计算机专业英语第3章在线测试

合集下载

计算机英语试题3及答案

计算机英语试题3及答案

计算机英语试题3及答案一、选择题(每题2分,共20分)1. Which of the following is not a type of computer virus?A. TrojanB. WormC. Antivirus softwareD. Virus2. What does the acronym "CPU" stand for?A. Central Processing UnitB. Central Processing UnitC. Central Processing UnitD. Central Processing Unit3. In computer terminology, what does "RAM" refer to?A. Random Access MemoryB. Random Access MemoryC. Random Access MemoryD. Random Access Memory4. What is the primary function of a router?A. To store dataB. To transmit dataC. To receive dataD. To process data5. What is the term used to describe the process of converting data into a format that can be transmitted over anetwork?A. EncryptionB. CompressionC. DecompressionD. Encoding6. Which of the following is not a type of software?A. Operating systemB. Application softwareC. Utility softwareD. Hardware7. What does the acronym "GUI" stand for in the context of computer interfaces?A. Graphical User InterfaceB. Graphical User InterfaceC. Graphical User InterfaceD. Graphical User Interface8. What is the term for a computer program that is designed to perform a specific task?A. ApplicationB. ApplicationC. ApplicationD. Application9. What is the term used to describe a computer network that spans a relatively small area?A. LANB. LANC. LAND. LAN10. What does the acronym "USB" stand for?A. Universal Serial BusB. Universal Serial BusC. Universal Serial BusD. Universal Serial Bus二、填空题(每题2分,共20分)1. A computer virus is a type of malicious software that can replicate itself and spread to other computers without the user's permission.2. The central processing unit (CPU) is the primary component of a computer that performs most of the processing inside the computer.3. Random Access Memory (RAM) is a type of computer memory that can be read and changed freely and quickly.4. A router is a networking device that forwards data packets between computer networks.5. Encoding is the process of converting data into a format that can be transmitted over a network.6. Software is a collection of data or computer instructions that tell the hardware what to do and how to do it.7. A Graphical User Interface (GUI) is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators.8. An application is a computer program designed to help the user to perform specific tasks, such as word processing or web browsing.9. A Local Area Network (LAN) is a computer network that interconnects computers in a localized area.10. Universal Serial Bus (USB) is an industry standard developed in the 1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.三、简答题(每题10分,共40分)1. Explain the difference between a computer virus and a computer worm.A computer virus requires a host program to replicate itself, whereas a computer worm can replicate and spread independently without needing a host program.2. Describe the role of a firewall in computer security.A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the Internet.3. What are the benefits of using a cloud-based service? Cloud-based services offer benefits such as scalability, accessibility, cost-effectiveness, and the ability to store and process large amounts of data in a remote location.4. Discuss the importance of data backup and recovery in a computer system.Data backup and recovery are crucial for protecting against data loss due to hardware failure, software bugs, data corruption, or cyber-attacks. Regular backups ensure that data can be restored in the event of a system failure,minimizing downtime and potential financial loss.四、论述题(20分)Discuss the impact of the Internet of Things (IoT) on society and the economy.The Internet of Things (IoT) has had a profound impact on society and the economy by enabling the interconnection of everyday objects, allowing them to send and receive data. This has led to increased efficiency in various industries, improved quality of life through smart home technologies, and the creation of new business models and markets. However, it also raises concerns about data privacy and security, as well as the potential for increased surveillance and control.。

计算机专业英语Unit3

计算机专业英语Unit3

Section 2 Passages
பைடு நூலகம்

Section 3 Skill in Focus


Section 4 Extended Reading


Unit 3 Operation System
Section 1 Situational Dialogue
System Crash 1、在使用计算机的过程中,你遇到过系统崩溃的情况吗, 简单描述一下。
• • • •
Unit 3 Operation System
Section 2 Passage A: Categories of Operating System
1、你所知道的操作系统有哪些 2、你觉得未来操作系统的发展趋势是什么
Unit 3 Section 2 Passage A
• OS • software • application program • resource • error • batch processing • real-time • multi-tasking • multi-user • distributed • time sharing • desktop
• •
• •
Unit 3 Section 1

Zhang Ning: Well, there might many causes for system crash. One of them is software. The simplest operation like installing and uninstalling might cause a crash in system. Problems within the system may also do that, so you have to be very careful when deleting DLL files, modifying Windows registry, or upgrading the operating system. Another cause is the hardware problem. Have you tried backing up the files? It would be a great help in system restoration when the problem doesn’t lie in the hardware. Cheng Hong: The service personnel installed a ghost program for me when I bought the computer. Will I lose the data in my hard disk if it is restored? Qian Liang: Not except the data on C: drive, where files on your desktop or in My Documents are stored. You may move them into other locations with a bootable disk or under DOS if there are any. Cheng Hong: There are a lot of learning materials in My Documents and on the desktop. Would you please help me transfer them? It might save me the trouble of calling for customer services, and what’s more important, I’d learn a lot from you. Qian Liang: No problem.

计算机专业英语Unit 3

计算机专业英语Unit 3

Unit 3Text 11.Match each of the words or phrases with their Chinese meaning.disk 磁盘modem 调制解调器driver 驱动器printer 打印机display 显示器mouse 鼠标keyboard 键盘computer 计算机2.Fill a correct word learned in this text in each of the blanks.(1)The display of the computer is also called______.Screen(2)The function of a ____ is to print the information or data on a piece of paper.printer(3)The keyboard is one of the _____devices.input(4) A modem plays an important role when you want to use the ______.internet3. Translation.(1)我是一个操作员。

I am a computer programmer.(2)什么是电子计算机?What is a electronic computer?(3)我有一个键盘。

I have a keyboard(4)It costs me 4000 Yuan to buy a computer.买一台电脑需要花费我4000元人民币。

(5)I am now finding a file that was deleted by mistake.我正在找一个不小心被我误删的文件。

(6)There was some problems with my mouse. Maybe it’s not clean.我的鼠标器有点问题,也许是它不干净了。

大工17秋《专业英语(计算机英语)》在线测试123满分

大工17秋《专业英语(计算机英语)》在线测试123满分

⼤⼯17秋《专业英语(计算机英语)》在线测试123满分⼤⼯17秋《专业英语(计算机英语)》在线测试1需要QQ2959415429 微信 open4511⼀、单选题 (共 20 道试题,共 80 分)1.(), difference between the lowest and highest frequencies transmitted in a particular channel or system.A.AmplitudeB.BandwidthC.Bridgework2.( ) also called a Personal computer or PC, defines a computer, which is designed for general use by a single person. It can perform all of its inputting, processing, outputting, and storage activities by itself.A.MicrocomputerB.SupercomputerC.MainframeD.Minicomputer3.( ) programs are used to recover deleted or damaged(corrupted) files.A.Data recoveryB.System callC.System crashD.System software4.( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures5.( ) refers to the physical equipment that can perform the basic functions contained within the data processing cycle.A.SoftwareB.HardwareC.MemoryD.CPU6.Which one is a word processing and text editing tool?A.PhotoshopB.WordC.Extreme 3DD.Premiere7.( ) are the peripherals that allow users to enter data, programs, commands, and user responses into a computer and transform them into a suitable form for processing.A.RAMB.ROMC.Input devicesD.Memory8.The first computers used () for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.A.vacuum tubesB.transistorsC.integrated circuitsD.microprocessors9.() performs arithmetic, comparison, and logic operations. It is one part of the CPU.A.RAMB.ROMC.CPUD.ALU10.( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures11.Processing is done inside the computer in an area called the ( ).A.input devicesB.output devicesC.system unitD.central processing unit12.A ( ) can be written to once. After that they can be read many times without deterioration but cannot be written on or erased.A.CD-RB.CD-ROMC.CD-RWD.DVD13.( ) provides reliable, full-duplex connections and reliable service by ensuring that data is resubmitted when transmission results in an error.A.TCPB.ARPC.UDPD.IP14.( ) is an outline of the logic of the program you will write.A.Program flowchartsB.Logic structuresC.PseudocodeD.Design15.Linux is an operating system similar to ( ) that is becoming more and more popular.A.Windows 98B.Windows 2000C.Windows XPD.Unix16.( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.A.MIDIB.WAVC.RAD.Audio17.In a ( ) network, all microcomputers and other communication devices are connected to a continuous loop.A.busB.starC.treeD.ring18.() have more storage capacity than diskettes and also offer faster access to the data they hold.A.Hard disksB.Optical disksC.Zip diskD.CD19.In 1947 three scientists, John Bardeen, William Shockley, and Walter Brattain working at( )invented the transistor computer.A.BaiduB.MicrosoftC.AT&T's Bell LabsD.Yahoo20.( ), to send files from a user's microcomputer to another computer. Compare with download.A.UploadB.TelecommutingC.HypertextD.Online service⼆、判断题 (共 10 道试题,共 20 分)1.Mouse belongs to output.()A.错误B.正确2.CPU stands for Central Processing Unit. It performs the system's calculating and processing.A.错误B.正确N, communications network that covers a wide geographical area, such as a state or a country.( )A.错误B.正确4.WWW stands for "World Wide Web"; it is the large global collection of Internet servers which support hypertext documents coded in HTML, and transferred via HTTP.A.错误B.正确5.The transistor computer did not last as long as the vacuum tube computer lasted, but it was less important in the advancement of computer technology.A.错误B.正确6.Object Oriented Programming(OOP) is a programming method that combines data and the instructions for processing that data into a self-sufficient "object" that can be used in other programs.()A.错误B.正确7.Windows versions before Windows 95 rely on DOS as the operating system.()A.错误B.正确 is an E-mail address.A.错误B.正确9.An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.A.错误B.正确10.View shortcut menus by right-clicking with the mouse.()A.错误B.正确⼤⼯17秋《专业英语(计算机英语)》在线测试2⼀、单选题 (共 20 道试题,共 80 分)1.The two components of the CPU are connected by a kind of electronic roadway called a(an) ().BB.busC.portD.keyboard2.The operation system ( ).A.manages the disks and filesB.manages the computer's resourcesC.manages the computer's memoryD.All of the above3.() ,also known as service programs, perform specific tasks related to managing computer resources.A.Utilities programsB.System softwareC.Operating systemD.none of the above4.():In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures5.A () port is an interface that connects devices by transferring more than one bit at a time.A.serialB.parallelBD.none of the above6.( ), software used in corporate networks (intranets and extranets) to prevent unauthorized people from accessing the network.A.FirewallB.ModemC.HypertextD.TCP7.The common input devices are the ()and the keyboard.A.printerB.speakerC.monitorD.mouse8.A ( ) channel allows simultaneous message exchange in both directions.It really consists of two simplex channels, a forward channel and a reverse channel,linking the same points.A.half-duplexB.full-duplexC.simplexD.none of the above9.(), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.A.Lossy compressionB.Lossless compressionC.BitmapD.Vector image10.( ) have more storage capacity than diskettes and also offer faster access to the data they hold.A.Hard disksB.Optical disksC.Zip diskD.CD11.The ( ) is automatically loaded into RAM soon after you turn on, or "boot" the computer.A.application softwareB.operating softwareC.shellpiler12.The ( ) is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.A.InternetB.WWWC.ARPANETD.ISP13.A()is a cable which is capable of carrying signals representing data from one place to another.A.busB.byteC.bitD.disk14.A backup program ( ).A.makes a copy of files you selectB.returns you to the previous programC.undoes the last change you madeD.None of the above15.A ( ) is an electronic device that operates under the control of instructions stored in its own memory, which can according to specified rules, produce results,and store the results for future use.puterB.CPUC.input deviceD.output device16.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of( ).A.microprocessorB.transistorC.chipD.circuit17.We abbreviate Virtual Private Networks to ( ).A.NICB.VPNC.HUBD.MODEM18.The technical development that marks the third generation of computers is the use of () in computers.A.vacuum tubesB.integrated circuitsC.transistorsD.virtual memory19.( ), interface that enables dissimilar networks to communicate with one another.A.GatewayB.BridgeC.BandwidthD.none of the above20.ERP is ( ).A.Enterprise resource planning softwareB.Enterprise Application IntegrationC.Electronic Application IntegrationD.None of the above.⼆、判断题 (共 10 道试题,共 20 分)1.Output devices are peripherals that allow users to enter data, programs, commands, and user responses into a computer and transform them into a suitable form for processing.( )A.错误B.正确2.CPU stands for Central Processing Unit. It performs the system's calculating and processing.A.错误B.正确3.An ISP is a company that provides access to the Internet.A.错误B.正确4.Memory also called main memory, primary storage, RAM, is an internal storage area in the computer, where data and programs designed for immediate processing are held.A.错误B.正确5.Device drivers are specialized programs designed to allow particular input or output devices to communicate with the rest of the computer system.( )A.错误B.正确6.A compilier is software that looks at an entire high-level program before translating it into machine language.A.错误B.正确7.A location in RAM memory is accessed by its address.()A.错误B.正确8.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of microprocessor.()A.错误B.正确9.Software also called a program, is the series of computer language coded instructions that tells the computer how to perform tasks.A.错误B.正确10.Java is a compiled object-oriented programming language used to write applets.A.错误B.正确⼤⼯17秋《专业英语(计算机英语)》在线测试3-0012⼀、单选题 (共 20 道试题,共 80 分)1.An ( ) is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.A.Electronic CommerceB.Credit cardC.Online paymentD.none of the above2.The technical development that marks the third generation of computers is the use of () in computers.A.vacuum tubesB.integrated circuitsC.transistorsD.virtual memory3.( ), the process of changing plaintext data into enciphered text through an algorithm.B.EncryptionC.AuthenticateD.Hacker4.( ), also called communications network; a system of interconnected computers, telephones, or other communications devices.A.ProtocolB.NodeC.Packetwork5.Processing is done inside the computer in an area called the ( ).A.input devicesB.output devicesC.system unitD.central processing unit6.A (),also called a silicon chip or semiconductor,is a small piece of silicon that contains thousands of microminiature electronic circuit components, mainly transistors.A.busB.chipC.portD.keyboard7.() is the electronic device that interprets and carries out the basic instructions that operate the computer.A.ProcessorB.hardwareC.memoryD.CPU8.( ) also called a Personal computer or PC, defines a computer, which is designed for general use by a single person. It can perform all of its inputting, processing, outputting, and storage activities by itself.A.MicrocomputerB.SupercomputerC.MainframeD.Minicomputer9.The process of translating instructions into commands is called ( ).A.decodingB.registerC.digitalD.port10.A ()is a communication device that enables computers to communicate via telephone lines or cable.A.modemB.hardwareC.software11.( ) is a way of transferring files over the Internet from one computer to another.A.InternetB.FTPC.E-mailD.ISP12.()(Reduced Instruction Set Computer) refers to processors that support fewer instructions than CISC chips. The reduced number of instructions enables them to execute instructions faster.A.CISCB.RISCC.RAMD.ROM13.The first computers used () for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.A.vacuum tubesB.transistorsC.integrated circuitsD.microprocessors14.() (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.A.JPEGB.MPEGC.MIDID.none of the above15.() controls how you enter data or instructions and how information is displayed on the computer screen.er interfacenguage translatorsC.Utilities programsD.System software16.The standard protocol used for sending Internet e-mail is called ( ). It works in conjunction with POP servers.A.SMTPB.WWWC.TCPD.UDP17.The common input devices are the ( ) and the ( ).A.keyboard,printerB.keyboard,microphoneC.mouse,monitorD.mouse,keyboard18.() will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.A.AnimationB.WAVC.MultimediaD.none of the above19.( ) is an outline of the logic of the program you will write.A.Program flowchartsB.Logic structuresC.PseudocodeD.Design20.A ( ) converts the programmer's procedural language program, called the source code, into a machine language code, called the object code.pilerB.AssemblerC.InterpreterD.Code generator⼆、判断题 (共 10 道试题,共 20 分)1.A bus is a cable which is capable of carrying signals representing data from one place to another.( )A.错误B.正确2.Application software consists of programs that perform specific tasks for users.( )A.错误B.正确3.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of microprocessor.()A.错误B.正确4.The ENIAC used thousands of vacuum tubes,which took up a lot of space and gave off a great deal of heat just like light bulbs do.A.错误B.正确5.Asymmetric key(Public Key),in encryption, one key is used to both lock and unlock data.( )A.错误B.正确6.CPU is the soul of a computer.A.错误B.正确7.View shortcut menus by right-clicking with the mouse.()A.错误B.正确8.ERP is Enterprise resource planning software.A.错误B.正确9.Device drivers are specialized programs designed to allow particular input or output devices to communicate with the rest of the computer system.( )A.错误B.正确10.A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )A.错误B.正确。

计算机专业英语第3章在线测试

计算机专业英语第3章在线测试

A BC DThe data, when they are not encrypted, are calledA BC DA virus is aA BC DMany viruses go resident in the memory like a ( ).A BC DNow, about ( ) different viruses account for all the viruses that actually spread in tA BC DC、attack phaseD、create phase2、( ) maybe a certain cause that some viruses infect upon.A、a dayB、a timeC、an external event on your PCD、a counter within the virus3、Many viruses do harmful things such as ( ).A、deleting filesB、simulating typosC、slowing your PC downD、changing random data on your disk4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.A、stealing storageB、pilfer CPU cyclesC、del_ete filesD、play music5、Some viruses, with no attack phase, often damage the programs or disks they infect bec ause they ( ).A、have bugs in themB、contain poor quality codeC、steal storageD、show messages on your screen第三题、判断题(每题1分,5道题共5分)正确错误Michelangelo is a file sector.正确错误Computer virus is remote from us.正确错误Computer virus may affect the your phisical health .正确错误The author thinks that understanding how an attacker approaches your computer system c 正确错误。

计算机专业英语第三单元习题答案

计算机专业英语第三单元习题答案
4.Java-enabled browser支持Java的浏览器
5.machine code机器码
6.assembly code汇编码
7.Trojan horse特洛伊木马程序
8.software package软件包
2.low-level; high-level
3.low-level
4.Machine
5.functional;logic
6.Statement
7.Module
8.digital
II.Translate the following terms or phrases from English into Chinese and vice versa:
8.pull-down menu下拉菜单
9.dialog box对话框
10.scroll bar滚动条
Section C
I.Fill in the blanks with the information given in the text:
1.Objects
2.platform-independent
14.assignment statement赋值语句
15.logic language逻辑语言
16.machine language机器语言
17.procedural language过程语言
18.programming language程序设计语言
19.run a computer program运行计算机程序
3.Multithreading
4.Runtime
II.Translate the following terms or phrases from English into Chinese and vice versa:

计算机专业英语试题及答案

计算机专业英语试题及答案

计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。

)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。

) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。

)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hackeri. 黑客 10. switchj. 防火墙1. 6.2. 7.3. 8.4. 9.5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。

计算机专业英语第3版unit3

计算机专业英语第3版unit3

2011-5-16
计算机专业英语(第3版)
1
3.1 Multimedia
As the name suggests, multimedia is a set of more than one media element used to produce a concrete and more structured way of communication. With growing and very fast changing information technology, multimedia has become a crucial part of computer world.
计算机专业英语(第3版) 11
Notes
[1] As a multimedia programmer, you can choose what font to display text in, how big (or small) it should be, and what color it should be displayed in. “As a multimedia programmer”作状语, “what …, how…, what…”是并列的宾语从句。 译文:一个多媒体程序员可以选择要显示文本的字 体、字号大小以及颜色。
Unit 3 Multimedia and Its Applications
3.1 3.2 3.3 3.4 3.5 Multimedia Computer Graphics and Images Computer Aided Design Computer Animation Multimedia Software
2011-5-16
计算机专业英语(第3版)

新编计算机专业英语3选择填空解读

新编计算机专业英语3选择填空解读

三、选择填空Operating system for micro, mini, and mainframe computers perform many services. These services can be classified either as“external”or“internal”.The operating system provides external services that help users start programs, manage stored data, and maintain security. You, as the computer user, control these external functions. Using a command-line, menu-driven, or GUI user interface , an operating system provides you with a way to select the programs you would like to use. The operating system also helps you find, rename, and delete documents and other data stored on disks or tapes. On many, but not all computer systems , the operating system helps you maintain security by checking your user ID(用户标识) and password , as well as protecting your data from unauthorized access and revisions(修改).The operating system provides internal services“behind the scenes”to ensure that the computer system functions efficiently . These internal services are not generally under your control , but instead are controlled by the operating system itself. The operating system controls input and output, allocates(分配) system resources, manages the storage space for programs and data, and detects equipment failure without any direction from you.A programming language provides the tools a programmer uses to create software and produce a lengthy list of instructions, called source code ,which defines the software environment in every detail-what it looks like ,how the user enters commands ,and how it manipulates data. A computer’s microprocessor understands only machine language. Therefore, instructions written in a(n)high-level language must be translated into machine language before a computer can use them.The process of translating instructions from a high-level language into machine language can be accomplished by two special types of programs: compilers and interpreters . A compiler translates all the instructions in a program as a single batch(一批) ,and the resulting machine language instructions, called object code(目标代码),are placed in a new file . Most of the program files on a distribution CD for commercial software are compiled so that they contain machine language instructions that are ready for the processor to execute.As an alternative to a compiler, an interpreter converts one instruction at a time while the program is running . An interpreter reads the first instruction, converts it into machine language, and then sends it to the microprocessor. After the instruction is executed , the interpreter converts the next instruction, and so on.Software development is concerned with creating computer programs that perform efficiently. In developing computer software, computer scientists and engineers study various areas and techniques of software design, such as the best types of programming languages and algorithms to use in specific programs, how to efficiently store and retrieve information, and the computational limits of certain software-computer combinations. Software designers must consider many factors when developing a program. Often, program performance in one area must be sacrificed for the sake of the general performance of the software. For instance, since computers have only a limited amount of memory, software designers must limit the number of features they include in a program so that it will not require more memory than the system it is designed for can supply.Software engineering is an area of software development in which computer scientists and engineers study methods and tools that facilitate the efficient development of correct, reliable, and robust computer programs. Software engineers develop software tools and collections of tools called programming environments to improve the development process. For example, tools can help to manage the many components of a large program that is being written by a team of programmers.A local area network(LAN) is a group of computers and other devices spread over a relatively limited area and connected by a communications link that enables any device to interact with any other on the network LANs commonly include microcomputers and shared (often expensive ) resources such as laser printers and large hard disks . Most (modern) LANs can support a wide variety of computers and other devices. Each device must use the proper physical and data-link protocols for the particular LAN, and all devices that want to communicate with each other on the LAN must use the same upper-level communications protocol .Although single LANs are geographically limited , separate LANs can be connected to form larger networks. Similar LANs are linked by bridges , which act as transfer points between networks;dissimilar LANs are linked by gateways(网关),which both transfer data and convert it according to the protocols used by the receiving network.The devices on a LAN are known as nodes(节点),and the nodes are connected by cabling(电缆) through which messages are transmitted . Nodes on a LAN can be wired together in any of basic layouts, known as bus , ring, and star.。

新编计算机专业英语3、选择填空

新编计算机专业英语3、选择填空

1 三、选 择 填 空Page 49 Unit 3 program interface system user storage classify unauthorized control document efficiently function detect internal security password input Operating Operating system system system for for for micro, micro, micro, mini, mini, mini, and and mainframe mainframe computers computers computers perform perform perform many many many services. services. services. These These services can be classified either as “external ”or “internal ”. The operating system provides external services that help users start programs, manage stored data, and maintain security. You, as the computer user, control these external functions. Using a command-line, menu-driven, or GUI user interface , an operating system provides you an operating system provides you with a way to select the programs you would like to use. The operating system also helps you find, rename, and delete documents and other data stored on disks or tapes. On many, but not all computer systems , the operating system helps you maintain security by checking your user ID (用户标识) ) and and password , , as as as well well well as as as protecting protecting protecting your your your data data data from from unauthorized access access and and revisions (修改). The The operating operating operating system system system provides provides internal services “behind behind the the the scenes scenes ”to to ensure ensure ensure that that that the the computer computer system system system functions functions efficiently . . These These These internal internal internal services services services are are are not not not generally generally generally under under under your your control , , but but but instead instead instead are are are controlled controlled controlled by by by the the the operating operating operating system system system itself. itself. itself. The The The operating operating operating system system system controls controls input and and output, output, allocates (分配) ) system system system resources, resources, resources, manages manages manages the the storage space space for for for programs programs and data, and detects equipment failure without any direction from you. Page 70 Unit 4 convert high-level execute processor interpreter send understand command accomplish code resulting run compile create process file A A programming programming programming language language language provides provides provides the the the tools tools tools a a a programmer programmer programmer uses uses uses to to create software software and and produce a lengthy list of instructions, called source code ,which defines the software environment in every detail-what it looks like ,how the user enters commands ,and how it manipulates data. A computer’computer’s microprocessor s microprocessor understands only machine language. Therefore, instructions written in a(n) high-level language must be translated into machine language before a computer can use them. The process of of translating translating translating instructions instructions instructions from from from a a a high-level high-level high-level language language language into into into machine machine machine language language can can be be accomplished by by two two two special special special types types types of of of programs: programs: programs: compilers compilers compilers and and interpreters . . A A compiler compiler translates translates translates all all all the the the instructions instructions instructions in in in a a a program program program as as as a a a single single batch (一批) ) ,and ,and ,and the the resulting machine language instructions, called object code (目标代码),are placed in a new file . Most of the the program program program files files files on on on a a a distribution distribution distribution CD CD CD for for for commercial commercial commercial software software software are are compiled so so that that that they they contain machine language instructions that are ready for the processor to execute. As an alternative to a compiler, an interpreter converts one instruction at a time while the program is running . An interpreter reads the first instruction, converts it into machine language, and . An interpreter reads the first instruction, converts it into machine language, and then sends it to the microprocessor. After the instruction is executed , the interpreter converts the next instruction, and so on. 2 Page 89 Unit 5 manage limit performance efficient memory develop technique system development programming store program engineer area factor environment Software development is concerned with creating computer programs that perform efficiently. In developing computer computer software, software, software, computer computer computer scientists scientists scientists and and and engineers engineers engineers study study study various various various areas areas areas and and techniques of software design, such as the best types of programming l anguages and algorithms to languages and algorithms to use in specific programs, how to efficiently store and retrieve information, and the computational limits of certain software-computer combinations. Software designers must consider many factors when developing a program. Often, program performance in one area m ust be sacrificed for the sake must be sacrificed for the sake of of the the the general general performance of of the the the software. software. software. For For For instance, instance, instance, since since since computers computers computers have have have only only only a a a limited limited amount of memory, software designers must limit the number of features they include in a software designers must limit the number of features they include in a program so that it will not require more memory than the systemi t is designed for can supply. it is designed for can supply. Software Software engineering engineering engineering is is is an an an area area area of of of software software development in in which which which computer computer computer scientists scientists scientists and and engineers study methods and tools that facilitate the efficient d evelopment of correct, reliable, and development of correct, reliable, and robust computer programs. Software engineers d evelop software tools and collections of tools called develop software tools and collections of tools called programming environments to to improve improve improve the the the development development development process. process. process. For For For example, example, example, tools tools tools can can can help help help to tomanage the many components of a large program that is being written by a team of programmers. Page 116 Unit 6 computer resource node dissimilar proper transmit limited protocol communicate enable bus connect disk network convert bridge A local area network(LAN) is a group of computers and other devices spread over a relativelylimited area and connected by a communications link that enables a ny device to interact with any any device to interact with any other other on on on the the network LANs LANs commonly commonly commonly include include include microcomputers microcomputers microcomputers and and and shared shared shared (often (often (often expensive expensive expensive ))resources such such as as as laser laser laser printers printers printers and and and large large large hard hard disks . . Most Most Most (modern) (modern) (modern) LANs LANs LANs can can can support support support a a a wide wide variety variety of of computers and and other other other devices. devices. devices. Each Each Each device device device must must must use use use the the proper physical physical and and and data-link data-link protocols for the particular LAN, and all devices that want to communicate w ith each other on the with each other on the LAN must use the same upper-level communications protocol .Although single LANs are geographically limited , separate LANs can be connected t o form larger networks. Similar LANs are to form larger networks. Similar LANs are linked by bridges , which act as transfer points between networks , which act as transfer points between networks ; dissimilar LANs are linked by gateways(网关), which both transfer data and convert it according to the protocols used by the receiving network. The devices on a LAN are known as nodes(节点),and the nodes a re connected by cabling(are connected by cabling(电缆) through which messages are transmitted . Nodes on a LAN can be wired together in any of basic . Nodes on a LAN can be wired together in any of basic layouts, known as bus, ring, and star. , ring, and star. 。

计算机专业英语参考答案Unit (3)[3页]

计算机专业英语参考答案Unit  (3)[3页]

Unit Three office softwareSection One Warming Up1. word2. excel3. power point4. outlookSection Two Real WorldFind InformationTaskⅠ:1.She works in the Technical support department.2.He doesn’t know how to add pictures to a document.3.He uses MS Word 2007.4.The insert pictures dialog box will appear.5.Yes, he does.Task II: 1.F 2. F 3. F 4. T 5. TWords BuildingTask Ⅰ: 1.D 2. A 3.B 4.B 5. CTask Ⅱ: 1. creation 2.operation 3.selection 4.illustration 5.appearance Task Ⅲ: 1.D 2. B 3.F 4. H 5. E 6. I 7. G 8. J 9. A 10. CCheer up Your EarsTask Ⅰ:1.department 2.document 3.operate 4.place 5.icon6.screenshot7.see8.button9.location 10.callingTask Ⅱ: 1.wrong 2. laptop 3. check 4. software system 5. outsiderTask Ⅲ: 1. A 2. C 3. B 4. C 5. CTable TalkTask Ⅰ:1.the common office software2.All companies will install this software.3.Like communication tools4.Online shopping is very popular5.be savedSection Three Brighten Your Eyes办公软件简介办公软件的发展用来解决企业用户在沟通,计算,演示,和信息存储中所遇见的基本问题,是用于商务办公中的常见软件。

大工14春《专业英语(计算机英语)》在线测试3答案

大工14春《专业英语(计算机英语)》在线测试3答案

大工14春《专业英语(计算机英语)》在线测试3判断题单选题一、判断题(共10 道试题,共20 分。

)1. An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.( )A. 错误B. 正确-----------------选择:B2. A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )A. 错误B. 正确-----------------选择:B3. To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.()A. 错误B. 正确-----------------选择:B4. A Domain Name System is an Internet service that translates domain names to or from IP addresses.( )A. 错误B. 正确-----------------选择:B5. Electronic Commerce means buying and selling products and services online via the Internet.( )A. 错误B. 正确-----------------选择:B6. EDI is a set of computer interchange standards for business documents such as invoices, bills, and purchase orders.( )A. 错误B. 正确-----------------选择:B7. FTP is the messages, usually text, send from one person to another via the Internet.()A. 错误B. 正确-----------------选择:A8. To protect data, you need to implement a data backup and recovery plan.()A. 错误B. 正确。

计算机专业英语试题3答案

计算机专业英语试题3答案

计算机专业英语试题三答案Ⅰ.Vocabulary(词汇)(共60分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。

)(共20分,每题2分)1.application software应用软件2.audio input devices声音输入设备3. business-to-consumer (B2C)企业对消费者4. gateway网关5. coaxial cable同轴电缆6.database administrator数据库管理员7.embedded operating system嵌入式操作系统8.language translator语言翻译程序9.hierarchical network层次型网络10.Microblog微博(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。

共20分,每题2分)1.图形用户界面GUI2.高清晰度多媒体接口HDMI3.乐器数字接口MIDI4.统一资源定位器 URL5.综合服务数字网ISDN6.加速图形接口AGP7.精简指令集计算机RISC8.超文本传送协议HTTP9.文件传送协议FTP10.密送Bcc(三)Multiple Choices(多选题,每题2分,共20分)Circle the letter or fill in the correct answer.1. Multimedia, Web authoring, graphics, and virtual reality programs are examples of __________.a. special-purpose applicationsb. occupational applicationsc. general-purpose applicationsd. basic applicationse. c and d2. In a relational database, data is organized into __________.a. fieldsb. columnsc. recordsd. tablese. rows3. The resolution of a screen is the __________ number of pixels that the screen can display.a. averageb. maximumc. minimumd. middlee. none of the above4. Which are the types of the non-impact printer?a. thermal printerb. dot matrix printerc. laser printerd. ink-jet printere. all of the above5. When you send an e-mail, you can enter the e-mail address of a person in the __________ field. All other recipients of that message will be able to see that the person has received a copy of the message.a. Ccb. Bccc. Subjectd. Toe. all of the above6. Every valid character in a computer that uses even (71) must always have an even number of 1 bit.a. parity (奇偶)b. checkc. testd. compare7. The maximum number of data that can be expressed by 8 bits is (72).a. 64b. 128c. 255d. 2568. Integration (73) is the process of verifying that the components of a system work together as described in the program design and system design specifications.a. tryingb. checkingc. testingd. coding9. GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in (74).a. an imageb. a filec. a windowd. a page10. Computer (75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.a. storageb. devicec. networkd. processor参考答案:1.e 2.d 3. b 4. acd 5. a 6.a 7.c 8.c 9.a 10.cⅡ. Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。

计算机专业英语练习试卷3(题后含答案及解析)

计算机专业英语练习试卷3(题后含答案及解析)

计算机专业英语练习试卷3(题后含答案及解析) 题型有:1. 选择题选择题(每小题1分,共75分)下列各题A、B、C、D四个选项中,只有一个选项是正确的,请将此选项涂写在答题卡相应位置上,答在试卷上不得分。

1.______ is permanently stored in the computer and provides a link between the hardware and other programs that run on the PC.A.InterfaceB.Operating systemC.InternetD.Applicaion software正确答案:B解析:译文的含义是:( )永久存储在计算机中,在硬件和PC机上运行的其他程序之间,提供联系。

选项A、B、C、D的含义分别是接口、操作系统、因特网、应用软件。

选项B符合题意,为所选。

知识模块:计算机专业英语2.______ is not a linear structure.A.GraphB.QueueC.StackD.I-dimension array正确答案:A解析:译文的含义是:( )不是线性结构。

选项A、B、C、D的含义分别是图、队列、栈、I维数组。

选项A符合题意,为所选。

知识模块:计算机专业英语3.______ is the sending and receiving of the messages by computer. It is a fast, low-cost way of communicating worldwide.A.LANB.Post officeC.E-MailD.I-dimension array正确答案:C解析:译文的含义是:( )通过计算机收发消息,它是快速的、低成本的与世界通信的方式。

选项A、B、C、D的含义分别是局域网、邮局、电子邮件、I 维数组。

选项C符合题意,为所选。

知识模块:计算机专业英语4.The ______ is a collection of computers connected together by phone lines allows for the global sharing of information.A.interfaceB.InternetC.LAND.WWW正确答案:B解析:译文的含义是:( )是通过电话线互联的计算机的集合,使得全球信息共享成为可能。

《计算机专业英语》第03章在线测试

《计算机专业英语》第03章在线测试
A、Windows 2000 Professional
B、Windows 2000 Advanced Server
C、Windows 2000 Server
D、Windows 2000 Datacenter Server
2、Windows 2000 has the key technologies, they are ( ).
正确
错误
5、Error recovery does not belong to operating system.
正确
错误
窗体底端
《计算机专业英语》第03章在线测试
剩余时间:
57:06
窗体顶端
答题须知:1、本卷满分20分。
2、答完题后,请一定要单击下面的“交卷”按钮交卷,否则无法记录本试卷的成绩。
3、在交卷之前,不要刷新本网页,否则你的答题结果将会被清空。
第一题、单项选择题(每题1分,5道题共5分)
1、The infamous“Michelangelo”________strikes thousands of computers every year on March 6th.
A、NTFS
B、ext2
C、FAT
D、NILFS
E、OCFS
第三题、判断题(每题1分,5道题共5分)
1、Office 2000 is an incredible set of business tools.
正确
错误
2、Operating systems are not unique to their manufacturers.
C、encapsulation
D、inheritance
4、Common contemporary operating systems include__________________________.

计算机英语测试Unit2-3

计算机英语测试Unit2-3

计算机英语测试(Unit 2-3)一、Translate the following words and phrases. (翻译下列单词和词组)folder __________ pop-up menu ______________ column ____________ multimedia ___________ up-to-date_____________ broadband__________ username ___________ LAN_____________ firewall ______________ property ____________ carbon copy___________ junk email ___________ browser ____________ plug-in _____________ PowerPoint _____________ 信息技术____________________ 对…做出反应_____________________ 域名______________________ 网络拓扑结构______________________ 网络接口卡_______________________ 安全软件_____________________ 办公软件______________________ 机密信息_________________________ 动态IP地址_____________________ 网络连接 ________________________ 无线路由器_____________________ 系统单元_______________________ 控制面板_______________________ 静态IP地址_____________________ 有线电视______________________ 菜单栏__________________________ 二、Choose the best answers. 语言知识运用( ) 1. In a few years he was ___________from an ordinary clerk to a sales manager.A. promotingB. promotedC. promotesD. promotion( ) 2. I really __________ your invitation but I’m afraid I can’t come.A. appreciatingB. appreciatedC. appreciateD. appreciation ( ) 3. What will you do if you _____ to the Miami Beach?A. goB. wentC. goingD. will go( ) 4. ___________, Mother will wait for him to have dinner together.A. However late he isB. However he is lateC. Whatever late he isD. Whatever he is late( ) 5. Mr. John Smith _______the pleasure of the company of Mr. William White at a dinner at 7:00 pm on 21 April.A. is to requestB. requestC. is requestD. requests( ) 6. _________he apologizes, I won’t speak to him any more.A. As long asB. SupposingC. UnlessD. In case( ) 7. Spicy food does not agree _________me.A. forB. withC. onD. to( ) 8. England, Scotland and Wales ______ the island ______ Great Britain.A. compose, ofB. composed, withC. composed, ofD. compose, with( ) 9. the officials knew it to be valuable, they still dismissed his advice.A. As ifB. Now thatC. Even thoughD. So that( ) 10. He just _________ me ________ and told me to leave him alone.A. turn, upB. turn, downC. turn, onD. turn, to三、Reading Comprehension. 阅读理解Passage AMain Functions of Office ManagementA qualified secretary should have an overall quality and a variety of abilities to deal with issues. Office management is one of the important tasks for a secretary to do, especially when the boss is out. There are some main functions of office management such as accounting, printing, human resources, record management, facility management, space management and risk management and so on. The main task of office management is making sure everything goes smoothly Sometimes we call a secretary the housekeeper of the office, it means that a secretary needs to do a lot of work which can run from scheduling staff appointments to office management to managing an entire database.( ) 1. Which word can be taken the place of a variety of ?A. many kinds ofB. a littleC. a few( ) 2. Office management is one of the important tasks for a secretary to do no matter what situation is.A. Right.B. Wrong.C. Doesn’t say.( ) 3. Which one doesn’t include in the functions of office management in this paragraph?A. Record management.B. Risk management.C. Reception management.( ) 4. What does the housekeeper of the office mean in this paragraph?A. Secretaries are housewives.B. Secretaries manage lots of things.C. Doesn’t say.( ) 5. How many kinds of functions are mentioned in the paragraph?A. 6.B. 7.C. 8.Passage BUsing Office EquipmentsA well-trained and experienced secretary will know how and when to use the office equipments, and how to take care of them. She knows a calculator will help her when she is taking up tasks which include calculations(计算)in the office. When she needs more copies of a document, she will go to the Xeroxing(静电复印机)machine. After she has used the typewriter, she would brush the type with a hard brush to clean the machine, and cover it. If she needs to finish a task which includes typing, she will turn to the computer or Word processor for help.( ) 6. “A well-trained and experienced secretary” means _____________.A. she has worked in different placesB. she has been working for a long time and knows how to work in goodways.C. she can be a good boss.D. she has worked as many positions( ) 7. She knows _______ will help her when she is taking up tasks which include calculations in the office.A. pencil and paperB. good friendsC. calculatorD. typewriter ( ) 8. What would she do after using the typewriter?A. wash her hands.B. brush the type and clean the machine.C. put the machine back to where it is.D. leave it alone.( ) 9. When she needs more copies of a document, what will she do?A. She will go to the Xeroxing machine.B. She will write a document by herself.C. She will ask for help.D. It doesn’t say.( ) 10. If she needs to finish a task which includes typing, what will she do?A .She will turn to the computer for help.B. She will turn to a Word processor for help.C .She will turn to a printer for help.D. Both A and B.Passage CMake a Detailed ItineraryToday is Mary’s fifth day in the office. Her boss plans to go to Thailand for business and he asks her to prepare a detailed itinerary.Mary knows that traveling is very important in modern life, especial in business. In most cases, travel arrangements are made by an assistant.After having consulted her boss about the travel, Mary made a plan for the travel. She got some information from the Internet or travel agencies about a hotel in Thailand, the location of which is near an airport. She booked a single room and a conference room. Modern facilities of the hotel are available, including fitness center, shower and modern socket and so on. Then she collected some business documents concerning both her boss and business, e.g. passport, visa, vaccination certificate and the company’s brochure etc. She also prepared some office stationery for business meetings and reports and confirmed the booking of the hotel, the round-trip tickets, Traveler’s Check and some foreign currency. Finally, she reminded her boss of the information on the tickets, departure time, airport and platform and so on.( ) 11. Mary is a new assistant in the office.A. Y es.B. No.C. Doesn’t say.( ) 12. Mary made a plan for the travel after ____________.A. having got some information from the InternetB. having booked a double roomC. having consulted her boss about the travel( ) 13. All the following below are included in business documents EXCEPT ____.A. visaB. vaccination certificateC. password( ) 14. Why did Mary prepare some office stationary for her boss?A. For business meetings and reports.B. For confirming the booking of the hotel.C. Doesn’t say.( ) 15. What does the underlined word mean?A. arrivalB. leavingC. reach四、Choose the proper sentences to fill in the blanks in the conversation.选择合适的句子完成以下对话。

计算机专业英语Unit 3

计算机专业英语Unit 3

2. Choose the proper words or expressions.
ABC is an interactive programming language and environment for personal computing, originally (A. intending B. intended) 1)_B___as a good replacement for BASIC. It was designed by (A. first does B. first doing) 2) _B___ a task analysis of the programming task.
Part 1 Listening & Speaking
1. Listen to the following passage and fill in the blanks w ith the words in the box.
Logic programming
imperative functional programming
Unit 3 Programming Languages
Learning Objectives
After completing this unit, you will be able to:
1.improve your hearing comprehension and oral English 2.understand the development of programming languages. 3.make clear the differences between machine language and assembly language.
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

A B
C D
The data, when they are not encrypted, are called
A B
C D
A virus is a
A B
C D
Many viruses go resident in the memory like a ( ).
A B
C D
Now, about ( ) different viruses account for all the viruses that actually spread in t
A B
C D
C、attack phase
D、create phase
2、( ) maybe a certain cause that some viruses infect upon.
A、a day
B、a time
C、an external event on your PC
D、a counter within the virus
3、Many viruses do harmful things such as ( ).
A、deleting files
B、simulating typos
C、slowing your PC down
D、changing random data on your disk
4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.
A、stealing storage
B、pilfer CPU cycles
C、del_ete files
D、play music
5、Some viruses, with no attack phase, often damage the programs or disks they infect bec ause they ( ).
A、have bugs in them
B、contain poor quality code
C、steal storage
D、show messages on your screen
第三题、判断题(每题1分,5道题共5分)
正确错误
Michelangelo is a file sector.
正确错误
Computer virus is remote from us.
正确错误
Computer virus may affect the your phisical health .
正确错误
The author thinks that understanding how an attacker approaches your computer system c 正确错误。

相关文档
最新文档