the telecommunications sector in Kazakhstan?
A)permission to use radio frequency spectrum, license, permission to operate
B) license, permission to use radio frequency spectrum, permission to operate
C) operating permit, license, permission to use radio frequency spectrum
D) permission to operate, permission to use radio frequency spectrum, license
E) permission to use radio frequency spectrum, permission to operate, license
15. The company is a national telecom operator in the Republic of Kazakhstan
A) Nursat
B) Rakhat Telecom
D) Katelko
E) Kazakhtelecom
16. Which government agency in the Republic of Kazakhstan is developing regulatory documents in the field of communications?
A) state committee by radio frequencies
B) licensing department
C) Department of Information Systems of the Ministry of Transport and Communications
D) state communications supervision
E) Transport Control Committee of the Ministry of Transport and Communications
17. What elements are classified as passive elements?
A) Multi-port networks
B) Semiconductor diodes
C) Transistors
D) Amplifiers
E) Extensions
International standards for computer network hardware and software:
19. What is a maintenance-free amplifier point (NUP) used for?
A) To amplify signals
B) For signaling
C) To suppress signals
D) To suppress interference
E) To pass signals
20. What is the lower and upper limit spectrum frequency band of a telephone signal?
B) 0.3¸2.7 kHz
C) 0.3¸3.4 kHz
D) 0.5¸1.5 kHz
E) . 0.5¸3.1 kHz
21. What power corresponds to the absolute level of 0 dB?
22. What voltage corresponds to the absolute level of 0 dB?
23. What is the upper frequency of the telephone signal spectrum?
24. What current corresponds to the absolute level of 0 dB?
25. How is immunity to interference in communication channels determined?
A) Signal power difference and interference
B) Difference between signal voltage and noise
C) The difference between the signal level and interference
D) The ratio of signal level and interference
E) difference in frequency bands between signal and noise
26. What device can be used to reduce the nonlinearity of interference?
A) Amplitude limiter
B) Compander
C) Corrector
D) AGC device
E) Stabilizer
27. How many times does a digital signal attenuate faster than an analog signal?
A) 2 times
B) 3 times
C) 4 times
28. How many times will the transient noise decrease when the duty cycle increases from Q=1 to Q=2?
A) Will not change
B) 1.5 times
C) 2 times
D) 3 times
E) 4 times
29. At what transmission speeds are coaxial cables used (Europe)?
A) > 2 Mbit/s
B) > 4 Mbit/s
C) > 6 Mbit/s
D) > 8 Mbit/s
E) > 10 Mbit/s
30. The main type of interference in coaxial cables.
A) Transient interference from other paths of this cable
B) Interference from reflected signals
C) Pulse noise
D) Thermal interference
E) Near-end crosstalk
31. The duration of the signal is determined
A) Frequency
B) Time interval
C) Speed
D) Period
E) Your option
32. Why is companding needed?
A) To reduce the nonlinearity of the interference
B) To limit the signal amplitude
C) To improve transmission reliability
D) To reduce quantization steps
E) To obtain approximately the same quantization signal-to-noise ratio and reduce the number of bits in the code group
33. What methods can be used to carry out asynchronous input of discrete information into a digital path?
A) Directly
B) Overlays
C) Temporal separation
D) Coding
E) Speed matching
34. Prioritize in descending order the advantages of the linear path of the fiber-optic transmission network (FOTN):
A) Low sensitivity to electromagnetic interference
B) Smaller size and less equipment
C) Low potential equipment cost
D) Wide bandwidth
E) Low energy losses during its propagation
35. What three conditions determine the length of the regeneration section of a fiber-optic transmission network (FOTN)?
A) Number of fibers in the cable
B) Emitter output power
C) Type of code in line
D) Optical cable attenuation
E) Dispersion distortion
36. Indicate the bandwidth of single-mode fibers
A) Up to 50 MHz×km
B) 50…100 MHz×km
C) 100…250 MHz×km
D) 250…500 MHz×km
E) 500 MHz…1 GHz×km
37. In frequency division transmission systems (FDM) behind each channel of a digital line :
A) A specific frequency spectrum is fixed
B) Specific signal phase
C) A specific time interval is fixed
D) A certain signal speed is fixed
E) Your option
38. What are the multiples of what frequency are the frequencies of all carrier oscillations selected in multichannel transmission systems with frequency division of channels (FDM)?
39. What type of telecommunication signals is called digital?
A) Continuous in amplitude and discrete in time
B) Discrete in amplitude and continuous in time
C) Discrete in amplitude and discrete in time
D) Sinusoidal
E) Sound
40. What is the speed of digital stream transmission in an individual digital subscriber line?
A) 0.5 Kbps
B) 32 Kbps
C) 56 Kbps
D) 64 Kbps
41. End users of information systems (IS) are considered...
A) Information consumers (engineers, economists, etc.) and IS personnel
B) Database administrator, system and application programmers
C) Computer scientists
D) Telecommunications specialists
E) Managers
42. Specialist creating a model subject area information system (IS) and setting tasks for application programmers is...
A) IS Staff Member
B) Systems Analyst
C) Database administrator
D) Senior programmer
E) Department director
43. What is the length of the code word (in bits) in one channel of a digital PCM line?
Computer Science and Information Technology:
44. To assess the costs of creating an information system, the following criterion is used:
A) acquisition, supply, development, operation, support
B) capital investments + current costs
C) data processing time (query response time)
D) documentation, verification, quality assurance
E) project management, training
45. What parameter of the information system is determined using the following criterion - volume of input information/volume of output information:
A) degree of completeness of data processing
B) degree of database redundancy
C) degree of completeness of information display
D) degree of speed of information processing
E) degree of extraction of useful information
46. All work to create an information system (IS) in accordance with specified requirements is...
A) IP development
B) verification
C) project management
D) IS modernization
E) exploitation of IP
47. The electronic information market, depending on its content, is divided into sectors...
A) public, commercial and non-commercial information
B) current and historical information
C) business, professional and media information
D) video, audio and multimedia information
E) stock exchange and financial
48. Based on the type of data model, information databases are divided into:
A) network, hierarchical, relational and mixed
B) local, regional, general, distributed
C) documentary, factual, lexicographic
D) brokerage, stock exchange, financial
E) historical, operational, urgent
49. What parameter of the information system is determined using the following criterion - data processing time (request response time) :
A) degree of database redundancy
B) degree of completeness of information display
C) degree of speed of information processing
D) degree of extraction of useful information
E) degree of completeness of data processing
50. Secondary multiplexing is used in digital transmission channels for:
A) reducing channel capacity
B) increasing channel capacity
C) reducing interference in the channel
D) increasing channel security
E) Your option
Answers to the Test
34. - D, E, A, B |
||||
please let us know. |
Computer science test to take
test on the topic “Telecommunication technologies”.
in group 201 by profession 230103.02 “Master of digital information processing”
Target: establishing the level of formation of subject, meta-subject and personal results students on the topic “ Telecommunication technologies »
Standard requirements:
Personal results:
formation of the student’s readiness and ability for self-development and self-education based on motivation for learning and cognition.
Meta-subject results:
the ability to evaluate the correctness of tasks.
Skill
Developing the ability to apply learned knowledge to connect a computer to a network on a given topic.
Instructions for performing the work
40 minutes are allotted to complete the entire work.
The work consists of 6 tasks. Among them are 2 tasks with a choice of one and many correct answers from those proposed (tasks 1 – 2), 1 task for matching (task 3), 1 task with a short answer (task 4), 1 task with a free answer (task 5) and 1 task involving creating a presentation using MS Power Point on the topic: “Internet (task 6).
Tasks 1 with alternative answer choice. Each sentence contains 4 answer options, one of which is correct. One point is awarded for each correct answer. Maximum score for the task - 6.
Task 2 with multiple choice answer. From the proposed options, you need to select and tick the correct answers. For each correct answer, 1 point is awarded. The maximum score for the task is 6.
Task 3 to establish correspondence. Students enter the corresponding letter in the table given in the answer under each number. For each correctly indicated pair, 1 point is awarded. The maximum score for the task is 5.
Task 4 with short answer. Students are asked to complete the sentences and write them down. Each answer is awarded 1 point. The maximum score for the task is 7.
Task 5 involves using tags to write a simple web page.
The maximum score for the task is 10.
Task 6 with free answer. Students write down their answers on the form. The maximum score for the task is 6.
Maximum amount points for the entire work – 40
on the topic: “Telecommunication technologies”
Select and circle the correct answer.
Specify the device to connect your computer to the network:
The network protocol is:
network connection agreement
list of required devices
rules for transferring information between computers
conventions about how linked objects interact with each other
WWW hypertext page viewer:
Protocol
Specify servers located in Russia:
rnd.edu.runnet.ru
The provider is:
computer providing backhaul over a network
network connection program
computer network specialist
network services company
Which of these programs is not a browser:
Internet Explorer
Netscape Communicator
Select the devices needed to connect your computer to computer network Internet (check the box):
Internal network adapters
HDMI cable
Switch
Monitor
Scanner
Router
Network cable
Modem or router
External network adapters
Motherboard
Telecommunications is...
controls data transfer at the transport layer.
Routing protocols (IP, ISMP, RIP) - ...
a computer that provides its resources to other computers when working together
Client-server technology is...
long-distance, remote communication and remote transmission of all forms of information, including data, voice, video, etc., between computers over communication lines various types.
Transport protocol TCP - ...
a technology of interaction between computers or programs, which assumes that one of the participants in the interaction requests some information from the other.
process data addressing, determine paths, and ensure data transmission at the network level.
Continue the sentence:
These two protocols are responsible for dividing the entire amount of data into small segments to prevent exclusive takeover of the network by two workstations, the type of transmission (reliable or unreliable) and, in the case of reliable transmission, restoring the full amount of data from the segments. FTP intended for ….____________________________________________
Virtual museum – type of website….________________________________________________
__________________________________________________________________________________
Based on the speed of information transfer, computer networks are divided into: _____________________
__________________________________________________________________________________
The email address consists of…_______________________________________________
__________________________________________________________________________________
Computer telecommunications is …________________________________________________
Local computer network connects computers, …..___________________________
___________________________________________________________________________________
Compose and write a sample web page using the following tags:
HTML >, HEAD>,
,
,
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Create a presentation using MS Power Point on the topic: “Internet”
Evaluation criteria test control knowledge
Excellent rating
75 – 100% correct answers
30 - 40 points
Rated "good"
50 – 74% correct answers
20 – 29 points
Rating "satisfactory"
27 – 49% correct answers
11 - 19 points
Rating "unsatisfactory"
27% or less correct answers
0 – 10 points
Levels of activity
UUD
Criteria
№ tasks
Max. point
Emotional-psychol.
Personal
Choose 1 correct answer from 2 proposed
Regulatory
Regulatory
Social
Communication
Knowledge of definitions on the topic “Telecommunications Technologies”
Analytical
Cognitive
Ability to answer questions briefly
Creative
Personal
Self-improvement
Regulatory
Ability to reveal this topic and present it in the form of a presentation
Answers
tasks
Answers
A: modem,
B: rules for transferring information between computers,
B: Browser,
G: rnd.edu.runnet.ru,
D: company providing network services
E: Outlook Express
B, G, F, I, K, L
1C, 2E, 3 D, 4A, 5B
These two protocols are responsible for dividing the entire amount of data into small segments to prevent exclusive takeover of the network by two workstations, the type of transmission (reliable or unreliable) and, in the case of reliable transmission, restoring the full amount of data from the segments.FTP designed for transferring files over TCP networks (for example, the Internet). FTP is often used to download web pages and other documents from a private development device to public hosting servers.
Virtual museum (website museum)- a type of website optimized for the display of museum materials. Submissions can range from art and historical artifacts to virtual collections and family heirlooms.
By information transfer speed computer networks are divided into: low-speed, medium-speed, high-speed.
E-mail address consists of two elements: the mailbox name and Domain name server.
Computer telecommunications– exchange of information at a distance using a computer.
Local computer network connects computers installed in one room (for example, a school computer lab) or in one building (for example, in a school building several dozen computers installed in different subject rooms can be combined into a local network)
Job No.
Criteria for evaluation
the website is written correctly,
no factual errors,
no mistakes.
all conditions are met, but a minor error was made
There are errors in the use of tags.
other cases.
Test results
Group 201
Item: computer science and ICT
Teacher: Gimranova E.Yu.
The date of the: 26.11.2014.
Goal: to establish the level of development of subject, meta-subject and personal results among students in profession 230103.02 “Master of Digital Information Processing”
Activity level
Emotion.-
psycho.
Regulatory
Social
Analytical
Creative
Self-improvement
Total points
% completed
Mark
Job number
Full name of students
/points
40
5
Abduganiev Shahrom
28
4
Anisimova Anastasia
18
3
Arteeva Rita
23
57,5
4
Beard Christina
28
4
Dotsenko Anastasia
28
4
Drozdov Semyon
17
42,5
3
Klyasova Yana
25
4
Kuritsina Elena
21
52,5
4
Merkusheva Ekaterina
20
4
Meshiy Christina
18
3
Tukhliev Shokhrom
31
5
Real. points
Max. points
% achieved.
56,0
53,0
69,1
54,5
54,5
66,7
57,5
Analytical note on the results of the test workon the topic “Telecommunication technologies »
Target: establishing the level of formation of subject, meta-subject and personal results of students on the topic “Telecommunication technologies” »
Group 201
Test date: 26.11.2014.
The test work established the level of formation of the following subject, meta-subject and personal results:
formation of a responsible attitude towards learning,
formation of the student’s readiness and ability for self-development and self-education based on motivation for learning and cognition,
ability to evaluate the correctness of tasks,
ability to choose 1 correct answer out of 2 proposed
development of the ability to write web pages according to given conditions and based on existing knowledge
Based on the testing results, the following were obtained: results:
Subject results :
On threshold level knowledge formation:
Choose 1 correct answer from 2 proposed
Knowledge of devices necessary to connect a computer to the Internet computer network.
On average level formation of skills:
The ability to write a web page according to given conditions and based on existing knowledge on the topic.
the student’s readiness and ability for self-development and self-education based on motivation for learning and cognition.
Meta-subject results :
The most developed components of the activity are:
self-improvement, emotional - psychological and social
The least developed are the following components of activity:
regulatory
Levels of achievement of activity components:
Emotional - psychological 56 %
Regulatory 53 %
Social 69,1 %
Analytical 54,5 %
Creative 54,5 %
Self-improvement 66,7 %.
Based on the testing results, the average level of theoretical knowledge on the subject was revealed; inability to correctly use tags and find matches.
Offers:
During training sessions it is necessary to pay attention to the formation of activity components and universal educational activities, mastering subject and personal results: pay more attention to the use of tags for writing a web page, devices for connecting to telecommunication networks, create conditions for students that promote emotional and psychological, creative development.
Date: 11/26/2014. Teacher: Gimranova E.Yu.
Diagnostics of the level of formation of basic and general competencies
among students ____________________________________________________________________
Goal: to establish the relationship between the level of development of basic and general competencies and the level of formation of educational motivation among students, analysis of the data obtained, drawing up recommendations.
Motivation structure:
Emotional-psychol.
External
Social
Analytical
Creative
Self-perfect.
Structure of basic competencies:
Emotional-psychol.
Regulatory
Social
Analytical
Creative
Self-perfect.
Comparison of the structure of motivation and basic competencies:
Rank
Motivation
Basic competencies
Self-improvement
Self-improvement
Social
Social
Analytical
Analytical
External
Regulatory
Emotional-psychological
Emotional-psychological
Creative
Creative
Analysis of the results obtained: Analysis of the relationship between types of motivation and competencies shows, in general, the correspondence of the formed competencies to the motivation of students, which develops in educational activities: almost all competencies coincide in rank.
In this group it was revealed low level formation creative competencies And creative motivation.
Date: 27.11. 2014 Teacher: Gimranova E.Yu.