2016西南大学英语专业-0089--答案
西南大学[0089]《专业英语》在线作业
[0089]《专业英语》31、7.Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选择:Enclosed analyzing rates more opportunity Protection at needs with believe答:.move32、8.Dear Mr.Cresswell:Than you for gi ving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选项Enclosed analyzing rates more opportunity Protection at needs with believe答:protection33、10.Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选项Enclosed analyzing rates more opportunity Protection at needs with believe答:at34、9.Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选项Enclosed analyzing rates more opportunity Protection at needs with believe35、3. Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选择:Enclosed analyzing rates more opportunity Protection at needs with believe36、6.Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选择:Enclosed analyzing rates more opportunity Protection at needs with believe答:with37、1. Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选择Enclosed analyzing rates more opportunity Protection at needs with believe答:opportunity38、2. Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选择:Enclosed analyzing rates more opportunity Protection at needs with believe39、5.Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选择:Enclosed analyzing rates more opportunity Protection at needs with believe40、4. Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide you with 7 than adequate 8 for yourself and your family.It will also save you money over your present overage policy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选择:Enclosed analyzing rates more opportunity Protection at needs with believe答:needs41、A computer system includes a computer, peripheral devices, and software. The electric, electronic, and mechanical devices used for processing data are referred to as hardware. In addition to the computer itself, the term “hardware”refers to components called peripheral devices that expand the computer’s input, output, and storage capabilities. Computer hardware in and of itself does not provide a particularly useful mind tool. To be useful, a computer requires a set of instructions, called software or a computer program, which tells the computer how to perform a particular task. Computers become even more effective when connected to other computers in a network so users can share information.答:计算机系统包括一台计算机、外围设备和软件。
2016年英语专八考试真题及答案
QUESTION BOOKLETTEST FOR ENGLISH MAJORS (2016)-GRADE EIGHT—TIME LIMIT: 150 MINPART I LISTENING COMPREHENSION [25 MIN]SECTION A MINI—LECTUREIn this section you will hear a mini-lecture。
You will hear the mini—lecture ONCE ONLY. While listening to the mini—lecture, please complete the gap-filling task on ANSWER SHEET ONE and write NO MORE THAN THREE WORDS for each gap. Make sure the word(s) you fill in is (are)both grammatically and semantically acceptable. Y ou may use the blank sheet for note-taking.You have THIRTY seconds to preview the gap—filling task。
Now listen to the mini—lecture. When it is over,you will be given THREE minutes to check your work。
SECTION B INTERVIEWIn this section you will hear ONE interview. The interview will be divided into TWO parts. At the end of each part, five questions will be asked about what was said. Both the interview and the questions will be spoken ONCE ONLY。
西南大学英语试题及答案
西南大学英语试题及答案一、选择题(每题2分,共20分)1. Which of the following words is spelled incorrectly?A. AccommodateB. AcknowledgeC. AcquaintanceD. Acquited2. The sentence "He is a man of few words but many actions." means that he is:A. TalkativeB. ReservedC. ImpulsiveD. Inactive3. In the context of a business meeting, "to table a motion" means:A. To put the motion on the tableB. To postpone the motionC. To introduce a motion for discussionD. To end the discussion of the motion4. The phrase "break the ice" is commonly used to describe:A. Starting a conversationB. Ending a relationshipC. Cooling down a heated argumentD. Freezing a liquid5. Which of the following is the correct usage of the word "literally"?A. He was literally blown away by the news.B. The book is literally full of errors.C. The movie was literally a roller coaster ride.D. She literally jumped for joy.6. The word "meticulous" is best described as:A. CarelessB. DetailedC. ConfusedD. Impatient7. In the sentence "She is the apple of his eye," the phrase "apple of his eye" means:A. Something he dislikesB. Something he cherishesC. Something he eatsD. Something he sees clearly8. The phrase "bite the bullet" is used to describe:A. Facing a difficult situation bravelyB. Eating a bulletC. Avoiding a difficult situationD. Chewing gum9. The word "quixotic" is often used to describe a person who is:A. PragmaticB. DelusionalC. RealisticD. Skeptical10. The idiom "to turn a blind eye" means:A. To ignore something intentionallyB. To see something without glassesC. To close one eye in a winkD. To look at something without seeing it二、填空题(每题2分,共20分)1. The opposite of "transparent" is _________.2. "To go the extra mile" means to do _________.3. The word "paradox" is used to describe a situation that is _________.4. "To hit the nail on the head" means to _________.5. The phrase "a picture is worth a thousand words" implies that _________.6. "To be in the dark" means to be _________.7. "To take something with a grain of salt" means to_________.8. The idiom "to let the cat out of the bag" means to_________.9. "To be on the same page" means that everyone _________.10. "To be in a pickle" means to be in a _________.三、阅读理解(每题4分,共40分)Read the following passage and answer the questions that follow.Passage:[Insert a short passage here. The passage should be relevant to the context of an English language exam and should containenough information to ask several comprehension questions.]1. What is the main idea of the passage?2. According to the passage, why is it important to _________?3. What does the author suggest as a solution to the problem discussed?4. How does the author support their argument?5. What is an example given in the passage to illustrate the point made?四、写作题(共20分)Write an essay on the following topic:"The Impact of Technology on Modern Communication"Your essay should be at least 300 words and should include an introduction, body paragraphs, and a conclusion. Be sure to use appropriate examples to support your points.答案:一、选择题1. D2. B3. C4. A5. A6. B7. B8. A9. B10. A二、填空题1. opaque2. more than what is expected3. contradictory4. be exactly right5. a visual representation can convey more information than words6. uninformed or unaware7. be skeptical or not completely believe something8. reveal a secret9. agrees or understands something10. difficult situation三、阅读理解1. [Answer based on the passage's main idea]2. [Answer based on the passage's content]3. [Answer based on the passage's content]4. [Answer based on the passage's content]5. [Answer based on the passage's content]四、写作题[Essays will vary; no specific answer provided.]。
西南大学[0089]《专业英语》在线作业
西南大学网络教育[0089]《专业英语》1、The physical components of a computer are collectively called _________.A.memoryB.boardsC.softwareD.hardware正确答案: D2、The fifth generation computers, with artificial intelligence,______ and perfected now.A.developedB.have developedC.are being developedD.will have been developed正确答案: C3、The basic input device on a small computer is a ________.A.A display screenB.keyboardC.printerD.card reader正确答案: B4、You ______ her in her office last Friday; shes been out of town for two weeks.A.needn’t have seenB.must have seenC.might have seenD.can't have seen?正确答案: B5、Transaction changed to your telephone bill are calledA.credit card paymentsB.virtual pin paymentsC.E-charge paymentsD.Internet-bill payments.正确答案: C6、7. This ticket ______ you to a free meal in our new restaurant.A.givesB.grantsC.entitlesD.credits正确答案: C7、2. Program that can destroy another computer’s programs are called______.A.gamesB.virusesC.bugsD.bugs正确答案: B8、Data and program instructions are stored in_________A.the processorB.storageC.programD.output正确答案: B9、The percentage of times an ad is clicked on based on the number of times it’s viewed is calledA.hitsB.impressionsC.CPMD.CTR正确答案: D10、The purpose of input device is __________.A. to enter commands B. to hold instructions C. to input data D. both a and cA.to enter commandsB.to hold instructionsC.to input dataD.both a and c正确答案: D11、which belong(s) to input device?A.MouseB.KeyboardC.ScreenD.Printer正确答案: AB12、TCP/IP protocol include____________________A.TCP ProtocolB.IP protocolC.Ftp ProtocolD.HTTP protocol正确答案: AB13、An E-commerce shopping cart_____________A.stores information about your purchasesB.allows you to change items quantitiesC.keeps a running total of itemsD.Keeps a running count of items正确答案: ABCD14、_____________________ are E busimess modelsA.B2BB.B2CC.C2CD.O2O正确答案: ABCD15、which is(are) E-business company?A.GoogleB.BaiduC.AmazonD.Alibaba正确答案: CD16、TCP/IP protocol is the Internet protocolA.√B.×正确答案: A17、Windows is a GUI-based operating systemA.√B.×正确答案: A18、The components of personal computer include CPU, input device, output device and memory.A.√B.×正确答案: A19、Amazon is the first B2B companyA.√B.×正确答案: A20、Alibaba is only operated in ChinaA.√B.×正确答案: B21、5.Dear Mr.Cresswell:Than you for giving us the 1 to quote on MBC’s home, life, and disability insurance 2 .By 3 your personal 4 and financial goals, I 5 we have come up 6 a coverage plan that will provide youwith 7 than adequate 8 for yourself and your family.It will also save you money over your present overagepolicy. I have 9 copies of the proposed plans and rates.I will call 10 the end of next week to see if you have any questions.Sincerely,Robert MartinAccount ExecutiveEnclosures选择:Enclosed analyzing rates more opportunityProtection at needs with believe本题参考答案:believe.22、Explain the abbreviationB2C参考答案:business to customer23、2. Please translate the following into English.计算机不止桌面电脑和笔记本电脑。
《专业英语》西南大学20年6月机考限时答案
西南大学培训与继续教育学院课程课程名称:(0089)《专业英语》一、单项选择题(本大题共 10 小题,每道题 2.0 分,共 20.0 分)1.The OSI model has ( ) layersA.fourB.fiveC.sixD.seven2.Which one is not a computer languages?( )A.wordB.PythonC.CD.C++3.( ) is a word processing tool that helps you to create quality documents.A.WordB.OutlookC.AccessD.Excel4.( ) is a device that enables the computer to handel soundswork cardB.video cardC.sound cardD.monitor5.The RGB value is composed of ( ) componentsA.oneB.twoC.threeD.four6.( ) is a fast and powerful operating system, based on the UNIX O.S.A.WindowsB.OfficeC.WindowsD.Linux7.The purpose of the ( ) is to provide fully integrated analog services to users .A.ISDNB.WWWC.FTPD.HTTP8.( ) is used to communicate with another computer over telephone lines.A.KeyboardB.ModernC.MouseD.Printer9.Virus is a ( )A.ProgramputerC.Bad manD.Beast10.The ( ) turns the object file into an executable programA.linkerpilerC.interpreterputer二、填空题(本大题共 10 小题,每道题 3.0 分,共 30.0 分)1.The year 2000 was a turning point in electronic commerce. It marked then end of the dot-com( )boom2.The three most commonly used categories of electronic commerce are B2C,( ) an d business processes.B2B3.Most people use the terms electronic commerce and electronic ( )interchangeab lybusiness4.The increase in ( ) connections in homes is a key element in the second wave o f electronic commerce.broadband5.In computer security, integrity covers the two related concepts of ( ) integr ity and system integritydata6.When a consumer sells a good or service to another consumer, the model is calle d ( )cal7.In C2C transactions, one party is selling, and thus acting as a business, so th ey are sometimes treated as part of ( )electronic commerceC2C8.A ( )is a string of characters used for authenticating a user on a computer s ystem.password9.Ecommerce, also known as electronic commerce or internet commerce, refers to t he buying and ( )of goods or services using the internetselling10.Security concerns with respect to data encompass availability, secrecy, and ( )integrity三、判断题(本大题共 5 小题,每道题 2.0 分,共 10.0 分)1.We can use multimedia in Education, Entertainment and and so on.对错2.When you send an email you should provide the sender's email address 对错3.Viruses can cause programs crashing but cant cause entire hard disk deleting 对错。
18春西南大学专业英语【0089】机考答案.doc
西南大学网络1、答:T h ee n t核心(Core)和控制核心(Control Unit)o它的功能主要是解释计算机指令以及处理计算机软件中的数据。
LAN:局域网(Local Area Network, LAN)是指在某一区域内由多台计算机互联成的计算机组。
一般是方圆几千米以内。
局域网可以实现文件管理、应用软件共享、打印机共享、工作组内的日程安排、电子邮件和传真通信服务等功能。
5、答:Mobile internet has a great impact on our lives. Each of us uses a mobile phone every day ・ Every day on the road and on the bus, we see that some people are holding mobile phones. The innovation of the mobile internet has facilitated the life of each of us. Now that things that are ordinary are unthinkable a few years ago, we can easily shop on mobile phones; we can easily communicate with friends; and we can play some cool ones. Games; Easy and quick money transfers, easy money managemen匸Here we talk about the impact of mobile internet on us:Easy shopping:Most of the shopping believers have had an online shopping experience・ They photographed what they wanted on the Internet, and then clicked on payment - quick payment - automatically generated a QR code, took out a mobile phone to scan the QR code and easily paid for it・The other is in the physical store, I believe many people will see they will write to support Alipay payment, support WeChat payment. In the near future we can even boldly imagine that the practical amount of banknotes will be very small, because we can easily pay by mobile phone.Red envelopes:One of the hottest words for the Spring Festival in 2014 was the red envelope. Alipay and WeChat paid both took aim at the Spring Festival Gala, which was bombed by various activities that robbed red packets every day. Of course, some of these activities have grabbed some red envelopes. We don't evaluate how much the red envelopes are. The way of moving the Inter net's red envelopes has changed the way we traditionally use red envelopes・ Through mobile phones, we can easily send red envelopes to others.Mobile financial management:Talking about internet financeIn June 2013, Yu Thang Bao launched, and once it『eached an annual rate of 7 percen匸The next step was the birth of various treasures. Major companies followed suit with Alipay through cooperation with fund companies. It is now always remembered that at that time, people would often count the annualized interest rates of the major treasures on the Internet. This is an inno vation in Inter net finance that greatly facilitates people's lives.Money transfer:Mobile payment greatly facilitates the transfer between each of us. We often encounter people who have borrowed money and then repay it through Alipay, or pay for it when they eat, and others transfer money through Alipay. Even some organizations organizing some activities to pay directly through fast payment transfers, pay utility bills, call charges, and even pay tuition.。
西南大学《专业英语》网上作业题及答案
(0089)《专业英语》网上作业题答案1:第一次作业短语英译汉2:第二次作业短语汉译英3:第三次作业单项选择4:第四次作业单项选择5:第五次作业翻译6:第六次作业写作参考答案:1、数字(激光)视盘,DVD2. (文)字处理程序3. 存储(器)芯片,内存芯片4. 密码电报5. 蜂窝电话,移动电话,手机6. 集成电路7. 电子邮件网规,电子邮件网络礼节8. 电子邮件常规9. 点击图标10. 密件,秘密文件11. 密级信息12. 签名文件13. 主存储器14. 虚拟存储器,虚拟内存15. 分时段的多任务处理16. 桌面操作系统17. 电子游戏机18. 电子数据表程序,电子制表程序19. 存储寄存器20. 函数语句21. 关系(型)语言22. 面向对象语言23. 汇编语言24. 中间语言,中级语言25. 人工智能1£º[ÂÛÊöÌâ]Ç뽫ÏÂÁÐÓ¢ÎÄÒëΪÖÐÎÄ£º1£®A computer system includes a computer, peripheral devices, and software. The electric, electronic, and mechanical devices used for processing data are referred to as hardware. In addition to the computer itself, the term "hardware¡±refers to components called peripheral devices that expand the computer's input, output, and storage capabilities. Computer hardware in and of itself does not provide a particularly useful mind tool. To be useful, a computer requires a set of instructions, called software or a computer program, which tells the computer how to perform a particular task. Computers become even more effective when connected to other computers in a network so users can share information.2. Many schools and businesses have established e-mail privacy policies, which explain the condition under which you can and cannot expect your e-mail to remain private. These policies aresometimes displayed when the computer boots or a new user logs in. Court decisions, however, seem to support the notion that because an organization owns and operates an e-mail system, the e-mail message on that system are also the property of the organization. The individual who authors an e-mail message does not own all rights related to it. The company or school that supplies your e-mail account can, therefore, legally monitor your messages. You should use your e-mail account with the expectation that some of your mail will be read from time to time. Think of your e-mail as a postcard, rather than a letter, and save your controversial comments for face-to-face conversations.3£®Multitasking, in computer science, is a mode of operation offered by an operating system in which a computer works on more than one task at a time. There are several types of multitasking. Context switching is a very simple type of multitasking in which two or more applications are loaded at the same time but only the foreground application is given processing time; to activate a background task, the user must bring the window or screen containing that application to the front. In cooperative multitasking, background tasks are given processing time during idle times in the foreground task (such as when the application waits for a keystroke), and only if the application allows it. In time-slice multitasking, each task is given the microprocessor's attention for a fraction of a second. To maintain order, tasks are either assigned priority levels or processed in sequential order. Because the user's sense of time is much slower than the processing speed of the computer, time-slice multitasking operations seem to be simultaneous.4. One especially powerful feature of OOP (objected-oriented programming) languages is a property which is known as inheritance. Inheritance allows an object to take on the characteristics and functions of other objects to which it is functionally connected. Programmers connect objects by grouping them together in different classes and by grouping the classes into hierarchies. These classes and hierarchies allow programmers to define the characteristics and functions of objects without needing to repeat source code, the coded instructions in a program. Thus, using OOP languages can greatly reduce the time it takes for a programmer to write an application, and also reduce the size of the program. OOP languages are flexible and adaptable, so programs or parts of programs can be used for more than one task. Programs written with OOP languages are generally shorter in length and contain fewer bugs, or mistakes, than those written with non-OOP languages.5. In software, a bug is an error in coding or logic that causes a program to malfunction or to produce incorrect results. Minor bugs-for example, a cursor that does not behave as expected-can be inconvenient or frustrating, but not damaging to information. More severe bugs can cause a program to "hang¡± (stop responding to commands) and might leave the user with no alternative but to restart the program, losing any previous work that has not been saved. In either case, the programmer must find and correct the error by the process known as debugging. Because of the potential risk to important data, commercial application programs are tested and debugged as completely as possible before release. Minor bugs found after the program becomes available are corrected in the nest update; more severe bugs can sometimes be fixed with special software, called patches, that circumvents the problem or otherwise reduces its effects.²Î¿¼´ð°¸£º´ð°¸¼û½Ì²Äÿ¿ÎºóµÄ·ÒëÁ·Ï°´ð°¸¡£1:[论述题]请选择下列一个题目写一篇不低于150个词的英文短文.1. The advantages of computer2. How to work with computer?3. How computers change our life?4. My view on chat on the Internet5. My view on computer security参考答案:要求文章用词简单,拼写正确,语法无大的错误,不偏题。
2016年12月西南大网络与继续教育学院专业英语[0089]考试答案
2.Please tБайду номын сангаасanslate the following into English.
A variant on the virus is the worm. This destructive program fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped. The most infamous is known as the Internet Worm. In 1988, it traveled across North America, stopping thousands of computers along its way.
2.Please translate the following into English.
病毒的一个变种是蠕虫病毒。这种破坏性程序用自我复制的信息填满计算机系统,以阻塞系统,使系统的运行减慢或停止。其中最臭名昭著的是因特网蠕虫。1988年,它行遍北美,途中使成千上万的计算机瘫痪。
3. Explain the abbreviation
西南大学网络与继续教育学院课程考试试题卷
类别:网教专业:计算机教育,计算机科学与技术2016年12月
课程名称【编号】:专业英语【0089】A卷
大作业满分:100分
一、大作业题目:
1.Please translate the following into English.
软件首次由开发者/程序员小组开发。通常,在它需要修改之前会使用一段时间。由于软件中错误的发现、规c。为长久使用考虑软件应该被修改。使用和修改,这两个步骤一直进行下去直到软件被废弃。“废弃”意味着因效率低下、语言过时、公司重大变化或其他因素而导致软件失去它的有效性。一些软件开发的例子就经历了这样的周期,比如:学生注册系统、账务系统、会计系统。
(0089)《专业英语》西南大学20年6月机考限时答案
错
3. Viruses can cause programs crashing but cant cause entire hard disk deleting
对
错
4. The TCP/IP Internet protocol suite is formed from five standards
A.linker piler C.interpreter puter
二、 填空题(本大题共 10 小题,每道题 3.0 分,共 30.0 分) 1.
The year 2000 was a turning point in electronic commerce. It marked then end of the dot-com( )
三、 判断题(本大题共 5 小题,每道题 2.0 分,共 10.0 分) 1. We can use multimedia in Education, Entertainment and and so on.
对
错
2. When you send an ail you should provide the sender's email address
C2C
8.
A ( )is a string of characters used for authenticating a user on a computer system.
password
9. Ecommerce, also known as electronic commerce or internet commerce, refers to
对
错
5. Your computer uses two types of memory: primary meory and secondary memory
(0089)《专业英语》西南大学20年6月机考限时答案
西南大学培训与继续教育学院课程一、单项选择题(本大题共10小题,每道题2.0分,共20.0分)1.The OSI model has ( ) layersA.fourB.fiveC.sixD.seven2.Which one is not a computer languages?( )A.wordB.PythonC.CD.C++3.( ) is a word processing tool that helps you to create quality documents.A.WordB.OutlookC.AccessD.Excel4.( ) is a device that enables the computer to handel soundswork cardB.video cardC.sound cardD.monitor5.The RGB value is composed of ( ) componentsA.oneB.twoC.threeD.four6.( ) is a fast and powerful operating system, based on the UNIX O.S.A.WindowsB.OfficeC.WindowsD.Linux7.The purpose of the ( ) is to provide fully integrated analog services to user s.A.ISDNB.WWWC.FTPD.HTTP8.( ) is used to communicate with another computer over telephone lines.A.KeyboardB.ModernC.MouseD.Printer9.Virus is a ( )A.ProgramputerC.Bad manD.Beast10.The ( ) turns the object file into an executable programA.linkerpilerC.interpreterputer二、填空题(本大题共10小题,每道题3.0分,共30.0分)1.The year 2000 was a turning point in electronic commerce. It marked then end of the dot-com( )boom2.The three most commonly used categories of electronic commerce are B2C,( ) and business processes.B2B3.Most people use the terms electronic commerce and electronic ( )interchange ablybusiness4.The increase in ( ) connections in homes is a key element in the second wave of electronic commerce.broadband5.In computer security, integrity covers the two related concepts of ( ) inte grity and system integritydata6.When a consumer sells a good or service to another consumer, the model is calle d ( )cal7.In C2C transactions, one party is selling, and thus acting as a business, so th ey are sometimes treated as part of ( )electronic commerceC2C8.A ( )is a string of characters used for authenticating a user on a computer system.password9.Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and ( )of goods or services using the internetselling10.Security concerns with respect to data encompass availability, secrecy, and ( )integrity三、判断题(本大题共5小题,每道题2.0分,共10.0分)1.We can use multimedia in Education, Entertainment and and so on.对错2.When you send an email you should provide the sender's email address对错3.Viruses can cause programs crashing but cant cause entire hard disk deleting对错4.The TCP/IP Internet protocol suite is formed from five standards对错5.Your computer uses two types of memory: primary meory and secondary memory对错四、翻译题(本大题共5小题,每道题8.0分,共40.0分)1.Please translate the following into ChineseBefore digital recording took over the audio and video industries, everything w as recorded in analog.在数字录音接管音频和视频行业之前,所有内容都以模拟形式录制。
西南大学英语试题及答案
西南大学英语试题及答案一、听力理解(共20分)1. 根据所听对话,选择正确答案。
A) 5:00 pmB) 6:00 pmC) 7:00 pm[答案] B2. 根据所听短文,回答以下问题:Q: What is the main topic of the passage?A) The history of the city.B) The development of tourism.C) The impact of climate change.[答案] B二、阅读理解(共30分)1. 阅读以下短文,选择最佳答案。
Passage 1:...(文章内容略)A) TrueB) FalseC) Not Given[答案] A2. 阅读以下短文,并回答以下问题。
Passage 2:...(文章内容略)Q: What can be inferred from the passage?A) The author supports the idea.B) The author is against the idea.C) The author is neutral.[答案] C三、词汇与语法(共20分)1. 从下列选项中选择最佳答案填空。
A) DespiteB) AlthoughC) Because[例句] _______ it was raining, they still went out for a walk.[答案] A2. 用括号中所给词的正确形式填空。
[例句] The _______ (invent) of the computer has changed our lives.[答案] invention四、完形填空(共15分)1. 阅读下面的短文,从每题所给的选项中选出最佳选项填空。
Passage 3:...(文章内容略)[1] A) successB) failureC) achievement[答案] A[2] A) encouragedB) discouragedC) motivated[答案] C五、翻译(共15分)1. 将下列句子从英语翻译成中文。
2016英语专八考试真题与答案解析
2016英语专⼋考试真题与答案解析QUESTION BOOKLETTEST FOR ENGLISH MAJORS (2016)-GRADE EIGHT-TIME LIMIT: 150 MINPART I LISTENING COMPREHENSION [25 MIN]SECTION A MINI-LECTUREIn this section you will hear a mini-lecture. You will hear the mini-lecture ONCE ONLY. While listening to the mini-lecture, please complete the gap-filling task on ANSWER SHEET ONE and write NO MORE THAN THREE WORDS for each gap. Make sure the word(s) you fill in is (are) both grammatically and semantically acceptable. You may use the blank sheet for note-taking.You have THIRTY seconds to preview the gap-filling task.Now listen to the mini-lecture. When it is over, you will be given THREE minutes to check your work.SECTION B INTERVIEWIn this section you will hear ONE interview. The interview will be divided into TWO parts. At the end of each part, five questions will be asked about what was said. Both the interview and the questions will be spoken ONCE ONLY. After each question there will be a ten-second pause. During the pause, you should read the four choices of A, B, C and D, and mark the best answer to each question on ANSWER SHEET TWO.You have THIRTY seconds to preview the questions.Now, listen to the Part One of the interview. Questions 1 to 5 are based on Part One of the interview.1. A. Maggie’s university life.B. Her mom’s life at Harvard.C. Maggie’s view on studying with Mom.D. Maggie’s opinion on her mom’s major.2. A. They take exams in the same weeks.B. They have similar lecture notes.C. They apply for the same internship.D. They follow the same fashion.3. A. Having roommates.B. Practicing court trails.C. Studying together.D. Taking notes by hand.4. A. Protection.B. Imagination.C. Excitement.D. Encouragement.5. A. Thinking of ways to comfort Mom.B. Occasional interference from Mom.C. Ultimately calls when Maggie is busy.D. Frequent check on Maggie’s grades.Now, listen to the Part Two of the interview. Questions 6 to 10 are based on Part Two of the interview.6. A. Because parents need to be ready for new jobs.B. Because parents love to return to college.C. Because kids require their parents to do so.D. Because kids find it hard to adapt to college life.7. A. Real estate agent.B. Financier.C. Lawyer.D. Teacher.8. A. Delighted.B. Excited.C. Bored.D. Frustrated.9. A. How to make a cake.B. How to make omelets.C. To accept what is taught.D. To plan a future career.10.A. Unsuccessful.B. Gradual.C. Frustrating.D. Passionate.PART II READING COMPREHENSION [45 MIN] SECTION A MULTIPLE-CHOICE QUESTIONSIn this section there are three passages followed by fourteen multiple choice questions. For each multiple choice question, there are four suggested answers marked A, B, C and D. Choose the one that you think is the best answer and mark your answers on ANSWER SHEET TWO.PASSAGE ONE(1)There was music from my neighbor’s house through the summer nights. In his blue gardens men and girls came and went like moths among the whisperings and the champagne and the stars. At high tide in the afternoon I watched his guests diving from the tower of his raft or taking the sun on the hot sand of his beach while his two motor-boats slit the waters of the Sound, drawing aquaplanes(滑⽔板)over cataracts of foam. On weekends Mr. Gatsby’s Rolls-Royce became an omnibus, bearing parties to and from the city between nine in the morning and long past midnight, while his station wagon scampered like a brisk yellow bug to meet all trains. And on Mondays eight servants, including an extra gardener, toiled all day with scrubbing-brushes and hammer and garden-shears, repairing the ravages of the night before.(2)Every Friday five crates of oranges and lemons arrived from a fruiterer in New York – every Monday these same oranges and lemons left his back door in a pyramid of pulpless halves. There was a machine in the kitchen which could extract the juice of two hundred oranges in half an hour, if a little button was pressed two hundred times by a butler’s thumb.(3)At least once a fortnight a corps of caterers came down with several hundred feet of canvas and enough colored lights tomake a Christmas tree of Gatsby’s enormous garden. On buffet tables, garnished with glistening hors-d’oeuvre(冷盘), spiced baked hams crowded against salads of harlequin designs and pastry pigs and turkeys bewitched to a dark gold. In the main hall a bar with a real brass rail was set up, and stocked with gins and liquors and with cordials(加⾹甜酒)so long forgotten that most of his female guests were too young to know one from another.(4)By seven o’clock the orchestra has arrived– no thin five-piece affair but a whole pitful of oboes and trombones and saxophones and viols and cornets and piccolos and low and high drums. The last swimmers have come in from the beach now and are dressing upstairs; the cars from New York are parked five deep in the drive, and already the halls and salons and verandas are gaudy with primary colors and hair shorn in strange new ways, and shawls beyond the dreams of Castile. The bar is in full swing, and floating rounds of cocktails permeate the garden outside until the air is alive with chatter and laughter and casual innuendo and introductions forgotten on the spot and enthusiastic meetings between women who never knew each other’s names.(5)The lights grow brighter as the earth lurches away from the sun and now the orchestra is playing yellow cocktail music and the opera of voices pitches a key higher. Laughter is easier, minute by minute, spilled with prodigality, tipped out at a cheerful word.(6)The groups change more swiftly, swell with new arrivals, dissolve and form in the same breath –already there are wanderers, confident girls who weave here and there among the stouter and more stable, become for a sharp, joyous moment the center of a group and then excited with triumph glide on through the sea-change of faces and voices and color under the constantly changing light.(7)Suddenly one of these gypsies in trembling opal, seizes a cocktail out of the air, dumps it down for courage and moving her hands like Frisco dances out alone on the canvas platform. A momentary hush; the orchestra leader varies his rhythm obligingly for her and there is a burst of chatter as the erroneous news goe s around that she is Gilda Gray’s understudy from the Folies. The party has begun.(8)I believe that on the first night I went to Gatsby’s house I was one of the few guests who had actually been invited. People were not invited –they went there. They got into automobiles which bore them out to Long Island and somehow they ended up at Gatsby’s door. Once there they were introduced by somebody whoknew Gatsby, and after that they conducted themselves according to the rules of behavior associated with amusement parks. Sometimes they came and went without having met Gatsby at all, came for the party with a simplicity of heart that was its own ticket of admission.(9)I had been actually invited. A chauffeur in a uniform crossed my lawn early that Saturday morning with a surprisingly formal note from his employer – the honor would be entirely Gatsby’s, it said, if I would attend his “little party” that night. He had seen me several times and had intended to call on me long before but a peculiar combination of circumstances had prevented it –signed Jay Gatsby in a majestic hand.(10)Dressed up in white flannels I went over to his lawn a little after seven and wandered around rather ill-at-ease among swirls and eddies of people I didn’t know – though here and there was a face I had noticed on the commuting train.I was immediately struck by the number of young Englishmen dotted about; all well dressed, all looking a little hungry and all talking in low earnest voices to solid and prosperous Americans. I was sure that they were selling something: bonds or insurance or automobiles. They were, at least, agonizingly aware of the easy money in the vicinity and convinced that it was theirs for a few words in the right key.(11)As soon as I arrived I made an attempt to find my host but the two or three people of whom I asked his whereabouts stared at me in such an amazed way and denied so vehemently any knowledge of his movements that I slunk off in the direction of the cocktail table – the only place in the garden where a single man could linger without looking purposeless and alone.11.It can be inferred form Para. 1 that Mr. Gatsby ______ through the summer.A.entertained guests from everywhere every weekendB.invited his guests to ride in his Rolls-Royce at weekendsC.liked to show off by letting guests ride in his vehiclesD.indulged himself in parties with people from everywhere12.In Para.4, the word “permeate” probably means ______.A.perishB.pushC.penetrateD.perpetrate13.It can be inferred form Para. 8 that ______.A.guests need to know Gatsby in order to attend his partiesB.people somehow ended up in Gatsby’s house as guestsC.Gatsby usually held garden parties for invited guestsD.guests behaved themselves in a rather formal manner14.According to Para. 10, the author felt ______ at Gatsby’s party.A.dizzyB.dreadfulC.furiousD.awkward15.What can be concluded from Para.11 about Gatsby?A.He was not expected to be present at the parties.B.He was busy receiving and entertaining guests.C.He was usually out of the house at the weekend.D.He was unwilling to meet some of the guests.PASSAGE TWO(1)The Term “CYBERSPACE” was coined by William Gibson, a science-fiction writer. He first used it in a short story in 1982, and expanded on it a couple of years later in a novel, “Neuromancer”, whose main character, Henry D orsett Case, is a troubled computer hacker and drug addict. In the book Mr Gibson describes cyberspace as “a consensual hallucination experienced daily by billions of legitimate operators” and “a graphic representation of data abstracted from the banks of every computer in the human system.”(2)His literary creation turned out to be remarkably prescient(有先见之明的). Cyberspace has become shorthand for the computing devices, networks, fibre-optic cables, wireless links and other infrastructure that bring the internet to billions of people around the world. The myriad connections forged by these technologies have brought tremendous benefits to everyone who uses the web to tap into humanity’s collective store of knowledge every day.(3)But there is a darker side to this extraordinary invention. Data breaches are becoming ever bigger and more common. Last year over 800m records were lost, mainly through such attacks. Among the most prominent recent victims has been Target, whose chief executive, Gregg Steinhafel, stood down from his job in May, a few months after the giant American retailer revealed that online intruders had stolen millions of digital records about its customers, including credit- anddebit-card details. Other well-known firms such as Adobe, a tech company, and eBay, an online marketplace, have also been hit.(4) The potential damage, though, extends well beyond such commercial incursions. Wider concerns have been raised by the revelations about the mass surveillance carried out by Western intelligence agencies made by Edward Snowden, a contractor to America’s National Security Agency (NSA), as well as by the growing numbers of cyber-warriors being recruited by countries that see cyberspace as a new domain of warfare. America’s president, Barack Obama, said in a White House press release earlier this year that cyber-threats “pose one of the gravest national-security dangers” the country is facing. (5)Securing cyberspace is hard because the architecture of the internet was designed to promote connectivity, not security. Its founders focused on getting it to work and did not worry much about threats because the network was affiliated with America’s military. As hackers turned up, layers of security, from antivirus programs to firewalls, were added to try to keep them at bay. Gartner, a research firm, reckons that last year organizations around the globe spent $67 billion on information security.(6)On the whole, these defenses have worked reasonably well. For all the talk about the risk of a “cyber 9/11”, the internet has proved remarkably resilient. Hundreds of millions of people turn on their computers every day and bank online, shop at virtual stores, swap gossip and photos with their friends on social networks and send all kinds of sensitive data over the web without ill effect. Companies and governments are shifting ever more services online.(7)But the task is becoming harder. Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly. A recent estimate by the Centre for Strategic and International Studies (CSIS), puts the annual global cost of digital crime and intellectual-property theft at $445 billion –a sum roughly equivalent to the GDP of a smallish rich European country such as Austria.(8)To add to the worries, there is also the risk of cyber-sabotage. Terrorists or agents of hostile powers could mount attacks on companies and systems that control vital parts of an economy, including power stations, electrical grids and communications networks. Such attacks are hard to pull off, but not impossible. One precedent is the destruction in 2010 of centrifuges(离⼼机)at a nuclear facility in Iran by a computer program known as Stuxnet.(9)But such events are rare. The biggest day-to-day threats faced by companies and government agencies come from crooks and spooks hoping to steal financial data and trade secrets. For example, smarter, better-organized hackers are making life tougher for the cyber-defenders, but the report will argue that even so a numberof things can be done to keep everyone safer than they are now.(10)One is to ensure that organizations get the basics of cyber-security right. All too often breaches are caused by simple blunders, such as failing to separate systems containing sensitive data from those that do not need access to them. Companies also need to get better at anticipating where attacks may be coming from and at adapting their defences swiftly in response to new threats. Technology can help, as can industry initiatives that allow firms to share intelligence about risks with each other.(11)There is also a need to provide incentives to improve cyber-security, be they carrots or sticks. One idea is to encourage internet-service providers, or the companies that manage internet connections, to shoulder more responsibility for identifying and helping to clean up computers infected with malicious software. Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.(12)An additional reason for getting tech companies to give a higher priority to security is that cyberspace is about to undergo another massive change. Over the next few years billions of new devices, from cars to household appliances and medical equipment, will be fitted with tiny computers that connect them to the web and make them more useful. Dubbed “the internet of things”, this is already making it possible, for example, to control home appliances using smartphone apps and to monitor medical devices remotely.(13)But unless these systems have adequate security protection, the internet of things could easily become the internet of new things to be hacked. Plenty of people are eager to take advantage of any weaknesses they may spot. Hacking used to be about geeky college kids tapping away in their bedrooms to annoy their elders. It has grown up with a vengeance.16.Cyberspace is described by William Gibson as ______.A. a function only legitimate computer operators haveB. a representation of data from the human systemC.an important element stored in the human systemD.an illusion held by the common computer users17.Which of the following statements BEST summarizes the meaning of the firstfour paragraphs?A.Cyberspace has more benefits than defects.B.Cyberspace is like a double-edged sword.C.Cyberspace symbolizes technological advance.D.Cyberspace still remains a sci-fi notion.18.According to Para. 5, the designing principles of the internet and cyberspacesecurity are ______.A.controversial/doc/7f0db29f0aa1284ac850ad02de80d4d8d05a0163.html plimentaryC.contradictoryD.congruent19.What could be the most appropriate title for the passage?A.Cyber Crime and Its Prevention.B.The Origin of Cyber Crime.C.How to Deal with Cyber Crime.D.The Definition of Cyber Crime.PASSAGE THREE(1)You should treat skeptically the loud cries now coming from colleges and universities that the last bastion of excellence in American education is being gutted by state budget cuts and mounting costs. Whatever else it is, higher education is not a bastion of excellence. It is shot through with waste, lax academic standards and mediocre teaching and scholarship.(2)True, the economic pressures – from the Ivy League to state systems –are intense. Last year, nearly two-thirds of schools had to make midyear spending cuts to stay within their budgets. It is also true (as university presidents and deans argue) that relieving those pressures merely by raising tuitions and cutting courses will make matters worse. Students will pay more and get less. The university presidents and deans want to be spared from further government budget cuts. Their case is weak. (3)Higher education is a bloated enterprise. Too many professors do too little teaching to too many ill-prepared students. Costs can be cut and quality improved without reducing the number of graduates. Many colleges and universities should shrink. Some should go out of business. Consider:Except for elite schools, admissions standards are low. About 70 percent of freshmen at four-year colleges and universities attend their first-choice schools. Roughly 20 percent go to their second choices. Most schools have eagerly boosted enrollments to maximize revenues (tuition and statesubsidies).●Dropout rates are high. Half or more of freshmen don’t get degrees. A recentstudy of PhD programs at 10 major universities also found high dropout rates for doctoral candidates.●The attrition among undergraduates is particularly surprising becausecollege standards have apparently fallen. One study of seven top schools found widespread grade inflation. In 1963, half of the students in introductory philosophy courses got a B –or worse. By 1986, only 21 percent did. If elite schools have relaxed standards, the practice is almost surely widespread.●Faculty teaching loads have fallen steadily since the 1960s. In majoruniversities, senior faculty members often do less than two hours a day of teaching. Professors are “socialized to publish, teach graduate students and spend as little time teaching (undergraduates) as possible,” concludes James Fairweather of Penn State University in a new study. Faculty pay consistently rises as undergraduate teaching loads drop.●Universities have encouraged an almost mindless explosion of graduatedegrees. Since 1960, the number of masters’ degrees awarded annually has risen more than fourfold to 337,000. Between 1965 and 1989, the annual number of MBAs (masters in business administration) jumped from 7,600 to 73,100.(4)Even so, our system has strengths. It boasts many top-notch schools and allows almost anyone to go to college. But mediocrity is pervasive. We push as many freshmen as possible through the door, regardless of qualifications. Because bachelors’ degrees are so common, we create more graduate degrees of dubious worth. Does anyone believe the MBA explosion has improved management?(5)You won’t hear much about this from college deans or university presidents. They created this mess and are its biggest beneficiaries. Large enrollments support large faculties. More graduate students liberate tenured faculty from undergraduate teaching to concentrate on writing and research: the source of status. Richard Huber, a former college dean, writes knowinglyin a new book (“How Professors Play the Cat Guarding the Cream: Why We’re Paying More and Getting Less in Higher Education”): Presidents, deans and trustees ... call for more recognition of good teaching with prizes and salary incentives.(6)The reality is closer to the experience of Harvard University’s distinguished paleontologist Stephen Jay Gould: “To be perfectly honest, though lip service is given to teaching, I have never seriously heard teaching consideredin any meeting for promotion... Writing is the currency of prestige and promotion.”(7)About four-fifths of all students attend state-subsidized systems, from community colleges to prestige universities. How governors and state legislatures deal with their budget pressures will be decisive. Private schools will, for better or worse, be influenced by state actions. The states need to do three things.(8)First, create genuine entrance requirements. Today’s low sta ndards tell high school students: You don’t have to work hard to go to college. States should change the message by raising tuitions sharply and coupling the increase with generous scholarships based on merit and income. To get scholarships, students would have to pass meaningful entrance exams. Ideally, the scholarships should be available for use at in-state private schools. All schools would then compete for students on the basis of academic quality and costs. Today’s system of general tuition subsidies provides aid to well-to-do families that don’t need it or to unqualified students who don’t deserve it.(8)Next, states should raise faculty teaching loads, mainly at four-year schools. (Teaching loads at community colleges are already high.) This would cut costs and reemphasize the primacy of teaching at most schools. What we need are teachers who know their fields and can communicate enthusiasm to students. Not all professors can be path-breaking scholars. The excessive emphasis on scholarship generates many unread books and mediocre articles in academic journals. “You can’t do more of one (research) without less of the other (teaching),” says Fairweather. “People are working hard –it’s just where they’re working.”(10)Finally, states should reduce or eliminate the least useful graduate programs. Journalism (now dubbed “communications”), business and education are prime candidates. A lot of what they teach can – and should – be learned on the job. If colleges and universities did a better job of teaching undergraduates, there would be less need for graduate degrees.(11)Our colleges and universities need to provide a better education to deserving students. This may mean smaller enrollments, but given today’s attrition rates, the number of graduates need not drop. Higher education could become a bastion of excellence, if we would only try.20.It can be concluded from Para.3 that the author was ______ towards theeducation.A.indifferentB.neutralC.positiveD.negative21.The following are current problems facing all American universities EXCEPT______.A.high dropout ratesB.low admission standardsC.low undergraduate teaching loadsD.explosion of graduate degrees22.In order to ensure teaching quality, the author suggests that the states doall the following EXCEPT ______.A.set entrance requirementsB.raise faculty teaching loadsC.increase undergraduate programsD.reduce useless graduate programs23.“Prime candidates” in Para. 10 is used as ________.A.euphemismB.metaphorC.analogyD.personification24.What is the author’s main argument in the passage?A.American education can remain excellent by ensuring state budget.B.Professors should teach more undergraduates than postgraduates.C.Academic standard are the main means to ensure educational quality.D.American education can remain excellent only by raising teaching quality. SECTION B SHORT ANSWER QUESTIONS In this section there are eight short answer questions based on the passages in Section A. Answer each question in NO more than 10 words in the space provided on ANSWER SHEET TWO.PASSAGE ONE25.From the description of the party preparation, what words can you see to depictGatby’s party?26.How do you summarize the party scene in Para. 6?PASSAGE TWO27.What do the cases of Target, Adobe and eBay in Para. 3 show?28.Why does the author say the task is becoming harder in Para. 7?29.What is the conclusion of the whole passage?PASSAGE THREE30.What does the author mean by saying “Their case is weak” in Para. 2?31.What does “grade inflation” in Para. 3 mean?32.What does the author mean when he quotes Richard Huber in Para. 5?PART III LANGUAGE USAGE [15 MIN]The passage contains TEN errors. Each indicated line contains a maximum of ONE error. In each case, only ONE word is involved. You should proof-read the passage and correct it in the following way:For a wrong word, underline the wrong word and write the correct one in theblank provided at the end of the line.For a missing word, mark the position of the missing word with a “∧” signand write the word you believe to be missing in the blankprovided at the end of the line.For an unnecessary word, cross the unnecessary word with a slash “/”and put the word in the blank provided at the end of the line.ExampleWhen∧art museum wants a new exhibit, (1) anit never buys things in finished form and hangs (2) neverthem on the wall. When a natural history museumwants an exhibition, it must often build it. (3) exhibit Proofread the given passage on ANSWER SHEET THREE as instructed.PART IV TRANSLATION [20 MIN]Translate the underlined part of the following text from Chinese into English. Write your translation on ANSWER SHEET THREE.流逝,表现了南国⼈对时间最早的感觉。
西南大学2020年春季专业英语【0089】课程考试大作业参考答案
答:——selling——
16.[主观填空题] The year 2000 was a turning point in electronic commerce. It marked then end of the dot-com( )
A.
答:——boom
——
17.[主观填空题] The three most commonly used categories of electronic commerce are B2C,( ) and business processes.
A.
答:——linked
——
3.[主观填空题] Computer language include high level language, assemble languagel and ( )
A.
答:——machine language
——
4.[主观填空题] The name of first electronic computer is ( )
A.
答:——business——
15.[主观填空题] Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and ( )of goods or services using the internet
A.
答:——menu——
22.[主观填空题] A database management system(DBMS) defines, creates, and ( ) a database.
A.
答:——matains
A.
答:——ENIAC
2018年6月西南大学网教[0089]《专业英语》
2018年6月西南大学网教[0089]《专业英语》2、Today, the design phase uses a well-defined principle called modularity. The whole package is divided into many small modules. Each module is designed, tested, and connected to other modules through the main program. We will discuss modularization later inthis chapter.3、GUI:Graphical User InterfaceO2O:Online To OfflineWIFI:Wireless FidelityOS:Operating SystemUSB: Universal Serial Bus5、Mobil payments everywhere in ChinaMobile payment refers to the use of ordinary mobile phones or smartphones to complete or confirm payments, rather than cash, cheques or bank cards. Buyers can use mobile phones to purchase a range of services, digital products or physical goods. Units or individuals send payment instructions directly or indirectly to banking and financial institutions through mobile devices, the Internet or close-range sensing to generate money payment and fund transfer behavior, thus realizing the mobile payment function. Mobile payment integrates terminal devices, Internet, application providers and financial institutions to provide users with financial services such as currency payment and payment.The formulation of mobile payment standards has lasted for more than three years, mainly in the competition between UnionPay and China Mobile. Data research firm IDC reports that global mobile payments will exceed $1 trillion in 2017. Strongdata means that the global mobile payment business will continue to show a strong trend in the next few years.。
20秋西南大学[0089]《专业英语》作业辅导资料
0089 20202单项选择题1、When power is removed, information in the semiconductor memory is ( )1.manipulated2.reliable3.remain4.lost2、A computer system can roughly be divided into three components except( )1.hardware2.application software3.system software4.CPU3、A processor is composed of two functional units, they are ( )1.an arithmetric/logic unit and a storage unit2. a control unit and an arithemetric/logic unit3.some registers and arithmetric/logic unit4. a control unit and some registers4、( ) is a storage location inside the CPU1.Memory2.Control3.ALU4. A register5、The basic units of a computer system are as follows( )1.CPU, Memory and disk2.CPU, Memory and I/O System3.CPU ,Input and output unit4.CPU, Memory and ALU6、( ) refers to the process of a two dimentional picture by a digital computer1.Image data file format2.Digital image processing3.Pattern recognition4.Image compression7、CPU is an important part of the computer, and it can interpret and ( ) information.1.processe3.brain4.heart8、Which following is not big 4 tech company?( )1.Ubber2.Facebook3.Apple4.Google9、Machine -language instructions are a series of ( )1.abstract codes2.0s and 1s3.words4.machine codes10、Which of the following is not an applicaton software?1. E. web browserpiler3.word processor4.database program11、Many companies use( ) to train employees.te1.technology2.multimedia applications3.animation4.entertainment12、The highest award of Computer Science is ACM( ) award1.Bill Gates2.Andrew Groves3.Alan Turing4.Steve Jobs13、Multimedia means that ( )1.it can play music2.it can rotate a three-dimensional model3.it can do all above at the same time4.it can show a graph14、When the file is not saved, document in the processing is ( )1.reliable2.lost3.remain4.manipulated15、The founder of tencent is ( )1. C. Robin LI2.Jack lee3.Jack ma4.Pony Ma16、An ISP supplies( ) that you can dial from your computer to log on the internet server.1.Help file2.Private key3.Public key4.Service number17、The windows product line includes ( )1. D. windows me2.above all3.windows xp4.windows 200018、Which following is not Object-oriented language?1.Python2.Asembly language3.Java4.C++19、Static graphics include( )1.Animators2.Pictures3.Movies4.Videos20、The ( ) serves as an interface between hardware and software1.System2.application program3.control unit4.operating system21、With IE and an Internet connection, You can search veiw the information on ( )1.Active Desktop2.Phone Dialer3.Programs4.World wide web22、The name of first electronic computer is ( )1. A. ENIAC2.ERICA3.APPLE4.EIACN23、Please find the item that is not belong to the DBA ( )1. a transaction2. a file system3. a database system4. a database language24、( )program also has potential benefits in parallel processing1.machine2.process-oriented3.object-oriented4.assembly25、The input/output devices are called( )1.Peripherals2.Cache3.Storage4.Memory26、The Internet became a lot easier for public to learn and use because of the common ( )1.topologies2.architecture3.protocolsmands27、Service that Internet can not provide includes ( )1.web surf2.cooking3.email4.web live28、( ) is designed to manage large bodies of information.1. a database language2. a file system3. a transaction4. a database system29、Today, ( ) can give you a music synthesizer, a fax machine, a CD-ROM drive, ect.1.Expansion cards2.Output device3.Joystick4.Input devices30、The end equipment in communication system does not include( )puters2.DCE3.CRTs4.keyboards判断题31、With the development of computer, the physical size of the CPU has often become bigger and1. A.√2. B.×32、The CPU is responsible for performing some arithmetric operations and logic decisions.1. A.√2. B.×33、The chipset consists of two parts: North Bridege and South Bridge1. A.√2. B.×34、O2O Model refers to online to offline1. A.√2. B.×35、an input/output device performs both input and output functions, such as a computer data s drive, memory card and tape drive)1. A.√2. B.×36、The movement of electronic signals between main memory and the ALU as well as the control controlled by the control unit of the CPU1. A.√2. B.×37、The control unit performs all the arithmetric and logical functions1. A.√2. B.×38、The four basic units of simplified computer:the input unit, central processing unit, memor1. A.√2. B.×39、The central processing unit is the heart of the computer systems.1. A.√2. B.×40、The number of IPv4 is unlimited1. A.√2. B.×41、The binary language which they are written in machine instruction is called machine langua1. A.√2. B.×42、ADD AX,BX is an instruction of machine language1. A.√2. B.×43、We can use Email only as a one-to-one platform1. A.√2. B.×44、Registers in the control unit are used to keep track of the overall status of the program1. A.√2. B.×45、The basic resources of a computer system are software and data1. A.√2. B.×46、The CPU compreises the control unit and memory1. A.√2. B.×47、Main storage and auxiliary storage are sometimes called internal memory and external memor1. A.√2. B.×48、an output device provides output from the computer, such as a computer monitor, projector,1. A.√2. B.×49、RAM is normally associated with volatile types of memory (such as DRAM modules), where sto1. A.√2. B.×50、Memory is the heart of computer system1. A.√2. B.×主观题51、A relational database is a digital database based on the of ( ) data参考答案:relational model52、A software system used to maintain relational databases is a ( )参考答案:relational database management system53、CPU chips now contain ()memory—a small amount of fast SRAM参考答案:cache54、The dominant desktop operating system is ( )with a market share of around 82.74%参考答案:Microsoft Windows55、Social media marketing is commercial promotion conducted through ( )websites.参考答案:social media56、In operating systems, ( )is the function responsible for managing the computer's prima 参考答案:memory management57、Please translate the following into English计算机芯片,也称为芯片,集成电路或嵌入了集成电路的半导体材料的小晶圆参考答案:Computer chip, also called chip, integrated circuit or small wafer of semiconductor 58、Please translate the following into Chinese通常,现代计算机由至少一个处理元件组成,通常是以金属氧化物半导体(MOS)微处理器形式组成的中央MOS 半导体)内存芯片。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
西南大学网络与继续教育学院课程考试答题卷学号: 1526781113004 姓名:黄超能 2016年 6月
课程名称【编号】:专业英语【0089】
(横线以下为答题区)
答题不需复制题目,写明题目编号,按题目顺序答题
一、
(一)
1、C
2、B
3、D
4、A
5、B
6、D
7、C
8、D
9、A 10、D
(二)
1、存储寄存器
2、面向对象的语言
3、可穿戴设备
4、黑盒测试
5、无线接入
6、Mobile Internet
7、The personal computer
8、Virtual memory
9、The software engineering
10、The operating system
(三)
在一些计算机通常手持设备和视频游戏安慰着整个操作系统小到可以被存储在ROM。
几乎所有的个人电脑、服务器、工作站、大型机,和超级计算机,操作系统程序是相当大的,所以大部分是存储在一个硬盘。
操作系统的引导程序存储在ROM和小供应所需的指令的核心操作系统加载到内存中当系统靴子。
这个操作系统的核心部分,称为内核,提供最essentialoperating系统服务,如内存管理和文件访问。
内核在内存中保持你的电脑上。
操作系统的其他部分,如定制工具,作为需要加载到内存中。
(四)
My view on mobile Internet
Nowadays, the Internet has become very common in our daily life, in that we can surf the Internet everywhere anywhere by computer or mobile. However, the debate on the pros and cons of the network has never stopped. Some people say that the network is a platform for information sharing. Due to it, we have a convenient channel for the dissemination of information and access to information. But some others argue that some people commit a crime by the Internet, so we should stay away from the Internet. From my point of view, I prefer to agree to the former view.
There are some reasons accounting for my point. Firstly, with network, we can exchange information frequently and conveniently. In the information area, information is wealth. In many cases, whether we can succeed in something, it depends on how much information we get. In addition, except for its serious functions, network is a good tool to entertain. Preciously, we only have TV or game machines to have fun, but now we have a functional platform for fun. On the Internet, we can watch TV programs and movies, or we can play online games as well as chat with friends freely, which is a good way to relax.
In short, there is no denying that the Internet has its own disadvantage, but I think its advantages far overweight its disadvantages that we can make good use of those good but avoid those bad.
\。