Quick Search


Tibetan singing bowl music,sound healing, remove negative energy.

528hz solfreggio music -  Attract Wealth and Abundance, Manifest Money and Increase Luck



 
Your forum announcement here!

  Free Advertising Forums | Free Advertising Board | Post Free Ads Forum | Free Advertising Forums Directory | Best Free Advertising Methods | Advertising Forums > Post Your Free Ads Here in English for Advertising .Adult and gambling websites NOT accepted. > Business to Business Ads:

Business to Business Ads: This forum is for posting ads that would be of interest to other Business Owners. Things like Marketing Services, Supply Services, and Business Essentials.

Reply
 
Thread Tools Display Modes
Old 04-11-2011, 01:44 PM   #1
oiq1nqi7no
 
Posts: n/a
Default Computer test questions and answers focus on the f

one choice -
1, the first computer ENIAC Short was born in 1946, is a vacuum tube computer; second generation transistor computer; the third generation of small and medium scale integrated circuits; fourth generation is the large scale integration; -
2, the computer application areas are: scientific computing; information management; real-time control; office automation; artificial intelligence, network communication; e-commerce; aided design (CAI); aided design (CAD); -
3, the computer representation of binary information, it uses the Von. Neumann principle the idea, that the form of two numbers 0 and 1 for the show, Commonly used conversion units: 1 B === 8bit; 1KB ==== 1024B; 1MB ==== 1024KB; 1GB === 1024MB; 1TB === 1024GB; 1 characters === 2B; -
4, binary conversion rule: when the decimal into a binary check in addition two SHE; binary into octal when the three as a group, the weight is equal to three octal into a weight in the binary into ten hex to four when a group of; -
5, the character code, ASCII code is commonly used in Chinese meaning for American Standard Code for Information Interchange; by the International Organization for Standardization ISO adopted the role of common information exchange standards. -
6, composed of the computer's system software and hardware system composed of two parts; -
7, hardware systems, including computing, controller, memory, input and output devices, controllers, and operations that is synthesized in the central processor CPU, main memory and external memory within minutes; memory is divided into read-only memory (ROM) and random access memory (RAM), the contents of the lost power is the RAM, external memory are hard (GB), floppy disk (3.5 inch, 1. 44MB), CD-ROM (650MB or so), USB removable storage (MB), MP3 (MB), etc.; -
8, the software that runs on a variety of hardware devices and related program information. There are system software (operating system, language processing, database management systems) and application software that is practical procedures (such as WPS, OFFICE, PHOTOSHOP, etc). -
9, the measure of computer performance are: -
10, experienced the development of computer language to machine language, assembly language, high-level language; computer can identify the language is the computer language; -
11, the monitor displays a screen resolution that can display the number of pixels, is the product price of a computer key indicators of good or bad. There are common sizes: 640 * 480 800 * 600,1024 * 768 -
12, the printer main stylus printer, inkjet, laser printers; -
13, boot ways: cold start: power, boot into the system; hot start: CTRL + ALT + DEL, End Task can also be used; reset the start method: RESET button; -
14, a computer virus is: a man with the preparation of self-replication through non-authorized invasion hidden in executable program and data files, the impact and damage the computer's security procedures; copy and destructive, hidden , infectious; -
15, a common virus characteristics: slow computer start than usual, run abnormal; a regular occurrence of anomalies; access device does not respond when a long or unusual, such as a printer can not be online, garbage, etc.; disk space suddenly small, or does not recognize the disk device; procedures and the mysterious loss of data, file name can not be identified; display information and inexplicable anomalies; frequent crashes, restart, does not start; executable file size changes and hidden files of unknown origin occurred; -
16, a computer virus removal: manual mode (DEBEG) anti-virus software (Rising Antivirus. KV3000, Connaught Shield) -
17, access to the device is a modem (MODEM), the computer will recognize the digital signal and telephone lines for transmission of analog signals into recognition; -
18, disk formatting commands (FORMAT), the disk can be rewritten, the information is lost; FDISK the partition command, you can change the disk logic; -
19, computer network refers to the use of communications lines and communications equipment will be located in different geographic locations with separate functions to each other connected computer systems, network software support, implementation of data between communication and resource sharing; Therefore, the maximum use of the network also aims to facilitate data sharing; -
20, by geographical location are different from the network into local area network (LAN), metropolitan area network (MAN), wide area network (WAN); by topology generally divided into: star, bus, ring, hybrid ; -
1. the following is not a computer network topology is ()-
A single network structure B structure C bus structure D star structure -
2. 16 * 16 dot matrix font, the font each character code stored number of bytes required for the ()-
A 32 B 256 C 4 D 2 -
3. in computer, VGA is the meaning of ()-
A Computer Model B Model C displays the standard keyboard, monitor Model D -
4. digital camera belonging to the external device ()-
A secondary storage device output device B C D random input device, storage device -
5. the following store, read and write speed from fast to slow is ()-
A RAM B C CD D floppy disk -
6. microcomputer hardware system, the core component is the (CPU) -
7. the amount of computer use to target MIPS is ()-
word processing speed
A B C D transfer rate of storage capacity -
8. The following options, not a computer virus is the (immunity) -
9. computer network's goal is (the sharing of resources and information transmission) -
10. can also can be used as input device output device is (hard drive) -
11. The following are computer input (mouse, keyboard, bar code readers, cat's eye,), outputs (monitors, printers, graphic form, printing devices), storage device is (hard disks, floppy disks, CDs, mobile memory) -
12. At present, the computer representation of the application areas; scientific computing, data processing, process control (Computer Aided Engineering CAI)-aided design CAD-
13. on the storage are correct (1MB = 1024 * 1024Bytes) -
14. a computer to be connected to the Internet must be installed on the hardware (modem modern) -
15. computer necessary input and output devices are (keyboard and monitor) -
16. in computer, transmission, storage, processing data and instructions are (binary code) -
17. The following description of the error on the operating system is the (operating system and hardware applications and contact the hardware as closely) -
18. computer data processing, the first transferred the data (memory) -
19. a computer's word length is 4, the computer can handle the data bits is (32) -
20. monitor key performance indicators (Resolution) -
21. microcomputer Pentiun4 1G, 1G said why? (CPU speed) -
22. in computer, all information is (binary) -
23. a complete computer system includes (hardware and software systems) -
24. TCP / IP includes three important services software: TELNET (terminal protocol simple process), FTP (Internet File Transfer Protocol), SMTP (Simple Mail Transfer Protocol) ip address by the 32-bit binary number composed of divided into four groups, each 8-bit, 256 maximum per person, so the interval 0 ---- 255; - ​​
25. computer network's goal is to achieve the Interner have every computer on a domain name, to distinguish each computer on the Internet, the highest in the domain name for the area code as: China: CN, Japan: JP, Taiwan: TW. U.S.: US, Hong Kong: HK-
26, the network transmission medium: (1) twisted pair, (2) coaxial cable, (3) Cable (4) Wireless Communications -
26. operating system is actually a set of programs, they are unified management for a variety of computer software, computer hardware resources and rational organization of work processes, coordination between the various parts of the computer, the system with users relationship. -
27. operating system features a full account? Answer: The operating system has five functional areas within the memory management, processor management, device management, document management and operations management -
28. through the Internet to send or receive e-mail (E-Mail) should be a prerequisite for each e-mail, (E-Mail) address, its correct form is XXXX@XXX.XX-
29. the left mouse button to set the pointer speed to the fastest habits and will be set to automatically hide the taskbar and hide the clock on the taskbar. (Start Menu / / set / / Control Panel / / mouse; My Computer / / Right / / shortcut menu / / Explorer / / Control Panel / / mouse) (Start Menu / / set / / of the State Bar and began Menu) -
30. set the keyboard character repeat delay of the longest and fastest flicker frequency characters. (Control Panel / / keyboard) -
31. the system time to April 20, 2005 19:30 PM (Start Menu / / set / / Control Panel / / date and time; my computer / / Right / / shortcut menu / / Resource Management control / / Control Panel / / date and time) (double-click the task bar time boxes / / Dialog) -
32. in the C drive folder create a new folder named ABC and in that folder, create a blank BMP image files AA.BMP (My Computer / / Explorer / / C: File menu / / new / / BMP images; the File menu / / rename) -
33. the C drive folder T + LETXT file deletion, and empty the Recycle Bin (My Computer / / Explorer / / C: / / select the file, delete) (right-click the Recycle Bin / / shortcut menu / / empty the Recycle Bin, or open the Recycle Bin / / empty the Recycle Bin) -
34. found by searching D: in. WAV format sound files and copy them to C: GUANLI folder, GUANLI folder self; -
35. will be D: in the AA. BMP files to C: under, AA. BMP file system content from the desktop screen; (PRINTSCREEN command and cut function) -
36. by anti-choice command D: The Non. DOC format selected (the first selected. DOC file, the Edit menu / / Invert Selection) -
37. GUANLI in D, find the folder, and this share; -
38. Using shortcut keys to select the non-continuity of D: under. DOC file all the selected (use CTRL key) -
39. view the folder's properties, and is set to hide, while the file attribute is set to visible; set XX file is read-only attribute; (select File / / menu bar / / property; or right-click / / property) (the menu bar / / tools / / View) -
40. to hide the default file name extension is set to visible; (menu bar / / tools / / View) -
41. in the C disk under a new AAA. BMP files, and set the desktop background to C: AAA. BMP (Control Panel / / display; desktop, right-click on a blank / / property) -
42. to D: under re-arrange files by name; -
43. set desktop disk protection program for three-dimensional text, and set the words to
44. Setting the desktop resolution 800 * 600, also change the My Computer icon; -
45. field is set to English (United States), 4-bit decimal digits (without restart) (Control Panel / / Regional Settings option) -
46. EPsonLQ ----- 1600 k to add a local printer, and printer name is set to force the western suburbs of Jiaotong University. -
47. add a new language input France and Singapore, and the sound box is set to minimum. -
48. On the desktop, the new D: QQ. EXE files fast boot method, and the name
49. On the Start menu level to create D: QQ. EXE file shortcuts. Named
50. on the D: QQ. EXE file to create a shortcut at the same level directory. -
51. using the Start menu, search online neighbors 192.168. 0.254, AAA and folders on the machine under the folder to the NIT simulate the machine; -
Second, word processing questions -
(1) add a column, use the formula to calculate the average temperature then the average temperature in descending order. -
(2) the words set to a small table IV, the middle level, the digital part of the fourth word, the vertical level of living right. -
minimum temperature of maximum temperature
City -
Beijing 31 20 -
Shanghai 29 24 -
Tianjin 31 22 -
Nanjing, 91 -
66 Third, the text operating questions -
1) will replace IT information industry -
2) emphasis added -
3) 4 * 5 drawing table, merging three rows 1 --- 2 -
4) frame line is set to 1.5 pounds, the internal border of 1 pound, blue border, the entire table to yellow shading. -
5) Set the document title Clerical, 4, hollow, red center. -
6) to set the text font is Arial small 四号 4 times the body copy, first three paragraphs of a merger, after a period of two merged. -
7) into the page header and footer section X of Y page, centered. -
8) to shrink the body of the first line of each paragraph export 0.8cm, set the other two columns of the second paragraph, width 5.7cm, about the second paragraph indent 2cm .-
9) set the entire page is A4, margins top and bottom 2.5cm, about 3cm, the last saved in the df jhjh uu 99 0876.doc-
10) after the preceding paragraph is set to 10 pounds -
four, website and e-mail questions -
1, visit the website, hit the issues related to the Olympics is stored as text GUANLI. TXT file, and use the file attachment sent to guanliedu@163.com, also copied to guanxin@263.net, the theme of
2, browse the web, open www.sina.com / news / index.htm page, a picture will be downloaded to D:, the file name is a beautiful world. -
1.1 Overview -
1.1.1 Computer and Information Processing -
● information is information reflecting the objective situation, which can be maps, text, sound and other multimedia forms such as performance. -
● digital information: only 0 and 1, said information code string, said digital information. -
● computer is an information processing (processing) machines. Computer generally refers to digital computers, digital computers can receive and process the digital information. -
● information entered into the computer data and programs can be divided into two categories: the data is processed object; program is processing the data of the instruction string. -
● Information processing refers to the encoding of information, storage, conversion, transmission, detection. -
● The information a computer can handle text, numeric, graphics, sound, images and video. -
1.1.2 and classification of the computer works -
1. the computer works: stored procedures, one by one execution (by the Hungarian-American mathematician von. Neumann / Von Neumann proposed and put into practice.) -
2. computer Category: -
● representation and processing of information by way of points: a digital computer, analog computer, digital and analog hybrid computer. -
● Purpose by computer: a dedicated computer, general computer -
● size and performance points by computer: supercomputer, mainframe, midrange, minicomputer, microcomputer -
1.1.3 Development and application of computers -
1. the development of computer profiles -
● 1946 the first digital computer (ENIAC) came (born in the United States) -
● First Generation (46-57 years): the tube for the logic components, delay line or make a memory drum; generally used for scientific computing, and military aspects. -
● Second Generation (58-64 years): the transistor logic components, mainly with the core memory, magnetic tape and begin to use and loaded with memory; the creation of high-level language. -
● The third generation (65-71 years): the main function of integrated circuit devices, main memory using semiconductor memory; appeared in batch, time sharing and real-time operating system. -
● fourth generation (72 -): the CPU, memory and the I / O interface to do in large scale integrated circuit chip. Applications are extremely broad. -
2. computer features: -
● fast speed - speed of operation, said the number of operations per second, has been as high as several billion times per second to hundreds of billions of times -
● high accuracy - the accuracy of the machine word, ie the data can be represented by (binary) of bits, has now reached 64. -
● has a memory (storage) capacity - with a variety of memory to store information. -
● has a logic function - for a non-judgment. -
● highly automated and flexible - process control computer with automatic operation. -
3. computer applications: -
● Scientific Computing (aerospace, bridge, building) -
● Real-time control (production lines, modern weapons) -
● data processing (databases) -
● Computer Aided Design (CAD), aided manufacturing (CAM) and assisted instruction (CAI) -
● word processing and office automation -
● Artificial Intelligence (robots, smart vehicles) -
● computer networks (Internet, campus network) -
1.2 the number of the computer system and encoding -
number system is that the number of methods and rules; coding is to solve all kinds of information according to what methods and rules that the issue into the 0,1 code string. -
1.2.1 Number System -
1. binary notation -
(1) decimal counting system: a 0-9 ten digital, every ten further. -
(2) binary counting system: the only two digital 0,1, every binary one. (0 +0 = 0 0 +1 = 1 1 +0 = 1 1 +1 = 10) -
(3) in octal notation: There are 0-7 of 8 digital, every eight further. (7 +1 = 10) -
(4) in hexadecimal notation: a 0-9, A, B, C, D, E, F total of sixteen digital, every hexadecimal one. (F +1 = 10) -
(5), said the number: (number) count system cases: (2BF) 16 (decimal number by default, do not add subscript 。)-
(6) correspondence between the binary numbers: Figure 1-1. (Write down? At the appropriate number) -
Figure 1-1 -
2. number system conversion between (the number should be entered into the computer are converted to binary) -
(1) conversion of the binary system to decimal -
the number of the binary system launched by the general formula (a bit is 0), the results can be calculated. -
-
(2) decimal number into two, eight, hexadecimal numbers -
10 →? A
-
(3) the number of binary and octal conversion -
2 → 8 a -
8 → 2 with -
-
(4) binary and hexadecimal number conversion -
2 → 16 using the -
16 → 2 a -
-
1.2.2 ASCII code (American Standard Code for Information Interchange) -
● letters, punctuation marks, special symbols and numbers as symbols, known as the character. These characters are unified by American Standard Code for Information Interchange, said, referred to as ASCII. -
● ASCII code look-up table method (Appendix I on page textbook P311): ASCII code with 7-bit binary number (or the highest bit is 0 8-bit binary number) to represent; the table that the first 654 columns, rows that No. 3210, a total of 128 codes. Look-up table by then over reading. -
● The size of the character ASCII code according to their size comparison. ASCII characters commonly used code (from small to big): a space - Digital - uppercase letters - lowercase letters -
example: A look-up table of the ASCII code value is obtained (1000001) 2 = (41) 16 = 65; can be deduced from the A's ASCII code decimal value of F 70 [a difference of 5 ];-
under the table shows the ASCII code value of A [65] the ASCII code value than a [97] small, that is, the ASCII code value lowercase than uppercase large. -
Figure 1-2 -
1.2.3 Character Encoding -
In order to use 0,1
character code string, said that China developed a Chinese character Code for Information Interchange GB2312-80, referred to as the national standard code. -
● National Standard Code Total characters 7445. A 3755 Chinese characters, Alphabetical order; two characters 3008, arranged by radicals and strokes. -
● Chinese characters as more than the national standard code symbols are used for each two-byte (16 bit binary) code to represent. -
1. GB Code: rows, columns, each 94 (0-93), with the first column after the double 7-bit binary number, ie the highest two-byte 0 (see Materials P77). -
2. area code: GB binary code that is not very convenient, so characters can also be expressed in decimal area code. -
● Area (line), bit (column) of the 94 (1-94), with the first zone-bit dual-two decimal number, less than two preceded by 0. -
area code
● Please see Appendix 2 P312 materials. Figure 1-3 is part of the area code table, such as: Fu 2403; the 2435; the 2487 -
Figure 1-3 -
3. machine code: a computer representation of the actual use of Chinese characters within the code, more widely used in the computer two bytes (the highest bit is 1) code as machine code. -
4. three encoding conversion between: (see Figure 1-4) -
● the area code of the code and place the corresponding numbers were converted by the hex decimal +2020 H is the national standard after the code (where H said that 16 decimal );-
● hexadecimal code +8080 H is the national standard machine code. Thus, two bytes of machine code necessarily the highest bit 1 (0 GB code). -
Figure 1-4 -
Example: characters of the area code 2083, the national standard code for the 1453H +2020 H = 3473H, machine code for the 3473H +8080 H = B4F3H. -
1.3 computer's basic operations -
computer calculation, there are two: numerical calculation (the most basic is the arithmetic) and non-numerical computation (basic logical operations.) -
1.3.1 arithmetic -
arithmetic is the most basic addition, other operations can be achieved by the addition. -
binary addition rules: 0 +0 = 0 0 +1 = 1 1 +0 = 1 1 +1 = 10 -
binary multiplication rule: 0 * 0 = 0 0 * 1 = 0 1 * 0 = 0 1 * 1 = 1 -
1.3.2 of basic logic operations (P13 Table 1.2) -
There are three basic logic operations: and (AND), or (OR), not (NOT). -
The following is a binary code
0,1, generally a recognition that the event (s), 0 for negative events (false). -
1. logic and rules (when both A and B is true, A AND B is true, otherwise false 。)-
0 AND 0 = 0, n, 0 AND 1 = 0 nn1 AND 0 = 0 nn1 AND 1 = 1 (or 0? 0 = 0 0? 1 = 0 1? 0 = 0 1? 1 = 1) - ;
2. logic or rules (if A and B when there is a true, A OR B is true, otherwise false 。)-
0 OR 0 = 0 nn0 OR 1 = 1nn1 OR 0 = 1 nn1 OR 1 = 1 (or 0 +0 = 0 0 +1 = 1 1 +0 = 1 1 +1 = 1) -
3. the logic of non-rule (if A is true, NOT A is false; when A false, NOT A value of true 。)-
NOT 0 = 1 nnNOT 1 = 0 (inversion) -
1.3 computer's basic operations -
computer calculation, there are two: numerical calculation (the most basic is the arithmetic) and non-numerical computation (basic logical operations.) -
1.3.1 arithmetic -
arithmetic is the most basic addition, other operations can be achieved by the addition. -
binary addition rules: 0 +0 = 0 0 +1 = 1 1 +0 = 1 1 +1 = 10 -
binary multiplication rule: 0 * 0 = 0 0 * 1 = 0 1 * 0 = 0 1 * 1 = 1 -
1.3.2 of basic logic operations (P13 Table 1.2) -
There are three basic logic operations: and (AND), or (OR), not (NOT). -
The following is a binary code
0,1, generally a recognition that the event (s), 0 for negative events (false). -
1. logic and rules (when both A and B is true, A AND B is true, otherwise false 。)-
0 AND 0 = 0, n, 0 AND 1 = 0 nn1 AND 0 = 0 nn1 AND 1 = 1 (or 0? 0 = 0 0? 1 = 0 1? 0 = 0 1? 1 = 1) - ;
2. logic or rules (if A and B when there is a true, A OR B is true, otherwise false 。)-
0 OR 0 = 0 nn0 OR 1 = 1nn1 OR 0 = 1 nn1 OR 1 = 1 (or 0 +0 = 0 0 +1 = 1 1 +0 = 1 1 +1 = 1) -
3. the logic of non-rule (if A is true, NOT A is false; when A false, NOT A value of true 。)-
NOT 0 = 1 nnNOT 1 = 0 (inversion) -
1.4 computer system components -
● computer system including hardware and software systems in two parts. -
● computer hardware system constitutes part of the collection of all entities; software system is the sum of the various procedures and documentation. -
1.4.1 computer's hardware system -
hardware consists of computing, controller, memory, input devices, output devices five major parts. -
1. calculator: computer arithmetic and logic operations of the main components. -
2. Controller: Remove the command from memory control computer one by the coordination of the various components, it is the computer's command center. -
3. Memory -
● computer memory unit for storing raw data and procedures. -
● memory is a multiple of 8 bits or by storage units, each unit has a number, that address. -
● storage capacity in bytes calculated: -
A.8-bit binary number is 1 byte [byte] is denoted by 1B; 1024 [2 of 10 power] bytes recorded as 1KB; 1024KB recorded as 1MB; 1024MB recorded as 1GB. -
B. byte unit conversion between: 1GB = 1024MB = 1024 × 1024KB = 1024 × 1024 × 1024B-
● memory into internal memory (main memory) and external memory (secondary memory) two kinds: -
A. memory is semiconductor memory, which can be divided into read-only memory (ROM) and random access memory (RAM) are two kinds of memory, usually referred to generally refers to RAM; external memory is mainly magnetic media memory, a disk (floppy disk, hard disk), tape, CD-ROMs and so on. -
B. CPU can access directly to memory operations, and external memory data must be transferred to the memory to operate, so the memory is a computer information exchange center. -
C. memory access speed, storage capacity is small, a power-down information to be lost; external memory access is slow, storage capacity, can be permanently stored data. -
4. input device: the original data and programs into the computer can recognize 0,1 code string input to the computer. -
commonly used input device a keyboard, mouse, microphone, scanner, light pen, teleprinter and so on. -
5. output devices: the computer processed information into a familiar form or other identification information output device to the outside. -
commonly used output devices are monitors, printers, speakers, plotters and so on. -
Note: -
● arithmetic unit controller and the computer's core components, said central processing (CPU) -
● CPU and memory together are called the host. -
● input and output devices and external memory referred to as an external device. -
Note: Although disk drive storage devices, but there are dual function of the input and output, it can be used as input and output devices. -
hardware structure shown in Figure 1-5 (Textbook P17); hardware work is shown in Figure 1-6. -
Figure 1-5 -
1.4.2 PC's hardware components -
PC is short for personal computer is a micro-computer, IBM introduced the first IBM PC. -
1. the host and the main chassis -
mainframe as the main board, interface card, external memory drives, power supplies, speakers, etc., as shown in Figure 1-7 and 1-1 show the video -
(1) Motherboard -
PC's host and its subsidiary circuits are mounted on a circuit board, known as the motherboard or motherboard, as shown in Figure 1-8. -
most important components on the motherboard is the host, the CPU and memory, Figure 1-9 is the shape of CPU and memory. -
CPU-
CPU are two important indicators of word length and clock frequency. Word length reflects the PC can deal with the length of the data, marked by the computer's computation accuracy; clock frequency reflects the PC's speed. CPU performance index determines the grade of the computer. -
memory -
PC's main memory, ROM, RAM and Cache three kinds: -
● ROM [read-only memory] can only be read but not written, the system used to cure some of the important procedures; -
● RAM [random access memory] is the PC's main memory, causing memory inserted in the socket. Once the power down the computer, RAM is lost in all the information. Current configuration generally have 64MB, 128MB, 512MB or higher. -
● Cache [cache] -
A. To address CPU speed [increase is getting faster and faster] and memory speed [increase slower] does not match the bottleneck; -
B. Cache is a high cost is also high speed random access memory, with or between memory and CPU, respectively, both equipped with; -
C. memory in some of the data on the Cache, CPU read and write data, the first visit to Cache, can not meet the only access memory, which can improve data access speed, another good performance and low cost . -
Other -
there are some sub circuit board, there are bus and a number of registers and control lines. -
bus is a CPU data transfer between the various units within, CPU and external exchange of information channels. -
registers are temporary storage of data or instruction storage unit. -
(2) expansion socket and interface cards -
● 6-8 General configuration expansion socket for connecting to peripherals and the host interface card (adapter) can be inserted in any expansion of the socket. -
● different interface cards with different peripherals, such as graphics cards, network cards, sound cards, anti-virus card, graphics card, A / D, D / A converter cards. Are now generally sound card, floppy and hard drive controller card and other integrated on the motherboard, in order to reduce the interface card. -
● video card alone to do in a circuit board, different types of graphics card to match with the corresponding display. -
A. According to the display mode can be divided into MDA [Monochrome Display Card], CGA [color graphics card], EGA [Enhanced Graphics card], VGA [Video Graphics Array card], TVGA, SVGA card; - / p>
B. VGA graphics display resolution at least 640 × 480 pixels, color, select up to 256; TVGA and extended a number of characters SVGA display and graphic display of the new standard resolution up to 1280 × 1024, color can be to achieve true color. -
(3) disk drives and optical drives -
● in the mainframe can hold up to two floppy and two hard drives or optical drive. -
● They belong to an external device (external memory), it must be through the drive control card (or direct) to the host. -
(4) Power -
the mainframe can be installed on the AC power supply (electricity) is transformed into low voltage direct current for the mainframe and keyboard parts. -
2. Keyboard -
keyboard is the main input device, and its own microprocessor, with on-off, decoding functions. Behind the keyboard and the host through the cable jack connected to the same color. -
● keyboard essentials -
A. benchmark keys and finger keys: left hand A, S, D, F right hand, J, K, L ,;-
B. correct fingering (see video demonstration 2-2) -
● fingers division of Figure 1-10. -
● essentials: a hand index finger J and F locate two keys (each with a small convex sets), followed by the other fingers in the appropriate key on the ride, ride in the space of two keys on the thumb, fingers with a recent knock Click the button, pay attention to hit back after the place. -
● Do not apply excessive force, not to hold a key down; eyes try not to look at the keyboard, comfortably, regular exercise can be realized. -
3. mouse -
mouse is an important input device, divided into two keys and two three-button mouse, but they use the left and right keys. The mouse arrow in different circumstances have different shapes, that a different meaning, such as the funnel that the system is busy, please wait. -
● Mobile: Do not move the mouse buttons -
● Drag: hold down the left mouse button and hold moving the mouse -
● Click: Press the left mouse button. If not that, that left mouse button. -
● Double-click: press the left button twice in rapid succession -
● Right-click: Press the right mouse button -
4. Monitor -
● main indicator is the resolution of the monitor with the screen vertical and horizontal direction shows the point (pixel) number indicates. The higher the resolution, the displayed character and the picture becomes. -
● Another indicator is the display color depth refers to the color with the point that the binary digits. The more bits, the richer the color layer, generally more than 16M color is called true color. -
● screen size is the length of the diagonal, the commonly used 15 -
● Currently, there are two common monitor: CRT or flat screen monitors general, LCD liquid crystal display [no radiation], shown in Figure 1-11. -
● Each display must be matched with the appropriate graphics card. -
5. Printer -
printer is divided into three types: dot matrix printers, inkjet printers and laser printers, as shown in Figure 1-12. -
dot matrix printers -
● Principle: bumping, the print head with 24 steel needles click the dot matrix ribbon printing on paper. -
● relative performance: low price, cost less; but the print quality is poor, noisy and slow. -
● Common models: LQ-1600K, etc. -
inkjet printer -
● principles: non-impact, from a number of fine spray nozzle ink to the paper. -
● Relative performance: lower prices, print quality, low noise; but the cost is big and easy to plug the nozzle. -
● Common models: Cannon, Epson, Lenovo and other brands -
laser printer -
● principles: the use of laser scanning technology to high-frequency modulated output signal, converted to dot matrix output. -
● relative performance: speed, low noise, highest print quality; but the price is higher. -
● Common models: Hp LaserJet 6L, etc. -
6. other external devices -
scanners, plotters, the game sticks, digital cameras, digital cameras and so on. -
7. external memory -
PC has a floppy disk external memory, hard drives and optical drives and so on. -
(1) disk storage: floppy disk and drive separate -
● floppy disk is magnetic media memory, according to the different diameter discs, floppy disks are 3.5 and 5.25-inch two (already out). -
● speed: the speed of the floppy disk is low, only 300 rpm per minute. -
● Capacity: 3.5-inch floppy disk has two recording magnetic surface, numbered 0 and 1; each magnetic surface has 80 tracks, from outside to inside numbered 0-79; each track divided into 18 sectors; Each sector can store 512 bytes of data. Shown in Figure 1-13, the capacity is: 512B × 18 × 80 × 2 ≈ 1.44MB-
(2) hard disk storage: hard disk drives as one and sealed in metal box body. Hard to read and write speed, large capacity, long life, is the most important external memory computer. -
● Hard-chip wafer from the steel alloy composition, surface deposited with a layer of magnetic media. -
● Speed: hard disk read and write speeds much higher than the per minute up to 5400-7200 rpm. As shown in Figure 1-14, each side of each disc corresponds to a read-write heads, head suspended in the disk surface (Winchester technology), which read and write speed, and reduce the head wear. -
● Capacity: hard disk performance by a number of the same size as the double-sided discs with a spindle fixed installation, the capacity is generally between 40-300GB. -
Figure 1-14 -
(3) CD-ROM Memory: separation of the disc with the drive, the disc memory generally refers to the CD-ROM. Other types of drive are: CD-ROM burner CD-R, DVD, Combo COMBO [General] and so on. -
● disc is a layer of aluminum plastic disk radiation, the use of optical storage technology, so the storage density. -
● speed: CD-ROM drive and floppy disk read and write speeds ranging between, with the speed that a speed is 150Kbps, as is 40-speed, the data transfer rate of 150Kbps × 40. (Where b is bits, not bytes B) -
● Capacity: typically 650-700MB. Although only a single store, but the most advanced DVD disc capacity has reached 150GB. -
CD-ROM and floppy
the use of methods such as video 1-3. -
-
(4) high-capacity removable storage devices -
● USB [OnlyDisk]: USB interface (hot), no drive, high-capacity memory. It features small size, light weight, larger capacity (64MB, 128MB, 256MB ... ... 2GB), access to faster, cheaper prices, has been gradually replacing the floppy disk. -
● mobile hard disk: USB interface portable hard drive, the basic features of a fixed hard disk, as shown in Figure 2-12. Capacity 20-80GB, the price is more expensive. -
-
1.4.3 computer software system -
software is the sum of all procedures and documentation. -
1. command and instruction -
instruction is instruct the computer to perform an operation command. A collection of basic instructions the computer instruction. -
instruction consists of two parts: operation code and operand address code. Opcode provides the computer to do what to do; address code that participate in the operation data and results of operations of the store location (only one address code simple and complex may have two or three), as shown in Figure 1-15. -
Figure 1-15 -
instruction types: arithmetic instructions, transfer instructions, control instructions, input and output instructions, special instructions. 2. Program -
program is an ordered set of instructions. 3. Programming languages ​​-
(1) machine language -
● binary code represented by a collection of machine instructions. It is the machine-oriented programming language. -
● is the only way to directly identify the computer language. Run fast, but difficult to remember. -
(2) assembly language -
● mnemonic that the language used. Is machine-oriented programming language (low-level language). -
● To be translated into machine language to run. -
(3) high-level language -
● close to human natural language programming language, which is highly process-oriented universal language. -
● must be translated into machine language to run. Commonly used VisualC, VisualFoxPro, VisualBASIC, JAVA and so on. 4. The basic concepts of software systems -
software is a computer system for operation, maintenance, management and application of computer program and supporting documentation for all procedures combined. -
Software Category: as shown in Figure 1-14 -
Figure 1-14 [blue part of the plan as a general understanding of the content] -
5. System Software -
system software is running, management and maintenance of basic computer software, usually supplied by the manufacturer. -
(1) operating system -
operating system is the control and management computer software and hardware resources, the rational organization of work processes and computer programs to provide a collection of man-machine interface. -
main functions of the operating system: processor management, storage management, file management, device management. -
(2) word processing program -
or assembly language programs written in high-level language called the source; code must be translated into a computer can deal directly execute the machine language program, called the target program. -
language processing (translation) program, there are three: -
● assembler: the assembly language source program translated into the target after the implementation of the translation process. -
● interpreter: the high-level language source translation sentence by sentence, step through the translation process. -
● compiler: the high-level language translation into the target program source code and connect again after the implementation of the translation process -
(3) Utility: also known as support software, the machine maintenance, software development, software tools necessary. -
6. application software -
specific issues for all types of application software developed. 1.4.4 PC's operating system -
operating system is the most basic of the most important system software, operating systems have a greater impact MS-DOS/PC-DOS, UNIX / XENIX, and Windows categories. -
1. from DOS to a WindowsXP-
MS-DOS/PC-DOS-
● DOS is the acronym for disk operating system, which is character-based single-user, single task operating system. As shown in Figure 1-15. -
● DOS through expansion of the Western transformation, so that both deal with characters, while maintaining the original features of Western software, called DOS Chinese platform, also known as the Chinese system. -
● DOS version from 1.0-6.22, Chinese platform CCDOS, SPDOS, UCDOS and so on. -
Windows-
● Windows is a graphical window interface based on the operating system. -
● Windows version from the start Windows2.0, Windows3.X need to run DOS support; -
● 95 years, released the Windows operating system Windows95; -
● XP was released in WindowsXP, its network more powerful, faster, and good reliability. -
● Windows95/XP DOS compared with the biggest difference is that multi-task operation; a single-user, multitasking operating system. In addition, it can also support voice, music, images and other multimedia information processing. -
2. WindowsXP Windows operating system 1. WindowsXP operating system family -
● WindowsXP Professional for personal computers -
● WindowsXP Server for small and medium enterprises, the server -
● WindowsXP Advanced for large enterprises, the server -
● WindowsXP Data Center Server for large data warehouses, large servers -
2. WindowsXP features -
● WindowsXP WindowsNT technology is based on multi-user, multitasking operating system. -
● strengthening stability and security of the system to further enhance the network features. -
● improve the system of hardware, software and network protocol compatibility. -
● In addition to FAT, but has added a more secure NTFS disk partition format. -
● enhanced multimedia support, improved system management. -
● interface more friendly, WindowsXP / XP is bundled with IE5.0. -
6. different grades of the basic PC configuration -
see the P20 Table 1.3-
1.4.5 computer performance -
1. frequency (clock frequency): the computer CPU clock frequency, to a large extent determine the computer's processing speed. Hertz, the current frequency as high as 3.0GHz. -
2. the basic word: signs computer computing accuracy. The longer the word length, the precision is higher. Unit is the binary digits, usually with 16,32,64-bit word length. -
3. Memory capacity: In general, internal, external memory capacity of the greater computer processing power, the stronger, faster, but must match the speed of the processor. -
4. computing speed, system reliability, maintainability, compatibility, diagnosis, fault tolerance capabilities, command system function -
5. cost performance: a variety of hardware and software performance and the price of the whole system than the higher the better. -
computer teacher (395383764) 00:18:55 -
one multiple-choice (a total of 10 of the big issue of small problems, 每小题 2 points, a total of 20 points) in the 每小题 the four alternatives listed in only one subject is in line with the requirements, please The code entered in brackets after the title. The wrong choice, multiple choice or no choice points. -
1. Modem data transfer rate is an important technical indicators, unit: () -
A.bps B. GB C. KB D.MB-
2. and auxiliary storage compared to which of the following is the main memory (RAM) advantages: () -
A. access to relatively cheap prices fast B. D. C. large capacity, expensive -
3.FTP is () -
A. B. Secure Hypertext Transfer Protocol Secure Sockets Layer protocol -
C. D. File Transfer Protocol Secure Electronic Transaction Protocol -
4. IP sharing, also known as () -
A. B. virtual server virtual server client C. D. Client -
5. the uniform resource locator (URL) of the role is to () -
A. maintain the hypertext link to the server C. B. D. information display service sends a request -
6. Standard Generalized Markup Language is the () -
A. HTML B. SGML C. HTTP D.XML-
7. Post Office Protocol is the abbreviation () -
A. HTTP B. SMTP C. IMAP D.POP-
8. following a domain name that educational organizations are () -
A.edu B.gov C.net D.com-
9. in the Internet, complete -
A. Positive resolution Address Resolution B. C. D. Reverse Domain Name System Analysis -
10. 100BASE-T standard specifies the NIC and HUB unshielded twisted-pair length between the maximum () -
A.50 B.100 m m m C.200 D.500 m -
computer teacher (395383764) 23:16:18 -
some theoretical problems (20 points) -
one multiple-choice questions (1 point for each question, a total of 20 points) -
1, CPU mainly by the computing device and controller, the following statements is correct () -
A, is mainly responsible for analyzing operational directive, and in accordance with instructions to make the corresponding op -
B, operation is mainly to complete the data operations, including arithmetic and logical operations -
C, the controller is responsible for analysis of instruction, and in accordance with instructions to make the corresponding op -
D, the controller directly control the computer system input and output operations -
2, the following statements is correct () -
A, computer viruses can infect executable files -
B, computer software is stored on a floppy disk in the process -
C, the process each time you start the computer the same reason, because all the information in RAM will not be lost in the shutdown -
D, although the hard disk installed in the mainframe, but it belongs to the external memory -
3, the binary digits of a word is () -
A, 8 B, 16 C, 32 D, with the computer system and different -
4, the following statements is correct () -
A, will be converted into digital signals in analog communication lines to facilitate the transmission of signals is called modulation -
B, in the form of intact information from the terminal into the communication line is called modulation and demodulation -
C, in the computer network, a transmission medium can transmit multiple signals -
D, in the local computer, the only shared software resources, and can not share hardware resources -
5, the use of ultra large scale integrated circuit manufacturing computer should belong to () -
A, the first generation of B, the second generation of C, the third generation D, the fourth generation -
6, a storage capacity of 1.44MB floppy disk, can store approximately 1.4 million () -
A, ASCII character B, the Chinese character C, a disk file ; D, sub -
7, the disk is write protected, then the disk data () -
A, can not be read, not excision, can not write new data -
B, can be read, not excision, can not write new data -
C, can be read out, can be excision, but can not write new data -
D, can be read, not excision, but it can write new data -
8, CD-ROM is () -
A, feel the media B, said the media C, the performance of the media ; D, storage media -
9, on the Internet (Internet), the electronic bulletin board of the abbreviation is () -
A, FTP B, WWW C, BBS ; D, E-mail-
10, Windows in a minimized application window after the application () -
A, is still running in the background B, temporarily stop running C, full stop ; D, error -
11, CPU processing is the basic unit of data words, a word of word length () -
A, to 8 bits B, for 16 bits - ;
C, for 32 bits D, and the CPU chip type on - p>
12, should be used to print the current screen content control key is () -
A, Scroll-Lock B, Num-Lock C, Pgdn D, PrtSc (Print Scorccn) -
13,3.5-inch floppy disk, a corner piece has a sliding block, if moving the sliding block to reveal a small hole, the floppy disk () -
A, can not read but can write B, can not be read can not write C, can only read not write D, can read and write -
14, controls the function of ^ C () -
A, to terminate the current operation B, the system reset C, to suspend the output of the standard output device D, the end of the command line -
15, according to communications from the division, the computer network can be divided into local and wide area networks. The following are LAN network is () -
A, Internet B, CERNET C, Novell ; D, CHINANET-
16, the two multi-media computer system components are () -
A, multimedia cards, and multimedia host -
B, multi-media communications software and multimedia development tools -
C, multi-media input devices, and multimedia output devices -
D, multimedia computer hardware system and multimedia computer software system -
17, a variety of network transmission media () -
A, has the same transmission rate and the same distance B, with different data rates and different transmission distance -
C, has the same transmission rate and different distance D, with different transmission rate and the same distance -
18, in Windows, start the application the right way () -
A, pointing with the mouse icon in the application B, the application window is minimized into icons -
C, to restore the application window, D, Double click the application icon -
19, in Windows, the right to terminate the application execution is () -
A, the application window is minimized into icons -
B, the application window with the mouse double-click the Restore button in the upper right corner -
C, with the mouse double-click the application window's title bar -
D, the application window with the mouse double-click the top left corner of the Control menu box -
20, the so-called
A, SCM B, SBC -
B, without any software, computer equipment, D, only the operating system, computer equipment -
operating questions in part (80 points) -
Word part -
the first question -
huge cave -
huge sub-layers of the cave is. If the Buddha rock divided into three layers, Xing Shi Ruyan, Jiangsu Shan volume holes, Yichang nitrate hole, Guilin Seven Star Crags, are also three floors, Xingwen County of Sichuan Tianquan hole can be divided into five, and Beijing Shihua, has been known to have 6 layers, with the same Lichuan Dragon Cave, but it is speculated that geological data, there are seven Shihuadong below, eight-hole. Become the largest cave found in layers. Multi-level cave that the place crust on the rise, a steady decline in water table, the initial formation of the tunnel continued into the dry hole, and up to a certain height, between the sinkholes through layers of holes. -
those of some well-known cave room with tall domed topography, such as: -
Beijing tunnel cloud chamber
6, 6, Fujian Province Chamber Music Yuhua Cave, Sichuan Chamber Xingwen Tianquan hole 6, 6, Henan Gongxian snow cave tunnel, Tonglu Yaolin Wonderland 7 cavern, Anhui Xuancheng Longquan Cave 7 cavern, cave, Hebei Lincheng Zhi 7 cavern, Reed Flute Cave in Guilin, Guangxi 9 cavern, Icheon-dong Tamron 10 caverns, Shaoguan Furong Cave 10 chambers. -
complete the following requirements: -
1, set the title text
2, set the title text
3, first two paragraphs of the text font for the fourth, the first line indented two characters; -
4, arrangement of text using tab stops (tab stop position: 107 characters left, 15.71 characters left-aligned, vertical alignment of characters 20.71, 22.86 characters left justified, left-justified characters 35.36); - ;
5, set the header text to -
6, after the name stored in its own named folder, file name: -
second question -
payment notice -
user ID :3-4-12 -
said the number of the last: 498 Practical volume: -
this: 524 Price: 3.00 -
shall pay this amount
: Toll: Signature: (Seal) -
complete the following requirements: -
1, set the table header text
2, set the table column width are: 2.8,1.9,1.9,2.8,2.8 cm; -
3, the first line of three cells combined, and using formula data into the table, set the amount of data format as currency format. -
This practical volume =
- Last, The amount of the fee paid = utility * Price; -
4, set all the cells vertically aligned. -
5, after the name stored in its own named folder, file name: -
Excel Part -
Open the EXCEL workbook material
Sheet1 worksheet, as required to complete the following: -
(all calculated items, if calculated by hand filling, not to the point. all the decimal, are reserved 2 decimal places) -
1, calculated
2, calculation of
3, calculation of
4, calculate the
5, calculated
6, based on water, electricity generating columnar data charts: chart position B16: I26; -
7, category axis for the head of the household, the series for the water and electricity; -
8, the chart background color set to blue color transition; -
9, backdrop of the fill effect, choose the default
10, the table names stored in its own named folder, file name:
PowerPoint part -
and do the following -
1, create a presentation, set to master the form. -
2, the selected application design template, set the template for the slide show -
3, enter the upper right corner in the title master, -
4, set the slide's color scheme as the standard first. -
5, insert two new slide. -
6, the Save the presentation as to their own folder named after the file name: -
Second, the terminology question (Question 5 of the largest small problems, 每小题 4 points, a total of 20 points) -
1, the virus: -
2, Encryption: -
3, digital signatures: -
4, TCP / IP protocol: -
-
5, referred to as symmetric encryption method: -
-
three short answer questions (a total of 6, the big issue of small problems, 每小题 6 points, 36 points) -
1, what is the IP address? -
2, non-symmetric encryption? -
-
3, what is computer network? -
-
4, what is the OSI / RM? -
-
5, What is a firewall? -
-
6, what is the network operating system? -
7.1 Computer Network -
the establishment and use of computer networks is the development of computer and communications technology product of the combination is an important part of the information highway. -
7.1.1 the type of computer network -
1. The definition and functions of computer network -
(1) the definition of the network -
computer network is interconnected with the aim of sharing resources, and a collection of independent computers. -
(2) the basic functions of the network -
● rational distribution and dispensing system resources. -
● centralized data processing system. -
● load balancing, collaboration, distributed processing. -
● improve system security and reliability. -
● rational allocation system, saving software and hardware equipment overhead. -
● improve the system compatibility, user expanded to increase processing capacity. -
● to provide users with various types of integrated services for users with a wide distribution of means of communication. -
2. Network Classification -
(1) come from the use of sub-scope or scale: local area network (LAN), metropolitan area network (MAN), wide area network (WAN). -
local area network (LAN) -
● LAN Features -
① coverage for several hundred meters to several kilometers -
② data transfer rate at 1Mbps-
③ is unique to a particular unit or department, such as the campus network. LAN computer network is the most active branches. -
● LAN software platform -
WINDOWS2000 (or NT) platform, UNIX or LINUX platforms. -
MAN (MAN) -
MAN Features -
① coverage to cover the entire city (generally known as LAN). -
② data transfer rate of less than 1Mbps. -
closed-circuit television (CATV) network is a typical example of MAN. -
wide area network (WAN) -
● WAN Features -
① scope could involve tens of kilometers or more. -
② data transfer rate is relatively low. -
● WAN toward the Broadband Integrated Services Digital Network (B a ISDN) direction. -
(2) from the information transmission bandwidth or transmission medium to sub: baseband, broadband network. -
● baseband network transmission medium with a twisted pair, ribbon cable or coaxial cable, data transfer rate of 10Mbps or less. -
● broadband coaxial cable using the protected data transfer rate up to 400Mbps. -
formed between the two commonly used local area network. Closed-circuit television (CATV) network is broadband local area network. -
(3) from the sub-network function and structure: communication subnet, subnet resources. -
● communication subnet is responsible for the transmission of information, including communications processors, terminal controllers, switches and transmission media. -
● subnet in charge of information processing resources, including mainframe systems and terminals. -
● Two channel communication subnet: point to point channels and broadcast channels. -
● broadcast channel used primarily for local area networks, can be divided into static and dynamic categories. -
7.1.2 computer network topology, transmission media and access control -
1. topology of the network -
(1) the concept of computer network topology -
topology: refers to the network nodes in communication lines and geometric order, to indicate the overall structure of the entire network appearance and the structural relationship between the modules. -
● node (Node): Active devices connected to the network. Such as: computers, peripherals, communication control equipment. Divided into two categories: -
relay nodes: for network connections. Such as: concentrators, switches and so on. -
access nodes (endpoints): includes a computer or terminal equipment and the corresponding connection lines from the source and destination of the role. -
● link: information flow between two nodes carry the line or channel. Such as: telephone, telegraph lines or microwave. -
(2) the classification of computer network topology -
● Point to Point mode: star, ring, tree, fully connected model, cross ring, irregular six, -
● broadcast: bus type, satellite type (radio-type), three ring, as shown in Figure 7-3. -
2. transmission media -
● transmission medium is the transmission of information carrier, is the information from one node to another node to send the line entity. -
● common transmission medium: -
pair: for point to point communication channel, low-grade local area network and telephone systems. -
coaxial cable: used in high-end LAN and telephone system long distance transmission. -
fiber: for high-speed local area network. As shown in Figure 7-4. -
● Other transmission media: magnetic media (such as disk and tape), field of vision signals (such as microwave and infrared) and satellite communications. -
3. Access control -
used to address multiple users contend for the channel use right and reasonable to complete the allocation of transmission channel technology. -
There are three most commonly used
: -
● IEEE 802.3 Bus access mode -
● IEEE 802.4 token passing bus access method -
● IEEE 802.5 Token Ring passing access method -
7.1.3 win2000 internal network use (slightly) -
7.1.4 Internet and CERNET-
1.Internet general -
● 1993 the Clinton administration proposed the building of the United States the -
● Internet, formerly known as Vision 1969, Planning Department, the U.S. Department of Defense (ARPA) to establish the ARPAnet (ARPANET), was first used for military trials. -
● China's computing and network infrastructure (NCFC), in April 1994 formally connected to the Internet, establishing the nation's highest CN main domain name server settings. -
● At present the international export of Management has the following four major Internet backbone: -
Chinese computing and network infrastructure projects (referred to NCFC) -
China Education and Research Network (referred to as CERNET) -
China Public Computer Internet (referred to as CHINANET) -
national public communication network (hereinafter referred to CHINAGBN, also known as the Golden Bridge Network) -
the first two to education, scientific research purposes, are non-profit nature; the latter two are commercial network. -
● abroad is the research, development and testing of new technology, next-generation broadband Internet, is academic as Internet2. -
● Internet and the internet means the difference between: -
① Internet refers specifically to the U.S. APA (ARPAnet) developed on the basis of the world's largest open computer network. Mainly uses the TCP / IP protocol communication. -
② internet generally refers to the number of interconnected computer networks, the functional and logical components of a large network. -
③ Internet in the Chinese translation for the Internet, and internet in the Chinese translation for the Internet. The Internet is an Internet. -
2.CERNET-
● CERNET (China Education and Research Network) is the China Education and Research Network demonstration project in 1994, the State Planning Commission approved 8 menstruation, presided over the implementation of the former State Education Commission. -
● CERNET overall goal of building -
● CERNET backbone will be built, including the national, regional networks and campus networks, including the three-level structure of the network. Figure 7-5. -
● CEKNET backbone network centers built in Tsinghua University. -
● my school campus under the CERNET backbone of the subnet of a Gigabit fiber, 100Mbps fiber optic connection through the central node in the northern Guangxi (Guangxi Normal University) on. -
Figure 7-5 -
3. Internet use initially -
(1) Internet's basic principle -
the magnitude of the Internet, regardless of the LAN is bound to solve the problem: -
① lines of communication problems: LAN is usually laid by the user, Internet to join the worldwide computer network engineering stand by the postal service or large T company. -
② communication protocol issues: LAN connection is usually the same type of computer, Internet on a wide range of computers, to consider the communication between different computers. In the Internet, the common language of communication is TCP / IP protocol. -
● TCP / IP in the form: TCP (Transmission Control Protocol) and IP (Internet Protocol). -
● TCP / IP works: -
is higher than the underlying IP protocol (specified in the structure of packets transmitted), requires a computer the information broken down into shorter packets sent. Information includes text and IP address. TCP protocol on top of IP protocols to prevent packet loss, IP packets of the inspection wrong. -
(2) Internet address on the form -
① Internet host number -
● with any Internet connected computer, known as the host. -
● The host computer 32-bit binary number by the number (4 bytes), with known host IP address. -
● IP address is a host in the Internet network, a unique identifier, with a network IP address is not allowed to repeat. -
● IP protocol version of the current IPV4 (32 bit), a new generation Ineternet2 is used in IPv6, the address length expanded to 128 bits. -
Example: a host's IP address (host number) is 11001010 01100000 11000000 00100010 -
be divided into 4 groups of eight, separated by decimal points. General use of each set of decimal number that ranges from 0 to 255, as shown in Figure 7-6. -
● 0 and 255 in the two addresses in the binary has a special purpose (for broadcast), each figure in the actual use of the range of 1 to 254. -
Figure 7-6 -
② Internet network number on -
● IP address consists of two parts: network identifier (network number) and host identifier (the local host number), as shown in Figure 7-7. -
Figure 7-7 -
● size of the network is divided into three categories according to: the type of network number network of representatives. -
large-scale network (A class): the first digital <128 (binary 0 at the beginning) -
IP address for the network number of the first paragraph, three paragraphs after the number for the local host number. As shown in Figure 7-8. -
Figure 7-8 -
medium-sized networks (B class): The first number in the range 128--191 between the (binary 10 at the beginning) -
IP address of the first two paragraphs for the network number, the latter two numbers for the local host number. Shown in Figure 7-9. -
Figure 7-9 -
small network (C class): The first number in the range 192--223 between the (binary 110 at the beginning) -
IP address of the first three paragraphs for the network number, the last section is the local host number. As shown in Figure 7-10. -
Figure 7-10 -
Thinking: The host is the host number is 202.193.64.34 which type of network? Their IP addresses, network numbers, numbers are what the local host? -
③ Internet host name - name -
● IP address rather abstract and difficult to remember, so the identity of the host name of the method can also be used, referred to as Domain Name System (English abbreviation for the DNS). -
● domain in any case of letters that most right part of the region must adhere to international standards (see P245), other parts of the option; with the IP address as the same network name can not be the same name. -
● send a message, the domain name server (the initials are also DNS) host name into IP addresses. -
● domain name in the area (most right part) is divided into two categories: -
one is composed of three letters, for the United States, the other is composed of two letters for the other countries except the U.S. (see P245). -
example: it sets the aforementioned number is 202.193.64.34 host named gliet (Guilin University of Electronic Technology in the English abbreviation), plus the right agency name and zone name, separated by a decimal point to get the host name is: gliet.edu.cn. The World Wide Web (WWW) site is expressed as in http://www.gliet.edu.cn -
(3) Internet basic service mode -
① electronic mail (E-MAIL): information exchange -
② file transfer (FTP-File Transfer Protocol): File Exchange -
③ remote login (TELNET): on the local machine to operate other computers -
④ integrated information services (GROPHER): menu-based information search -
⑤ Archie tools (ARCHIE): FTP server search -
⑥ Wide Area Information Service (WAIS): Information retrieval based on keywords -
⑦ World Wide Web (WWW): Based on information retrieval hypertext format -
⑧ Electronic News (USENET NEWS): dissemination of information bulletin boards -
(4) Internet access modes: -
① dial-up Internet access (UNIX host or SLIP / PPPP Protocol) -
② sub-network access (UNIX host or TCP / IP protocol) -
③ Dedicated Internet Access (DDN, ADSL, ISDN): By line Internet, users need to apply for access line and router. -
7.1.5 Browsing Internet-
● World Wide Web (World Wide Web-WWW or Web) is an Internet information retrieval tools under. -
● WWW client / server work. -
● client using a program called Web browser. For example: Internet Explorer (IE browser called) -
● browser pages to see the screen is called the (Web page); a number of related Web pages together to form a Web site. -
● Place Web site called the Web server computer. -
1. Internet settings -
● set the Internet is based on the existing network hardware and software configurations, access through the above three different ways, a personal computer connected to the Internet. -
● In IE, select the menu Tools / Internet Options on the Internet to set up, set the dialog box shown in Figure 7-13. -
Figure 7-13 -
2. IE5.0 Features Overview -
① browse multimedia information on the Internet, including text, sound, images, video and so on. -
② for text layout. -
③ access to almost all of the Internet resources. -
④ receive and send e-mail. -
⑤ custom history for quick return to have visited the Web page. -
⑥ collection of favorite Web site (bookmark), so that you can quickly access it. -
⑦ automatic processing of interactive forms. -
⑧ read Internet news and the Internet on their own articles published. -
⑨ ensure Internet data transmission and reception of information security. -
3. The use IE5.0 -
(1) start the IE5.0-
start other applications using the same method to start the Internet Explorer program. -
IE 5.0 window is formed as shown in Figure 7-14. -
Figure 7-14 -
(2) browse Internet -
browse Internet in two cases: -
① visit different sites -
in the address bar or use the menu File / Open the input IP address, as shown in Figure 7-14. -
Figure 7-15 -
② browse the different pages with a site -
● hyperlinks into the text on the page option or pictures, or on the page given in the dialog box input. -
● common tool button, as shown in Figure 7-16. -
Figure 7-16 -
4. Use the search engines -
● search engine, some Internet service providers to provide users of the site for the search service. -
● Users find information as long as the input to be the subject (keywords), search engine will find the website containing the keyword information, as shown in Figure 7-17. -
Figure 7-17 -
7.1.6 e-mail -
● E-mail (E-mail) is a messaging application of computer networks of modern means of communication. -
● handle e-mail on the Internet computer, called the mail server. -
● e-mail address (E-mail address) format: username @ mail server -
● E-Mail can send and receive mode with the tools (eg: Outlook Express, FOXMail, etc.), can also be used WEB way. -
1. to establish their own e-mail -
● e-mail service provider to apply for their e-mail: You can apply for the post office, or from a different site applications (such as the home page of my school dreams come true in the provision of email services). -
● application to provide the user name and password. -
example: wanghua@dreamer.glit.edu.cn -
which, wanghua for the user name; dreamer.glit.edu.cn for the mailbox server name. -
2. WEB ways to use e-mail -
enter your user name and password before you can receive and send the message. -
3. use Outlook Express tool to send and receive e-mail -
(1) set up the account -
① start OUTLOOK. -
② Select the menu Tools / account number or e-mail account settings in the main window item. -
③ In the Internet Accounts dialog box, click the Mail tab, select Add / messages, as shown in Figure 7-18. -
④ Enter the name; -
⑤ Enter E-mail address; -
⑥ Enter SMTP and POP3 servers are name (the string after the @ symbol), such as mail server for my school dreamer.glit.edu.cn; -
⑦ Enter the user name, password, complete the set. -
Figure 7-18 -
(2) e-mail -
① send a new message -
start Outlook, click the New Message button in the toolbar, write and send messages, as shown in Figure 7-19. -
② receive and read e-mail -
generally start Outlook will automatically receive messages; To manually receive, you can click Send / Receive button or select Tools menu Tools / Send and Receive. -
③ reply to a message in the message list to reply to messages, click the reply of the Tools button, edit the message, click Send / Receive tool button. As shown in Figure 7-20. 7.1.7 File Transfer ● file transfer (FTP) is the transmission of documents from the local to the remote host on the network (upload files) or files from a remote host access to the machine (Download file). -
● remote host on the network known as the FTP server. -
● There are several methods for file transfer. For example, file transfer tool dedicated Cutftp, with the IE browser directly with FTP, Win2000 comes with FTP, file transfer tools. -
1.CutftpFTP tool operation -
(1) Start Cutftp-
(2) Cutftp use -
● From: The local host file (folder) to the FTP server. -
in the server window (right), select the target location, locate and right-click the local disk window (left) in the corresponding file (folder), select the upload option. -
● Download: the FTP server files (folders) to the local host. -
window on the local disk (left), select the target location, locate and right-click the server window (right) in the corresponding file (folder), select the download option. -
as shown in Figure 7-21
interface. -
Figure 7-21 -
2. in the IE browser FTP operations -
(1) to connect to FTP server -
Method One: In the IE browser's address bar enter the IP address of FTP server and press Enter, as shown in Figure 7-22. Then select the menu file / registry, pop-up menu in the FTP server, enter the user name and password. -
Act II: In the IE browser's address bar together with the input IP address of FTP server and user name, password. As shown in Figure 7-23. -
2) FTP-related operations -
Once connected, you can offer the same operation as the operation of the local server. -
From: The local disk files (folders) to a server, a file folder. -
Download: The server file (folders) to a local disk to a folder. -
3.Win2000 FTP file transfer tool that comes with the operation -
(1) to connect to FTP server -
① Click the desktop Start / Run -
② In the Run dialog box, type FTP and press Enter -
③ In the ftp> prompt, enter the open and the server name or IP address and enter a user name and password. -
(2) the operation on the server -
the ftp> prompt for FTP-related operations. (Omitted) -
7.1.8 BBS (abbreviated) -
7.3 computer virus and its prevention -
7.3.1 the characteristics of computer viruses -
1. What is a computer virus -
● computer virus (CV-Computer Viruses) is the destruction of computer functions, programs and data, and can affect self-replicating computer using a set of computer instructions (man-made special small program code). -
● computer virus invasion by non-authorized data hidden in the computer system resources. -
● create computer virus is both a computer expert who is hateful criminals. -
2. The characteristics of computer viruses -
(1) computer virus mainly consists of three modules: -
● virus installed module (provide potential mechanisms) -
● virus modules (for regeneration mechanism) -
● virus excitation module (for excitation) -
(2) the characteristics of computer viruses: -
● infectious -
● hidden -
● latent -
● can be stimulating -
● destructive -
7.3.2 Classification of Computer Viruses -
1. According to the nature of the harm by computer viruses -
(1) benign virus -
(2) vicious virus -
2. According to the way computer viruses by the system -
(1) source virus (invasion of high-level language source code) -
(2) invasion of the virus (invasion of the target program) -
(3) operating system, virus (invasion of the operating system to gain control of the system) -
(4) shell virus (although not with the invasion process itself but can be activated to run the program) -
3. According to the spread of computer viruses by mode -
(1) disk boot sector virus infection (boot virus) -
(2) transmission of the virus executable program (file virus) -
7.3.3 Computer Virus Prevention -
1. The spread of computer viruses channels -
(1) via a floppy disk or removable disk (such as U disk) infection -
(2) through the machine (hard disk) infection -
(3) transmitted through the network -
2. Computer Virus Symptoms -
mainly as: -
● screen display anomaly -
● startup exception -
● machine runs slowed significantly -
● often unexpected crash or restart the phenomenon -
● file is accidentally deleted or the file contents to be tampered with -
● hidden files that do not know the source -
● file size change -
● important area is damaged disk cause the system to use exception -
● character display abnormal -
● machine unusual sounds -
3. Measures to guard against computer viruses -
● Do not use programs from unknown sources, external data and program areas must be checked for viruses. -
● Avoid all kinds of game software into the computer system -
● not at liberty to open unknown e-mail -
● should be added to the system software write protection -
● use the network should have antivirus firewall systems -
● regular procedures of the system virus check -
● backup of important data in order to reduce losses -
4. Computer anti-virus technology -
(1) anti-virus hardware technology -
mainly computer anti-virus card. -
(2) anti-virus software technologies -
● General Tools software: easy operation, low efficiency. -
● special anti-virus tools: KV3000, Rising, Kingsoft Internet Security and so on. -
5. frequently used anti-virus software -
7.4 computer information security knowledge -
7.4.1 The importance of computer information security -
information security in the information age is critical, mainly in the following areas: -
1.
Easy to share resources in people, but also brought information security risks. Therefore it is necessary to take effective at the macro level information management, but also at the micro address information security and confidentiality of the technical problems. -
2. of computer information security the main factor -
(1) computer information system security of the three characteristics: -
● confidentiality (to prevent unauthorized disclosure) -
● integrity (to prevent unauthorized modification) -
● availability (to prevent unauthorized access) -
(2) the vulnerability of computer information systems mainly in three areas: hardware, software, data. -
3. computer-related crime constitutes a direct hazard to information security -
computer crime has become an international problem, causing serious harm to society. Mainly in the form of computer crime: -
● hacking information systems, stealing important trade secrets; -
● intentional attacks against information systems, such as spreading viruses or destroy data; -
● illegal copying, publication and dissemination of illegal works; -
● unauthorized access to information systems, system resources, or unauthorized modification of data. -
7.4.2 Computer Security Technology -
computer information security technology at two levels: first level computer system security, and the second level of data security for the computer. -
1. computer information system security technology -
computer information system security technology is divided into two parts: the physical security and network security technology. -
(1) Physical security technology -
physical security technology measures are usually taken: -
● Natural Disaster Reduction, the destruction of computer hardware and software; -
● reduce the external environment on the computer system for adverse effects; -
● computer systems to reduce information leakage caused by electromagnetic radiation; -
● reduction of non-authorized users to access and use of computer systems, etc.; -
(2) network security technology -
● network security technology is the basis of computer information security technology. -
● present several representative network security technologies and protocols: firewalls (Firwall) technology, Kerberos technology and SSL / SHTTP technology. -
① Firewall (Firwall) technology -
● is now the most widely used network security technologies. -
● it is in the protected network and external networks to set a separation between the equipment for a geographically concentrated network provides the ability to resist external invasion, as shown in Figure 7-24. -
Figure 7-24 -
● firewall typically achieved in two ways: one is installed on a dual-port host system, connecting the internal network; one is installed in a public subnet. -
● firewall structure of the core part by the filters and gateways. -
● firewall both hardware and also software technology and communication protocols. -
② Kerberos technology -
both users (sender and prepared to receive side) to test the authentication method (security agreement). -
③ SSL / SHTTP Technology -
● SHTTP used to maintain communication with the Web server security; -
● SSL is a TCP / IP communication protocol on the security protocol. -
④ function network security protocols: -
● user identity and authentication (password, fingerprint, etc.) -
● Access Control (setting permissions) -
● Data integrity (anti-illegal write, data association, etc.) -
● encryption (cryptography) -
● Anti denied (sending and receiving parties must be sure) -
● Audit (Log Tracking) -
● fault-tolerant (mirrored mode) -
2. computer information systems data security technology -
● data encryption, data security is to ensure the most effective method. -
● information security in computer systems, cryptography is mainly used for data encryption, but also used in communications confidential. -
● cryptography, data security embodies the three elements: confidentiality, integrity and availability. -
● cryptography has experienced two stages: stage one is a classic cryptography; the other is the stage of modern cryptography. -
● cryptography to form two types of cryptography: the traditional cryptography and public key cryptography. -
7.4.3 computer information security regulations -
1. For computer information system security laws -
● 1994, the State Council promulgated the
● 1996, the State Council promulgated the
● 1996 Ministry of Public Security issued the
● 1997 Ministry of Public Security issued the
● 2000 National Security Bureau issued a
● issued by the Ministry of Posts and Telecommunications,
2. on intellectual property laws -
are: -
● Seventh Standing Committee September 7, 1990 through, June 1, 1991 implementation of the
● 1991 年 10 月 11 implemented on the
● 1994 年 7 月 5 implemented on the
● 1997 年 10 月 10 implemented on the new -
  Reply With Quote

Sponsored Links
Old 04-11-2011, 01:47 PM   #2
Engithunwinny
 
Posts: n/a
Default London Drugs Pharmacies In Bc

Cancer Drugs And Treatment http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>buy allegra</a> Claritin is a drug for allergy relief that has been successfully with hundreds of millions of dollars to television marketing with unforgettable commercials. asthma medication Potent allergy relief extends indoors and outdoors to all areas of your life. http://babyjoggerii.com/ - allegra online
  Reply With Quote
Old 04-11-2011, 01:48 PM   #3
Engithunwinny
 
Posts: n/a
Default Canine Chf Medications

Cardiac Heart Failure Medication http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>generic medrol</a> You only take Allegra once daily, and it is nonsedating with one pill and 2 ingredients. buy allegra online It is more toxic if it is taken multiple times throughout the day versus just taken once a day at the right dosage. http://babyjoggerii.com/ - generic allegra
  Reply With Quote
Old 04-11-2011, 01:49 PM   #4
Engithunwinny
 
Posts: n/a
Default Texas Board Of Veterminary Medicine

Cat Flea Medicine Yearly Shot http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>asthma treatment</a> Claritin. buy allegra Medrol. http://babyjoggerii.com/ - allegra no prescription
  Reply With Quote
Old 04-11-2011, 01:50 PM   #5
Engithunwinny
 
Posts: n/a
Default Weight Loss Drug Dogs

Celecoxib Medicine http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>generic medrol</a> Free Shipping for Bulk Orders order medrol Anti Allergic/Asthma medsFDA-Approved Medications http://babyjoggerii.com/ - order claritin
  Reply With Quote
Old 04-11-2011, 01:50 PM   #6
Engithunwinny
 
Posts: n/a
Default Recessed Medicine Cabinet 36

Chain Drug http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>allegra no prescription</a> Potent allergy relief extends indoors and outdoors to all areas of your life. cheap allegra The dose should then be adjusted based on the response. http://babyjoggerii.com/ - cheap medrol
  Reply With Quote
Old 04-11-2011, 01:51 PM   #7
Engithunwinny
 
Posts: n/a
Default Anti Congestion Medicine

Chemotherapy Drug Handbooks http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>buy allegra online</a> You only take Allegra once daily, and it is nonsedating with one pill and 2 ingredients. order medrol There are Claritin Tablets, Claritin Liqui-Gels, and Claritin-D 24-Hour. http://babyjoggerii.com/ - buy claritin online
  Reply With Quote
Old 04-11-2011, 01:54 PM   #8
Engithunwinny
 
Posts: n/a
Default Pneumonia Drug Treatment

Cigna Coverage Position Complementary Medicine http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>allegra online</a> 15% Discount on Reorders Anti allergic/asthma drugs at discounted price! Order it at reputable online pharmacy and save money. anti allergic drugs Claritin. http://babyjoggerii.com/ - order medrol
  Reply With Quote
Old 04-11-2011, 01:55 PM   #9
Engithunwinny
 
Posts: n/a
Default Medicine For Skin Fungus

Clinical Study Of Ayurvedic Medicine http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>asthma drugs</a> The special technology in this drug releases the medicine slowly over time so that you have all-day relief from allergies and can go about your day in peace instead of having to stay couped up inside for fear of allergies. claritin online 15% Discount on Reorders Anti allergic/asthma drugs at discounted price! Order it at reputable online pharmacy and save money. http://babyjoggerii.com/ - buy medrol online
  Reply With Quote
Old 04-11-2011, 01:55 PM   #10
Engithunwinny
 
Posts: n/a
Default Concentr Drug Testing

Cod Liver Oil Arthritis Drug http://babyjoggerii.com/
<a href=http://babyjoggerii.com/>allegra without prescription</a> No Prescription is Needed claritin without prescription Children can even take Claritin in the form of Claritin 12-Hour RediTabs Tablets for Kids, Children’s Claritin Grape Chewables, and Children’s Claritin Grape Flavored Syrup. http://babyjoggerii.com/ - buy claritin online
  Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off


All times are GMT. The time now is 11:07 AM.

 

Powered by vBulletin Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Free Advertising Forums | Free Advertising Message Boards | Post Free Ads Forum