计算机专业英语(Timothy J.O'Leary2008影印版)课后练习题答案
计算机科学引论(2008)影印版课后答案
Chapter 1Crssword Puzzle1.people2.end user3.procedures4.document file5.device driver6.database files7.operation system8.hardware9.Internet10.modem11.softwarermation13.data14.tablet PCMultiple Choice1. b2. b3. a4. b5. d6. d7. a8. c9. d10.dMatching:1----e2----f3----i4----h5---a6----c7---g8---b9---d10—jOpen-ended1.An information system has five parts: people, procedures, software, hardware and data.People: Are end users who use computer to make themselves more productive.Procedures: Specify rules or guidelines for computer operations.Software: Provides step-by-step instructions for computer hardware.Hardware: Processes the data to create information.Data: Consist of unprocessed facts including text, numbers, image and sounds.People are the most important part of any information system.2.System software helps the computer manage its own internal resources. It includes three kindsof programs: operating systems, utilities and device drivers programs.3.Basic applications are the kinds of programs to be considered computer competent.Specialized applications are more narrowly focused on specific disciplines and occupations.Basic applications have some types, such as browser, word processor, spreadsheet ,and so on.Also specialized applications have many types, some of the best known are graphics, audio and video, multimedia, Web authoring ,and artificial intelligence programs.4.There are four types of computers: supercomputers, mainframe computers, minicomputers,and microcomputers.Supercomputers are the most powerful type of computer.Mainframe computers occupy specially wired, air-conditioned rooms, they are capable of great processing speeds and data storage.Minicomputers are refrigerator sized machines.Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of computer.Microcomputers are the most common type of computers.There are four types of microcomputers: Desktop computers, Notebook computers, Handheld computers and PDA.5.Connectivity is the capability of you microcomputer to share the information with othercomputers.Wireless revolution dramatically affect connectivity.A computer network is a communications system connecting two or more computers.Internet is the largest network in the world.The Web provides a multimedia interface to the numerous resources available on the Internet.Chapter2Crossword Puzzle:1.hits2.ISP3.spam4.applets5.surf, search engine6.URL7.ftp8.carder9.attachment10.B2B11.Browser12.filter13.link14.downloading, DSLMultiple Choice:1. d2. a3. c4. c5. a6. a7. a8. a9. d10.bMatching:1----i2----d3----g4----e5---f6----c7---h8---j9---a10—bOpen-Ended1.The most common uses of the Internet are the following: communicating, shopping, searching,entertainment, education, and so on. I have participated in almost all of them. I think communicating is the most popular.2. The two most common types of providers are National and wireless.National service providers provide access through standard telephone connections.Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.3. A typical e-mail message has three basic elements: header, message and signature.4. Social networking is the grouping of individuals into specific groups. There are three basic categories of social networking sites: reuniting, friend-of-a-friend and common interest Reuniting sites are designed to connect people who have known one another but have lost touch.Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.Common interest sites bring together individuals that share common interests or hobbies.5. There are three types of search engines: crawler-based search engines, metasearch engines and specialized search enginesCrawler-based search engines, such as Google, create their listings automatically. Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates, orders the hits, and then provides the edited list to you .one of the best known is Dogpile.Specialized search engines focus on subject-specific Web sites. such as Environment.Chapter 3Crossword Puzzle1.menu2.worksheet3.table4.window5.DBMS6.master slide7.dialog box8.software suite9.word wrap10.sort11.cell12.range13.column14.database15.toolbar16.document17.slides18.queryMultiple Choice1. d2. c3. b4. d5. d6. a7. b8. b9. c10.bMatching1.j2. a3. c4.h5. b7.i8. e9.g10.fOpen-Ended1.General-purpose application are widely used in nearly every discipline and occupation. Theyinclude word processors, spreadsheets, database management systems and presentation graphics.Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.2.Most applications use a GUI, use windows to display information, and have menus to presentcommands.3. A formula is an instruction to calculate or process. Functions are prewritten formulas. Aformula related to what-if analysis is called recalculation.4.Presentation graphics are programs that combine a variety of visual objects to create attractive,visually interesting presentation. People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional.5.An integrated package is a single program that provides the functionality of a word processor,spreadsheet, database manager, and more. The primary disadvantage of an integrated package is that the capabilities of each function are not as extensive as in the individual programs. The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundled together and sold asa group. It is significantly less expensive to buy a suite of applications than to buy eachapplication separatelyChapter 4Crossword Puzzle1.bitmap image2.VRML3.morphing4.story board5.interactivity6.ACID7.fuzzy logic8.blog9.web authoring10.graphical map11.pixels12.link13.vector image14.AI15.flashMultiple Choice2. a3. a4. b5. a6. b7. c8. b9. a10.bMatching1.i2.g3. d4. e5. c6. f7.h8. b9.j10.aOpen-Ended1.Graphics are widely used to analyze data and to create professional-looking presentations;Desktop publishers focus on page design and layout and provide greater flexibility;Image editors are programs for creating and editing bitmap images;Illustration programs are used to create and to edit vector images;Image galleries are libraries of electronic images. These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;Graphics suites are some companies combining their separate graphics programs in groups. 2.Audio editing software allows you to create and edit audio clips, most software allow you toadd audio effects to your tracks. Video editing software allows you to reorganize, add effects, and more to your digital video footage.3.Multimedia is the integration of all sorts of media into one presentation. The creation ofinteractive multimedia presentations follows several steps: Plan, Design, Create and Support.4.Creating a site is called Web authoring. A web site design is an interactive multimedia form ofcommunication, designing a web site begins with determining the site’s overall content, the overall site design is commonly represented in a graphical map. More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.5.The three areas of artificial intelligence are virtual reality, knowledge-based systems androbotics. Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer.Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users. Robotics is the field of study concerned with developing and using robots.Chapter 5Crossword Puzzle1.folderwork server3.GUI4.fragmented5.backup, booting6.warm boot7.windows8.utility suite9.driver10.icons11.tracks12.NOSMultiple Choice1. c2. d3. c4. a5. a6. c7. b8. b9. a10.cMatching1.j2. d3. f4. b5.g6.h7. a8. e9.i10.cOpen-Ended1.System software works with end users, application software, and computer hardware tohandle the majority of technical details. It consists of four types of programs: operating systems, utilities, device drivers and language translators.2.The basic functions of every operating system are : managing computer resources, providing auser interface, and running applications. The three basic operating system categories are: embedded, network and stand-alone.3.Windows is by far the most popular microcomputer operating system today. It comes in avariety of different versions and is designed to run with Intel and Intel-compatible microprocessors. Mac OS is not nearly as widely used as the Windows operating system. It isa powerful, easy-to-use operating system that is popular with professional graphic designs,desktop publishers, and many home users. While Windows, the Mac OS are proprietary operating systems, Linux is not. It is open source software free and available from many sources, including the Web.4.Utilities are specialized programs designed to make computing easier. The five most essentialutilities are: troubleshooting or diagnostic programs, antivirus programs, uninstall programs, backup programs and file compression programs. Utility suites combine several programs into one package.5. A device driver works with the operating system to allow communication between the deviceand the rest of the computer system. Each time the computer system is started, the operating system loads all of the device drivers into memory. Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used.Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver. Windows uses Windows Update to make reinstalling or updating device drivers easily.Chapter 6Crossword Puzzle1.system unit2.microprocessor3.bus width4.memory5.cable6.plug and play7.byte8.cache9.ASCII10.system clockMultiple Choice1. d2. b3. c4. b5. b6. a7. a8. c9. b10.dMatching1.j2. a3. c4.h5.g6.i7. d8. e9. f10.bOpen-Ended1.There are four basic types of system units: Desktop system units, Notebook system units,Tablet PC system units, and Handheld computer system units.Desktop system units typically contain the system’s electronic components and selected secondary storage devices.Notebook system units are portable and much smaller. They contain the electronic components, selected secondary storage devices, and input device.Tablet PC system units are highly portable devices that support the use of a stylus or pen to input commands and data.Handheld computer system units are the smallest and are designed to fit into the palm of one hand.2.The two basic components are: the control unit and the arithmetic-logic unit.Control unit tells the rest of the computer system how to carry out a program’s instructions.Arithmetic-logic unit performs two types of operations---arithmetic and logical.3.There are three types of memory chips: RAM, ROM, and CMOS.RAM chips hold the program and data that the CPU is presently processing, everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.CMOS chip provides flexibility and expandability for a computer system. It contains essential information that is required every time the computer system is turned on. It is powered by a battery and does not lose its contents when the power is turned. Its contents can be changed to reflect changes in the computer system.4.Five expansion cards are: graphics cards, sound cards, modem cards, NIC and TV tuner cards.Graphics cards connect the system board to the computer’s monitor, they convert the internal electronic signals to video signals so they can be displayed on the monitor.Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer. They also convert internal electronic signals to audio signals.Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.NIC are used to connect a computer to one or more other computers.TV tuner cards can changes the TV signal into one that can be displayed on you monitor.5.Four standard ports are: serial ports, parallel ports, universal serial bus ports and FireWireports.Serial ports are often used to connect a mouse, keyboard, modem, and many other devices to the system unit.Parallel ports are used to connect external devices that need to send or receive a lot of data over a short distance.USB ports are gradually replacing serial and parallel ports.FireWire ports provide connections to specialized FireWire devices.Chapter 7Crossword Puzzle1.dot pitch2.keyboard3.wheel button4.mechanical5.dumb6.OMR7.refresh rate8.dpi9.webcam10.digital camera11.toggle12.printer13.joystick14.HDTV15.UPC16.pixel17.flexibleMultiple Choice1. a2. b3. a4. b5. d6. a7. d8. c9. d10.bMathing1.i2. e3. f4.j5. a6. b7.g8. d9. c10.hOpen-Ended1.Input is any data or instructions that are used by a computer. Input devices are hardware usedto translate what people understand into a form that computers can process.2.①There are a widely of different pointing devices including the mouse, joystick, touch screen,light pen, and stylus.A mouse controls a pointer that is displayed on the monitor.A joystick is the most popular input device for computer games. You control game actions byvarying the pressure, speed, and direction of the joystick.A touch screen is a particular kind of monitor with a clear plastic outer layer.A light pen is a light-sensitive pen-like device.A stylus acts with the computer through handwriting recognition software.②There are three types of scanning devices: optical scanners, card readers, bar code readers,and character and mark recognition devices.An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.Card readers interpret encoded information.Bar code readers are either handheld wand readers or platform scanners.Character and mark recognition devices are scanners that are able to recognize special characters and marks.③Image capturing devices include digital cameras and digital video cameras.Digital cameras capture still images. Digital video cameras capture motion.④Audio input can take many forms including the human voice and music.V oice recognition systems accept voice commands to control computer operations and to create document.MIDI is a standard for connecting musical instruments to the system unit.3.The most widely used output devices are monitors, printers and audio output.Monitors present visual images of text and graphics.Printers translate information that has been processed by the system unit and present the information on paper.Audio output devices translate audio information from the computer into sounds that people can understand.4. Output is processed data or information. Output devices are hardware used to translateinformation that has been processed by the system unit into a form that humans can understands.5. Devices combine features of input devices such as scanners with features of output deviceslike printers are called combination input and output devices.Combination devices include fax machines, multifunction devices, Internet telephones, and terminals.A fax machine is a standard tool in nearly every office.Multifunction devices combine the capabilities of a scanner, printer, fax, and copying machine.Internet telephones are specialized input and output devices for receiving and sending voice communication.Terminals are input and output device that connect you to a mainframe or other type of computer.Chapter 8Crossword Puzzle1.track2.raid3.access time4.pits and lands5.disk caching6.online storage7.sector8.floppy9.zip10.cylinder11.densityMultiple Choice1. a2. a3. c4. a5. c6. a7. c8. d9. d10.cMatching1.g2. a3.j4.i5. d6. b7.h8. c9. f10.eOpen-Ended1.The traditional floppy disk is the 1.44MB 3-inch disk. They have a thin exterior jacket madeof hard plastic to protect the flexible disk inside.The high capacity floppy disks are 3 inches in diameter. They are able to store more information, are thicker, and require special disk drives.2.There are three types of hard disks: Internal hard disk, hard-disk cartridge, and hard-diskpack.Three ways to improve the performance of hard disks are disk caching, redundant arrays of inexpensive disks, and file compression/decompression.Disk caching improves hard-disk performance by anticipating data needs.Redundant arrays of inexpensive disks improve performance by expending external storage, improving access speed, and providing reliable storage.File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.3.The two most common optical disc formats are CD and DVD. Hi def is the next generation ofoptical discs.①There are four basic types of CDs: read only, write once, rewritable, and Picture and PhotoCDs.Read only CDs cannot be written on or erased by the users, they are used to distribute large databases, references, and large software application packages.Write once CDs can be written to once, they are used to archive data and to record music download from the Internet.Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.②There are three types of DVDs: read only, write once, and rewriteable.Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.Rewriteable DVDs are competing rewriteable formats.4.Solid-state storage does not have moving parts. Internet drives use the Internet to store dataand information. Magnetic tape provides sequential access for backup.Solid-state storage is more expensive than the others, it is more reliable and requires less power.Internet drives are low cost and the flexibility to access information from any location using the Internet. Access speed is slower.Magnetic tapes provide slower sequential access. It is an effective and commonly used tool for backing up data.5. Mass storage refers to the storage of large amounts of data in a persisting andmachine-readable fashion. Enterprise storage systems are the computer storage systems designed for large-scale, high-technology environments of the modern enterprises.Mass storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tape drives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory.Chapter 9Crossword Puzzle1.client2.bus networkwork gateway4.modulation5.base station6.packets7.analog8.GPS9.topology10.nic11.bps12.Bluetooth13.node14.bandwidth15.dsl16.hubMultiple Choice1. c2. b3. a4. d5. c6. d7. b8. b9. b10.dMatching1.g2. b3. a4.i5.h6. e7. c8.j9. d10.fOpen-Ended1.①Connectivity is a concept related to using computer networks to link people and resources.②The single most dramatic change in connectivity and communications in the past five yearshas been the widespread use of mobile or wireless telephones. This wireless technology allows individuals to stay connected with one another from almost anywhere at any time, the revolution is just beginning.③Communication systems transmit data from one location to another. Every communicationsystem has four basic elements: sending and receiving devices, communication channel, connection devices, and data transmission specifications.2.①Physical connections use a solid medium to connect sending and receiving devices.These connections include telephone lines, coaxial cable, and fiber-optic cables.Telephone lines consist of twisted pair cable, they have been the standard transmission medium for years for both voice and data.Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core.Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.②Wireless connections use the air to connect sending and receiving devices.Primary technologies used for wireless connections are infrared, broadcast radio, microwave, and satellite.Infrared uses infrared light waves to communicate over short distances.Broadcast radio communication uses special sending and receiving towers called transceivers.Microwave communication uses high-frequency radio waves.Satellite communication uses satellites orbiting about 22000 miles above the earth as microwave relay stations.3.The standard protocol for the Internet is TCP/IP. The essential features of this protocol involve:identifying sending and receiving devices and reformatting information for transmission across the Internet.Identification: Every computer on the Internet has a unique number address called an IP address, the Internet uses IP addresses to deliver e-mail and to locate Web sites.Reformatting: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the massage is sent, it is reformatted or broken down into small parts called packets, at the receiving end, the packets are reassembled into the correct order.4.The four principal network topologies are star, bus, ring, and hierarchical.In a star network, a number of small computers or peripheral devices are linked to a central unit, all communications pass through this central unit.In a bus network, each device in the network handles its own communication control.In a ring network, each device is connected to two other devices, forming a ring.The hierarchical network consists of several computers linked to a central host computer, other computers are also hosts to other, smaller computers or to peripheral devices.5.The most common network strategies are terminal, client/server, and peer-to-peer systems.①In a terminal network system, processing power is centralized in one large computer. Forthe end user it is lack of control and flexibility.②Client/server network system use one computer to coordinate and supply services to othernodes on the network. One advantage of the client/sever network strategy is the ability to handle very large networks efficiently. Another advantage is the ability of powerful network management software to monitor and control network activities. The major disadvantages are the cost of installation and maintenance.③In a peer-to-peer network system, nodes have equal authority and can act as both clientsand servers. The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.Chapter 10Crossword Puzzle1.cookie2.surge protector3.mal ware4.ergonomics5.cracker6.keystroke logger7.snoopware8.hacker9.history fileMultiple Choice1. a2. a3. d4. b5. a6. c7. d8. c9. b10.dMatching1.g2.h3. f4. a5. b6. c7.j8. d9.i10.eOpen-Endedrge databases raise some serious concerns on privacy: identity theft and mistaken identity.The impact of private networks on privacy has the two parts: The first instance, of firms eavesdropping on employees, has inspired attempts at federal legislation. The second instance, in which online information services screen and reject messages, is a common activity with most commercial services.The internet brings illusion of anonymity, the web creates a history file, your web activity ismonitored is by cookies. To respond to these privacy concerns, a code of fair information practice has been established.2. Computer criminals are of five types:Employees: The largest category of computer criminals consists of those with the easiest access to computers-namely, employees.Outside users: Some suppliers or clients may have access to a company’s computer system.Hackers and crackers: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes.Organized crime: Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do, but for illegal purpose.Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.3. Some of the principal measures to protect computer security are encryption, restricting access,anticipating disasters, and backing up data.Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals are also using encryption programs to safeguard their private communications.4.Ergonomics is defined as the study of human factors related to things people use.The physical health matters related to computers that have received the most attention recently are the following: eyestrain and headache, back and neck pain, and repetitive strain injury. Computer technology creates some irritants that may be counter productive: noise, and electronic monitoring.5.The basic elements of the Green PC are: System unit, display, and manufacturing.As a computer user, you can do to help protect the environment are the following:conserve, recycle, and educate.Chapter 11Crossword Puzzle1.purchasing2.marketing3.top4.purchase order5.research6.exception7.ess8.data worker9.demander11.tactical12.knowledge worker13.mis14.payroll。
计算机专业英语2008影印版-复习资料
Unit 11.Operating systems are programs that coordinate computer resources,provide an interfacebetween user and the computer,and run applications. 协调计算机资源,用户和计算机之间提供一个接口,运行应用程序。
2.Device drivers are specialized programs designed to allow particular input or output devicesto communicate with the rest of the computer system. 设备驱动程序是专门的程序设计为允许特定的输入或输出设备与计算机系统的其余部分。
3.System unit:the system unit is a container that houses most of the electronic components thatmake up a computer system. 系统单元:系统单元是一个容器,房子的大部分电子元件组成一个计算机系统。
4.Optical discs use laser technology and have the greatest capacity光盘使用激光技术和具有最大的能力5.*Connectivity is the capability of your microcomputer to share information with othercomputers连接是微机的功能与其他计算机共享信息6.Procedures are rules or guidelines to follow when using software,hardware,and date.they aretypically documented in manuals written by computer professionals. 程序规则或指导方针在使用软件,硬件,和日期。
《计算机专业英语》习题参考答案
《计算机专业英语》习题参考答案Lesson 1I.1. Operating System2. Fetch-evaluate-execute3. Front-side bus4. Dual-core processor5. Basic Input/Output System(BIOS)II.1. 指令是特定各式的二进制数列,它们对于每台机器都是唯一的。
2. CPU是中央处理单元的简称,每个字母分开发音。
3. 大多数计算在中央处理器中进行。
4. 双核是指一个处理器上有两个完整运算内核的CPU。
5. 处理器:是微处理器或CPU的缩写。
6. 集成电路:即芯片,是由半导体材料制成的一种电子设备。
III.1. F2. T3. TIV.1.ALU, CU, Register2.memory3.processor4.the CPULesson 2I.1.Static Random Access Memory(SRAM)2.Dynamic Random Access Memory(DRAM)3.Virtual Memory4.Physical Memory5.Level 1 Cache6.Level 2 Cache7.HDD access speedII.1.动态随机存储器之所以称为“动态”是因为它每秒钟被刷新数千次。
2.RAM:是计算机中存储操作系统、应用程序和当前正是用数据的地方。
3.ROM由计算机中一小块长寿命电池供电。
4.RAM缓存是由高速静态随机存储器构成的存储器。
III.1. F2. F3. F4. TIV.1. non-volatile2. compiler3. volatile4. DRAMLesson 3I.1. Motherboard2. PC Case3. Hard Disk Drive(HDD)4. Optical mouse5. RAM6. Mobile DiskII.1.PC是有很多组件构成的一个系统。
计算机专业英语(2008影印版)课后习题Multiple choice题目,答案及翻译
1、A common term that describes the combination of traditional computer and communication technologies isb. information technology一个描述了传统的计算机和通信技术结合的常见的术语B.信息技术2、Procedures are typically documented in manuals written byb. computer specialists程序一般是在手册撰写记录的B.计算机专家3、Which of the following is an example of connectivity?a. Internet下列哪一项是连接的一个例子吗?A.互联网4、Windows XP, windows Vista, and Macintosh OS X are all examples ofb. operating systems Windows XP,Windows Vista,和Macintosh OS X都是例子B.操作系统5、Because of their size and cost, these computers are relatively rare.d. supercomputers由于它们的尺寸和成本,这些电脑是比较少见的。
D.超级计算机6、The system component that controls and manipulates data in order to produce information is called thed. microprocessor系统组成,控制和操纵数据来产生信息称为D.微处理器7、A system component that translates data and programs that humans can understand into a form that the computer can process is called a(n)c. output device一个系统组件,将人类可以理解成计算机能够处理的形式的数据和程序被称为C.输出设备8、A CD is an example of a(n)c. optical disc CD是一个例子(N)C.光盘9、If you want to communicate a message or persuade other people, you would typically use this type of software.d. presentation如果你想传达信息或说服别人,你通常会使用这种类型的软件。
计算机专业英语(2008影印版)课后习题答案(包括crossword_puzzle的句子翻译)
Computing Essentials 2008课后练习题答案详解Chapter 1: Information Technology, The Internet, and Y ouCrossword Puzzle Answers: (p22)Across1 、The most essential part of an information system. People信息系统最基本的部分。
人7 、Coordinates computer resources. Operating System协调计算机资源。
操作系统10 、Modifies signals for processing. Modem修改信号以便处理。
调制解调器12 、Data that has been processed by the computer. Information计算机处理过的数据。
信息13 、Unprocessed facts. Data没处理过的事实。
数据14 、Notebook computer that accepts handwritten input.. Tablet PC可以用手写输入的笔记本电脑。
平板电脑DownNum. Clue Answer2 、Uses computers to become more productive. End User使用电脑变得更有效率。
终端用户3 、Rules or guidelines to follow when using software, hardware, and data. Procedures使用软件,硬件和数据时遵循的规则或指引。
指令说明书4 、Created by word processors. Document Files文字处理创建出来的。
文档文件5 、Specialized programs that allow input and output devices to communicate. Device Drivers 允许输入和输出设备通信的专业程序。
计算机专业英语影印版(Computing Essentials 2008课后答案大全)第三单元Basic Application Software
Crossword Puzzle Answers:Open Ended Questions:1.Explain the difference between general-purpose and special-purpose applications.General-purpose applications are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems, and presentation graphics.special-purpose applications are more narrowly focused on specific disciplines and occupations, such as graphics programs, audio and video editors,2.Discuss the common features of most software programs. Describe the new interfaceintroduced with 2007 Microsoft Office.The newest Office version, 2007 Microsoft Office, has a redesigned interface that is intended to make it easier for users to find and use all the features of an application. This new designintroduces ribbons, contextual tabs, galleries, and more.• Ribbons replace menus and toolbars by organizing commonly used commands into a set of tabs.These tabs display command buttons that are the most relevant to the tasks being performed by the user.• Contextual tabs are tabs that appear automatically. These tabs only appear when they are needed and anticipate the next operations to be performed by the user.• Galleries simplify the process of making a selection from a list of alternatives. This isaccomplished by replacing many dialog boxes with visual presentations of potential results.This new interface is the first major change in over a decade.3.What is the difference between a function and a formula? How is a formula related to what-if analysis?A formula is an instruction to calculate or process. Functions are prewritten formulas providedby the spreadsheet program that perform calculations such as adding a series of cells. If a change is made to one or more numbers in a spreadsheet, all related formulas will automaticallyrecalculate and charts will be recreated. Observing these changes is what-if analysis.4.What are presentation graphics programs? How are they used?Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentations. They are excellent tools to communicate a message and to persuade people.5.What is the difference between an integrated package and a software suite? Whatare the advantages and disadvantages of each?An integrated package is a single program that provides the functionality of a wordprocessor, spreadsheet, database manager, and more. The primary disadvantage of an integrated package is that the capabilities of each function (such as word processing) are not as extensive as in the individual programs (such as Microsoft Word). The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundled together andsold as a group. While the applications function exactly the same whether purchased in a suite or separately, it is significantly less expensive to buy a suite of applications than to buy each application separately.1. Expanding Your Technology exercise #3 Shareware explores how shareware programswork and what the risks involved in using them are.2.Writing About Technology exercise #1 Acquiring Software asks the student to explorefive ways of acquiring software. And asks if it is wrong to obtain and use unauthorized software.Web Tools1.Applying Technology exercise #3 Corel WordPerfect Office Suite has the studentresearch the suite and compare/contrast it to the Microsoft Office suite. It asks thestudent to do critical thinking and decide which is better for them.2. Expanding Your Technology exercise #2 Sharing Data between Applications has thestudent research object linking and embedding. The student is asked to provide examples and be able to define the difference between linking and embedding.Software Tools1.Applying Technology exercise #1 Speech Recognition explores the technology of speechrecognition software. How it is configured and what are its uses. It asks them to writeabout the advantages and disadvantages of it.2.Applying Technology exercise #2 Presentation Graphics explores the requirements,features, and uses of a presentation graphics application found on the website.3.Applying Technology exercise #3 Corel WordPerfect Office Suite has the studentscompare and contrast the Corel Suite with the Microsoft Suite products, and asks them to choose one.Writing Skills1.Applying Technology exercise #1 Speech Recognition explores the technology of speechrecognition software. How it is configured and what are its uses. It asks them to writeabout the advantages and disadvantages of it.2.Applying Technology exercise #3 Corel WordPerfect Office Suite has the studentscompare and contrast the Corel Suite with the Microsoft Suite products, and asks them to choose one.3.Expanding Your Knowledge exercise #1 How Speech Recognition Works has the studentexplore how speech recognition could enhance applications and to describe a profession that could benefit from it.4.Expanding Your Technology exercise #3 Shareware explores how shareware programswork and what the risks involved in using them are.5.Writing About Technology exercise #1 Acquiring Software asks the student to explorefive ways of acquiring software. And asks if it is wrong to obtain and use unauthorized software.6.Writing About Technology exercise #2 Software Standards has the student explore theissue of standardization of computer software. It asks them to find out about therequirements of certifications and how compliance is handled.。
计算机专业英语2008影印版选择题的翻译加答案
CHAPTER 11、A common term that describes the combination of traditional computer and communication technologies isb. information technology一个描述了传统的计算机和通信技术结合的常见的术语B.信息技术2、Procedures are typically documented in manuals written byb. computer specialists程序一般是___在手册撰写记录的B.计算机专家3、Which of the following is an example of connectivity?a. Internet下列哪一项是连接的一个例子吗?A.互联网4、Windows XP, windows Vista, and Macintosh OS X are all examples ofb. operating systemsWindows XP,Windows Vista,和Macintosh OS X都是__的例子B.操作系统5、Because of their size and cost, these computers are relatively rare.d. supercomputers由于它们的尺寸和成本,这些电脑是比较少见的。
D.超级计算机6、The system component that controls and manipulates data in order to produce information is called thed. microprocessor系统组成,控制和操纵数据来产生信息称为D.微处理器7、A system component that translates data and programs that humanscan understand into a form that the computer can process is called a(n)c. output device一个系统组件,将人类可以理解成计算机能够处理的形式的数据和程序被称为C.输出设备8、A CD is an example of a(n)c. optical discCD是___的简称C.光盘9、If you want to communicate a message or persuade other people, you would typically use this type of software.d. presentation如果你想传达信息或说服别人,你通常会使用这种类型的软件。
计算机专业英语试题及答案(A卷)
湖北职业技术学院2008-2009学年度第一学期期末考核试卷考核课程: 《计算机专业英语》 考试类型: 理论 考试方式: 闭卷笔试 学生所在院系: 信息技术学院 年 级: 2007 级 试 卷: A姓名: 班级: 学号:Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%)1. 软件工程 ( )2. 算术逻辑运算 ( )3. 机器码 ( )4. 帮助菜单 ( )5. 图形技术 ( )6. 中间件 ()7. 电子商务 ( )8. 办公自动化 ( )9. 计算机病毒( )10. 可执行文件( )column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)1. memory unit a. 半导体存储器2. intelligence b. 机制3. semiconductor memory c. 存储单元4. data definition language d. 数据定义语言5. mechanism e. 通信6. machine language f. 机器语言7. communication g. 智能8. element distance h. 桌面操作系统9. desktop operating system i. 输入/输出设备10.input/output device j.像素距离1. () 6. ()2. () 7. ()3. () 8. ()4. () 9. ()5. () 10.()Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)1. 只读存储器 _________ 6. 超文本标记语言_________2. 中央处理器_________ 7. 计算机辅助设计_________3. 基本输入输出系统_________ 8. 万维网联盟_________4. 信息技术_________ 9. 图形用户界面_________5. 万维网_________ 10. 兆赫_________Ⅳ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15%)1. The basic units of a computer system are as follows: _________A. CPU, memory and diskB. CPU, input and output unitC. CPU, memory and I/O systemD. CPU, memory and ALU2. A mouse is a small device that a computer user pushes across a desk surface inorder to point to a place on a _________ and to select one or more action to take from that position.A. desktopB. displayC. consoleD. platform3. The control unit fetches _________ from memory and decodes them.A. dataB. informationC. resultsD. instructions4. When power is removed, information in the semiconductor memory is________.A. reliableB. lostC. manipulatedD. remain5. Please find the item that is not belong to the DBA _________.A. storage structure and access method definitionB. schema definitionC. integrity constrain specificationD. DDL6. Each_________ is a unit of both atomicity and consistency.A. transactionB. databaseC. storage structureD. schema details7. A characteristic of operating system is _________.A. resource managementB. memory managementC. error recoveryD. all the above8. Assembly-language instructions are a series of _________.A. 0s and 1sB. abstract codesC. machine codesD. words9. Software engineering is some certain _______.A. programsB. methodsC. productsD. managements10. An advantage of a ring network is that it needs less _________ .A. computerB. networkC. cableD. information11. An ISP supplies a _________ that you can dial from your computer to log on the internet server.A. public keyB. private keyC. service numberD. help file12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. E-commerce do business through _________.A. face-to-face meetingB. computerC. wire-photoD. Internet and EDI14. Every transaction in electronic commerce includes information flow, commercial flow, _______ and material flow.A. data flowB. currency flowC. merchandise flowD.15. The _________ hidden in the infected system does not break out immediately; instead, it needs certain time or some condition before it breaks out.A. fileB. dataC. softwareD. virus(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)high-level language assembly language writtenmachine language notationA programming language, designed to facilitate the communication between human and computers, is a __________________ for describing computation in readable form. There are 3 levels of programming languages, they are __________________, which can be run directly by computer; __________________and______________. There are different high-level programming languages. Fortunately, most of them have many kinds of construct in common and vary only in the way that these must be__________________ . Therefore, first thing to be decided about a task is to choose which programming language is best suited for the job.Passage AThe hardware of a digital computer system is divided into four functional sections. The block diagram of Fig.2-4 shows the four basic units of simplified computer: the input unit, central processing unit, memory unit, and output unit.Each section has a special function in terms of overall computer operation.Fig.2-4 A Digital ComputerThe central processing unit (CPU) is the heart of the computer system. It is responsible for performing all arithmetic operations and logic decisions initiated by the program. In addition to arithmetic and logic functions, the CPU controls overall system operation. There are two main sections found in the CPU of a typical personal computer system: the arithmetic-logic section and the control section. But these two sections are not unique to personal computer. They are found in CPUs of all sizes.Every processor comes with a unique set of operations such as ADD, STORE, or LOAD that represent the processor’s instruction set. Computer designers are fond of calling their computer machines, so the instruction set is sometimes referred to as machine instruction and the binary language in which they are written is called machine language.The memory unit of the computer is used to store information such as numbers, names, and addresses. By “store”, we mean that memory has the ability to hold this information for processing or for outputting for later time. The programs that define how the computer is to process data also reside in memory.In computer system, memory is divided into two different sections, known as main storage and auxiliary storage. They are also sometimes called internal memory and external memory respectively. External memory is used for long term storage of information that is not in use. For instance, it holds programs, files of data, and files of information. In most computers, this part of memory employs storage on magnetic media such as magnetic tapes, magnetic disks, and magnetic drums. This is because they have the ability to store large amount of data. Internal memory is a smaller segment of memory used to temporary storage of programs, data, and information. For instance, when a program is to be executed, its instructions are first brought from external memory into internal memory together with the files of data and information that it will affect. After this, the program isexecuted and its files updated while they are held in internal memory. When the processing defined by the program is completed, the updated files are returned to external memory. Here the program and files are retained for use at later time. (二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (10%)1. The four basic units of simplified computer: the input unit, central processing unit, memory unit, and output unit. ( )2. The CPU is responsible for performing some arithmetic operations and logic decisions. ( )3. “ADD AX, BX” is an instruction of machine language. ( )4. Main storage and auxiliary storage are sometimes called internal memory and external memory respectively. ( )5. The binary language which they are written in machine instruction is called machine language. ( )Passage BIn order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer. If you want to solve the computational problem with a computer, you should learn how to program. The task of developing programs for the solution of computational problems is referred to as programming. Computer programming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise. So programming is breaking a task down into small steps.Programming is sometimes contrasted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines of program text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others.What's actually involved in programming - the actual process of writing programs? Here's a quick overview of the process:· Write a program.· Compile the program.· Run the program.· Debug the program.· Repeat the whole process until the program is finished.(三) Choose the best answer according to the passage B.(根据上文的内容选择正确的答案)(10%)1.If you want to solve the computational problem with a computer, you should learn how to_________.A. calculateB. programC. addD. subtract2. Computer programming is the process of planning and creating a sequence of _________ for a computer to follow.A. stepsB. processC. linesD. graphics3. The term coder is used to describe _________.A. machineB. computerC. keyboardD. person4. In order to solve a computational problem, you can let a person or a _________to do it.A. machineB. computerC. keyboardD. mouse5. Which of the following is not the stage of programming? _________.A. Write a program.B. Debug the program.C. Print the program.D. Compile the program.Passage CA computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days. According to Business Week, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number. As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:Basic Virus a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.Trojan Horses - This is a program that doesn't replicate when entering asystem but can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)1.A computer virus is a computer program that is created to make and spread _________of itself.A. programsB. virusC. copiesD. files 2.Worm spread itself except by_________. .A. networkB. E-mailC. programD. hardware 3.Antivirus program can scan and_________ virus.A. cleanB. produceC. replicateD. make 4.Trojan Horses_________ .A.quickly replicate itself and gradually attach to files, programs or the hard drive. B.infect the computer without even having to click open email attachment or any program.C.allow hackers to take control over a particular system or to steal very important data.D.avoid the virus to attack computer.5.According to Business Week, the_________ attacks reported in the first half of 2003 nearly match previous year's total number .A. 86,404B. 76,404C. 56,354D. 34,876(一)T ranslate the following sentences into Chinese(将下列句子翻译成汉语)(12%)1. For developing a software product, the development process is divided into 5 stages: Requirements Analysis & Specification, Design, Coding, Testing, and Maintenance.2. Functional testing tests whether the output is the expected result with the valid input.3. EDI refers to the electronic exchange of business information between two companies using a specific and structured format over private networks.4.Some applications, such as Word, allow for several windows in a special mode called MDI in which you can open multiple documents within the same application.(二)T ranslate the following paragraph into Chinese.(将下段文章翻译成汉语)(8%)Input Devices. Computer systems use many devices for input purpose. SomeInput Devices allow direct human/machine communication, while some first require data to be recorded on an input medium such as magnetic material. Devices that read data magnetically recorded on specially coated plastic tapes or flexible or floppy plastic disks are popular. The keyboard of a workstation connected directly to or online to a computer is an example of a direct input device. Additional direct input devices include the mouse, input pen, touch screen, and microphone. Regardless of the type of device used, all are components for interpretation and communication between people and computer systems.命题教师游彦教研室主任签字【第页共页】湖北职业技术学院2008-2009学年度第一学期期末考核试卷参考答案及评分标准考核课程:计算机英语考试类型:理论考试方式:闭卷笔试学生所在院系:信息技术学院年级:2007 试卷:A执笔人:要求:明确标注每小题或每步骤得分点Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%)( 本题共10分, 每小题1分)1. software engineering2. Arithmetic Logical operations3. machine code4. Help menu5. graphics technology6. middleware7. E-commerce8. office automation9. computer virus10. executable fileⅡ. Match the following words and expressions in the left column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)( 本题共10分, 每小题1分)1. ( c ) 6. ( f )2. ( g ) 7. ( e )3. ( a ) 8. ( j )4. ( d ) 9. ( h )5. ( b ) 10.( i )Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)( 本题共10分, 每小题1分)1. ROM 6. HTML2. CPU 7. CAD3. BIOS 8. W3C4. IT 9. GUI5. WWW 10. MHzⅣ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15%)( 本题共15分, 每小题1分)1. C2. B3. D4. B5. D6. A7. A8. B9. B 10. C 11. C 12. A 13.D 14. B 15. DⅤ. Reading comprehension(阅读理解)(35%)(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)( 本题共5分, 每空1分)notation machine language assembly language high-level language written (3空和4空答案可互换)(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (10%)( 本题共10分, 每小题2分)1. ( T )2. ( F )3. ( F )4. ( T )5. ( T )(三) Choose the best answer according to the passage B.(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. B2. A3. D4. B5. C(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. C2. A3. A4. C5. BⅥ. Translation.翻译(20%)(一) Translate the following sentences into Chinese(将下列句子翻译成汉语)(12%)( 本题共12分, 每小题3分)1.开发一个软件产品,开发过程分为五个步骤:需求分析和说明,设计,写代码,测试和维护。
计算机专业英语影印版(Computing Essentials 2008)课后答案大全——第一单元Information Technology
Crossword Puzzle Answers:Open Ended Questions:1.Explain the five parts of an information system. What part do people play in this system?a.People: making people, or end users more productive.Procedures: The rules or guidelines for people to follow when using software,hardware, and data are procedures.Software: A program consists of the step-by-step instructions that tell thecomputer how to do its work. The purpose of software is to convert data(unprocessed facts) into information (processed facts).Hardware: The equipment that processes the data to create information is calledhardware.Data: The raw, unprocessed facts, including text, numbers, images, and sounds,are called data.b.People are surely the most important part of any information system. Our livesare touched every day by computers and information systems.2.What is system software? What kinds of programs are included in system software?a.System software enables the application software to interact with the computerhardware. System software is “background” software that helps the computermanage its own internal resources.b.It consists of operating systems, utilities, and device drivers.3.Define and compare basic and specialized application software. Describe some differenttypes of basic applications. Describe some types of specialized applications.a.Basic applications, or general-purpose applications, are widely used in nearly allcareer areas. They are the kinds of programs you have to know to be consideredcomputer competent. One of these basic applications is a browser to navigate,explore, and find information on the Internet.b.Specialized applications, also known as special-purpose applications, includethousands of other programs that are more narrowly focused on specificdisciplines and occupations. Some of the best known are graphics, audio, video,multimedia, Web authoring, and artificial intelligence programs.4.Describe the different types of computers. What is the most common type? What are thetypes of microcomputers?a.There are four types of computers: supercomputers, mainframe, computers,minicomputers, and microcomputers.b.Microcomputers are the most widely used and fastest-growing, type of computer.(10)c.There are four types of microcomputers: desktop, notebook, tablet PC, andhandheld computers.5.What is connectivity? How are the wireless revolution and connectivity related? What isa computer network? What is the Internet? What is the Web?a.Connectivity is the capability of your microcomputer to share information withother computers.b.The single most dramatic change in connectivity in the past five years has beenthe widespread use of mobile or wireless communication devices. These wirelessapplications are just the beginning of the wireless revolution, a revolution that isexpected to dramatically affect the way we communicate and use computertechnology.c. A computer network is a communications system connecting two or morecomputers.d.The largest network in the world is the Internet. It is like a giant highway thatconnects you to millions of other people and organizations located throughout theworld.e.The Web, also known as the World Wide Web or WWW, provides a multimediainterface to the numerous resources available on the InternetTopics covered in End of Chapter materials Page 6of 6。
计算机专业英语影印版(Computing Essentials 2008)课后答案大全—第十一单元Your Future and Information
Your Future and Information TechnologyChapter 11Open Ended Questions:1.Why is strategy important to individual success in the information age? What is yourstrategy?Strategy is how a person keeps up to date with technology and other new innovations in theirfield. You can keep current in several ways by joining a professional organization, keeping in touch with peers in the industry, and being aware of how other companies are doing business.2.Describe how technology changes the nature of competition.Technology changes the nature of competition because more consumers/customers are expectinga wider variety of services. These services usually deal with some type of technologicalinnovation. Businesses are learning that they need to adapt to and incorporate technology or be bypassed.3.How can your computer competencies and knowledge help you get ahead in today’s market?They help in making a person proficient in the tools use to do a job. They also help to see new and innovative ways to improve a job or task.4.What does proactive mean? What is a proactive computer user? What advantages does thistype of user have over the other types?Proactive means acting in anticipation of future problems, needs, or changes. A proactivecomputer uses looks at technology in a positive realistic way and is positive in their outlook. By having a proactive attitude they can look at new technology as providing new tools that, when correctly applied, can positively impact their live。
计算机专业英语(课后题)
计算机专业英语(课后题)第四章课后习题Circle the correct answer:specialized graphics programs combine text and graphics to create publications of professional quality: publishing programs gallerieseditors programsknown as drawing programs.publishing programs gallerieseditors programsprograms used to ctreate and edit vector images.publishing programs gallerieseditors programsessential multimedia feature that allowa user participation programs used to create multimedia presentations.publishing programsauthoring programswidly used interactive animation application from Adobe.for Web site design and HTML coding are called Web page editors orprogramseditors editorsarea of artificial intelligence is also known as expert systems.systems. realitytype of artificial intelligence that uses a database to provide assistance to users.systems realityname for the database used in expert sysrems that contains specific facts and rules.table basetable baseMatch each numbered item with the most closely related lettered your answers in the spaces provided.editing e graphics programs for editing or modifying digital imagesimages b name for raster images.g images contain thousands of dots known as .a of software used to create and edit audio clips.editors d link on amultimedia page used to locate and discover information.c Web site created by an individualj process of creating a Web site.reality h known as artificial reality or virtual environments.i machines that mimichuman activitiesauthoring f type of app designed for smartphones,netbooks,and the correct answer:type of software works with users,application software,and computer hardware to handle the majority of technical details programs that convert programming instructions written by programmers into a language that computers understand and process are language:ability to switch between different applications stored in memory is called :interferencerepresentations for a program,type of file,or function:operating system feature is controlled by a mouse and changes shape depending on its current functionboxoperating system based on Linux,designed for Netbook computers,and focused on Inernet connectivity through cloud computing:c. UNIXmobile operating system develop by Apple and originally called iPhone OS :OS OSutility program that makes copies of files to be used in case the originals are lost or damaged:and Restore DefragmenterCleanuptroubleshooting utility that identifiles and eliminates nonessential files,frees up valuable disk space ,and improves system performance:and Restore DefragmenterCleanupmakes it easy to update drivers with Windows:d. UpdateMatch each numbered item with the most closely related lettered item. Write your answers in the spaces provided.h that perform specific tasks related to managing computer resourcesCamp j a running computer without turning off the powere of operating system that controls and coordinates networked computers.f operating system is often referred to as the software environment orb Macintosh computers toren both Mac OS and the Windows operating system.i type of software that allows a single physical computer to operate as though it were two or more separateand independent computers.g operating system that is owned by Google and is one of the fastest-growing mobile operating systems.a of program that guards computer systems fromviruses and other damaging programs.I. virtualization d a file cannot be saved on a single track ,it has to beboot c that works with the operating system to allow communication between a device and the rest of a computer system is called a device第六章选择题1. this container houses most of the electrical components for a computer system.a. carrier package c. system unitb. system board d. TV tuner2. similar to notebooks, this system unit specializes in on-the-go Web browsing and e-mail access.a. chassis c. media centerb. desktop d. netbook3. computers can only recognize this type of electronic signal.a. analog c. digitalb. bus d. maximum4. the main or motherboard is also known as the:a. computer c. mobile systemb. board processor d. system board5. how many bytes can a 32-bit-wrd computer access at a timea. 1 c. 8b. 4 d. 166. in a microcomputer system , the central processing unit is contained on a single:a. bus c. moduleb. chip d. RAM7. this type of memory divides large programs into parts and stores the parts on a secondary storage device.a. direct c. random-accessb. expanded d. virtual8. also known as NIC, this adapter card is used to connect a computer to a :a. AIA c. graphicsb. expansion d. network9. this provides a pathway to connect parts of the CPU to each other:a. bus c. wiredb. Plug and Play d. wireless10. older ports that have largely been replaced by faster, more flexible ports are called:a. buses c. legacyb. expandable d. rednered匹配题1. The category of system units that blurs the line between desktop computers and dedicated entertainment devices. Media center2. The newer type of tablet PC that is almost all monitor. slate3. System board component that provides a connection point for specialized cards or circuit boards. slots4. Plastic cards the size of a regular credit card that have an embedded specialty chip. Smart cards5. A type of memory that improves processing by acting as a temporary high-speed holding area between the memory and the CPU. cache6. A type of memory that provides a combination of features of RAM and ROM. Flash7. A generic term that is associated with the ability to attach any device onto a computer and have it play or work immediately. Plug and Play8. This bus connects the CPU to memory on the system board. system9. This port can be used to connect many USB devices to the system. USB10. This unit plugs into s standard wall outlet and converts AC to DC. Power supply第七章选择题1. Most keyboards use an arrangement of keys known as:a. Alpha c. OptiKeyb. Daisy d. QWERTY2. The device that controls a pointer displayed on the monitor.a. cord c. printerb. mouse d. scanner3. Also known as a roller ball, this device controls the pointer by rotating a ball with your thumb.a. trackball c. cordless mouseb. joystick d. stylus4. The type of screen that can be touched with more than one finger and supports zooming in and out by pinching and stretching your fingers.a. digital c. multitouchb. dynamic d. OLED5. Flatbed and document are types of:a. headsets c. monitorsb. HDTVs d. scanners6. Device used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips.a. MICR c. OMRb. FDIC d. UPC7. The most widely used audio-input device.a. mouse c. microphoneb. VR d. TFT8. The monitor feature that specifies how often a displayed image is updated.a. aspect ratio c. refresh rateb. dot pitch d. resolution rate9. Handheld, book-sized devices that display text and graphicsa. e-book-readers c. lasersb. HDTV d. whiteboards10. This technology allows television stations to broadcast their programming directly to smartphones, computers, and digital media players.a. CRT c. LEDb. HDTV d. Mobile DTV匹配题1. Pressing this key turns this feature on or off. Caps lock2. This type of mouse has a ball on the bottom and is attached with a cord to the system unit. Mechanical3. A penlike device commonly use with tablet PCs and PDAs. stylus4. Bar code readers use either handheld wand readers or platform. scanners5. Bar code system used by many electronic cash registers. UPC6. Records images digitally on a disk or in its memory. Digital camera7. The distance between each pixel. Dot pitch8. A type of monitor that activates each pixel independently. Active-matrix9. Special-purpose printers for creating maps, images, and architectural and engineering drawings. plotters10. A type of Internet telephone service that requires a small adapter that connects directly to your computer’sUSB port. MagicJack。
计算机专业英语习题+答案
习题+答案2.1Write T or F to each statementT6. An asynchronous device is a clocked device.T7. A latch is an asynchronous device, because it functions at arbitrary times.T8. The repetition of clock pulse can vary from very low rate to very high rate.T9. A synchronous device changes its state only on the arrival of a clock pulse.F10. A clock input may occur at any time.T11. The clock pulses are used to synchronize all operations of the shift register.T13. A unidirectional shift register is capable of shifting in one direction only.F14. In a shift-left register the serial input determines what goes into the leftmost position during the shift register.F15. To provide parallel transfer capability some additional input and output lines should be provided to the shift register.Choose the best answer for each of the following1. How can the output of a logic gate be energized?CA By changing its inputs.B By remaining its inputs unchanged.C By meeting the specific input condition.D By giving a pulse.3. A NAND gate consists of D .A an OR gate followed by an inverterB an AND gate followed by an inverterC an AND gate followed by an OR gateD an inverter followed by an AND gate4. Under what condition is the output of a two-input XOR gate logic-high?BA Its inputs are simultaneously at the same logic level.B Its inputs are simultaneously at opposite logic levels.C Its inputs are logic-low.D its inputs are simultaneously logic-high.2.2Write T or F for each statementT 1. The CPU uses the input and output units to communicate with the outside world.F2. Main memory is sometimes called external memory.F3. After execution the program and the related files of data and files of information will be retained in the main memory for later use.F4. Personal computers have not the features of the larger system..T5. Large systems offer higher processing speeds for user and return more data than PCs. F6. CPUs all size have primary storage, arithmetic logic, and the control section.F7. The output device is the heart of any computer system.T8. The input/output devices and auxiliary storage units of a computer system are called peripherals.F9. The instrument of interpretation and communication between humans and computers system of all sizes is CPU.F10 Special purpose computers can adapted to many situation by giving them an appropriate program.F11 .A minicomputer is the smallest and least expensive type of computer.T12. A special purpose computer performs only one specific task and thus lacks versatility. T13. The larger the system the greater is its processing speed, storage capacity.T14. Mainframe computers are designed to process complex scientific application.T 9. The main memory in a general-purpose computer is made up of RAM integratedcircuit chip.\F 10. When the power is turned on, the program counter is set the first address of thebootstrap loader by the software of the computer.T 11. The read-write heads contact the surface of the floppy disks.T 12. The data on a particular track will be switched automatically onto a spare track by the computer before a catastrophic failure would occur.F 14. The read write heads stay on the same track continuously when the disk drive isWorkingF 16. The possible symbols in the binary numbering system are q to 9.F 17. The decimal value of 16 is represented in 4 bits BCD as 00010101.F 18. Alphanumeric versions of BCD commonly use 6,7or 8 bits to represent characters.F 19. A 6 bit alphanumeric code can represent 128 different characters.F 22. Eight bit codes are limited to representing 128 different characters.T23. An extra check (or parity ) bit is often added to each 6, 7, or 8 bit character represented in storage so that it will be possible to detect coding errors that may occur.T24. If a computer uses an odd parity format to detect errors in character codes, thenevery valid character code will always have an odd number of 1 bits.T25. Processor comes with a unique set of operations called an instruction set.F 26. In an instruction, operands specify the function to be performed.T 27. A processor's job is to retrieve instruction from memory and perform step bystep operations,3.3 True or FalseF1 All operating systems on various computers take the same size.F 2 All operating systems were written in a low level language.T3 The user can't use the computers at all if there is no operating system on the computers.F4 The operating system exists in the lowest layer of a computer.T5 The system calls are provided by the operating system.T 6 A computer's operational software defines the schedule of jobs awaiting execution.F7 Though an operating system can schedule the execution of jobs, it does not manage the availability of I/O devices.T 8 The IOCS component of an operating system controls I/O operations.T9 It is a major problem for the operating system to map the logical file concept onto physical storage devices such as magnetic tape or disk.F10 Files can only be direct access on a disk system.T 11 The logic structure and nomenclature of the different operating systems vary considerable.F12 The form of the system prompt is the same for every kind of operating system 13 You must boot the system, before you use a microcomputer.T14 Spooling is an approach to improving system performance by over aping the input of one job with the output of other jobs.T15 Multiprogramming allows time sharing.T1 6 When they first appeared, the microcomputers were provided with the operating system developed for computers.T17 By using the graphical user interface, what the users need to do is to "point and click" in order to accomplish their tasks.T18 The interface introduced by Windows is the object-oriented user interface.T 19.TMicrosoft failed in betting their future on Windows.Multiple Choice1 A computer's operating system is:Da resource managementb error recoveryc memory managementd all the above2 Which is the generalization of a two-level directory?Da cycle graph directory structureb a tree-structuredc batch systemd all the above3 Which system may have no time constrains?Ca real-time systemb time-share systemc batch systemd all the above4 The more popular micro operating system is:Da MS-DOSb CP/Mc UNIXd all the above5 What languages can be used to develop the operating systems ?Ca A machine language,b An assembly language.c A high level language,d all of the above.6 How does the operating system manage the resources of the computer?a It turns on or off the resources of the computer.b It makes them work together towards some common goals, or objectives.c It controls the way in which these resources are put to work.d It acts directly on the raw hardware.7 The function of an operating system is Da to drive the the raw hardware of the computerb to drive the resources of the computer in accordance with certain objectivesc to provide the higher layers of software with a simplified computerd all of the above11 The graphical user interface provides the users withA a simpler way to interact with their computersB a series of typed commandsC an intuitive sit of graphical icons that allowed the completion of common tasksD an intuitive set of graphical incons for users to "point and click" in order toaccomplish their tasks, so that they didn't have to remember arcane words andcommands anymore12 Windows resemble the Macintosh inA providing a GUI which is introduced by MacintoshB providing a limited means of multitaskingC providing a Windows interface just like the GUID allowing users to load multiple programs and have them run in thebackground while doing other work in a window in the foreground3.4 True or FalseF1 Flowcharting is used primarily for program design and rarely for systems design.T2 When programming in a procedure-oriented language, you should tell the computer'‘what to do' and 'how to do it'.T3 Assembler-level languages use mnemonics to represent instructions.T4 Machine language instructions are composed of a label, an opcode, and an operand.F5 Machine languages must be converted by a compiler to be used by the computer.F6 High-level languages require that programmers work with individual main storage locations.. 5T7 A compiler is translating program that converts high-level languages into machine language.T9 A flowchart loop indicates the repetitive performance of steeps to process data.T10 None of the computers consists of hardware only.F11 Programs written in high-level language can be executed by the computers without the help of a translator program~T13 Each symbolic instruction has one-to-one correspondence with the machine instruction.T14 Writing a program in a high-level language need not take account of the hardwareof the computer.T 15 The opode of an assembly language instruction specifies the operation that is to beperformed by the microprocessor.T 17 The mnemonic for the instruction is the symbolic representation of the actual binary code that the computer directly executes.T 18 A label is on the left of the assembly language statement.T 21 To enable the computer to solve an application problem programmers have to write programs in order to translate the application concepts into computerconcepts.T 22 A class is defined by grouping a user-defined type with all procedures and function that can be applied to it.T 23 The artificial intelligence research community did not agree with the concepts of object-oriented programming when in its early days.F24 Object-oriented programming languages are absolutely different from the LISP programming language.T 25 A program may produce incorrect output even if it runs OK.T 26 An error will occur if a program wants to use a deleted file.F 27 All the errors can be avoided.T 28 A warning will not terminate the program.T 29 Although we could not avoid all the runtime errors, we must take appropriate action when it happens.Match the following terms to the appropriate definition1 program2 programmer3 machine language4 assembler5 source6 object7 interpreter8 compilerA A computer program that translates an instruction into machine language, execute it, and then repeats the process for each instruction in a program until the program is finished.7B The set of statements that make up a computer program.5C A computer program that reads a high-level language instruction.8D A computer-specific set of primitive or elementary instructions that allows people to communicate with a particular computer.3E A set of instruction that tells a computer what to do.1F A program that translates an assembly-level language into machine language4.G Output from a compiler or assembler that is linked with other code to produce executable machine language code.6H A person who creates computer program.23.5True or falseT1 The program specifications are written by the software engineers.F2 Coding a program will consume most of programmer's time and effort.T 3 Programmers should use flowchart and other visual aids when they are designing routines.F4 The goal of the test phase of program development is to "prove" that a particular program has been completely debugged.T 5 More programmers maintain programs rather than code programs.T 6 A structured program is made up of several modules.T 7 "Branching" capability is one the most intriguing properties of a digital computer.。
计算机专业英语试题及答案(A卷)
湖北职业技术学院2008-2009学年度第一学期期末考核试卷考核课程: 《计算机专业英语》 考试类型: 理论 考试方式: 闭卷笔试 学生所在院系: 信息技术学院 年 级: 2007 级 试 卷: A姓名: 班级: 学号:Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%)1. 软件工程 ( )2. 算术逻辑运算 ( )3. 机器码 ( )4. 帮助菜单 ( )5. 图形技术 ( )6. 中间件 ()7. 电子商务 ( )8. 办公自动化 ( )9. 计算机病毒( )10. 可执行文件( )column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)1. memory unit a. 半导体存储器2. intelligence b. 机制3. semiconductor memory c. 存储单元4. data definition language d. 数据定义语言5. mechanism e. 通信6. machine language f. 机器语言7. communication g. 智能8. element distance h. 桌面操作系统9. desktop operating system i. 输入/输出设备10.input/output device j.像素距离1. () 6. ()2. () 7. ()3. () 8. ()4. () 9. ()5. () 10.()Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)1. 只读存储器 _________ 6. 超文本标记语言_________2. 中央处理器_________ 7. 计算机辅助设计_________3. 基本输入输出系统_________ 8. 万维网联盟_________4. 信息技术_________ 9. 图形用户界面_________5. 万维网_________ 10. 兆赫_________Ⅳ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15%)1. The basic units of a computer system are as follows: _________A. CPU, memory and diskB. CPU, input and output unitC. CPU, memory and I/O systemD. CPU, memory and ALU2. A mouse is a small device that a computer user pushes across a desk surface inorder to point to a place on a _________ and to select one or more action to take from that position.A. desktopB. displayC. consoleD. platform3. The control unit fetches _________ from memory and decodes them.A. dataB. informationC. resultsD. instructions4. When power is removed, information in the semiconductor memory is________.A. reliableB. lostC. manipulatedD. remain5. Please find the item that is not belong to the DBA _________.A. storage structure and access method definitionB. schema definitionC. integrity constrain specificationD. DDL6. Each_________ is a unit of both atomicity and consistency.A. transactionB. databaseC. storage structureD. schema details7. A characteristic of operating system is _________.A. resource managementB. memory managementC. error recoveryD. all the above8. Assembly-language instructions are a series of _________.A. 0s and 1sB. abstract codesC. machine codesD. words9. Software engineering is some certain _______.A. programsB. methodsC. productsD. managements10. An advantage of a ring network is that it needs less _________ .A. computerB. networkC. cableD. information11. An ISP supplies a _________ that you can dial from your computer to log on the internet server.A. public keyB. private keyC. service numberD. help file12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. E-commerce do business through _________.A. face-to-face meetingB. computerC. wire-photoD. Internet and EDI14. Every transaction in electronic commerce includes information flow, commercial flow, _______ and material flow.A. data flowB. currency flowC. merchandise flowD.15. The _________ hidden in the infected system does not break out immediately; instead, it needs certain time or some condition before it breaks out.A. fileB. dataC. softwareD. virus(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)high-level language assembly language writtenmachine language notationA programming language, designed to facilitate the communication between human and computers, is a __________________ for describing computation in readable form. There are 3 levels of programming languages, they are __________________, which can be run directly by computer; __________________and______________. There are different high-level programming languages. Fortunately, most of them have many kinds of construct in common and vary only in the way that these must be__________________ . Therefore, first thing to be decided about a task is to choose which programming language is best suited for the job.Passage AThe hardware of a digital computer system is divided into four functional sections. The block diagram of Fig.2-4 shows the four basic units of simplified computer: the input unit, central processing unit, memory unit, and output unit.Each section has a special function in terms of overall computer operation.Fig.2-4 A Digital ComputerThe central processing unit (CPU) is the heart of the computer system. It is responsible for performing all arithmetic operations and logic decisions initiated by the program. In addition to arithmetic and logic functions, the CPU controls overall system operation. There are two main sections found in the CPU of a typical personal computer system: the arithmetic-logic section and the control section. But these two sections are not unique to personal computer. They are found in CPUs of all sizes.Every processor comes with a unique set of operations such as ADD, STORE, or LOAD that represent the processor’s instruction set. Computer designers are fond of calling their computer machines, so the instruction set is sometimes referred to as machine instruction and the binary language in which they are written is called machine language.The memory unit of the computer is used to store information such as numbers, names, and addresses. By “store”, we mean that memory has the ability to hold this information for processing or for outputting for later time. The programs that define how the computer is to process data also reside in memory.In computer system, memory is divided into two different sections, known as main storage and auxiliary storage. They are also sometimes called internal memory and external memory respectively. External memory is used for long term storage of information that is not in use. For instance, it holds programs, files of data, and files of information. In most computers, this part of memory employs storage on magnetic media such as magnetic tapes, magnetic disks, and magnetic drums. This is because they have the ability to store large amount of data. Internal memory is a smaller segment of memory used to temporary storage of programs, data, and information. For instance, when a program is to be executed, its instructions are first brought from external memory into internal memory together with the files of data and information that it will affect. After this, the program isexecuted and its files updated while they are held in internal memory. When the processing defined by the program is completed, the updated files are returned to external memory. Here the program and files are retained for use at later time. (二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (10%)1. The four basic units of simplified computer: the input unit, central processing unit, memory unit, and output unit. ( )2. The CPU is responsible for performing some arithmetic operations and logic decisions. ( )3. “ADD AX, BX” is an instruction of machine language. ( )4. Main storage and auxiliary storage are sometimes called internal memory and external memory respectively. ( )5. The binary language which they are written in machine instruction is called machine language. ( )Passage BIn order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer. If you want to solve the computational problem with a computer, you should learn how to program. The task of developing programs for the solution of computational problems is referred to as programming. Computer programming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise. So programming is breaking a task down into small steps.Programming is sometimes contrasted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines of program text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others.What's actually involved in programming - the actual process of writing programs? Here's a quick overview of the process:· Write a program.· Compile the program.· Run the program.· Debug the program.· Repeat the whole process until the program is finished.(三) Choose the best answer according to the passage B.(根据上文的内容选择正确的答案)(10%)1.If you want to solve the computational problem with a computer, you should learn how to_________.A. calculateB. programC. addD. subtract2. Computer programming is the process of planning and creating a sequence of _________ for a computer to follow.A. stepsB. processC. linesD. graphics3. The term coder is used to describe _________.A. machineB. computerC. keyboardD. person4. In order to solve a computational problem, you can let a person or a _________to do it.A. machineB. computerC. keyboardD. mouse5. Which of the following is not the stage of programming? _________.A. Write a program.B. Debug the program.C. Print the program.D. Compile the program.Passage CA computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days. According to Business Week, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number. As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:Basic Virus a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.Trojan Horses - This is a program that doesn't replicate when entering asystem but can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)1.A computer virus is a computer program that is created to make and spread _________of itself.A. programsB. virusC. copiesD. files 2.Worm spread itself except by_________. .A. networkB. E-mailC. programD. hardware 3.Antivirus program can scan and_________ virus.A. cleanB. produceC. replicateD. make 4.Trojan Horses_________ .A.quickly replicate itself and gradually attach to files, programs or the hard drive. B.infect the computer without even having to click open email attachment or any program.C.allow hackers to take control over a particular system or to steal very important data.D.avoid the virus to attack computer.5.According to Business Week, the_________ attacks reported in the first half of 2003 nearly match previous year's total number .A. 86,404B. 76,404C. 56,354D. 34,876(一)T ranslate the following sentences into Chinese(将下列句子翻译成汉语)(12%)1. For developing a software product, the development process is divided into 5 stages: Requirements Analysis & Specification, Design, Coding, Testing, and Maintenance.2. Functional testing tests whether the output is the expected result with the valid input.3. EDI refers to the electronic exchange of business information between two companies using a specific and structured format over private networks.4.Some applications, such as Word, allow for several windows in a special mode called MDI in which you can open multiple documents within the same application.(二)T ranslate the following paragraph into Chinese.(将下段文章翻译成汉语)(8%)Input Devices. Computer systems use many devices for input purpose. SomeInput Devices allow direct human/machine communication, while some first require data to be recorded on an input medium such as magnetic material. Devices that read data magnetically recorded on specially coated plastic tapes or flexible or floppy plastic disks are popular. The keyboard of a workstation connected directly to or online to a computer is an example of a direct input device. Additional direct input devices include the mouse, input pen, touch screen, and microphone. Regardless of the type of device used, all are components for interpretation and communication between people and computer systems.命题教师游彦教研室主任签字【第页共页】湖北职业技术学院2008-2009学年度第一学期期末考核试卷参考答案及评分标准考核课程:计算机英语考试类型:理论考试方式:闭卷笔试学生所在院系:信息技术学院年级:2007 试卷:A执笔人:要求:明确标注每小题或每步骤得分点Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%)( 本题共10分, 每小题1分)1. software engineering2. Arithmetic Logical operations3. machine code4. Help menu5. graphics technology6. middleware7. E-commerce8. office automation9. computer virus10. executable fileⅡ. Match the following words and expressions in the left column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)( 本题共10分, 每小题1分)1. ( c ) 6. ( f )2. ( g ) 7. ( e )3. ( a ) 8. ( j )4. ( d ) 9. ( h )5. ( b ) 10.( i )Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)( 本题共10分, 每小题1分)1. ROM 6. HTML2. CPU 7. CAD3. BIOS 8. W3C4. IT 9. GUI5. WWW 10. MHzⅣ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15%)( 本题共15分, 每小题1分)1. C2. B3. D4. B5. D6. A7. A8. B9. B 10. C 11. C 12. A 13.D 14. B 15. DⅤ. Reading comprehension(阅读理解)(35%)(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)( 本题共5分, 每空1分)notation machine language assembly language high-level language written (3空和4空答案可互换)(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (10%)( 本题共10分, 每小题2分)1. ( T )2. ( F )3. ( F )4. ( T )5. ( T )(三) Choose the best answer according to the passage B.(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. B2. A3. D4. B5. C(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. C2. A3. A4. C5. BⅥ. Translation.翻译(20%)(一) Translate the following sentences into Chinese(将下列句子翻译成汉语)(12%)( 本题共12分, 每小题3分)1.开发一个软件产品,开发过程分为五个步骤:需求分析和说明,设计,写代码,测试和维护。
计算机专业英语课后答案
计算机专业英语课后答案Lesson1Text AII. Translate the following terms and phrases into Chinese.1. external devices 1. 外部设备2. output device 2. 输出设备3. parallel device 3. 并行设备4. assembly language 4. 汇编语言5. block device 5. 块设备6. floating point 6. 浮点7. data stream 7. 数据流8. input device 8. 输入设备9. integrated circuit 9. 集成电路10. main storage 10. 主存III. Translate the following terms and phrases into English. 缩写完整形式中文意义1. ALU Arithmetic/Logic Unit 运算器2. CPU Central Processing Unit或CentralProcessor Unit中央处理器3. CISC Complex Instruction Set Computer 复杂指令集计算机4. DSP Digital Signal Processing 数字信号处理5. EPROM Erasable Programmable Read OnlyMemory 可擦可编程只读存储器6. LED light-emitting diode 发光二级管7. MODEM MOdulator, DEModulator 调制解调器8. RAM Random Access Memory 随机访问存储器9. ROM Read Only Memory 只读存储器10. RISC Reduced Instruction Set Computer 精简指令集计算机IV. Fill in the gaps with the words or phrases chosen from the box. Change the forms where necessary.1. instructions2. devices3. concept4. consuming5. integrated circuits6. space7. fit into8. Information Age9. embedded computer 10. controlV. Translate the following passage into Chinese.计算机能够储存和执行被叫做程序的许多指令,这使其非常通用并不同于计算器。