计算机的专业英语选择
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
标准实用
Multiple 1
1. The keyboard, mouse, monitor, and system unit are:
2. Programs that coordinate computer resources, provide an interface, and run applications are known as:
3. A browser is an example of a:
4. Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.
5. The smallest type of microcomputer:
netbook handheld midrange tablet PC
6. RAM is a type of:
computer memory network secondary storage
7. Unlike memory, this type of storage holds data and programs even after
mainframe midrange
netbook
center
media specialized program
utility program
basic application system application operating systems
utility programs
application programs storage systems hardware software devices devices
storage output
electrical power to the computer system has been turned off.
8. The type of file created by word processors to save, for example, memos, term papers, and letters.
9. The change in connectivity that uses the Internet and the Web to shift many computer activities from a user ’s computer to computers on the Internet.
definition
computing
network
cloud high USB presentation
worksheet
document
database secondary primary RAM
ROM
标准实用
10. The largest network in the world is [the]:
Multiple 2
1. The network that connects computers all over the world.
2. The rules for exchanging data between computers.
3. Client-based e-mail accounts require this special program to be installed on your computer.
4. Communities of individuals who share a common interest typically create Facebook:
5. E-mail that does not require an e-mail program installed on a user's computer is known as:
6. A very well-known microblog.
Webmail
u t il it y podcast
blog profiles clients groups pages
hyperlink
u t il it y client e-mail Java
protocols
WWW Web DSL Internet CERN Web LAN Facbeook Internet
USB
Web
7. These programs continually look for new information and update search services ’ database programs.
8. A type of search engine that submits requests to other search engines, organizes their responses, eliminates duplicate responses, orders hits, and then provides an edited list.
ISP
specialized search engine
directory search metasearch engine
spiders
f ilt e r s wikis IM
Wikipedia LinkedIn Twitter
MySpace
标准实用
9. This is the Internet ’s equivalent to traditional cash.
10. Using file transfer utility software, you can copy files to your computer from specially configured servers on the Internet. This is called:
Multiple 3
1. This type of software works with end users, application software, and computer hardware to handle the majority of technical details.
2. A rectangular area that can contain a document, program, or message.
3. Programs that create text-based documents.
DBMS suites spreadsheets word processors
4. Programs that organize, analyze, and graph numeric data such as budgets and financial reports.
DBMS suites spreadsheets word processors
5. In a spreadsheet, the intersection of a row and column creates a:
window dialog frame form box application general u t il it y purpose
system downloading filtering
uploading blogging
digital cash e-commerce icash Internet
dollars
6. A collection of related data that is the electronic equivalent of a file cabinet.
7. A database tool that will quickly rearrange a ’s records according to table
spreadsheet
processor f i l t e r
word sort
database
document
table cell function
formula
label cell a selected field.
标准实用
8. Programs that combine a variety of visual objects to create attractive, visually interesting presentations.
9. The primary disadvantage of this type of package is that the capabilities of each function are not as extensive as in individual programs.
10. A type of suite stored at a server on the Internet and available anywhere through Internet access.
Multiple 4
1. These specialized graphics programs combine text and graphics to create publications of professional quality.
2. Also known as drawing programs.
3. Graphics programs used to create and edit vector images.
desktop publishing programs image
galleries image editors
illustration programs
desktop publishing programs image galleries image editors
illustration programs
desktop publishing programs image galleries image editors
illustration programs
integrated
u t ility office
cloud integrated software
u t il it y office
presentation spreadsheet
processor graphics
word DBMS ACTION
4. An essential multimedia feature that allows user participation.
5. Special programs used to create multimedia presentations.
6. A widely used interactive animation application from Adobe.
WYSIWYG Flash
Fuzzy
desktop publishing programs image editors Flash editors
multimedia authoring programs
interactivity
immersion
raster Flash
标准实用
7. Programs for Web site design and HTML coding are called Web page editors or
8. This area of artificial intelligence is also known as expert systems.
9. A type of artificial intelligence that uses a database to provide assistance to users.
10. Another name for the database used in expert systems that contains specific facts and rules.
Multiple 5
1. What type of software works with users, application software, and computer hardware to handle the majority of technical details?
2. The programs that convert programming instructions written by programmers into a language that computers understand and process are language:
translators converters linguists
managers
dapplication desktop
system Linux
access table expert table knowledge base rule
base acoustics expert systems robotics virtual
reality acoustics knowledge-based systems robotics virtual
reality programs
editors
editors HTML apps Web VR
3. The ability to switch between different applications stored in memory is called:
4. Graphic representations for a program, type of file, or function:
software
diversion programming multitasking
interference
operational image
icon
app
标准实用
5. This operating system feature is controlled by a mouse and changes shape depending on its current function.
6. The operating system based on Linux, designed for Netbook computers, and focused on Internet connectivity through cloud computing:
7. The mobile operating system developed by Apple and originally called iPhone OS:
Android BlackBerry OS IOS Mac OS
8. A utility program that makes copies of files to be used in case the originals are lost or damaged:
Backup and Restore Disk Cleanup Disk Defragmenter Compactor
9. A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space, and improves system performance:
Backup and Restore Disk Cleanup Disk Defragmenter Compactor
10. Windows makes it easy to update drivers with Windows:
Backup Restore Driver Update
Multiple 6
1. This container houses most of the electrical components for a computer system.
Windows Chrome
Unix Mac pointer dialog mouse menu box
2. Similar to notebooks, this system unit specializes in on-the-go Web browsing and e-mail access.
chassis desktop media center netbook
3. Computers can only recognize this type of electronic signal.
analog bus digital maximum
4. The main or motherboard is also known as the: carrier package
system system tuner board unit TV
标准实用
5. How many bytes can a 32-bit-word computer access at one time?
6. In a microcomputer system, the central processing unit is contained on a single:
RAM
7. This type of memory divides large programs into parts and stores the parts on a secondary storage device.
8. Also known as NIC, this adapter card is used to connect a computer to a:
9. This provides a pathway to connect parts of the CPU to each other.
bus Plug and Play wired wireless
10. Older ports that have largely been replaced by faster, more flexible ports are called:
buses expandable legacy rendered
Multiple 7
expansion graphics network AIA
random-access expanded virtual direct
16 4 8 1
processor computer
mobile system system board board module chip bus
1. Most keyboards use an arrangement of keys known as:
2. The device that controls a pointer displayed on the monitor.
3. Also known as a roller ball, this device controls the pointer by rotating a ball with your thumb. trackball cordless joystick stylus mouse printer scanner mouse cord
OptiKey QWERTY Alpha
Daisy
标准实用
4. The type of screen that can be touched with more than one finger and supports zooming in and out by pinching and stretching your fingers.
5. Flatbed and document are types of:
6. Device used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips.
7. The most widely used audio- input device.
8. The monitor feature that specifies how often a displayed image is updated.
9. Handheld, book-sized devices that display text and graphics.
10. This technology allows television stations to broadcast their programming directly to smartphones, computers, and digital media players.
Mobile HDTV DTV CRT
LED whiteboards readers
e-book lasers HDTV aspect ratio dot pitch refresh rate
resolution rate
microphone mouse
TFT VR MICR
FDIC UPC OMR monitors scanners headsets
HDTVs multitouch digital
dynamic OLED
Multiple 8
1. RAM is sometimes referred to as:
2. The actual physical material that holds the data and programs. primary storage media disk access
3. Measures how tightly these charges can be packed next to one another on the disk. ratio active memory secondary storage primary storage
read only memory
标准实用
4. When a read/write head makes contact with the hard disk ’s surface, it causes a head:
5. This hard-disk performance enhancement anticipates data needs.
6. This type of storage uses pits and lands to represent 1s and 0s.
7. DVD stands for:
8. USB drives are also known as:
9. An organizational strategy to promote efficient and safe use of data across the networks.
10. A mass storage device that provides access to data archived on tapes.
library system system
tape RAID f i l e NAS cloud dynamic data mission statement
enterprise storage system RAID
universal optical drives
drives flash ports state bus digital versatile disc dynamic versatile disc
digital video data dynamic video disc optical cloud
solid state disk hard file decompression compression caching
disk RAID f i l e scratch crash
land pit cylinders density
sectors tracks
Multiple 9
1. The concept related to using computer networks to link people and resources.
2. A high-frequency transmission cable that delivers television signals as well as connects computers in a network.
coaxial hi def 3-D twisted pair connectivity
TCP/IP Wi-Fi GPS
标准实用
3. A short- range radio communication standard that transmits data over short distances of up to approximately 30 feet.
4. The speed with which a modem transmits data is called its:
5. The bandwidth typically used for DSL, cable, and satellite connections to the Internet.
6. Every computer on the Internet has a unique numeric address called a(n):
7. Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.
8. A device that allows one LAN to be linked to other LANs or to larger networks.
9. Typically using Wi-Fi technology, these wireless access points are typically available from public places such as coffee shops, libraries, bookstores, colleges, and universities.
extranets hotspots
LANs PANs gateway network switch PAN IDS
PCMCIA
server VPN NIC broadcast address
packet DNS IP broadband voiceband baseband
medium band digital velocity dynamic rate modular rating transfer r a t e
Bluetooth
broadband TCP/IP DSL
10. Star, tree, and mesh are three types of network:
Multiple 10
1. The three primary privacy issues are accuracy, property, and:
ownership s ecurity access e th ic s topologies s t r a te g ie s protocols devices
标准实用
2. To easily get names, addresses, and other details about a person using only his or her telephone number, government authorities and others use a(n):
3. Browsers store the locations of sites visited in a:
4. The browser mode that eliminates history files and blocks most cookies.
5. The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:
6. Computer criminals who specialize in stealing, trading, and using stolen credit cards over the Internet are known as:
7. Programs that come into a computer system disguised as something else are called:
8. The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:
cyber-bullying
social media discrimination online harassment
unethical communication
viruses
zombies Trojan horses bugs
Web scammers
identity carders thieves t r a d e r s
cyber card approval f ir e wa ll
identity
online access phish privacy
detect insert
sleep f ir e wa ll h istor y menu
to o l bar
d irectory
keystroke reverse cookie adware logger
worm
9. Special hardware and software used to control access to a corporation ’ s private network is known as a(n):
10. To prevent copyright violations, corporations often use:
WPA DRM
VPN
ACT
communication gate
spyware removal program
antivirus program f ir e wa l l
标准实用
Multiple 11
1.Which of the basic organizational functions records all financial activity from billing customers to paying employees?
accounting marketing production research
2.What managerial level has information flow that is vertical,horizontal,and external?
top supervisory middle foreman
3.Which computer-based information system uses data from TPS and analytical tools to support middle managers?
ESS MIS DSS TPS
4.Accounts payable refers to money the company owes its suppliers for materials and services it has:
created exported inventoried received
5.What accounting activity keeps track of all summaries of all transactions?
balance sheet general ledger
income statement inventory control
6.What accounting statement lists the overall financial condition of an organization?
balance sheet general ledger
income statement inventory control
7.What type of report is produced at regular intervals?
demand exception inventory periodic
8. A DSS consists of four parts:user,system software,decision models,and:
application software data operating system
spreadsheets
9.What type of worker is involved with the distribution,communication,and creation of information?
标准实用
10. What type of program is designed to schedule, plan, and control project resources?
Multiple 12
1. Facts or observations about people, places, things, and events are:
data occurrences records tables
2. The most basic logical data element such as a single letter, number, or special character is known as a:
character element phrase record
3. Each record in a database has at least one distinctive field, called the:
key field structure type view
4. One element of database security is to provide only authorized users with:
5. The bridge between the logical and physical views of the data is provided by:
passwords
r e la tio ns c lasses nodes
schedulers managers
a uditing pro jec t dtp
information
executive knowledge foreman
6. Highly trained computer specialists who interact with the data administration subsystem are known as:
7. In a network database, each child node may have more than one parent node; this is known as a:
8. Connections between parent nodes and child nodes are provided by:
many-to-many relationship
relational relationship
hierarchy parent
relationship
DBMS data modelers database administrators relational s p e c i a l i s t s records
t a b le s DBMS SQL
标准实用
9. Two of the most significant advantages of multidimensional databases over relational databases are processing speed and:
10. Object-oriented databases organize data by classes, attributes, methods, and:
objects relations space time
Multiple 13
1. An information system is a collection of hardware, software, people, procedures, and:
data DBMS specialists system analysts
2. What is the first phase in the systems life cycle?
3. Which phase in the systems life cycle involves installing the new system and training people?
systems analysis systems implementation
preliminary
investigation
systems design
needs analysis systems analysis c onceptualization o b je c t if ic a tio n control
format
characters pointers objects
DBA
preliminary
investigation
system design
4. This phase in the systems life cycle is concerned about determining system requirements not in design.
systems analysis systems implementation
5. Which systems analysis tool shows the relationship between input and output documents?
6. These tools relieve the systems analysts of many repetitive tasks, develop clear documentation, and, for larger projects, coordinate team member activities.
c hecklis t
d ecision t a b le
chart grid data flow
preliminary
investigation
system design
标准实用
7. Which systems life cycle phase is concerned with economic, technical, and operational
feasibility?
8. What type of feasibility evaluates whether the people within the organization will embrace or resist a new system?
behavioral economic operational techinical
9. Which approach to conversion begins by trying out a new system in only one part of an organization?
direct pilot parallel phased
10. An alternative to the systems life cycle approach using powerful development software, small specialized teams, and highly trained personnel.
Multiple 14
1. A program is a list of instructions for the computer to follow to process:
2. The major processing steps identified in a top-down program design are called:
software hardware d i r e c t logic
data prototyping
CASE
RAD AAD preliminary
investigation
systems design systems analysis systems implementation
automated systems life cycle data flow analyzers CASE
flow charts
assembly instructions modules logic
3.The programming logic structure in which one program statement follows another.
4.One of the best ways to code effective programs is to use the three basic logic structures to create:
content-markup programs pseudocode
modular languages structured programs
c oncatenation r e p e titio n selec tio n
loop
标准实用
5. Which step in the six-step programming procedure involves desk checking and searching for syntax and logic errors?
6. Which step in the six-step programming procedure is the final step?
7. Unlike traditional systems development, this software development approach focuses less on the procedures and more on defining the relationships between previously defined procedures.
8. Natural languages are considered to be a:
9. A compiler converts the programmer ’s procedural language program, called the source code, into a machine language code, called the:
10. The 4GL languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a database.
query application generator C11 COBOL
Multiple 15
interpreter code
structured code
object code top-down code low- level language procedural language high- level language
mid- level language
object-oriented context-markup module 2GL
program documentation program maintenance program design
program test
program documentation program test program design
program maintenance
1. People who react to technology by thinking computers are magic boxes capable of solving all kinds of problems that computers really can ’t handle are:
cynics frustrated na ï ve proactive
2. The type of person that looks at technology in a positive realistic way is: frustrated proactive cynical na ï ve
标准实用
3. Books, journals, and trade associations are the best sources to help you:
4. If your career is in marketing, it makes sense to develop a specialty in:
database desktop publishing
programming systems analysis and design
5. What computer professional repairs and installs computer components and systems?
computer technician data entry worker
desktop publisher software engineer
6. What computer professional designs, tests, and researches encryption procedures?
cryptographer network administrator
programmer software engineer
7. What computer professional uses database management software to determine the most efficient ways to organize and access data?
cryptographer database administrator
programmer software engineer
8. What computer professional oversees the work of programmers, computer specialists, systems analysts, and other computer professionals?
information systems manager network manager
software engineer technical writer
develop specialties maintain your computer competency
develop personal contacts
look for innovative opportunities
9. What computer professional creates, tests, and troubleshoots computer programs?
10. What computer professional plans and designs information systems?
programmer systems analyst network manager
software engineer programmer technical writer
network manager
software engineer。