计算机专业英语多选题
计算机英语考试题目及答案
计算机英语考试题目及答案一、选择题1. What does HTML stand for?a) Hyper Text Markup Languageb) High Technology Multimedia Languagec) Home Tool Management Languaged) Human Token Marker Language答案:a) Hyper Text Markup Language2. Which of the following is not a programming language?a) Javab) Pythonc) HTMLd) C++答案:c) HTML3. What is the purpose of CSS?a) To add interactivity to web pagesb) To structure the content of web pagesc) To define the layout and style of web pagesd) To create dynamic web pages答案:c) To define the layout and style of web pages4. What is the function of a router in a computer network?a) To connect computers to the internetb) To store and manage data on a networkc) To protect the network from security threatsd) To direct network traffic between devices答案:d) To direct network traffic between devices5. Which of the following is a commonly used database management system?a) Microsoft Wordb) Adobe Photoshopc) MySQLd) Windows Media Player答案:c) MySQL二、填空题1. The process of converting source code into machine code is called ________.答案:compilation2. The most widely used programming language for web development is ________.答案:JavaScript3. TCP/IP stands for ________.答案:Transmission Control Protocol/Internet Protocol4. The physical components of a computer are referred to as ________.答案:hardware5. SQL stands for ________.答案:Structured Query Language三、简答题1. What are the advantages of using cloud computing?答案:Cloud computing offers several advantages, including:- Cost savings: Companies can reduce their infrastructure costs by using cloud services instead of maintaining their own hardware.- Scalability: Cloud services can easily scale up or down based on demand, allowing businesses to only pay for what they need.- Flexibility: Users can access cloud services from anywhere with an internet connection, enabling remote work and collaboration.- Disaster recovery: Cloud providers often have backup systems in place, ensuring data can be recovered in case of a disaster.- Automatic updates: Cloud services are typically updated regularly by the provider, ensuring users have access to the latest features and security patches.2. Explain the difference between HTTP and HTTPS.答案:HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is not secure, meaning that the data being transmitted can be intercepted and read by anyone. HTTPS (Hypertext Transfer Protocol Secure), on the other hand, is a secure version of HTTP. It uses encryption to ensure that data is encrypted before transmission, making it much more difficult for hackers to intercept and read. HTTPS is commonly used for secure online transactions, such as submitting credit card information or personal details.四、编程题请编写一个Python程序,实现计算圆的面积和周长的功能。
《计算机专业英语》第02章在线测试
《计算机专业英语》第02章在线测试《计算机专业英语》第02章在线测试 剩余时间: 59:38答题须知:1、本卷满分20分。
2、答完题后,请一定要单击下面的“交卷”按钮交卷,否则无法记录本试卷的成绩。
、答完题后,请一定要单击下面的“交卷”按钮交卷,否则无法记录本试卷的成绩。
3、在交卷之前,不要刷新本网页,否则你的答题结果将会被清空。
、在交卷之前,不要刷新本网页,否则你的答题结果将会被清空。
第一题、单项选择题(每题1分,5道题共5分)1、The abbreviation USB stands for Universal ________________ Bus. Bus.A 、SerialB 、SequentialC 、SymmetricD 、Syntactic 2、A hardware or software malfunction can cause a system to ________________. .A 、crushB 、crashC 、crackD 、collide3、primary memory which is stored on chips located ________________. .A 、on the motherboardB 、outsideC 、inside the processorD 、on the CPU4、It looks as though there ( ) some problems with my computer. Because it is so slow.A 、wasB 、wereC 、has beenD 、had been5、The largest and fastest computers are ( ).A 、mainframe computersB 、supercomputersC 、hand-held PCsD 、workstations第二题、多项选择题(每题2分,5道题共10分)1、The function of computer hardware is typically divided into three main categories.They are ______________________________. .A 、inputB 、outputC 、cpuD 、storageE 、motherboard2、The software that controls the interaction between the input and output hardware is called BIO S,which stands of ____________________A 、Classic Input Output SystemB 、Junior Input Output SystemC 、Advanced Input Output SystemD 、Basic Input Output System3、The two most common types of scanners are ______________ and and _______________A 、handler scannersB 、flatbed scannersC 、hand-held scannersD 、auto scanners4、According to the text,the author mentions three of the most commonly used types of printer.The y are ____________________________________________________________. .A 、laser printerB 、dot-matrix printers;C 、array printerD 、inkjet printersE 、belt printer5、A general purpose computer has four main sections: ____________________________________________________________________________________. .A 、the input and output devicesB 、the memoryC 、the control unitD 、the arithmetic and logic unit (ALU),E 、the cpu第三题、判断题(每题1分,5道题共5分)1、A processor can do everything without a program to provide control.正确正确错误错误2、 A microcomputer, also called personal computer, is a computer designed for an individual.正确正确错误错误3、 According to computers ’ power and size, we have desktop, laptop and handheld PCs.正确正确错误错误4、In its more general usage, a personal computer is a computer designed for using by one person at a time.正确正确错误错误5、Floppy disks are the smallest type of storage, holding only 2.44MB.正确正确错误错误。
《计算机专业英语》在线测试06(全对)
A、design
B、analysis
C、testing
正确
错误
3、Requirements analysis is not critical to the success of a development project
正确
错误
4、The aspect of that,New capabilities can be added to the software without major changes to the underlying architecture is called Extensibility .
A、analysis
B、design
C、implementation
D、audit
E、testing
2、Software engineering is related to the disciplines of_____________________.
A、computer science
B、netural network
C、Fault-tolerance
D、Maintainability
E、Marketability
F、Modularity
G、Packaging
4、Computer programming is the process of_______________the source code of computer programs.
《计算机专业英语》在线测试05(全对)1
C、assemblers
D、
2、In the case of a(n)_________, a program is translated into executable form and executed one statment at a time rather than being translated completely before execution.
《计算机专业英语》第05章在线测试
《计算机专业英语》第05章在线测试
剩余时间:
56:50
窗体顶端
答题须知:1、本卷满分20分。
2、答完题后,请一定要单击下面的“交卷”按钮交卷,否则无法记录本试卷的成绩。
3、在交卷之前,不要刷新本网页,否则你的答题结果将会被清空。
第一题、单项选择题(每题1分,5道题共5分)
A、data mining
B、parallel computing
C、distributed computing
D、artificial intelligence
E、software engineering
5、Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes:
A、Loop
B、sel_ected
C、
D、
4、One of the differences between C# and Java is that Java runs on any platform with a Java Virtual______________while C# only runs in Windows for the foreseeable future.
计算机英语试题及答案
计算机英语试题及答案一、选择题(每题2分,共20分)1. What does the term "CPU" stand for?A. Central Processing UnitB. Central Power UnitC. Customer Personal UnitD. Control Power Unit答案:A2. The term "RAM" refers to:A. Random Access MethodB. Random Access MemoryC. Remote Access ModuleD. Real-time Application Module答案:B3. Which of the following is a type of computer virus?A. TrojanB. TractorC. TrackerD. Tracker答案:A4. The acronym "GUI" stands for:A. Graphical User InterfaceB. General User InterfaceC. Graphical Unified InterfaceD. Global User Interface答案:A5. What is the purpose of an "API" in computer programming?A. Application Programming InterfaceB. Advanced Programming InterfaceC. Automated Programming InterfaceD. Advanced Programming Indicator答案:A6. The term "LAN" is short for:A. Local Area NetworkB. Long Area NetworkC. Limited Area NetworkD. Large Area Network答案:A7. Which of the following is a common file extension for a text document?A. .txtB. .jpgC. .exeD. .mp3答案:A8. The process of finding and removing errors in a computer program is called:A. DebuggingB. BuggingC. LoggingD. Tagging答案:A9. What does "FTP" stand for?A. File Transfer ProtocolB. Fast Transfer ProtocolC. Full-Time ProtocolD. Future Technology Protocol答案:A10. The term "URL" stands for:A. Uniform Resource LocatorB. Unique Resource LocatorC. Universal Resource LocatorD. User Resource Locator答案:A二、填空题(每空1分,共10分)11. The basic unit of data in a computer is the _______.答案:bit12. A computer's _______ is the primary component that controls and processes data.答案:CPU13. The _______ is a type of software that protects a computer from malicious software.答案:antivirus14. A _______ is a location on a network where files can be stored and accessed.答案:server15. The process of converting data into a code to protect its confidentiality is known as _______.答案:encryption16. A _______ is a set of data that describes the characteristics of a file or set of files.答案:metadata17. The _______ is the process of recovering data after a system failure.答案:backup18. The term _______ refers to the use of a computer to create visual content, such as images and videos.答案:graphics19. A _______ is a program that controls the way a computer system operates.答案:operating system20. The _______ is the process of connecting two or morenetworks to enable communication between them.答案:networking三、简答题(每题5分,共20分)21. Explain the difference between a "bit" and a "byte".答案:A bit is the smallest unit of data in computing, representing a single binary digit (0 or 1). A byte is a group of eight bits, which is used to represent a character or a string of data.22. What is the role of a "firewall" in a computer system?答案:A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the Internet.23. Describe the purpose of a "router" in a computer network.答案:A router is a networking device that forwards data packets between computer networks. It uses routing tables to determine the best path for data to travel, allowing multiple devices to communicate with each other across different networks.24. What is "cloud computing" and how does it benefit users?答案:Cloud computing is the delivery of computing services, including storage, processing power, and software, over the internet. It benefits users by providing scalable resources, reducing the need for on-premises infrastructure, and allowing for remote access to applications and data.四、翻译题(每题5分,共20分)25. Translate the following sentence into English: "操作系统是管理计算机硬件和软件资源的程序。
大学英语计算机试题及答案
大学英语计算机试题及答案1. Multiple Choice Questions1. What is the purpose of a compiler?a) to convert high-level programming code into machine codeb) to debug and fix errors in a programc) to manage memory allocation in a programd) to handle user input and outputAnswer: a) to convert high-level programming code into machine code2. Which of the following is an object-oriented programming language?a) Cb) Javac) Assemblyd) FortranAnswer: b) Java3. What is the function of an operating system?a) to compile and execute programsb) to provide an interface for users to interact with the computerc) to manage hardware resources and schedule tasksd) to store and retrieve data from a databaseAnswer: c) to manage hardware resources and schedule tasks4. What does HTML stand for?a) Hyper Text Markup Languageb) High-level Machine Languagec) Home Tool for Management and Learningd) Human Translated Multimedia LanguageAnswer: a) Hyper Text Markup Language5. Which of the following is a database management system?a) Microsoft Excelb) Adobe Photoshopc) Oracle Databased) NotepadAnswer: c) Oracle Database2. Fill in the Blanks1. The process of finding and fixing errors in a program is called ______.Answer: debugging2. The ______ is responsible for controlling and coordinating the activities of all hardware and software components in a computer system.Answer: operating system3. In object-oriented programming, a ______ is a blueprint for creating objects.Answer: class4. HTTP stands for ______.Answer: Hypertext Transfer Protocol5. SQL stands for ______.Answer: Structured Query Language3. Short Answer Questions1. Explain the difference between compiler and interpreter.Answer: A compiler translates the entire program into machine code before execution, whereas an interpreter translates and executes the program line by line.2. What is an algorithm?Answer: An algorithm is a step-by-step procedure or a set of rules for solving a specific problem or completing a specific task.3. Name two types of computer memory.Answer: RAM (Random Access Memory) and ROM (Read-Only Memory).4. What is a network protocol?Answer: A network protocol is a set of rules and conventions that govern the communication between devices on a network.5. Explain the concept of recursion in programming.Answer: Recursion is the process of a function calling itself, either directly or indirectly. It allows for solving complex problems by breaking them down into smaller, more manageable parts.4. Essay Questions1. Discuss the impact of artificial intelligence on society.Answer: Artificial intelligence has the potential to revolutionize various aspects of society, including healthcare, transportation, and employment. It can improve diagnosis and treatment in medicine, enable self-driving cars, and automate repetitive tasks. However, concerns about job displacement and ethical implications of AI must also be considered.2. Describe the major components of a computer system and their functions.Answer: A computer system consists of the central processing unit (CPU) which performs calculations and executes instructions, memory for temporary data storage, input devices for receiving user input, output devices for displaying or presenting information, and storage devices for long-term data retention.3. Compare and contrast object-oriented programming and procedural programming.Answer: Object-oriented programming (OOP) focuses on objects that contain both data and behavior, allowing for modular and reusable code. Procedural programming, on the other hand, uses procedures or functions toperform tasks. OOP promotes code organization, while procedural programming is more procedural and linear in nature.4. Discuss the advantages and disadvantages of cloud computing.Answer: Benefits of cloud computing include scalability, cost-effectiveness, and easy accessibility to data and services. However, concerns such as data security, dependency on internet connectivity, and potential vendor lock-in should be considered.5. Explain the concept of cybersecurity and its importance.Answer: Cybersecurity refers to the practice of protecting computer systems and networks from unauthorized access, damage, or theft of data. It is of paramount importance in today's digital age to safeguard personal information, prevent cybercrimes, and maintain the integrity of critical infrastructure.Note: The above article provides an example of how a 5000-10000 word essay on "University English Computer Exam Questions and Answers" can be structured and written. The exact content and length may vary depending on the specific questions and answers provided.。
计算机英语考试试题以及答案
计算机英语考试试题以及答案一、词汇(选择一个最合适的词汇,将对应的英文字母填入空格内。
每题2分,共20分)1、__B__ is used to communicate with another computer over telephone lines.A. keyboardB. modemC. mouseD. printer2、__C__ is a device that enables the computer to handle sounds.A. network cardB. video cardC. sound cardD. monitor3、__A__ is a word processing tool that helps you to create quality documents.A. Word 2000B. Outlook 2000C. Access 2000D. Excel 20004、__D__ is a fast and powerful operating system, based on the UNIX O.S.A. Windows 2000B. Office 2000C. Windows 98D. Linux5、The OSI model has __D__ layers.A. fourB. fiveC. sixD. seven6、The purpose of the __A__ is to provide fully integrated analog services to users.A. ISDNB. WWWC. FTPD. HTTP7、Which one is not a computer languages? __A__A. word 2000B. PASCALC. CD. C++8、The __C__ turns the object file into an executable program.A. linkerB. compilerC. interpreterD. computer9、The RGB value is composed of__C __components.A. oneB. twoC. threeD. four10、Virus is a __A__ .A. programB. computerC. bad manD. beast二、语法单项选择题(每小题1.5分,共15分)1、With Windows, you can run several powerful applications at once and switch quickly __B__ them.A. betweenB. amongC. inD. on2、He doesnt mind __A__ her birthday party.A. being not invited toB. not to be invited toC. not being invited toD. not inviting to3、Only when you have told him __A__ take this book out of the library.A. can youB. would youC. you willD. you can4、Well go to Paris for our holiday, __D __it isnt too expensive.A. exceptB. providedC. so far asD. unless15、The prisoners request __B__ more and better food is now__B__ consideration(考虑).A. for, onB. for, underC. for, inD. for, into6、Mrs. Snow __B__ in the office for two years before she got a raise.A. have been workingB. had been workingC. has been workingD. was working7、The teacher has repeatedly reminded him __C__ it.A. ofB. forC. withD. to8、You went to the wrong shop .You ought __D__ to the shop next to the cinema.A. goB. to goC. have goneD. to have gone9、After __C__ my lessons I went to bed.A. reviewB. to reviewC. reviewingD. be reviewing10、 I find __A__ not so difficult to learn a foreign language.A. itB. thatC. theyD. which三、多选(每小题1.5分,共15分)1、Input devices include: __abcd__ .a. the keyboard c. the mouseb. touch screen d. microphone2、A processor is composed of: __abcd __.a. a control unit c. an arithmeticb. logic unit d. Registers3、The Windows 2000 product line includes __abcd __.a. Windows 2000 Professional c. Windows 2000 Advanced Serverb. Windows 2000 Server d. Windows 2000 Datacenter Server4、Windows 2000s advantages are lies in the sections that follow: __abcd__a. Active Directory c. Networkingb. Storage d. Enterprise Management5、C++ include the following pillars: __abcd__ .a. encapsulation c. inheritanceb. data hiding d. polymorphism6、The major functional components of an office automation system include: __abcd__ .a. text processing c. electronic mailb. information storage and retrievald. personal assistance features7、Static graphics include __cd__ .a. movies c. pictures2b. animators d. photographs8、The end equipment in a communication system includes __acd__a. computers c. CRTsb. DCE d. keyboards9、Applications in the Internet can be found everywhere: __abc__a. in libraries c. at homeb. in conference rooms d. at the moon10、Many viruses do harmful things such as __abcd__ .a. deleting files c. simulating typosb. changing random data on your disk d. slowing your PC down四、完形填空(选择一个最合适的答案,将对应的英文字母填入空格内。
计算机专业英语考试试题及答案
计算机专业英语考试试题及答案一、选择题1. Which of the following is NOT a programming language?A. JavaB. PythonC. HTMLD. CSS2. What does the acronym "SQL" stand for?A. Structured Query LanguageB. Simple Query LanguageC. Script Query LanguageD. Secure Query Language3. Which protocol is commonly used for sending and receiving emails?A. FTPB. HTTPC. SMTPD. TCP4. What does the term "CPU" refer to?A. Central Processing UnitB. Computer Processing UnitC. Central Program UnitD. Computer Program Unit5. Which of the following is NOT a type of network topology?A. StarB. RingC. MeshD. Scroll二、填空题1. HTML stands for Hypertext Markup Language, which is used for ____________.2. The process of converting source code into machine code is called ____________.3. IP address stands for ____________.4. The act of copying files from a remote server to a local computer is known as ____________.5. The programming language developed by Apple Inc. for iOS and macOS is ____________.三、简答题1. What is the difference between a compiler and an interpreter? Provide examples of programming languages that use each of these methods.2. Explain the concept of object-oriented programming (OOP) and provide an example of a programming language that utilizes this paradigm.3. Describe the client-server model and provide an example of a commonly used protocol within this model.四、论述题Discuss the impact of artificial intelligence (AI) on various industries. Provide examples of how AI is being used in fields such as healthcare, finance, and transportation. Analyze the potential benefits and challenges of implementing AI in these industries.答案:一、选择题1. C. HTML2. A. Structured Query Language3. C. SMTP4. A. Central Processing Unit5. D. Scroll二、填空题1. creating and structuring the content of a webpage2. compilation3. Internet Protocol4. downloading5. Swift三、简答题1. A compiler translates the entire source code into machine code before the program is executed. Examples of languages that use compilers are C, C++, and Java. On the other hand, an interpreter translates and executes the source code line by line. Python and Ruby are examples of languages that use interpreters.2. Object-oriented programming (OOP) is a programming paradigm that organizes data and functions into reusable objects. It focuses on the concept of classes and objects, allowing for code reuse and encapsulation. An example of a programming language that uses OOP is Java, where objects are instances of classes and can interact with each other through methods and attributes.3. The client-server model is a distributed computing architecture wherea server provides services or resources to multiple clients. The clients request and receive these resources through the network. An example of a commonly used protocol within this model is the Hypertext Transfer Protocol (HTTP), which is used for communication between web browsers (clients) and web servers.四、论述题Artificial intelligence (AI) has had a significant impact on various industries. In healthcare, AI is being used for diagnoses and treatments, analyzing medical images, and personalized medicine. For example, AI-powered algorithms can help detect diseases like cancer at an early stage, leading to better treatment outcomes. In finance, AI is utilized for fraud detection, algorithmic trading, and customer service. AI algorithms can analyze large amounts of financial data to identify patterns and make accurate predictions. In transportation, AI is being employed for autonomous vehicles, traffic management, and logistics optimization. Self-driving cars, for instance, use AI algorithms to navigate and make decisions on the road.The implementation of AI in these industries brings about many benefits, such as increased efficiency, improved accuracy, and cost savings. AI systems can process and analyze vast amounts of data much faster than humans, leading to faster and more accurate results. However, there are also challenges to consider. Privacy and security concerns arise as AI systems handle sensitive information. There is also the worry of job displacement, as AI automation may replace certain human tasks. Additionally, ethical considerations need to be addressed, such as bias in algorithms and the potential for AI to be used for malicious purposes.Overall, the impact of AI on various industries is undeniable. It has the potential to revolutionize healthcare, finance, transportation, and many other sectors. However, careful implementation and regulation are necessary to ensure its responsible and beneficial use.。
计算机专业英语 考试
一、选择题1.What is the process of converting a high-level programming language into machine languagecalled?A.Debuggingpilation(正确答案)C.ExecutionD.Interpretation2.Which of the following is a programming paradigm that organizes software design around data,and the operations performed on that data?A.Object-oriented programming(正确答案)B.Procedural programmingC.Functional programmingD.Event-driven programming3.In computer networks, what does the term "protocol" refer to?A. A set of rules governing the exchange of information between devices(正确答案)B.The physical connection between devicesC.The speed of data transmissionD.The type of data being transmitted4.What is the term used to describe the process of dividing a complex problem into smaller, moremanageable parts?A.Modularization(正确答案)B.OptimizationC.EncapsulationD.Polymorphism5.In computer security, what is the term for unauthorized access to or modification of data?A.EncryptionB.DecryptionC.Hacking(正确答案)D.Firewall6.Which of the following is a type of software that allows two or more computers tocommunicate and share resources?A.Operating systemB.Database management systemwork operating system(正确答案)D.Word processing software7.What is the term used to describe the process of identifying and correcting errors in computerprograms?A.Debugging(正确答案)B.TestingC.Codingpilation8.In computer graphics, what is the term for the number of distinct pixels that can be displayedon a screen?A.Resolution(正确答案)B.Color depthC.Refresh rateD.Aspect ratio。
计算机专业英语
一、英翻汉,汉翻英(20题*1分)data processing system 数据处理系统Integrated Circuit 集成电路Central Processing unit 中央处理器decimal digit 十进制Random Access Memory 随机访问存储器machine language机器语言system clock 系统时钟word size 字长DataBus 数据总线Address Bus 地址总线control circuit 控制电路input and output device 输入和输出设备Universal Serial Bus 通用串行总线assembly language 汇编语言high-level language 高级语言derived classes 派生类late binding 迟绑定virtual function 虚函数real-time operating system 实时操作系统command language 命令语言primary storage 主存储器secondary storage 辅助存储器data structure 数据序data abstraction数据抽象procedural abstracting过程抽象dynamic memory allocation 动态存储分配first come and first served 先来先服务first in and out 先进先出database model 数据库模型physical level 物理层user program 用户层entity-relationship model实体—关系模型one –pass compiler 一遍编译器external call 外部调用parallelizing compiler 并行编译器cross compiler 交叉编译器intermediate code 中间代码一、选择题(10题*2分)1、计算机中最重要的程序OS2、处理器包含寄存器(register)累加器(accumulator)两个功能部件3、在控制输入输出操作计算机有完整的操作指令(operating instructions/ operational command)4、高级语言低级语言判断二、选词填空(10题*2分)课本第二题Uint1(1)The digital computer is a digital system perform various computation (估计,计算)tasks.(2)Integrated circuit did for the third-generation what transistors did for thesecond generation.(3)One of the most significant contributes to the emergence of the fourth generation of computers is the microprocessor.(未处理器)(4)Mainframe computer is a powerful multi-user computer.(5)Supercomputer is an extremely fast computer that can perform hundreds of millions of instructions per second.(6)Desktop computers are modular systems that make it easy to add or replace individual parts to meet each user’s particular requirements.(7)When you need change ,it is easy to open up a desktop case and reconfigure the system.(8)The CPU mounts in a special socket that uses a latching mechanism to hole itin place.Uint2(1)A processor is a function unit that interprets and carries out instructions. (2)Thirty-two-bit chips are often constrained to a maximum of 2GB or 4GB of RAM access.(3)Processing more data in each cycle contributes to increased performance . (性能)(4)The cache ensures that data is immediately available whenever the CPU requests it.(5)One reason why the word needs 64-bit processors is because of their enlarged address spaces.(6)In an SSID (服务集标示符)architecture there is a single instruction cycle. (7)Multiprocessing refers to the organization technique in which a number of processor units are employed in a single computer system.(8)RAM and ROM play important roles of storage devices.(存储装置)Uint3(1)Each I/O device includes I/O interface circuitry.(接口电路)(2)The keyboard is used to type information into the computer or input information.(3)The core computer of CRT monitor(阴极射线管显示器)is cathode ray tube.(4)Compared to the CRT monitor, the monitor’s advantages are obvious.(5)Each I/O device is connected to computer system’s address, data, and control buses.(6)CRT monitor means a cathode ray tube monitor.(7)Each key on a standard keyboard has one or two character.(8)Press the key to get the lower character and hole Shift to get the upper. Uint4(1)Inheritance in object-oriented programming allows a class to inherit properties(性能,道具) from a class of object.(2)The language used 0 and 1 is called machine language.(3)C++ is an often considered to be a superset of C , but this is not strictly true.(4)Most C code can easily be made to compile(编译)correctly in C++. (5)C++ is an enhanced version of the C language.(6)Methods are similar to the functions of procedure-oriented (面向过程)programming.(7)An object is simply an instance(实例)of a class.(8)Polymorphism gives object the ability to represent to messages from routines when the object’s exact type is not known.(9)It is a computer program that translates a series of instructions written in one computer language into a resulting output in another computer language.(三)Unit5(1)The operating system is also responsible for keeping track of the activities in the computer system.(2)Real-time operating system are used to control machinery,(机械,机器)scientific instrument and industrial systems.(3) A multi-user operating system allows many different users to take advantage of one computer’s resources simultaneously.(4)The OS is a large program made up of many smaller programs.(5)The OS control how the CPU communicates with other hardware components.(硬件组件)(6)The OS also makes computer easier to operate by people who don’t understand programming languages.(7)Operating system are constantly being improved or upgraded as technology advance.(8)Windows is custom-made to run with Intel CPU and Intel-compatible CPUs,such as Pentium IV.(9)It is a common term for a computer fault that brings down a software program or operating system .It is also refer to the failure of a hard disk drive.(三)Uint6(1)A data structure is a specialized format (格式,板式)for organizing and storing data.(2)Data structure organize data in ways that make Algorithms (算法)moreefficient.(3)An object-oriented approach to data structures (数据结构)brings together both data abstraction and procedural abstraction.(4)Once problem are Abstracted ,(抽象的)it becomes apparent that seemingly different problems are essentially similar or even equivalent in a deep sense.(5)Abstraction allows Common solutions to seemingly different problems.(6)Integer is amounts to a particular collection of anxious or rules that must be obeyed.(7)When a call is made to Algorithms, (算法)all the variable local to the callingroutine need to be saved by the system , otherwise the new function will overwrite the calling routine’s variables.(8)Computers in which the disk is attached to one machine, known as the file server.(文件服务器)Uint7(1)A database consists of a file or a set of files.(2)Fields are the basic units of data storage .(数据存储)(3)The external level defines the different views of the database as required by the external or user programs.(4)One user program may not require all the data in the database.(5)The conceptual level describe the entire database.(6)Object-based logical models are used for describing data at the conceptual (概念上的)and viewlevels.(7)For relationships involving two entity (实体)sets, there can be relationships like one-to-one,one-to-many, many-to-one,and many-to-many.(8)There are various data types to choose from, such as character,numeric ,data ,or other.Unit8(1)A compiler(编译器)is a computer program that translates a computer programwritten in one computer language into an equivalent program.(2)Translation from a low level language to a high level one is also possible. (3)Compiles also exit which translate to a another.(4)Cross compilers are useful when bringing up a new hardware platform for the first time.(5)Since the intermediate level code (中级水平代码)is machine-like in character,but not in form ,it will normally vary with the machine for which the object code is being generated.(6)Intermediate code can be converted directly into the object language (目标语言)by the code generate.(7)Obviously code generation is highly machine-dependent.(8)When the object machine is altered ,the code generator(编译发生器)must be extensively revised.三、阅读理解(10题*2分)四、完形填空五、翻译(第七章重点考)。
计算机专业英语试题及答案
计算机专业英语试题及答案1. 选择题1. Which of the following is not a programming language?a) Javab) HTMLc) Pythond) CSS答案: b) HTML2. Which protocol is used for sending and receiving email?a) HTTPSb) FTPc) SMTPd) DNS答案: c) SMTP3. What does the acronym CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Power Unit答案: a) Central Processing Unit4. Which programming language is commonly used for web development?a) C++b) Javac) JavaScriptd) Swift答案: c) JavaScript5. What does HTML stand for?a) Hyperlinks and Text Markup Languageb) Hyper Text Markup Languagec) Home Tool Markup Languaged) Hyper Text Modeling Language答案: b) Hyper Text Markup Language2. 填空题1. The process of converting high-level programming code into machine code is called ___________.答案: compilation2. HTTP stands for ___________ Transfer Protocol.答案: Hyper Text3. The process of testing software by executing it is called ___________.答案: debugging4. Java is an object-_____________ programming language.答案: oriented5. DNS stands for Domain Name ___________.答案: System3. 简答题1. What is the difference between TCP and UDP?答案: TCP (Transmission Control Protocol) is a connection-oriented protocol, which means it establishes a connection between the sender and receiver before transferring data. It ensures that all packets are received in the correct order and provides error checking. UDP (User Datagram Protocol), on the other hand, is a connectionless protocol that does not establish a direct connection before transmitting data. It does not guarantee packet delivery or order but is faster and more efficient for time-sensitive applications.2. What is the purpose of an operating system?答案: An operating system (OS) is a software that manages computer hardware and software resources and provides common services forcomputer programs. Its primary purpose is to enable the user to interact with the computer and provide a platform for running applications. It manages memory, file systems, input/output devices, and multitasking. The OS also handles system security and resource allocation to ensure optimal performance.4. 解答题请参考下文并给出自己的解答。
计算机专业英语选择
Multiple 11. The keyboard, mouse, monitor, and system unit are:hardware output devices storage devices software2. Programs that coordinate computer resources, provide an interface, and run applications are known as:application programs operating systemsstorage systems utility programs3. A browser is an example of a:basic application specialized programsystem application utility program4. Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.mainframe media center midrange netbook5. The smallest type of microcomputer:netbook handheld midrange tablet PC6. RAM is a type of:computer memory network secondary storage7. Unlike memory, this type of storage holds data and programs even after electrical power to the computer system has been turned off.primary RAM ROM secondary8. The type of file created by word processors to save, for example, memos, term papers, and letters.database document presentation worksheet9. The change in connectivity that uses the Internet and the Web to shift many computer activities from a user’s computer to computers on the Internet.cloud computing high definition network USB10. The largest network in the world is [the]:Facbeook Internet Web USBMultiple 21. The network that connects computers all over the world.CERN Internet LAN Web2. The rules for exchanging data between computers.DSL protocols Web WWW3. Client-based e-mail accounts require this special program to be installed on your computer.e-mail client hyperlink Java utility4. Communities of individuals who share a common interest typically create Facebook:clients groups pages profiles5. E-mail that does not require an e-mail program installed on a user's computer is known as:blog podcast Webmail utility6. A very well-known microblog.LinkedIn MySpace Twitter Wikipedia7. These programs continually look for new information and update search services’ database programs.filters IM spiders wikis8. A type of search engine that submits requests to other search engines, organizes their responses, eliminates duplicate responses, orders hits, and then provides an edited list.directory search ISPmetasearch engine specialized search engine9. This is the Internet’s equivalent to traditional cash.digital cash e-commerce icash Internetdollars10. Using file transfer utility software, you can copy files to your computer from specially configured servers on the Internet. This is called:downloading filtering blogging uploadingMultiple 31. This type of software works with end users, application software, and computer hardware to handle the majority of technical details.application general purpose system utility2. A rectangular area that can contain a document, program, or message.dialog box form frame window3. Programs that create text-based documents.DBMS suites spreadsheets word processors4. Programs that organize, analyze, and graph numeric data such as budgets and financial reports.DBMS suites spreadsheets word processors5. In a spreadsheet, the intersection of a row and column creates a:cell formula function label6. A collection of related data that is the electronic equivalent of a file cabinet.cell database document table7. A database tool that will quickly rearrange a table’s records according toa selected field.filter sort spreadsheet word processor8. Programs that combine a variety of visual objects to create attractive, visually interesting presentations.DBMS presentation graphics spreadsheet word processor9. The primary disadvantage of this type of package is that the capabilities of each function are not as extensive as in individual programs.integrated office software utility10. A type of suite stored at a server on the Internet and available anywhere through Internet access.cloud integrated office utilityMultiple 41. These specialized graphics programs combine text and graphics to create publications of professional quality.desktop publishing programs image editorsimage galleries illustration programs2. Also known as drawing programs.desktop publishing programs image editorsimage galleries illustration programs3. Graphics programs used to create and edit vector images.desktop publishing programs image editorsimage galleries illustration programs4. An essential multimedia feature that allows user participation.Flash interactivity immersion raster5. Special programs used to create multimedia presentations.desktop publishing programs Flash editorsimage editors multimedia authoring programs6. A widely used interactive animation application from Adobe.ACTION Flash Fuzzy WYSIWYG7. Programs for Web site design and HTML coding are called Web page editors orapps HTML editors VR programs Web editors8. This area of artificial intelligence is also known as expert systems.acoustics knowledge-based systems robotics virtual reality9. A type of artificial intelligence that uses a database to provide assistance to users.acoustics expert systems robotics virtual reality10. Another name for the database used in expert systems that contains specific facts and rules.access table expert table knowledge base rule baseMultiple 51. What type of software works with users, application software, and computer hardware to handle the majority of technical detailsdapplication desktop Linux system2. The programs that convert programming instructions written by programmers into a language that computers understand and process are language:converters linguists managers translators3. The ability to switch between different applications stored in memory is called:diversion multitasking operational interferenceprogramming4. Graphic representations for a program, type of file, or function:app icon image software5. This operating system feature is controlled by a mouse and changes shape depending on its current function.dialog box menu mouse pointer6. The operating system based on Linux, designed for Netbook computers, and focused on Internet connectivity through cloud computing:Chrome Mac Unix Windows7. The mobile operating system developed by Apple and originally called iPhone OS:Android BlackBerry OS IOS Mac OS8. A utility program that makes copies of files to be used in case the originals are lost or damaged:Backup and Restore Disk Cleanup Disk Defragmenter Compactor9. A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space, and improves system performance:Backup and Restore Disk Cleanup Disk Defragmenter Compactor 10. Windows makes it easy to update drivers with Windows:Backup Restore Driver UpdateMultiple 61. This container houses most of the electrical components for a computer system.carrier package system board system unit TV tuner2. Similar to notebooks, this system unit specializes in on-the-go Web browsing and e-mail access.chassis desktop media center netbook3. Computers can only recognize this type of electronic signal.analog bus digital maximum4. The main or motherboard is also known as the:computer board processor mobile system system board5. How many bytes can a 32-bit-word computer access at one time1 48 166. In a microcomputer system, the central processing unit is contained on a single:bus chip module RAM7. This type of memory divides large programs into parts and stores the parts on a secondary storage device.direct expanded random-access virtual8. Also known as NIC, this adapter card is used to connect a computer to a:AIA expansion graphics network9. This provides a pathway to connect parts of the CPU to each other.bus Plug and Play wired wireless10. Older ports that have largely been replaced by faster, more flexible ports are called:buses expandable legacy renderedMultiple 71. Most keyboards use an arrangement of keys known as:Alpha Daisy OptiKey QWERTY2. The device that controls a pointer displayed on the monitor.cord mouse printer scanner3. Also known as a roller ball, this device controls the pointer by rotatinga ball with your thumb.trackball joystick cordless mouse stylus4. The type of screen that can be touched with more than one finger and supports zooming in and out by pinching and stretching your fingers.digital dynamic multitouch OLED5. Flatbed and document are types of:headsets HDTVs monitors scanners6. Device used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips.MICR FDIC OMR UPC7. The most widely used audio-input device.mouse VR microphone TFT8. The monitor feature that specifies how often a displayed image is updated.aspect ratio dot pitch refresh rateresolution rate9. Handheld, book-sized devices that display text and graphics.e-book readers HDTV lasers whiteboards10. This technology allows television stations to broadcast their programming directly to smartphones, computers, and digital media players.CRT HDTV LED Mobile DTVMultiple 81. RAM is sometimes referred to as:primary storage ratio active memoryread only memory secondary storage2. The actual physical material that holds the data and programs.primary storage media disk access3. Measures how tightly these charges can be packed next to one another on the disk.density cylinders tracks sectors4. When a read/write head makes contact with the hard disk’s surface, it causesa head:crash land pit scratch5. This hard-disk performance enhancement anticipates data needs.disk caching file compression file decompression RAID6. This type of storage uses pits and lands to represent 1s and 0s.cloud hard disk optical solid state7. DVD stands for:digital versatile disc digital video datadynamic versatile disc dynamic video disc8. USB drives are also known as:flash drives optical drives ports universal state bus9. An organizational strategy to promote efficient and safe use of data across the networks.cloud dynamic data mission statemententerprise storage system RAID10. A mass storage device that provides access to data archived on tapes.file system NAS RAID system tape libraryMultiple 91. The concept related to using computer networks to link people and resources.connectivity GPS TCP/IP Wi-Fi2. A high-frequency transmission cable that delivers television signals as well as connects computers in a network.coaxial hi def 3-D twisted pair3. A short-range radio communication standard that transmits data over short distances of up to approximately 30 feet.Bluetooth broadband DSL TCP/IP4. The speed with which a modem transmits data is called its:digital velocity dynamic rate modular rating transfer rate5. The bandwidth typically used for DSL, cable, and satellite connections to the Internet.baseband broadband medium band voiceband6. Every computer on the Internet has a unique numeric address called a(n):IP address DNS broadcast packet7. Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.PCMCIA NIC server VPN8. A device that allows one LAN to be linked to other LANs or to larger networks.IDS network gateway PAN switch9. Typically using Wi-Fi technology, these wireless access points are typically available from public places such as coffee shops, libraries, bookstores, colleges, and universities.hotspots extranets PANs LANs10. Star, tree, and mesh are three types of network:topologies protocols strategies devicesMultiple 101. The three primary privacy issues are accuracy, property, and:access ethics ownership security2. To easily get names, addresses, and other details about a person using only his or her telephone number, government authorities and others use a(n):adware cookie keystroke logger reverse directory worm3. Browsers store the locations of sites visited in a:history menu tool bar firewall4. The browser mode that eliminates history files and blocks most cookies.detect insert privacy sleep5. The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:access approval firewall online identity phish6. Computer criminals who specialize in stealing, trading, and using stolen credit cards over the Internet are known as:carders card scammers cyber traders identity thieves7. Programs that come into a computer system disguised as something else are called:Trojan horses viruses Web bugs zombies8. The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:cyber-bullying online harassmentsocial media discrimination unethical communication9. Special hardware and software used to control access to a corporation’s private network is known as a(n):antivirus program communication gatefirewall spyware removal program10. To prevent copyright violations, corporations often use:ACT DRM VPN WPAMultiple 111. Which of the basic organizational functions records all financial activity from billing customers to paying employeesaccounting marketing production research2. What managerial level has information flow that is vertical, horizontal, and externaltop supervisory middle foreman3. Which computer-based information system uses data from TPS and analytical tools to support middle managersESS MIS DSS TPS4. Accounts payable refers to money the company owes its suppliers for materials and services it has:created exported inventoried received5. What accounting activity keeps track of all summaries of all transactionsbalance sheet general ledgerincome statement inventory control6. What accounting statement lists the overall financial condition of an organizationbalance sheet general ledgerincome statement inventory control7. What type of report is produced at regular intervalsdemand exception inventory periodic8. A DSS consists of four parts: user, system software, decision models, and:application software data operating systemspreadsheets9. What type of worker is involved with the distribution, communication, and creation of informationexecutive foreman information knowledge10. What type of program is designed to schedule, plan, and control project resourcesauditing dtp project managers schedulersMultiple 121. Facts or observations about people, places, things, and events are:data occurrences records tables2. The most basic logical data element such as a single letter, number, or special character is known as a:character element phrase record3. Each record in a database has at least one distinctive field, called the:key field structure type view4. One element of database security is to provide only authorized users with:classes nodes passwords relations5. The bridge between the logical and physical views of the data is provided by:DBMS records SQL tables6. Highly trained computer specialists who interact with the data administration subsystem are known as:DBMS data modelers database administrators relational specialists7. In a network database, each child node may have more than one parent node; this is known as a:hierarchy many-to-many relationshipparent relationship relational relationship8. Connections between parent nodes and child nodes are provided by:characters DBA objects pointers9. Two of the most significant advantages of multidimensional databases over relational databases are processing speed and:conceptualization control format objectification10. Object-oriented databases organize data by classes, attributes, methods, and:objects relations space timeMultiple 131. An information system is a collection of hardware, software, people, procedures, and:data DBMS specialists system analysts2. What is the first phase in the systems life cycleneeds analysis preliminary investigationsystems analysis systems design3. Which phase in the systems life cycle involves installing the new system and training peoplepreliminary investigation systems analysissystem design systems implementation4. This phase in the systems life cycle is concerned about determining system requirements not in design.preliminary investigation systems analysissystem design systems implementation5. Which systems analysis tool shows the relationship between input and output documentschecklist data flow decision table grid chart6. These tools relieve the systems analysts of many repetitive tasks, develop clear documentation, and, for larger projects, coordinate team member activities.automated systems life cycle CASEdata flow analyzers flow charts7. Which systems life cycle phase is concerned with economic, technical, and operational feasibilitypreliminary investigation systems analysissystems design systems implementation8. What type of feasibility evaluates whether the people within the organization will embrace or resist a new systembehavioral economic operational techinical9. Which approach to conversion begins by trying out a new system in only one part of an organizationdirect pilot parallel phased10. An alternative to the systems life cycle approach using powerful development software, small specialized teams, and highly trained personnel.AAD CASE prototyping RADMultiple 141. A program is a list of instructions for the computer to follow to process:data direct logic hardware software2. The major processing steps identified in a top-down program design are called:assembly instructions modules logic3. The programming logic structure in which one program statement follows another.concatenation loop repetition selection4. One of the best ways to code effective programs is to use the three basic logic structures to create:content-markup programs modular languagespseudocode structured programs5. Which step in the six-step programming procedure involves desk checking and searching for syntax and logic errorsprogram design program documentationprogram maintenance program test6. Which step in the six-step programming procedure is the final stepprogram design program documentationprogram test program maintenance7. Unlike traditional systems development, this software development approach focuses less on the procedures and more on defining the relationships between previously defined procedures.2GL context-markup module object-oriented8. Natural languages are considered to be a:high-level language low-level languagemid-level language procedural language9. A compiler converts the programmer’s procedural language program, called the source code, into a machine language code, called the:interpreter code object codestructured code top-down code10. The 4GL languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a database.query application generator C11 COBOLMultiple 151. People who react to technology by thinking computers are magic boxes capable of solving all kinds of problems that computers really can’t handle are:cynics frustrated naïve proactive2. The type of person that looks at technology in a positive realistic way is:cynical proactive naïve frustrated3. Books, journals, and trade associations are the best sources to help you:develop personal contacts develop specialtieslook for innovative opportunities maintain your computer competency4. If your career is in marketing, it makes sense to develop a specialty in:database desktop publishingprogramming systems analysis and design5. What computer professional repairs and installs computer components and systemscomputer technician data entry workerdesktop publisher software engineer6. What computer professional designs, tests, and researches encryption procedurescryptographer network administratorprogrammer software engineer7. What computer professional uses database management software to determine the most efficient ways to organize and access datacryptographer database administratorprogrammer software engineer8. What computer professional oversees the work of programmers, computer specialists, systems analysts, and other computer professionalsnetwork managersoftware engineer technical writer9. What computer professional creates, tests, and troubleshoots computer programsnetwork manager programmersoftware engineer technical writer10. What computer professional plans and designs information systemsnetwork manager programmersoftware engineer systems analyst。
大学生《计算机专业英语》考试题目
《计算机专业英语》一、Choice (选择)(15 题,每题1 分,共15 分)Choose the best answer for each blank.(从每题四个选项中,选出最合适的一项)1) As an operating system repeatedly allocates and frees storage space, many physically separated unused areas appear. This phenomenon is called ______.A. fragmentationB. compactionC. swappingD. paging2) We can use the word processor to _________ your documents.A. editB. computeC. translateD. unload3) _____________ infected computer may lose its data.A. FileB. Data baseC. VirusD. Program4) One use of networks is to let several computers share ____ such as file system, printers, and tape drives.A. CPUB. memoryC. resourcesD. data5) A firewall is a ____ system designed to ___ an organization’s network against threats.A. operating, preventB. programming, developC. security, protectD. service, exploit6) The ____ has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.A. applicationB. information systemC. networkD. operating system7) ____ is the address of a variable or a variable in which the address of anothervariable is stored.A. DirectorB. PointerC. ArrayD. Record8) C++ is used with proper ____ design techniques.A. object-orientedB. object-basedC. face to objectD. face to target9) A data ( ) is a file that contains metadata-that is, data about data.A. structureB. tableC. baseD. dictionary10) A network software consists of ( ), or rules by which processes can communicate.A. protocolsB. programsC. devicesD. computers11) The firewall device is a ( ) system for connecting a computer network toother computer network.A. hardwareB. softwareC. securityD. I/O12) We can use the word processor to _________ your documents.A. editB. computeC. translateD. unload13) _________ processing offers many ways to edit text and establish document formats. You can easily insert, delete, change, move and copy words or blocks of text.A. DataB. DatabaseC. WordD. File14) A ________ copies a photograph, drawing or page of text into the computer. A.scanner B.printer C.display D.Keyboard15) _________ is the sending and receiving of the message by computer. It is a fast, low-cost way of communicating worldwide.A.LAN B.Post office C.E-Mail D.Interface二、Cloze (完形填空)(4 篇篇20 题,每题1.5 分,共30 分)Choose the best answer for each blank.(从每题选项中,选出最合适的一项)Passage 1Have you ever wondered how information processed by the system unit is1) into a form that you can use? That is the role of output devices. While inputdevices convert what we understand into what the system unit can process, output devicesconvert what the system unit has processed into a form that we can understand. Output devices 2) machine language into letters, numbers, sounds, and images that peoplecan understand.Competent end users need to know about the most commonly used input devices, including keyboards, mice, 3) , digital cameras, digitizing tablets, voice recognition,and MIDI devices. Additionally, they need to know about the most commonly used output devices. And end users need to be aware of 4) input and output devices such as fax machines, multifunctional devices, 5) telephones, and terminals.1) A. converted B. convinced2) A. transact B. translate3) A. scanners B. scan4) A. combination B. communication5) A. Intranet B. InternetPassage 2ABC is an interactive programming language and environment for personal computing, originally 6) ____ as a good replacement for BASIC. It was designed by 7)____ a task analysis of the programming task.ABC is easy to learn (an hour or so for someone who has already programmed), and yet easy to use. Originally intended as a language for 8) ______, it has evolved into a powerful tool for beginners and experts alike.Some features of the language:op-down programmingSome features of the environment:logging outediting, or entering input to a program6) A. intending B. intended7) A. first does B. first doing8) A. beginners B. beginning9) A. easily be combined B. easy be combined10) A. is shown to B. is showing toPassage 3Bulletin Board Systems (BBS)Bulletin Board Systems are a 11)______ telecommunications services provided bythe internet, public information services, and 12)_______ of business firms, organization, and end user groups. An electronic bulletin board system allows you to post public or private messages that other end 13)______ can read by accessing the BBS with their computers. Establishing a small BBS for a business is not that difficult. Minimum requirements are a microcomputer with a hard disk drive, custom or packaged BBS 14)_______, modem and a telephone line. Bulletin Board System serves as a central location to post and pick up messages or upload and download data files or programs 24 hours a day. A BBS helps end users ask questions, get advice, locate and share information, and get 15)_______ touch with other end users.11) A. popular B. unpopular12) A. thousand B. thousands13) A. use B. users14) A. software B. hardware15) A. on B. inPassage 4A: displaying B: messages C: received D: network E: usersElectronic MailMillions of end 16)________ now depend on electronic mail (e-mail) to send andreceive electronic 17)________. You can send e-mail to anyone on your 18)________ for storage in his/her electronic mail boxes or magnetic disk drives. Whenever they are ready, they can read their electronic mail by 19)________ it on the video screens at their workstations. So, with only a few minutes of effort (and a microseconds of transmission),a message to one or many individuals can be composed, sent, and 20)_______.三、Term Translation (术语翻译)(10 题,每题1.5 分,共15 分)Write out their English abbreviations of the following terms and then translate them into Chinese.(写出下列专业术语的英文简称,并将其翻译成汉语)1) Personal Digital Assistant2) Wireless-Fidelity3)Digital Video Disc4)Joint Photographic Experts Group5)Graphical User Interface6)Professional Hypertext Preprocessor7)Simulation Language8)Object-oriented Programming9)Uninterruptable Power Supply10)Universal Serial Bus四、Short Answer (简答)(2 题,每题4 分,共8 分)Answer the following questions in English.(用英文回答下列问题)1)Please write down the components of hardware.2) Please write down the classification(分类)of operating system according to the application area(应用领域).五、Sentence Translation (句子翻译)(8 题,每题4 分,共32 分)Translate the following English sentences into Chinese.(将下列英文句子翻译成汉语)1) This input is digitized and converted to standard text that can be further processed by programs such as a word processor.2)The most common input devices are the keyboard and the mouse.3) The network operating system is designed to control the computers that are linked together via a network.4) The BIOS (Basic Input Output System)is responsible for waking up the computer when you turn it off.5)A primary purpose of programming languages is to enable programmers to express their intent for a computation more easily than they could with a lower-level language or machine code.6)During the last few decades, a large number of computer languages have been introduced.7) The entire office automation system comprises five sub-systems.8) Image Processing System allows end users to electronically capture, store, process, and retrieve images of documents.。
计算机英语练习试题
计算机英语测试题一、词汇(选择一个最合适的词汇,将对应的英文字母填入空格内。
每题1分,共10分)1、____ refers to the parts of the computer that you can see and touch.A. SoftwareB. HardwareC. HardshipD. Instruction2、primary memory which is stored on chips located ____.A. on the motherboardB. outsideC. inside the processorD. on the CPU3、The display screen is the most common ____ device used to show you what the computer is doing.A. inputB. printingC. outputD. electronic4、Windows gives you more control over the ____ you work.A. operationB. wayC. energyD. power5、The most important program on any computer is ____.A. Operating SystemB. VirusC. softwareD. Office 20006、There are ____ separate products that form the Windows 2000。
A. only oneB. twoC. threeD. four7、C might best be ____ as a 'medium-level language'.A. developedB. decodedC. programmedD. described8、Anti-Virus protects your computer from viruses by ____ your computer's memory and disk devices.A. deletingB. changingC. scanningD. replacing9、Multimedia will become increasingly ____ throughout every aspect of our lives.A. passB. preciseC. permitD. pervasive10、Communication through the Internet, the____performs the reverse function.A. A station controller (STACO)B. DTEC. Data communications equipment (DCE)D. CRT二、语法——单项选择题(每小题1.5分,共15分)1、The girl I saw ____ brown hair and blue eyes.A. had sheB. she hadC. herD. had2、I didn't hear the phone last night, I ____ asleep.A. must beB. must have beenC. should beD. should have been3、He was glad to find the fire ____ brightly.A. burningB. burnedC. to bumD. have bum4、Though ____ by what he said ,she didn't believe in him.A. attractingB. she attractedC. attractedD. have been attracted5、____ that ,I could do it much better.A. If I doB. If I were doC. Were I to doD. Were I do6、It was in this very place ____ I bought the laser printer.A. whereB. whenC. in whichD. that7、He is old enough to tell right ____ wrong.A. ofB. inC. fromD. to8、____ he did was quite wrong.A. WhatB. ThatC. IfD. Which9、____, we missed our plane.A. The train being lateB. To be lateC. The train is being lateD. The train which is late10、I wish that I ____ the concert last night.A. couldB. have attendedC. could have attendedD. attended三、多选(每小题2分,共20分)1、Windows 2000 is ____.a.new lease of Windowsc.the same as Windows NTb.an inventive technologyd.used for building a scalable network2、C++ is ____.a.object-orientedc.extended from Cb.procedure-orientedd.a superset of C3、Office automation is ____.a.the application of computerc.communications technologyb.the computerd.used to improve the productivity of people4、Microsoft Office Professional 2000 include ____.a.Word 2000c.Excel2000b.PowerPoint 2000d.Outlook 20005、Types of media include ____.a.textc.animationb.full-motion videod.audio6、Modem is ____.a.a modulatorc.a modulator/demodulatorb.a demodulatord.a data set7、The Internet is ____.a.as a common internetc.constrained by a set of IP suiteb.a specific kind of internet d.defined as the network of networks8、Viruses can delay their attack for ____.a.daysb.weeksc.monthsd.years9、The attributes of the stack are ____.a.FIFOc.queueb.LIFOd.built into their circuitry10、With an Internet connection you can get some of the basic services available are:a.E-mailb.Telnetc.FTPd.Usenet news四、完形填空(选择一个最合适的答案,将对应的英文字母填入空格内。
计算机专业英语(第1次考试)
A、A. must be
B、B. must have been
C、C. should be
D、D. should have been
15、The data, when they are not encrypted, are called ( ).(1分)
考试课程:9025.计算机专业英语(第1次考试)考试时间:120分钟考场:123.15.57.119考试日期:2014-10-16
考号:13001184007姓名:曾渭权
剩余时间:
18:42
保存交卷帮助
窗体顶端
本卷共有3大题。
窗体底端
一、单项选择题(15道小题,共15分)
1、( )is a word processing tool that helps you to create quality documents.(1分)
A、CLR
B、CORB~A
C、OMG
D、IIS
4、( ) refers to the parts of the computer that you can see and touch.(1分)
A、Software
B、Hardware
C、Hardship
D、Instruction
5、how to translate the word "中央处理器"(1分)
A、plaintext
B、ciphertext
C、hypertext
D、context
二、多项选择题(15道小题,共45分)
1、There are AB( ) between the DTEs.(3分)
计算机专业英语
1、 is the ________ model for .NET-based applications. (data access)A、data miningB、data achieveC、data processD、data access2、____________, such as those supplied for OLE DB and ODBC, allow you to use data libraries designed for earlier data access technologies.A、Bridge providersB、Native providersC、D、3、__________, such as the SQL Server and Oracle providers, typically offer perf ormance improvements due, in part, to the fact that there is one less layer of abstraction.A、Native providersB、Bridge providersC、D、4、if we want to retrieve data from the database with SQL,we should use the comand ofA、sel_ectB、upd_ateC、del_eteD、ins_ert5、In SQL,______causes an object (a table, for example) to be created within the da tabase.A、ALTERB、dropC、createD、TRUNCATE第二题、多项选择题(每题2分,5道题共10分)1、Database connection ________ allows an application to reuse an existing connect ion from a pool instead of repeatedly establishing a new connection with the database.A、poolingB、pondC、connectionD、link2、Security is usually enforced through __________________.A、data storingB、auditingC、encryptionD、access controlE、data retrieving3、 relies on the services of .NET data providers.There areA、ConnectionB、CommandC、DataReaderD、Data Adapter4、The core of SQL is formed by a command language that allows the ________ and pe rforming management and administrative functions.A、retrieval of dataB、ins_ertion of dataC、updating of dataD、deletion of dataE、process of data5、The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are:A、System.Data.SqlClient. Contains the SQL Server .NET Data Providertypes.B、System.Data.OracleClient. Contains the Oracle .NET Data ProviderC、System.Data.OleDb. Contains the OLE DB .NET Data Provider types.D、System.Data.Odbc. Contains the ODBC .NET Data Provider types.E、System.Data. Contains provider-independent types such as the DataSet and DataTable.正确错误A computer database relies upon DBMS to organize the storage of data.正确错误All of these databases can not take advantage of indexing to increase their speed.正确错误Database security denotes the system, processes, and procedures that protect a database正确错误Enforcing security is one of the major tasks of the DBA.正确A BC DA(n) ________ is a connecting device that only regenerates the signal.A BC DWhereas a repeater operates only in the physical layer of the OSI model, a bridge operaA BC DA(n) ________ is usually a computer installed with the necessary software and aA BC DThe distinction between the two terms gateway andy are now used interchangeably.A、hubB、routerC、swtichD、gateway第二题、多项选择题(每题2分,5道题共10分)1、The equipment ______.A、manipulates digital information internally in serial formB、manipulates digital information internally in word unitsC、transfers the number of bits in parallelD、transfers the number of bits in serial form2、DTE is ______.A、Digital T-carrierB、data terminal equipmentC、satelliteD、the last piece of equipment that belonged to the subscriber in a data link system3、There are AB_ between the DTEs.A、the modemB、communications equipmentC、digital-to-analog converterD、will be replaced by an upd_ated standard4、__________ provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.A、The Transport LayerB、Session LayerC、Presentation Layer正确错误TCP means it is on the network layer and IP means it is on the transport layer separate正确错误The four topologies in common use are star, router, ring and hub.正确错误Three techniques have been adopted for use of the medium access control in the LANs.正确错误Control token is the only way of controlling access to a shared transmission medium.正确错误A BC DTo access a page on the WWW, one needs a ________A、routerB、codeC、passwordD、browser3、_____ is an architectural framework.A、httpB、wwwC、ftpD、dns4、_____ is built around hypertext and hypermedia.A、DNSB、HTTPC、The WebD、FTP5、__________is a network protocol used to transfer data from one computer to an other through a network such as the Internet.A、SMTPB、HttpC、DNSD、FTP第二题、多项选择题(每题2分,5道题共10分)1、Hypermedia include ( )A、soundsB、video clipsC、textD、flashE、vidoeF、images2、The World Wide Web also subsumes previous Internet information systems such as ( ).A、GopherB、TelnetC、FTPD、Ftp3、The Internet carries various information resources and services, such as ______________________________ and the inter-linked hypertext documentsA、electronic mailB、online chatC、file transferD、file sharingE、online gamingF、talking4、The World Wide Web is a huge set of ________, linked by hyperlinks and URLs.A、interlinked documentsB、imagesC、flashD、all kinds of dataE、pages5、The web browsers which is normal used, such as________________.A、Internet ExplorerB、FirefoxC、Apple SafariD、OpraE、ICQ第三题、判断题(每题1分,5道题共5分)1、Because the Internet is made up of many diverse computers, so together they work like o ne world-wide computer system.正确错误The World Wide Web ties the information together into a big collection of interactive m正确错误The surfing is you can sel ect paths to browse online resource.正确错误If a person read a hypermedia document about mobile phones, then he might sel正确错误Previously the Web provides a wealth of additional capabilities.正确错误A BC D According to Intel,there are _____________A、OneB、TwoC、ThreeD、Four3、A companyˊs ability to deploy and support customer-oriented ___________ sys tems will be of vital importance to its prosperity.A、e-LearningB、e-BankingC、e-BusinessD、e-Shopping4、When most people think of opening a Web business,the first thing that springs to mind i s selling products or ____________online.A、qualityB、servicesC、consciousnessD、5、A Web site is often more effective as a(n) _______ tool than a selling tool.A、PoliticB、TechnicalC、MarketingD、Electronical第二题、多项选择题(每题2分,5道题共10分)1、which is the type of electronic commerce in the following choiceA、B2BB、B2CC、C2C2、Electronic commerce that is conducted between businesses is referred to as business-to-business orA、C2CB、C2BC、B2BD、e-commerce3、Electronic commerce that is conducted between businesses and consumers, on the other ha nd, is referred to asA、B2CB、C2CC、B2BD、e-commerce4、Electronic commerce may be defined as the entire set of processes that suport _____________activities on a(n) ________ and involve information analysis.A、commercial,networkB、society,humanC、personal,society5、Electronic payments include ___________________.A、digital currenciesB、credit card paymentsC、electronic checksD、cash payment第三题、判断题(每题1分,5道题共5分)1、Online shopping is the process consumers go through to purchase products or services ov er the Internet.正确错误2、In general, shopping has always catered to middle class and upper class women.正确错误3、Electronic money is also called digital cash or electronic token正确错误4、Online content providers make money in two ways:advertisements and selling.正确错误5、Designers of online shops should consider the effects of information load.正确错误A BC DAnti-Virus protects your computer from viruses byA BC DA virus is aA BC DIn 2000, the number of viruses topped ( ).A BC DThe Whale will crea e ( ) different versions of itself when it infects files.A BC DC、logic bombsD、Microsoft Word Documents3、( ) maybe a certain cause that some viruses infect upon.A、a dayB、a timeC、an external event on your PCD、a counter within the virus4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.A、stealing storageB、pilfer CPU cyclesC、del_ete filesD、play music5、which is the threat to computer security in the following choices ?A、Computer CriminalsB、Computer CrimeC、earthquakeD、Human Errors第三题、判断题(每题1分,5道题共5分)1、Computer security is a branch of technology known as information security as applied to computers.正确错误2、Michelangelo is a file sector.正确错误3、Computer virus is remote from us.正确错误Computer virus may affect the your phisical health .正确错误The author thinks that understanding how an attacker approaches your computer system ca 正确错误When you are old and grey and full of sleep,And nodding by the fire, take down this book,And slowly read, and dream of the soft lookYour eyes had once, and of their shadows deep;How many loved your moments of glad grace,And loved your beauty with love false or true,But one man loved the pilgrim soul in you,And loved the sorrows of your changing face;And bending down beside the glowing bars,Murmur, a little sadly, how love fledAnd paced upon the mountains overheadAnd hid his face amid a crowd of stars.The furthest distance in the worldIs not between life and deathBut when I stand in front of youYet you don't know thatI love you.The furthest distance in the worldIs not when I stand in front of youYet you can't see my loveBut when undoubtedly knowing the love from both Yet cannot be together.The furthest distance in the worldIs not being apart while being in loveBut when I plainly cannot resist the yearningYet pretending you have never been in my heart. The furthest distance in the worldIs not struggling against the tidesBut using one's indifferent heartTo dig an uncrossable riverFor the one who loves you.倚窗远眺,目光目光尽处必有一座山,那影影绰绰的黛绿色的影,是春天的颜色。
计算机专业英语Unit 7
Unit 7 The Fundamentals of ComputerSoftwareText 1 Data StructureExercises1. Multiple choices.(1)The attributes of the stack are ( A ).A. FIFOB. LIFOC. queueD. built into their circuitry(2)Queues that occur everyday life can be seen ( ABCD ).A. in an emergency room of a hospitalB. in certain societies lacking equalityC. as people waiting for service at a bankD. as automobiles waiting for a traffic light(3)A stack protocol can be used for ( C ).A. subroutine callsB. operation of arithmetic expressionsC. removing the latest element insertedD. removing the earliest element inserted(4)The operations of a structured data type might act on ( ABCD ).A. a stackB. the values of the data typeC. component elements of the data structureD. a queue2. Decide whether the following statements are True or False.(1)The operations of a structured data type only act on the values of the data type. (×)(2)A stack is a data type whose major attributes are determined by the rules governing theinsertion and deletion of its elements. (√)(3)A stack is a data type whose data structure is said to have a first-in/last-out (FILO)behavior, or protocol. (√)(4)The series of jobs awaiting execution is called a queue. (√)(5)The main feature of queues is that they follow a first-come/first-served rule. (√)3. Translate and analyze the following sentences.(1)A data structure is a data type whose values are composed of component elements thatUnit 7The Fundamentals of Computer Software110are related by some structure.句子组成:whose引导定语从句,composed of…由…组成。
《计算机专业英语》在线测试04(全对)1
错误
5、A powerful debugger can find nearly all of bugs.
正确
错误
窗体底端
A、high-level
B、low-level
C、flat level
D、
4、High-level languages must first be translated into a(n)__________language before they can be understood and processed by a computer
C、removing the latest element ins_erted
D、removing the earliest element ins_erted
3、The operations of a structured data type might act on ( ).
A、a stack
B、the values of the data type
C、component elements of the data structure
D、a queue
4、We can classify programming languages under two types:______________languages and____________languag、Usual
D、Advanced
5、The history of programming languages can be traced back almost to the invention of the_________computer in th 1940s.
C、as people waiting for service at a bank
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1.A user interface we said here is __ABC________A.a text-based user interface or GUIB.an interface between a computer and its peripheral deviceC.an interaction between an operating system and a userD.an interaction between an application program and a user2.___A___provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.A.The Transport LayerB. Session LayerC. Network LayerE.Application Layer E. Presentation Layer3.Many viruses do harmful things such as (ABCD ).A.deleting filesB. slowing your PC downB.simulating typos D. changing random data on your disk4.We can classify programming languages under two types:(AB ) languages and ( )languages.A.high-levelB. low-levelC. advanced-levelD. basic-level5.With an Internet connection you can get some of the basic services available are:___ABCD_______A.E-mailB. TelnetC. FTPD. Usenet news6. A general purpose computer has four main sections: ( ABCE).A.the control unitB. the memoryC. the input and output devicesD. the cpuE. the arithmetic and logic unit (ALU),7.Windows 2000 has the key technologies, they are (ABCD ).A.securityB. active directoryC. flat directoryD. enterprise management8.The register file is___ACD_______A.addressed by much shorter addressesB. physically largeC.physically smallD. one the same chip as the CPU9. A stack protocol can be used for (A ).A.removing the latest element ins( )ertedB. removing the earliest element ins( )ertedC. subroutine callsD. operation of arithmetic expressions10.The end equipment in a communication system includes (ABCD ).A.printersB. computersC. CRTsD. keyboards11.Microsoft Office Professional 2000 include____ABCD______.A.Excel 2000B. PowerPoint 2000C. Word 2000D. Outlook 200012. A general purpose computer has four main sections: ______ABCE______A.the input and output devicesB. the memoryC. the arithmetic and logic unit (ALU),D. the cpuE. the control unit13.The two most common types of scanners are (BC ) and ( )A. hand-held scannersB. flatbed scannersC. auto scannersD. handler scanners14.Some viruses use (CD ) and ( ) techniques to hide their existence.A.quickly spreadB. replace a part of system softwareC. stealthD. polymorphic15.The Windows 2000 product line includes____ABCD______.A.Windows 2000 Datacenter ServerB. Windows 2000 ProfessionalC. Windows 2000 ServerD. Windows 2000 Advanced Server16.Similar to viruses, you can also find malicious code in (ABC ).A.Trojan HorsesB. logic bombsC. wormsD. Microsoft Word Documents17.Viruses all have two phases to their execution, the ( ) and the ( BD).A.create phaseB. attack phaseC. del( )ete phaseD. infection phase18.Active Directory can help you (ACD ).A.get off the limits of down level networksB. deliver complete enterprise security by itselfC. build a complex international networkD. manage every resource with a single logon19.High-level languages are commonly classified as (ACDE ).A.object-orientedB. automaticC. functionalD. logic languagesE. procedure-oriented20.(CD )is a type of executable file .A.TXT fileB. JPG fileC. EXE fileD. COM file21.( ABCD) maybe a certain cause that some viruses infect upon.A.an external event on your PCB. a dayC. a counter within the virusD. a time22.(BC )is a type of executable file .A.TXT fileB. EXE fileC. COM fileD. JPG file23.The web browsers which is normal used, such as(ABCE ).A.FirefoxB. Internet ExplorerC. OpraD. ICQE. Apple Safari24.Newer ideas in computing such as(ABDE ) have radically altered the traditional concepts that once determined program form and functionA.artificial intelligenceB. distributed computingC. software engineeringD. parallel computingE. data mining25.Microsoft Windows currently supports __AC___and _____file systemsA.NTFSB. OCFSC. FATD. ext2E. NILFS26.Modem is ____ACD______.A.a modulator/demodulatorB. a data setC. a demodulatorD. a modulator27.The equipment _AB_____.A.transfers the number of bits in serial formB.manipulates digital information internally in word unitsC.transfers the number of bits in parallelD. manipulates digital information internally in serial form28.Electronic commerce that is conducted between businesses is referred to as business-to-business or DA. C2CB. C2BC. e-commerceD. B2B29.The World Wide Web also subsumes previous Internet information systems such as (AC ).A.GopherB. FtpC. FTPD. Telnet relies on the services of .NET data providers.There are ABCDA.ConnectionB. Data AdapterC. DataReaderD. Command31.The development process in the software life cycle involves four phases: analysis, design, implementation, and ___ACDE_____.A.analysisB. auditC. implementationD. designE. testing32.The end equipment in a communication system includes __ABCD____.A.printersB. CRTsC. computersD. keyboards33.In electronic commerce ,information search and discovery services include (ABCDE ).A.search enginesB. information filtersC. software agentsD. directoriesE. electronic catalogs34.GIS work with two fundamentally different types of geographic models.They are the (BD ).A.geography modelB. vector modelC. mathematic modelD. raster modelE. data model35.The two most common types of scanners are ____AC___and _____A.flatbed scannersB. hand-held scannersC. auto scannersD. handler scanners36.Windows 2000 has the key technologies, they are ( ABCD).A.active directoryB. flat directoryC. enterprise managementD. securityputer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes: ABCA.Firmware which is software programmed resident to electrically programmable memorydevices on board mainboards or other types of integrated hardware carriers.B.Application software such as word processors which perform productive tasks for users.C.Middleware which controls and co-ordinates distributed systems.38.Software engineering is related to the disciplines of ___ADE_____A.project managementB. natural languageC. netural networkD. systems engineeringE. computer science39.What make it is difficult to agree on how to count viruses? ABCDA.some viruses can create different versions when they infect other programsB.just a trivial change may create a new virusC.some viruses can use polymorphic techniqueD.new virus arise from an existing virus40. A virus is a program that reproduces its own code by (ABC ).A.ins_erting into the middle of a fileB. simply placing a pointerC. adding to the end of a fileD. replacing another program41.Input devices include: ____ABCD______.A.the keyboardB. microphoneC. touch screenD. the mouse42.Viruses all have two phases to their execution, the ( ) and the ( AD).A.attack phaseB. create phaseC. del_ete phaseD. infection phase43.The equipment (BC ).A.manipulates digital information internally in serial formB.manipulates digital information internally in word unitsC.transfers the number of bits in serial formD.transfers the number of bits in parallel44.Office automation is___CD_______.A.. the computerB. communications technologyC. the application of computerD. used to improve the productivity of people45.The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are: ABCDEA.System.Data.SqlClient. Contains the SQL Server .NET Data Provider types.B.System.Data.Odbc. Contains the ODBC .NET Data Provider types.C.System.Data. Contains provider-independent types such as the DataSet and DataTable.D.System.Data.OracleClient. Contains the Oracle .NET Data ProviderE.System.Data.OleDb. Contains the OLE DB .NET Data Provider types.46.C++ is __ACD________.A.extended from CB. a superset of CC. object-orientedD. procedure-oriented47.Some viruses, with no attack phase, often damage the programs or disks they infect because they (AD ).A.have bugs in themB. show messages on your screenC. steal storageD. contain poor quality code48.Windows 2000 is ( A).A.an inventive technologyB. used for building a scalable networkB.the same as Windows NT D. new lease of Windows49.Some common applications related to electronic commerce are the following:A.TeleconferencingB. Online bankingC. EmailD. Instant messagingE. Enterprise content managementF. NewsgroupsG. Shopping cart software50. A program is a sequence of ( ) that can be executed by a computer.It can either be built into the hardware or exist independently in the form of (BC ).A.hardwareB. softwareC. instructionsD. data51.Electronic payments include ___ABCD______.A.credit card paymentsB. electronic checksC. digital currenciesD. cash payment52.The web browsers which is normal used, such as____ABCD_____.A.OpraB. Internet ExplorerC. FirefoxD. Apple SafariE. ICQputer programs fall into two major classes: __AC____and ____.A.application programsB. application suiteC. operating systemsD. database application54.Database connection ( B) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.A.pondB. poolingC. linkD. connection55.The development process in the software life cycle involves four phases: analysis, design, implementation, and (ABCE ).A.implementationB. designC. analysisD. auditE. testing56.Hypermedia include ( ABCDEF)A.video clipsB. imagesC. textD. flashE. vidoeF. sounds57.An asleep state is_____ABD_____ed to lessen wear-and tear on the computerB. used for saving energyC. indicated by the indicator light putting outD. a low power standby mode58.Electronic payments include (ABCD ).A.digital currenciesB. electronic checksC. credit card paymentsD. cash payment59.You want to (BCD ) maybe wake up a virus that has residented in memory.A.del( )ete a fileB. access a disketteC. execute a programD. copy a file60.Before you turn the power on with a new computer, you should make sure_____ABCD_____A.the computer system has been set upB. the computer is already out of the boxB.appropriate software have been installed D. appropriate cables are correctly connected61.Security is usually enforced through ___ABE________.A.access controlB. encryptionC. data retrievingD. data storingE. auditingputer programming is the process of ABCD__the source code of computer programs.A. testingB. maintainingC. debuggingD. writing63.Queues that occur everyday life can be seen ( ABCD).A.as automobiles waiting for a traffic lightB. as people waiting for service at a bankC. in certain societies lacking equalityD. in an emergency room of a hospital64.Static graphics include____AB______.A.animatorsB. photographsC. moviesD. pictures66.which is the threat to computer security in the following choices ? ABCDA. Computer CriminalsB. Human ErrorsC. Computer CrimeD. earthquake65.The attributes of the stack are______A____.A.queueB. FIFOC. built into their circuitryD. LIFO66.If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission. BDA.play musicB. stealing storageC. del( )ete filesD. pilfer CPU cycles67.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are _______ABDE___________. A.minicomputers B. mainframes C. note book D. workstation E. microcomputers F. lenovo68.The Application layer in TCP/IP Model is correspond to (ABD ) in OSI ModelA.Presentation LayerB. Session LayerC. Transport LayerD. Application LayerE. Network Layer69. A computer system user generally more cares for___ABD_______A.speed of computationB. storage sizeC. physical size of the computerD. efficiency of the computer71.Cache is____ABC______A. slowB. high costC. fastD. relatively small72.We can say a bus is simply_____ABC_____ .A. a wireB. a 16-bit busC. a group of wiresD. a 8-bit bus73.Viruses can delay their attack for (ABCD ).A.yearsB. monthsC. weeksD. days74.In order to increase our computer’s performance we need to____BCD______A.buy a L1 cacheB. have a much larger main memoryC. have a L2 cacheD. buy a L2 cache75.The software that controls the interaction between the input and output hardware is called BIOS,which stands of __A________A.Basic Input Output SystemB. Classic Input Output SystemB.Advanced Input Output System D. Junior Input Output System76.To enhance performance of a computer system we should____ACD______A.improve the pattern of referencing operandB. optimize the simple movement of dataC. optimize the basic sequence control mechanismD. use IF and LOOP instructions as many as possible77.Their company used international lawyers to prosecute a crime ring involving software ____A____in Thailand.A.piracyB. copyingC. duplicationD. cloning78.The software that controls the interaction between the input and output hardware is called BIOS,which stands of (B)A.Advanced Input Output SystemB. Basic Input Output SystemC. Classic Input Output SystemD. Junior Input Output System79.Some viruses use ( AC) and ( ) techniques to hide their existence.A.stealthB. quickly spreadC. polymorphicD. replace a part of system software80.Middleware lies in______ACD____A.the middle of interactions between different application programsB.the top of the layering vertical stackC.the top of an operating systemD.the middle of the layering vertical stack81.Software includes ( ACDE) etcA.video gamesB. all kinds of filesC. programsD. websitesE. mobile application82.The major functional components of an office automation system include: ___ABCD__A.electronic mailB. personal assistance featuresC. information storage and retrievalD. text processing83.The Internet carries various information resources and services, such as (ACDEF ) and the inter-linked hypertext documentsA.online chatB. talkingC. electronic mailD. file transferE. online gamingF. file sharing84. A processor is composed of:____ABCD______.A.an arithmeticB. a control unitC. RegistersD. logic unit85.Functions of the compiler used in RISC are ___ABC_______A.to optimize register usageB.to maximize register usageC.to allocate registers to those variables that will be used the most in a given time periodD.to compile a high level language program86. A digital computer is generally made up of five dstinct elements: a central processing unit,(ABCD).A.a busB. input devicesC. memeory storage devicesD. output devicesE. crt screen87.There are AB (CD)_between the DTEs.A.digital-to-analog converterB. the modemC. communications equipmentD. will be replaced by an upd_ated standard88.What make it is difficult to agree on how to count viruses? ABCDA.just a trivial change may create a new virusB.some viruses can use polymorphic techniqueC.some viruses can create different versions when they infect other programsD.new virus arise from an existing virus89.which aspect have to be considered in the design of a piece of software. ABCDEFGA.Fault-toleranceB. ExtensibilityC. ModularityD. CompatibilityE.MarketabilityF. PackagingG. Maintainability90.Active Directory can help you (ACD ).A.build a complex international networkB. deliver complete enterprise security by itselfC.manage every resource with a single logonD. get off the limits of down level networks91.Early computer solved_____CD_____ problems.A.controlB. engineeringC. mathematicalD. business applications92.The tools which Programming software usually provides include: ABCDEA.debuggersB. text editorsC. linkersD. compilersE. interpreters93.DTE is ( AB).A.data terminal equipmentB.the last piece of equipment that belonged to the subscriber in a data link systemC.satelliteD. Digital T-carrier94.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are ( BDEF).A.note bookB. microcomputersC. lenovoD. minicomputersE. workstationF. mainframes95.which is the type of electronic commerce in the following choice ACA.B2BB. C2CC. B2C96.The operations of a structured data type might act on (ABCD ).A.a stackB. the values of the data typeC. component elements of the data structureD. a queue97.Types of media include__ACD________.A.textB. animationC. audioD. full-motion video98. A virus is a program that reproduces its own code by (ABC ).A.simply placing a pointerB. adding to the end of a fileC. ins( )erting into the middle of a fileD. replacing another program99.According to the text,the author mentions three of the most commonly used types of printer.They are (BDE ).A.belt printerB. dot-matrix printers;C. array printerD. laser printerE. inkjet printers100.The end equipment in a communication system includes ___ABD_______A.keyboardsB. DCEC. CRTsD. computers101.Software includes _____ACDE________etcA.programsB. all kinds of filesC. video gamesD. websitesE. mobile application102.With .NET, Microsoft is opening up a channel both to ( ) in other programming languages and to ( BC). (developers; components)A.coderB. developersC. componentsD. architecturemon contemporary operating systems include (ABCD ).A.LinuxB. Microsoft WindowsC. SolarisD. Mac OS104.A mechanism for translating Internet hostnames into IP addresses is___BCD_______A.equipped into the general-purpose operating systemB.typically inside of operating system kernelC.as a middleware by author’s definitionD.typically outside of operating system kernel105.RISC is____ABC______ed for many computer manufacturers nowadaysB.guided to be built from studying the execution behavior of high-level language programsC.abbreviation of reduced instruction set computerD.abbreviation of complex instruction set computer106.With .NET, Microsoft is opening up a channel both to _BC_______in other programming languages and to ________. (developers; components)A.coderB. componentsC. developersD. architecture107.The tools which Programming software usually provides include: ABCDEpilersB. interpretersC. text editorsD. linkersE. debuggers108.The following products of software are belong to middleware____BCD______A.OracleB. IBM’s Web Sphere MQC. Java 2 PlatformD. J2EE109.The system manager used by a fast processor can____BCD______A.connect a networkB. monitor processor’s core temperatureC. monitor processor’s supply voltagesD. reset a system110.Queues that occur everyday life can be seen (ABCD ).A.as automobiles waiting for a traffic lightB. as people waiting for service at a bankC. in an emergency room of a hospitalD. in certain societies lacking equality111.C++ include the following pillars: ____ABCD______.A.data hidingB. polymorphismC. encapsulationD. inheritance112.Windows 2000 is____ACD______A.new lease of WindowsB. an inventive technologyC. the same as Windows NTD. used for building a scalable network113.We use paged virtual memory to___ABCD_______A.extend the size of memoryB. reduce latency of the diskC. store large program and data setD. increase bandwidth of the disk114.According to the physical size of computers we can classify the __ABCD____ computers into A. supercomputer B. minicomputer C. microcomputer D. mainframe115.Some common applications related to electronic commerce are the following: ABCDEFGA.EmailB. TeleconferencingC. Instant messagingD. Shopping cart softwareE.NewsgroupsF. Enterprise content managementG. Online banking116.One machine cycle in RISC has _B_________A.two machine instructionsB. one machine instructionC. four machine instructionsD. three machine instructions117.The function of computer hardware is typically divided into three main categories.They are____ADE_____.A.inputB. motherboardC. cpuD. storageE. output118.Active Directory supports ( ABCD).A.granular access controlB. inheritanceC. encapsulationD. delegation of administrative task119.The core of SQL is formed by a command language that allows the (ACDE ) and performing management and administrative functions.A.deletion of dataB. process of dataC. updating of dataD. retrieval of dataE. ins( )ertion of data120.Some commentators say the outcome of the information revolution is likely to be as profound as the shift in (ABCD )A.industrialB. agriculturalC. Service IndustryD. handicraft industry。