首页 > 学历类考试
题目内容 (请给出正确答案)
[主观题]

About PTN device's alarm report function in EMS, which of the following are correc

t?()

A.To display current alarm of device correctly, the device needs to report current alarm to EMS actively. Therefore, necessary configuration for the device to actively report alarms must be correctly set.

B. Protection switching event alarm occurs at the instant when protection group switching happens, so it is not durative alarm. Therefore, after the alarm occurs, it is immediately saved in locking alarm. You can check it only in the locking alarms.

C. If EMS server timezone is different from PTN device timezone, alarm occurrence time on PTN device will be different from that on EMS. Therefore, during commissioning of PTN, you should set PTN timezone to be consistent with EMS timezone, usually local timezone.

D. None of the above

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“About PTN device's alarm repor…”相关的问题
第1题
When a PTN device is upgraded from non-agent version into agent version, PW control fi
点击查看答案
第2题
What is the purpose of multi-user configure" in a PTN device"?()

A.to allow multiple users to enter configurations mode simultaneously

B.to allow configure multiple users in the device

C.to allow multiple users to use multi-layer configuration authority

D.to permit multiple levels of configuration rights

点击查看答案
第3题
It's a pity that the device used ____________ counting money doesn't work now

A.at

B.by

C.for

D.to

点击查看答案
第4题
About transport of monitoring packets in the network, which of the following is wrong?
()

A.PTN62006300 can implement exchange of monitoring packets through gateway board and MSTP device.

B.Monitoring packets of PTN network are forwarded through layer 3 routes, without tunnel/PW encapsulation and decapsulation.

C.PTN devices, defined by distinct protocol standards G.8114 and Y.1731, cannot exchange monitoring packets with each other.

D.A PTN6100 can learn 150 mac addresses per second.

点击查看答案
第5题
Recently, several thousand computers in the United States were attacked by a virus. The co
mputers were slowed or shut down. But no information was lost. A computer virus is similar to a biological virus--an organism (生物体) that can harm the human body. A computer virus is a series of electronic commands that can harm a computer or the information in the computer. It infects the device (设备) secretly. It tells the computer to do something the computer's owner does not want it to do. For example, a virus could enter a bank's computer system. It might tell the system to destroy all information about money belonging to everyone with the first name United States several months ago. The virus was created by a university student studying computer science. The computers affected by the virus were in major universities, government agencies (政府机关) and private (私人) companies. They were part of a United commands in a computer at his school. The computer sent the commands to other computers through the linked telephone lines.

The virus told each computer to make many copies of itself. Within a few minutes, all the computers' power was being used to make copies of the virus. The computer could do no other work. It finally slowed down greatly, or simply stopped working. Computer experts spent many days trying to destroy the virus in the computer system.

The experts agree the virus could have been much worse. They say it could have sent orders to destroy huge amounts of electronic information.

Many experts believe, the recent computer virus showed the need for better computer security (安全). But that is a problem. The affected system provides a free exchange (交换) of ideas and information among universities, private companies and government offices. Increasing security too much would destroy this exchange. It would slow progress on many important research projects.

Which of the following statements is true?

A.Many computers were attacked by a virus in the U. S.

B.Many computers attacked by a virus in the U.S. lost their information.

C.A computer virus can harm human body.

D.A computer virus can help the computer owner do many things.

点击查看答案
第6题
关于我司PTN设备监控报文在网络内传递的描述,以下说法错误的是:()

A.PTN62006300设备可以通过网关板和MSTP设备做到监控报文的互通

B.PTN网络监控报文通过三层路由在设备内进行转发,无隧道/伪线的封装及解封装过程

C.PTN设备若根据G.8114及Y.1731协议标准进行区分,两种大版本的设备无法进行监控报文的互通

D.PTN6100设备的mac地址学习速度可以达到150个/s

点击查看答案
第7题
如下哪些描述是正确的?()

A.在非结构化仿真模式(SAToP)下,PTN设备不感知TDM信号中的任何结构,而将TDM信号看成恒定速率的比特流,整个TDM信号的带宽是被仿真的。

B.在非结构化仿真模式(SAToP)下,PTN设备提供TDM E1信号中的空闲64Kbit/s时隙压缩功能,节省传输带宽。时隙号从0到31,0号时隙为保留时隙,用来传送信令。

C.目前PTN设备只支持点到点的CES业务类型,即只支持一个E1接口的业务映射到一个PW中,不支持多个TDM接口的业务汇聚映射到一个PW中。

D.在结构化仿真模式(CESoPSN)下,PTN设备能够感知TDM电路中的帧结构、定帧方式、时隙信息。

点击查看答案
第8题
It’s high time ______ about the traffic problem.A.something was doneB.everything is doneC.

It’s high time ______ about the traffic problem.

A.something was done

B.everything is done

C.anything will be done

D.nothing to be done

点击查看答案
第9题
There's()special about the food.You can have a try.

A.anything

B.nothing

C.everything

点击查看答案
第10题
Let's stop shouting at each other and talk about this like two__________people.

Let's stop shouting at each other and talk about this like two__________ people.

A. sensitive

B. rational

C. exhausted

D. resourceful

点击查看答案
第11题
How do you show your interest in the job when your interview is about to be put an end

A.Raise questions about the employer or job.

B.Express your thanks to the interviewer(s).

C.Try to establish contact with the interviewer(s).

D.Restate your interest to the interviewer(s).

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改