Computer Network - Practice (31)

Original link: https://blog.csdn.net/Enderman_xiaohei/article/details/100547603

computer network

Exercises (31)

  1. On a point to point link in order to reduce wasted address, subnet mask should be designated as ().
    255.255.255.252 A.
    B. 255.255.255.248
    C. 255.255.255.240
    D. 255.255.255.196
    ----------------------------------------
    answer :
    A
    parsing :
    bin (252) = 11111100, a total of only four address, a network address, a broadcast address, and the remaining two address is assigned to two point to point interface. Excessive B, C, D option is a waste of address.

  2. Company A Company B accepts commissioned the development of a software application, the parties have not entered into any written contract. In this case, () enjoy copyright in the software.
    A. A company
    B. A and B jointly
    C. Company B
    D. A and B companies are not
    ----------------------------------------
    the answer :
    A
    parsing :
    when commissioned by the development, did not enter into any written contract, copyright should all developers.

  3. The following statements about the number of floating-point and fixed-point representation represented, is not correct ().
    Point represents a number represented by A. method (referred to as fixed-point) are often divided into two kinds of decimal point and fixed-point integer
    B. fixed-point representation, the decimal point need to occupy a storage position
    C. floating point representation with mantissa and exponent representation number, known as floating-point
    D. in the case where the same total number of bits, floating-point representation may represent a larger number
    ----------------------------------------
    answer :
    B
    analytical :
    ① various forms of data representation in a computer called a number of machines, which is characterized by binary notation, the symbol number represented by 0, the decimal point is implied by, without accounting for the position. The actual value of the number corresponding to the machine referred to the number of truth values.
    In order to facilitate the number of machine operation, signed using different methods of encoding the original code, the inverted, complement and shift the like.
    The so-called fixed-point, that is when the decimal point represent data in a fixed position. The decimal point is generally agreed to have two ways: fixed-point integer (pure integer, decimal point after the value of the least significant bit) and fixed point decimals (decimal fraction, the decimal value before the most significant bit).
    When the machine word size of n, one's complement fixed-point shift may represent 2 n 2^n number, the original code and its code can only represent trans 2 n 1 2^n-1 number (0 indicates occupy two coding), thus, fixed-point numerical range can be represented is relatively small, because it is easy calculation result is out of range overflow.
    The general form of the floating point number is represented by: N = 2E × F wherein E is called the order code, F is mantissa. Order code generally pure pure fractional signed integer unsigned mantissa. Floating point representation format is as follows:
    Here Insert Picture Description
    It is clear that a number of floating-point representation is not unique. When the position of the decimal point is changed, a corresponding change order code can be represented by the same number of the plurality of floating-point format.
    Range can be represented by floating-point values mainly determined by the exponent, the mantissa represented by the numerical accuracy of the decision.
    Determining the position of the decimal point ② There are generally two methods: one is fixed to a predetermined position of the decimal point, called fixed point. Another is the location of the decimal point is not fixed, can float, float referred to. In the computer, usually used to represent fixed point integer and decimal fraction, referred decimal point and fixed-point integers. For, there are number of fractional part of both the integer part, generally expressed float. The following description separately:
    (1)fixed-point integer: In fixed-point, when the position of the decimal point to the right of the fixed value in the least significant bit position, it represents an integer. Note: the decimal point is not alone accounted for a bit, but the default in the lowest position to the right. It is divided into a fixed-point integer signed and unsigned types.
    (2)fractional fixed: when the position of the decimal point is fixed between the sign bit and the highest value bits, it means a decimal fraction. Because fixed-point numbers can be represented by a smaller number range, often can not meet the needs of practical problems, so to be able to adopt a wider range represent the number of floating-point numbers.
    (3)Float: In the floating-point representation, the decimal point position is floating. In most computers, s mantissa regarded as a binary decimal fraction, the p order code as a binary fixed-point integer. It determines the number of bits of the mantissa of S represents a number of accuracy; exponent p of bits determines the range of representable numbers. In order to float represented both high precision and range, must be a reasonable requirement to store floating-point format.

  4. View DNS records cache command is ().
    Ipcorifig A. / flushdns
    B. nslookup
    C. ipconfig / Release
    D. ipconfig / displaydns
    ----------------------------------------
    answer :
    D
    parsing :
    None

  5. While on the switch configured to enable password (enable password) and the password is enabled (enable secret), the function is ().
    A. enable password
    B. Enable password
    both C. can not
    D. Both can
    ----------------------------------------
    answer :
    B
    resolved :
    the switch, you can configure the enable password and enable password, the difference is that you can enable password plain text, the password can be displayed in cipher text. Usually only a configuration can be, when both the configuration, the latter effect.

Related content Reprinted from : the Greek Competition Network app

I point back to the top of the

 
 
 
 
 
 
 
End.

Guess you like

Origin blog.csdn.net/Enderman_xiaohei/article/details/100547603