计算机专业英语作业

合集下载

计算机专业英语作业及答案

计算机专业英语作业及答案

计算机专业英语作业答案(供参考)计算机专业英语作业1第1-3章作业一.Vocabulary( 词汇)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。

) 1.central processing unit(CPU)中央处理器 2.title bar 标题栏3.operating system 操作系统4.personal computer 个人计算机5.menu bar 菜单栏6.desk publishing 桌面排版7.electronic spreadsheet 电子表格8.hard disk 硬盘9.database 数据库10.Cursor 光标(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。

)1.随机存储器RAM 2.只读存储器ROM3.传输控制协议TC P 4.数字视频光盘DVD5.通用串行总线USB 6.计算机辅助设计CAD7.计算机辅助制造CAM 8.中央处理器CPU(三).Translate the following Chinese into English.(根据汉语写出相应的英语。

)1.键盘keybord 2.鼠标mouse 3.扫描仪scanner4.打印机printer 5.输入input 6.输出output7.显示器monitor 8.存储器storage 9.数据库database 10.操作系统operating system 11.应用软件application software 12.字处理器word processor 13.网络浏览器web browser二.Tell whether the following statements are true(T) or false(F).(判断正误。

《计算机专业英语》习题参考答案

《计算机专业英语》习题参考答案

《计算机专业英语》习题参考答案Lesson 1I.1. Operating System2. Fetch-evaluate-execute3. Front-side bus4. Dual-core processor5. Basic Input/Output System(BIOS)II.1. 指令是特定各式的二进制数列,它们对于每台机器都是唯一的。

2. CPU是中央处理单元的简称,每个字母分开发音。

3. 大多数计算在中央处理器中进行。

4. 双核是指一个处理器上有两个完整运算内核的CPU。

5. 处理器:是微处理器或CPU的缩写。

6. 集成电路:即芯片,是由半导体材料制成的一种电子设备。

III.1. F2. T3. TIV.1.ALU, CU, Register2.memory3.processor4.the CPULesson 2I.1.Static Random Access Memory(SRAM)2.Dynamic Random Access Memory(DRAM)3.Virtual Memory4.Physical Memory5.Level 1 Cache6.Level 2 Cache7.HDD access speedII.1.动态随机存储器之所以称为“动态”是因为它每秒钟被刷新数千次。

2.RAM:是计算机中存储操作系统、应用程序和当前正是用数据的地方。

3.ROM由计算机中一小块长寿命电池供电。

4.RAM缓存是由高速静态随机存储器构成的存储器。

III.1. F2. F3. F4. TIV.1. non-volatile2. compiler3. volatile4. DRAMLesson 3I.1. Motherboard2. PC Case3. Hard Disk Drive(HDD)4. Optical mouse5. RAM6. Mobile DiskII.1.PC是有很多组件构成的一个系统。

计算机专业英语习题+答案

计算机专业英语习题+答案

习题+答案2.1Write T or F to each statementT6. An asynchronous device is a clocked device.T7. A latch is an asynchronous device, because it functions at arbitrary times.T8. The repetition of clock pulse can vary from very low rate to very high rate.T9. A synchronous device changes its state only on the arrival of a clock pulse.F10. A clock input may occur at any time.T11. The clock pulses are used to synchronize all operations of the shift register.T13. A unidirectional shift register is capable of shifting in one direction only.F14. In a shift-left register the serial input determines what goes into the leftmost position during the shift register.F15. To provide parallel transfer capability some additional input and output lines should be provided to the shift register.Choose the best answer for each of the following1. How can the output of a logic gate be energized?CA By changing its inputs.B By remaining its inputs unchanged.C By meeting the specific input condition.D By giving a pulse.3. A NAND gate consists of D .A an OR gate followed by an inverterB an AND gate followed by an inverterC an AND gate followed by an OR gateD an inverter followed by an AND gate4. Under what condition is the output of a two-input XOR gate logic-high?BA Its inputs are simultaneously at the same logic level.B Its inputs are simultaneously at opposite logic levels.C Its inputs are logic-low.D its inputs are simultaneously logic-high.2.2Write T or F for each statementT 1. The CPU uses the input and output units to communicate with the outside world.F2. Main memory is sometimes called external memory.F3. After execution the program and the related files of data and files of information will be retained in the main memory for later use.F4. Personal computers have not the features of the larger system..T5. Large systems offer higher processing speeds for user and return more data than PCs. F6. CPUs all size have primary storage, arithmetic logic, and the control section.F7. The output device is the heart of any computer system.T8. The input/output devices and auxiliary storage units of a computer system are called peripherals.F9. The instrument of interpretation and communication between humans and computers system of all sizes is CPU.F10 Special purpose computers can adapted to many situation by giving them an appropriate program.F11 .A minicomputer is the smallest and least expensive type of computer.T12. A special purpose computer performs only one specific task and thus lacks versatility. T13. The larger the system the greater is its processing speed, storage capacity.T14. Mainframe computers are designed to process complex scientific application.T 9. The main memory in a general-purpose computer is made up of RAM integratedcircuit chip.\F 10. When the power is turned on, the program counter is set the first address of thebootstrap loader by the software of the computer.T 11. The read-write heads contact the surface of the floppy disks.T 12. The data on a particular track will be switched automatically onto a spare track by the computer before a catastrophic failure would occur.F 14. The read write heads stay on the same track continuously when the disk drive isWorkingF 16. The possible symbols in the binary numbering system are q to 9.F 17. The decimal value of 16 is represented in 4 bits BCD as 00010101.F 18. Alphanumeric versions of BCD commonly use 6,7or 8 bits to represent characters.F 19. A 6 bit alphanumeric code can represent 128 different characters.F 22. Eight bit codes are limited to representing 128 different characters.T23. An extra check (or parity ) bit is often added to each 6, 7, or 8 bit character represented in storage so that it will be possible to detect coding errors that may occur.T24. If a computer uses an odd parity format to detect errors in character codes, thenevery valid character code will always have an odd number of 1 bits.T25. Processor comes with a unique set of operations called an instruction set.F 26. In an instruction, operands specify the function to be performed.T 27. A processor's job is to retrieve instruction from memory and perform step bystep operations,3.3 True or FalseF1 All operating systems on various computers take the same size.F 2 All operating systems were written in a low level language.T3 The user can't use the computers at all if there is no operating system on the computers.F4 The operating system exists in the lowest layer of a computer.T5 The system calls are provided by the operating system.T 6 A computer's operational software defines the schedule of jobs awaiting execution.F7 Though an operating system can schedule the execution of jobs, it does not manage the availability of I/O devices.T 8 The IOCS component of an operating system controls I/O operations.T9 It is a major problem for the operating system to map the logical file concept onto physical storage devices such as magnetic tape or disk.F10 Files can only be direct access on a disk system.T 11 The logic structure and nomenclature of the different operating systems vary considerable.F12 The form of the system prompt is the same for every kind of operating system 13 You must boot the system, before you use a microcomputer.T14 Spooling is an approach to improving system performance by over aping the input of one job with the output of other jobs.T15 Multiprogramming allows time sharing.T1 6 When they first appeared, the microcomputers were provided with the operating system developed for computers.T17 By using the graphical user interface, what the users need to do is to "point and click" in order to accomplish their tasks.T18 The interface introduced by Windows is the object-oriented user interface.T 19.TMicrosoft failed in betting their future on Windows.Multiple Choice1 A computer's operating system is:Da resource managementb error recoveryc memory managementd all the above2 Which is the generalization of a two-level directory?Da cycle graph directory structureb a tree-structuredc batch systemd all the above3 Which system may have no time constrains?Ca real-time systemb time-share systemc batch systemd all the above4 The more popular micro operating system is:Da MS-DOSb CP/Mc UNIXd all the above5 What languages can be used to develop the operating systems ?Ca A machine language,b An assembly language.c A high level language,d all of the above.6 How does the operating system manage the resources of the computer?a It turns on or off the resources of the computer.b It makes them work together towards some common goals, or objectives.c It controls the way in which these resources are put to work.d It acts directly on the raw hardware.7 The function of an operating system is Da to drive the the raw hardware of the computerb to drive the resources of the computer in accordance with certain objectivesc to provide the higher layers of software with a simplified computerd all of the above11 The graphical user interface provides the users withA a simpler way to interact with their computersB a series of typed commandsC an intuitive sit of graphical icons that allowed the completion of common tasksD an intuitive set of graphical incons for users to "point and click" in order toaccomplish their tasks, so that they didn't have to remember arcane words andcommands anymore12 Windows resemble the Macintosh inA providing a GUI which is introduced by MacintoshB providing a limited means of multitaskingC providing a Windows interface just like the GUID allowing users to load multiple programs and have them run in thebackground while doing other work in a window in the foreground3.4 True or FalseF1 Flowcharting is used primarily for program design and rarely for systems design.T2 When programming in a procedure-oriented language, you should tell the computer'‘what to do' and 'how to do it'.T3 Assembler-level languages use mnemonics to represent instructions.T4 Machine language instructions are composed of a label, an opcode, and an operand.F5 Machine languages must be converted by a compiler to be used by the computer.F6 High-level languages require that programmers work with individual main storage locations.. 5T7 A compiler is translating program that converts high-level languages into machine language.T9 A flowchart loop indicates the repetitive performance of steeps to process data.T10 None of the computers consists of hardware only.F11 Programs written in high-level language can be executed by the computers without the help of a translator program~T13 Each symbolic instruction has one-to-one correspondence with the machine instruction.T14 Writing a program in a high-level language need not take account of the hardwareof the computer.T 15 The opode of an assembly language instruction specifies the operation that is to beperformed by the microprocessor.T 17 The mnemonic for the instruction is the symbolic representation of the actual binary code that the computer directly executes.T 18 A label is on the left of the assembly language statement.T 21 To enable the computer to solve an application problem programmers have to write programs in order to translate the application concepts into computerconcepts.T 22 A class is defined by grouping a user-defined type with all procedures and function that can be applied to it.T 23 The artificial intelligence research community did not agree with the concepts of object-oriented programming when in its early days.F24 Object-oriented programming languages are absolutely different from the LISP programming language.T 25 A program may produce incorrect output even if it runs OK.T 26 An error will occur if a program wants to use a deleted file.F 27 All the errors can be avoided.T 28 A warning will not terminate the program.T 29 Although we could not avoid all the runtime errors, we must take appropriate action when it happens.Match the following terms to the appropriate definition1 program2 programmer3 machine language4 assembler5 source6 object7 interpreter8 compilerA A computer program that translates an instruction into machine language, execute it, and then repeats the process for each instruction in a program until the program is finished.7B The set of statements that make up a computer program.5C A computer program that reads a high-level language instruction.8D A computer-specific set of primitive or elementary instructions that allows people to communicate with a particular computer.3E A set of instruction that tells a computer what to do.1F A program that translates an assembly-level language into machine language4.G Output from a compiler or assembler that is linked with other code to produce executable machine language code.6H A person who creates computer program.23.5True or falseT1 The program specifications are written by the software engineers.F2 Coding a program will consume most of programmer's time and effort.T 3 Programmers should use flowchart and other visual aids when they are designing routines.F4 The goal of the test phase of program development is to "prove" that a particular program has been completely debugged.T 5 More programmers maintain programs rather than code programs.T 6 A structured program is made up of several modules.T 7 "Branching" capability is one the most intriguing properties of a digital computer.。

计算机专业英语作业

计算机专业英语作业

计算机专业英语作业:1、请将视频“什么是电脑硬件”中所述内容用英文表示。

2、请将以下英文翻译为中文。

1)Plug and Play, sometimes, abbreviated(简略的、缩写) PnP, is a catchy(动人的、易记住的) phrase( [freiz] 短语、习语) used to describe devices(设备、装备) that work with a computer system as soon as(与……一样)they are connected(链接的、有关系的). The user does not have to manually(手动的、用手) install drivers(驱动) for the device(装置、策略) or even tell the computer that a new device has been added. Instead the computer automatically(自动的、机械的) recognizes the device, loads new drivers for the hardware if needed, and begins to work with the newly connected device(链接设备),即插即用,缩写为PnP,这是一个容易记住的短语,它用来描述与计算机操作系统连接工作有关的设备。

用户不需要为设备手动安装驱动,甚至于不需要告诉计算机已经添加了饿一个新的设备。

计算机自动识别设备,如果需要为硬件加载一个新的驱动,并且开始工作在新的连接设备上。

For example, if you connect a Plug-and-Play mouse to the USB port on your computer, it will begin to work within a few seconds of being plugged(拥塞的、接通电源) in. A non plug-and-play device would require you to go through several steps of installing drivers and setting up the device before it would work.例如,如果你在你的电脑上的USB接口连接了一个即插即用的鼠标,它开始工作时接通电源只需要几秒钟。

计算机专业英语作业

计算机专业英语作业

计算机专业英语计算机专业英语 练习练习V ocabulary (一)Translate the following words and expressions into Chinese . 1. O perating system (Operating system (操作系统) 2. white box testing (白盒测试(白盒测试3. hard disk (硬盘)(硬盘) 4. management information system (管理信息系统(管理信息系统5. electronic commerce (电子商务(电子商务6. relational database (关系数据库)(关系数据库)7. software engineering (软件工程(软件工程8. software maintenance (软件维护(软件维护9. menu bar (菜单条(菜单条10. network security (网络安全(网络安全(二)Fill in the blank with the corresponding English abbreviations .1.只读存储器 2.广域网3.传输控制协议 4.文件传送[输]协议5.通用串行总线 6.6.面面向对象编程7.集成开发环境 8.结构化查询语言9.数据库管理系统 010..开放系统互连(三)Match the following words and expressions in the left column with those similar in meaning in the right column .1. application software a .音频2.machine language machine language b .应用软件3.structured programming c .机器语言4。

functional testing functional testing d .软件测试5.memory memory e .结构化程序设计6.relational database relational database f .内存7.firewall firewall g .功能测试8.software testing software testing h .关系数据库9.hacker hacker i .黑客1010..audio audio j.j.防防火墙Translation Translate the following sentences into Chinese1. There are several applications called Web browsers that make it easy to access the World Wide Web, Two of the most popular being Netscape Navigator and Microsoft ’s Internet Explorer. 2. SQL SQL Server Server Server is is is designed designed designed to to to allow allow allow thousands thousands thousands of of of users users users to to to access access access the the database at the same time and is a true client/server database system. 3. During During the the the last last last few few few years, years, years, it it it has has has been been been realized realized realized that that that maintenance maintenance maintenance of of programs is more expensive than development, so reading of programs by humans is as important as writing them. 4. Some Some applications, applications, applications, such such such as as as Word, Word, allow allow for for for several several several windows windows windows in in in a a special special mode mode mode called called called MDI MDI MDI in in in which which which you you you can can can open open open multiple multiple multiple documents documents within the same application.  Translate the following paragraph into Chinese Over the last few decades there has been a tremendous growth in information technology technology and and and its its its impact impact impact on on on everyday everyday everyday life. life. Complex Complex software software software systems systems have have become become become critical critical critical to to to the the the operation operation operation of of of many many many systems systems systems in in in areas areas areas such such such as as banking, communications, manufacturing, power generation, and transportation. Progress Progress in in in computer computer computer science science science and and and accumulated accumulated accumulated experience experience with with industrial industrial industrial production production production of of of software software software have have have led led led to to to the the the emergence emergence emergence of of of software software engineering as a separate discipline. The software engineering discipline has been defined as “the application of systematic, disciplined, quantifiable approaches approaches to to to the the the development, development, development, operation, operation, operation, and and and maintenance maintenance maintenance of of of software.software.software.”” that is, the application of engineering to Software. 计算机专业英语练习答案计算机专业英语练习答案Vocabulary1.操作系统.操作系统 2.白盒测试.白盒测试3.硬盘.硬盘 4.管理信息系统.管理信息系统 5.电子商务子商务6.关系数据库.关系数据库 7 7.软件工程.软件工程.软件工程 8.软件维护.软件维护9.菜单栏.菜单栏 1010..网络安全络安全1.ROM (Read Only Memory)2.WAN (Wide Area Network)3.TCP: Transmission Control Protocal4.FTP: File Transmission(Transfer) Protocal5.USB : Universal Serial Bus6.OOP : Object Oriented Programming7。

(完整word版)计算机专业英语试题

(完整word版)计算机专业英语试题

计算机专业英语试题I.V ocabulary(词汇)(30分)(一)Translate the following words and expressions into Chinese.(写出下列词组的汉语。

共10分,每题1分)1.Operating system____________2.white bOx testing__________3.hard disk_________4.management information system_______________5.electronic commerce___________________6.relational database__________________7.software engineering___________________8.software maintenance__________________9.menu bar______________10. network security___________________(二)Fill in the blank swith the corresponding English abbreviations.(根据汉语写出相应的英语缩写。

共10分,每题1分)1.只读存储器__________ 2.广域网___________3.传输控制协议___________ 4,文件传送[输]协议__________5.通用串行总线__________ 6.面向对象编程____________7.集成开发环境___________ 8.结构化查询语言___________9.数据库管理系统___________ 10.开放系统互连______(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。

2023年计算机专业英语大作业

2023年计算机专业英语大作业

计算机专业英语大作业Patterns Instruction in Software EngineeringAbstract:The paper deals with a training system with a client-server architecture created for students who are learning to design and implement object-oriented software systems with reusable components, and also targeting those users who wish become accustomed with (or improve their skills related to) software design.The paper briefly presents the design patterns which are to be found in the software library, as well as the manner of applying them.The user of such a system has five types of patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out of which will be able to chose one/more than one, depending on the requirements of the system proposed for design.1.IntroductionMotto: “The software design patterns help you learn more from other people’s successes than from your own failures”[Mark Johnson] .A software system is a dynamic entity that undergoes multiple changes during its life-cycle, under the influence of factors such as: new user requirements, adding new functionalities, environment adjustment, etc.Therefore, apart from fulfilling those functions which it was designed to fulfill, a software application must be easily changeable, with some of its modules eventually re-used.Having this goal, the application must fulfill certain requirements regarding robustness, mobility, flexibility, scalability, etc.The software design principles are regarded as ways of obtaining the right and re-usable design.By applying abstractization and OOP languages polymorphic techniques, the open-shut principle and the substitution principle (Liskov) upon classes of problems, common solutions were reached –solutions which make up the so-called design patterns.The software patterns facilitate re-using design and architecture.If the design and/orarchitecture of a system were built with design patterns (techniques which have proven efficient), then they will be more accessible and easier to understand by those software developers who build new systems based on old design.The patterns help the software specialist chose that design that makes the system re-usable.In software engineering, “design pattern”(DP) means a solution applicable to a certain type of problems.A design pattern is a description model of how a problem should be solved.A pattern cannot be directly transformed in source code.The purpose of design patterns is to enable a “good”object-oriented design, and more than that –to make it reusable (which is more important than reusing the code, regardless of the fact that reusing the design often implies reusing the code).The quality of software design is proportional to the experience and previous knowledge of the one performing it.An expert applies solutions previously used and proven efficient for similar problems.When the expert finds a solution considered acceptable, he/she uses it again.Design patterns solve specific design problems, making the OO more flexible, elegant and reusable.DP help beginners with software design, proposing patterns based on previous experience.A user who is familiar with the DP-s can apply them instantly in order to solve specific problems, without having to rediscover them.By using the software design patterns while designing an object-oriented architecture, one is guaranteed to obtain system compliance to software engineering principles, while also preserving the qualities of “good design”: reusable, flexible, robust .2.Design PatternsDepending on the DP purpose, the authors of GoF [4] proposed three main categories of patterns: creational patterns, structural patterns and behavioral patterns.These are the most well-known DP, but not the only ones.Other types of patterns emerged –more or less popular –as well as variations of the GoF patterns.A pattern has four essential components:: the name of the DP must describe in a few words a design pattern problem, its solutions and the solution’s effects.2.Problem: describes the situations when the pattern is applicable, explaining the problem as well as its context.3.Solution: describes the components of the design, the relationships between them, the responsibilities of each component and the way they interact.The solution does not describe a specific design for a certain situation or a correct implementation, because a pattern has a general character, referring to a plethora of contexts.The DP presents an abstract description of a problem and a general arrangement of the components (classes and objects) that solve the described problem.4.Effects: refer to the results of applying the pattern, which are very important when we evaluate the alternatives and we estimate the costs and benefits of applying the pattern.The effects of a pattern are also to be perceived in the flexibility, extensibility and portability of a system.DP identifies the classes and instances which participate, their role, collaboration and responsibility sharing between them.The design patterns that the user of the proposed system has at hand are: Factory Method and Builder (from the Creational Patterns category), Command, Mediator and Observer, (from the Behavioral Patterns category).3.The Architecture of the SystemThe platform is designed as a distributed application, providing the option of distance learning/tutoring by means of a computer network or the Internet.The application can be classified as having “three - tier" architecture, the Client part being represented by the configuration module and the tutoring material presentation module.The user connects to the system by means of a Login module, monitored by an Administrator agent (CerberusAgent).After authentication the user may have access to a configuring instrument (if the user connected to the system is the tutor) or to the user interface by means of which the learning material will be presented (if the user is a student).This part of the application will be monitored by an interface agent (InterfaceAgent).The application server contains the agent platform that monitors the student activity, and a web server responsible for delivering the learning material to the user interface (Apache Tomcat).The third level consists of a xml database (Apache Xindice), which stores information about the structure of the course, student models, etc.The MTS training system is designed for students which learn to design and implement object-oriented software systems, with re-usable components, but also for those users who wish to become familiar with (or improve) software design.We present the approach of a multi-agent intelligent platform for tutoring student which provides a Student Model.The “modeling student process”used the overlay architecture (common for many tutoring systems) combined with the Bayesian Theory of Probability .The system’s tasks are distributed among the intelligent agents (software agents), each having clearly specified individual roles as following: administrator (Cerberus Agent); interface (InterfaceAgent); tutor (Tutor Agent); student (Student Agent).Moreover, the system has “three-tier”architecture and was implemented in Java language.We may well imagine software agents attached to every application or tutoring environment, each having an explicit representation of the users’objectives, of their plans and resources.These agents communicate and negotiate with each other in order to fulfill their individual or group objectives.The multi-agent tutoring system (MTS) was designed and implemented within the Computer Science Department, in which research focused upon “modeling”the student with a view to identifying the most suitable methods and tutoring strategies by taking into account individual knowledge and abilities.The user of this kind of system has all five types of previously described patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out ofwhich will be able to use one or more, depending on the requirements of the system that needs to be designed.Depending on the needs of the user that must fulfill the requirements of the system, one selects from Tutor Agent the design patterns best suited for those functions.The patterns help build the menus of the application and the user interface.Then the database is built, as the user has permanent access to an example of application as similar as possible to the one which needs to be carried out.In order to develop an application, the student must know the Java programming language, must be familiar with MySql data servers and must be able to use the Eclipse platform.The Eclipse platform is an open source framework from IBM which aims to provide a variety of basic services for software developers [6].4.ConclusionsThe system wishes to be a useful working instrument for software application development training, for both students and other types of users.A design pattern together with an example of using that pattern may become a way of working in software design.Moreover, in this case applying design patterns –therefore design principles - in carrying out an object-oriented application results into a reusable design and reusable modules / components.Also, the resulting code enjoys more robustness and flexibility, these two characteristics being essential for developing new modules that would add new functionalities and operations to the application; the design/code of the application is open to extension and closed for changes, according to OCP.Another important aspect relates to the maintenance activities which the designed application will undergo along its life-cycle: they will more cost effective, as no change will disseminate through the entire system, the application code being built so that it isolates the volatile classes (according to the principle of reversing dependencies), the dependencies being in the way”details depend upon abstractization”and not the other way around.The software patterns ensurecompliance to design principles, as they contribute to obtaining a steady and efficient system, and they provide design discipline for st but not least, using such a system in software engineering learning makes the process much more attractive and efficient.The design patterns approach in software engineering training fits the pedagogical Schemas Theory (created by Bartlett at the beginning of the 20th century) .A brief representation of the particular knowledge of the training domain can help the trainee to easier absorb the new information, while the organization and structuring of the knowledge as patterns will guide him/her in finding (remembering) the necessary information in a certain context.We believe that within such an approach one can create a training ontology from Software Engineering.软件工程模式教学摘要:本页处理一种C/S架构旳训练系统, 为学习设计和实行一种面向对象旳用可重用组件旳软件系统旳学生而设计, 也将目旳瞄准那些顾客谁但愿成为(或提高他们旳有关技能)软件设计习惯。

计算机专业英语试题含答案

计算机专业英语试题含答案

计算机专业英语试题2Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。

)(共10分,每题1分)1.operating system2.white box testing3.hard disk4.management information system5.electronic commerce6.relational database7.software engineering8. software maintenance9. menu bar10.network security(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。

) (共10分,每题1分)1.只读存储器 2.广域网3.传输控制协议 4.文件传送[输]协议5.通用串行总线 6.面向对象编程7.集成开发环境 8.结构化查询语言9.数据库管理系统 10.开放系统互连(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。

)(10分,每空1分)1. application software a. 音频2. machine language b. 应用软件3. structured programming c. 机器语言4. functional testing d. 软件测试5. memory e. 结构化程序设计6. relational database f. 内存7. firewall g. 功能测试8. software testing h. 关系数据库9. hacker i. 黑客10. audio j. 防火墙1. 6.2. 7.3. 8.4. 9.5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, and change the form wherenecessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。

计算机专业英语考试试题及答案

计算机专业英语考试试题及答案

计算机专业英语考试试题及答案一、选择题1. Which of the following is NOT a programming language?A. JavaB. PythonC. HTMLD. CSS2. What does the acronym "SQL" stand for?A. Structured Query LanguageB. Simple Query LanguageC. Script Query LanguageD. Secure Query Language3. Which protocol is commonly used for sending and receiving emails?A. FTPB. HTTPC. SMTPD. TCP4. What does the term "CPU" refer to?A. Central Processing UnitB. Computer Processing UnitC. Central Program UnitD. Computer Program Unit5. Which of the following is NOT a type of network topology?A. StarB. RingC. MeshD. Scroll二、填空题1. HTML stands for Hypertext Markup Language, which is used for ____________.2. The process of converting source code into machine code is called ____________.3. IP address stands for ____________.4. The act of copying files from a remote server to a local computer is known as ____________.5. The programming language developed by Apple Inc. for iOS and macOS is ____________.三、简答题1. What is the difference between a compiler and an interpreter? Provide examples of programming languages that use each of these methods.2. Explain the concept of object-oriented programming (OOP) and provide an example of a programming language that utilizes this paradigm.3. Describe the client-server model and provide an example of a commonly used protocol within this model.四、论述题Discuss the impact of artificial intelligence (AI) on various industries. Provide examples of how AI is being used in fields such as healthcare, finance, and transportation. Analyze the potential benefits and challenges of implementing AI in these industries.答案:一、选择题1. C. HTML2. A. Structured Query Language3. C. SMTP4. A. Central Processing Unit5. D. Scroll二、填空题1. creating and structuring the content of a webpage2. compilation3. Internet Protocol4. downloading5. Swift三、简答题1. A compiler translates the entire source code into machine code before the program is executed. Examples of languages that use compilers are C, C++, and Java. On the other hand, an interpreter translates and executes the source code line by line. Python and Ruby are examples of languages that use interpreters.2. Object-oriented programming (OOP) is a programming paradigm that organizes data and functions into reusable objects. It focuses on the concept of classes and objects, allowing for code reuse and encapsulation. An example of a programming language that uses OOP is Java, where objects are instances of classes and can interact with each other through methods and attributes.3. The client-server model is a distributed computing architecture wherea server provides services or resources to multiple clients. The clients request and receive these resources through the network. An example of a commonly used protocol within this model is the Hypertext Transfer Protocol (HTTP), which is used for communication between web browsers (clients) and web servers.四、论述题Artificial intelligence (AI) has had a significant impact on various industries. In healthcare, AI is being used for diagnoses and treatments, analyzing medical images, and personalized medicine. For example, AI-powered algorithms can help detect diseases like cancer at an early stage, leading to better treatment outcomes. In finance, AI is utilized for fraud detection, algorithmic trading, and customer service. AI algorithms can analyze large amounts of financial data to identify patterns and make accurate predictions. In transportation, AI is being employed for autonomous vehicles, traffic management, and logistics optimization. Self-driving cars, for instance, use AI algorithms to navigate and make decisions on the road.The implementation of AI in these industries brings about many benefits, such as increased efficiency, improved accuracy, and cost savings. AI systems can process and analyze vast amounts of data much faster than humans, leading to faster and more accurate results. However, there are also challenges to consider. Privacy and security concerns arise as AI systems handle sensitive information. There is also the worry of job displacement, as AI automation may replace certain human tasks. Additionally, ethical considerations need to be addressed, such as bias in algorithms and the potential for AI to be used for malicious purposes.Overall, the impact of AI on various industries is undeniable. It has the potential to revolutionize healthcare, finance, transportation, and many other sectors. However, careful implementation and regulation are necessary to ensure its responsible and beneficial use.。

计算机专业英语 考试

计算机专业英语 考试

一、选择题1.What is the process of converting a high-level programming language into machine languagecalled?A.Debuggingpilation(正确答案)C.ExecutionD.Interpretation2.Which of the following is a programming paradigm that organizes software design around data,and the operations performed on that data?A.Object-oriented programming(正确答案)B.Procedural programmingC.Functional programmingD.Event-driven programming3.In computer networks, what does the term "protocol" refer to?A. A set of rules governing the exchange of information between devices(正确答案)B.The physical connection between devicesC.The speed of data transmissionD.The type of data being transmitted4.What is the term used to describe the process of dividing a complex problem into smaller, moremanageable parts?A.Modularization(正确答案)B.OptimizationC.EncapsulationD.Polymorphism5.In computer security, what is the term for unauthorized access to or modification of data?A.EncryptionB.DecryptionC.Hacking(正确答案)D.Firewall6.Which of the following is a type of software that allows two or more computers tocommunicate and share resources?A.Operating systemB.Database management systemwork operating system(正确答案)D.Word processing software7.What is the term used to describe the process of identifying and correcting errors in computerprograms?A.Debugging(正确答案)B.TestingC.Codingpilation8.In computer graphics, what is the term for the number of distinct pixels that can be displayedon a screen?A.Resolution(正确答案)B.Color depthC.Refresh rateD.Aspect ratio。

计算机专业英语试题

计算机专业英语试题

Translate the following words and expressions into Chinese (10%)1.ALU (算数逻辑控制单元)2.CPU (中央处理器)3.I/O (输入/输出)4.PCB (印刷电路板)5.CAN (校园网)6.NISE (网络信息安全)7.ICMP (因特网控制消息协议)8.TCP (传输控制协议)9.IP (因特网协议)10.FTP (文件传送协议)11.IDE (集成开发程序)12.L局M城W广(一)Fill in the blanks with the English abbreviations. (10%)1.结构化查询语言(SQL)2.超文本标记语言(html)3.文件传输协议(HTTP)4.数据库管理系统(DBMS)5.面向对象编程(OOP)6.基本输入输出系统(BIOS)(二)Match the following words and expressions in the left column with those similar in meaning in the right column.(10%)1.Typesetting 排版2.OS 操作系统3.Hard disk 硬盘4.Digital camera 数码相机5.Motherboard 主板6.Router 路由器7.E-commerce 电子商务8.Word processor 文字处理器9.Driver software 驱动程序10.Open source 开源1. _______ program also has potential benefits in parallel processing.Object-oriented2. An advantage of a ring network is that it needs less _________ .cable3. An ISP supplies a _________ that you can dial from your computer to log service number4. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.Programs5. Electronic bulletin boards are _________ communication platforms.A. one-to-many6. Followings are some image data file formats, which is wrong? _______ *.DOC7. By adding _________ to your programs, you can make computers more interesting and much more fun for the user.multimedia8. The basic units of a computer system are as follows: _________. CPU, memory and I/O system9. Today, _________ can give you a music synthesizer, a fax machine, aCD-ROM drive, etc.expansion cards10. The control unit fetches _________ from memory and decodesthem.. instructions11. When power is removed, information in the semiconductor memory is ________ .lost12. Please find the item that is not belong to the DBA _________DDL13. _________ is designed to manage large bodies of information.C. a database14.A characteristic of operating system is _________ .resource management15.Assembly language instructions are a series of _________ .abstract codesTranslate the following sentences into Chinese.. Thus a management information system collects, transmits, processes, and stores data on an organization's resources and program.因此,管理信息系统的收集,传输,处理和存储数据组织的资源和程序.Some applications, such as Word, allow for several windows in a special mode called MDI in which you can open multiple documents within the same application.某些应用程序,如Word ,允许在一个特殊的模式,MDI ,你可以在同一应用程序中打开多个文档的几个窗口。

计算机专业英语

计算机专业英语

一、英翻汉,汉翻英(20题*1分)data processing system 数据处理系统Integrated Circuit 集成电路Central Processing unit 中央处理器decimal digit 十进制Random Access Memory 随机访问存储器machine language机器语言system clock 系统时钟word size 字长DataBus 数据总线Address Bus 地址总线control circuit 控制电路input and output device 输入和输出设备Universal Serial Bus 通用串行总线assembly language 汇编语言high-level language 高级语言derived classes 派生类late binding 迟绑定virtual function 虚函数real-time operating system 实时操作系统command language 命令语言primary storage 主存储器secondary storage 辅助存储器data structure 数据序data abstraction数据抽象procedural abstracting过程抽象dynamic memory allocation 动态存储分配first come and first served 先来先服务first in and out 先进先出database model 数据库模型physical level 物理层user program 用户层entity-relationship model实体—关系模型one –pass compiler 一遍编译器external call 外部调用parallelizing compiler 并行编译器cross compiler 交叉编译器intermediate code 中间代码一、选择题(10题*2分)1、计算机中最重要的程序OS2、处理器包含寄存器(register)累加器(accumulator)两个功能部件3、在控制输入输出操作计算机有完整的操作指令(operating instructions/ operational command)4、高级语言低级语言判断二、选词填空(10题*2分)课本第二题Uint1(1)The digital computer is a digital system perform various computation (估计,计算)tasks.(2)Integrated circuit did for the third-generation what transistors did for thesecond generation.(3)One of the most significant contributes to the emergence of the fourth generation of computers is the microprocessor.(未处理器)(4)Mainframe computer is a powerful multi-user computer.(5)Supercomputer is an extremely fast computer that can perform hundreds of millions of instructions per second.(6)Desktop computers are modular systems that make it easy to add or replace individual parts to meet each user’s particular requirements.(7)When you need change ,it is easy to open up a desktop case and reconfigure the system.(8)The CPU mounts in a special socket that uses a latching mechanism to hole itin place.Uint2(1)A processor is a function unit that interprets and carries out instructions. (2)Thirty-two-bit chips are often constrained to a maximum of 2GB or 4GB of RAM access.(3)Processing more data in each cycle contributes to increased performance . (性能)(4)The cache ensures that data is immediately available whenever the CPU requests it.(5)One reason why the word needs 64-bit processors is because of their enlarged address spaces.(6)In an SSID (服务集标示符)architecture there is a single instruction cycle. (7)Multiprocessing refers to the organization technique in which a number of processor units are employed in a single computer system.(8)RAM and ROM play important roles of storage devices.(存储装置)Uint3(1)Each I/O device includes I/O interface circuitry.(接口电路)(2)The keyboard is used to type information into the computer or input information.(3)The core computer of CRT monitor(阴极射线管显示器)is cathode ray tube.(4)Compared to the CRT monitor, the monitor’s advantages are obvious.(5)Each I/O device is connected to computer system’s address, data, and control buses.(6)CRT monitor means a cathode ray tube monitor.(7)Each key on a standard keyboard has one or two character.(8)Press the key to get the lower character and hole Shift to get the upper. Uint4(1)Inheritance in object-oriented programming allows a class to inherit properties(性能,道具) from a class of object.(2)The language used 0 and 1 is called machine language.(3)C++ is an often considered to be a superset of C , but this is not strictly true.(4)Most C code can easily be made to compile(编译)correctly in C++. (5)C++ is an enhanced version of the C language.(6)Methods are similar to the functions of procedure-oriented (面向过程)programming.(7)An object is simply an instance(实例)of a class.(8)Polymorphism gives object the ability to represent to messages from routines when the object’s exact type is not known.(9)It is a computer program that translates a series of instructions written in one computer language into a resulting output in another computer language.(三)Unit5(1)The operating system is also responsible for keeping track of the activities in the computer system.(2)Real-time operating system are used to control machinery,(机械,机器)scientific instrument and industrial systems.(3) A multi-user operating system allows many different users to take advantage of one computer’s resources simultaneously.(4)The OS is a large program made up of many smaller programs.(5)The OS control how the CPU communicates with other hardware components.(硬件组件)(6)The OS also makes computer easier to operate by people who don’t understand programming languages.(7)Operating system are constantly being improved or upgraded as technology advance.(8)Windows is custom-made to run with Intel CPU and Intel-compatible CPUs,such as Pentium IV.(9)It is a common term for a computer fault that brings down a software program or operating system .It is also refer to the failure of a hard disk drive.(三)Uint6(1)A data structure is a specialized format (格式,板式)for organizing and storing data.(2)Data structure organize data in ways that make Algorithms (算法)moreefficient.(3)An object-oriented approach to data structures (数据结构)brings together both data abstraction and procedural abstraction.(4)Once problem are Abstracted ,(抽象的)it becomes apparent that seemingly different problems are essentially similar or even equivalent in a deep sense.(5)Abstraction allows Common solutions to seemingly different problems.(6)Integer is amounts to a particular collection of anxious or rules that must be obeyed.(7)When a call is made to Algorithms, (算法)all the variable local to the callingroutine need to be saved by the system , otherwise the new function will overwrite the calling routine’s variables.(8)Computers in which the disk is attached to one machine, known as the file server.(文件服务器)Uint7(1)A database consists of a file or a set of files.(2)Fields are the basic units of data storage .(数据存储)(3)The external level defines the different views of the database as required by the external or user programs.(4)One user program may not require all the data in the database.(5)The conceptual level describe the entire database.(6)Object-based logical models are used for describing data at the conceptual (概念上的)and viewlevels.(7)For relationships involving two entity (实体)sets, there can be relationships like one-to-one,one-to-many, many-to-one,and many-to-many.(8)There are various data types to choose from, such as character,numeric ,data ,or other.Unit8(1)A compiler(编译器)is a computer program that translates a computer programwritten in one computer language into an equivalent program.(2)Translation from a low level language to a high level one is also possible. (3)Compiles also exit which translate to a another.(4)Cross compilers are useful when bringing up a new hardware platform for the first time.(5)Since the intermediate level code (中级水平代码)is machine-like in character,but not in form ,it will normally vary with the machine for which the object code is being generated.(6)Intermediate code can be converted directly into the object language (目标语言)by the code generate.(7)Obviously code generation is highly machine-dependent.(8)When the object machine is altered ,the code generator(编译发生器)must be extensively revised.三、阅读理解(10题*2分)四、完形填空五、翻译(第七章重点考)。

计算机专业英语作业(1)

计算机专业英语作业(1)

计算机专业英语作业(1)一、Translate the following sentences into English or Chinese.1.计算机2.多媒体3.硬件4.软件5.输入设备6.存储器7.外部设备8.处理器9.鼠标10.语音识别11.扫描仪12.寄存器13.Arithmetic and logic unit 14.Binary form15.Control unit 16.Instruction cycle17.Execution cycle 18.Central processing unit 19.Universal serial bus 20.Universal parallel bus二、For each of the following blanks, four choices are given. Choose the most appropriate one.1.A personal computer keyboard includes .a.a typewriter layout and a set of arrow keysb.a numeric keypadC.a Set of function keysd.a11 of above2.A display is a device that is used to display .a.numbers letters b.special charactersc. graphic information d.all of above3.system software includes and .a.operating system and application softwareb.operating system and programming languagec.special—purpose programs and application softwared.OS and special—purpose programs4.Information flows from a computer into a peripheral device as .a.output b.memory c.a program d.input 5.programs are known collectively as .a.secondary storage b.softwarec.stored programs d.hardware6.which is not common feature of most application software?a.menus b.toolbars c.insertion point d.alignment 7.Main memory holds .a.data for processing b.the programc.information d.all of above8.The number of bits that can be Processed at one time is aa.register b.cycle c.word d.PROM 9.Data and instructions are stored in memory at location known asa.address b.byte c.word d.number 10.The central processing unit (CPU) had two parts: and .a.control unit and ALU b.ALU and registerc.register and control unit d.ALU and memory11.A holds enough bits to store a single character.a.word b.bit c.byte d.two bytes 12.A location in memory is accessed by its .a.address b.content c.value d.digit 13.Which is not the actor that some microcomputer are more powerful than others .a.Speed b.capacity c.flexibility d.application 14.The CPU has two main parts 。

计算机专业英语试题及答案

计算机专业英语试题及答案

计算机专业英语试题及答案1. 选择题1. Which of the following is not a programming language?a) Javab) HTMLc) Pythond) CSS答案: b) HTML2. Which protocol is used for sending and receiving email?a) HTTPSb) FTPc) SMTPd) DNS答案: c) SMTP3. What does the acronym CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Power Unit答案: a) Central Processing Unit4. Which programming language is commonly used for web development?a) C++b) Javac) JavaScriptd) Swift答案: c) JavaScript5. What does HTML stand for?a) Hyperlinks and Text Markup Languageb) Hyper Text Markup Languagec) Home Tool Markup Languaged) Hyper Text Modeling Language答案: b) Hyper Text Markup Language2. 填空题1. The process of converting high-level programming code into machine code is called ___________.答案: compilation2. HTTP stands for ___________ Transfer Protocol.答案: Hyper Text3. The process of testing software by executing it is called ___________.答案: debugging4. Java is an object-_____________ programming language.答案: oriented5. DNS stands for Domain Name ___________.答案: System3. 简答题1. What is the difference between TCP and UDP?答案: TCP (Transmission Control Protocol) is a connection-oriented protocol, which means it establishes a connection between the sender and receiver before transferring data. It ensures that all packets are received in the correct order and provides error checking. UDP (User Datagram Protocol), on the other hand, is a connectionless protocol that does not establish a direct connection before transmitting data. It does not guarantee packet delivery or order but is faster and more efficient for time-sensitive applications.2. What is the purpose of an operating system?答案: An operating system (OS) is a software that manages computer hardware and software resources and provides common services forcomputer programs. Its primary purpose is to enable the user to interact with the computer and provide a platform for running applications. It manages memory, file systems, input/output devices, and multitasking. The OS also handles system security and resource allocation to ensure optimal performance.4. 解答题请参考下文并给出自己的解答。

计算机专业英语测试卷

计算机专业英语测试卷

A. andB. whichC. thatD. where( ) 6. C program language is a programming language.A. object-orientedB. procedure-orientedC. compiler-orientedD. nature-oriented ( ) 7. is a collection of data, or information, which is specially organized for quickly search and retrieval by a computer.A. DatabaseB. ConceptionC. LogicD. aggregate( ) 8. is a set of more than one media element used to produce a concrete and more structured way of communication.A. Media elementB. CinemaC. MultimediaD. Hypermedia ( ) 9. is a system connecting two or more computers.A. CommunicationB. NetworkC. TCPD. IP ( ) 10. Which of the following is not one of the three types of networks:A. LANsB. MANsC. WLANsD. W ANs 二、判断题 (共10题,每题2分,共计20分)。

对的在左边的括号中标明T ,错的标明F( ) 11. You can attach a floppy disk cable directly to an IDE interface. ( ) 12. Keyboard and mouse are both characters imported equipment. ( ) 13. Once you pick out the software, you can buy a good computer.( ) 14. In C programming language, the command "printf" is used to input the information. ( ) 15. Class is a rule or template or a plan. It does not have any physical existence. Objects are individual instances of a class.( ) 16. By using database, users can do search, rearrange, group, and select such operations考试方式:□开卷□闭卷 试卷类别:(A 、B )适用专业(班级) 命题人 教研室审批 系部审批 教务处审批rapidly.( ) 17. Multimedia can be only one media element. ( ) 18. Monitor is used to see the computer input.( ) 19. A computer network is only connected by cable lines, such as telephone lines. ( ) 20. Internet is the most often used MANs of today.三、完形填空:(共10题,每题1分,共10分) 通读下面的短文,掌握其大意,然后从每小题的四个选项中选出可以填入相应空白处的最佳选项。

计算机专业英语大作业

计算机专业英语大作业

网址一:/hub/save-computer-from-Hackers网址二:/hub/What-is-Phishing姓名:**学号:************分校:通州(一)原文1.What is Computer Hacking?Computer hacking is a malicious act, so it is important for your computer and data to protect from Hacking. Computer Hacking refers to the process of making malicious modifications to a software or hardware to accomplish an aim outside the original creator's objective. Hackers are usually expert programmers who usually see hacking as a real life application of their skills.Hacking has become a nuisance in recent times and the protection from hacking has become more complex. Infact, the hackers have become so good that even the software giants are feeling a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years.Well, the Giants are not the only targets of these hackers, even common individuals are not safe. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities. They can get to your secrets and destroy your credit. The dangers are possibly endless.How to protect from HackingPrevention is Better Than Cure. The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system. Here, I am going to introduce some basic tips to save your computer and data from hackers.Using Antivirus SoftwareAntivirus software are one of the basic tools for your data and computer to protect from hacking. Antivirus software act as a protecting net that catches any potential threat before it reaches your system. They can prevent unauthorized access to your computer, protects your system from viruses and cloaks your data ports from intruders searching for any opening. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities.Nowadays anti virus software are completely automated. Go for the best when choosing anti virus software and make sure that you scan your system for viruses atleast once a week. Norton antivirus from Symantecis one of the leading products in the industry. Avastis another great antivirus tool to protect from hacking.Using FirewallWhat is a Firewall?A firewall is a set of programs located at the network gateway server which protects a private network from unauthorized access from other networks. The term firewall is originally referred to a wall intended to confine a fire.A firewall protects your computer from offensive websites and potential hackers. It keeps your data and information safe from unwanted intruders. Firewalls are designed to prevent unauthorized access to your network, much like a locked door.Thus firewall is a vital tool for your strategy against hackers so don't forget to set up one for your system. Microsoft has a built-in firewall software but you can also try the Symantec firewall.Using Anti Spyware SoftwareWhat is a Spyware?A spyware is a self installing software which secretly gathers information about a person's computing activities such as surfing habits and viewed sites. Spywares are truly a hacker's tool, not only collecting personal information but also interfering with user control by installing additional software and redirecting web browsers.Anti spyware software are designed to save your computer from hackers. They not only protect your computer by detection and removal of spywares but also preventing automatic installation of these malicious programs. Spysweeperis a great anti spyware software to guarantee a spyware free computer.Email SecurityEmail is one of the leading hacker's tools. Hackers use emails to transmit malicious software to your computer. Emails are usually very cheap which gives the hackers loads of opportunities. One of the basic tips to prevent hacking is to be extra careful with emails. The most important tip is that you should never hand out your real email address to a stranger. Never open an email arriving from an unknown source and never try to open an attachment with an email if you don't know the sender. Aviraantivirus is a useful tool to filter your emails for potential threats as well as provide premium protection for your computer.Software updatesHackers are always searching for security gaps in your system. Anti virus and anti spyware software usually lose their effectiveness with time as new and more advanced malicious programs are created by hackers.Its important to go for the latest security software in the market to guaranteemaximum security from threats. Make sure you frequently check out for software updates or set your software to update automatically.Internet SecurityBeing extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system. A great way to save yourself from hackers is to avoid visiting hacker controlled sites usually committed to porn, free downloads and online gaming. Also be extra careful while downloading something from an unknown source. Never ignore a security warning about a site. Its better to be safe than sorry.Educate YourselfWhen working for an offensive against hackers, the most important step is to educate yourself. Hacking is a dynamic topic with developments arising every moment. Hackers are intelligent and innovative and you should be prepared for it.Computers are vulnerable. No matter what you do, its impossible to be 100% save. Important data like personal detail and credit card information should never be saved directly on a computer. A password protector is a great way to protect this data.Another great way to secure your computer is to use a password on your computer. Well, it can't really save you if your computer gets stolen (in case of a laptop) but can save you from unauthorized people who can reach to your computer.Windows updateMicrosoft Windows is the best OS which comes with almost all the tools to protect you and your computer from hacking. To make the most of this, it is important to keep your windows updated. An easy way to do this is by checking for updates at Microsoft Windows Update. You can also set your windows security software to check for updates automatically so you don't miss anything. ...2. What is a Phishing Attack?Identity theft has become the new white collar crime and it has grown tremendously. Criminals that steal identities use them in a number of ways. One of the most common tricks is to use a stolen identity to open a line of credit. The line of credit is then depleted by the thief and the actual person receives the bill. Identities are also stolen for malicious intent, such as stealing a military officer’s email credentials in hopes of carrying out fictitious orders to troops.Phishing is a relatively new term to describe ploys used by criminals trying to steal identities. Phishing scams are on the rise:"During 2004, close to 2 million U. S. citizens had their checking accounts raided by cyber-criminals. With the average reported loss per incident estimated at $1200, total losses were close to $2 billion. The incidence of phishing e-mails―e-mails thatattempt to steal a consumer’s user name and password by imitating e-mail from a legitimate financial institution –has risen 4,000 percent over the past six months."•What is Phishing VideoThe term “phishing” is based on the term “fishing”. With fishing you bait a hook and try to catch fish. If you do not receive a bite, you often change the type of bait until you start catching fish. With phishing, the bait is typically an email that appears legitimate. The email typically asks for a bank customer to validate their information, however, the email redirects the customer to a fictitious bank site made to look like the legitimate bank site (James, 2005). The criminals hope the customer will not notice the redirected bank site is fictitious and that they will validate their account information. There are numerous phishing emails used as bait and criminals hope the more bait they use, the greater chances someone will fall for the scam.The key to preventing identity theft is awareness. Financial institutions typically do not ask for account information validation. Any emails that ask for account validation or social security numbers, should be validated. The link contained within the email can be checked for legitimacy. These links often go to bogus sites that can easily be determined by the website link. For example, if you bank at and you receive an email that has a link and takes you to .customer.cz, this should raise suspicion. Phishing scams not only use email, but the telephone is also used. A typical scam involves a telephone call with someone impersonating your credit card company and asking you to validate your social security number, date of birth, etc. Credit card companies already have this information and do not need you to validate it. A simple line of defense is to ask the caller for the credit card company’s number and call them back。

计算机专业英语测试题及答案

计算机专业英语测试题及答案

计算机专业英语测试题一、词汇测试题(每小题1分,共20分)(一).Translate the following words and expressions into Chinese (共10分,每题1分)1.Cyber cafe2.microcomputer3.ROM4.Object-oriented programming5.utility program6.system specification7.database administrator8.modulator-demodulator9.client/server model10.spreadsheet program(二).Translate the following terms or phrases from Chinese into English (共10分,每题1分)1.中央处理器2.广域网3.超级计算机4.电子商务5.计算机安全6.计算机文化7.网站8.域名9.数据库管理系统10.软件工程二、完型填空题(每空1分,共20分)Fill in each of the blanks with one of the words given in the list following each paragraph, making changes if necessary:1. Computer hardware is the involved in the ofa computer and consists of the that can be physically handled. The function of these components is typically divided into three main categories: , , and . Components in these categories connect to , specifically, the computer’s central unit (CPU), the electronic that provides the computational ability and control of the computer, via wires or circuitry called bus.microprocessors component processing functionoutput equipment input circuitry storage2.In the relational model, data is organized in two-dimensionalcalled . There is no or structure imposed on the data. The tables or relations are, however, related to each other. The database management system (RDBMS) the data so that its external is a of relation or tables. This does not mean that data is stored as tables: the physical of the data is independent of the way in which the is logically organized.hierarchical set organize relational relationdata storage view network table三、英译汉题(每题10分,共20分)Translate the following passage from English into Chinese:1.The field of computer science has grown rapidly since the1950s due to the increase in their use. Computer programs have undergone many changes during this time in response to user need and advances in technology. Newer ideas in computing such as parallel computing, distributedcomputing, and artificial intelligence, have radically altered the traditional concepts that once determined program form and function. In parallel computing parts of a problem are worked on simultaneously by different processors, and this speed up the solution of the problem. Another type of parallel computing called distributed computing use CPUs from many interconnected computers to solve problems.Research into artificial intelligence (AI) has led to several other new styles of programming.2.High-level languages are commonly classified asprocedure-oriented, functional, objected-oriented, logic languages. The most common high-level languages today are procedure-oriented languages. In these languages, one or more related blocks of statements that perform some complete function are grouped together into a program module, or procedure, and given a name such as “procedure A”. If the same sequence of operations is needed elsewhere in the program, a simple statement can be used to refer back to the procedure. In essence, a procedure is just a mini-program. A large program can be constructed by grouping together procedures that perform different tasks.四、汉译英题(20分)最著名的互联网例子是因特网。

计算机专业英语

计算机专业英语

计算机专业英语(总分:45.00,做题时间:90分钟)一、{{B}}单项选择题{{/B}}(总题数:41,分数:45.00)1.The Web Browser is a simple program that enables a computer to ______ and view pages on the Web.(分数:1.00)A.downfallB.downgradeC.downwardD.download √解析:题目的大意是说:网页浏览器是一种能够使计算机下载并显示网页的简单程序。

选项中提供的几个单词的拼写比较接近,只有download(下载)比较符合题意。

downfall是坠落的意思,downgrade是下坡、降级的意思,downward是向下的意思。

2.E-mail is a fast, cheap and convenient way to ______ messages locally and internationally. (分数:1.00)A.give and getB.put and getC.send and receive √D.get in and get out解析:题目的大意是说:电子邮件是一种收发本地和全球信息的快速、廉价、方便的方式。

收发电子邮件使用send and receive(发生和接收),其他三种写法不适合用在收发电子邮件中。

3.Header and footer are strings of text that are placed at the ______ of each page of a document. (分数:1.00)A.left or rightB.up or downC.above or belowD.top or bottom √解析:题目的大意是:页眉和页脚是放在文档每一页顶部和底部的字符串。

在计算机屏幕或纸张等介质上,上下和左右分别使用top or bottom和left or right。

大学计算机专业英语作文

大学计算机专业英语作文

大学计算机专业英语作文Q: What motivated you to pursue a degree in computer science?A: I have always been fascinated by technology and its potential to solve complex problems. In high school, I took a programming course and found it incredibly rewarding to create something from scratch using code. This experience sparked my interest in computer science and I knew I wanted to study it further in college.中文翻译:我一直对技术及其解决复杂问题的潜力感到着迷。

在高中时,我选修了一门编程课程,发现用代码从零开始创建东西非常有成就感。

这次经历激发了我对计算机科学的兴趣,我知道我想在大学里进一步学习它。

Q: What skills have you developed during your time studying computer science?A: During my time studying computer science, I have developed strong problem-solving skills, as well as the ability to think logically and systematically. I have also learned how to collaborate effectively with others on coding projects and how to write clean, efficient code.Additionally, I have gained experience in data analysis and machine learning, which are becoming increasingly important in many industries.中文翻译:在学习计算机科学期间,我发展了强大的问题解决能力,以及逻辑和系统思维的能力。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

计算机专业英语作业:1、请将视频“什么是电脑硬件”中所述内容用英文表示。

For most people, computers are becoming a part of real life, the film will help you konw how it works. Their interior looks very complicated, but if the decomposition of parts, you will see a simple side of computers , This is《computer hardware in Plaining English 》,you see them, they are coming all shapes and sizes,but its work in some ways. In fact, if you can see their internals of computers, You will find that they all have the basic parts,the haddwares,do large part of the works in the computers.to explan,let’s look at some things you know ,like a house.what a great thing in the house is you have full space to put all the iterms.in fact ,many houses have basements.The basement is a good place to store debris.Basement, the more you can store.The same principle applies to computers.We need not boxes and bicycles, but photos, music, documents and plete this task in the computer hard drive rather than in the basement, a computer hard drive, holds all your files will be used later, like basements, like the larger hard drive, the more things you can store. Basement is not perfect, going to the basement to take the things you need to spend much time, maybe put a cupboard on the ground floor can help you solve this problem, you can quickly get the items you want, although the cabinet can not put too many items, at least you do not always go to the basement, in the computer too, The computer can not quickly access to the data stored in the hard disk, because the computer go a long way to gain access to the hard disk data. In the computer memory (RAM) is like a cupboard, RAM's full name is called [random access memory], which allows the computer to access data more quickly and, of course, it also means that the operation of RAM to make your computer faster , but this cupboard (RAM) has a drawback, the memory will be cleared of stored data When every time you restart, of course, to make the house a variety of household appliances can operate at the appropriate time, you must have an Explorer to help you manage these appliances, if the weather is too hot , you maybe need to open the air conditioner to adjust the temperature, when it is dark, you need to turn on the lights. Computers, too, must have a bit Explorer to ensure that all other parts are functioning properly, the Explorer is the processor (CPU), small size of the processor, like a computer exclusive (in charge), it will send and receive information and to assist the software to complete the work. The faster the processor, the faster execution speed of the computer would be, so, let us revisit. Hard drive, like a basement, it can store the information you need. Memory, like a cupboard, which can increase data access speed. Processor, like the Field Explorer, always able to complete the work that we deliver, but also to ensure the normal operation of the various parts. Next time, when you use the computer, think about plain English in the host computer's computer hardware what happened, the various parts of computer hardware complement each other, to help you do all the things I Common Craft's Lee LeFever, "Computer hardware of Plaining English "The film recorded by me, if you need a higher quality video, or need to use the authorization of the film, please contact me website.2、请将以下英文翻译为中文。

1)Plug and Play, sometimes, abbreviated PnP, is a catchy phrase used to describe devices that work with a computer system as soon as they are connected. The user does not have to manually install drivers for the device or even tell the computer that a new device has been added. Instead the computer automatically recognizes the device, loads new drivers for the hardware if needed, and begins to work with the newly connected device.For example, if you connect a Plug-and-Play mouse to the USB port on your computer, it will begin to work within a few seconds of being plugged in. A non plug-and-play device would require you to go through several steps of installing drivers and setting up the device before it would work.While Plug and Play usually refers to computer peripheral devices, such as keyboards and mice, it can also be used to describe internal hardware. For example, a video card or hard drive may be a Plug and Play device, meaning the computer will recognize it as soon as it is installed. The only difference is that internal components usually require the computer to be turned off when they are installed, while external devices can typically be installed while the computer is running.即插即用,有时缩写为PnP的,是用来只要它们连接来形容,随着计算机系统正常工作的设备一个朗朗上口的短语。

相关文档
最新文档