计算机英语考试题库
计算机专业英语_考试题目
----------------------------精品word 文档 值得下载 值得拥有---------------------------------------------- 一、词汇(一)Translate the following words or expressions into Chinese.1.Central Processing Unit 中央处理单元2.relational database 关系数据库 3.software crisis 软件危机 4.feasibility analysis 可行性分析5.electronic commerce 电子商务6.reference element 参考元素9.object-oriented language 面向对象的语言13.assembly language 汇编语言14.standardize 使标准化17.embedded system 嵌入式系统----------------------------精品word 文档 值得下载 值得拥有----------------------------------------------20.gray scale 灰度 (二) Fill in the blanks with the corresponding English abbreviations. (根据汉语写出相应的英语缩写。
)1.随机存储器 RAM2.广域网 WAN3.超文本标记语言 HTML4.文件传输协议 FTP5.液晶显示器 LCD6.结构化查询语言SQL7.磁盘操作系统 DOS8.电子公告板系统 BBS(三) Translate the following English abbreviations into Chinese. (根据英语缩写写出相应的中文意思。
)1.USB 通用串行总线 3.AI 人工智能4.HDD 硬盘驱动器5.DNS 域名服务器6.IE 网页浏览器8.PPP 点对点通信协议 9.SMTP 简单邮件传输协议10.WWW 万维网二、 匹配1、portability J A 、半兼容的2、ROM D B 、客户服务器模式3、carrier signal G C 、数据库管理信息系统4、protocol F D 、只读存储器5、CSS H E 、综合业务数字网6、proxy server N F 、协议7、computer aided design S G 、载波信号8、semi-compatible A H 、层次式样表9、SCSI O I、性能影响10、URL(uniform resource locator) M J、可移植性11、performance hit I K、超文本传输协议12、CP/M R L、局域网13、ISP T M、统一资源定位器14、CLI(Command Language Interpreter)Q N、代理服务器15、hypertext document P O、小型计算机系统接口16、LAN L P、超文本文档17、database management system C Q、命令语言解释程序18、HTTP K R、微机控制程序19、ISDN E S、计算机辅助设计20、client server B T、网络服务提供者三、英文解释(此题仅供参考)In this section, there are 15 sentences which are the English words explanation. You are required to read it carefully, then choose the proper word corresponding with the explanation。
计算机英语考试题目及答案
计算机英语考试题目及答案一、选择题1. What does HTML stand for?a) Hyper Text Markup Languageb) High Technology Multimedia Languagec) Home Tool Management Languaged) Human Token Marker Language答案:a) Hyper Text Markup Language2. Which of the following is not a programming language?a) Javab) Pythonc) HTMLd) C++答案:c) HTML3. What is the purpose of CSS?a) To add interactivity to web pagesb) To structure the content of web pagesc) To define the layout and style of web pagesd) To create dynamic web pages答案:c) To define the layout and style of web pages4. What is the function of a router in a computer network?a) To connect computers to the internetb) To store and manage data on a networkc) To protect the network from security threatsd) To direct network traffic between devices答案:d) To direct network traffic between devices5. Which of the following is a commonly used database management system?a) Microsoft Wordb) Adobe Photoshopc) MySQLd) Windows Media Player答案:c) MySQL二、填空题1. The process of converting source code into machine code is called ________.答案:compilation2. The most widely used programming language for web development is ________.答案:JavaScript3. TCP/IP stands for ________.答案:Transmission Control Protocol/Internet Protocol4. The physical components of a computer are referred to as ________.答案:hardware5. SQL stands for ________.答案:Structured Query Language三、简答题1. What are the advantages of using cloud computing?答案:Cloud computing offers several advantages, including:- Cost savings: Companies can reduce their infrastructure costs by using cloud services instead of maintaining their own hardware.- Scalability: Cloud services can easily scale up or down based on demand, allowing businesses to only pay for what they need.- Flexibility: Users can access cloud services from anywhere with an internet connection, enabling remote work and collaboration.- Disaster recovery: Cloud providers often have backup systems in place, ensuring data can be recovered in case of a disaster.- Automatic updates: Cloud services are typically updated regularly by the provider, ensuring users have access to the latest features and security patches.2. Explain the difference between HTTP and HTTPS.答案:HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is not secure, meaning that the data being transmitted can be intercepted and read by anyone. HTTPS (Hypertext Transfer Protocol Secure), on the other hand, is a secure version of HTTP. It uses encryption to ensure that data is encrypted before transmission, making it much more difficult for hackers to intercept and read. HTTPS is commonly used for secure online transactions, such as submitting credit card information or personal details.四、编程题请编写一个Python程序,实现计算圆的面积和周长的功能。
计算机专业英语试题题库
计算机专业英语试题题库2009-06-16 16:02Data is a collection of un-organized facts, which can include words, numbers, images, and sounds. 数据是未经组织的事实的集合,数据可以包括单词,数字,图像和声音.A computer consists of a variety of hardware components that work together with software to perform calculations(计算), organize data, and communicate with other computer. 计算机由许多硬件部件构成,这些硬件与软件一起工作,以便执行计算,组织数据及与其他计算机通信的任务.These hardware components include input devices, output devices, a system unit, storage devices, and communications devices.硬件部件包括输入设备,输出设备,系统单元,存储设备和通信设备.An input device allows a user to enter data and commands into the memory of a computer.输入设备让用户向计算机存储器输入数据和命令.Storage differs from memory ,which can hold these items permanently(永久的),whereas memory holds these memory holds items only temporarily(暂时的)。
外存储器与内存储器不同,外存储器能永久保存数据而内存储器仅临时保存.A hard disk provides much greater storage capacity than a floppy disk.硬盘能比软盘提供更大的存储容量.Four common storage devices are a floppy disk drive, a hard disk drive, a CD-ROM drive, and a DVD-ROM drive.四种常用的外存设备分别是:软盘驱动器,硬盘驱动器,CD-ROM驱动器和DVD-ROM驱动器.The central processing unit (CPU), sometimes referred to as the processor, interprets (解释)and carries out the basic instructions that operate a computer.中央处理器(CPU)有时也称处理器,用来解释并执行基本的计算机操作指令.In the system unit, a computer’s memory stores data, instructions, and information. 在系统单元中,计算机的存储器存储数据,指令和信息.ROM(Read-Only Memory) is a memory chip that only can be read and used; that is , it cannot be modified(修改)。
计算机专业英语期末试题及答案A
信息工程学院学院计算机专业英语课程期末考试试卷 A一、Translate the following words and expressions into Chinese.写出下列词组汉语思10分每题1分1.bandwidth:2.browser:3mand button:4.Control Panel:5.data structure:6.fiber-optic table:7.hardcopy:8.hypermedia:9.information superhighway:10.high-level language:二、Match the following words and expressions in the left column with those similar meaning in the right column.将左列的词汇与右列相应的汉语匹配; 10分每题1分1.HTTP: a . 数据库管理系统2.ISP : b. 应用程序设计接口3.SQL : c . 基本输入/输出系统4.: d. 数字视频光盘5.DBMS:. e .互联网服务提供商6.BIOS: f . 中央处理单元7.API :g . 结构化查询语言8.DVD:. h .直接存储器存取9.DMA :i .超文本传输协议10.CPU :j .万维网三、Tell whether the following statements are trueT or falseF according to the passage A根据下文的内容判断下列句子的正误15分每题3分Passage A:For a Web user, the home page is the first Web page that is displayed after starting a Web browser like Netscape's Navigator or Microsoft's Internet Explorer. The browser is usually preset so that the home page is the first page of the browser manufacturer. However, you can set it to open to any Web site. For example, you can specify that http://.yahoo orhttp://.whatis be your home page. You can also specify that there be no homepage a blank space will be displayed in which case you choose the first page from your bookmark list or enter a Web address.For a Web site developer, a home page is the first page presented when a user selects a site on the World Wide Web. The usual address for a Web site is the home page address, although you can enter the address Uniform Resource Locator of any page and have that page sent to you.1. Home pages for a Web user or a Web site developer have the same meanings.2. The home page displayed on a Web browser is usually preset by the browser manufacturer.3. The home page for a Web user can be reset to any Web site you prefer.4. You have to enter or select Web addresses every time with a blank space on your Web browser.5. Web addresses usually lead to relative home pages.四、choose the best answer according to the passage B.根据下文的内容选择正确的答案; 15分每题3分Passage BIn order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer . If you want to solve the computational problem with a computer, you should learn how to program. The task of developing programs for the solution of computational problemsis referred to as programming. Computer programming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise . So programming is breaking a task down into small steps.Programming is sometimes contrasted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines of program text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others.What's actually involved in programming - the actual process of writing programs Here's a quick overview of the process:Write a program. · Compile the program. · Run theprogram. · Debug the program.· Repeat the whole process until the program is finished.1.If you want to solve the computational problem with a computer, you should learn how to .A. calculateB. programC. addD. subtract2. Computer programming is the process of planning and creating a sequence of for a computer to follow.A. stepsB. processC. linesD. graphics3. The term coder is used to describe .A. machineB. computerC. keyboardD. person4. In order to solve a computational problem, you can let a person or ato do it.A. machineB. computerC. keyboardD. mouse5. Which of the following is not the stages of programmingA. Write a program.B. Debug the program.C. Print the program.D. Compile the program.五、Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. 从下面方框中选择合适的词或表达,以其适当的形式填空;15分每题3分A. interfaceB. supportedC. retypingD. sectionsE. delete1. The great advantage of word processing over using a typewriter is that you can make changes without ____________the entire document.2. If you want to a ____________paragraph, you simply remove it, without leaving a trace.3. The ____________uses customizable toolbars, and the editing screen is a zoom-able draft mode that optionally displays headers, footnotes, and footers.4. Word processors also make it easy to move ___________of text from one place to another within a document, or between documents.5. Most standard word processing features are____________, including footnotes and mail-merge but no tables or columns.六、Translate the following sentences into Chinese.将下列句子翻译成汉语;35分1、2、3每题5分4、5每题10分1.To perform word processing, you need a computer, a special program called a word processor, and a printer.2.Microsoft Word is a powerful word processing application that will allow you, through simple keystroke and menu navigation, to create dynamic documents for work, school, or personal use.3.The ability to define macros allows you to save yourself a lot of time by replacing common combinations of keystrokes.4.由于声音和视频需要大量的数据,所以多媒体需要一个快的处理器速度;5. Microsoft Word是一款功能强大的字处理软件,通过简单的键盘输入以及菜单导航,你将能为工作、学习或者个人使用创建动态的文档A卷答案一、1.带宽 2.浏览器 3.命令按钮 4.高级语言 5.数据结构 6.光纤 7.硬拷贝 8.超媒体 9.信息高速公路 10. 控制面板二、1.i 2.e 3.g 4.j 5.a. 6.c 7.b 8.d 9.h 10. f三、1.F 2 .T 3.T 4.T 5.T四、1.B 2.A 3.D 4.B 5.C五、1.C 2. E 3.A 4. D 5. B六、1、为实现文字处理,需要一台计算机,一种称作文字处理器的专用软件,还有一台打印机;2、通过使用多媒体,公司发现它既节省开支又比其它培训员工的方法有效;;3、定义宏可以节省大量时间,因为宏取代了一些常用的键盘操作序列;4、Because of the large amount of data required for sound and video, multimedia requires a fast processor speed.5、By using a multimedia application, the company found it has saved expenses and trained employees more effectively than anything else it had tried.。
计算机英语考试试题以及答案
计算机英语考试试题以及答案一、词汇(选择一个最合适的词汇,将对应的英文字母填入空格内。
每题2分,共20分)1、__B__ is used to communicate with another computer over telephone lines.A. keyboardB. modemC. mouseD. printer2、__C__ is a device that enables the computer to handle sounds.A. network cardB. video cardC. sound cardD. monitor3、__A__ is a word processing tool that helps you to create quality documents.A. Word 2000B. Outlook 2000C. Access 2000D. Excel 20004、__D__ is a fast and powerful operating system, based on the UNIX O.S.A. Windows 2000B. Office 2000C. Windows 98D. Linux5、The OSI model has __D__ layers.A. fourB. fiveC. sixD. seven6、The purpose of the __A__ is to provide fully integrated analog services to users.A. ISDNB. WWWC. FTPD. HTTP7、Which one is not a computer languages? __A__A. word 2000B. PASCALC. CD. C++8、The __C__ turns the object file into an executable program.A. linkerB. compilerC. interpreterD. computer9、The RGB value is composed of__C __components.A. oneB. twoC. threeD. four10、Virus is a __A__ .A. programB. computerC. bad manD. beast二、语法单项选择题(每小题1.5分,共15分)1、With Windows, you can run several powerful applications at once and switch quickly __B__ them.A. betweenB. amongC. inD. on2、He doesnt mind __A__ her birthday party.A. being not invited toB. not to be invited toC. not being invited toD. not inviting to3、Only when you have told him __A__ take this book out of the library.A. can youB. would youC. you willD. you can4、Well go to Paris for our holiday, __D __it isnt too expensive.A. exceptB. providedC. so far asD. unless15、The prisoners request __B__ more and better food is now__B__ consideration(考虑).A. for, onB. for, underC. for, inD. for, into6、Mrs. Snow __B__ in the office for two years before she got a raise.A. have been workingB. had been workingC. has been workingD. was working7、The teacher has repeatedly reminded him __C__ it.A. ofB. forC. withD. to8、You went to the wrong shop .You ought __D__ to the shop next to the cinema.A. goB. to goC. have goneD. to have gone9、After __C__ my lessons I went to bed.A. reviewB. to reviewC. reviewingD. be reviewing10、 I find __A__ not so difficult to learn a foreign language.A. itB. thatC. theyD. which三、多选(每小题1.5分,共15分)1、Input devices include: __abcd__ .a. the keyboard c. the mouseb. touch screen d. microphone2、A processor is composed of: __abcd __.a. a control unit c. an arithmeticb. logic unit d. Registers3、The Windows 2000 product line includes __abcd __.a. Windows 2000 Professional c. Windows 2000 Advanced Serverb. Windows 2000 Server d. Windows 2000 Datacenter Server4、Windows 2000s advantages are lies in the sections that follow: __abcd__a. Active Directory c. Networkingb. Storage d. Enterprise Management5、C++ include the following pillars: __abcd__ .a. encapsulation c. inheritanceb. data hiding d. polymorphism6、The major functional components of an office automation system include: __abcd__ .a. text processing c. electronic mailb. information storage and retrievald. personal assistance features7、Static graphics include __cd__ .a. movies c. pictures2b. animators d. photographs8、The end equipment in a communication system includes __acd__a. computers c. CRTsb. DCE d. keyboards9、Applications in the Internet can be found everywhere: __abc__a. in libraries c. at homeb. in conference rooms d. at the moon10、Many viruses do harmful things such as __abcd__ .a. deleting files c. simulating typosb. changing random data on your disk d. slowing your PC down四、完形填空(选择一个最合适的答案,将对应的英文字母填入空格内。
计算机专业英语考试试题及答案
计算机专业英语考试试题及答案一、选择题1. Which of the following is NOT a programming language?A. JavaB. PythonC. HTMLD. CSS2. What does the acronym "SQL" stand for?A. Structured Query LanguageB. Simple Query LanguageC. Script Query LanguageD. Secure Query Language3. Which protocol is commonly used for sending and receiving emails?A. FTPB. HTTPC. SMTPD. TCP4. What does the term "CPU" refer to?A. Central Processing UnitB. Computer Processing UnitC. Central Program UnitD. Computer Program Unit5. Which of the following is NOT a type of network topology?A. StarB. RingC. MeshD. Scroll二、填空题1. HTML stands for Hypertext Markup Language, which is used for ____________.2. The process of converting source code into machine code is called ____________.3. IP address stands for ____________.4. The act of copying files from a remote server to a local computer is known as ____________.5. The programming language developed by Apple Inc. for iOS and macOS is ____________.三、简答题1. What is the difference between a compiler and an interpreter? Provide examples of programming languages that use each of these methods.2. Explain the concept of object-oriented programming (OOP) and provide an example of a programming language that utilizes this paradigm.3. Describe the client-server model and provide an example of a commonly used protocol within this model.四、论述题Discuss the impact of artificial intelligence (AI) on various industries. Provide examples of how AI is being used in fields such as healthcare, finance, and transportation. Analyze the potential benefits and challenges of implementing AI in these industries.答案:一、选择题1. C. HTML2. A. Structured Query Language3. C. SMTP4. A. Central Processing Unit5. D. Scroll二、填空题1. creating and structuring the content of a webpage2. compilation3. Internet Protocol4. downloading5. Swift三、简答题1. A compiler translates the entire source code into machine code before the program is executed. Examples of languages that use compilers are C, C++, and Java. On the other hand, an interpreter translates and executes the source code line by line. Python and Ruby are examples of languages that use interpreters.2. Object-oriented programming (OOP) is a programming paradigm that organizes data and functions into reusable objects. It focuses on the concept of classes and objects, allowing for code reuse and encapsulation. An example of a programming language that uses OOP is Java, where objects are instances of classes and can interact with each other through methods and attributes.3. The client-server model is a distributed computing architecture wherea server provides services or resources to multiple clients. The clients request and receive these resources through the network. An example of a commonly used protocol within this model is the Hypertext Transfer Protocol (HTTP), which is used for communication between web browsers (clients) and web servers.四、论述题Artificial intelligence (AI) has had a significant impact on various industries. In healthcare, AI is being used for diagnoses and treatments, analyzing medical images, and personalized medicine. For example, AI-powered algorithms can help detect diseases like cancer at an early stage, leading to better treatment outcomes. In finance, AI is utilized for fraud detection, algorithmic trading, and customer service. AI algorithms can analyze large amounts of financial data to identify patterns and make accurate predictions. In transportation, AI is being employed for autonomous vehicles, traffic management, and logistics optimization. Self-driving cars, for instance, use AI algorithms to navigate and make decisions on the road.The implementation of AI in these industries brings about many benefits, such as increased efficiency, improved accuracy, and cost savings. AI systems can process and analyze vast amounts of data much faster than humans, leading to faster and more accurate results. However, there are also challenges to consider. Privacy and security concerns arise as AI systems handle sensitive information. There is also the worry of job displacement, as AI automation may replace certain human tasks. Additionally, ethical considerations need to be addressed, such as bias in algorithms and the potential for AI to be used for malicious purposes.Overall, the impact of AI on various industries is undeniable. It has the potential to revolutionize healthcare, finance, transportation, and many other sectors. However, careful implementation and regulation are necessary to ensure its responsible and beneficial use.。
计算机专业英语—考试题库及答案
The raw data are stored on the disk using the .收藏A.DBAB.DBMSC.file systemD.data dictionary回答错误!正确答案:CA copy is a copy of a current file made in order t o protect against loss or damage. 收藏A.fileB.hardC.backupD.softWhich of the following is WRONG about Web 2.0?收藏A.The ideas of Web 2.0 was featured originally in late 2004.B.Web 2.0 enables business to embrace the Web as a platform and user its strengths more effectively.C.Web 2.0 enhances creativity, information sharing and collaboration among Web users.D.Web 2.0 changes the ways of software developers and end-users utilizing the web回答错误!正确答案:B is the model for .NET-based applications. (data access)收藏A.data processB.data accessC.data miningD.data achieveWhich of the following type of wireless devices has the highest po wer consumption? 收藏A.ZigBeeB.Wi-FiC.BluetoothD.Not mentioned回答错误!正确答案:BIn the following descriptions, which is RIGHT about the functions of CPU socket? 收藏A.A CPU socket forms an interface both with the CPU and the PCBB.A CPU socket provides heat sinkC.All above.D.A CPU socket houses a CPU on motherboarA mouse is a small device that a computer user pushes across a d esk surface in order to point to a place on a and to sele ct one or more action to take from thatposition.收藏A.platformB.desktopC.consoleD.display回答错误!正确答案:DWhich of the following is WRONG about the terminology used in so ftware engineering?收藏A.Smalltalk-LanguageB.Macro assemblers-ToolC.Offshore outsourcing--PlatformD.Lean software development-ProcessWhich one is not a computer languages?收藏A.PASCALB.word 2000C.C++D.~C回答错误!正确答案:BIn the system development process, the code is written in the ( ) p hase. 收藏A.testingB.implementationC.designD.analysisA(n) translates all the source code of a program w ritten in a high-level language into object code prior to the e x ecuti on of th program.收藏A.interpreterB.assemblersC.compiler回答错误!正确答案:CThe attributes of the stack are ().收藏A.built into their circuitryB.queueC.LIFOD.FIFOConfidentiality of the message is not enough in a secure communic ation; ( ) is also needed. The receiver needs to be sure of the send er' sdentity.收藏A.encryptionB.authenticationC.authorizationD.encapsulation回答错误!正确答案:Bis a fast and powerful operating system, based on the UNIX O. S.收藏A.Windows 98B.Windows 2000C.LinuxD.Office 2000Which of the following facts is(are) mentioned about the usage on Web 2.0 in this article?收藏A.WikisB.RSSC.All aboveD.Blogs回答错误!正确答案:CWhich of the following RDBMS is not open source according to this article?收藏A.PostgreSQLB.SQL ServerC.MySQLD.SQLiteMany viruses go resident in the memory like a (). 收藏A.tsr programB.data fileC..com fileD..exe file回答错误!正确答案:AMany viruses go resident in the memory like a (). 收藏A.tsr programB.data fileC..com fileD..exe fileAssembly-language instructions are a series of .收藏A.machine codesB.0s and 1sC.wordsD.abstract codes回答错误!正确答案:DVideodisc and laser technology provide the ability to收藏A.cost moreB.enhance other forms of educationC.create some education filesD.store large amounts of dataWhich of the following items is not included in the “three companio n application ”in Painter Series?收藏A.Sketch PadB.ExpressionC.SketcherD.Dabbler回答错误!正确答案:AAnti-Virus protects your computer from viruses by ( ) your compute r / smemory and disk devices.收藏A.deletingB.replacingC.changingD.回答错误!正确答案:DJust a minute, I ' nwaiting for the computer to up.It won' t take long to start it.收藏A.logB.bootC.activateD.scroll回答错误!正确答案:BIf you want to solve the computational problem with a computer, yo u should learn how to收藏A.subtractB.calculateC.addD.回答错误!正确答案:D is the ( ) model for .NET-based applications. (data access) 收藏A.data miningB.data achieveC.data processD.data access回答错误!正确答案:DWhich one is not a computer languages?收藏A.CB.word 2000C.PASCALD.C++In 2000, the number of viruses topped ().收藏A.50000B.1000C.7500D.500回答错误!正确答案:AIn the case of a(n) , a program is translated into e x ecutable form and e x ecuted one statment at a time rather than being translated completely before e x ecution.收藏A.compilerB.assemblersC.DebuggerD.interpreterPlease find the item that is not belong to the DBA收藏A.schema definitionB.storage structure and access method definitionC.DDLD.integrity constrain specification回答错误!正确答案:CHardware components are used for the purpose of ().收藏A.central processingB.outputC.all of the aboveD.inputJust a minute, I ' nwaiting for the computer to ( ) up. It won' t take l ong to start it.收藏A.bootB.logC.scrollD.activate回答错误!正确答案:ACommunication through the Internet, the performs the reverse f unction. 收藏A.DTEB.Data communications equipment (DCE)C.CRTD.A station controller (STACO)回答错误!正确答案:BThe control unit fetches from memory and decodes the m. 收藏A. dataB.instructionsB. resultsD.information回答错误!正确答案:B()as a significant majority of market share in the desktop收藏A.Microsoft WindowsB. unixC.linuxD.Mac OS回答错误!正确答案:AThe largest and fastest computers are ().收藏A.hand-held PCsB.workstationsC.supercomputersD.mainframe computers回答错误!正确答案:CIn the system development process, the code is written in the phase. 收藏A.testingB.analysisC.implementationD.回答错误!正确答案:C()is a network protocol used to transfer data from one computer to another through a network such as the Internet.收藏A.FTPB.HttpC.DNSD.SMTP回答错误!正确答案:A, such as those supplied for OLE DB and O DBC, allow you to use data libraries designed for earlier data acces s technologies.收藏A.Bridge providersB.Native providersOne of the differences between C# and Java is that Java runs on a ny platform with a Java Virtual ( ) while C# only runs in Windows f or the foreseeable future.A.SoftwareB.HardwareC.ProgramD.Machine回答错误!正确答案:DWindows gives you more control over the you work. 收藏A.wayB.powerC.energyD.operationA machine language is a(n) language in binary code that the computer can understand and e x ecute directly.收藏A.high-levelB.flat levelC.low-level回答错误!正确答案:CA processor is composed of two functional units, they are .收藏A.a control unit and some registersB.an arithmetic/logic unit and a storage unitC.a control unit and an arithmetic/logic unitD.some registers an arithmetic/logic unit回答错误!正确答案:CA company,s ability to deploy and support customer -oriented ( ) sy stems will be of vital importance to its prosperity.A.e-LearningB.e-ShoppingC.e-BusinessD.e-Banking回答错误!正确答案:CIn the system development process, the system analyst defines the user, needs, requirements and methods in the phas e.收藏A.designB.implementationC.analysisD.testingis a word processing tool that helps you to crea t e quality documents.A.ExcelB.OutlookC.WordD.Access回答错误!正确答案:CThe serves as an interface between hardware and software. 收藏A.application programB.systemC.operating systemD.control unitWhat does the phrase “framebased” mean appearing at the beginning of the article?收藏A.All generations of Ethernet are built on improving infrastructure from coaxial cable to twisted pair.B.All generations of Ethernet base on the same physical layer as the underlying frame.C.All generation of Ethernet conform to the multi-layers structure of the OSI reference model.D.All generations of Ethernet base on the same architecture formats and the same interfaces for higher layers.回答错误!正确答案:AAfter I finished the last paragraph, I moved the ba ck to the third paragraph and del—eted收藏A. iconB.joystickC.cursorD.mouseFor some time, we' ve been experiencing some in t his particular program. It cannot run in a normal way.收藏A.bugsB.defaultsC.loopsD.routines回答错误!正确答案:AMultimedia will become increasingly throughout every aspect o f our lives.收藏A.pervasiveB.permitC.preciseD.passTo access a page on the WWW, one needs a that usually consists of three parts: a controller, a method, and an inter preter.收藏A.browserB.codeC.routerD.password回答错误!正确答案:ATo access a page on the WWW, one needs a ( ) that usually consi sts of three parts: a controller, a method, and an interpreter.收藏A.browserB.routerC.passwordD.code回答错误!正确答案:AA is a set of rules that controls the interaction of different devices in a network or internetwork.收藏A.queryB.dialogC.modelD.protocol回答错误!正确答案:DWhereas a repeater operates only in the physical layer of the OSI model, a bridge operates in both the physical layer and thelayer of the OSI model.收藏A.Physical LayerB.Network LayerC.Transport Layerdata-link回答错误!正确答案:DAll computers can perform basic machine operations under the cont rol of (). 收藏A.programsB.instructionsC.commandsD.operations回答错误!正确答案:AA ( )is used to communicate with another computer over telephone lines.收藏A.keyboardB.modemC.printerD.mouse回答错误!正确答案:B()as a significant majority of market share in the desktop收藏A.linuxB.Mac OSC.Microsoft WindowsD.unix回答错误!正确答案:CWhich of the following description is WRONG about Wi-Fi?收藏A.One can connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a router.B.Communications between two devices need the involvement of an access point with WI-Fi.Now most laptops are built with wireless network adapters inside.D.Any standard Wi-Fi device will work anywhere in the world with global operative set of standards. 回答错误!正确答案:Bprimary memory which is stored on chips located ().收藏A.on the motherboar~DB.outsideC.on the CPUD.inside the processor回答错误!正确答案:AThe abbreviation USB stands for Universal Bus.收藏A.SyntacticB.SymmetricSerialD.Sequential回答错误!正确答案:CA ( ) copy is a copy of a current file made in order to protect agai nst loss or damage.收藏A.har~DB.fileC.backupD.soft回答错误!正确答案:CA characteristic of operating system is .收藏A.error recoveryB.all the aboveC.memory managementD.resource management回答错误!正确答案:DThe Whale will crea t e ( ) different versions of itself when it infects files.收藏A.31B.33C.32D.30回答错误!正确答案:BChemical energy, ( ) from fuel or other matters, can be transformed into heat energy.收藏A.whetherB.not considered thatC.if or notno matter how回答错误!正确答案:Awhat does " neural network " mean? 收藏A.神经网络B.社会网络C.自然网络D.精神网回答错误!正确答案:Ais an architectural framework.收藏A.dnsB.wwwC.httpD.回答错误!正确答案:BWhich of the following is RIGHT about the current trends in softwar e engineering? 收藏A.Experimental software engineering advances the knowledge on experiments through software.B.Software Product Lines produce successions of individual software system products.C.Agile software development is a light and change-driven process.D.Aspects describe the behavior or all objects or functions in particular circumstances and design particular-purpose code for them.回答错误!正确答案:CA is a device that enables the computer to handle sounds.收藏A.monitorB.network cardC.sound cardD.video card回答错误!正确答案:CEach is a unit of both atomicity and consistency.收藏A.transactionB.schema detailsC.databaseD.storage structure回答错误!正确答案:AWhich of the following descriptions in WRONG about the uses of W i-Fi? 收藏A.The hardware provides indication to the sender about whether the transmission was delivered B.All stations share a single radio frequency communication channel.C.A carrier wave is used to transmit the data in packets.D.Each station is constantly tuned in on the channel.回答错误!正确答案:AWhen power is removed, information in the semiconductor memory is收藏A.remainB. lostC.manipulatedD.reliable回答错误!正确答案:BSmall as it is, a personal computer can perform the same program instructions as ().收藏A.typewriterB.printersC.larger computersD.human beings回答错误!正确答案:CThe attributes of the stack are ().收藏A.LIFOB.queueC.FIFOD.built into their circuitry回答错误!正确答案:CA periodic refresh is needed to restore the information for the . 收藏A.EPROMB.SRAMC.DRAMD.EEPROM回答错误!正确答案:CA(n) is a sequence of code in a program e x ecuted re peatedly,either fro a fixed number of times or until a certain conditi on is met.收藏A.LoopB.sel ected回答错误!正确答案:AThe most commonly used tool in the design phase is the ().收藏A. structure chartB.flowchartsC.object-relationship charttopology chart回答错误!正确答案:AA Web site is often more effective as a(n) tool than a selling tool.收藏A.ElectronicalB.PoliticC.TechnicalD.Marketing回答错误!正确答案:DData ( ) can reduce the amount of data sent or stored by partially eliminating inherent redundancy.收藏A.compilationB.compressionC.conversionD.configuration回答错误!正确答案:BThe history of programming languages can be traced back almost t o the invention of the ( )computer in th 1940s.收藏A.biologicB.analogC.digitalD.electrical回答错误!正确答案:CMany companies use to train their employees.收藏A.technologyB.entertainmentC.animationD.multimedia applications回答错误!正确答案:DThe abbreviation USB stands for Universal ( ) Bus.收藏A.SyntacticB.SerialC.SequentialD.Symmetric回答错误!正确答案:BThe larger the system of the computer, the greater its (). 收藏A.processing speedB.both A and BC.neither A nor Bstorage capacity回答错误!正确答案:DThese days it is not uncommon for one to see people using ( ) eve rywhere--even on airplanes.收藏A.microcomputersB.minicomputersC.desktopsD.laptops回答错误!正确答案:DMost operating system have a standard set of to handle the processing of all input and output instructions.收藏A.I/O operationB.spreadsheetC.data tableD.control instructions回答错误!正确答案:DThe purpose of the is to provide fully integrated analog servic es to users. 收藏A.HTTPB.FTPC.WWWD.ISDN回答错误!正确答案:DThe largest and fastest computers are ().收藏A.hand-held PCsB.workstationsC.supercomputersD.mainframe computers回答错误!正确答案:CA company,s ability to deploy and support customer -oriented systems will be of vital importance to its prosperit y.收藏A.e-ShoppingB.e-BankingC.e-LearningD.e-Business回答错误!正确答案:DWhat does Tim Berners-Lee'sdescription about Web 2.0 mean?收藏A.Web 2.0 is a very popular now.B.Web 2.0 is an entirely new concept.Web 2.0 is not defined clearly.D.web 2.0 is an revolution in the World Wide Web回答错误!正确答案:DIn the system development process, ( ) and pseudocode are tools u sed by programmers in the implementation phase.收藏A.object-relationship chartB.structure chartC.flowchartsD.toplogic chart回答错误!正确答案:CA is used to communicate with another comput er over telephone lines.收藏A.mouseB.keyboardC.modemD.printer回答错误!正确答案:CThe abbreviation HTTP stands for Hypertext ( ) Protocol.收藏A.TransmissionB.TransferC.TransportationD.Transition回答错误!正确答案:Brefers to the parts of the computer that you can s ee and touch. 收藏A.HardshipB.InstructionC.SoftwareD.Hardware回答错误!正确答案:DHardware components are used for the purpose of ().收藏A.outputB.all of the aboveC.inputD.central processing回答错误!正确答案:BYou can come with me to the museum this afternoon ( ) you don' t mind walking for half an hour.收藏A.so far asB.exceptC.unlessD. if回答错误!正确答案:DAll computers can perform basic machine operations under the cont rol of (). 收藏A.instructionsB.commandsC.operationsD.programs回答错误!正确答案:DThe RGB value is composed of components.收藏A.threeB.oneC.twoD.four回答错误!正确答案:BThe turns the object file into an executable program.收藏A.interpreterB.linkerC.computerD.compiler回答错误!正确答案:AWe ll go to Paris for our holiday, ( ) it isn ' too expensive. 收藏A.so far asB.provided。
计算机英语考试题及答案
计算机英语考试题及答案一、选择题(每题2分,共20分)1. Which of the following is not a type of computer hardware?A. CPUB. RAMC. SoftwareD. Hard Disk答案:C2. What does the acronym "USB" stand for?A. Universal Serial BusB. User System BusC. User Storage BusD. Universal Storage Bus答案:A3. What is the primary function of a router in a computer network?A. To store dataB. To process dataC. To connect multiple devicesD. To print documents答案:C4. Which of the following is a programming language?A. HTMLB. CSSC. JavaScriptD. All of the above答案:D5. What does "RAM" stand for in computer terminology?A. Random Access MethodB. Random Access MemoryC. Remote Access MemoryD. Rapid Access Memory答案:B6. What is the term for a collection of data stored on a computer?A. FileB. FolderC. DatabaseD. Memory答案:A7. Which of the following is a type of computer virus?A. WormB. TrojanC. Both A and BD. None of the above答案:C8. What is the purpose of a firewall in a computer system?A. To prevent unauthorized accessB. To speed up internet connectionsC. To store dataD. To print documents答案:A9. What does "GUI" stand for in the context of computer systems?A. Graphical User InterfaceB. General User InterfaceC. Global User InterfaceD. Graphical Universal Interface答案:A10. What is the term for a small computer program that performs a specific task?A. ApplicationB. SoftwareC. UtilityD. Script答案:D二、填空题(每题2分,共20分)1. The basic unit of data in a computer is called a____________.答案:bit2. A computer's operating system is an example of______________.答案:system software3. The process of converting data into a form that can be understood by a computer is called ______________.答案:encoding4. The term used to describe the speed of a computer's processor is ______________.答案:clock speed5. A computer network that spans a large geographical area is known as a ______________.答案:WAN (Wide Area Network)6. The process of recovering lost data is called______________.答案:data recovery7. A computer program that is designed to disrupt or damage a computer system is known as a ______________.答案:malware8. The primary storage medium for a computer's operating system and most frequently used programs is the______________.答案:hard drive9. The term used to describe the process of transferring data from one computer to another is ______________.答案:data transfer10. A computer that is part of a network and shares its resources with other computers is called a ______________.答案:server三、简答题(每题10分,共40分)1. What are the main components of a computer system?答案:The main components of a computer system include the central processing unit (CPU), memory (RAM), storage devices (hard disk, solid-state drive, etc.), input devices (keyboard, mouse, etc.), output devices (monitor, printer, etc.), andthe operating system.2. Explain the difference between hardware and software in a computer system.答案:Hardware refers to the physical components of a computer, such as the CPU, memory, and storage devices. Software, on the other hand, comprises the programs and instructions that run on the hardware, including theoperating system, applications, and utilities.3. What is the role of a firewall in a computer network?答案:A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks,such as the Internet, to prevent unauthorized access and protect the internal network from potential threats.4. Describe the process of data encryption and its importance in computer security.答案:Data encryption is the process of converting readable data into an unreadable format, called ciphertext, using an algorithm and a key. This process ensures that only authorized parties with the correct key can access and decrypt the data. Encryption is crucial for protecting sensitive information from unauthorized access, ensuring data privacy and security in computer systems and networks.。
计算机专业英语
一、英翻汉,汉翻英(20题*1分)data processing system 数据处理系统Integrated Circuit 集成电路Central Processing unit 中央处理器decimal digit 十进制Random Access Memory 随机访问存储器machine language机器语言system clock 系统时钟word size 字长DataBus 数据总线Address Bus 地址总线control circuit 控制电路input and output device 输入和输出设备Universal Serial Bus 通用串行总线assembly language 汇编语言high-level language 高级语言derived classes 派生类late binding 迟绑定virtual function 虚函数real-time operating system 实时操作系统command language 命令语言primary storage 主存储器secondary storage 辅助存储器data structure 数据序data abstraction数据抽象procedural abstracting过程抽象dynamic memory allocation 动态存储分配first come and first served 先来先服务first in and out 先进先出database model 数据库模型physical level 物理层user program 用户层entity-relationship model实体—关系模型one –pass compiler 一遍编译器external call 外部调用parallelizing compiler 并行编译器cross compiler 交叉编译器intermediate code 中间代码一、选择题(10题*2分)1、计算机中最重要的程序OS2、处理器包含寄存器(register)累加器(accumulator)两个功能部件3、在控制输入输出操作计算机有完整的操作指令(operating instructions/ operational command)4、高级语言低级语言判断二、选词填空(10题*2分)课本第二题Uint1(1)The digital computer is a digital system perform various computation (估计,计算)tasks.(2)Integrated circuit did for the third-generation what transistors did for thesecond generation.(3)One of the most significant contributes to the emergence of the fourth generation of computers is the microprocessor.(未处理器)(4)Mainframe computer is a powerful multi-user computer.(5)Supercomputer is an extremely fast computer that can perform hundreds of millions of instructions per second.(6)Desktop computers are modular systems that make it easy to add or replace individual parts to meet each user’s particular requirements.(7)When you need change ,it is easy to open up a desktop case and reconfigure the system.(8)The CPU mounts in a special socket that uses a latching mechanism to hole itin place.Uint2(1)A processor is a function unit that interprets and carries out instructions. (2)Thirty-two-bit chips are often constrained to a maximum of 2GB or 4GB of RAM access.(3)Processing more data in each cycle contributes to increased performance . (性能)(4)The cache ensures that data is immediately available whenever the CPU requests it.(5)One reason why the word needs 64-bit processors is because of their enlarged address spaces.(6)In an SSID (服务集标示符)architecture there is a single instruction cycle. (7)Multiprocessing refers to the organization technique in which a number of processor units are employed in a single computer system.(8)RAM and ROM play important roles of storage devices.(存储装置)Uint3(1)Each I/O device includes I/O interface circuitry.(接口电路)(2)The keyboard is used to type information into the computer or input information.(3)The core computer of CRT monitor(阴极射线管显示器)is cathode ray tube.(4)Compared to the CRT monitor, the monitor’s advantages are obvious.(5)Each I/O device is connected to computer system’s address, data, and control buses.(6)CRT monitor means a cathode ray tube monitor.(7)Each key on a standard keyboard has one or two character.(8)Press the key to get the lower character and hole Shift to get the upper. Uint4(1)Inheritance in object-oriented programming allows a class to inherit properties(性能,道具) from a class of object.(2)The language used 0 and 1 is called machine language.(3)C++ is an often considered to be a superset of C , but this is not strictly true.(4)Most C code can easily be made to compile(编译)correctly in C++. (5)C++ is an enhanced version of the C language.(6)Methods are similar to the functions of procedure-oriented (面向过程)programming.(7)An object is simply an instance(实例)of a class.(8)Polymorphism gives object the ability to represent to messages from routines when the object’s exact type is not known.(9)It is a computer program that translates a series of instructions written in one computer language into a resulting output in another computer language.(三)Unit5(1)The operating system is also responsible for keeping track of the activities in the computer system.(2)Real-time operating system are used to control machinery,(机械,机器)scientific instrument and industrial systems.(3) A multi-user operating system allows many different users to take advantage of one computer’s resources simultaneously.(4)The OS is a large program made up of many smaller programs.(5)The OS control how the CPU communicates with other hardware components.(硬件组件)(6)The OS also makes computer easier to operate by people who don’t understand programming languages.(7)Operating system are constantly being improved or upgraded as technology advance.(8)Windows is custom-made to run with Intel CPU and Intel-compatible CPUs,such as Pentium IV.(9)It is a common term for a computer fault that brings down a software program or operating system .It is also refer to the failure of a hard disk drive.(三)Uint6(1)A data structure is a specialized format (格式,板式)for organizing and storing data.(2)Data structure organize data in ways that make Algorithms (算法)moreefficient.(3)An object-oriented approach to data structures (数据结构)brings together both data abstraction and procedural abstraction.(4)Once problem are Abstracted ,(抽象的)it becomes apparent that seemingly different problems are essentially similar or even equivalent in a deep sense.(5)Abstraction allows Common solutions to seemingly different problems.(6)Integer is amounts to a particular collection of anxious or rules that must be obeyed.(7)When a call is made to Algorithms, (算法)all the variable local to the callingroutine need to be saved by the system , otherwise the new function will overwrite the calling routine’s variables.(8)Computers in which the disk is attached to one machine, known as the file server.(文件服务器)Uint7(1)A database consists of a file or a set of files.(2)Fields are the basic units of data storage .(数据存储)(3)The external level defines the different views of the database as required by the external or user programs.(4)One user program may not require all the data in the database.(5)The conceptual level describe the entire database.(6)Object-based logical models are used for describing data at the conceptual (概念上的)and viewlevels.(7)For relationships involving two entity (实体)sets, there can be relationships like one-to-one,one-to-many, many-to-one,and many-to-many.(8)There are various data types to choose from, such as character,numeric ,data ,or other.Unit8(1)A compiler(编译器)is a computer program that translates a computer programwritten in one computer language into an equivalent program.(2)Translation from a low level language to a high level one is also possible. (3)Compiles also exit which translate to a another.(4)Cross compilers are useful when bringing up a new hardware platform for the first time.(5)Since the intermediate level code (中级水平代码)is machine-like in character,but not in form ,it will normally vary with the machine for which the object code is being generated.(6)Intermediate code can be converted directly into the object language (目标语言)by the code generate.(7)Obviously code generation is highly machine-dependent.(8)When the object machine is altered ,the code generator(编译发生器)must be extensively revised.三、阅读理解(10题*2分)四、完形填空五、翻译(第七章重点考)。
计算机专业英语题库-自考本科
完型填空:Many modern operating systems consider files 1 a collection of bytes. At a higher level, where the content of the file is being 2 , these 3 digits may represent integer values or text characters, or anything else. It is 4 to the program using the file to understand the meaning and internal layout of information in the file and present it to a user as 5 meaningful information ( like text, images, sounds).At any instant 6 time, a file might have a size, normally expressed in bytes, that indicates how much storage is 7 with the file. In most modern 8 systems the size can be any whole number up to a system limit. However, the general 9 of a file does not require that its instant size has any real meaning, unless the data within the file happens to 10 to data within a pool of persistent storage. Given Words: more as associated lenght considered operating binary correspond up in definition move1.as2.considered3.binary4.up5.more6.in7.associated8.operating9.definition10correspond每个阅读理解的下方都有答案大家主要看答案问的什么答案选哪个就行,到时有个印象能选出来就行!阅读理解A microcomputer is a desktop or notebook size computing device that uses a microprocessor as its Central Processing Unit, or CPU. Microcomputers are also called Personal Computers (PCs), home computers, small business computers, and micros. The smallest, most compact are called laptops. When they first appeared, they were considered single user devices, and they were capable of handling only four, eight, or 16 bits of information at one time. More recently the distinction between microcomputers and large, mainframe computers (as well as the smaller mainframe type systems called minicomputers) has become blurred, as newer microcomputer models have increased the speed and data handling capabilities of their CPUs into the 32 bit, or even 64 bit multiuser range.Microcomputers are designed for use in homes, schools, and office settings. Within the home, they can serve both as a tool for home management (balancing the family checkbook, structuring the family budget, indexing recipes) and as a recreational device (playing computer games, cataloging records and books) School children can use microcomputers for doing their homework, and in fact many public schools now employ the devices for programmed learning and computer literacy courses. Small businesses may purchase microcomputers for word processing, bookkeeping, and the storage and handling of mailing lists.A minicomputer is a mid-level computer built to perform complex computationswhile dealing efficiently with a high level of input and output from users connected via terminals. Minicomputers also frequently connect to other minicomputers on a network and distribute processing among all the attached machines. Minicomputers are used heavily in transaction processing applications and as interfaces between mainframe computer systems and wide area networks.A mainframe computer is a high level computer designed for the most intensive computational tasks. Mainframe computers are often shared by multiple users connected to the computer via terminals. The most powerful mainframes, called supercomputers, perform highly complex and applied research by scientists, large businesses, and the military.In computer science, supercomputers are large, extremely fast, and expensive computers used for complex or sophisticated calculations, typically, machines capable of pipelining instruction execution and providing vector instructions. A supercomputer can, for example, perform the enormous number of calculations required to draw and animate a moving spaceship in a motion picture. Supercomputers are also used for weather forecasting, large scale scientific modeling, and oil exploration.1. We can see from the text that a computer can _______. ( )A. only be used as a calculating deviceB. not be used in the homeC. find uses almost everywhereD. not be made very small2. How many types of regular computers are introduced in this text? ( )A. 1B. 2C. 3D. 43. Which of the following is the smallest? ( )A. A laptop.B. A desktop.C. A minicomputer.D. A supercomputer.4. Which of the following is not true? ( )A. Pupils can use computers to do their homework.B. A CPU can not be a microprocessor.C. The distinction between micros and mainframes has become blurred.D. A PC can be a laptop or a desktop.5. We can infer that _______. ( )A. there will be no distinction between micros and mainframes in the futureB. it is unimaginable to do research nowadays without the help of a computerC. the fifth generation computer will be produced within 2 yearsD. electronic computers will soon be out of dataC D A B BComputer programs, which are also called software, are instructions that cause the hardware —the machine —to do work. Software as a whole can be divided into a number of categories based on the types of work done by programs. The two primary software categories are operating systems (system software), which controls the working of the computer, and application software, which addresses the multitude of tasks for which people use computers. System software, thus handle such essential, but often invisible, chores as maintaining disk files and managing the screen, whereas application software perform word processing, database management, and the like. Two additional categories that are neither system nor application software , although they contain elements of both, are network software , which enables groups of computers to communicate, and language software, which provides programmers with the tools they need to write programs. In addition to these task based categories, several types of software are described based on their method of distribution. These include the so-called canned programs or packaged software, developed and sold primarily through retail outlets; freeware and public domain software, which is made available without cost by its developer; shareware, which is similar to freeware but usually carries a small fee for those who like the program; and the infamous vaporware, which is software that either does not reach the market or appears, which is software that either does not reach the market or appears much later than promised.1. Computer programs in the text ______. ( )A. differ a great deal from softwareB. control the working of a computerC. handle invisible chores only such as managing the screen and maintaining disk filesD. can not perform word processing, database and the like2. The two categories of software that are neither system or application software, but contain elements of both are ________. ( )A. system and language softwareB. network and application softwareC. system and packaged softwareD. language and network software3. The so-called canned programs are so described depending on ________. ( )A. the tasks they performB. the way they are obtainedC. the developer who creates themD. the user who uses them4. Which of the following is true? ( )A. Software never carries a fee for those who like the program.B. Vaporware is made free by its developer.C. Freeware and public domain software is a task based software.D. Packaged software may be available at the market from a retailer.5. Which of the following about the language software is true? ( )A. It is free of charge.B. It helps programmers write programs.C. It is a kind of infamous software.D. It reaches the market at the time it’s promised.B D B D BHigh level languages often use English like words-for example, LIST, PRINT, OPEN, and so on-as commands that might stand for a sequence of tens or hundreds of machine language instructions. The commands are entered from the keyboard or from a program in memory or in a storage device, and they are interpreted by a program that translates them into machine language instructions.Translator programs are of two kinds: interpreters and compilers. with an interpreter, programs that loop back to re-execute part of their instructions reinterpret the same instructions each time it appears, so interpreted programs run much more slowly than machine language programs. Compilers, by contrast, translate an entire program into machine language prior to execution, so such programs run as rapidly as though they were written directly in machine language.American computer scientist Grace Hopper is credited with implementing the first commercially oriented computer language. After programming an experimental computer at Harvard University, she worked on the UNIV AC I and II computers and developed a commercially usable high level programming language called FLOW MATIC to facilitate computer use in scientific applications, IBM then developed a language that would simplify work involving complicated mathematical formulas. Begun in 1954 and completed in 1957, FORTRAN (FORmula TRANslator) was the first comprehensive high level programming language that was widely used. In 1957, the Association for Computer Machinery set out to develop a universal language that would correct some of FORREAN’s perceived faults. A year later, they released ALGOL (ALGOLrithmic language), another scientifically oriented language; widely used in Europe in the 1960s and 1970s, it has since been superseded by newer language, while FORTRAN continues to be used because of the huge investment in existing programs. COBOL (Common Business Oriented Language), a commercial and business programming language, concentrated on data organization and file handling and is widely used today in business.BASIC (Beginners All-purpose Symbolic Instruction Code) was developed at Dartmouth College in the early 1960s for use by nonprofessional computer users. The language came into almost universal use with the microcomputer explosion of the1970s and 1980s. condemned as slow, inefficient, and inelegant by its detractors, BASIC is nevertheless simple to learn and easy to use. Because many early microcomputers were sold with BASIC built into widespread use. As a very simple example of a BASIC program, consider the addition of the numbers 1 and 2, and the display of the result. This is written as follows (the numerals 10—40 are line numbers):10 A=120 B=230 C=A+B40 PRINT Calthough hundreds of different computer languages and variants exist, several others deserve mention. PASCAL, originally designed as a teaching tool, is now one of the most popular microcomputer languages. LOGO was developed to introduce children to computers. C, a language Bell Laboratories designed in the 1970s, is widely used in developing systems programs, such as language translators. LISP and PROLOG are widely used in artificial intelligence.1. Which of the following are high-level language? ( )A. COBOL, FORTRAN, ASSEMBLER, PASCAL.B. MACHINELANGUAGE, LIST, BASIC, PROLOGC. COMPILER, FLOW MATIC, ALGOL, LOGO.D. None of the above.2. Which of the following is not a characteristic of a high-level language? ( )A. It uses English-like words.B. A command may stand for a sequence of many machine language instructions.C. A keyboard can serve as an input device.D. Machine language instructions are no longer required.3. Which is not true of BASIC? ( )A. It was developed at Bell Laboratories in the early in 1960s.B. With the explosion of microcomputers, it found wide use in the 1970s.C. It was thought of as a slow, inefficient programming language.D. It was built into the hardware of many early microcomputers.4. From this passage, we can infer that ________. ( )A. FORTRAN was the first commercially oriented computer languageB. COBOL is a scientifically oriented languageC. because ALGOL was released later than FORTRAN, it has fewer faultsD.IBM was known for its commercially oriented computer language FLOW MATIC5. Which of the following is true? ( )A. PASCAL was designed to introduce children to computers.B. LOGO was originally created a teaching tool.C. PROLOG is widely used in developing system programs.D. LISP plays a very important part in artificial intelligence.C D A C DThe techniques developed to protect single computers and network-linked computer systems from accidental or intentional harm are called computer security. Such harm includes destruction of computer hardware and software, physical loss of data, and the deliberate invasion of databases by unauthorized individuals.Data may be protected by such basic methods as locking up(锁上) terminals and replicating data in other storage facilities. More sophisticated methods include limiting data access by requiring the user to have an encoded card or to supply an identification number or password. Such procedures can apply to the computer data system as a whole or may be pinpointed for particular information banks or programs. Data are frequently ranked in computer files according to degree of confidentiality.(机密性)Operating systems and programs may also incorporate built in safeguards, and data may be encoded in various ways to prevent unauthorized persons from interpreting or even copying the material. The encoding system most widely used in the United States is the Data Encryption Standard (DES), designed by IBM and approved for use by the National Institute of standards and Technology in 1976. DES involves a number of basic encrypting procedures that are then repeated several times. Very large scale computer systems, for example, the U.S. military Advanced Research Project Agency Network (ARPANET), may be broken up into smaller subsystems for security purposes, but smaller systems in government and industry are more prone to system-wide invasions. At the level of personal computers, security possibilities are fairly minimal.Most invasions of computer systems are for international or corporate spying or sabotage, but computer backers may take the penetration of protected databanks as a challenge, often with no object in mind other than accomplishing a technological feat. Of growing concern is the deliberate implantation in computer programs of worms or viruses that, if undetected, may progressively destroy databases and other software. Such infected programs have appeared in the electronic bulletin boards available to computer users. Other viruses have been incorporated into computer software sold commercially. No real protection is available against such bugs except the vigilance of manufacturer and user.1. According to the author, computer security is _________. ( )A. a programB. a techniqueC. a computer systemD. a method2. Which of the following is not a data protecting method? ( )A. Locking up terminals.B. Replacing data in other storage facilities.C. Supplying a password before data access.D. Ranking data frequently in computer files.3. The word “incorporate” in the first sentence of the third paragraph may best mean _______.( )A. makeB. joinC. work well withD. come into4. Which of the following statements may not be true? ( )A. People break their large scale computer systems up into smaller subsystems for security purposes.B. Personal computers are most likely to be invaded by unauthorized persons.C. All of the people invading computer systems are trying to spy or sabotage.D. Some people penetrated databanks in order to prove their technical worth.5. From Paragraph 4, we know that ________. ( )A. the electronic bulletin boards are a popular source of computer virusesB. most viruses come from software sellersC. whatever measures are taken, it is impossible for people to protect their system against computer virusesD. some viruses are data-destroying onesB D AC DWe live in a world today where software is pervasive. Software touches nearly every aspect of our lives, from software-controlled subways, air traffic control systems, nuclear power plants, and medical equipment to more mundane everyday examples, such as software-controlled microwave ovens, gas burners, elevators, automated teller machines, the family car, and the local 911 service. In the past, many of these items relied upon established safety and reliability principles from electrical, mechanical, and/or civil engineering, which developed over several decades, if not longer. Today items like these are controlled by software.When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability andits importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.We hear a lot about the global economy today. Technology has less respect for state or national borders than do market forces. The software safety and reliability challenge is a global challenge. Products, such as cars and medical devices, are built in one jurisdiction and sold worldwide. Air traffic control systems must interoperate safely and reliably among multiple countries, for example along the long borders between the U.S., Canada, and Mexico.1. In the first paragraph, the author tries to tell us mainly that _______. ( )A. software is pervasiveB. software controls subways and power plantsC. automated teller machines are very convenientD. mechanically-controlled items are not reliable2. The word “it” in the first line of the second paragraph refers to _______. ( )A. softwareB. reliabilityC. safetyD. challenge3. According to the author, ________. ( )A. people should remain content with the present situation of software securityB. Y2K is one of the most threatening problems facing usC. People should give more attention to software security than they used to doD. Few people realize the importance of software security problems4. The sentence “Technology has less respect for state or national borders than do market force” means ___________. ( )A. market force are stronger than technologyB. technology is easier to spreadC. market force show more respect for a nationD. technology is more difficult to acquire5. What is true about the software? ( )A. It is becoming more expensive.B. It is being made simpler.C. It is finding a wider application.D. It is controlling more equipment.A A CB CThe Internet has exploded into the consciousness of every country in the world. Nothing in the computer and communications industries ever came onto the scene with more momentum than the World Wide Web. The Clinton/Gore administration had been touting the “information superhighway” for some time and had pointed to the Internet as a model for such a future system, but the excitement over the World Wide Web turned the Internet into the superhighway whether it was ready for it or not. The simplicity of the Web’s hypertext link, an address that points to another Web page on the same server or on any server in the world, spread like wildfire.As a result, there is hardly a single software product that hasn’t been affected. Every application is being reworked to deal with the Internet in some manner. This Encyclopedia now contains hundreds of Web terms and products that were not here a couple of years ago.Even with its growing pains, which grow larger each day, the Internet has managed to become the global superhighway, which has changed the lives of millions. That it works as well as it does is indeed quite miraculous. With less than 500 Web sites in 1994 to more than two million today, the Web has become the information melting pot for the planet. It provides a marketplace and meeting ground for every subject known to the human race.The real superhighway was meant to modernize the telecommunications infrastructure in the U.S. so that everyone had access to information and educational materials no matter what their station in life. Right now, there is a monthly service fee for the Internet, and you have to have a personal computer or set-top box. Although Internet access is available in libraries and other public venues, the Internet is still not a service for everyone at home.In addition, “surfing the Net” via modem is often an exp eriment in patience. High-speed access is necessary to keep up this extraordinary momentum. The delivery of the superhighway is now in the hands of the telephone and cable companies, because they are already wired into every home and office and are capable of delivering content at much higher speed with communications technologies such as ISDN, ADSL and cable modems. Internet backbone providers, regional providers and local Internet service providers (ISPs) are upgrading their facilities at an furious pace. The information superhighway is transfiguring itself almost daily.The frenzy has died a little, because the Internet has already become mainstream. But, making it profitable is another story. One thing is certain. Organizations are making huge investments hoping they know what the business world as well as mom, pop and the kids want to see and purchase, and perhaps more to the point, how much they will pay for it.1. The main idea of the first two paragraphs is that ______. ( )A. Bill Clinton benefits a lot from the InternetB. the WWW develops rapidly during the Clinton’s administrationC. the Internet has a great effectD. many new words come into being with each passing day2. What is true in the third paragraph about the Internet? ( )A. It is painfulB. It is changeableC. It is wonderfulD. It is a melting pot3. The real purpose of the Superhighway was ________. ( )A. to make the U.S. telecommunications infrastructure modernB. to make money for the U.S. governmentC. to provide information service for everyone at homeD. to compete with the WWW4. The word “mainstream” in the last paragraph can be best replaced by _______. ( )A. big riverB. dominant trendC. investmentD. business5. ________access is necessary to keep up this extraordinary momentum? ( )A. High-speedB. Low-speedC. RegularityD. ShiftA A CB CMany people are watching spellbound as the Internet grows exponentially. What they often do not realize is that the Internet is not only a fascinating new interaction medium, but that it will completely dominate our society.Previous generations knew books, newspapers, telephones and televisions. The first three were essential aids to life, two text-based, the third speech-based. Anyone who was denied access to them was disadvantaged in our society. The picture-based medium, television, helped to bring the world closer to home. But it condemned the viewer to passivity and has been more a hindrance than a help in aiding individuals todevelop new skills and capabilities.The Internet will unite all the traditional media and push them further. Most significantly, this is the first time that pictures will be used interactively for information, communication and development of skills. Even today, everyone who uses the web is able to catch a glimpse of the potential of the medium in this direction. Our children will grow into a web generation. They won’t log onto the Internet occasionally, but will be online all the time. Fortunately they will be significantly more active than the TV-dominated baby boom generation. Those who are denied access to the Internet completely or partially will be enormously disadvantaged. They will be lost in our digital society.Obviously access will not be as it is today: slow, unstructured, available only through the computer. We will have intelligent tools for tapping undreamt-of possibilities. We can glimpse the beginning of these developments in many places. Shopping over the Internet of the future will be the obvious thing to do, regardless of whether the goods are ultimately delivered or fetched in person. Both the time-short and time-rich will love using the web in this way.Regardless of whether you agree with our views, you should read on. It is important for every e-tailing and electronic-shopping strategy to understand in detail what dramatic changes the Internet will undergo in the few years.1. What is true about the Internet According to the text? ( )A. People now have realize that the Internet will dominate our society completely.B. The Internet increases by 50% every year.C. The Internet will combine all the traditional media such as books, televisions and push them further.D. The Internet prevents individuals from developing new skills.2. In the 4th paragraph, the phrase “be lost ” means “______”. ( )A. be Internet-dependentB. be denied interactive mediumC. be TV-controlledD. be deprived of opportunities3. The author believes_______. ( )A. access to the Internet will be as it is todayB. people will spend a lot of time on the InternetC. the present generation spent most of their free time in front of the TVD. shopping over the Internet will occur but now we can’t imagine what it will be like4. Our children will grow into a ________ generation. ( )A. webB. painfulC. movementD. dummy5. The word “undreamt-of” in the fifth paragraph means________. ( )A. unthinkableB. utopianC. cloud-castleD. incomparableA A CB CComputer office systems are computers and their peripheral equipment are used to create, store, process, or communicate information in a business environment. This information can be electronically produced, duplicated, and transmitted.The rapid growth of the service sector of the United States economy beginning in the mid 1970s has furnished a new market for sophisticated office automation. With the increasing incorporation of microchips and microcircuitry into office equipment, the line between the computer and other equipment has blurred.At the same time, computers either stand alone or as part of a network and specialized software programs are taking over tasks such as facsimile transmission—or FAX, voice mail, and telecommunications that were once performed by separate pieces of equipment. In fact, the computer has virtually taken the place of typewriters, calculators, and manual accounting techniques and is rapidly taking over graphics design, production scheduling, and engineering design as well.During the first half of the 20th century, financial and other numerical record keeping tasks were performed manually or by bookkeeping machines, billing machines, tabulation equipment, and other types of electromechanical accounting devices. In the 1950s, such machines were increasingly replaced by mainframe computers—large, very expensive, high speed machines that required operators as well as a special temperature regulated facility to prevent overheating. Use of these machines today is limited to large organizations with heavy volume data processing requirements. Time sharing, allowing more than one company to use the same mainframe for a fee, was instituted to divide the cost of the equipment among several users while ensuring that the equipment is utilized to the maximum extent.Mainframes with remote terminals, each with its own monitor, became available in the mid 1970s and allowed for simultaneous input by many users. With the advent of the minicomputer, however, a far less expensive alternative became available. The transistor and microelectronics made manufacture of these smaller, less complex machines practicable. Minicomputer, the first of which entered general business use in。
计算机英语考试题(附答案)
汕头中博职业技术教育2009-2010学年计算机英语考试题班级:________ 姓名:________ 学号:________一、Choose one best answer. (35x1, 35 points)1、____ is used to communicate with another computer over telephone lines.A. KeyboardB. ModemC. MouseD. Printer2、____ is a device that enables the computer to handle sounds.A. Network cardB. Video cardC. Sound cardD. Monitor3. ____ is the most widely used and fastest growing computer.A. Mini-computerB. Micro-computerC. Mainframe computerD. Supercomputer4. These days it is common for one to see people using ________ everywhere--even on airplanes.A. laptopsB. desktopsC. minicomputersD. microcomputers5. _____ refers to the parts of the computer that you can see and touch.A. SoftwareB. HardwareC. Hard diskD. Instruction6. The display screen is the most common _____ device used to show you what the computer is doing.A. inputB. printingC. outputD. electronic7. PDA can also called handheld computer or ____A. notebook computerB. palmtop computerC. desktop computerD. mini-computer8. A micro-computer involves a variety of devices called ____A. softwareB. hardwareC. hard diskD. floppy disk9. ____ is the controlling center of the entire computer system.A. CPUB. MicroprocessorC. Mother boardD. Hardware10. Expansion slots are used for inserting various ____.A. sound cardsB. network cardsC. expansion cardsD. display cards11. ____ holds information processing by the CPU.A. DiskB. Input deviceC. Output deviceD. Memory12. ____ is a worldwide network for countless connected computers to share information and make communications.A. NetworkB. The InternetC. World Wide WebD. Internet service13. A ______ consists of step-by-step instructions that tell the computer how to do its work.A. CPUB. hardwareC. commandD. program14. A ______ is a functional unit that translates and carries out instructions.A. microprocessorB. processorC. processingD. process15. The most important system software program is the ___ .A. word processorB. DBMSC. OSD. application software16. The ___ consists of the equipment:keyboard,mouse,monitor,system unit,and other devices.A. peopleB. procedureC. hardwareD. information17. The most common input device is the ___ and ___.A. keyboard, printerB. mouse, keyboardC. mouse, monitorD. keyboard, monitor18. ___ are widely used to store and transport data from one computer to another.A. Floppy disksB. Hard disksC. CD-ROMsD. DVD-ROMs19. The largest network in the world is called the ___ .A. InternetB. WWWC. WebD. A, B and C20. Web site addresses are also called ___ .A. HTMLB. hyperlinksC. URLsD. home pages21. Language translators converts human language into ___ .A. machine languageB. UNIXC. OSD. GUIs22. Desktop operating systems are also called ___ .A. network operating systemsB. embedded operating systemsC. client operating systemsD. stand-alone operating systems23. Application system also refers to .A. system softwareB. background softwareC. end-user softwareD. backup software24. ROM is a type of ___ .A. semiconductorB. networkC. firmwareD. none of the above25. Speakers and headphones are the most widely used ___ devices.A. audio-inputB. multifunctionalC. audio-outputD. personal26. ___ is exclusively a sequential-access storage media.A. Magnetic tapeB. A hard diskC. A floppy diskD. CD-ROM27. The disk with the largest capacity is ___ .A. DVD-ROMB. CD-ROMC. ZipD. SuperDisk28. ___ is a type of optical disk widely used to distribute large software application packages.A. DVD-ROMB. CD-ROMC. ZipD. SuperDisk30. Every computer on the Internet has a unique numeric address called a(n) ___ .A. IP addressB. Network BridgeC. packetD. bandwidth31. The most important program on any computer is ___.A. Operating SystemB. VirusC. softwareD. Office 200032. ___ is a fast and powerful operating system, based on the UNIX OS.A. Windows 2000B. Office 2000C. Windows 98D. Linux33. Which one is not a computer languages? ___A. word 2000B. JavaC. CD. C++34. The largest and fastest computers are ___ .A. mainframe computersB. supercomputersC. hand-held PCsD. workstations35. All computers can perform basic machine operations under the control of ___ .A. instructionsB. commandsC. operationsD. programs36. Which of the following is an “output device”? ___A. CD ROMB. microphoneC. printerD. all the above37. The Internet is simply what? ___A. the WWWB. worldwide system of computer systemC. a modemD. an Internet Service Provider38. ___ is used to control the computer and run programs.A. Application softwareB. System softwareC. GameD. virus39. POST stands for ___ .A. power-on-self-testB. power-only-standard-testC. program-optimum-self-testD. program-optimum-starting-time40. Commands at the top of a screen such as: FILE, EDIT, FONT, TOOLS to operate and change things within programs are ___ .A. windowsB. word processorC. tool barD. menu bar41. CD-ROM stands for ___ .A. central processing unitB. CD-remote open mouseC. CD-resizeD. CD-read only memory42. A place in the computer system where data and programs are temporary stored. ___ .A. busB. motherboardC. memoryD. CD-read only memory43. A browser like Internet Explorer does what? ___ .A. create graphicsB. dial up to the InternetC. access web pages using HTTPD. create the WWW44. The part of the computer that does the math calculation is ___ .A. arithmetic logic unitB. monitorC. memoryD. keyboard45. What type of software is used for the creation of letters, papers, and other documents? ___ .A. databaseB. word processorC. spreadsheetD. OS46. Y ou can build a ___ for searching your notes, downloading web pages etc.A. serverB. networkC. InternetD. search engine47. What word means to copy or move files from another computer to your local computer system over a network? ___ .A. formatB. saveC. shiftD. download48. What is the term to ask the computer to put information in order numerically or alphabetically? ___.A. reportB. recordC. organizeD. sort49. A printer would be considered a(n) ___.A. controllerB. peripheral deviceC. input deviceD. USB50. The two basic types of computer software are___ and ___.A. program, applicationsB. productivity, applicationsC. applications, systemsD. systems, networking systems51. Once you delete a file from your disk, you may not be able to ___ it.A. eraseB. removeC. moveD. retrieve52. In Windows, your computer ___ is referred to as a desktop.A. deviceB. equipmentC. screenD. desk53. Anti-Virus protects your computer from viruses by ___ your computer's memory and disk devices.A. deletingB. changingC. scanningD. replacing54. The embedded operating system is used on .A. handheld computersB. desktop computersC. micro-computersD. supercomputers55. The network operating system is located on the .A. ROM memoryB. hard diskC. floppy diskD. RAM memory56. Stand-alone operating system is located on the .A. ROM memoryB. hard diskC. floppy diskD. RAM memory57. By far, the most popular Micro-computer operating system is .A. Microsoft’s WindowsB. LinuxC. UNIXD. Windows XP二、Multiple choices: (5x2, 10 points)1. Input devices include: _______A. the keyboardB. the mouseC. touch screenD. scannerE. light pen2. Output device includes:_______A. printersB. monitorsC. speakersD. disksE. headphone3. The four types of computers include:A. supercomputersB. mini-computersC. mainframe computersD. microcomputersE. desktop computers4. There are two kinds of software--- ______ and ______.A. system softwareB. computer softwareC. free softwareD. application softwareE. backup software5. System software consists of _____A. language translatorsB. device driversC. operating programsD. service programsE. operating systems6. C++ is ___.A. object-orientedB. procedure-orientedC. extended from CD. a superset of C7. Office automation is ___.A. the application of computerB. the computerC. communications technologyD. used to improve the productivity of people8. Microsoft Office Professional 2003 include ___.A. Word 2003B. PowerPoint 2003C. Excel 2003D. Outlook 2003E. FrontPage 20039. A processor is composed of:___.A. a control unitB. logic unitC. arithmetic unitD. Registers10. ___ is a type of executable file.A. .COM fileB. .TXT fileC. .JPG fileD. .EXE file三、Fill in the blanks. (3x3, 9 points)1. Y ou can _______ ______ ___ the Internet. (访问)log on to2. I always ____ ____ _____ _ at the evening. (网上冲浪)surf the Internet3. Input devices provide a way to ____ __ ______ (通信) a computer. make communications with4. Anti-Viruses can your computers . (防毒) protect, from viruses5. One of the functions of system software is _______ and ___ . (加载和运行程序) loading, running programs四、Match the following abbreviations with their Chinese meaning. (8x1, 8 points)1. ISP ( N ) A. 文件类型定义2. XML ( I ) B. 反向地址解析协议3. UPS ( G ) C. 数据终端设备4. ULS ( F ) D. 超文本传输协议5. MTP ( K ) E. 通用网关接口6. HTTP ( D ) F. 用户定位服务7. DTE ( C ) G. 不间断电源供应8. CSS ( O ) H. 需求发送9. DTD ( A ) I. 可扩展标记语言10. MMDS ( L ) J. 局域多点分布式系统11. CGI ( E ) K. 邮件传输协议12. LMDS ( J ) L. 多波段多点分布式服务13. RARP ( B ) N. 因特网服务提供者14. DSL ( M ) M. 数字订阅线路15. RTS ( H ) O. 层叠格式表五、Fill in the blanks with the corresponding English abbreviations.(8x1,8 points)1. 局域网_LAN_____2. 通用串行总线__USB____3. 中央处理器_CPU_____4. 随机存储器_RAM_____5. 个人数字助理__PDA____6. 数字化视频光盘__DVD__7. 信息技术___IT_ __8. 磁盘操作系统__DOS__9. 网际协议__IP_ __10. 个人电脑__PC_ __11. 办公自动化_ OA __12. 只读存储器光盘_ CD-ROM __13. 基本输入/输出系统_BIOS _14. 阴极显像管屏幕_ CRT __15. 液晶显示器LCD六、Translate the following expressions into English. (8x1, 8 points)1. 用户名_____user name_2. 清空回收站___empty the Recycle Bin_3. 控制面板____control panel4. 软盘驱动器___floppy disk drive__5. 电子网络_____electronic network6. 二级存储设备___secondary storage device_ __7. 系统装置____ system unit__8. 光盘驱动装置____optical disk drive unit __9. 多媒体界面____ multimedia interface __10. 集成电路____ integrated circuit __11. 存取时间____ access time __12. 模拟计算机____analog computer __13. 成批处理____ batch processing__14. 二进制位binary digit15. 缓冲存储器buffer storage16. 等待时间latency time17. 流程图flow chart18. 闭环系统closed-loop system19. 视频采集卡video capture card20. 因特网服务器Internet server七、Translate the following expressions into Chinese. (8x1, 8 points)1. alphanumeric display 字母数字显示器2. array processor _ _阵列处理器__3. assembler language ___汇编语言_4. call instruction 呼叫指令5. card punch 卡片穿孔机6. library management 程序库管理7. hardware debugging tool 硬件调试工具8. output parameter 输出参数9. peripheral equipment 外围设备10. signal simulator 信号模拟器11. time sharing system 分时系统12. Simple Network Transfer Protocol 简单网络传输协议13. Call Control Manager 拨号控制管理14. Extensible Markup Language 可扩展标记语言15. perform periodic maintenance 执行定期维护16. monitor the system activities 监测系统活动17. Add and Remove programs 添加和删除程序18. uninstall unneeded programs 卸载不用的程序19. allocate system resources 分配系统资源20. database management system 数据库管理系统八、Decide whether each of the following statements is True or False. If True, please write down T; if False, please write down F. (5x1, 5 points)1. Error recovery does not belong to operating system. (F)2. Many operating systems have similar characteristics. (T)]3. The computer can do nothing without a program. (T)4. System software is also called end-user software. (F)5. One of the functions of an operating system is managing the computer'sresources. (T)6. The heart of any computer system is the central processing unit (CPU). (T)7. When you send an e-mail you should provide the sender's e-mail address.(T)8. There are different operating systems available for PCs, but the mostcommon is UNIX. (F)九、Match the English words with their definitions. (9x1, 9 points)( C ) 1. desktop case( A ) 2. laptop( D ) 3. tower case( B ) 4. palmtop( F ) 5. chip( H ) 6. motherboard( I ) 7. ROM( G ) 8. RAM( J ) 9. scanner( E ) 10. keyboard( O ) 11. Home page( N ) 12. Network operating system( M ) 13. Embedded operating system( L ) 14. Backup program( K ) 15. File compressionA. computers that are portable and can use batteriesB. computers that are small enough to be held in the user‟s handC. a case which sits under the computer screen on a deskD. a case which stands vertically next to the screen or on the floorE. a set of keys, as on a computer terminalF. a flat plastic sheet, holding the CPUG. where data can be lost if the power is switched offH. the …brain‟ of the computerI. a permanent part of the memory which cannot be changedJ. used to transfer an image into the computerK. Program that reduces the size of files for efficient storageL. Program that makes copies of files to be used if originals are lost and damagedM. Operating systems completely stored within ROM memoryN. Operating system used to control and coordinate computers that are linked togetherO. Opening page of a Web site。
大学生《计算机专业英语》考试题目
《计算机专业英语》一、Choice (选择)(15 题,每题1 分,共15 分)Choose the best answer for each blank.(从每题四个选项中,选出最合适的一项)1) As an operating system repeatedly allocates and frees storage space, many physically separated unused areas appear. This phenomenon is called ______.A. fragmentationB. compactionC. swappingD. paging2) We can use the word processor to _________ your documents.A. editB. computeC. translateD. unload3) _____________ infected computer may lose its data.A. FileB. Data baseC. VirusD. Program4) One use of networks is to let several computers share ____ such as file system, printers, and tape drives.A. CPUB. memoryC. resourcesD. data5) A firewall is a ____ system designed to ___ an organization’s network against threats.A. operating, preventB. programming, developC. security, protectD. service, exploit6) The ____ has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.A. applicationB. information systemC. networkD. operating system7) ____ is the address of a variable or a variable in which the address of anothervariable is stored.A. DirectorB. PointerC. ArrayD. Record8) C++ is used with proper ____ design techniques.A. object-orientedB. object-basedC. face to objectD. face to target9) A data ( ) is a file that contains metadata-that is, data about data.A. structureB. tableC. baseD. dictionary10) A network software consists of ( ), or rules by which processes can communicate.A. protocolsB. programsC. devicesD. computers11) The firewall device is a ( ) system for connecting a computer network toother computer network.A. hardwareB. softwareC. securityD. I/O12) We can use the word processor to _________ your documents.A. editB. computeC. translateD. unload13) _________ processing offers many ways to edit text and establish document formats. You can easily insert, delete, change, move and copy words or blocks of text.A. DataB. DatabaseC. WordD. File14) A ________ copies a photograph, drawing or page of text into the computer. A.scanner B.printer C.display D.Keyboard15) _________ is the sending and receiving of the message by computer. It is a fast, low-cost way of communicating worldwide.A.LAN B.Post office C.E-Mail D.Interface二、Cloze (完形填空)(4 篇篇20 题,每题1.5 分,共30 分)Choose the best answer for each blank.(从每题选项中,选出最合适的一项)Passage 1Have you ever wondered how information processed by the system unit is1) into a form that you can use? That is the role of output devices. While inputdevices convert what we understand into what the system unit can process, output devicesconvert what the system unit has processed into a form that we can understand. Output devices 2) machine language into letters, numbers, sounds, and images that peoplecan understand.Competent end users need to know about the most commonly used input devices, including keyboards, mice, 3) , digital cameras, digitizing tablets, voice recognition,and MIDI devices. Additionally, they need to know about the most commonly used output devices. And end users need to be aware of 4) input and output devices such as fax machines, multifunctional devices, 5) telephones, and terminals.1) A. converted B. convinced2) A. transact B. translate3) A. scanners B. scan4) A. combination B. communication5) A. Intranet B. InternetPassage 2ABC is an interactive programming language and environment for personal computing, originally 6) ____ as a good replacement for BASIC. It was designed by 7)____ a task analysis of the programming task.ABC is easy to learn (an hour or so for someone who has already programmed), and yet easy to use. Originally intended as a language for 8) ______, it has evolved into a powerful tool for beginners and experts alike.Some features of the language:op-down programmingSome features of the environment:logging outediting, or entering input to a program6) A. intending B. intended7) A. first does B. first doing8) A. beginners B. beginning9) A. easily be combined B. easy be combined10) A. is shown to B. is showing toPassage 3Bulletin Board Systems (BBS)Bulletin Board Systems are a 11)______ telecommunications services provided bythe internet, public information services, and 12)_______ of business firms, organization, and end user groups. An electronic bulletin board system allows you to post public or private messages that other end 13)______ can read by accessing the BBS with their computers. Establishing a small BBS for a business is not that difficult. Minimum requirements are a microcomputer with a hard disk drive, custom or packaged BBS 14)_______, modem and a telephone line. Bulletin Board System serves as a central location to post and pick up messages or upload and download data files or programs 24 hours a day. A BBS helps end users ask questions, get advice, locate and share information, and get 15)_______ touch with other end users.11) A. popular B. unpopular12) A. thousand B. thousands13) A. use B. users14) A. software B. hardware15) A. on B. inPassage 4A: displaying B: messages C: received D: network E: usersElectronic MailMillions of end 16)________ now depend on electronic mail (e-mail) to send andreceive electronic 17)________. You can send e-mail to anyone on your 18)________ for storage in his/her electronic mail boxes or magnetic disk drives. Whenever they are ready, they can read their electronic mail by 19)________ it on the video screens at their workstations. So, with only a few minutes of effort (and a microseconds of transmission),a message to one or many individuals can be composed, sent, and 20)_______.三、Term Translation (术语翻译)(10 题,每题1.5 分,共15 分)Write out their English abbreviations of the following terms and then translate them into Chinese.(写出下列专业术语的英文简称,并将其翻译成汉语)1) Personal Digital Assistant2) Wireless-Fidelity3)Digital Video Disc4)Joint Photographic Experts Group5)Graphical User Interface6)Professional Hypertext Preprocessor7)Simulation Language8)Object-oriented Programming9)Uninterruptable Power Supply10)Universal Serial Bus四、Short Answer (简答)(2 题,每题4 分,共8 分)Answer the following questions in English.(用英文回答下列问题)1)Please write down the components of hardware.2) Please write down the classification(分类)of operating system according to the application area(应用领域).五、Sentence Translation (句子翻译)(8 题,每题4 分,共32 分)Translate the following English sentences into Chinese.(将下列英文句子翻译成汉语)1) This input is digitized and converted to standard text that can be further processed by programs such as a word processor.2)The most common input devices are the keyboard and the mouse.3) The network operating system is designed to control the computers that are linked together via a network.4) The BIOS (Basic Input Output System)is responsible for waking up the computer when you turn it off.5)A primary purpose of programming languages is to enable programmers to express their intent for a computation more easily than they could with a lower-level language or machine code.6)During the last few decades, a large number of computer languages have been introduced.7) The entire office automation system comprises five sub-systems.8) Image Processing System allows end users to electronically capture, store, process, and retrieve images of documents.。
英语网上考试题
考试课程:9025.计算机专业英语考试时间:120分钟考场:123.15.57.116考试日期:2013-03-19大题。
择题(15道小题,共15分))is used to communicate with another computer over telephone lines.(1分)、keyboard B、modem、mouse D、printer)that ,I could do it much better.(1分)、A. If I do B、B. If I were do、C. Were I to do D、D. Were I doto translate the word "中央处理器"(1分)、central processing unit B、central progress unit、central process unit D、~A) is a device that enables the computer to handle sounds.(1分)、network B、video card、sound card D、monitor-Virus protects your computer from viruses by ( ) your computerˊs memory and disk devices.(1分)、deleting B、changing、scanning D、replacinghe system development process, modularity is a very well-established principle used in the ( ) phase.(1分)、design B、analysis、implementation D、testingdoes " neural network " mean?(1分)、精神网B、自然网络、神经网络D、社会网络attributes of the stack are ( ).(1分)、FIFO B、LIFO、queue D、built into their circuitryeas a repeater operates only in the physical layer of the OSI model, a bridge operates in both the physical layer and the ( ) l model.(1分)、Transport Layer B、Network Layer、data-link D、Physical Layerdistinction between the two terms gateway and ( ) is disappearing. They are now used interchangeably.(1分)、hu~B B、router、swtich D、gatewaymical energy, ( ) from fuel or other matters, can be transformed into heat energy.(1分)、no matter how B、whether、if or not D、not considered thatdows gives you more control over the ( ) you work.(1分)、operation B、way、energy D、powerse days it is not uncommon for one to see people using ( ) everywhere--even on airplanes.(1分)、laptops B、desktops、minicomputers D、microcomputersabbreviation USB stands for Universal ( ) Bus.(1分)、Serial B、Sequential、Symmetric D、Syntacticlooks as though there ( ) some problems with my computer. Because it is so slow.(1分)、was B、were、has been D、had been择题(15道小题,共45分)-level languages are commonly classified as ( ). (3分)、procedure-oriented B、functional、logic languages D、object-oriented、automaticve Directory supports ( ). (3分)、delegation of administrative task B、granular access control、encapsulation D、inheritancewant to ( ) maybe wake up a virus that has residented in memory. (3分)、copy a file B、access a diskette、execute a program D、del( )ete a fileve Directory can help you ( ). (3分)、deliver complete enterprise security by itself B、build a complex international network、manage every resource with a single logon D、get off the limits of down level networks ses can delay their attack for ( ). (3分)、days B、weeks、months D、yearswork with two fundamentally different types of geographic models.They are the ( ). (3分)、vector model B、geography model、data model D、mathematic model、raster modelequipment ( ). (3分)、manipulates digital information internally in serial form B、manipulates digital information internally in word un、transfers the number of bits in parallel D、transfers the number of bits in serial formows 2000 has the key technologies, they are ( ). (3分)、flat directory B、security、active directory D、enterprise managementrding to the text,the author mentions three of the most commonly used types of printer.They are ( ). (3、laser printer B、dot-matrix printers;、array printer D、inkjet printers、belt printerApplication layer in TCP/IP Model is correspond to ( ) in OSI Model (3分)、Application Layer B、Presentation Layer、Session Layer D、Transport Layer、Network Layerormation Systems has a number of different areas of work: (3分)、Information Systems Strategy B、Information Systems Management、Information Systems Development D、Information Systems Implement) provides transparent transfer of data between end users, providing reliable data transfer services to the uppee Transport Layer B、Session Layeresentation Layer D、Application Layertwork Layerch is the threat to computer security in the following choices ? (3分)、Computer Criminals B、Computer Crime、earthquake D、Human Errorsstack protocol can be used for ( ). (3分)、subroutine calls B、operation of arithmetic expressions、removing the latest element ins( )erted D、removing the earliest element ins( )erted ues that occur everyday life can be seen ( ). (3分)、in an emergency room of a hospital B、in certain societies lacking equality、as people waiting for service at a bank D、as automobiles waiting for a traffic light(2道小题,共40分)篇短文介绍计算机语言的发展历史和特点,要求简单介绍机器语言、汇编语言、高级语言的简单发展历程和各自的特点)。
计算机专业英语
计算机专业英语专业英语习题_7c解释⼀下为啥之前的删了呢?我刚刚考研结束,发现⾃⼰没啥⼈关注,也没啥浏览量,就以为没⼈看,觉得⾃⼰⼜隔这⾃⾔⾃语呢,本着随缘佛系的⼼态就删了;直到很多⼈私信我,我才知道原来是有⼈需要的呀,感谢⼤家的信任!再解释⼀下,题⽬来源问题,部分来⾃课后习题,部分来⾃本校⾬课堂,都是⾃⼰⼀句⼀句从上⾯⽂字识别下来的;⾄于翻译呢,是⾃⼰⼀句⼀句百度啊有道啊啥的⽹站翻译的;答案准确度问题,⾬课堂习题的答案是由⽼师发布的标准答案答案,课后习题答案是⾃⼰从⽹上各种搜索以及结合⾃⼰对课本的理解与把握填上去的,是真的费事,但值得。
有问题随时交流哦,另外也整理了仅含的课后习题版本也发步了哦,新调了下格式⽅便⼤家复习使⽤。
第1章信息技术、互联⽹和你⾬课堂Chapter 01 Lesson testWhich part is the most important of an information system? 信息系统的哪个部分是最重要的? People √ ⼈Which part of an information system consists of the rules or guidelines for people to follow? 信息系统的哪⼀部分包含了⼈们要遵循的规则或指导⽅针? Procedures √ 程序Which part is the second most important of an information system? 哪个部分是信息系统的第⼆重要部分? Data √ 数据[Software] is another name for a program or programs.The Purpose of software is to convert [data](unprocessed facts)into[information](processed facts)软件是程序或程序的另⼀个名称项⽬。
2020年计算机统考 大学英语B题库1
C. nothing
A. more
第八篇:OnceJames Thornhill, a famous English painter,
47.We are going to have a singing party tonight.
A. I’m afraid not, because I have to go to an important meeting
48.Wow! This is a marvelous room! I’ve never known you’re so artistic.C. Thanks for your compliments.
B. People who***
C. renting a***
B. having spent***
A. their life was***
C. escape from***
第七篇:Oneday a bookseller (书商)
B. His foot was***
C. to go to see the doctor
8.The French RBBAB
9.There were once many sheiks (阿拉伯酋长)AABBA
10.There was once an ant that was very thirsty.BABAA
题型二:请从A、B、C、D四个选项中选择一个正确答案(11-15)
37.Must I take a taxi?
D. don’t have to
38.Paul,_________?B. who’s talking over there
39.Please help yourself to the seafood.D. Well, I’m afraid I don’t like the seafood.
计算机专业英语
计算机专业英语(总分:45.00,做题时间:90分钟)一、{{B}}单项选择题{{/B}}(总题数:41,分数:45.00)1.The Web Browser is a simple program that enables a computer to ______ and view pages on the Web.(分数:1.00)A.downfallB.downgradeC.downwardD.download √解析:题目的大意是说:网页浏览器是一种能够使计算机下载并显示网页的简单程序。
选项中提供的几个单词的拼写比较接近,只有download(下载)比较符合题意。
downfall是坠落的意思,downgrade是下坡、降级的意思,downward是向下的意思。
2.E-mail is a fast, cheap and convenient way to ______ messages locally and internationally. (分数:1.00)A.give and getB.put and getC.send and receive √D.get in and get out解析:题目的大意是说:电子邮件是一种收发本地和全球信息的快速、廉价、方便的方式。
收发电子邮件使用send and receive(发生和接收),其他三种写法不适合用在收发电子邮件中。
3.Header and footer are strings of text that are placed at the ______ of each page of a document. (分数:1.00)A.left or rightB.up or downC.above or belowD.top or bottom √解析:题目的大意是:页眉和页脚是放在文档每一页顶部和底部的字符串。
在计算机屏幕或纸张等介质上,上下和左右分别使用top or bottom和left or right。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
计算机英语考试题库1. 选择题(1) Which of the following is NOT an example of a programming language?a) Pythonb) Javac) HTMLd) CSS(2) What does CPU stand for?a) Central Processing Unitb) Control Processing Unitc) Computer Programming Unitd) Central Programming Unit(3) Which of the following is NOT a type of malware?a) Virusb) Trojanc) Routerd) Worm(4) What does HTML stand for?a) Hyperlink Text Markup Languageb) Hyper Text Markup Languagec) High Text Markup Languaged) Hyperlink Text Manipulation Language(5) What is the purpose of a firewall?a) To block access to websitesb) To protect against malware attacksc) To increase internet speedd) To encrypt confidential data2. 填空题(1) The process of converting source code into machine code is called ___________.(2) TCP stands for ___________.(3) ___________ is a programming language commonly used for web development.(4) RAM stands for ___________.(5) A ___________ is a unique identifier for a network adapter.3. 简答题(1) What is the difference between hardware and software in a computer system?Hardware refers to the physical components of a computer system, such as the monitor, keyboard, and motherboard. Software, on the other hand, refers to the programs and data that are stored on the computer and control its operations. Hardware is tangible and can be seen and touched, while software is intangible and cannot be physically interacted with.(2) What is the purpose of an operating system?An operating system (OS) is a software that manages computer hardware and software resources and provides common services for computer programs. Its purpose is to facilitate the execution of user programs and make it easier for users to interact with the computer. The OS handles tasks such as process management, memory management, file management, and device management.(3) Explain the concept of object-oriented programming.Object-oriented programming (OOP) is a programming paradigm that organizes data and behaviors into objects, which are instances of classes. A class defines the structure and behavior of objects, and objects can interact with each other through methods and attributes. OOP promotes modular and reusable code, as well as encapsulation and abstraction of data. This approach allows for more efficient and easier development, maintenance, and modification of software systems.4. 问答题(1) What are the main programming paradigms?The main programming paradigms include:- Procedural programming: Focuses on procedures or routines that manipulate data.- Object-oriented programming: Focuses on organizing data and behaviors into objects.- Functional programming: Focuses on using mathematical functions and avoids changing state and mutable data.- Logical programming: Focuses on using logical rules and constraints to solve problems.- Imperative programming: Focuses on expressing computation steps explicitly and changing program state.- Event-driven programming: Focuses on handling events and responding to user actions or system events.- Parallel programming: Focuses on executing tasks concurrently to improve performance.(2) What are the differences between HTTP and HTTPS?HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) are both protocols used for communication over the internet. The main differences are:- Security: HTTP is not secure and data is transmitted as plain text, making it vulnerable to interception and manipulation. HTTPS encrypts data using SSL/TLS protocols, providing confidentiality and integrity.- Port: HTTP uses port 80 by default, while HTTPS uses port 443.- Certificate: HTTPS requires a digital certificate from a trusted Certificate Authority (CA) to establish a secure connection. HTTP does not require a certificate.- Speed: HTTPS may be slightly slower than HTTP due to the encryption and decryption processes.5. 名词解释(1) Firewall: A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, preventing unauthorized access and protecting against malware and other cyber threats.(2) Cache: In computing, a cache is a high-speed data storage layer that stores frequently accessed or recently used data. It serves as a temporary storage to improve data retrieval speed and reduce latency. Caches can be found at different levels in a computer system, such as CPU cache, web browser cache, and DNS cache.(3) Algorithm: An algorithm is a set of step-by-step instructions or rules used to solve a problem or perform a task. It provides a clear and unambiguous method for solving a problem, and it is an essential concept in computer science and programming. Algorithms can be represented using pseudocode, flowcharts, or programming languages.(4) Encryption: Encryption is the process of converting plain text or data into a coded form, known as ciphertext, using an encryption algorithm and a secret key. It ensures the confidentiality and integrity of data by making itunreadable to unauthorized users. Encryption is widely used in data transmission, online banking, and secure communication.(5) Database: A database is an organized collection of structured data stored and accessed electronically. It is designed to efficiently store, retrieve, and manage large volumes of data. Databases are used in various applications, such as e-commerce, customer relationship management (CRM), inventory management, and more.。