《计算机专业英语》第09章在线测试
计算机专业英语教程参考答案
计算机专业英语练习参考答案Unit 1[Ex 1]1..F2.T3.T4.F5.T6.T7.T8.T9.T 10.F[Ex 2]1.input, storage, processing, and output2. power, speed, memory3. central processing unit4. internal, primary, memory5. keyboard, central processing unit, main memory, monitor[Ex 3]A. 1.F 2.D 3.G 4.C 5.B 6.E 7.H 8.AB. er 2.monitor 3.data 4.keyboard 5.data processing 6. information puter 8.memory [Ex 4]1.input device2. screen, screen3.manipulates4.instructions5.retrieve6.code7.hard copy8.function/code/instruction[Ex 5]1.T2.T3.F4.F5.T6.F7.T8.FUnit 2[Ex 1]1.T2.F3.T4.F5.T6.T7.T8.F[Ex 2]1. sizes, shapes, processing capabilities2. supercomputer, mainframe computer, minicomputers, microcomputers3. mainframe computer4.microcomputers, storage locations5. portables, laptop computers/ notebook/palm-sized computer, desktop workstations6.semiconductor7. CPU, memory, storage, devices, processing, users8. microprocessor ship[Ex 3]A. 1.C 2.A 3.H 4.I 5.E 6.F 7.G 8.BB. 1.capacity 2.device ptop computer 4.portable computers5.silicon6. semiconductor7.workstation8.voltage9.RAM 10.ROM[Ex 4]1. portable2.access3. main memory4.sophisticated programs5. processing capabilities6.instructions7.semiconductor putationputer professional[Ex 5]1.T2.T3.T4.F5.F6.T7.F8.T9.F 10.T 11.F 12.T 13.T 14.TUnit 3[Ex 1]1.T2.F3.T4.T5.T6.T7.F8.F9.T 10.F 11.T 12.F[Ex 2]1.microprocessor2.bus3.registers4.control unit5.processor6.binary7.arithmetic, logicalliseconds, microseconds, nanoseconds. 9.instruction 10.execution 11.megaherts 12.wordsize[Ex 3]A. 1.J 2.D 3.F 4.B 5.C 6.E 7.I 8.H 9.A 10.GB. 1.storage 2.chip 3.registers 4.ALU 5.bus 6.control bus 7.machine language 8.binary system9.bits 10. computer program[Ex 4]1. configuration2. converts3.data bus4.characters5.converts6.synchronize7.circuitry8.internal clock [Ex 5]1.T2. F3.F4.T5.T6.F7.T8.T9.T 10.FUnit 4[Ex 1]1.F2.T3.T4.T5.F6.T7.F8.T9.T 10.F 11.T 12.T 13.F 14.F 15.T 16.F 17.T 18.F 19 T 20.F 21.T 22.F [Ex 2]1. main memory2.RAM3.diskettes/floppy disks; hard disks4.chips5.parity6.expanded,extended7.monochrome 8.cache 9.ROM 10.updated[Ex 3]A. 1.B 2.E 3.C 4.J 5.I 6.H 7.A 8.F 9.G 10.DB. 1.secondary storage 2.buffer 3.access 4.code 5.diskette 6.slots 7.terminals 8.motherboard9.bytes 10.screen[Ex 4]1.desktop2.software3.animation4.transferred5.sophisticatedpatible7.cache8.upgrade[Ex 5]1.T2.F3.T4.T5.F6.T7.F8.T9.T 10.T 11.T 12.T 13.T 14.F 15.F 16.TUnit 5[Ex 1]1.T2.F .3.F4.F5.T6.T7.T8.F9.F 10.T 11.F 12.F 13.T 14.T[Ex 2]1.floppy disks2.disk drive3.revolutions4.bits5.megabytes, gigabyte, terabyte6.density7.sectors8.1.44 [Ex 3]A. 1.H 2.F 3.E 4.D 5.C 6.A 7.B 8.GB. 1.read/write heads 2.read/write heads 3.magnetic tape 4.index 5.disk drivers 6.format 7.clone 8.tracks [Ex 4]1.increment2.spins3.activate4.specification5.magnetize6.overwrite7.contaminated8.mechnism [Ex 5]1.T2.F3.F4.F5.T6.T7.F8.T9.T 10.T 11.F 12.F 13.T 14.T 15.F 16.T 17.F 18.T 19.T 20.TUnit 6[Ex 1]1.F2.T3.F4.T5.T6.T7.F8.T9.T 10.F 11.F 12.F 13.T 14.Fpatible2.hardcopy3.terminal,monitor4.inked ribbon5.line6.Thernal7.Monochrone8.liquid crystal display[Ex 3]A 1.G 2.B 3.I 4.F 5.D 6.H 7.C 8.E 9.J 10.AB 1.printers 2.hard copy 3.CRT 4.hardware 5.pixel 6.output 7.software 8.Line printers 9.plotters10.graphics[Ex 4]1. are attachedpatible3.flexible4.mechanism5.perform6.rotate7.transfer8.video[Ex 5]1.T2.T3.T4.T5.T6.F7.T8.F9.F 10.T 11.T 12.F 13.T 14.T 15.T 16.T 17.F 18.TUnit 7[Ex 1]1.T2.F3.T4.T5.F6.F7.T8.T9.F 10.F 11.F 12.T 13.F 14.T 15.T 16.F 17.T 18.T 19.F 20.F[Ex 2]1.printers, plotters2.graphics3.pins4.pages per minute5.dots per inch6.lines per minute7.non-impact 8.carbon[Ex 3]A. 1.D 2.F 3.B 4.A 5.G .6.E 7.C 8.HB. 1.print wheel 2.Microcomputers 3.ink-jet printer work 5.noise 6.output device7.desktop publishing 8.dot-matrix printers[Ex 4]1.installation2.categorized3.image4.ribbon5.monochrome6.physical7.referred to8.dot[Ex 5]1.F2.T3.F4.T5.F6.T7.F8.T9.T 10.F 11.F 12.T 13.T 14.T 15.FUnit 8[Ex 1]1.T2.T3.F4.T5.T6.T7.F8.T9.F 10.T 11.F 12.F 13.T 14.T 15.F 16.T[Ex 2]1.inputting2.dumb, smart, intelligent3.dumb4.smart5.intelligent6.point-of-sale, automated teller machine7.POS8.terminals9.portable 10.moderms 11.transmitted municate[Ex 3]A. 1.G 2.E 3.A 4.F 5.C 6.B 7.H 8.DB. 1display screen 2.programming 3.telecommunications 4.function keys 5.retrive 6.minicomputers7.moderm 8.automated/automatic[Ex 4]1.intelligent2.verify3.Programmable4.specialized5.identify6.built-in7.high-volume8.are transmitted [Ex 5]1.T2.T3.F4.T5.F6.T7.F8.T9.T 10.T 11.T 12.F 13.T 14.TUnit 9[Ex 1]1.T2.T3.F4.T5.F6.F7.T8.T9.F 10.F 11.T 12.F 13.T 14.F 15.T 16.T 17.T 18.F[Ex 2]1.channels2.electrical pulses or charges, electromagnetic waves, pulses of light3.telephone lines, coaxial cables, microwave systems, satellites systems, fiber optic cables4.telephone linesworks6.atmosphere7.microwave tower8.gigahertz9.digital 10.lightB. 1.noise 2.trnasmission 3.Fiber optics 4.Microwave 5.synchronous 6.optical media7.Coaxial cable 8.digits[Ex 4]municate2.revolves3.detect4.encrypted5.nonconductive6.optical media7.susceptible8.relayed 9.antenna 10.pulses[Ex 5]1.F2.T3.T4.F5.T6.T7.T8.F9.T 10.T 11.F 12.T 13.T 14.T 15.F 16.T 17.T 19.F 20.T 21.F 22.T Unit 10[Ex 1]1.F2.F .3.F4.T5.T6.F7.T8.F9.T 10.T 11.F 12.F 13.T 14.T 15.T 16.F[Ex 2]1.three-dimensional2.joystick3.transmitter4.frames5.virtual[Ex 3]A. 1.C 2.G 3.D 4.H 5.B 6.F 7.A 8.EB. 1.sensors 2.virtual reality 3.software package 4.host computer 5.joystick 6.mouse 7.input 8.transmitter [Ex 4]1.Conveying2.responds3.incorporate4.signals5.performance6.mounted7.cumbersome8.insert[Ex 5]1.T2.f3.T4.F5.T6.T7.T8.T9.F 10.T 11.T 12.T 13.F 14.T 15.T 16.F 17.F 18.F 19.T 20.F 21.F 22.F 23.T 24.T 25.TUnit 11[Ex 1]1.F2.T3.F4.F5.T6.T7.F8.F9.T 10.T 11.F 12.T 13.F 14.T 15.T[Ex 2]1.caller2.audio boards3.directory4.clicking5.IRC[Ex 3]A. 1.F 2.A 3.G 4.B 5.H 6.C 7.I 8.D 9.J 10.EB. 1.update 2.hard disks 3.Audio boards 4.directory 5.menu 6.ports 7.download 8.online9.icon 10.bug[Ex 4]1.fixes2.register3.specify4.created5.remove6.installed7.execute8.to load[Ex 5]1.T2.F3.T4.T5.F6.T7.T8.F9.T 10.F 11.T 12.F 13.T 14.TUnit 12[Ex 1]1.F2.T .3.T4.T .5.F6.F7.T8.T9.F 10.T[Ex 2]pressed2.specify3.screen4.wide5.attributes6.optional7.directory8.subdirectories9.lowercase 10.wildcards 11.prompt 12.target[Ex 3]A. 1.H 2.D 3.G 4.C 5.F 6.B 7.E 8.AB. 1.execute 2.prompt 3.file 4.format 5.backup file pressed 7.parameter 8.lowercase[Ex 4]1.is displayed2.archive3.attribute4.default5.subdirectory6.extension7.abbreviated8.lowercaseUnit 13[Ex 1]1.T2.F .3.F4.T5.T6.T7.T8.F9.T 10.F 11.T 12.F 13.T 14.T 15.T 16.F 17.T 18.F 19.T 20.T[Ex 2]1.executable2.configure3.variables4.download5.double click6.performance7.explorer8.customize 9.log 10.feature[Ex 3]A. 1.A 2.F 3.B 4.G 5.C 6.D 7.E 8.HB. 1.utility program 2.documentation 3.spreadsheet piled 5.virus scanner 6.configuraiotn7.features 8.Viruses[Ex 4]1.infect, being detected2.customized3.folders4.optimizes5.highlighted6.reveal7.prompt8.license[Ex 5]1.T2.F3.T4.F5.T6.T7.T8.F9.F 10.T 11.F 12.T 13.T 14.F 15.F 16.F 17.T 18.T 19.F 20.TUnit 14[Ex 1]1.T2.F .3.T4.F5.F6.F7.T8.F9.T 10.T 11.F 12.T 13.F 14.T 15.T 16.T 17.T 18.T[Ex 2]1.duplicate2.destination3.entriespound, single-entry5.overwrite6.array7.one-dimensional8.two-dimensional9.arrays, table/.DBF[Ex 3]A. 1.E 2.D 3.B 4.C 5.AB. 1.record 2.backup 3.field 4.tables 5.array[Ex 4]1.duplicate2.specific3.source, destination4.current5.path6.assign7.original8.dialog[Ex 5]1.F2.F3.T4.F5.F6.F7.F8.F9.F 10.F 12.FUnit 15[Ex 1]1.F2.T3.T4.T5.F6.T7.T8.T9.F 10.F 11.F 12.T 13.F 14.T[Ex 2]1.browse2.sub-directory3.copyrighted4. custom-written5.unzip6.atrribute7.automatically8.decompressed[Ex 3]A. 1.F 2.G 3.H 4.C 5.D 6.A 7.B 8.EB. 1.profile 2.batch program work-aware program 4.copyright 5.browse 6.platform 7.kit 8.zip [Ex 4]1.formatunch3.Custompressed5.unzip6.licensed7.test-run8.page mode[Ex 5]1.T2.F3.T4.F5.F6.F7.T8.F9.F 10.T 11.T 12.T 13.F 14.T 15.F 16.T 17.F 18.F 19.F 20.T 21.F 22.FUnit 16[Ex 1]1.T2.T3.T4.F5.T6.T7.F8.T 10.F 11.T 12.F[Ex 3]1.entitled2.impractical3.paper4.major5.conveying6.eminet7.suffice8.programming languagepilers 10.to lament 11.coincide 12.successive[Ex 4]1.stumbled across2.were appalled at3.making4.was leveled5.analogous6.in futility7.confusion 8.is focused on[Ex 5]1.F2.T3.T4.T5.F6.F7.T8.T9.F 10.T 11.F 12.T 13.F 14.T。
计算机专业英语试题含答案
1 6.计算机专业英语试题 2I . Vocabulary (词汇)(30 分)(一) .Tran slate the follow ing words and expressio ns into Chi nese (写出下列词组的 汉语。
)(共 10 分,每题 1 分)1. operati ng system _______________________________2. white box testi ng _______________________________3. hard disk ________________________________4. man ageme nt in formatio n system ______________________________5. electr onic commerce _______________________________6. relati onal database ________________________________7. software engin eeri ng ______________________________8. .software maintenance _________________________________9. menu bar10. network security(二) .Fill in the blanks with the corresponding English abbreviations. (根据汉语写出相应的 英语缩写。
)(共 10分,每题1分)2. _ 广域网4 .文件传送[输]协6 .面向对象编程8 .结构化查询语言10 .开放系统互(三) Match the following words and expressions in the left column with those similar in meaning in the right 1. applicati on software a. 音频2. mach ine Ian guage b. 应用软件3. structured program ming c. 机器语言4. functional test ing d. 软件测试5. memory e. 结构化程序设计6. relati onal database f. 内存7. firewall g. 功能测试8. software test ing h. 关系数据库9. hacker i. 黑客10. audio j. 防火墙column.(将左列的词汇与右列相应的汉语匹配。
计算机专业英语(computing essentials)第九章key terms
coaxial cable (244) Communication channel (244) Communication system (243)
computer network (251) connectivity (242)
(254) microwave (245)
modem (247) modulation (247) network administrator (251, 264) network gateway (253) network hub (255)
dispersed locations. A system in which computing power is located and shared at different locations. Converts text-based addresses to IP addresses The most common way in which nodes can be connected to one another and communications can be controlled. A modem that stands apart from the computer and typically is connected by a cable to the computer’s serial port. A private network that connects more than one organization. Transmits data as pulses of light through tiny tubes of glass. A security system designed to protect an organization’s network against external threats. Global positioning system (GPS) devices use location information sent by satellites to uniquely determine the geographic location of the device. Consists of several computers linked to a central host computer, but also are hosts to other, smaller computers or peripheral devices. Local Area Networks used by individuals in their homes and apartments. A large centralized computer, usually a minicomputer or a mainframe. The center or central node for other nodes. A type of wireless connection that uses infrared light waves to communicate over short distances. A modem that consists of a plug-in circuit board inside the system unit. A private network within an organization that resembles the Internet. A unique numeric address for every computer on a network. Networks with nodes that are in close physical proximity Used for standard telephone communication. (see also voiceband) the bandwidth used in special leased lines to connect minicomputers and mainframes
计算机专业英语翻译及课后答案
Unit Nine: The InternetUnit Nine/Section AI. Fill in the blanks with the information given in the text:1. research2. ICANN或the Internet Corporation for Assigned Names and Numbers3. router; gateway4. temporary/dial-up; permanent/dedicated5. ISP或Internet service provider6. network; host7. decimal8. mnemonicII. Translate the following terms or phrases from English into Chinese and vice versa:1. cell phone 蜂窝电话,移动电话,手机2. IP address 网际协议地址,IP地址3. autonomous system 自主系统4. dial-up connection 拨号连接5. network identifier 网络标识符6. binary notation 二进制记数法7. mnemonic name 助记名,缩写名8. Internet-wide directory system 因特网范围的目录系统9. name server 名称服务器10. Internet infrastructure 因特网基础结构11. 助记地址mnemonic address12. 网吧cyber cafe13. 宽带因特网访问broadband Internet access14. 顶级域名top-level domain (TLD)15. 因特网编址Internet addressing16. 点分十进制记数法dotted decimal notation17. 因特网服务提供商Internet service provider (ISP)18. 专用因特网连接dedicated Internet connection19. 主机地址host address20. 硬件与软件支持hardware and software supportIII. Fill in each of the blanks with one of the words given in the following list, making changes if necessary:Early computer networks used leased telephone company lines for their connections. Telephone company systems of that time established a single connection between sender andreceiver for each telephone call, and that connection carried all data along a single path. Whena company wanted to connect computers it owned at two different locations, the company placed a telephone call to establish the connection, and then connected one computer toeachend of that single connection.The U. S. Defense Department was concerned about the inherent risk of thissingle-channel method for connecting computers, and its researchers developed a differentmethod of sending information through multiple channels. In this method, files and messagesare broken into packets that are labeled electronically with codes for their origins, sequences,and destinations. In 1969, Defense Department researchers in the Advanced Research ProjectsAgency (ARPA) used this network model to connect four computers into a network called theARPANET. The ARPANET was the earliest of the networks that eventually combined to become what we now call the Internet. Throughout the 1970s and 1980s, many researchers inthe academic community connected to the ARPANET and contributed to the technological developments that increased its speed and efficiency.IV. Translate the following passage from English into Chinese:因特网只是提供了将许许多多的计算机连接在一起的物理与逻辑基础结构。
计算机专业英语试题及答案
计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hackeri. 黑客 10. switchj. 防火墙1. 6.2. 7.3. 8.4. 9.5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
《计算机专业英语》习题参考答案
《计算机专业英语》习题参考答案Lesson 1I.1. Operating System2. Fetch-evaluate-execute3. Front-side bus4. Dual-core processor5. Basic Input/Output System(BIOS)II.1. 指令是特定各式的二进制数列,它们对于每台机器都是唯一的。
2. CPU是中央处理单元的简称,每个字母分开发音。
3. 大多数计算在中央处理器中进行。
4. 双核是指一个处理器上有两个完整运算内核的CPU。
5. 处理器:是微处理器或CPU的缩写。
6. 集成电路:即芯片,是由半导体材料制成的一种电子设备。
III.1. F2. T3. TIV.1.ALU, CU, Register2.memory3.processor4.the CPULesson 2I.1.Static Random Access Memory(SRAM)2.Dynamic Random Access Memory(DRAM)3.Virtual Memory4.Physical Memory5.Level 1 Cache6.Level 2 Cache7.HDD access speedII.1.动态随机存储器之所以称为“动态”是因为它每秒钟被刷新数千次。
2.RAM:是计算机中存储操作系统、应用程序和当前正是用数据的地方。
3.ROM由计算机中一小块长寿命电池供电。
4.RAM缓存是由高速静态随机存储器构成的存储器。
III.1. F2. F3. F4. TIV.1. non-volatile2. compiler3. volatile4. DRAMLesson 3I.1. Motherboard2. PC Case3. Hard Disk Drive(HDD)4. Optical mouse5. RAM6. Mobile DiskII.1.PC是有很多组件构成的一个系统。
《计算机专业英语》答案
《计算机专业英语》参考答案Chapter 1 Computer ScienceText AExercises2.(a)out (b)with (c)in (d)in (e)in (f)with (g)for (h)aboutText BExercises3.(a)to (b)now (c)in (d)with (e)out (f)uponText CExercises1.(1)analyze, analytic (2)complicate, complex (3) collaborate, collaborative (4)vary, various (5)introduce, introductory (6)base, basic (7)create, creative (8)differ, different (9)free, freeChapter 2 Discrete Mathematics for Computer ScienceText AExercises1.C48 =70,C38 =562.6*25=1923.if a=0then i f b=0then return(0)else return(1+Add(0,b-1))else if b=0then return(1+Add(a-1,0))else return(1+1+Add(a-1,b-1))4.if Rest(S)=Øthen return(First(S))else if (First(S)<Largest(Rest(S)))return(Largest(Rest(S)))else Return(First(S))5.Now we can define function Concat(S1,S2) as:if(Length(S1)=0)then return(S2)else return(Cons(First(S1), Concat(Rest(S1),S2)))Text BExercises1.[Proof]:According to given conditions, we knowa n = a n-1 + 2na n-1 = a n-2 + 2(n-1)……a2 = a1 + 2*2a1 = 3sum all items in left side, and delete same items in the right side of equations, we can result thata n = 3 + 2(2+3+……+n-1+n)=1+n(n+1)=n2+n+1that is what we conclude.Text CExercises1.(1)depend, dependent (2) correspond, correspondent (3)grow, grown (4)solve, solvent (5) relate, relational (6)recur, recursive (7) validate, valid (8) conclude, conclusive (9) justify, justificative2.(1)connect-disconnect (2)possible-impossible (3)regular-irregular (4)measure-countermeasureChapter 3 Algorithms in the Real WorldText AExercises2. finite, solving, processing, effective, eventually, next, randomly3. by, in, on, in, on, from4. the algorithm can terminate.It is correct for sorting.If the length of array A is n, the time for computation is O(n2)Its memory cost n units.As n increase, its computational cost will become large.Text BExercises3.(1)—(e), (2)—(c), (3)—(d), (4)—(a), (5)—(b)4. inconvenience, incapacity, independence5.We couldn’t have lived without water.Chapter 4 Dictation SystemText AExercises2. forefront, institution, turnaround, boost, embrace, portfolio, handle, portable, issue, stringent3. off, on, from, into, in, to, over, to, on, toText BExercises2.(1)—(h), (2)—(g), (3)—(a), (4)—(j), (5)—(e), (6)—(f), (7)—(b), (8)—(i), (9)—(c), (10)—(d) Text CExercises3. organize,organizationaldictate,dictativeproduce,productiveadministrate,administrativetranscribe, transcriptivesimplify,simplicialimplement,implementativeprotect,protectiveChapter 10 Introduction to ComputersText AⅠ.1. hardware, software2. a Central Processing Unit (CPU), memory, an input device, an output device3. Input devices, Output devices4. An input device5. application software, system softwareⅡ.1. hardware 6. integrated circuit2. software 7. secondary storage3. a Central Processing Unit (CPU) 8. computer system4. application software 9. main memory5. operating system 10. scannerText BⅠ.1. The WYSIWYG2. cell3. finding, fixing4. Formulas5. headings across the top6. character, word, phraseⅡ.1. true 6. false2. true 7. false3. true 8. true4. true 9. true5. false 10. falseText C当使用计算机的时候,你必须知道与它“交流”。
计算机专业英语Unit-9
计算机专业英语Unit-9Unit 9 Computer VirusText 1 Virus IntroductionExercises1. Multiple choices.(1)A virus is a ( A ).A. programB. computerC. bad manD. beast(2)A virus is a program that reproduces itsown code by ( ABC ).A. adding to the end of a fileB. inserting into the middle of a fileC. simply placing a pointerD. replacing another program(3)( AD )is a type of executable file .A. COM fileB. TXT fileC. JPG fileD. EXE file(4)Similar to viruses, you can also findmalicious code in ( ABC ).A. Trojan HorsesB. wormsC. logic bombsD. Microsoft Word Documents2. Fill in the blanks.(1)A virus is a program that reproduces itsown code by attaching itself to otherexecutable files in such a way that thevirus code is executed when the infectedexecutable file is executed .(2)To attach might mean physically addingto the end of a file, inserting into themiddle of a file, or simply placing apointer to a different location on the disksomewhere where the virus can find it. (3)Similar to viruses, you can also findmalicious code in Trojan Horses, worms,and logic bombs.3. Translate and analyze thefollowing sentences.(1)These self-replicating codes, when caused3by some event, may do a potentiallyharmful act to your computer.句子组成:when引导时间状语从句做插入语,当…的时候.翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的计算机有潜在危害的行为.(2)More recently, scripts written for Internetweb sites and/or included in E-mail canalso be executed and infected.句子组成:scripts written…省略的定语从句完整形式scripts which were writtened….翻译:现在,为网站编写的或者包括在E-mail 中的脚本也能够被执行和感染。
计算机专业英语试题及答案(B卷)
计算机专业英语试题及答案(B卷)湖北职业技术学院2008-2009学年度第一学期期末考核试卷考核课程:《计算机专业英语》考试类型:理论考试方式:闭卷笔试学生所在院系:信息技术学院年级: 2007级试卷: B姓名:班级:学号:Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%)1. 机器语言 ( )2. 随机存取存储器 ( )3. 汇编语言指令 ( )4. 软件产品 ( )5. 取指—译码—执行( )6. 面向服务的 ( )7. 电子媒介 ( )8. 感染模块 ( )9. 分辨率 ( )10. 硬件维护 ( )Ⅱ. Match the following words and expressions in the leftcolumn with those similar in meaning in the right)(10%)1. output devices a. 操作系统2. silicon b. 扩展存储器3. expanded memory c. 硅4. database administrator d. 输出设备5. operating system e. 汇编语言6. assembly language f. 数据库管理员7. gateway g. 数字图像处理8. laser technology h. 网关9. digital image processing i. 作业队列10.job queue j. 激光技术1. () 6. ()2. () 7. ()3. () 8. ()4. () 9. ()5. () 10.()Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)1. 广域网 _________ 6. 网络服务提供商 _________2. 超文本传输协议_________ 7. 可扩展标记语言_________3. 计算机辅助设计_________ 8. 基本输入输出系统_________4. 万维网联盟_________ 9. 信息技术_________5. 数据库管理系统_________ 10. 万维网__________Ⅳ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15 %)1. _________ refers to the number of individual dots of color, known as pixels, contained on a display.A. Dot PitchB. ResolutionC. Refresh RateD. Scan Style2. A processor is composed of two functional units, they are _________.A. an arithmetic/logic unit and a storage unitB. a control unit and some registersC. a control unit and an arithmetic/logic unitD. some registers an arithmetic/logic unit3. _________ is a storage location inside the processor.A. A registerB. ALUC. ControlD. Memory4. A periodic refresh is needed to restore the information for the _________ .A. SRAMB. DRAMC. EPROMD. EEPROM5. The raw data are stored on the disk using the _________ .A. data dictionaryB. file systemC. DBMSD. DBA6. The _______ serves as an interface between hardware and software.A. systemB. application programC. operating systemD. control unit7. Most operating system have a standard set of _________ to handle the processing of all input and output instructions.A. spreadsheetB. control instructionsC. I/O operationD. data table8. _________ uses commands that are easier for programmers to understand than are machine language commands.A. Assembly languageB. High-level languageC. C languageD. C++ language9. When a _________ is used, all the devices in the network are connected to a single cable.A. bus networkB. ring networkC. star networkD. network10. Two common applications of LANs are _________ resource sharing and information resource sharing.A. softwareB. computerC. networkD. hardware11. With Internet Explorer and an Internet connection, you can search for andview information on the ________.A. Active DesktopB. ProgramsC. Phone DialerD. World Wide Web12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. E-commerce does business through _________.A. face-to-face meetingB. computerC. wire-photoD. Internet and EDI14. Every transaction in electronic commerce includes information flow, commercial flow, _______ and material flow.A. data flowB. currency flowC. merchandise flowD. file flow15. Many companies use _________ to train their employees.A. technologyB. entertainmentC. multimedia applicationsD. animation(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)requirements maintain disciplinedcoding modifySoftware Engineering, which means the application of engineering to software, is a method to develop, operate and ________ software. That is, the development of software is on a systematic, _________, quantitive basis. Before starting the development of software, you have to systematically approach the problem. You have to understand the _________ (what the software is supposed to do), carry out the design, do the _________, carry out a rigorous testing and if the software is as per the requirements, release the software to the customer. Subsequently, if the customer wants some changes--refinements or enhancements then the software has to be _________. Passage A The central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, which its speed and capacity have increased tremendously. Indeed, these changes have resulted inmicro-Computers that are small enough to fit on your desk and your lap.The CPU comprises the control unit and the arithmetic/logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signalsbetween main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices.The ALU performs all the arithmetic and logical(comparison) functions—that is,it adds, subtracts, multiplies, divides, and does comparison. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误)(10%)1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input/output devices are controlled by the control unit of the CPU. ( )3. The CPU comprises the control unit and memory. ( )4. The control unit performs all the arithmetic and logical functions. ( )5. The central processing unit (CPU) is the heart of the computer systems. ( ) Passage BA computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days. According to Business Week, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number. As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:Basic Virus a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.Trojan Horses - This is a program that doesn't replicate when entering a systembut can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.(三) Choose the best answer according to the passage B(根据上文的内容选择正确的答案)(10%)1.A computer virus is a computer program that is created to make and spread _________of itself.A. programsB. virusC. copiesD. files 2.Worm spread itself except by_________. .A. networkB. E-mailC. programD. hardware 3.Antivirus program can scan and_________ virus.A. cleanB. produceC. replicateD. make 4.Trojan Horses_________ .A.quickly replicate itself and gradually attach to files, programs or the harddrive. B.infect the computer without even having to click open email attachment or any program.C.allow hackers to take control over a particular system or to steal very important data.D.avoid the virus to attack computer.5.According to Business Week, the_________ attacks reported in the first half of 2003 nearly match previous year's total number .A. 86,404B. 76,404C. 56,354D. 34,876 Passage CIn order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer. If you want to solve the computational problem with a computer, you should learn how to program. The task of developing programs for the solution of computational problems is referred to as programming. Computer programming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise. So programming is breaking a task down into small steps.Programming is sometimes contrasted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines ofprogram text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others.What's actually involved in programming - the actual process of writing programs?Here's a quick overview of the process:· Write a program.· Compile the program.· Run the program.· Debug the program.· Repeat the whole process until the program is finished.(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)1.If you want to solve the computational problem with a computer, you should learn how to_________.A. calculateB. programC. addD. subtract 2. Computer programming is the process of planning and creating a sequence of _________ for a computer to follow.A. stepsB. processC. linesD. graphics3. The term coder is used to describe _________.A. machineB. computerC. keyboardD. person4. In order to solve a computational problem, you can let a person or a _________to do it.A. machineB. computerC. keyboardD. mouse5. Which of the following is not the stage of programming? _________.A. Write a program.B. Debug the program.C. Print the program.D. Compile the program.(一) Translate the following sentences into Chinese.(将下列句子翻译成汉语) (12%)1.SQL Server is designed to allow thousands of users to access the database at the same time and is a true client/server database system.2.An application software is any program designed to perform a specific function directly for the user or, in some cases, for another application program.3.A small network may only connect two computers inside a home to share a single printer and Internet connection4.There is free firewall software available that can run on your computer and provide a good level of protection to your network.(二) Translate the following paragraph into Chinese.(将下段文章翻译成汉语)(8%)Input Devices. Computer systems use many devices for input purpose. Some Input Devices allow direct human/machine communication, while some first require data to be recorded on an input medium such as magnetic material. Devices that read data magnetically recorded on specially coated plastic tapes or flexible or floppy plastic disks are popular. The keyboard of a workstation connected directly to or online to a computer is an example of a direct input device. Additional direct input devices include the mouse, input pen, touch screen, and microphone.Regardless of the type of device used, all are components for interpretation and communication between people and computer systems.命题教师游彦教研室主任签字【第页共页】湖北职业技术学院2008-2009学年度第一学期期末考核试卷参考答案及评分标准考核课程:计算机英语考试类型:理论考试方式:闭卷笔试学生所在院系:信息技术学院年级: 2007 试卷: B执笔人:要求:明确标注每小题或每步骤得分点要求:明确标注每小题或每步骤得分点Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%) ( 本题共10分, 每小题1分)1. machine language2. Random Access Memory3. assembly language instruction4. software product5. fetch-decode-execute6. service-oriented7. electronic media8. infecting module9. resolution10. hardware maintenanceⅡ. Match the following words and expressions in the left column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)( 本题共10分, 每小题1分)1. ( d ) 6. ( e )2. ( c ) 7. ( h )3. ( b ) 8. ( j )4. ( f ) 9. ( g )5. ( a ) 10.( i )Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)1. WAN 6. ISP2. HTTP 7. XML3. CAD 8. BIOS4. W3C 9. IT5. DBMS 10.Ⅳ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15%)( 本题共15分, 每小题1分)1. B2. C3. A4. B5. B6. C7. B8.A9. A 10. D 11. D 12. A 13 .D 14. B 15. CⅤ. Reading comprehension(阅读理解)(35%)(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)( 本题共5分, 每空1分)maintain disciplined requirements coding modified(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (10%)( 本题共10分, 每小题2分)1. ( F )2. ( T )3. ( F )4. ( F )5. ( T )(三) Choose the best answer according to the passage B.(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. C2. A3. A4. C5. B(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. B2. A3. D4. B5. CⅥ. Translation.翻译(20%)(一) Translate the following sentences into Chinese(将下列句子翻译成汉语)(12%)1. SQL服务器用于允许成前上万的用户同时访问数据库,是一个真正的客户端/服务器端的数据库系统。
(完整word)计算机专业英语试题及答案,推荐文档
计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hacker i. 黑客 10. switch j.防火墙1. 6. 2. 7. 3. 8. 4. 9. 5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
计算机专业英语习题+答案
习题+答案2.1Write T or F to each statementT6. An asynchronous device is a clocked device.T7. A latch is an asynchronous device, because it functions at arbitrary times.T8. The repetition of clock pulse can vary from very low rate to very high rate.T9. A synchronous device changes its state only on the arrival of a clock pulse.F10. A clock input may occur at any time.T11. The clock pulses are used to synchronize all operations of the shift register.T13. A unidirectional shift register is capable of shifting in one direction only.F14. In a shift-left register the serial input determines what goes into the leftmost position during the shift register.F15. To provide parallel transfer capability some additional input and output lines should be provided to the shift register.Choose the best answer for each of the following1. How can the output of a logic gate be energized?CA By changing its inputs.B By remaining its inputs unchanged.C By meeting the specific input condition.D By giving a pulse.3. A NAND gate consists of D .A an OR gate followed by an inverterB an AND gate followed by an inverterC an AND gate followed by an OR gateD an inverter followed by an AND gate4. Under what condition is the output of a two-input XOR gate logic-high?BA Its inputs are simultaneously at the same logic level.B Its inputs are simultaneously at opposite logic levels.C Its inputs are logic-low.D its inputs are simultaneously logic-high.2.2Write T or F for each statementT 1. The CPU uses the input and output units to communicate with the outside world.F2. Main memory is sometimes called external memory.F3. After execution the program and the related files of data and files of information will be retained in the main memory for later use.F4. Personal computers have not the features of the larger system..T5. Large systems offer higher processing speeds for user and return more data than PCs. F6. CPUs all size have primary storage, arithmetic logic, and the control section.F7. The output device is the heart of any computer system.T8. The input/output devices and auxiliary storage units of a computer system are called peripherals.F9. The instrument of interpretation and communication between humans and computers system of all sizes is CPU.F10 Special purpose computers can adapted to many situation by giving them an appropriate program.F11 .A minicomputer is the smallest and least expensive type of computer.T12. A special purpose computer performs only one specific task and thus lacks versatility. T13. The larger the system the greater is its processing speed, storage capacity.T14. Mainframe computers are designed to process complex scientific application.T 9. The main memory in a general-purpose computer is made up of RAM integratedcircuit chip.\F 10. When the power is turned on, the program counter is set the first address of thebootstrap loader by the software of the computer.T 11. The read-write heads contact the surface of the floppy disks.T 12. The data on a particular track will be switched automatically onto a spare track by the computer before a catastrophic failure would occur.F 14. The read write heads stay on the same track continuously when the disk drive isWorkingF 16. The possible symbols in the binary numbering system are q to 9.F 17. The decimal value of 16 is represented in 4 bits BCD as 00010101.F 18. Alphanumeric versions of BCD commonly use 6,7or 8 bits to represent characters.F 19. A 6 bit alphanumeric code can represent 128 different characters.F 22. Eight bit codes are limited to representing 128 different characters.T23. An extra check (or parity ) bit is often added to each 6, 7, or 8 bit character represented in storage so that it will be possible to detect coding errors that may occur.T24. If a computer uses an odd parity format to detect errors in character codes, thenevery valid character code will always have an odd number of 1 bits.T25. Processor comes with a unique set of operations called an instruction set.F 26. In an instruction, operands specify the function to be performed.T 27. A processor's job is to retrieve instruction from memory and perform step bystep operations,3.3 True or FalseF1 All operating systems on various computers take the same size.F 2 All operating systems were written in a low level language.T3 The user can't use the computers at all if there is no operating system on the computers.F4 The operating system exists in the lowest layer of a computer.T5 The system calls are provided by the operating system.T 6 A computer's operational software defines the schedule of jobs awaiting execution.F7 Though an operating system can schedule the execution of jobs, it does not manage the availability of I/O devices.T 8 The IOCS component of an operating system controls I/O operations.T9 It is a major problem for the operating system to map the logical file concept onto physical storage devices such as magnetic tape or disk.F10 Files can only be direct access on a disk system.T 11 The logic structure and nomenclature of the different operating systems vary considerable.F12 The form of the system prompt is the same for every kind of operating system 13 You must boot the system, before you use a microcomputer.T14 Spooling is an approach to improving system performance by over aping the input of one job with the output of other jobs.T15 Multiprogramming allows time sharing.T1 6 When they first appeared, the microcomputers were provided with the operating system developed for computers.T17 By using the graphical user interface, what the users need to do is to "point and click" in order to accomplish their tasks.T18 The interface introduced by Windows is the object-oriented user interface.T 19.TMicrosoft failed in betting their future on Windows.Multiple Choice1 A computer's operating system is:Da resource managementb error recoveryc memory managementd all the above2 Which is the generalization of a two-level directory?Da cycle graph directory structureb a tree-structuredc batch systemd all the above3 Which system may have no time constrains?Ca real-time systemb time-share systemc batch systemd all the above4 The more popular micro operating system is:Da MS-DOSb CP/Mc UNIXd all the above5 What languages can be used to develop the operating systems ?Ca A machine language,b An assembly language.c A high level language,d all of the above.6 How does the operating system manage the resources of the computer?a It turns on or off the resources of the computer.b It makes them work together towards some common goals, or objectives.c It controls the way in which these resources are put to work.d It acts directly on the raw hardware.7 The function of an operating system is Da to drive the the raw hardware of the computerb to drive the resources of the computer in accordance with certain objectivesc to provide the higher layers of software with a simplified computerd all of the above11 The graphical user interface provides the users withA a simpler way to interact with their computersB a series of typed commandsC an intuitive sit of graphical icons that allowed the completion of common tasksD an intuitive set of graphical incons for users to "point and click" in order toaccomplish their tasks, so that they didn't have to remember arcane words andcommands anymore12 Windows resemble the Macintosh inA providing a GUI which is introduced by MacintoshB providing a limited means of multitaskingC providing a Windows interface just like the GUID allowing users to load multiple programs and have them run in thebackground while doing other work in a window in the foreground3.4 True or FalseF1 Flowcharting is used primarily for program design and rarely for systems design.T2 When programming in a procedure-oriented language, you should tell the computer'‘what to do' and 'how to do it'.T3 Assembler-level languages use mnemonics to represent instructions.T4 Machine language instructions are composed of a label, an opcode, and an operand.F5 Machine languages must be converted by a compiler to be used by the computer.F6 High-level languages require that programmers work with individual main storage locations.. 5T7 A compiler is translating program that converts high-level languages into machine language.T9 A flowchart loop indicates the repetitive performance of steeps to process data.T10 None of the computers consists of hardware only.F11 Programs written in high-level language can be executed by the computers without the help of a translator program~T13 Each symbolic instruction has one-to-one correspondence with the machine instruction.T14 Writing a program in a high-level language need not take account of the hardwareof the computer.T 15 The opode of an assembly language instruction specifies the operation that is to beperformed by the microprocessor.T 17 The mnemonic for the instruction is the symbolic representation of the actual binary code that the computer directly executes.T 18 A label is on the left of the assembly language statement.T 21 To enable the computer to solve an application problem programmers have to write programs in order to translate the application concepts into computerconcepts.T 22 A class is defined by grouping a user-defined type with all procedures and function that can be applied to it.T 23 The artificial intelligence research community did not agree with the concepts of object-oriented programming when in its early days.F24 Object-oriented programming languages are absolutely different from the LISP programming language.T 25 A program may produce incorrect output even if it runs OK.T 26 An error will occur if a program wants to use a deleted file.F 27 All the errors can be avoided.T 28 A warning will not terminate the program.T 29 Although we could not avoid all the runtime errors, we must take appropriate action when it happens.Match the following terms to the appropriate definition1 program2 programmer3 machine language4 assembler5 source6 object7 interpreter8 compilerA A computer program that translates an instruction into machine language, execute it, and then repeats the process for each instruction in a program until the program is finished.7B The set of statements that make up a computer program.5C A computer program that reads a high-level language instruction.8D A computer-specific set of primitive or elementary instructions that allows people to communicate with a particular computer.3E A set of instruction that tells a computer what to do.1F A program that translates an assembly-level language into machine language4.G Output from a compiler or assembler that is linked with other code to produce executable machine language code.6H A person who creates computer program.23.5True or falseT1 The program specifications are written by the software engineers.F2 Coding a program will consume most of programmer's time and effort.T 3 Programmers should use flowchart and other visual aids when they are designing routines.F4 The goal of the test phase of program development is to "prove" that a particular program has been completely debugged.T 5 More programmers maintain programs rather than code programs.T 6 A structured program is made up of several modules.T 7 "Branching" capability is one the most intriguing properties of a digital computer.。
计算机专业英语Unit09
computing
ESSENTIALS
Security Measures
Protecting information, hardware, software Principle methods Encrypting messages Pretty Good Privacy Restricting access Passwords, firewalls Anticipating disasters Disaster recovery plan Backing up data In case other measures fail
Dept.Of Computer Science,XYNC 4
computing
ESSENTIALS
Large Databases
Information on citizens and consumers compiled daily Banks, utilities, grocery stores Hospitals, doctor’s offices Government Social Security Number Used for ID number on forms Information resellers Contact data is valuable
computing
ESSENTIALS
9
1
Privacy and Security
Dept.Of Computer Science,XYNC.
computing
ESSENTIALS
国开作业计算机专业英语-本章自测09参考(含答案)
题目:Common topologies of networks include the star, bus, and ring.选项A:对选项B:错答案:对题目:A WAN is a network that connects LANs and nodes across a wide geographical area.选项A:对选项B:错答案:错题目:A switch sends packets to all nodes on a network.选项A:对选项B:错答案:对题目:WWW provides access to a variety of Internet resources from different interfaces.选项A:对选项B:错答案:错题目:Hyperlinks enable users to jump from site to site on the Internet.选项A:对选项B:错答案:错题目:Besides WWW sites, we can find many other resources, such as FTP, Telnet, E-mail.选项A:对选项B:错答案:对题目:The chief responsibility of TCP/IP is to ensure reliable point-to-point connectivity.选项A:对选项B:错答案:错题目:The packets may travel the same or different routes to the destination.选项A:对选项B:错答案:对题目:Under current (IPv4) specifications , each packet is 16 bits long.。
计算机专业英语测试题及答案
计算机专业英语测试题一、词汇测试题(每小题1分,共20分)(一).Translate the following words and expressions into Chinese (共10分,每题1分)1.Cyber cafe2.microcomputer3.ROM4.Object-oriented programming5.utility program6.system specification7.database administrator8.modulator-demodulator9.client/server model10.spreadsheet program(二).Translate the following terms or phrases from Chinese into English (共10分,每题1分)1.中央处理器2.广域网3.超级计算机4.电子商务5.计算机安全6.计算机文化7.网站8.域名9.数据库管理系统10.软件工程二、完型填空题(每空1分,共20分)Fill in each of the blanks with one of the words given in the list following each paragraph, making changes if necessary:1. Computer hardware is the involved in the of a computer and consists of the that can be physically handled. The function of these components is typically divided into three main categories: , , and . Components in these categories connect to , specifically, the computer’s central unit (CPU), the electronic that provides the computational ability and control of the computer, via wires or circuitry called bus.microprocessors component processing functionoutput equipment input circuitry storage2.In the relational model, data is organized in two-dimensionalcalled . There is no or structure imposed on the data. The tables or relations are, however, related to each other. The database management system (RDBMS) the data so that its external is a of relation or tables. This does not mean that data is stored as tables: the physical of the data is independent of the way in which the is logically organized.hierarchical set organize relational relationdata storage view network table三、英译汉题(每题10分,共20分)Translate the following passage from English into Chinese:1.The field of computer science has grown rapidly since the1950s due to the increase in their use. Computer programs have undergone many changes during this time in response to user need and advances in technology. Newer ideas in computing such as parallel computing, distributed computing, and artificial intelligence, have radically altered the traditional concepts that once determined program form and function. In parallelcomputing parts of a problem are worked on simultaneously by different processors, and this speed up the solution of the problem. Another type of parallel computing called distributed computing use CPUs from many interconnected computers to solve problems. Research into artificial intelligence (AI) has led to several other new styles of programming.2.High-level languages are commonly classified asprocedure-oriented, functional, objected-oriented, logic languages. The most common high-level languages today are procedure-oriented languages. In these languages, one or more related blocks of statements that perform some complete function are grouped together into a program module, or procedure, and given a name such as “procedure A”. If the same sequence of operations is needed elsewhere in the program, a simple statement can be used to refer back to the procedure. In essence, a procedure is just a mini-program. A large program can be constructed by grouping together procedures that perform different tasks.四、汉译英题(20分)最著名的互联网例子是因特网。
计算机英语09-10 考试大纲(完整版)PPT教学课件
2. The definition of software engineering is "the application of systematic, disciplined, quantifiable approaches to the development, operation, and maintenance of software." ( )
考试范围
课本 Unit 1 to Unit 12 的Section A 以及 Unit 8 Computer Network的 Section B: A Guide to Network Topology Section C: Network Connecting Devices
2020/12/11
black box testing; internal; bug; thorough; reveal;
output; faults; valid; white box testing ; lifecycle;
2020/12/11
3
Software testing, which is defined as the
than replacing testing.
2020/12/11
4
(二)Tell whether the following statements are true(T) or false(F) according to the passage A.(根据上文的内容判断 下列句子的正误)(10分,每题2分)
《计算机专业英语》第09章在线测试
《计算机专业英语》第09章在线测试《计算机专业英语》第09章在线测试《计算机专业英语》第09章在线测试剩余时间:59:56答题须知:1、本卷满分20分。
2、答完题后,请⼀定要单击下⾯的“交卷”按钮交卷,否则⽆法记录本试卷的成绩。
3、在交卷之前,不要刷新本⽹页,否则你的答题结果将会被清空。
第⼀题、单项选择题(每题1分,5道题共5分)1、A ________ is a set of rules that controls the interaction of different devices in a network or internetwork.A、modelB、protocolC、dialogD、query2、The purpose of the A is to provide fully integrated analog services to users.A、ISDNB、WWWC、FTPD、HTTP3、A(n) ________ is a connecting device that only regenerates the signal.A、hubB、repeaterC、routerD、switch4、Whereas a repeater operates only in the physical layer of the OSI model, a bridge operates in both the physical layer and the ________ layer of the OSI model.A、Transport LayerB、Network LayerC、data-linkD、Physical Layer5、A(n) ________ is usually a computer installed with the necessary software and allows two networks, each with ac ompletely different set of protocols, to communicate.A、hubB、gatewayC、switchD、router第⼆题、多项选择题(每题2分,5道题共10分)1、The end equipment in a communication system includes ______.A、computersB、CRTsC、printersD、keyboards2、DTE is ______.A、Digital T-carrierB、data terminal equipmentC、satelliteD、the last piece of equipment that belonged to the subscriber in a data link system3、There are AB_ between the DTEs.A、the modemB、communications equipmentC、digital-to-analog converterD、will be replaced by an upd_ated standard4、__________ provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.A、The Transport LayerB、Session LayerC、Presentation LayerD、Application LayerE、Network Layer5、The Application layer in TCP/IP Model is correspond to _______________ in OSI ModelA、Application LayerB、Presentation LayerC、Session LayerD、Transport LayerE、Network Layer第三题、判断题(每题1分,5道题共5分)1、TCP means it is on the network layer and IP means it is on the transport layer separately.正确错误2、A LAN (Local area data networks) is a group of computers and the network devices connected together usually within thed ifferent buildings.正确错误3、The four topologies in common use are star, router, ring and hub.正确错误4、Three techniques have been adopted for use of the medium access control in the LANs.正确错误5、Control token is the only way of controlling access to a shared transmission medium.正确错误交卷恭喜,交卷操作成功完成!你本次进⾏的《计算机专业英语》第09章在线测试的得分为20分(满分20分),本次成绩已⼊库。
《计算机英语》第九单元
9.1
主要内容
• 正文 • 生词
— 4—
9.1 Internet Security
Anyone responsible for the security of a trusted network will be concerned when connecting it to a distrusted network. In the case of connections to the Internet this concern may be based largely on anecdotal evidence gleaned from widespread media coverage of security breaches. A closer inspection of the facts and statistics behind some of the media coverage will, however, only serve to deepen that concern. For example, the US National Computer Security Agency (NCSA) asserts that most attacks to computer systems go undetected and unreported, citing attacks made against 9000 Department of Defense computers by the US Defense Information Systems Agency (DISA). These attacks had an 88 percent success rate and went undetected by more than 95 percent of the target organizations. Only 5 percent of the 5 percent that detected an attack, a mere 22 sites, reacted to it.
计算机英语专业外语第三版unit9
幻灯片1UNIT 9 The InternetSection AThe Internet幻灯片2The Internet —IntroductionThe most notable example of an internet is the Internet (note the uppercase I ), which originated from research projects going back to the early 1960s. The goal was to develop the ability to link a variety 0f computer networks so that they could function as a connected system that would not be disrupted by local disasters.最著名的互联网例子是因特网(Internet,注意大写的I)。
因特网起源于20世纪60年代初的研究项目。
其目标是发展一种能力,将各种计算机网络连接起来,使它们能够作为一个不会因局部灾难而瓦解的互联系统运行。
幻灯片3The Internet —IntroductionMost of this original work was sponsored by the U.S. government through the Defense Advanced Research Projects Agency (DARPA--pronounced "DAR-pa"), Over the years, the development of the Internet shifted from a defense project to an academic research project, and today it is largely a commercial undertaking that links a worldwide combination of WANs, MANs, and LANs involving millions of computers.最初的工作大多是由美国政府通过国防部高级研究计划局(DARPA——读作“DAR-pa”)发起的。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
A B
C D
The OSI model has
A B
C D
The purpose of the A is to provide fully integrated analog services to users.
A B
C D
________ is a connecting device that only regenerates the signal.
A B
C D
________ is usually a computer installed with the necessary software and allows two networks, each with a c
A B
C D
D、keyboards
2、The equipment ______.
A、manipulates digital information internally in serial form
B、manipulates digital information internally in word units
C、transfers the number of bits in parallel
D、transfers the number of bits in serial form
3、DTE is ______.
A、Digital T-carrier
B、data terminal equipment
C、satellite
D、the last piece of equipment that belonged to the subscriber in a data link system
4、There are AB_ between the DTEs.
A、the modem
B、communications equipment
C、digital-to-analog converter
D、will be replaced by an upd_ated standard
5、The Application layer in TCP/IP Model is correspond to _______________ in OSI Model
A、Application Layer
B、Presentation Layer
C、Session Layer
D、Transport Layer
E、Network Layer
第三题、判断题(每题1分,5道题共5分)
1、The OSI model was not created by the ISO.
正确错误
The TCP/IP Internet protocol suite is formed from three standards.
正确错误
A LAN (Local area data networks) is a group of computers and the network devices connected together usually within the d
正确错误
The four topologies in common use are star, router, ring and hub.
正确错误
Three techniques have been adopted for use of the medium access control in the LANs.
正确错误。