MCPA试题
- 格式:docx
- 大小:33.53 KB
- 文档页数:8
CDMA网络优化试题一、填空题(每题1分,共20分)1.无线信号在水面上传播比在空气中传播的损耗 __ 大____ (大/小),无线信号的频率越高,在空气中传播的损耗越__ 大____ (大/小)。
2.FER和 C/I,Ec/Io 均可用于表征无线信号质量的好坏,其中文名称为:FER:误帧率_,C/I:载干比 _,Ec/Io:信噪比。
3.当某一个导频的强度超过T_ADD时,移动台会向基站发送 PSMM ,并且把该导频列入候选集。
4.CDMA系统用到的三种码是_PN码_ , walsh 码,长码。
其中区分前向信道的是walsh 码。
5.CDMA系统的前向信道有_导频信道,同步信道,寻呼信道,前向业务信道。
反向信道有接入信道,反向业务信道。
6.A+接口是 BSC 和 msc 之间的接口, A-BIS接口是_ MS 和BTS之间的接口。
7.程控交换系统采用的信令方式是 NO.7。
8.参数T_COMP是候选集与激活集的比较门限。
9.CDMA系统中的导频集有4种,是激活集,候选集,邻集,剩余集。
10.CDMA系统的功率控制按上下行分为前向功率控制和反向功率控制,其中 _反向功率控制可以是开环功率控制。
11. CDMA系统软切换比例的含义(含切换的话务量-不含切换的话务量)/(含切换的话务量)×100%。
软切换比例通常应在 35%范围左右比较合适。
12.一般来说,GSM手机最大发射功率是__2___W, CDMA手机最大发射功率是___0.1___W。
13.小区覆盖过大有几种原因,列出3种:导频功率过大,下倾角过小,天线太高14.在PN规划中,若PilotInc=4,那么可用的PN有_128_个。
15. CDMA Active Set的搜索窗口SrchWinA设置的作用是补偿激活集多径延迟_。
16. CDMA 的PSMM 信令的中文意思导频测量消息 .17. CDMA 的PMRM信令的是反向功率控制中的信令. 是由_MS发出的.18.CDMA 中的一个CHIP 的时延是多少 0.244公里.19.CDMA 中的一个话务帧是多少_20_毫秒.20.CDMA 中 , 寻呼信道使用第 1-7 个WALSH 码,导频信道使用第__0_个WALSH 码,同步信道使用第__32_个WALSH 码,话务信道使用 8-31 , 33-63 WALSH 码二、判断题(每题1分,共20分)1.TDMA是将不同时段的业务信道分配给不同的用户;FDMA是将不同频段的业务信道分配给不同的用户;而CDMA就是指用户在同一时间、同一频段上根据编码获得业务信道。
WLAN代维技能认证理论试题(100分)地市代维公司姓名分数一、填空(每空1分,共10分)1、香农公式表明:信道的带宽或信道中的信噪比越大,则信息的极限传输速率就越大。
2、IEEEIEEE802.11n标准使用双频段 2.4G 和 5.8G ,理论传输速率可以达到600Mbps 。
3、在以太网上使用集线器,不可避免的会产生冲突,我们采用 CSMA/CD 技术来避免这种冲突的发生。
4、WLWLAN网络规划可以分为以下几个步骤:调研及勘查、频率规划、容量规划、网络优化。
5、ISM中802.11g频段2.4Ghz中每个信道的占用频宽为 20 Mhz 。
二、单选题(每题3分,共30分)1、安常见光纤的工作波长( D )。
A:850nm; B:1310nm; C:1550nm; D:以上都是;2、AP天线部署在走廊,房间内无线信号弱时该如何优化无线信号( A )。
A:改变AP天线位置靠近房间门口;B:更换定向AP天线;C:调整AP工作信道;D:开启WMM功能;3、室内覆盖,为了美观可以使用( C )A:杆状天线;B:抛物面天线;C:吸顶天线;D:平板天线;4、下面哪个TCP/IP网际层协议可以提供ping和traceroute这样的故障诊断功能。
(A )A: ICMP;B:IGMP;C:ARP;D:RARP;5、在材料同等厚度的情况下,下列哪种材料对2.4GHz的RF信号的阻碍作用最小______?( D )A: 混凝土;B:金属;C:钢;D:干墙;6、在工程验收规范中,馈线实际使用长度与设计长度的正向误差不大于( B )。
A: 5%;B:10%;C:15%;D:20%;7. 下例哪个无线城域网WMAN主要的技术标准(A )。
A: WiMAX;B:WiFi;C:HiperLAN;D:WPA;8、以下关于各种类型路由特点的说法,哪个是不正确的.( B )A: 低呼损直达路由不允许话务量溢出到其它路由;B:高效直达路由的呼损不能超过1%,该路由允许有话务溢出到其它路由;C:选路顺序是先选直达路由,其次迂回路由,再次基干路由;D:一个局向可设置多个路由;9、下列正确的说法有。
2019年下半年网络规划设计师考试上午试题及解析2019下半年网络规划设计师上午试题分析与解答【深圳市盐田区盐田高级中学信息技术组李发成】试题(1)(2)一个大型软件系统的需求总是有变化的。
为了降低项目开发的风险,需要一个好的变更控制过程。
如下图所示的需求变更管理过程中,①②③处对应的内容应是(1);自动化工具能够帮助变更控制过程更有效地运作,(2)是这类工具应具有的特性之一。
(1)A 、问题分析与变更描述、变更分析与成本计算、变更实现B 、变更描述与变更分析、成本计算、变更实现C 、问题分析与变更分析、变更分析、变更实现D 、变更描述、变更分析、变更实现(2)A 、变更维护系统的不同版本B 、支持系统文档的自动更新C 、自动判定变更是否能够实施D 、记录每一个状态变更的日期和做出这一变更的人分析:考记忆力的题,略。
试题(3)用例(use case)用来描述系统对事件做出响应时所采取的行动。
用例之间是具有相关性的。
在一个会员管理系统中,会员注册时可以采用电话和邮件两种方式。
用例“会员注册”和“电话注册”、“邮件注册”之间是(3)关系。
A. 包含(include )B.扩展(extend)C. 泛化(generalize )D. 依赖(depends on)分析:包含关系:用于将部分工作流程分离出去,对这部分工作流程来说,基本用例只取决于结果,与获得结果的方法无关。
扩展关系:将扩展用例与基本用例连接了起来,通过在基本用例中引用扩展点,可以定义在基本用例的哪些位置插入扩展用例泛化(Generalization )表示一个更泛化的元素和一个更具体的元素之间的关系,现实世界中一般与特殊关系就是最好的表现。
依赖(depends on):一个实体的发生变化后,可能影响依赖于它的其他实例。
这种关系表明,如果类A 被修改,那么类B 会受到影响。
试题(4)(5)RUP 强调采用(4)的方式来开发软件,这样做的好处是(5)。
2022MCPD真题模拟及答案(1)1、包装人员在印制不同批号的箱签时,下列说法正确的是()。
(单选题)A. 每个批号留样一张B. 由于未更换印制字模,留印制第一张即可C. 若物料有多个批号,则对该批预计使用完的包材进行留样,未使用完的包材可以在下一个批次进行留样D. 箱签属于外箱一个标识,箱内有小盒和瓶签用于区分,所以箱签可不强制规定试题答案:A2、选择一个虚拟化存储解决方案需要考虑的因素中最合适的是哪个选择?()(单选题)A. 应该支持有效的开放标准,如SMI-SB. 安装实施过程对业务中断影响最小C. 应该能够对各类应用提供满意的处理性能、可用性及可复原性D. 以上所有各项试题答案:D3、在SVC环境中,关于服务器端的描述哪条是错误的?()(单选题)A. 服务器尽管不与物理存储连接,但仍需要安装与物理存储相关的通道管理软件才能正常工作B. 服务器上只需要安装针对SVC的通道管理软件,与物理存储类型无关C. SVC不支持IBMZ系列服务器D. SVC支持主流的服务器平台,包括AIX,HP-UX,Solaris,Novell,Microsoft Windows,Solaris,OpenVMs等试题答案:A4、出生时存在以后逐渐消失的神经反射是()。
(单选题)A. 握持反射B. 瞳孔对光反射C. 咽反射D. 膝腱反射E. 角膜反射试题答案:A5、持续工艺确认在必要时,应当使用统计工具进行数据分析,以确认工艺处于()状态。
(单选题)A. 受控B. 监管C. 监控D. 验证试题答案:A6、关于肝(脾)造血期不正确的是()。
(单选题)A. 肝脏造血自胚胎第8周开始B. 肝脏造血至胚胎第5个月达高峰C. 肝脏造血至生后4~5天停止D. 脾脏开始造血比肝脏晚1个多月E. 脾脏至胚胎第5个月时完全停止造血试题答案:E7、下面哪个应用或者应用领域在中小企业市场上适用于DS3000系列磁盘阵列()?(单选题)A. OLTPB. OracleC. SybaseD. SQLE. Exchange试题答案:E8、患者,女性,42岁。
《计算机⽹络》考题(英⽂选择题)Computer Networks – Exam1 Short questionsFor each question, please circle a single best answer.1.In the CSMA/CD protocol, what condition on the transmission delay T trans and thepropagation delay T prop has to be satisfied to guarantee that a node always detects a collision?A. T trans > T propB. T trans > 2T prop CORRECTC. T trans < T propD. 2T trans < T prop2.Alice and Bob communicate in an alphabet that has L letters. They use a monoalphabeticsubstitution cipher with key K. Assume that Trudy obtains a plaintext m and thecorresponding ciphertext c. Under what conditions can Trudy recover the key K completely?A. m contains at least 1-L unique letters. CORRECTB. Lm≥.C. Km≥.D. m is not empty.3.The WiMaX protocol:A. provides the maximum available data rate over a wireless channel.B. uses unlicensed spectrum, such as WiFi.C. provides a mechanism for scheduling. CORRECTD. All of the above options are correct.4.Two hosts simultaneously send data through a link of capacity 1Mbps. Host A generates datawith a rate of 1Mbps and uses TCP. Host B uses UDP and transmits a 100bytes packet every 1ms. Which host will obtain higher throughput?A. Host A.B. Host B. CORRECTC. They obtain roughly the same throughput.D. They experience congestion collapse and negligible throughput.5.What is the theoretical upper-bound on the number of simultaneous TCP/IPv4 connectionsthat a host with a single IP address can handle? (Ignore memory limitations.)B. 232C. 264CORRECTD. unlimited6.Host A sends a TCP segment (Seq = 43, ACK = 103), to which host B replies with a TCP segment (Seq = 103, ACK = 57). The payload of the first TCP segment isA. 14 bytes long. CORRECTB. 43 bytes long.C. 46 bytes long.D. 57 bytes long.E. 60 bytes long.7.The Distance-Vector algorithm is not:A. iterative.B. asynchronous.C. distributed.D. used in RIP.E. None of the above. CORRECT8.Longest prefix matching is used:A. in routers to know on which link interface to forward packets. CORRECTB. in classless addressing to use the address space more efficiently than in classful addressing.C. by NAT to increase the available address space in home networks.D. to assign subnet masks.E. None of the above.9.An authoritative DNS server knows a top-level domain server via:A. hostname.B. IP address. CORRECTC. canonical hostname.D. alias.E. domain.10.A user requests aWeb page that consists of some text and 3 images. The browser’s cache is empty. For this page, the client’s browser:A. sends 1 http request message and receives 1 http response messages.B. sends 1 http request message and receives 3 http response messages.C. sends 1 http request message and receives 4 http response messages.D. sends 3 http request messages and receives 3 http response messages.11.What is the advantage of using a layered model of networking?A. Simplified the networkB. For the purpose of standardizationC. Divides the complexity of internetworking into discrete, more easily learned operation subsetsD. All of the above CORRECT12.What is the name of protocol data unit(PDU)at the network layer of the OSI reference model?A. TransportB. FrameC. Packet CORRECTD. Segment13.Which is true when a broadcast is sent out in an Ethernet 802.3 LAN?A. The broadcast is sent only to the default gateway.B. The broadcast is sent only to the destination hardware address in the broadcast.C. The broadcast is sent to all devices in the collision domain. CORRECTD. The broadcast is sent to all devices in the broadcast domain.14.Segmentation of a data stream happens at which layer of the OSI model?A.PhysicalB.Data Link/doc/ee7d8dd65022aaea998f0fd2.html workD.Transport CORRECT15.Which of following international standard defines for Fast Ethernet?A.IEEE 802.3B.IEEE 802.3zC.IEEE 802.3u CORRECTD.IEEE 802.3ae16.What does the Data Link layer use to find hosts on a local network?A.Logical network addressesB.Port numbersC.Hardware addresses CORRECTD.Default gateways17.What were the key reasons the ISO released the OSI model?A.To allow companies to charge more for their equipmentB.To help vendors create interoperable network devices CORRECTC.To help vendors create and sell specialized software and hardware18.What is used at the Transport layer to stop a receiving host’s buffer from overflowing?A.SegmentationB.PacketsC.AcknowledgmentsD.Flow control CORRECT19.When data is encapsulated, which is the correct order?A.Data,frame,packet,segment,bitB.Segment,data,packet,frame,bitC.Data,segment,packet,frame,bit CORRECTD.Data,segment,frame,packet,bit20.What does the term“Base”indicate in 100Base-TX?A.The maximum distanceB.The type of wiring usedC.A LAN switch method using half duplexD.A signaling method for communication on the network CORRECT21.What is the maximum distance of 100Base-T?A.100 feetB.1000 feetC.100 meters CORRECTD.1000 meters22.Which of the following would describe a transport layer connection that would ensure reliable delivery?A.RoutingB.Acknowledgments CORRECTC.SwitchingD.System authentication23.Which of the following is not considered a reason for LAN congestion?A.Low bandwidthB.Too many users in a broadcast domainC.Broadcast stormsD.Routers CORRECT24.Which of the following are two basic types of dynamic routing?A.Static and defaultB.TCP and UDP exchangeD.None of the above25.If your LAN network is currently congested and you are using only hubs in your network,what would be the BEST solution to decrease congestion on your network?A.Cascade your hubs.B.Replace your hubs with switches. CORRECTC.Replace your hubs with routers.D.Add faster hubs.26.What technology is a used by most switches to resolve topology loops and ensure that data flows properly through a single network path?A.RIPB.STP CORRECTC.IGRPD.Store-and-forward27.Which of the following is one of the characteristics of IP?A.reliable and connectionlessB.unreliable and connectionless CORRECTC.reliable and connection-orientedD.unreliable and connection-oriented28.What is the valid host range for subnet 172.16.10.16(Mask 255.255.255.240)?A.172.16.10.20 through 172.16.10.22B.172.16.10.16 through 172.16.10.23C.172.16.10.17 through 172.16.10.31D.172.16.10.17 through 172.16.10.30 CORRECT29.What range of addresses can be used in the first octet of a Class B network address?A.1–126B.128–190C.128–191 CORRECTD.129–19230.Which of the following is not true?A.IP is connectionless and provides routing.B.ARP is used to find an IP address of a host. CORRECTC.UDP is connectionless.D.TCP is connection oriented.31.Which class of IP address provides a maximum of only 254 host addresses per network ID?B.Class BC.Class C CORRECTD.Class D32.Which protocol tool use ICMP?A.TelnetB.Ping CORRECTC.ARPD.FTP33.Which of the following is an IEEE standard for frame tagging?A.802.1XB.802.3ZC.802.1QD.802.3U CORRECT34.A client will use____to send emails to mail-server.A.POP3B.SMTP CORRECTC.TELNETD.FTP35.Which protocol used in PPP allows multiple Network layer protocols to be used during a connection?A.LCPB.NCP CORRECTC.HDLCD.X.2536.When too many packets are present in the subnet, performance degrades. What is this situation called?A.dead lockB.congestion CORRECT/doc/ee7d8dd65022aaea998f0fd2.html work fault/doc/ee7d8dd65022aaea998f0fd2.html work busy37.Which language can be used to realize the client-side dynamic web page generation?A.CGIB.ASP CORRECTC.JavaScript38.The two-wire connections between each subs criber’s telephone and the end office are known in the trade as the____.A.trunkB.local loopC.linkD.switch CORRECT39.When web page is transmitted over SSL, the protocol used is_____.A.HTTPB.SHTTPC.HTTPS CORRECTD.SSL40.Nyquist proved that if an arbitrary signal has been run through a low-pass filter of bandwidthH, the filtered signal can be completely reconstructed by making only_____(exact)samples per secondA.HB.0.5HC.2H CORRECTD.4H41.To convert a binary message to an ASCII message in email system, we can useencoding, which break up groups of 24 bits into four 6-bit units, with each unit being sent asa legal ASCII character. (Ref in page 262)A.base64 CORRECTB.quoted-printableC.SMTPD.POP342.A CRC generator polynomial is G(x)=X8+X5+X2+l.How many bits will the checksum be?A.7B.8 CORRECTC.9D.1043.If the length of sequence is 4 bits, the maximum sending window size should be____.A.13B.14C.15 CORRECTD.1644.In 802.11, to solve the_______station problem and the hidden station problem,we can useA. faultB.mobileC.exposed CORRECTD.wireless45.If the congestion window size is 20KB, and the receive window size is 30KB,what is themaximum bytes can the TCP entity transmit?A.20KB CORRECTB.30KBC.50KBD.10KB46.Port numbers below________are called well-known ports and are reserved for standardservices.A.256B.1024 CORRECTC.4096D.100047.________, which are overlay networks on top of public networks but with most of theproperties of private network.A.PBXB.VPN CORRECTC.CDMA 1XD.GPRS48.The problem of running out of IP addresses is not a theoretical problem that might occur atsome point in the distant future. Some people felt that a quick fix was needed for the short term. This quick fix came in the form of____________________.A.IP6B.DHCPC.RARPD.NAT CORRECT49.Public-key algorithms have the property that_______keys are used for encryption anddecryption and that the decryption key cannot be derived from the encryption key.These properties make it possible to publish the public key.A.one timeB.randomC.same50.The main public-key algorithm is___________which derives its strength from the fact that itis very difficult to factor large numbers.A.DESB.AESC.MD5D.RSA CORRECT51.Various schemes have been devised for digital signatures, using both symmetric-key and________-key algorithms.A.public CORRECTB.privateC.one timeD.one way52.Often, authentication is needed but secrecy is not, based on the idea of a one-way hashfunction that takes an arbitrarily long piece of plaintext and from it computes a fixed-length bit string. This hash function, MD, often called a________.A.message digest CORRECTB.packet-switchedC.message-detectD.mini data53.URL(Uniform Resource Locator)have three parts: the________, the DNS name of themachine on which the page is located, and a local name uniquely indicating the specific page.A.protocol CORRECTB.addressC.port number/doc/ee7d8dd65022aaea998f0fd2.html54.HTTP1.1, which supports________connections. With them, it is possible to establish a TCPconnection, send a request and get a response, and then additional requests and get additional response.A.one timeB.persistent CORRECTC.stop and waitD.one-way55._______, when it is used, a bad frame that is received is discarded, but the good framesreceived after it are buffered.A.selective repeatD.stop and wait56.How does the FDM multiplexing schemes work like?A.each user having exclusive possession of some band CORRECTB.each user take turns, periodically getting the entire bandwidth for a litter burst of timeC.each user transmit over the entire frequency spectrum all the time with different codingD.each user transmit over a shared fiber using different wavelength57.When we use a modem, which use 16 phases signal to modulation, then how much can we get the maximum data rate in a 2400 baud channel(in noiseless channel)?A.400bpsB.2400bpsC.9.6kbps CORRECTD.14.4kbps58.______is a small java program that has been compiled into binary instruction running in JVM, and can be embedded into HTML pages, interpreted by JVM-capable browsers.A.JavaScriptB.JavaBeanC.Applet CORRECTD.JSP59.Which of the following best describes the function of the OSI reference model’s transport layer?A.It sends data by using flow control CORRECTB.It provides the best path for deliveryC.It determines network addressesD.It provides error-correcting60.What is the most efficient subnet mask to use on point-to-point WAN links?A.255.255.255.0B.255.255.255.224C.255.255.255.252 CORRECTD.255.255.255.248*************************61.Given the cutoff frequency is 3000Hz, the bit rate b=9600 bits/s, then the time required to send 8 bits 1 bit at a time will be 8/b sec, so the number of the highest harmonic passed through isA. 1C. 2.5D. 2062.If two codewords are a Hamming distance 2d+1 apart, it will require single-bit errorsto convert one into the other. Error-correcting can be done while bit-errors are atmost .A.2d, d+1B. 2d, dC.2 d+1, d CORRECTD. None of the above63.For sliding window protocol using go back N, supposing the sender window’s size is 16, then at most frames may be outstanding at any instant.A. 0B. 1C. 15 CORRECTD. 1664.If the physical line is poor, which of the following protocols may be work better?A. Stop-and -WaitB. One-Bit Sliding Window ProtocolC. Sliding Window Protocol Using Go Back ND. Sliding Window Protocol Using Selective Repeat CORRECT65.Services provided by Ethernet are unreliable. If the destination station receive a error data frame, it 。
pmc考试题目及答案一、单项选择题(每题2分,共20分)1. PMC代表什么?A. 项目管理证书B. 个人管理证书C. 过程管理证书D. 产品管理证书答案:A2. 以下哪项不是PMC考试的科目?A. 项目管理基础B. 风险管理C. 财务管理D. 人力资源管理答案:C3. 项目管理的五个过程组包括哪些?A. 启动、规划、执行、监控、收尾B. 规划、执行、监控、收尾、启动C. 启动、执行、监控、收尾、规划D. 规划、启动、执行、监控、收尾答案:A4. 项目范围说明书的主要作用是什么?A. 定义项目的最终产品或服务B. 描述项目的组织结构C. 确定项目的预算和时间表D. 识别项目的关键利益相关者答案:A5. 以下哪项不是项目风险管理的过程?A. 风险识别B. 风险分析C. 风险应对D. 风险沟通答案:D6. 项目时间管理中,哪个工具用于确定项目活动之间的依赖关系?A. 甘特图B. 里程碑图C. 网络图D. 资源分配图答案:C7. 项目管理中的质量保证和质量控制的主要区别是什么?A. 质量保证是预防性的,质量控制是纠正性的B. 质量保证是纠正性的,质量控制是预防性的C. 质量保证和质量控制都是预防性的D. 质量保证和质量控制都是纠正性的答案:A8. 以下哪项不是项目团队发展的阶段?A. 形成阶段B. 震荡阶段C. 规范阶段D. 解散阶段答案:D9. 项目管理中的沟通管理计划应该包括哪些内容?A. 沟通的目的、对象、频率和方法B. 项目的预算和时间表C. 项目的风险和应对策略D. 项目的组织结构和团队成员答案:A10. 项目收尾阶段的主要任务是什么?A. 完成所有项目活动B. 获得客户验收C. 记录经验教训D. 以上都是答案:D二、多项选择题(每题3分,共15分)1. 以下哪些因素会影响项目的范围?A. 项目目标B. 项目资源C. 项目时间D. 项目预算答案:A、B、C、D2. 项目管理中的沟通包括哪些类型?A. 内部沟通B. 外部沟通C. 正式沟通D. 非正式沟通答案:A、B、C、D3. 项目风险管理的策略包括哪些?A. 风险规避B. 风险转移C. 风险接受D. 风险利用答案:A、B、C、D4. 项目质量管理的工具和技术包括哪些?A. 质量审计B. 过程分析C. 统计抽样D. 质量改进答案:A、B、C、D5. 项目团队管理的关键活动包括哪些?A. 团队建设B. 团队培训C. 团队激励D. 团队评估答案:A、B、C、D三、简答题(每题10分,共30分)1. 描述项目管理中的关键路径法(CPM)的主要步骤。
2022MCP真题模拟及答案(2)1、符号“%”表示百分比,系指重量的比例;但溶液的百分比,除另有规定外,系指溶液100ml中含有溶质若干克;此外,根据需要可采用下列符号,下列说法正确的是()。
(多选题)A. %(g/g)表示溶液100g中含有溶质若干克B. %(ml/ml)表示溶液100ml中含有溶质若干毫升C. %(ml/g)表示溶液100g中含有溶质若干毫升D. %(g/ml)表示溶液100ml中含有溶质若干克试题答案:A,B,C,D2、婴幼儿在0~3岁的行为主要靠遗传和本能的力量发展而成,这个阶段在人的整个生命周期中被称为()(单选题)A. 被动发展阶段B. 主动发展阶段C. 自主发展阶段D. 巩固发展阶段E. 稳定发展阶段试题答案:A3、NAS和iSCSI的主要区别是()。
(单选题)A. NAS是文件I/O,Iscsi是优化的块级I/OB. NAS是块级I/O,而iSCSI优化的文件I/OC. NAS是通过以太网连接的,而iSCSI是通过SAN连接的D. NAS是通过SAN连接的,而iSCSI是通过以太网连接的试题答案:A4、阴道内有大量豆渣样白带常见于()。
(单选题)A. 真菌性阴道炎B. 滴虫性阴道炎C. 盆腔炎D. 宫颈炎E. 老年性阴道炎试题答案:A5、冰冻骨盆系指()。
(单选题)A. 急性子宫内膜炎B. 急性子宫肌炎C. 急性输卵管炎D. 急性盆腔结缔组织炎E. 急性盆腔腹膜炎试题答案:D6、患者,女性,49岁,风湿性心脏瓣膜病二尖瓣狭窄近30年,最近一次超声心动图诊断其二尖瓣狭窄程度为重度狭窄,则其二尖瓣瓣口面积符合()(单选题)A. 4~6cm2B. 2~4cm2C. <2cm2D. <1.5cm2E. <1.0cm2试题答案:E7、用户希望在本地同一机房使用两台DS5000磁盘系统实现存储的高可用,通常推荐以下哪种方式()。
(单选题)A. 通过多份Flash Copy快照方式保证数据高可用B. Metro Mirror方式同步复制主存储数据到备用存储C. Global Copy异步复制方式D. Global Mirror异步复制,通过一致性组保证数据完整性试题答案:B8、子宫内膜异位症的治疗方法哪项不妥?()(单选题)A. 大量长期口服安宫黄体酮B. 服用丹那唑C. 适量用雄激素D. 病灶清除术E. 化学药物治疗试题答案:E9、新生儿重度窒息,Apgar评分标准为()。
QUESTION 101Refer to the exhibit. The switch in the graphic has a default configuration and the MAC table is fully populated. In addition, this network is operating properly. The graphic represents selected header information in a frame leaving host A. What can be concluded from this information?A. The MAC address of host A is FFFF.FFFF.FFFF.B. The router will forward the packet in this frame to the Internet.C. The switch will only forward this frame to the attached router interface.D. All devices in this LAN except host A will pass the packet to Layer 3.QUESTION 102What is an appropriate use of a default route?A. to provide routing to a local web serverB. to provide routing from an ISP to a stub networkC. to provide routing that will override the configured dynamic routing protocolD. to provide routing to a destination that is not specified in the routing table and which is outside the local networkQUESTION 103Refer to the exhibit. A junior network engineer has prepared the exhibited configuration file. What two statements are true of the planned configuration for interface fa0/1? (Choose two.)A. The two FastEthernet interfaces will require NAT configured on two outside serial interfaces.B. Address translation on fa0/1 is not required for DMZ Devices to access the Internet.C. The fa0/1 IP address overlaps with the space used by s0/0.D. The fa0/1 IP address is invalid for the IP subnet on which it resides.E. Internet hosts may not initiate connections to DMZ Devices through the configuration that is shown.QUESTION 104Refer to the exhibit. Two routers have just been configured by a new technician. All interfaces are up. However, the routers are not sharing their routing tables. What is the problem?A. Split horizon is preventing Router2 from receiving routing information from Router1.B. Router1 is configured for RIP version 2, and Router2 is configured for RIP version1.C. Router1 has an ACL that is blocking RIP version 2.D. There is a physical connectivity problem between Router1 and Router2.E. Router1 is using authentication and Router2 is not.QUESTION 105A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of 198.133.219.0/24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conserving addresses with VLSM. What is the best course of action if the company wants to have40 hosts in each of the three subnets?A. Convert all the routers to EIGRP and use 198.133.219.32/27, 198.133.219.64/27, and 198.133.219.92/27 as the new subnetworks.B. Maintain the use of RIP version 1 and use 198.133.219.32/27, 198.133.219.64/27, and 133.219.92/27 as the new subnetworks.C. Convert all the routers to EIGRP and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.D. Convert all the routers to RIP version 2 and use 198.133.219.64/26, 198.133.219.128/26, and 133.219.192/26 as the new subnetworks.E. Convert all the routers to OSPF and use 198.133.219.16/28, 198.133.219.32/28, and 198.133.219.48/28 as the new subnetworks.F. Convert all the routers to static routes and use 198.133.219.16/28, 198.133.219.32/28, andQUESTION 106Refer to the exhibit. Why has this switch not been elected the root bridge for VLAN1?A. It has more than one interface that is connected to the root network segment.B. It is running RSTP while the elected root bridge is running 802.1d spanning tree.C. It has a higher MAC address than the elected root bridge.D. It has a higher bridge ID than the elected root bridge.QUESTION 107Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role?A. Switch3, port fa0/1B. Switch3, port fa0/12C. Switch4, port fa0/11D. Switch4, port fa0/2E. Switch3, port Gi0/1F. Switch3, port Gi0/2QUESTION 108Refer to the exhibit. How many paths can the EIGRP routing process use to forward packets from HQ_Router to a neighbor router?A. two equal-cost pathsB. two unequal-cost pathsC. three equal-cost pathsD. three unequal-cost pathsE. four equal-cost pathsF. four unequal-cost pathsQUESTION 109Select the action that results from executing these commands.Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address stickyA. A dynamically learned MAC address is saved in the startup-configuration file.B. A dynamically learned MAC address is saved in the running-configuration file.C. A dynamically learned MAC address is saved in the VLAN database.D. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.QUESTION 110Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.2950Switch(config-if)# switchport port-security2950Switch(config-if)# switchport port-security mac-address sticky2950Switch(config-if)# switchport port-security maximum 1The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch? (Choose two.)A. The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.B. Only host A will be allowed to transmit frames on fa0/1.C. This frame will be discarded when it is received by 2950Switch.D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.E. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.F. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be forwarded out fa0/1.QUESTION 111Refer to the exhibit. Some 2950 series switches are connected to the conference area of the corporate headquarters network. The switches provide two to three jacks per conference room to host laptop connections for employees who visit the headquarters office. When large groups of employees come from other locations, the network administrator often finds that hubs have been connected to wall jacks in the conference area although the ports on the access layer switches were not intended to support multiple workstations.What action could the network administrator take to prevent access by multiple laptops through a single switch port and still leave the switch functional for its intended use?A. Configure static entries in the switch MAC address table to include the range of addresses used by visiting employees.B. Configure an ACL to allow only a single MAC address to connect to the switch at one time.C. Use the mac-address-table 1 global configuration command to limit each port to one source MAC address.D. Implement Port Security on all interfaces and use the port-security maximum 1 command to limit port access to a single MAC address.E. Implement Port Security on all interfaces and use the port-security mac-address sticky command to limit access to a single MAC address.F. Implement Port Security at global configuration mode and use the port-security maximum1 command to allow each switch only one attached hub.QUESTION 112Running both IPv4 and IPv6 on a router simultaneously is known as what?A. 4to6 routingB. 6to4 routingC. binary routingD. dual-stack routingE. NextGen routingQUESTION 113What are three IPv6 transition mechanisms? (Choose three.)A. 6to4 tunnelingB. VPN tunnelingC. GRE tunnelingD. ISATAP tunnelingE. PPP tunnelingF. Teredo tunnelingQUESTION 114Identify the four valid IPv6 addresses. (Choose four.)A. ::B. ::192:168:0:1C. 2000::D. 2001:3452:4952:2837::E. 2002:c0a8:101::42F. 2003:dead:beef:4dad:23:46:bb:101QUESTION 115Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.A. ARPB. SSHC. TelnetD. WEPE. SNMPv1F. SNMPv2QUESTION 116Refer to the exhibit. A network administrator wants Switch3 to be the root bridge. What could be done to ensure Switch3 will be the root?A. Configure the IP address on Switch3 to be higher than the IP addresses of Switch1 and Switch2.B. Configure the priority value on Switch3 to be higher than the priority values of Switch1 and Switch2.C. Configure the BID on Switch3 to be lower than the BIDs of Switch1 and Switch2.D. Configure the MAC address on Switch3 to be higher than the Switch1 and Switch2 MAC addresses.E. Configure a loopback interface on Switch3 with an IP address lower than any IP address on Switch1 and Switch2.QUESTION 117What is the maximum data rate specified for IEEE 802.11b WLANs?A. 10 MbpsB. 11 MbpsC. 54 MbpsD. 100 MbpsQUESTION 118How does using the service password encryption command on a router provide additional security?A. by encrypting all passwords passing through the routerB. by encrypting passwords in the plain text configuration fileC. by requiring entry of encrypted passwords for access to the deviceD. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchangesE. by automatically suggesting encrypted passwords for use in configuring the routerQUESTION 119Refer to the exhibit. When running OSPF, What would cause router A not to form an adjacency with router B?A. The loopback addresses are on different subnets.B. The value of the dead timers on the router are different.C. Route summarization is enabled on both routers.D. The process indentifier on router A is different than the process identifier on router B.QUESTION 120Refer to the exhibit. What statement is true of the configuration for this network?A. The configuration that is shown provides inadequate outside address space for translation of the number of inside addresses that are supported.B. Because of the addressing on interface FastEthernet0/1, the Serial0/0 interface address will not support the NAT configuration as shown.C. The number 1 referred to in the ip nat inside souce command recerences access-list number 1.D. ExternalRouter must be configured with static routers to network 172.16.2.0/24QUESTION 121Refer to the exhibit. The network is converged.After link-state advertisements are received from Router_A, what information will Router_E contain in its routing table forthe subnets 208.149.23.64 and 208.149.23.96?A. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, FastEthernet0/0208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, FastEthernet0/0B. 208.149.23.64[110/1] via 190.173.23.10, 00:00:00:07, Serial1/0208.149.23.96[110/3] via 190.173.23.10, 00:00:00:16, FastEthernet0/0C. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, Serial1/0208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, Serial1/0208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, FastEthernet0/0D. 208.149.23.64[110/13] via 190.173.23.10, 00:00:00:07, Serial1/0208.149.23.96[110/13] via 190.173.23.10, 00:00:00:16, Serial1/0QUESTION 122Refer to the exhibit. The company uses EIGRP as the routing protocol. What path will packets take from a host on 192.168.10.192/26 network to a host on the LAN attached to router R1?A. The path of the packets will be R3 to R2 to R1.B. The path of the packets will be R3 to R1 to R2.C. The path of the packets will be both R3 to R2 to R1 and R3 to R1.D. The path of the packets will be R3 to R1QUESTION 123Refer to the exhibit. Switch port FastEthernet 0/24 on AlSwitch1 will be used to create an IEEE 802.1Qcomplaint trunk to another switch. Based on the output shown, What is the reason the trunk does not form, even thought the proper cabling has been attached?A. VLANs have not been created yet.B. An IP address must be configured for the port.C. The port is currently configured for access mode.D. The correct encapsulation type has not been configured.E. The no shutdown command has not been entered for the portQUESTION 124Refer to the exhibit. What switch proves the spanning-tree designated port role for the network segment that services the printers?A. Switch1B. Switch2C. Switch3D. Switch4QUESTION 125An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?A. The PC has connectivity with a local host.B. The PC has connectivity with a Layer 3 device.C. The PC has a default gateway correctly configuredD. The PC has connectivity up to Layer 5 of the OSI modelE. The PC has the TCP/IP protocol stack correctly installed..。
2022MCP真题模拟及答案(5)共71道题1、下排式压力蒸气灭菌器使物品达到灭菌效果的原理是()。
(单选题)A. 蒸气持续的时间B. 蒸气产生的压力C. 蒸气释放的潜热D. 蒸气导致的湿度E. 蒸气转化的机械能试题答案:C2、下列哪项属于目标管理中计划阶段的过程?()(单选题)A. 协议授权B. 咨询指导C. 信息收集D. 调查研究E. 调节平衡试题答案:A3、下列关于灭菌和消毒的说法错误的是()。
(单选题)A. 消毒是指杀死病原微生物、但不一定能杀死细菌芽胞的方法B. 灭菌是指把物体上所有的微生物(包括细菌芽胞在内)全部杀死的方法C. 灭菌的彻底程度不受灭菌时间与灭菌剂强度的制约D. 通常用化学的方法来达到消毒的作用E. 通常用物理方法来达到灭菌的目的4、考虑制定计划的前提条件指的是计划工作的()。
(单选题)A. 人口条件B. 方案条件C. 预算条件D. 辅助计划条件E. 假设条件试题答案:E5、S-O-R行为表示式中的“R”指的是()。
(单选题)A. response应答反应B. reply应答C. respond应答D. reflect反射E. reaction行为反应试题答案:E6、从整体的观念出发,研究整体和组成系统整体各要素之间的相互关系的是()。
(单选题)A.B.C.D.E.试题答案:E7、以上是决策的第二步的是()。
(单选题)A.B.C.D.E.试题答案:B8、以下不属于常用的人际传播形式的是()(单选题)A. 咨询B. 访谈C. 交谈D. 劝服E. 劝说试题答案:E9、不宜用于皮肤黏膜消毒的消毒剂是()。
(单选题)A. 漂白粉B. 含碘类消毒剂C. 醋酸氯己定-醇类消毒剂D. 氧化电位水E. 1%过氧化氢液试题答案:A10、口腔和咽部的消毒不正确的是()。
(单选题)A. 0.02%氯己定溶液漱口B. 含有效碘500mg/L的碘伏液含漱C. 0.2%戊二醛D. 1%过氧化氢溶液漱口E. 5000mg/L的碘伏或硝酸银溶液局部涂抹试题答案:C11、0~3岁处于行为发展的()(单选题)A. 主动发展阶段B. 被动发展阶段C. 巩固发展阶段D. 稳健发展阶段E. 自主发展阶段试题答案:B12、Ⅰ类环境适用于()。
上海贝尔阿尔卡特股份有限公司WCDMA外协工程师技术认证C级认证考试注意事项:I. 本试卷为年月C级的技术认证考试试题,考试时间为100分钟,满分100分。
II. 应考人员在答题前,请将姓名、所在单位名称、所在考场地点(XX分公司)、身份证编号认真准确地填写在本页底端的折线内,并认真核对所填事项正确完整。
III. 应考人员应严格遵守考场纪律,服从监考人员的监督和管理,凡考场舞弊不听劝阻或警告者,监考人员有权终止其考试资格,没收试卷,以0分处理,并报ASB CDD部门予以处分。
IV. 本试卷共计3页,答题前请检查有无缺漏,有问题请与监考人员联系。
考试结束,应考人员应停止答卷,离开考场。
监考人员收卷后,对答卷进行装订、密封,送交有关部门进行评判,试卷不得带离考场。
---------------------------------------------------------------------------------------------------------------外协单位名称:姓名:考试地点:身份证编号:手机: E-mail:一.填空题(每空0.5分,共30分)1.UMTS系统的技术规范是由组织负责制定的,UMTS核心频段的上行频率范围是、下行频率范围是。
2.UMTS系统中,WCDMA无线信道采用的扩频编码名称是,其中上行链路扩频因子变化范围是。
WCDMA每个载波的信道带宽是。
3.9311 Node B机柜配置一块iCCM板卡时,Iub接口最多支持_____个E1传输;在iCCM板卡上有显示E1状态的LED指示灯,指示灯为绿色表示,红色表示______。
4.UMTS系统中,Uu接口包括的无线信道类型分别是、、。
5.926 D2U Node B的机柜的外形尺寸长×宽×高是,额定直流供电电压是________,Iub接口传输链路最大支持的E1数量为______。
6.据UMTS的物理模型,用户设备域分又分为两部分,它们之间通过开放式接口相互通信,这两部分分别是和_ _____,它们之间的接口是________。
FLEXI MCPA测试试题(共五大题,总计100分,时间90分钟)一、选择题(每题1分,共20分)1、以下是MCPA三功放射频模块的是()BA. EXDAB. FXDA C .FHDA D. FHEA2、MCPA 中文含义是()AA.多载波功放基站B.五代站C.六代站D.直放站3、下列不属于MCPA 基站所用的设备的是()DA.FHDAB.FXEAC.ESMCD.ESMA4、MCPA射频模块内部主要包括()BA.滤波单元B.功放单元和双工单元C.功放单元D.存储单元5、下列不属于ESMB/C 功能的是()CA. GSM/EDGE BTS 操作和管理接口B. OBSAI光纤接口C.收发信机D.给其他模块提供电源接口6、下列不属于FLEXI BTS_MCPA主要射频模块的是()CA.FHDAB.FXEAC.ESMCD.FXDA7、一个单射频模块FXEA的机顶输出功率是多少()DA.40WB.20WC.15WD.60W8、在MCPA基站中使用双射频模块能实现最大配置是()CA.6\6\6B.8\8\8C.12\12\12D.36\36\369、MCPA基站比起flexi和ultra基站相比集成度更高,并节省空间,然而系统模块采用电压是()V。
BA.-38B.-48C.48D.-5810、MCPA基站的接收模式包括()AA.单集接收和二路分集接收B.单集接收C.二路分集接收D.三路分集接收11、MCPA基站系统模块有ESMB/C两种,两种系统模块支持的载波不同,ESMB支持()载波,而ESMC支持()载波。
BA.12,24B.18 ,36C.24,36D.36,4812、MCPA基站是通过光钎来传送数据和业务,从而使用了光转换模块,在拉远基站超过200m时我们采用()AA.单模光模块B.双模光模块C.单模和双模光模块D.光转发模块13、在调测MCPA所采用的本地IP地址能连接到BTS的是()CA.192.255.168.130B.192.168.225.130C.192.168.255.132D.192.168.250.13214、在拉远基站时出现ESMx System module has lost connection to RF module 的告警时,最有可能是什么原因造成的?()BA.射频模块高温B.远端射频模块停电C.传输板故障D.系统模块不识别15、MCPA 配置的载频数目不同,能够配置的输出功率也不同,若要使用双载频模块,配置888,8/8/8* @每载频()W。
BA.20B.15C.10D.3016、在MCPA基站中,配置666的配置时,它的机顶输出功率是多少()W。
DA.38.1B.39.2C.41.8D.4017、FLEXI MCPA在配置时,一个BCF最大能支持载载频()个。
DA.12B.18C.24D.3618、FLEXI MCPA可以采用多BCF同步,或共BCCH方法,单站点最大支持()块载频,最大配置为()。
AA.108 36\36\36B.54 18\18\18C.36 12\12\12D.24 8\8\819、FLEXI MCPA调测中,在天线分级设置时,采用分离模式,若使单双射频模块2&5小区天线应连接到()。
CA.ANT1B.ANT2C.ANT3D.ANT520、FLEXI MCPA调测时Send BCF完成后,最终射频模块的灯是什么状态?()BA.TX红闪MODE绿不闪B.TX绿闪MODE绿不闪C.TX绿闪MODE绿闪D.TX绿不闪MODE绿不闪二、题填空(每空1分,共20分)1、MCPA采用实现原理:在发射方向上把多个载波合成一路信号,通过上变频后,对进行低噪音放大。
2、请列出至少两条多载波功放基站的架构特性:、等。
3、FLEXI MCPA基站的系统模块主要包含GSM/EDGE BTS 操作和管理接口、、、给其他模块提供电源接口、BTS之间同步接口、。
4、MCPA射频模块内部主要包括:和。
5、常见的RRU连接方式:单RRU、、三级串联RRU、。
6、采用多BCF同步,或共BCCH方法,单站点最大支持块载频,最大配置为。
7、若要配置为8\8\8的配置,在flexi BTS基站中的机顶输出功率是W,在mcpa基站中的机顶输出功率是W。
8、实际配置如超过6/6/6-12/12/12之间不需要增加天线,需要系统模块为ESMC,用2块射频模块FXDA就可以实现,数据配置与6/6/6的配置一样。
9、MCPA 采用不合路的发射模式和单集接收与二级分集接收的接收模式。
三、多项选择题(每题2分,共20分)1、多载波功放架构特性有哪些?()A、功放效率达到50%,超低功耗。
B、无需射频合路器,简化了基站架构。
C、高集成度,体积小,重量轻。
D、远端扩容,维护方便。
2、ESMB/C 的主要功能有:()A、GSM/EDGE BTS 操作和管理接口B、Abis传输接口C、OBSAI光纤接口D、给其他模块提供电源接口E、GSM/EDGE 基带单元F、BTS之间同步接口G、外部告警和内部告警接口3、FLEXI BTS_MCPA的射频模块有哪些特性?()A、支持GSM 900,1800 频段B、工作温度-35~+55摄氏度C、<30 kgD、支持3级RRU 级联4、FLEXI MCPA配置原则()A、单RRU支持18载频B、一个小区可最大支持12块载频C、一个BCF最大可以支持36块载频D、构建6+6+6大型基站仅需2个模块(系统模块+射频模块)5、双射频模块配置原则()A、RRU采用星型或者串联连接B、每扇区两个双极化天线C、采用双射频模块,可以支持S7/7/7到S12/12/12配置D、拉远时必须使用双模光纤6、单射频模块配置原则()A、单RRU 即可支持S6/6/6B、3路接收分级,6个天馈接口C、每扇区一个双极化天线D、最大配置能实现8/8/87、下面哪些属于FLEXI BTS_MCPA的射频模块()A、FXCAB、FXDAC、FXEAD、FHDA8、下面属于三功放射频模块的是()A、FXDAB、FHDAC、FXEAD、FHEA9、下面哪些是900M频段的射频模块()A、FXDAB、FHDAC、FXEAD、FHEA10、传输模块有哪些()A、FIPAB、FIEAC、FIFAD、FXDA四、判断题(每题1.5分,总30分)1、ESMC系统模块支持38载频基带处理。
()2、FXDA 是900M四功放射频模块支持18个物理载频。
()3、FHEA 是1800M双功放射频模块支持12个逻辑载频。
()4、MCPA系统模块与射频模块间连线集成到一根光纤中,射频模块可以采取单独供电方式供电方式。
()5、堆叠安装时要求底座固定,射频模块在下方,系统模块置在射频模块上方,方便以后扩容,所有板件接地集中接到底座上,由底座统一接到地排上。
()6、壁挂安装要求底座牢固固定在墙上,每个底座只能挂3个2U模块,2底座之间至少有10CM空间,所有板件接地统一接到地排上。
()7、调试电脑的IP设为192.168.255.130,子网掩码设置为255.255.255.0BTS的IP地址为192.168.256.131 ()8、实际配置如超过6/6/6-12/12/12之间不需要增加天线,需要系统模块为ESMC,用2块射频模块FXDA就可以实现,数据配置与6/6/6的配置一样。
()9、软件上天线的设置,因为EDGE载波与非EDGE载波建立在不同的分离小区,软件上1&2扇区天线连接到ANT 1,3&4扇区天线连接到ANT 3,5&6扇区连接到ANT 5。
()10、FIEA上有8个50欧姆SMB接口()11、FLEXI MCPA射频单元拉远安装侧面耳朵走线孔应把所有橡胶都去掉,这样可使跳线不受挤压。
()12、AC/DC电源转换子模块(FPAA) 提供直流电48V到交流电220V的转换。
( )13、FIEA是50欧的传输;FIPA是210欧传输;FIFA是微波传输。
()14、ESMB/C 的主要功能有: GSM/EDGE BTS 操作和管理接口、Abis传输接口、OBSAI光纤接口给其他模块提供电源接口、GSM/EDGE 基带单元、BTS之间同步接口、外部告警和内部告警接口()15、FLEXI MCPA构建6+6+6大型基站仅需2个模块(系统模块+射频模块+射频模块)()16、FLEXI MCPA配置原则:一个小区可最大支持12块载频()17、FLEXI BTS_MCPA射频模块FXDA支持36载频, 3 扇区, 3x60W@机顶输出()18、MCPA射频模块内部主要包括:功放单元和双工单元。
()19、FLEXI MCPA支持灵活多样的RRU连接方式:单RRU、二级串联RRU,三级串联RRU,星型连接RRU()20、由于MCPA模块的硬件特性,其配置连线比较统一:S1-S6配置可由二块射频模块完成,S7-S12配置由四块射频模块完成。
()五、解答题(共10分)1、请简述一下FLEXI MCPA的工作原理。
(4分)2、现在河南项目MCPA拉远站故障很多,特别是周口项目室分拉远,故障接二连三,甚至断站,有的是学生破坏,有的是远端设备断电,还有可能是温度过高,请给至少三条合理的建议。
(6分)参考答案一、选择题1~5 BADBC6~10 CDCBA 11~15 BACBB 16~20 DDACB二、填空题1、多载波功放技术、宽带的模拟混合信号2、功放效率达到40%,超低功耗、无需射频合路器,简化了基站架构、远端扩容,维护方便等3、OBSAI 光纤接口、Abis传输接口、外部告警和内部告警接口4、功放单元、双工单元5、星型连接RRU、二级串联RRU 6、108、36+36+36 7、39.2 、41.88、ESMC、FXDA/FXEA 9、二级分集接收三、多项选择题1、BCD (功放效率达到40%,超低功耗。
)2、ABCDEFG3、ABD(< 25kg)4、ABCD 5、AC(每扇区一个双极化天线) 6、AC(2 路接收分级,6个天馈接口)7、ABC 8、AC 9、AB 10、ABC四、判断题1.×(支持36载频基带处理)2.×(三功放射频模块支持18个逻辑载频)3.√4.√(系统模块与射频模块间连线集成到一根光纤中,系统模块可以给射频模块供电,射频模块也可以采取单独供电方式供电方式;可以在远端扩容至12+12+12配置)5.×(堆叠安装时要求底座固定,系统模块在下方,射频模块置在系统模块上方,方便以后扩容,所有板件接地集中接到底座上,由底座统一接到地排上。
)6.×(壁挂安装要求底座牢固固定在墙上,每个底座只能挂2个3U模块,2底座之间至少有10CM空间,所有板件接地集中接到底座上,由底座统一接到地排上。