1. In WLAN, the ID used by the client device to access the access point (AP) is ()
A. BSSID B.ESSID C.SSID D.IP Address
Correct answer: C
Resolution: AP is the abbreviation of (Wireless) Access Point, that is, wireless access point.
SSID is the abbreviation of Service Set Identifier, that is, service set identifier.
The wireless network card can enter different networks with different SSIDs. SSIDs are usually broadcast by the AP or wireless router. In short, SSIDs are the names of a LAN. Only computers with the same SSID name can communicate with each other. In WLAN, client devices access access points (APs) through SSIDs.
2. The smart bracelet is a common intelligent wearable device. Teacher Zhang knows his steps, heart rate, sleep and breathing information through the smart bracelet he wears. Then the smart bracelet is to obtain teacher Zhang's personal body information by ().
A. Identification technology B. Sensing technology C. Computing technology D. Storage technology
Correct answer: B
Analysis: The smart bracelet obtains personal body information by sensing technology.
3. People all over the world can use the Internet to watch the wonderful Olympic projects without leaving their homes, which mainly reflects the () characteristics of computer networks.
A. Data transmission B. Resource sharing C. Distributed processing D. Internet of things
Correct answer: B
Analysis: People around the world use the Internet to watch the Olympic Games, which mainly reflects the resource sharing characteristics of computer networks.
4. The incorrect description of the software is ()
A. Photoshop software can cut, resize, and adjust brightness of pictures
B. Software can be divided into system software and application software
C. Common system software includes WPS, Photoshop, EXCEL, etc
D. The Windows system will become slower and slower as it is used longer
Correct answer: C
Analysis: System software refers to a system that controls and coordinates computers and external equipment, supports the development and operation of application software, and is a collection of various programs without user intervention. Its main function is to schedule, monitor and maintain computer systems.
Application software is a collection of various programming languages that can be used by users, as well as application programs compiled in various programming languages. It is divided into application software packages and user programs. Application software package is a collection of programs designed to solve certain problems by computers, which is used by multiple users.
WPS, Photoshop and EXCEL are application software, not system software.
5. "Third party" is a legal term. When visiting the website, "third party" refers to ()
A. Website B. Other person or organization C. User D. Website or user
Correct answer: B
Analysis: The third party refers to an object other than two interrelated subjects. When visiting a website, "third party" refers to an object other than the website or users.
6. The following statement is correct about preventing computer viruses ()
Install anti-virus software and enable real-time monitoring
Frequently update the operating system and important software
Open Add ins in Browser
Antivirus before using removable storage device
Open the email sent by strangers at random after completing the computer's full disk virus scanning
A. B. C. D.
Correct answer: B
Parsing: The add in in the browser is to load some service items. For example, we use Pinyin input method, Thunderbolt, fast broadcast plug-in, flash plug-in. Without these add ons, corresponding services cannot be obtained.
After the computer's full disk virus scanning, you can't open the email sent by strangers at will.
7. Among the following options that do not belong to the information system security management phase is ()
A. Design and planning stage B. Pre defense stage C. Post response stage D. Real time monitoring stage
Correct answer: A
Analysis: The information system security management phase includes the pre defense phase, the real-time monitoring phase, and the post response phase.
8. When the movement speed is very fast, you need a distance to buffer if you want to stop. This is the concrete embodiment of Newton's first law in life. Such verified book contents as Newton's First Law are called ()
A. Knowledge B. Data C. Information D. Wisdom
Correct answer: A
Analysis: Knowledge is the sum of knowledge and experience gained by people in the practice of transforming the world.
9. In the WPS table, a complete function includes ()
A. Function name and variable B. "=" and function name
C. "=", operator and variable D. "=", function name and variable
Correct answer: D
Resolution: Complete functions in WPS table include: "=", function name and variable.
10. The following can be solved by enumeration algorithm is ()
A. Given the length of three sides of a triangle, find the area of the triangle B. Find all three digits that can be divided by 15 and 25
C. Given the upper bottom, lower bottom and height of the trapezoid, calculate the area of the trapezoid D. Convert the decimal number to binary
Correct answer: B
Resolution: Enumeration algorithm is the most commonly used algorithm in our daily life. Its core idea is to enumerate all possibilities. The essence of enumeration is to search for the correct solution from all candidate answers.