网络管理员范例6篇

前言:中文期刊网精心挑选了网络管理员范文供你参考和学习,希望我们的参考范文能激发你的文章创作灵感,欢迎阅读。

网络管理员

网络管理员范文1

关键词:网络管理员考试;结构分析;难点分析;资格和水平考试

中图分类号:TP393文献标识码:A文章编号:1009-3044(2008)22-674-01

2008 Network Administrator of the First half of the Examination

ZHANG Zhi-yong

(Hunan Normal University, Changsha 410081, China)

Abstract: In this paper,we analyse the examination of Network Manager held in May,2008.This examination consists of two parts that one part held in the morning and the other held in the afternoon.we also analyse the emphases and difficulties of the exam.

Key words: examination of network manager; structure analysis; difficulty analysis; qualification and level test

1 引言

2008年5月网络管理员考试试题,是全国软件水平考试中的初级级别的考试。本次报考人数全国近4万。通过该考试可以获得相应的助理工程师的职称。本次网络管理员考试题目结构组成和以往的考试成相差不大。难度稍微有所加大。

2 应试指导

由于该考试直接和职称挂钩,同时10多年的考试建立起来的权威性。得到众多考生的认可。同时与国际厂商认证想比较,考试费用较低、涉及的知识点全面―不光考察了基础的计算机知识,也考实际的应用知识。涵盖的计算机课程有计算机体系结构、计算机原理、软件功能、办公软件应用、操作系统、计算机网络基础、软件工程等十几门。其难度高于同等级别的CCNA和HCNA。

1)适合报考考生的要求:由于其难度相对太大,建议考生根据自身的情况和能力,选择考试的级别。一般网络专业的在读学生,在三年级的时候可以试一试这类型的考试。一般其他专业的人员,需要自学大部分的计算机专业的课程,并要积累一定的网络交换机、路由器、Windows服务器、Linux服务器的实际管理经验以及一些网页编程的知识。由于是初级考试,相对其他级别的网络工程师考试是容易的。复习对路,就没有太多的难度了。另外,不要指望一年就通过,因为考试分两个部分,且都要求达标,才可得到证书。如果题目出偏题或者不对自己胃口。有可能一部分不易通过。因此,对于基础较差的考生要多考几次,一般作一年两次考试的打算,一旦走上此路,就造成不要放弃。

2)仔细研究大纲:大纲是考试的指南,只有认真研究了大纲才能制定出合适的复习计划。这里要强调的是,编译原理和高等数学不再是考试大纲所要求的了。

3)选择辅导用书:选择辅导用户是通过考试的关键,目前有些考生使用的辅导材料过于老化,对考试不光没有帮助还有误导的作用。这里建议使用徐峰老师主编的《网络管理员冲刺指南》、和朱小平、施游主编的《网络管理员考试考点分析与真题详解(第2版)》。

3 上午试题结构分析

上午考试英语部分由原来的10分缩减为5分,网络应用的考点相应增加5分。其他考试的分值基本没有太多的变化。表1是按题号对应的考试内容。

4 下午试题结构分析

下午的考试题目依然有以下几个特点:

1)题型设计上,没有多大变换;

2)题型基本上覆盖了考纲中的各个考点;

3)根据近几次网络管理员考试的对比,基本上与往年的考试一样考察Linux基础、Windows服务、网络管理与设计、安全和html、ASP。但在各个大类的基础上,着重的考核处有些不同。考生可以参考往年的试题分析进行比较。

5 总结

总体上来说,本次考试试题难度还是不大的。只要作好历年试题和掌握了网络的基础知识和计算机基础知识,应该能比较轻松的通过该考试。

参考文献:

网络管理员范文2

Dear Mr. Smith,

As a graduate of an institution of higher education, I have a few very basic expectations. Chief among these is that my direct superiors have an intellect that ranges above the common ground squirrel. After your consistent and annoying harassment of my co-workers and me during the commission of our duties, I can only surmise that you are one of the few true genetic wastes of our time.推荐:辞职报告范文专题

Asking me, a network administrator, to explain every little nuance of everything I do each time you happen to stroll into my office is not only a waste of time, but also a waste of precious oxygen. I was hired because I know how to network computer systems, and you were apparently hired to provide amusement to myself and other employees, who watch you vainly attempt to understand the concept of cut and paste for the hundredth time.

You will never understand computers. Something as incredibly simple as binary still gives you too many options. You will also never understand why people hate you, but I am going to try and explain it to you, even though I am sure this will be just as effective as telling you what an IP address is. Your shiny new iMac has more personality than you ever will. copyright dedecms

You walk around the building all day, shiftlessly looking for fault in others. You have a sharp dressed, useless look about you that may have worked for your interview, but now that you actually have responsibility, you pawn it off on overworked staff, hoping their talent will cover for your glaring ineptitude. In a world of managerial evolution, you are the blue-green algae that everyone else eats and laughs at. Managers like you are a sad proof of the Dilbert principle.

Since this situation is unlikely to change without you getting a full frontal lobotomy reversal, I am forced to tender my resignation. However, I have a few parting thoughts.

1. When someone calls you in reference to employment, it is illegal for you to give me a bad recommendation. The most you can say to hurt me is I prefer not to comment. I will have friends randomly call you over the next couple of years to keep you honest, because I know you would be unable to do it on your own.

2. I have all the passwords to every account on the system, and I know every password you have used for the last five years. If you decide to get cute, I am going to publish your favorites list, which I conveniently saved when you made me back up your useless files. I do believe that terms like Lolita are not usually viewed favorably by the administration.

3. When you borrowed the digital camera to take pictures of your Mothers birthday, you neglected to mention that you were going to take pictures of yourself in the mirror nude. Then you forgot to erase them like the techno-moron you really are. Suffice it to say I have never seen such odd acts with a sauce bottle, but I assure you that those have been copied and kept in safe places pending the authoring of a glowing letter of recommendation. (Try to use a spell check please; I hate having to correct your mistakes.)

Thank you for your time, and I expect the letter of recommendation on my desk by 8:00 am tomorrow. One word of this to anybody, and all of your little twisted repugnant obsessions will be open to the public. Never screw with your systems administrator. Why? Because they know what you do with all that free time!

网络管理员范文3

As a graduate of an institution of higher education, I have a few very basic expectations. Chief among these is that my direct superiors have an intellect that ranges above the common ground squirrel. After your consistent and annoying harassment of my co-workers and me during the commission of our duties, I can only surmise that you are one of the few true genetic wastes of our time.

Asking me, a network administrator, to explain every little nuance of everything I do each time you happen to stroll into my office is not only a waste of time, but also a waste of precious oxygen. I was hired because I know how to network computer systems, and you were apparently hired to provide amusement to myself and other employees, who watch you vainly attempt to understand the concept of cut and paste for the hundredth time.

You will never understand computers. Something as incredibly simple as binary still gives you too many options. You will also never understand why people hate you, but I am going to try and explain it to you, even though I am sure this will be just as effective as telling you what an IP address is. Your shiny new iMac has more personality than you ever will.

You walk around the building all day, shiftlessly looking for fault in others. You have a sharp dressed, useless look about you that may have worked for your interview, but now that you actually have responsibility, you pawn it off on overworked staff, hoping their talent will cover for your glaring ineptitude. In a world of managerial evolution, you are the blue-green algae that everyone else eats and laughs at. Managers like you are a sad proof of the Dilbert principle.

Since this situation is unlikely to change without you getting a full frontal lobotomy reversal, I am forced to tender my resignation. However, I have a few parting thoughts.

1. When someone calls you in reference to employment, it is illegal for you to give me a bad recommendation. The most you can say to hurt me is I prefer not to comment. I will have friends randomly call you over the next couple of years to keep you honest, because I know you would be unable to do it on your own.

2. I have all the passwords to every account on the system, and I know every password you have used for the last five years. If you decide to get cute, I am going to publish your favorites list, which I conveniently saved when you made me back up your useless files. I do believe that terms like Lolita are not usually viewed favorably by the administration.

3. When you borrowed the digital camera to take pictures of your Mothers birthday, you neglected to mention that you were going to take pictures of yourself in the mirror nude. Then you forgot to erase them like the techno-moron you really are. Suffice it to say I have never seen such odd acts with a sauce bottle, but I assure you that those have been copied and kept in safe places pending the authoring of a glowing letter of recommendation. (Try to use a spell check please; I hate having to correct your mistakes.)

Thank you for your time, and I expect the letter of recommendation on my desk by 8:00 am tomorrow. One word of this to anybody, and all of your little twisted repugnant obsessions will be open to the public. Never screw with your systems administrator. Why? Because they know what you do with all that free time!

网络管理员范文4

县中小学开展了第一期网络管理员的培训,来自县四十所中小学的网络管理员参加了本次培训。培训分为理论培训与实践实践,理论培训在县进修学校举行,实践培训在宁波大学进行,我作为我校的网络管理员参加了本次培训,并认真学习了有关学校网络管理的相关知识。

当前,中国教育正以前所未有的速度和力度推进自己的信息化建设,并提出了当前阶段教育信息化建设的具体目标——本世纪的头10年内在全国中小学普及信息技术教育,并在全国90%以上的中小学校开设信息技术必修科目,加快信息技术与其他课程的整合;加强信息基础设施和教育资源建设,使全国90%左右独立建制的中小学能够上网,共享优质教育资源,提高教育质量。而作为教育信息化建设的基础,各种教育网络如教育城域网、校园网、教育资源中心等项目也正在全国各地如火如荼地规划与建设之中,校园网络建设得到越来越多教育机构的重视。

我作为一名普通的小学信息技术教师有幸参与了这一培训,在此我先感谢县电教馆和县进修学校为我们提供这一次学习的机会,别人的感受我不知道,但我这一次真的学到了不少东西。本次培训分为三期前两期为理论培训,后有期为实践培训,通过前面两期的培训,大家对网络的基本原理有了全面的了解与认识,而本期培训主要是针对具体的实践操作。

培训的设备主要为网线的制作、共享式以太组网实验、交换机(二层、三层)、路由器、防火墙,从基本的组网拓扑图到静态路由、动态路由的配置,从VLAN的划分到NAT转换及路由器的配置。其中VLAN的划分、NAT转换及路由器的配置对学校网络的组网及维护尤其重要,其相对来说又是网络中比较专业与复杂的工作,普通的中学校教师对这一块的知识基本上都是知道原理但没有具体实践的经验。通过宁波大学几位培训老师专业的讲解与演示,以及对应的操作练习,我对这一块内容有了更具体的认识,操作水平也提高了不少。在此也要衷心感谢我们培训班的两位班主任的辛苦管理。

通过本次培训,我对网络管理这一块工作有了更深的认识,对各种网络设备的操作也更加熟悉。相信本次培训的知识很快就能够运用到我校网络的管理与维护中。

网络管理员范文5

一、XX年我作为网管主要工作内容:

1、 操作系统的维护工作。

主要包含:操作系统的更新维护。

软件的安装调试。

找寻同事领导提出的新软件。

2、 网络的维护工作。

主要包含:网络杀毒软件的安装部署。

网络的正常通讯。

网络服务器的维护。

增加网络管理软件对内部网络的使用规范进行有效的控制。

安装并调试完毕公司的网络系统。

3、 复印机、打印机、传真机等相关办公设备的调试、采购、维护工作。

主要包含:复印机出现故障时作出正确的处理,使之不耽误正常的复印工作。

保障各部门的打印机和传真机正常工作。

采购相关的设备耗才。

维护办公设备的正常运行。

联系供应商对设备进行维护、保养、维修。

4、 电脑及部分耗材的采购工作。

主要包含:采购办公室新近员工办公用的电脑,并按使用程度作出不用的采购方案。

二、 XX年里我的工作中的欠缺与改善方法

XX年一年多的工作总有不足的地方,有些是自己能感受到的有些是领导指出的。做出总结争取在来年的工作中能够得到好的改善。

1. 网络行为的控制

网络管理员范文6

一、高职院校校园网络现状

(1)考虑到投入和收益的比例,众多学校对校园网络的经费投入不足,再加上掌握决策权的学校领导对信息技术的了解不多,对建设校园网的目的不明确,所以就将有限的经费投资在关键的硬件设备上,而对于网络的安全建设一直没有比较系统的投入,从而导致校园网络安全防范能力不够,随时都有被侵袭的危险,存在极大的安全隐患。

(2)计算机蠕虫病毒泛滥与网络蠕虫病毒的危害日益严重,种类和数量日益增多,发作日益频繁。现在蠕虫病毒往往与黑客技术结合,计算机中毒发作后,常导致拒绝服务攻击,连累全网服务中断。过去病毒最大的“本事”是复制自身到其他程序,现在它具有了蠕虫的特点,通过网络到处乱窜。还有些病毒具有黑客程序的功能,一旦侵入计算机系统后,病毒控制者可以从入侵的系统中窃取信息,远程控制这些系统了。

(3)来自网络外部的入侵攻击等恶意破坏行为频率越来越高。某些计算机被攻破后,可能成为黑客的工具,进行再次攻击。例如,系统攻击就是攻击针对单个主机,并通过RealSecure系统对它进行监视。

(4)众多学校技术人员技术参差不齐,责任心不强,多数网络管理员都从大中专院校毕业,在工作之前没有受过系统的专业培训,所以,不能很好地胜任本职工作。如把在计算机中装上还原卡当作是万能管理方法;不设置系统管理员密码;在系统中不安装防火墙和杀毒软件等等。另外,有些网络管理员敷衍塞责,对出现的系统故障置之不理。

二、高职院校校园网中的安全隐患

(1)校园网通过与Internet相联,在享受Internet方便快捷的同时,也面临着遭遇攻击的风险;

(2)目前使用的操作系统存在安全漏洞,对网络安全构成了威胁;

(3)校园网内部也存在很大的安全隐患,由于内部用户对网络的结构和应用模式都比较了解,因此来自内部的安全威胁更大一些;

(4)S着校园内计算机应用的大范围普及,接入校园网节点日渐增多,而这些节点大部分没有采取一定的防护措施,随时有可能造成病毒泛滥、信息丢失、数据损坏、网络被攻击、系统瘫痪等严重后果;

(5)限于学院数字化的进程,目前的网络防护体系中还缺少硬件级防火墙这一防护环节,即没有对内部网和外部网进行有效的隔离,入侵就很难避免。

三、高职院校校园网络安全解决方案

1.升级网络基础交换设备。

将校园网内所有交换机全部升级为安全智能接入交换机。智能接入交换机具备大容量访问控制功能,能够屏蔽常见病毒端口,将病毒攻击、网关攻击等行为限制在接入层。并结合用户上网认证系统,对用户进入校园网的权限及可用资源实行规范、分级管理。

2.配备完整的系统的网络安全设备。

校园网络虽然比较复杂,但从整体技术架构来看,还是属于局域网范畴,因此,在局域网和外部网络接口处配置统一的网络安全控制和监管设备即可将绝大多数外部攻击拒之门外。另外需要注意的是,校园网络现在基本上都是高速网络,因此配置安全设备既要考虑到功能,又必须考虑性能,将配置安全设备后对网络性能的影响尽可能的降到最低。据此要求,校园网络需要配备以下安全设备:高性能的硬件防火墙;旁路监听型的入侵检测系统;漏洞扫描系统;安全审计系统;旁路监听型不良内容过滤系统;覆盖全校范围的网络版防病毒系统;网络故障检测,以及网络故障诊断设备。通过配置这些安全产品可以实现对校园网络进行系统的防护、预警和监控,对大量的非法访问和不健康信息起到有效的阻断作用,对网络的故障可以迅速定位并解决。

3.安装补丁程序和网络杀毒软件。

任何操作系统都有漏洞,大部分校园网服务器使用的操作系统都有漏洞,尤其是Windows2000、Windows2003等微软的操作系统。网络系统管理员需要及时对系统进行升级,有时候也可以借助第三方安全软件来对系统进行升级。电脑病毒的防范,根据校园网现状,在充分考虑可行性的基础上,可采用杀毒软件网络版的分级管理,多重防护体系作为校园网的防病毒管理架构。充分使用杀毒软件网络版所拥有的“远程安装”、“智能升级”、“集中管理”等多种功能,为校园网络建立起一个完善的防病毒体系。

4.采取有利措施防止内部用户非正常使用和对校园网的的攻击行为。

建立各部门计算机使用制度,明确用户的责任和义务,严禁各部门随意安装和运行一些带有黑客性质的软件。严禁使用未检验的光盘、软盘和其他移动存储设备。对校园网上的计算机实施IP和MAC地址的绑定,防止私自乱改IP的现象发生。