ID
int64
383
2.08k
Split
stringclasses
1 value
Domain
stringclasses
4 values
SubDomain
stringclasses
24 values
Format
stringclasses
1 value
Tag
stringclasses
2 values
Language
stringclasses
1 value
Question
stringlengths
28
336
Answer
stringclasses
2 values
Explanation
stringlengths
29
771
995
Test
Computer Organization
Input/Output System
Assertion
Knowledge
English
Chinese characters are displayed using a dot matrix font, with each character represented by a 16x16 dot matrix. Therefore, the font library capacity for 7500 Chinese characters is 1MB.
False
null
996
Test
Computer Organization
Input/Output System
Assertion
Reasoning
English
Only in computers with specialized I/O instructions can I/O devices be addressed independently.
True
Under the isolated I/O addressing mode, the CPU needs to use dedicated input/output instructions to access I/O devices.
997
Test
Computer Organization
Input/Output System
Assertion
Reasoning
English
Under unified addressing, the corresponding I/O address for I/O devices can be arbitrarily located anywhere in the address space.
True
Under unified addressing, I/O addresses should follow certain rules and be fixed, and cannot be arbitrarily assigned.
998
Test
Computer Organization
Input/Output System
Assertion
Reasoning
English
The purpose of setting up interrupt priority queuing logic is to ensure that the highest priority request among those presented simultaneously receives a timely response.
True
The purpose of the interrupt priority queuing logic is to ensure that the highest priority request among those presented simultaneously can receive a timely response.
999
Test
Computer Organization
Input/Output System
Assertion
Reasoning
English
In DMA transfer mode, a DMA request is issued by the DMA controller, and during the transfer, the bus control is dominated by the DMA controller.
False
In DMA transfer mode, the external device sends a DMA request signal to the DMA controller, which then sends a bus request signal to the CPU.
1,444
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
The total length of the MAC frame header and trailer is 18 bytes.
True
null
1,445
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
In the data link layer, common protocols include ARP, ICMP, IP, and OSPF.
False
null
1,446
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
The collision domain refers to the number of stations that can receive the signal.
True
null
1,447
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
The total length range of a MAC frame is from 46 bytes to 1500 bytes.
False
null
1,448
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
The control part of the MAC frame occupies 18 bytes.
True
null
1,449
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
In the flag field of the IP datagram, DF indicates that fragmentation is allowed, and MF indicates that it is not the last fragment.
False
null
1,450
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
The primary operational layer of a router is the Data Link Layer.
False
null
1,451
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
The functions of computer networks include connecting various computers, enabling resource sharing, message transmission, and maintaining the relative independence of each computer.
True
null
1,452
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
Computer software is a device belonging to the resource subnet.
True
null
1,453
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
Computer networks are divided into Wide Area Networks (WAN), Metropolitan Area Networks (MAN), and Local Area Networks (LAN), primarily based on the scope of the network's functionality.
True
null
1,454
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
Metropolitan Area Network (MAN) is a new technology proposed to phase out Local Area Networks (LAN) and Wide Area Networks (WAN).
False
null
1,455
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
WANs typically adopt a bus topology.
False
null
1,456
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
In a star topology with n nodes, there are n-1 physical links.
True
null
1,457
Test
Computer Network
Overview and Architecture
Assertion
Knowledge
English
In the OSI reference model, the relationship between layer n and the layer above it, layer n+1, is that layer n and layer n+1 do not affect each other.
False
null
1,458
Test
Computer Network
Overview and Architecture
Assertion
Reasoning
English
In the OSI reference model, the protocol layer that implements end-to-end acknowledgment, packet sequencing, and flow control is the Transport Layer.
True
Only communication at the transport layer and above can be referred to as end-to-end. The session layer manages dialogues between processes on different machines, while the transport layer implements acknowledgment, packet sequencing, and flow control functions.
1,459
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
Nyquist's theorem limits bandwidth.
False
null
1,460
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
Shannon's theorem applies to situations with limited bandwidth.
True
null
1,461
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
In computer networks,mechanical properties are primarily concerned with timing.
False
null
1,462
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
The characteristic of a hub is that it has the ability to direct signal transmission.
False
null
1,463
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
If the conditions of both the Nyquist theorem and Shannon's theorem are met, the smaller value should be chosen to set the limit.
True
null
1,464
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
With a baud rate of 2400 and 4 bits per baud, the bit rate is 4800 bps.
False
null
1,465
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
In Shannon's theorem, bandwidth refers to the width of the transmission medium.
False
null
1,466
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
The main disadvantage of circuit switching is low efficiency.
False
null
1,467
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
Factors that primarily affect the maximum transmission rate of a channel include the transmit power and the noise power.
False
null
1,468
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
Twisted pair is made by twisting two insulated wires together, with the purpose of reducing interference.
True
null
1,469
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
Utilize a coaxial cable to interconnect hosts to form an Ethernet, with the communication method between hosts being indeterminate.
False
null
1,470
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
Coaxial cables have a faster transmission rate than twisted pair cables, thanks to their higher shielding effectiveness and better noise immunity.
True
null
1,471
Test
Computer Network
Physical Layer
Assertion
Knowledge
English
Generally speaking, networks connected by hubs are topologically classified as mesh.
False
null
1,472
Test
Computer Network
Physical Layer
Assertion
Reasoning
English
The information transmission rate refers to the number of symbols transmitted per second on a communication channel.
False
The information transmission rate refers to the number of bits transmitted per second (bits per second, bps) on a communication channel, not the number of symbols. The symbol rate (or baud rate) refers to the number of symbols transmitted per second. These are different concepts. The relationship between the information transmission rate and the symbol rate depends on the number of bits each symbol represents. In some cases, they might be equal, but generally, they are different.
1,473
Test
Computer Network
Physical Layer
Assertion
Reasoning
English
The main improvement of packet switching over message switching is that it simplifies the routing algorithm.
False
Compared to message switching, packet switching involves dividing messages into packets with a fixed maximum length and transmitting them on a packet-by-packet basis.
1,474
Test
Computer Network
Physical Layer
Assertion
Reasoning
English
Circuit switching does not provide error control functions.
True
Circuit switching does not provide error control functions. In circuit switching, a dedicated communication path is established and maintained between the communicating parties until the communication session ends. This method is mainly used in traditional telephone networks. Circuit switching focuses on establishing and maintaining a continuous transmission path, rather than performing error detection and correction during transmission. Error control functions are typically implemented by higher-level protocols (such as transport layer protocols) rather than by circuit switching itself.
1,475
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
CSMA/CD is primarily used in Wide Area Network (WAN).
False
null
1,476
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
The IEEE 802.3 Ethernet uses the CSMA/CD access control method.
True
null
1,477
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
In zero bit stuffing, the flag for frame start and frame end is 1111110.
True
null
1,478
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
The primary function of the high-speed buffer memory in data link layer devices is to cache the data between the main memory and the CPU.
True
null
1,479
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
In CSMA/CD, a random backoff algorithm is used.
False
null
1,480
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
In the channel reservation process of CSMA/CA, the receiver returns an ACK frame.
True
null
1,481
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
The most fundamental service of the data link layer is to provide reliable data transmission.
True
null
1,482
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
The primary protocol of the data link layer is Ethernet.
True
null
1,483
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
Cyclic Redundancy Check (CRC) is generated based on the length of the data.
False
null
1,484
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
In the bus topology of the data link layer, collisions may occur when the topology becomes too complex.
False
null
1,485
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
The functions of the data link layer protocol do not include defining the data format.
False
null
1,486
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
The main functions of a network card are implemented at the physical layer and the data link layer.
True
null
1,487
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
The IEEE 802 local area network standards correspond to the Data Link Layer and Network Layer of the OSI reference model.
False
null
1,488
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
Gigabit Ethernet supports both full-duplex and half-duplex modes.
True
null
1,489
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
Link aggregation is not an advantage of Virtual Local Area Networks (VLANs).
True
null
1,490
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
In the commonly used operational modes of HDLC, the transmission process can only be initiated by the primary station in Asynchronous Response Mode.
True
null
1,491
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
A switch is a device that cannot segment collision domains.
False
null
1,492
Test
Computer Network
Data Link Layer
Assertion
Knowledge
English
A set of workstations connected by a switch forms a broadcast domain, but not a collision domain.
True
null
1,493
Test
Computer Network
Data Link Layer
Assertion
Reasoning
English
The characteristic of parity check code is that it can detect an error in any single bit of arbitrary length.
False
The principle of parity check is to add a few extra bits to make the number of "1"s in the codeword remain even or odd. It can only detect an odd number of bit errors.
1,494
Test
Computer Network
Data Link Layer
Assertion
Reasoning
English
For a 10-bit data transmission, if Hamming code is used, an additional 6 bits of redundant information are required.
False
Attach r redundant bits to k information bits to form a k+r bit codeword, which must satisfy 2^r >= k + r + 1. If the value of r is less than or equal to 11 and greater than 4, then r = 4. For 10-bit data, 4 redundant bits need to be added.
1,495
Test
Computer Network
Data Link Layer
Assertion
Reasoning
English
If the ARO protocol with N-frame lookback is used for flow control and the sequence number field is 7 bits, then the maximum length of the send window is 127.
True
When the receive window moves forward as a whole, the sequence numbers in the new window overlap with those in the old window, making it impossible for the receiver to distinguish whether the sender is retransmitting or sending a new frame. Therefore, in the subsequent N ARQ protocols, the transmission window W_T <= 2^(n-1). In this question, n=7, so the maximum length of the transmission window is 127.
1,496
Test
Computer Network
Data Link Layer
Assertion
Reasoning
English
The characteristic of the transmission medium used in TDM is that the bit rate of the medium is higher than the bit rate of a single signal.
True
Time Division Multiplexing (TDM) shares bandwidth by allocating channels in a time-divided manner. Time is divided into equal-length time slots of TDM, and each user participating in bandwidth sharing occupies a fixed sequence number slot in each TDM. Clearly, in this case, the bit rate of the medium is greater than the bit rate of a single signal.
1,497
Test
Computer Network
Data Link Layer
Assertion
Reasoning
English
Computer networks use TDM more than FDM because TDM can utilize bandwidth more efficiently.
False
Compared to FDM, TDM has stronger anti-interference capabilities, allowing for progressive regeneration and reshaping to prevent the accumulation of interference. Moreover, digital signals are relatively easy to convert automatically. Therefore, based on the working principles of FDM and TDM, FDM is suitable for transmitting analog signals, while TDM is applicable to transmitting digital signals.
1,498
Test
Computer Network
Data Link Layer
Assertion
Reasoning
English
The primary function of a multiplexer is to combine transmissions from two or more lines.
True
The primary function of a multiplexer is to combine transmissions from two or more lines to make full use of the channel.
1,499
Test
Computer Network
Data Link Layer
Assertion
Reasoning
English
The HDLC protocol uses the character stuffing method with beginning and ending flag delimiters to achieve transparent transmission.
False
HDLC uses zero bit stuffing to achieve transparent transmission at the data link layer (while the PPP protocol uses byte stuffing), which means no six consecutive "1" bits appear between two flag fields. The specific method is as follows: at the transmitter, before a bit is added to the flag field, the hardware scans the bit stream, and whenever five consecutive "1" bits are detected, a "0" is inserted after them; at the receiver, the F field is located first to determine the boundary, then the bit stream within it is scanned, and whenever five consecutive "1" bits are found, the "0" following these five "1" bits is removed, thereby restoring the original bit stream.
1,500
Test
Computer Network
Data Link Layer
Assertion
Reasoning
English
In a local area network using Ethernet switches, multiple ports of the switch can transmit in parallel.
True
In a local area network using an Ethernet switch, the multiple ports of the switch can transmit in parallel because the switch has an independent switching matrix. Each port has its own bandwidth and connection path, allowing the switch to handle data transmissions between multiple ports simultaneously without conflicts or interference. This enables the switch to efficiently manage and forward data packets, significantly improving network transmission efficiency and throughput.
1,501
Test
Computer Network
Network Layer
Assertion
Knowledge
English
In the classification of IP addresses, the first byte range of Class A addresses is 64-127.
True
null
1,502
Test
Computer Network
Network Layer
Assertion
Knowledge
English
The IP address is 192.168.1.100 with a subnet mask of 255.255.255.0, and its subnet range is 192.168.1.0 - 192.168.1.63.
False
null
1,503
Test
Computer Network
Network Layer
Assertion
Knowledge
English
The full name of the RIP protocol is Routing Information Protocol.
True
null
1,504
Test
Computer Network
Network Layer
Assertion
Knowledge
English
In the ICMP protocol, the Ping command belongs to the Echo Reply message type.
False
null
1,505
Test
Computer Network
Network Layer
Assertion
Knowledge
English
The reason for IP packet fragmentation is to prevent packet loss.
False
null
1,506
Test
Computer Network
Network Layer
Assertion
Knowledge
English
The IP packet size is 3500B, and the MTU is 1500B, so the packet will be fragmented. In the fragmented packets, the offset of the first fragment is 0.
True
null
1,507
Test
Computer Network
Network Layer
Assertion
Knowledge
English
The ARP protocol is used to resolve MAC addresses.
False
null
1,508
Test
Computer Network
Network Layer
Assertion
Knowledge
English
In an IPv6 address, 96 bits are used for network identification.
False
null
1,509
Test
Computer Network
Network Layer
Assertion
Knowledge
English
The function of the TTL field in an IP datagram is to limit the lifespan of the datagram.
True
null
1,510
Test
Computer Network
Network Layer
Assertion
Knowledge
English
The primary function of the Ping application is to test for network faults.
True
null
1,511
Test
Computer Network
Network Layer
Assertion
Knowledge
English
A management domain is an Autonomous System (AS).
True
null
1,512
Test
Computer Network
Network Layer
Assertion
Knowledge
English
An IPv4 address has 32 bits.
True
null
1,513
Test
Computer Network
Network Layer
Assertion
Knowledge
English
ICMP messages are encapsulated within the UDP protocol.
False
null
1,514
Test
Computer Network
Network Layer
Assertion
Knowledge
English
A hub is a device that cannot segment broadcast domains.
False
null
1,515
Test
Computer Network
Network Layer
Assertion
Knowledge
English
In the IP header fields, the field unrelated to fragmentation and reassembly is the Identification.
False
null
1,516
Test
Computer Network
Network Layer
Assertion
Knowledge
English
255.255.255.0 is an example of a subnet mask, not a loopback address.
False
null
1,517
Test
Computer Network
Network Layer
Assertion
Knowledge
English
A host has two IP addresses, one address is 192.168.11.25, and the other address might be 192.168.11.24.
False
null
1,518
Test
Computer Network
Network Layer
Assertion
Knowledge
English
According to the NAT protocol, 192.172.56.23 is not allowed to appear on the Internet.
False
null
1,519
Test
Computer Network
Network Layer
Assertion
Knowledge
English
The packet forwarding part of the routing table consists of input ports.
False
null
1,520
Test
Computer Network
Network Layer
Assertion
Reasoning
English
In link-state routing algorithms, after each router obtains the complete topology of the network, it uses the Dijkstra's shortest path algorithm to determine the path lengths to other routers.
True
In link-state routing algorithms, routers build a complete network topology by exchanging the delay or cost from each node to its neighboring nodes. Once the complete topology is obtained, routers use the Dijkstra shortest path algorithm to calculate the shortest paths to all nodes.
1,521
Test
Computer Network
Network Layer
Assertion
Reasoning
English
If a router receives an IPv6 packet that is too large to be forwarded onto a link, the router will forward the packet to a link that can support it.
False
IPv6 does not allow fragmentation. Therefore, if a router discovers that an incoming datagram is too large to be forwarded onto a link, it will discard the datagram and send an ICMP message to the sender indicating that the packet is too large.
1,522
Test
Computer Network
Network Layer
Assertion
Reasoning
English
Typical routers can support multiple network layer protocols and provide packet forwarding between different protocols.
True
Typical routers can indeed support multiple network layer protocols and provide packet forwarding between different protocols. The main function of a router is to forward data packets from one network to another based on the destination address. This process usually involves supporting and handling multiple network layer protocols, such as IPv4 and IPv6. Additionally, routers can use different routing protocols (such as RIP, OSPF, BGP) for route selection and can perform conversion and packet forwarding between different network layer protocols to ensure that data packets are correctly transmitted across different types of networks.
1,523
Test
Computer Network
Network Layer
Assertion
Reasoning
English
The algorithm that determines the values in a router's forwarding table is the routing algorithm.
True
Since the forwarding table is generated based on the routing table, and the routing table is derived from the routing algorithm, the routing algorithm determines the values in the forwarding table.
1,524
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
The two common protocols at the transport layer are TCP and UDP.
True
null
1,525
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
The establishment of a transport layer connection is achieved through the synchronization phase.
True
null
1,526
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
Multiplexing is achieved through MAC addresses.
False
null
1,527
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
The timeout interval for retransmission is typically determined by the round-trip time (RTT).
True
null
1,528
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
The transport layer is responsible for handling the signal transmission of the physical layer.
False
null
1,529
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
The transport layer provides logical communication between routers.
False
null
1,530
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
The UDP datagram header does not include the length of the UDP datagram header.
True
null
1,531
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
The TCP protocol of the server specifies that the port number for the HTTP process is 80.
True
null
1,532
Test
Computer Network
Transport Layer
Assertion
Knowledge
English
To ensure the reliability of data transmission, TCP employs an acknowledgment mechanism for message segments.
True
null
1,533
Test
Computer Network
Application Layer
Assertion
Knowledge
English
The error detection mechanism used by TCP is a digest algorithm.
False
null
1,534
Test
Computer Network
Application Layer
Assertion
Knowledge
English
In the four-way handshake process, the second handshake is initiated by the client.
True
null
1,535
Test
Computer Network
Application Layer
Assertion
Knowledge
English
The main methods of TCP congestion control include the window mechanism and flow control.
False
null
1,536
Test
Computer Network
Application Layer
Assertion
Knowledge
English
The establishment phase of a TCP connection is completed through a two-way handshake.
False
null
1,537
Test
Computer Network
Application Layer
Assertion
Knowledge
English
One of the characteristics of the UDP protocol is that it provides reliable transmission.
False
null
1,538
Test
Computer Network
Application Layer
Assertion
Knowledge
English
The methods of congestion control include the slow start algorithm and the congestion avoidance algorithm.
True
null