计算机专业英语作业(1).
计算机专业英语_考试题目
----------------------------精品word 文档 值得下载 值得拥有---------------------------------------------- 一、词汇(一)Translate the following words or expressions into Chinese.1.Central Processing Unit 中央处理单元2.relational database 关系数据库 3.software crisis 软件危机 4.feasibility analysis 可行性分析5.electronic commerce 电子商务6.reference element 参考元素9.object-oriented language 面向对象的语言13.assembly language 汇编语言14.standardize 使标准化17.embedded system 嵌入式系统----------------------------精品word 文档 值得下载 值得拥有----------------------------------------------20.gray scale 灰度 (二) Fill in the blanks with the corresponding English abbreviations. (根据汉语写出相应的英语缩写。
)1.随机存储器 RAM2.广域网 WAN3.超文本标记语言 HTML4.文件传输协议 FTP5.液晶显示器 LCD6.结构化查询语言SQL7.磁盘操作系统 DOS8.电子公告板系统 BBS(三) Translate the following English abbreviations into Chinese. (根据英语缩写写出相应的中文意思。
)1.USB 通用串行总线 3.AI 人工智能4.HDD 硬盘驱动器5.DNS 域名服务器6.IE 网页浏览器8.PPP 点对点通信协议 9.SMTP 简单邮件传输协议10.WWW 万维网二、 匹配1、portability J A 、半兼容的2、ROM D B 、客户服务器模式3、carrier signal G C 、数据库管理信息系统4、protocol F D 、只读存储器5、CSS H E 、综合业务数字网6、proxy server N F 、协议7、computer aided design S G 、载波信号8、semi-compatible A H 、层次式样表9、SCSI O I、性能影响10、URL(uniform resource locator) M J、可移植性11、performance hit I K、超文本传输协议12、CP/M R L、局域网13、ISP T M、统一资源定位器14、CLI(Command Language Interpreter)Q N、代理服务器15、hypertext document P O、小型计算机系统接口16、LAN L P、超文本文档17、database management system C Q、命令语言解释程序18、HTTP K R、微机控制程序19、ISDN E S、计算机辅助设计20、client server B T、网络服务提供者三、英文解释(此题仅供参考)In this section, there are 15 sentences which are the English words explanation. You are required to read it carefully, then choose the proper word corresponding with the explanation。
计算机专业英语测试题及答案
计算机专业英语测试题一、词汇测试题(每小题1分,共20分)(一).Translate the following words and expressions into Chinese (共10分,每题1分)1.Cyber cafe2.microcomputer3.ROM4.Object-oriented programming5.utility program6.system specification7.database administrator8.modulator-demodulator9.client/server model10.spreadsheet program(二).Translate the following terms or phrases from Chinese into English (共10分,每题1分)1.中央处理器2.广域网3.超级计算机4.电子商务5.计算机安全6.计算机文化7.网站8.域名9.数据库管理系统10.软件工程二、完型填空题(每空1分,共20分)Fill in each of the blanks with one of the words given in the list following each paragraph, making changes if necessary:1. Computer hardware is the involved in the of a computer and consists of the that can be physically handled. The function of these components is typically divided into three main categories: , , and . Components in these categories connect to , specifically, the computer’s central unit (CPU), the electronic that provides the computational ability and control of the computer, via wires or circuitry called bus.microprocessors component processing functionoutput equipment input circuitry storage2.In the relational model, data is organized in two-dimensionalcalled . There is no or structure imposed on the data. The tables or relations are, however, related to each other. The database management system (RDBMS) the data so that its external is a of relation or tables. This does not mean that data is stored as tables: the physical of the data is independent of the way in which the is logically organized.hierarchical set organize relational relationdata storage view network table三、英译汉题(每题10分,共20分)Translate the following passage from English into Chinese:1.The field of computer science has grown rapidly since the1950s due to the increase in their use. Computer programs have undergone many changes during this time in response to user need and advances in technology. Newer ideas in computing such as parallel computing, distributed computing, and artificial intelligence, have radically altered the traditional concepts that once determined program form and function. In parallelcomputing parts of a problem are worked on simultaneously by different processors, and this speed up the solution of the problem. Another type of parallel computing called distributed computing use CPUs from many interconnected computers to solve problems. Research into artificial intelligence (AI) has led to several other new styles of programming.2.High-level languages are commonly classified asprocedure-oriented, functional, objected-oriented, logic languages. The most common high-level languages today are procedure-oriented languages. In these languages, one or more related blocks of statements that perform some complete function are grouped together into a program module, or procedure, and given a name such as “procedure A”. If the same sequence of operations is needed elsewhere in the program, a simple statement can be used to refer back to the procedure. In essence, a procedure is just a mini-program. A large program can be constructed by grouping together procedures that perform different tasks.四、汉译英题(20分)最著名的互联网例子是因特网。
计算机专业英语教程(第四版)习题答案
计算机专业英语教程(第四版)习题答案计算机专业英语教程(第四版)习题答案计算机专业英语(第四版)课后习题答案Unit 1 [Ex 1] Fb5E2RGbCAP [Ex 2] 1. input, storage, processing, and output 2. power; speed; 1. F 2. T 3. T 4. F 5. T 6. T 7. T 8. T 9. T 10.memoryp1EanqFDPw 3. central processing unit memoryDXDiTa9E3d 5. keyboard; [Ex 3] B. A. central processing unit; 1. F 2. D 2. monitor 3. G 4. C 5. B main memory; 6. A 7. E monitorRTCrpUDGiT 8. H5PCzVD7HxA 4. internal; primary;1. user3. data4. keyboard5. data processingjLBHrnAILg6. information [Ex 4] instructions7. computer8. memory 3. manipulates 4.1. input device2. screen, screen 5. retrievexHAQX74J0X 8. Function6. code7. hard copy[Ex. 5] 新处理器开始IT 技术的新时代New Processors Open New Era of IT Technologies Last week, Intel introduced to the public in Russia and other CIS countries a family of processors Intel Xeon E5-2600. They are more powerful and reliable and, importantly, are very economical in terms of energy consumption. Their1 / 30presence opens a new era in the field of IT technologies and means that the cloud technology is getting closer.LDAYtRyKfEThese processors are primarily designed for servers, data centers (DPC) and supercomputers. The emergence of this class of devices is not accidental. According to the regional director of Intel in Russia and other CIS states Dmitri Konash who spoke at the event, the market of IT-technology is developing so rapidly that, according to forecasts, by 2015 there will be 15 billion devices connected to the Internet, and over 3 billion of active users.Zzz6ZB2Ltk 上周,英特尔公司向俄罗斯和其它独联体国家的公众推出了英特尔Xeon E5-2600 系列处理器,它们更加强大可靠,尤其是在能量消耗方面更加经济实惠。
《计算机专业英语》习题参考答案
《计算机专业英语》习题参考答案Lesson 1I.1. Operating System2. Fetch-evaluate-execute3. Front-side bus4. Dual-core processor5. Basic Input/Output System(BIOS)II.1. 指令是特定各式的二进制数列,它们对于每台机器都是唯一的。
2. CPU是中央处理单元的简称,每个字母分开发音。
3. 大多数计算在中央处理器中进行。
4. 双核是指一个处理器上有两个完整运算内核的CPU。
5. 处理器:是微处理器或CPU的缩写。
6. 集成电路:即芯片,是由半导体材料制成的一种电子设备。
III.1. F2. T3. TIV.1.ALU, CU, Register2.memory3.processor4.the CPULesson 2I.1.Static Random Access Memory(SRAM)2.Dynamic Random Access Memory(DRAM)3.Virtual Memory4.Physical Memory5.Level 1 Cache6.Level 2 Cache7.HDD access speedII.1.动态随机存储器之所以称为“动态”是因为它每秒钟被刷新数千次。
2.RAM:是计算机中存储操作系统、应用程序和当前正是用数据的地方。
3.ROM由计算机中一小块长寿命电池供电。
4.RAM缓存是由高速静态随机存储器构成的存储器。
III.1. F2. F3. F4. TIV.1. non-volatile2. compiler3. volatile4. DRAMLesson 3I.1. Motherboard2. PC Case3. Hard Disk Drive(HDD)4. Optical mouse5. RAM6. Mobile DiskII.1.PC是有很多组件构成的一个系统。
计算机专业英语作业
计算机专业英语计算机专业英语 练习练习V ocabulary (一)Translate the following words and expressions into Chinese . 1. O perating system (Operating system (操作系统) 2. white box testing (白盒测试(白盒测试3. hard disk (硬盘)(硬盘) 4. management information system (管理信息系统(管理信息系统5. electronic commerce (电子商务(电子商务6. relational database (关系数据库)(关系数据库)7. software engineering (软件工程(软件工程8. software maintenance (软件维护(软件维护9. menu bar (菜单条(菜单条10. network security (网络安全(网络安全(二)Fill in the blank with the corresponding English abbreviations .1.只读存储器 2.广域网3.传输控制协议 4.文件传送[输]协议5.通用串行总线 6.6.面面向对象编程7.集成开发环境 8.结构化查询语言9.数据库管理系统 010..开放系统互连(三)Match the following words and expressions in the left column with those similar in meaning in the right column .1. application software a .音频2.machine language machine language b .应用软件3.structured programming c .机器语言4。
functional testing functional testing d .软件测试5.memory memory e .结构化程序设计6.relational database relational database f .内存7.firewall firewall g .功能测试8.software testing software testing h .关系数据库9.hacker hacker i .黑客1010..audio audio j.j.防防火墙Translation Translate the following sentences into Chinese1. There are several applications called Web browsers that make it easy to access the World Wide Web, Two of the most popular being Netscape Navigator and Microsoft ’s Internet Explorer. 2. SQL SQL Server Server Server is is is designed designed designed to to to allow allow allow thousands thousands thousands of of of users users users to to to access access access the the database at the same time and is a true client/server database system. 3. During During the the the last last last few few few years, years, years, it it it has has has been been been realized realized realized that that that maintenance maintenance maintenance of of programs is more expensive than development, so reading of programs by humans is as important as writing them. 4. Some Some applications, applications, applications, such such such as as as Word, Word, allow allow for for for several several several windows windows windows in in in a a special special mode mode mode called called called MDI MDI MDI in in in which which which you you you can can can open open open multiple multiple multiple documents documents within the same application. Translate the following paragraph into Chinese Over the last few decades there has been a tremendous growth in information technology technology and and and its its its impact impact impact on on on everyday everyday everyday life. life. Complex Complex software software software systems systems have have become become become critical critical critical to to to the the the operation operation operation of of of many many many systems systems systems in in in areas areas areas such such such as as banking, communications, manufacturing, power generation, and transportation. Progress Progress in in in computer computer computer science science science and and and accumulated accumulated accumulated experience experience with with industrial industrial industrial production production production of of of software software software have have have led led led to to to the the the emergence emergence emergence of of of software software engineering as a separate discipline. The software engineering discipline has been defined as “the application of systematic, disciplined, quantifiable approaches approaches to to to the the the development, development, development, operation, operation, operation, and and and maintenance maintenance maintenance of of of software.software.software.”” that is, the application of engineering to Software. 计算机专业英语练习答案计算机专业英语练习答案Vocabulary1.操作系统.操作系统 2.白盒测试.白盒测试3.硬盘.硬盘 4.管理信息系统.管理信息系统 5.电子商务子商务6.关系数据库.关系数据库 7 7.软件工程.软件工程.软件工程 8.软件维护.软件维护9.菜单栏.菜单栏 1010..网络安全络安全1.ROM (Read Only Memory)2.WAN (Wide Area Network)3.TCP: Transmission Control Protocal4.FTP: File Transmission(Transfer) Protocal5.USB : Universal Serial Bus6.OOP : Object Oriented Programming7。
(完整word版)计算机专业英语试题
计算机专业英语试题I.V ocabulary(词汇)(30分)(一)Translate the following words and expressions into Chinese.(写出下列词组的汉语。
共10分,每题1分)1.Operating system____________2.white bOx testing__________3.hard disk_________4.management information system_______________5.electronic commerce___________________6.relational database__________________7.software engineering___________________8.software maintenance__________________9.menu bar______________10. network security___________________(二)Fill in the blank swith the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
共10分,每题1分)1.只读存储器__________ 2.广域网___________3.传输控制协议___________ 4,文件传送[输]协议__________5.通用串行总线__________ 6.面向对象编程____________7.集成开发环境___________ 8.结构化查询语言___________9.数据库管理系统___________ 10.开放系统互连______(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
计算机专业英语作业
计算机专业英语作业:1、请将视频“什么是电脑硬件”中所述内容用英文表示。
2、请将以下英文翻译为中文。
1)Plug and Play, sometimes, abbreviated PnP, is a catchy phrase used to describe devices that work with a computer system as soon as they are connected. The user does not have to manually install drivers for the device or even tell the computer that a new device has been added. Instead the computer automatically recognizes the device, loads new drivers for the hardware if needed, and begins to work with the newly connected device.For example, if you connect a Plug-and-Play mouse to the USB port on your computer, it will begin to work within a few seconds of being plugged in. A non plug-and-play device would require you to go through several steps of installing drivers and setting up the device before it would work.While Plug and Play usually refers to computer peripheral devices, such as keyboards and mice, it can also be used to describe internal hardware. For example, a video card or hard drive may be a Plug and Play device, meaning the computer will recognize it as soon as it is installed. The only difference is that internal components usually require the computer to be turned off when they are installed, while external devices can typically be installed while the computer is running.2)What are some examples of computer peripheral devices?Answer:⏹ A computer peripheral, or peripheral device, is an external object that provides input and output for the computer.⏹Some common input devices include: keyboard, mouse, joystick, pen tablet, MIDI keyboard (musical instrument digital interface数码音响), scanner, digital camera, video camera, microphone.⏹Some common output devices include: monitor, projector, TV screen, printer, plotter, speakers.⏹There are also devices that function as both input and output devices, such as: external hard drives, media card readers, digital camcorders, digital mixers, MIDI equipment.⏹While these are some of the more common peripherals, there are many other kinds as well. Just remember that any external device that provides input to the computer or receives output from the computer is considered a peripheral.3)Binary is a two-digit (Base-2) numerical system, which computers use to store data and compute functions. The reason computers use the binary system is because digital switches inside the computer can only be set to either on or off, which are represented by a 1 or 0. Though the binary system consists of only ones and zeros, the two digits can be used to represent any number.4)There are many types of compact disks. One format is called CD-RWs. They can be recorded on and re-recorded on (rewritten on) as you would do with a floppy disk. Another format is the CD-ROM. The technology for recording on these disks is different form other CDs.5)Stands for "Read-Only Memory." Please do not confuse this term with RAM or a hard drive, as many people already do. ROM is memory containing hardwired instructions that the computer uses when it boots up, before the system software loads. In PCs, the instructions are read from a small program in the ROM, called the BIOS (Basic Input/Output System).6)disk driveA machine that reads data from and writes data onto a disk. A disk drive rotates the disk very fast and has one or more heads that read and write data. There are different types of disk drives for different types of disks. For example, a hard disk drive (HDD) reads and writes hard disks, and a floppy drive (FDD) accesses floppy disks. A magnetic disk drive reads magnetic disks, and an optical drive reads optical disks. Disk drives can be either internal (housed within the computer) or external (housed in a separate box that connects to the computer). Disk drives can be either internal (housed within the computer) or external (housed in a separate box that connects to the computer).7)removable disktype of disk drive in which hard disks are enclosed in plastic or metal cartridges so that they can be removed like floppy disks. Removable disk drives combine the best aspects of hard and floppy disks. They are nearly as capacious and fast as hard disks and have the portability of floppy disks. Their biggest drawback is that they're relatively expensive.8)serial portA port, or interface, that can be used for serial communication, in which only 1 bit is transmitted at a time. A serial port is a general-purpose interface that can be used for almost any type of device, including modems, mice, and printers (although most printers are connected to a parallel port).9)parallel portA parallel interface for connecting an external device such as a printer. Most personalcomputers have both a parallel port and at least one serial port.10)Pseudocode (derived from pseudo and code) is a compact and informal high-level description of a computer programming algorithm that uses the structural conventions of some programming language, but typically omits details that are not essential for the understanding of the algorithm, such as subroutines, variable declarations and system-specific code.11)2.5 Using Function KeysYour computer has 12 function keys, F1 through F12. The functions assigned to these keys differ for each application. You should refer to you software documentation to find out how these keys are used.The [FN] key provides extended functions for the notebook and is always used inconjunction with another key.Fn+F1 SleepThis function will put the E1245 notebook into sleep mode. The LCD will switch off and devices will switch to lower power mode.Fn+F2 Fan ControlThis function will enable or disable the Silent Fan function . This will enable the user to put the fan into quiet mode if the user needs the notebook o be quieter.Fn+F3 Mute V olumeThis function will mute the volume control in Windows and all sound output from the speakers will stop. Pressing this combination again will enable sound output.Fn+F4 LCD/Display-Out SwitchThis function will switch the display configuration for the E1425 -It will cycle between 3 modes depending on operation system settings. These 3 Modes are:LCD Only-Image on the E1425 LCDDisplay Only-Image on external monitorLCD+Display-Image on LCD and external monitor12)课本P89 EX.5 把下列短文翻译成中文。
网络管理员-计算机专业英语(一)
网络管理员-计算机专业英语(一)(总分:30.00,做题时间:90分钟)一、单项选择题(总题数:6,分数:30.00)Each machine supporting TCP has a TCP transport entity, either a library procedure, a user process, or part of the kernel. In all case, it manages TCP streams and (1) to the IP layer. A TCP (2) Accepts user date streams from local process, breaks them into pieces not exceeding 64KB, and sends each piece as a separate IP (3) .When datagrams containing TCP date arrive at a machine, they are given to the TCP entity, which reconstructs the original byte streams.The IP layer gives no guarantee that datagrams will be delivered properly, so it is up to TCP to time out and (4) them as need be. Datagrams do arrive may well do so in the wrong order, it is also up to TCP to (5) them into messages in the proper sequence.(分数:5.00)(1).A. calls B. interfaces C. links D. produces(分数:1.00)A.B. √C.D.解析:(2).A. connection B. file C. entity D. destination(分数:1.00)A.B.C. √D.解析:(3).A. dategram B. stream C. connection D. transaction(分数:1.00)A. √B.C.D.解析:(4).A. reassemble B. reduce C. re-create D. retransmit(分数:1.00)A.B.C.D. √解析:(5).A. reassemble B. reduce C. re-create D. retransmit(分数:1.00)A. √B.C.D.解析:[解析] 每一种支持TCP的机器都有一个TCP传输实体,或一个库过程,或一个用户进程,或者是一个内核的一部分。
计算机专业英语试题含答案
计算机专业英语试题2 Ⅰ. Vocabulary(词汇)(30分) (写出下列词组的汉语。
)(共10分,每题1分) (一).Translate the following words and expressions into Chinese1.operating system 2.white box testing 3.hard disk 4.management information system 5.electronic commerce 6.relational database 7.software engineering 8. software maintenance 9. menu bar 10.network security (根据汉语写出相应的英语缩写。
) (共10分,每(二).Fill in the blanks with the corresponding English abbreviations.题1分) 1.只读存储器 2.广域网 3.传输控制协议 4.文件传送[输]协议 5.通用串行总线 6.面向对象编程 7.集成开发环境 8.结构化查询语言 9.数据库管理系统 10.开放系统互连.开放系统互连(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. application software a. 音频音频2. machine language b. 应用软件应用软件3. structured programming c. 机器语言机器语言4. functional testing d. 软件测试软件测试5. memory e. 结构化程序设计结构化程序设计6. relational database f. f. 内存内存7. firewall g. 功能测试功能测试8. software testing h. 关系数据库9. hacker i. 黑客黑客10. audio j. 防火墙防火墙1. 6. 2. 7. toolbar ruler title bar menu bar incorporate intoIf you want to solve the computational problem with a computer, you should learn how to 2. Computer programming is the process of planning and creating a sequence of for a computer to 2. Computer programming is the process of planning and creating a sequence of for a computer to3. The term coder is used to describe . 4. In order to solve a computational problem, you can let a person or a to do it. Passage C The Internet, then known as ARPANET, was brought online in 1969, which initially connected four major computers at universities in the southwestern US . The early Internet was used by computer experts , engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personal computers in those days, and anyone who used whether a computer professional or an engineer or scientist or librarian, had to learn to use a very complex system. The Internet matured in the 1970's as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and te were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today' s standa by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources. In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network. Since the Internet was initially funded by the government, it was originally limited to research, education, and governme uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 1990's, when independent commercial networks began to grow. (四) Choose the best answer according to Passage C.(根据上文的内容选择正确的答案。
计算机专业英语作业(1)
计算机专业英语作业(1)一、Translate the following sentences into English or Chinese.1.计算机2.多媒体3.硬件4.软件5.输入设备6.存储器7.外部设备8.处理器9.鼠标10.语音识别11.扫描仪12.寄存器13.Arithmetic and logic unit 14.Binary form15.Control unit 16.Instruction cycle17.Execution cycle 18.Central processing unit 19.Universal serial bus 20.Universal parallel bus二、For each of the following blanks, four choices are given. Choose the most appropriate one.1.A personal computer keyboard includes .a.a typewriter layout and a set of arrow keysb.a numeric keypadC.a Set of function keysd.a11 of above2.A display is a device that is used to display .a.numbers letters b.special charactersc. graphic information d.all of above3.system software includes and .a.operating system and application softwareb.operating system and programming languagec.special—purpose programs and application softwared.OS and special—purpose programs4.Information flows from a computer into a peripheral device as .a.output b.memory c.a program d.input 5.programs are known collectively as .a.secondary storage b.softwarec.stored programs d.hardware6.which is not common feature of most application software?a.menus b.toolbars c.insertion point d.alignment 7.Main memory holds .a.data for processing b.the programc.information d.all of above8.The number of bits that can be Processed at one time is aa.register b.cycle c.word d.PROM 9.Data and instructions are stored in memory at location known asa.address b.byte c.word d.number 10.The central processing unit (CPU) had two parts: and .a.control unit and ALU b.ALU and registerc.register and control unit d.ALU and memory11.A holds enough bits to store a single character.a.word b.bit c.byte d.two bytes 12.A location in memory is accessed by its .a.address b.content c.value d.digit 13.Which is not the actor that some microcomputer are more powerful than others .a.Speed b.capacity c.flexibility d.application 14.The CPU has two main parts 。
计算机专业英语试题及答案
计算机专业英语试题及答案1. 选择题1. Which of the following is not a programming language?a) Javab) HTMLc) Pythond) CSS答案: b) HTML2. Which protocol is used for sending and receiving email?a) HTTPSb) FTPc) SMTPd) DNS答案: c) SMTP3. What does the acronym CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Power Unit答案: a) Central Processing Unit4. Which programming language is commonly used for web development?a) C++b) Javac) JavaScriptd) Swift答案: c) JavaScript5. What does HTML stand for?a) Hyperlinks and Text Markup Languageb) Hyper Text Markup Languagec) Home Tool Markup Languaged) Hyper Text Modeling Language答案: b) Hyper Text Markup Language2. 填空题1. The process of converting high-level programming code into machine code is called ___________.答案: compilation2. HTTP stands for ___________ Transfer Protocol.答案: Hyper Text3. The process of testing software by executing it is called ___________.答案: debugging4. Java is an object-_____________ programming language.答案: oriented5. DNS stands for Domain Name ___________.答案: System3. 简答题1. What is the difference between TCP and UDP?答案: TCP (Transmission Control Protocol) is a connection-oriented protocol, which means it establishes a connection between the sender and receiver before transferring data. It ensures that all packets are received in the correct order and provides error checking. UDP (User Datagram Protocol), on the other hand, is a connectionless protocol that does not establish a direct connection before transmitting data. It does not guarantee packet delivery or order but is faster and more efficient for time-sensitive applications.2. What is the purpose of an operating system?答案: An operating system (OS) is a software that manages computer hardware and software resources and provides common services forcomputer programs. Its primary purpose is to enable the user to interact with the computer and provide a platform for running applications. It manages memory, file systems, input/output devices, and multitasking. The OS also handles system security and resource allocation to ensure optimal performance.4. 解答题请参考下文并给出自己的解答。
计算机专业英语作业和答案解析
计算机专业英语作业答案(供参考)计算机专业英语作业1第1-3章作业一.Vocabulary( 词汇)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)1.central processing unit(CPU)中央处理器 2.title bar 标题栏3.operating system 操作系统 4.personal computer 个人计算机5.menu bar 菜单栏 6.desk publishing 桌面排版7.electronic spreadsheet 电子表格 8.hard disk 硬盘9.database 数据库 10.Cursor 光标(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
)1.随机存储器 RAM 2.只读存储器 ROM3.传输控制协议 TC P 4.数字视频光盘 DVD5.通用串行总线 USB 6.计算机辅助设计 CAD7.计算机辅助制造 CAM 8.中央处理器 CPU(三).Translate the following Chinese into English.(根据汉语写出相应的英语。
)1.键盘 keybord 2.鼠标 mouse 3.扫描仪 scanner4.打印机 printer 5.输入 input 6.输出 output7.显示器 monitor 8.存储器 storage 9.数据库 database10.操作系统 operating system 11.应用软件 application software 12.字处理器 word processor 13.网络浏览器 web browser二.Tell whether the following statements are true(T) or false(F).(判断正误。
电大-计算机专业英语
计算机专业英语作业答案(供参考)计算机专业英语作业1第1-3章作业一.Vocabulary( 词汇)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)1.central processing unit(CPU)中央处理器 2.title bar 标题栏3.operating system 操作系统4.personal computer 个人计算机5.menu bar 菜单栏6.desk publishing 桌面排版7.electronic spreadsheet 电子表格8.hard disk 硬盘9.database 数据库10.Cursor 光标(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
)1.随机存储器RAM 2.只读存储器ROM3.传输控制协议TC P 4.数字视频光盘DVD5.通用串行总线USB 6.计算机辅助设计CAD7.计算机辅助制造CAM 8.中央处理器CPU(三).Translate the following Chinese into English.(根据汉语写出相应的英语。
)1.键盘keybord 2.鼠标mouse 3.扫描仪scanner4.打印机printer 5.输入input 6.输出output7.显示器monitor 8.存储器storage 9.数据库database10.操作系统operating system 11.应用软件application software12.字处理器word processor 13.网络浏览器web browser二.Tell whether the following statements are true(T) or false(F).(判断正误。
计算机专业英语作业
计算机专业英语作业:1、请将视频“什么是电脑硬件”中所述内容用英文表示。
For most people, computers are becoming a part of real life, the film will help you konw how it works. Their interior looks very complicated, but if the decomposition of parts, you will see a simple side of computers , This is《computer hardware in Plaining English 》,you see them, they are coming all shapes and sizes,but its work in some ways. In fact, if you can see their internals of computers, You will find that they all have the basic parts,the haddwares,do large part of the works in the computers.to explan,let’s look at some things you know ,like a house.what a great thing in the house is you have full space to put all the iterms.in fact ,many houses have basements.The basement is a good place to store debris.Basement, the more you can store.The same principle applies to computers.We need not boxes and bicycles, but photos, music, documents and plete this task in the computer hard drive rather than in the basement, a computer hard drive, holds all your files will be used later, like basements, like the larger hard drive, the more things you can store. Basement is not perfect, going to the basement to take the things you need to spend much time, maybe put a cupboard on the ground floor can help you solve this problem, you can quickly get the items you want, although the cabinet can not put too many items, at least you do not always go to the basement, in the computer too, The computer can not quickly access to the data stored in the hard disk, because the computer go a long way to gain access to the hard disk data. In the computer memory (RAM) is like a cupboard, RAM's full name is called [random access memory], which allows the computer to access data more quickly and, of course, it also means that the operation of RAM to make your computer faster , but this cupboard (RAM) has a drawback, the memory will be cleared of stored data When every time you restart, of course, to make the house a variety of household appliances can operate at the appropriate time, you must have an Explorer to help you manage these appliances, if the weather is too hot , you maybe need to open the air conditioner to adjust the temperature, when it is dark, you need to turn on the lights. Computers, too, must have a bit Explorer to ensure that all other parts are functioning properly, the Explorer is the processor (CPU), small size of the processor, like a computer exclusive (in charge), it will send and receive information and to assist the software to complete the work. The faster the processor, the faster execution speed of the computer would be, so, let us revisit. Hard drive, like a basement, it can store the information you need. Memory, like a cupboard, which can increase data access speed. Processor, like the Field Explorer, always able to complete the work that we deliver, but also to ensure the normal operation of the various parts. Next time, when you use the computer, think about plain English in the host computer's computer hardware what happened, the various parts of computer hardware complement each other, to help you do all the things I Common Craft's Lee LeFever, "Computer hardware of Plaining English "The film recorded by me, if you need a higher quality video, or need to use the authorization of the film, please contact me website.2、请将以下英文翻译为中文。
《计算机专业英语》第01章在线测试(汇编)
《计算机专业英语》第01章在线测试《计算机专业英语》第01章在线测试 剩余时间: 59:22答题须知:1、本卷满分20分。
2、答完题后,请一定要单击下面的“交卷”按钮交卷,否则无法记录本试卷的成绩。
3、在交卷之前,不要刷新本网页,否则你的答题结果将会被清空。
第一题、单项选择题(每题1分,5道题共5分)1、After I finished the last paragraph, I moved the ________ back to the third paragraph and del _etedA 、iconB 、mouseC 、joystickD 、cursor2、These days it is not uncommon for one to see people using ________ everywhere--even on airplanes.A 、laptopsB 、desktopsC 、minicomputersD 、microcomputers3、Just a minute, I ’m waiting for the computer to ________ up. It won ’t take long to st art it.A 、activateB 、scrollC 、bootD 、log4、what does " neural network " mean?A 、精神网B 、自然网络C 、神经网络D 、社会网络5、how to translate the word "中央处理器"A 、central processing unitB 、central progress unitC 、central process unitD 、第二题、多项选择题(每题2分,5道题共10分)1、A digital computer is generally made up of five dstinct elements: a central processing unit,().A 、input devicesB、memeory storage devicesC、output devicesD、a busE、crt screen2、According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are __________________.A、microcomputersB、workstationC、lenovoD、mainframesE、note bookF、minicomputers3、One of trends in computer development is _________,the effort to compress more circui t elements into smaller and smaller ______spaceA、microminiaturizationB、micromoduleC、chipD、chat4、We can define a computer as a device that ______________________A、accepts inputB、deal everythingC、processes dataD、stores dataE、produces output5、A program is a sequence of ________ that can be executed by a computer.It can eitherbe built into the hardware or exist independently in the form of ________.A、instructionsB、dataC、hardwareD、software第三题、判断题(每题1分,5道题共5分)1、Computers cannot work without the instructions sets.正确错误2、Computer is able to do different kinds of tasks.正确错误3、There are no differences between the information processor and human (人类的) nervous system.正确错误4、In the future, computers are capable of original thoughts.正确错误5、Information can be input only by people.正确错误。
计算机专业英语大作业
网址一:/hub/save-computer-from-Hackers网址二:/hub/What-is-Phishing姓名:**学号:************分校:通州(一)原文1.What is Computer Hacking?Computer hacking is a malicious act, so it is important for your computer and data to protect from Hacking. Computer Hacking refers to the process of making malicious modifications to a software or hardware to accomplish an aim outside the original creator's objective. Hackers are usually expert programmers who usually see hacking as a real life application of their skills.Hacking has become a nuisance in recent times and the protection from hacking has become more complex. Infact, the hackers have become so good that even the software giants are feeling a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years.Well, the Giants are not the only targets of these hackers, even common individuals are not safe. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities. They can get to your secrets and destroy your credit. The dangers are possibly endless.How to protect from HackingPrevention is Better Than Cure. The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system. Here, I am going to introduce some basic tips to save your computer and data from hackers.Using Antivirus SoftwareAntivirus software are one of the basic tools for your data and computer to protect from hacking. Antivirus software act as a protecting net that catches any potential threat before it reaches your system. They can prevent unauthorized access to your computer, protects your system from viruses and cloaks your data ports from intruders searching for any opening. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities.Nowadays anti virus software are completely automated. Go for the best when choosing anti virus software and make sure that you scan your system for viruses atleast once a week. Norton antivirus from Symantecis one of the leading products in the industry. Avastis another great antivirus tool to protect from hacking.Using FirewallWhat is a Firewall?A firewall is a set of programs located at the network gateway server which protects a private network from unauthorized access from other networks. The term firewall is originally referred to a wall intended to confine a fire.A firewall protects your computer from offensive websites and potential hackers. It keeps your data and information safe from unwanted intruders. Firewalls are designed to prevent unauthorized access to your network, much like a locked door.Thus firewall is a vital tool for your strategy against hackers so don't forget to set up one for your system. Microsoft has a built-in firewall software but you can also try the Symantec firewall.Using Anti Spyware SoftwareWhat is a Spyware?A spyware is a self installing software which secretly gathers information about a person's computing activities such as surfing habits and viewed sites. Spywares are truly a hacker's tool, not only collecting personal information but also interfering with user control by installing additional software and redirecting web browsers.Anti spyware software are designed to save your computer from hackers. They not only protect your computer by detection and removal of spywares but also preventing automatic installation of these malicious programs. Spysweeperis a great anti spyware software to guarantee a spyware free computer.Email SecurityEmail is one of the leading hacker's tools. Hackers use emails to transmit malicious software to your computer. Emails are usually very cheap which gives the hackers loads of opportunities. One of the basic tips to prevent hacking is to be extra careful with emails. The most important tip is that you should never hand out your real email address to a stranger. Never open an email arriving from an unknown source and never try to open an attachment with an email if you don't know the sender. Aviraantivirus is a useful tool to filter your emails for potential threats as well as provide premium protection for your computer.Software updatesHackers are always searching for security gaps in your system. Anti virus and anti spyware software usually lose their effectiveness with time as new and more advanced malicious programs are created by hackers.Its important to go for the latest security software in the market to guaranteemaximum security from threats. Make sure you frequently check out for software updates or set your software to update automatically.Internet SecurityBeing extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system. A great way to save yourself from hackers is to avoid visiting hacker controlled sites usually committed to porn, free downloads and online gaming. Also be extra careful while downloading something from an unknown source. Never ignore a security warning about a site. Its better to be safe than sorry.Educate YourselfWhen working for an offensive against hackers, the most important step is to educate yourself. Hacking is a dynamic topic with developments arising every moment. Hackers are intelligent and innovative and you should be prepared for it.Computers are vulnerable. No matter what you do, its impossible to be 100% save. Important data like personal detail and credit card information should never be saved directly on a computer. A password protector is a great way to protect this data.Another great way to secure your computer is to use a password on your computer. Well, it can't really save you if your computer gets stolen (in case of a laptop) but can save you from unauthorized people who can reach to your computer.Windows updateMicrosoft Windows is the best OS which comes with almost all the tools to protect you and your computer from hacking. To make the most of this, it is important to keep your windows updated. An easy way to do this is by checking for updates at Microsoft Windows Update. You can also set your windows security software to check for updates automatically so you don't miss anything. ...2. What is a Phishing Attack?Identity theft has become the new white collar crime and it has grown tremendously. Criminals that steal identities use them in a number of ways. One of the most common tricks is to use a stolen identity to open a line of credit. The line of credit is then depleted by the thief and the actual person receives the bill. Identities are also stolen for malicious intent, such as stealing a military officer’s email credentials in hopes of carrying out fictitious orders to troops.Phishing is a relatively new term to describe ploys used by criminals trying to steal identities. Phishing scams are on the rise:"During 2004, close to 2 million U. S. citizens had their checking accounts raided by cyber-criminals. With the average reported loss per incident estimated at $1200, total losses were close to $2 billion. The incidence of phishing e-mails―e-mails thatattempt to steal a consumer’s user name and password by imitating e-mail from a legitimate financial institution –has risen 4,000 percent over the past six months."•What is Phishing VideoThe term “phishing” is based on the term “fishing”. With fishing you bait a hook and try to catch fish. If you do not receive a bite, you often change the type of bait until you start catching fish. With phishing, the bait is typically an email that appears legitimate. The email typically asks for a bank customer to validate their information, however, the email redirects the customer to a fictitious bank site made to look like the legitimate bank site (James, 2005). The criminals hope the customer will not notice the redirected bank site is fictitious and that they will validate their account information. There are numerous phishing emails used as bait and criminals hope the more bait they use, the greater chances someone will fall for the scam.The key to preventing identity theft is awareness. Financial institutions typically do not ask for account information validation. Any emails that ask for account validation or social security numbers, should be validated. The link contained within the email can be checked for legitimacy. These links often go to bogus sites that can easily be determined by the website link. For example, if you bank at and you receive an email that has a link and takes you to .customer.cz, this should raise suspicion. Phishing scams not only use email, but the telephone is also used. A typical scam involves a telephone call with someone impersonating your credit card company and asking you to validate your social security number, date of birth, etc. Credit card companies already have this information and do not need you to validate it. A simple line of defense is to ask the caller for the credit card company’s number and call them back。
计算机专业英语测试题及答案
计算机专业英语测试题一、词汇测试题(每小题1分,共20分)(一).Translate the following words and expressions into Chinese (共10分,每题1分)1.Cyber cafe2.microcomputer3.ROM4.Object-oriented programming5.utility program6.system specification7.database administrator8.modulator-demodulator9.client/server model10.spreadsheet program(二).Translate the following terms or phrases from Chinese into English (共10分,每题1分)1.中央处理器2.广域网3.超级计算机4.电子商务5.计算机安全6.计算机文化7.网站8.域名9.数据库管理系统10.软件工程二、完型填空题(每空1分,共20分)Fill in each of the blanks with one of the words given in the list following each paragraph, making changes if necessary:1. Computer hardware is the involved in the ofa computer and consists of the that can be physically handled. The function of these components is typically divided into three main categories: , , and . Components in these categories connect to , specifically, the computer’s central unit (CPU), the electronic that provides the computational ability and control of the computer, via wires or circuitry called bus.microprocessors component processing functionoutput equipment input circuitry storage2.In the relational model, data is organized in two-dimensionalcalled . There is no or structure imposed on the data. The tables or relations are, however, related to each other. The database management system (RDBMS) the data so that its external is a of relation or tables. This does not mean that data is stored as tables: the physical of the data is independent of the way in which the is logically organized.hierarchical set organize relational relationdata storage view network table三、英译汉题(每题10分,共20分)Translate the following passage from English into Chinese:1.The field of computer science has grown rapidly since the1950s due to the increase in their use. Computer programs have undergone many changes during this time in response to user need and advances in technology. Newer ideas in computing such as parallel computing, distributedcomputing, and artificial intelligence, have radically altered the traditional concepts that once determined program form and function. In parallel computing parts of a problem are worked on simultaneously by different processors, and this speed up the solution of the problem. Another type of parallel computing called distributed computing use CPUs from many interconnected computers to solve problems.Research into artificial intelligence (AI) has led to several other new styles of programming.2.High-level languages are commonly classified asprocedure-oriented, functional, objected-oriented, logic languages. The most common high-level languages today are procedure-oriented languages. In these languages, one or more related blocks of statements that perform some complete function are grouped together into a program module, or procedure, and given a name such as “procedure A”. If the same sequence of operations is needed elsewhere in the program, a simple statement can be used to refer back to the procedure. In essence, a procedure is just a mini-program. A large program can be constructed by grouping together procedures that perform different tasks.四、汉译英题(20分)最著名的互联网例子是因特网。
计算机专业英语1
计算机专业英语1210分Hard disk drives , floppy disk drives and _______drives serve as both input and output.magnetic正确答案:D310分A general purpose computer has four main components: the arithmetic logic unit (ALU),_______, the memory, and the input and output devices (collectively termed I/O).正确答案:A410分One means by which this is done is with a special signal called an _______ which can periodically cause the computer to stop executing instructions where it was and do something else instead.正确答案:C510分Some computers are designed to_________ their work across several CPUS in a multiprocessing configuration.正确答案:A⼆、阅读理解共1题,50分150分A general purpose computer has four main components: the arithmetic logic unit (ALU), the control unit, the memory, and the input and output devices (collectively termed I/O). These parts are interconnected by buses, often made of groups of wires. Inside each of these parts are trillions of small electrical circuits which can be turned off or on by means of an electronic switch. Each circuit represents a bit (binary digit) of information so that when the circuit is on it represents a “1”, and when off it represents a “0” (in positive logic representation). The Circuits are arranged in logic gates so that one or more of the circuits may control the state of one or more of the other circuits.The control unit, ALU, registers, and basic I/O (and often other hardware closely linked with these) are collectively known as a central processing unit (CPU). Early CPUs were composed of many separate components but since the mid-1970s CUPs have typically been constructed on a single integrated circuit called a microprocessor.The control unit (often called a control system or central controller) manages the computer’s various components; it reads and interprets, (decodes) the program instructions, transforming them into a series of control signals which activate other parts of the computer. Control systems in advanced computers may change the order ofsome instructions so as to improve performance.(1)、A general purpose computer has four main components: the arithmetic logic unit, the control unit, ________, and the input and output devices.正确答案:B(2)、If the circuit is on, it represents a ________(in positive logic representatio n).正确答案:A(3)、The central processing unit is composed of ________ components.正确答案:C(4)、the control unit can not _________.the program instructions.the program instructions into a series of contr ol signals.the program instructions.正确答案:C(5)、The control unit is called _________.central systemCPUcontrol circuit正确答案:D。
计算机专业英语(第1次考试)
A、A. must be
B、B. must have been
C、C. should be
D、D. should have been
15、The data, when they are not encrypted, are called ( ).(1分)
考试课程:9025.计算机专业英语(第1次考试)考试时间:120分钟考场:123.15.57.119考试日期:2014-10-16
考号:13001184007姓名:曾渭权
剩余时间:
18:42
保存交卷帮助
窗体顶端
本卷共有3大题。
窗体底端
一、单项选择题(15道小题,共15分)
1、( )is a word processing tool that helps you to create quality documents.(1分)
A、CLR
B、CORB~A
C、OMG
D、IIS
4、( ) refers to the parts of the computer that you can see and touch.(1分)
A、Software
B、Hardware
C、Hardship
D、Instruction
5、how to translate the word "中央处理器"(1分)
A、plaintext
B、ciphertext
C、hypertext
D、context
二、多项选择题(15道小题,共45分)
1、There are AB( ) between the DTEs.(3分)
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
计算机专业英语作业(1一、Translate the following sentences into English or Chinese.1.计算机2.多媒体3.硬件4.软件5.输入设备6.存储器7.外部设备8.处理器9.鼠标10.语音识别11.扫描仪12.寄存器13.Arithmetic and logic unit 14.Binary form15.Control unit 16.Instruction cycle17.Execution cycle 18.Central processing unit19.Universal serial bus 20.Universal parallel bus二、For each of the following blanks, four choices are given. Choose the most appropriate one.1.A personal computer keyboard includes .a.a typewriter layout and a set of arrow keysb.a numeric keypadC.a Set of function keysd.a11 of above2.A display is a device that is used to display .a.numbers lettersb.special charactersc. graphic informationd.all of above3.system software includes and .a.operating system and application softwareb.operating system and programming languagec.special—purpose programs and application softwared.OS and special—purpose programsrmation flows from a computer into a peripheral device as .a.outputb.memoryc.a programd.input5.programs are known collectively as .a.secondary storageb.softwarec.stored programsd.hardware6.which is not common feature of most application software?a.menusb.toolbarsc.insertion pointd.alignment7.Main memory holds .a.data for processingb.the programrmationd.all of above8.The number of bits that can be Processed at one time is aa.registerb.cyclec.wordd.PROM9.Data and instructions are stored in memory at location known asa.addressb.bytec.wordd.number10.The central processing unit (CPU had two parts: and .a.control unit and ALUb.ALU and registerc.register and control unitd.ALU and memory11.A holds enough bits to store a single character.a.wordb.bitc.byted.two bytes12.A location in memory is accessed by its .a.addressb.contentc.valued.digit13.Which is not the actor that some microcomputer are more powerful than others .a.Speedb.capacityc.flexibilityd.application14.The CPU has two main parts 。
a.the control unit and registerb.the control unit and the arithmetic/logic unitb.the arithmetic/logic unit and registerd.the register and bus15.In machine language, data and instructions are represented 。
a.in hexadecimal formb.in decimal formc.in binary formd.in octal form16.Data flow into the computer as 。
a.outputb.a processc.a programd.input17.The physical components of a computer are collectively called 。
a.peripheralsb.boardsc.softwared.hardware18.Inside a computer, characters are represented by 。
a.a binary codeb.registersc.wordsd.positional values三、Translate the following sentences into Chinese.As to the question“What is the most important component in a computer?”,nobody wou1d fail to give a correct answer to it—the processor.But when the questions move to the details of it,most of us might not have a clear picture.A processor a component of a computer,is a functional unit that interprets and carries out instructions.Every processor comes with a unique set of operations such as ADD,STORE, or LOAD that represent the processor’s instruction puter designers are fond of calling their computers machines,so the instruction set is sometimes referred to as machine instructions and the binary language in which they are written iscalled machine language. You should not confuse processor’s instruction set with the instructions found in high—level programming languages,such as BASIC or PASCAL.An instruction is made up of operations that specify the function to be performed and operands that represent the data to be operated on.For example,if an instruction is to perform the operation of adding two numbers,it must know what the two numbers are and where the two numbers are.When the numbers are stored in the computer’s memory,they have an address to indicate where they are, so if an operand refers to data in the computer’s memory it is called an address.The processor’s job is to retrieve instructions and operands from memory and to perform each operation.Having done that,it signals memory to send it the next instruction.This step-by-step operation is repeated over and over again at awesome speed.A timercalled a clock releases precisely timed electrical signals that provide a regular pulse for the processor’s work.The term that is used to measure the comput er’s speed is borrowed from the domain of electrical engineering and is called a megahertz(MHz,which means million cycles per second.A processor is composed of two functional units——a control unit and an arithmetic/logic unit——and a set of special work spaces called registers.。