计算机科学导论(全英版)课后问答

合集下载

计算机科学与导论课后习题答案 第2章 计算机基础知识(答案)

计算机科学与导论课后习题答案  第2章 计算机基础知识(答案)
2.什么是定点数,它分为哪些种类?
答:所谓定点数,就是指计算机在运算过程中,数据中小数点的位置固定不变。其中小数点的位置是由计算机设计者在机器的结构中指定一个不变的位置,而不一定都必须具有小数点的指示装置。定点数一般有小数和整数两种表示形式。定点小数是把小数点固定在数据数值部分的左边,符号位的右边;定点整数则把小数点固定在数据数值部分的右:计算机获取声音信息的过程即是声音信号数字化的处理过程。经过数字化处理后的数字声音信息才能被计算机所识别和处理。声音被计算机处理的过程主要经过音频信号的采样、量化和编码几个过程。
4.简要叙述多媒体技术的含义。
答:多媒体技术是指利用计算机技术把文本、图形、图像、音频和视频等多种媒体信息综合一体化,使之建立逻辑连接,集成为一个具有交互性的系统,并能对多种媒体信息进行获取、压缩编码、编辑、加工处理、存储和展示。简言之,多媒体技术即为把文、音、图、像与计算机结合在一起的技术。多媒体技术是集计算机技术、文字处理技术、音频技术、视频技术、图像压缩技术、通信技术等多种技术的综合体。
三. 讨论题
1. 为什么计算机使用二进制,而不使用人们生活中的十进制来表示数据信息。
答案略。
2. 多媒体计算机给人们的生活带来了哪些好处?请举出几个例子。
答案略。

5.多媒体计算机的关键技术有哪些?
答:多媒体计算机技术是一门多学科的综合技术。多媒体涉及的技术范围很广,技术很新、研究内容很深,是多种学科的和多种技术交叉的领域。它涉及的关键技术有:多媒体指令集、多媒体数据的表示技术、大容量的存储技术、音频/视频处理技术、多媒体计算机显示技术、光盘与光盘驱动器技术及其它技术等。
第2章 计算机基础知识
习题(答案)
一. 选择题

计算机导论课后习题答案(00002)

计算机导论课后习题答案(00002)

计算机导论课后习题答案计算机科学导论第七章1应用程序和操作系统的不同点是什么?操作系统是一个程序,有利于应用程序的执行。

2操作系统的组成是什么?内存管理器,进程管理器,设备管理器,文件管理器。

3单道程序和多道程序之间有何区别?单道程序,只有一个程序在内存中。

多道程序,多个程序同时在内存中,但是计算机的资源只分配给正在运行的程序。

4分页调度和分区调度有什么区别?分区调度把内存分为若干个区,把程序整个的放入区中。

分页调度提高了分区调度的效率,在分页调度下,内存被分为大小相等的若干部分,程序也被分为大小相等的部分。

分区调度需要把程序装载到连续的内存上。

分页调度可以吧把程序装载到不连续的内存当中。

5为什么请求分页调度比常规页面调度具有更高的效率?在常规的分页调度中,整个程序必须同时在内存中,以便为程序执行。

但是在请求分页调度中,有部分页面的程序可以在内存中。

这意味着,在请求分页调度中,在给定的时间中,更多的程序可以使用计算机的资源。

6程序和作业之间有何联系?作业和进程之间有何联系?程序和进程之间有何联系?从一个程序被选中执行,到其运行结束并再次成为一个程序的这段过程中,该程序称为作业。

7程序驻留在哪里?作业驻留在哪里?进程驻留在哪里?程序和作业驻留在磁盘上,进程驻留在内存中。

8作业调度器和进程调度器有什么区别?作业调度器负责从作业中创建一个进程和终止一个进程。

进程调度器将一个进程从一个状态转入另一个状态。

9为什么操作系统需要队列?一个操作系统需要使用队列,因为在同一时间可以有许多作业和进程同时活跃。

为了共享所有的资源,队列是必要的,以确保作业和进程都得到他们需要的资源。

31一个计算机装有一个单道程序的操作系统。

如果内存容量为64MB,操作系统需要4MB的内存,那么该计算机执行一个程序可用的最大内存为多少?64-4=60MB33 70/(70+10)=87.5%34一个多道程序的操作系统用一个适当的分配计划把60MB内存分为10MB,12MB,18MB,20MB。

计算机导论--常见问题与回答

计算机导论--常见问题与回答

“计算机导论”常见问题与解答说明:在计算机导论的教学中,学生经常会问一些问题,课程组把比较常见的问题总结出来,并进行了简要的出回答,如下。

1、学习“计算机导论”的目的是什么?答:通过学习“计算机导论”课程,可以达到如下目的:了解计算机的发展简史,激发学习兴趣;掌握计算机的基本知识,建立专业知识体系框架;熟练掌握常用的计算机软件的使用,提高操作技能;了解计算机科学技术的最新发展,促进研究性学习;掌握计算机学科的思维方法,培养综合素质与创新能力。

这对于计算机专业学生四年的知识学习、能力提高、素质培养和日后的学术研究、技术开发、经营管理等工作具有十分重要的基础性和引导性作用。

由于“计算机导论”是学生进入大学后的第一门专业课程,该门课程不仅是让学生了解一些计算机专业的基本知识,还要对学生在学习方法、思维方式上进行引导,使学生尽快适应大学的学习方式,培养计算思维。

2、如何能够学好“计算机导论”?答:“计算机导论”课程的特点是:内容多、课时少、理论与实践并重,实际上后续的大多数专业课程也具有类似的特点。

需要学生做到四个认真:认真听讲、认真读书、认真思考、认真实践。

特别要注意认真读书和认真思考,这是大学生课后自主学习的主要方式,也是高中学习阶段比较欠缺的地方。

有些内容光靠听老师课堂上的讲授是不够的,必须要认真读书(甚至要多读几本书)、认真思考,才能真正理解所学内容,也才能真正变成自己的知识。

在高中阶段,所有的学习时间都由学校和老师安排,学生几乎没有自由支配的时间。

进入大学,自由支配的时间多了。

作为大学生,一定要充分利用自由时间,安排好自己的自主学习,要多看书、多思考、多实践。

3、“计算机导论”和后续专业课程有什么关系?答:从学知识角度看,“计算机导论”是后续主要专业课程内容的一个绪论,一个总体的概括性介绍。

其主要作用主要有两个:一是为后续专业课程的学习做一个知识上的铺垫,降低学习专业课程时的难度,使专业课程的学习效果更好。

《计算机科学导论》(第三版-)弗罗赞(翻译)

《计算机科学导论》(第三版-)弗罗赞(翻译)

Chapter 1 练习复习题1. 定义一个基于图灵模型的计算机。

答:Turing proposed that all kinds of computation could be performed by a special kind of a machine. He based the model on the actions that people perform when involved in computation. He abstracted these actions into a model for a computational machine that has really changed the world. 图灵模型假设各种各样的运算都能够通过一种特殊的机器来完成,图灵机的模型是基于各种运算过程的。

图灵模型把运算的过程从计算机器中分离开来,这确实改变了整个世界。

2. 定义一个基于冯•诺伊曼模型的计算机。

答:The von Neumann Model defines the components of a computer, which are memory, the arithmetic logic unit (ALU), the control unit and the input/output subsystems.冯•诺伊曼模型定义了计算机的组成,它包括存储器、算术逻辑单元、控制单元和输入/ 输出系统。

3. 在基于图灵模型的计算机中,程序的作用是什么?答:Based on the Turing model a program is a set of instruction that tells the computer what to do.基于图灵模型的计算机中程序是一系列的指令,这些指令告诉计算机怎样进行运算。

4. 在基于冯•诺伊曼模型的计算机中,程序的作用是什么?答:The von Neumann model states that the program must be stored in the memory. The memory of modern computers hosts both programs and their corresponding data. 冯•诺伊曼模型的计算机中,程序必须被保存在存储器中,存储程序模型的计算机包括了程序以及程序处理的数据。

《计算机科学导论》课后练习(翻译)

《计算机科学导论》课后练习(翻译)

《计算机科学导论》课后练习(翻译)Chapter 1 练习复习题1.定义⼀个基于图灵模型的计算机。

答:Turing proposed that all kinds of computation could be performed by a special kind of a machine. He based the model on the actions that people perform when involved in computation. He abstracted these actions into a model for a computational machine that has really changed the world.图灵模型假设各种各样的运算都能够通过⼀种特殊的机器来完成,图灵机的模型是基于各种运算过程的。

图灵模型把运算的过程从计算机器中分离开来,这确实改变了整个世界。

2.定义⼀个基于冯·诺伊曼模型的计算机。

答:The von Neumann Model defines the components of a computer, which are memory, the arithmetic logic unit (ALU), the control unit and the input/output subsystems.冯·诺伊曼模型定义了计算机的组成,它包括存储器、算术逻辑单元、控制单元和输⼊/输出系统。

3.在基于图灵模型的计算机中,程序的作⽤是什么?答:Based on the Turing model a program is a set of instruction that tells the computer what to do.基于图灵模型的计算机中程序是⼀系列的指令,这些指令告诉计算机怎样进⾏运算。

4.在基于冯·诺伊曼模型的计算机中,程序的作⽤是什么?答:The von Neumann model states that the program must be stored in the memory. The memory of modern computers hosts both programs and their corresponding data. 冯·诺伊曼模型的计算机中,程序必须被保存在存储器中,存储程序模型的计算机包括了程序以及程序处理的数据。

计算机科学导论课后习题答案-第四章

计算机科学导论课后习题答案-第四章

数据运算After reading this chapter, the reader should be able to:三类主要运算位的逻辑运算移位运算(逻辑移位和算术移位)补码形式数据的运算浮点格式数据的运算数据运算的类型●算术运算●移位运算●逻辑运算4.1LOGICALOPERATIONS逻辑运算非与或异或一元和二元运算位层次上的逻辑运算模式层次上的逻辑运算N位N位Example请给出10011000的非运算结果。

SolutionTarget 1 0 0 1 1 0 0 0NOT------------------Result 0 1 1 0 0 1 1 1AND operator与运算Example请给出10011000和00110101与运算的结果。

SolutionTarget 1 0 0 1 1 0 0 0AND0 0 1 1 0 1 0 1------------------Result 0 0 0 1 0 0 0 0OR operator或运算Example请给出10011000 和00110101的或运算结果。

SolutionTarget 1 0 0 1 1 0 0 0OR0 0 1 1 0 1 0 1------------------Result 1 0 1 1 1 1 0 1XOR operator异或运算符Example请给出10011000 和00110101的异或运算结果SolutionTarget 1 0 0 1 1 0 0 0XOR0 0 1 1 0 1 0 1------------------Result 1 0 1 0 1 1 0 1应用:修改位模式(1/2)(1)求反:用NOT运算,例如原码、补码、反码之间的互相转换时;(2)使指定的位复位(置0):用AND运算,例如与设定的数据(掩码)做与运算,可以使另一个数据的指定位复位,其它位保持不变;(3)给指定位置位(置1):用OR运算,例如与掩码做或运算,可以使另一个数据的指定位置1,其它位保持不变;应用:修改位模式(2/2)(4)使指定的位反转(变为相反的值):用XOR运算,例如与掩码做异或运算,可以使另一个数据的指定位求反,其它位保持不变;利用掩码复位的示例Example设想一个电厂使用8台水泵给一城市供水。

计算机导论双语试题及答案

计算机导论双语试题及答案

计算机导论双语试题及答案(题目)(正文)Part I(选择题)请在每道题后方括号内写出你认为正确的选项。

1. 计算机科学的定义是什么?A. 研究计算机硬件的科学。

B. 研究计算机软件的科学。

C. 研究计算机及其应用的科学。

[C]2. 计算机硬件主要包括以下哪些组成部分?A. CPU和内存。

B. 操作系统和应用软件。

C. 输入设备和输出设备。

[C]3. 下列哪个是计算机二进制系统中使用的数字?A. 十进制。

B. 二进制。

[B]C. 八进制。

4. 哪种编程语言是计算机与人类交互的桥梁?A. 机器语言。

B. 汇编语言。

C. 高级语言。

[C]5. 下列哪种计算机网络覆盖范围最广?A. 局域网。

B. 城域网。

C. 互联网。

[C]Part II(问答题)请用英文回答以下问题。

1. What is the difference between hardware and software?Hardware refers to the physical components of a computer system, such as the CPU and memory, while software refers to the programs and data used by the computer.2. What is the binary system in computing?The binary system is a number system that uses only two digits, 0 and 1, to represent all numeric values and data in a computer.3. What is the role of an operating system in a computer?The operating system acts as an intermediary between the user and the computer hardware, managing the resources and providing a user-friendly interface for interacting with the computer.4. What is the significance of computer networks?Computer networks allow computers to communicate and share resources, enabling the exchange of information and facilitating collaboration on a global scale.5. What is programming language?A programming language is a set of instructions and rules used to write computer programs, allowing humans to communicate their instructions to the computer.Part III(编程题)请用您熟悉的编程语言完成以下任务。

《计算机科学导论》第五章课后作业解答(个人版)

《计算机科学导论》第五章课后作业解答(个人版)

《计算机科学导论》第五章课后作业解答(个⼈版)1.计算机由哪三个⼦系统组成?CPU、主存和输⼊/输出⼦系统。

2.CPU由哪⼏个部分组成?算术逻辑单元(ALU),控制单元和⼀系列寄存器。

3.ALU的功能是什么?算术逻辑单元负责算术、移位和逻辑运算。

4.控制单元的功能是什么?控制单元控制各个⼦系统的操作。

5.主存的功能是什么?存储数据和程序指令。

6.定义RAM、ROM、SRAM、DRAM、PROM、EPROM和EEPROM。

存储器的类型主要有两种:RAM和ROM。

RAM:随机存取存储器是计算机中主存的主要部分。

可以使⽤存储单元地址来随机存取⼀个数据项,⽽不需要存取位于它前⾯的所有数据项。

⽤户可对其读写,且具有易失性。

ROM:和RAM⼀样,可能随机存取。

该存储器的内容是由制造商写进去的。

⽤户只能读不能写,具有⾮易失性。

SRAM:静态RAM通过使⽤传统的触发器门电路来保存数据,存取速度⾼,但价格昂贵。

DRAM:动态RAM通过使⽤电容器来保存数据,存取速度稍慢,但价格便宜。

PROM:可编程只读存储器在计算机发货时是空⽩的,⽤户可借⽤⼀些特殊的设备将程序存储在上⾯,之后就⽆法再次重写了。

EPROM:可擦除的可编程只读存储器,⽤户需要⽤⼀种可以发出紫外光的特殊仪器对其重写,在重写之前还得拆下来再重新安装。

EEPROM:电可擦除的可编程只读存储器,重写时⽤电⼦脉冲即可,⽆需从计算机上下来。

7.⾼速缓冲存储器的作⽤是什么?提⾼CPU存取内存中数据的速度。

8.描述⼀下磁盘的物理组成?磁盘由⼀张张磁⽚叠加⽽成。

这些磁⽚由薄磁膜封装起来。

信息通过盘上每⼀个磁⽚的读/写磁头读写磁介质表⾯来进⾏读取和存储。

9.磁盘和磁带表⾯是怎样组织的?磁盘的盘⾯被划分成磁道,每个磁道⼜分成若⼲个扇区,磁道间通过磁道内部间隔隔开,扇区之间通过扇区内部间隔隔开。

磁带在宽度上可分为9个磁道,磁道上的每个点可分别存储1位的信息,同时垂直切⾯的9个点可以存储8位的信息,另外的1位⽤于错误检测。

计算机科学导论课本答案(完整版)

计算机科学导论课本答案(完整版)

第1章概述习题(答案)一.选择题1. D2. B3. CD4. C5. ABC6. A7. B8. B9. ABCD 10. ABCDE二.简答题1.什么是计算机系统?计算机系统是一种能够按照事先存储的程序,自动、高速地对数据进行输入、处理、输出和存储的系统,由计算机硬件系统和计算机软件系统两大部分组成。

2.请解释冯•诺依曼所提出的“存储程序”概念。

把程序和数据都以二进制的形式统一存放在存储器中,由机器自动执行。

不同的程序解决不同的问题,实现了计算机通用计算的功能。

3.控制器的主要功能是什么?控制器基本功能就是从内存中取出指令和执行指令,即控制器按程序计数器指出的指令地址从内存中取出该指令进行译码,然后根据该指令功能向有关部件发出控制命令,执行该指令。

另外,控制器在工作过程中,还要接受各部件反馈回来的信息。

4.简述CPU和主机的概念。

通常把运算器、控制器做在一个大规模集成电路块上称为中央处理器,又称CPU(Central Processing Unit)。

通常把内存储器、运算器和控制器合称为计算机主机,也可以说主机是由CPU与内存储器组成的,而主机以外的装置称为外部设备,外部设备包括输入/输出设备,外存储器等。

5.什么是计算机软件?计算机软件的分类有哪些?软件是指用来指挥计算机运行的各种程序的总和以及开发、使用和维护这些程序所需的技术文档。

计算机软件系统分为系统软件和应用软件。

计算机系统软件由操作系统、语言处理系统、以及各种软件工具等组成,指挥、控制计算机硬件系统按照预定的程序运行、工作,从而达到预定的目标。

应用软件是用户利用计算机软、硬件资源为解决各类应用问题而编写的软件,包括用户程序及其说明性文件资料。

6.计算机有哪些主要的特点?(1)运算速度快、精度高计算机的字长越长,其精度越高,现在世界上最快的计算机每秒可以运算几十万亿次以上。

一般计算机可以有十几位甚至几十位(二进制)有效数字,计算精度可由千分之几到百万分之几,是任何计算工具所望尘莫及的。

计算机科学导论课后问答

计算机科学导论课后问答

1.Explain the five parts of an information system .What part do people play inthis system?An information system has five parts: people, procedures, software, hardware and data.People: Are end users who use computer to make themselves more productive.Procedures: Specify rules or guidelines for computer operations.Software: Provides step-by-step instructions for computer hardware.Hardware: Processes the data to create information.Data: Consist of unprocessed facts including text, numbers, image and sounds.People are the most important part of any information system.2.What is system software? What kinds of programs are included in system software?System software helps the computer manage its own internal resources. It includes three kinds of programs: operating systems, utilities and device drivers programs.3.Define and compare basic and specialized application software. Describe somedifferent types of basic application software. Describe some types of specialized applications.Basic applications are the kinds of programs to be considered computer competent.Specialized applications are more narrowly focused on specific disciplines and occupations.Basic applications have some types, such as browser, word processor, spreadsheet ,and so on.Also specialized applications have many types, some of the best known are graphics, audio and video, multimedia, Web authoring ,and artificial intelligence programs.4.Describe the different types of computer. What is the most common type? Whatare the types of microcomputers?There are four types of computers: supercomputers, mainframe computers, minicomputers, and microcomputers.Supercomputers are the most powerful type of computer.Mainframe computers occupy specially wired, air-conditioned rooms, they are capable of great processing speeds and data storage.Minicomputers are refrigerator sized machines.Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of computer.Microcomputers are the most common type of computers.There are four types of microcomputers: Desktop computers, Notebook computers,Handheld computers and PDA.5.What is connectivity? How are the wireless revolution and connectivity related?What is a computer network? What is the Internet? What is the Web?Connectivity is the capability of you microcomputer to share the information with other computers.Wireless revolution dramatically affect connectivity.A computer network is a communications system connecting two or more computers.Internet is the largest network in the world.The Web provides a multimedia interface to the numerous resources available on the Internet.CHAPTER21.Discuss the uses of the Internet. Which activities have you participated in?Which one do you think is the most popular?The most common uses of the Internet are the following: communicating, shopping, searching, entertainment, education, and so on. I have participated in almost all of them. I think communicating is the most popular.2.Explain the differences between the two most common types of providers.The two most common types of providers are National and wireless.National service providers provide access through standard telephone connections. Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.3.What are the basic elements of an e-mail message?A typical e-mail message has three basic elements: header, message and signature.4.What is social networking ? Describe the three types if social networking sites.Social networking is the grouping of individuals into specific groups. There are three basic categories of social networking sites: reuniting, friend-of-a-friend and common interestReuniting sites are designed to connect people who have known one another but have lost touch.Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.Common interest sites bring together individuals that share common interests orhobbies.5.Describe the different types of search engines. Given an example of the typeof search each engine is best for.There are three types of search engines: crawler-based search engines, metasearch engines and specialized search enginesCrawler-based search engines, such as Google, create their listings automatically.Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates, orders the hits, and then provides the edited list to you .one of the best known is Dogpile.Specialized search engines focus on subject-specific Web sites. such as Environment.CHAPTER31.Explain the difference between general-purpose and special-purposeapplications.General-purpose application are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems and presentation graphics.Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.2.Discuss the common features of most software programs. Describe the newinterface to what-if analysis?Most applications use a GUI, use windows to display information, and have menus to present commands.3.What is the difference between a function and a formula? How is a formula relatedto what-if analysis?A formula is an instruction to calculate or process. Functions are prewrittenformulas. A formula related to what-if analysis is called recalculation.4.What are presentation graphics programs? How are they used?Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentation. People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional.5.What is the difference between an integrated package and a software suite? Whatare the advantages and disadvantages od each?An integrated package is a single program that provides the functionality ofa word processor, spreadsheet, database manager, and more. The primarydisadvantage of an integrated package is that the capabilities of each function are not as extensive as in the individual programs. The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundledtogether and sold as a group. It is significantly less expensive to buy a suite of applications than to buy each application separatelyCHAPTER41.Describe graphics , including desktop publishers, image editors, illustrationprograms, image galleries, and graphics suites.Graphics are widely used to analyze data and to create professional-looking presentations; Desktop publishers focus on page design and layout and provide greater flexibility; Image editors are programs for creating and editing bitmap images; Illustration programs are used to create and to edit vector images; Image galleries are libraries of electronic images. These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;Graphics suites are some companies combining their separate graphics programs in groups.2.Discuss audio and video editing software.Audio editing software allows you to create and edit audio clips, most software allow you to add audio effects to your tracks. Video editing software allows you to reorganize, add effects, and more to your digital video footage.3.What is multimedia? How are multimedia presentations developed?Multimedia is the integration of all sorts of media into one presentation. The creation of interactive multimedia presentations follows several steps: Plan, Design, Create and Support.4.Describe Web authoring , including Web site design and Web authoring programs.Creating a site is called Web authoring. A web site design is an interactive multimedia form of communication, designing a web site begins with determining the site’s overall content, the overall site design is commonly represented in a graphical map. More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.5.Discuss three areas of artificial intelligence.The three areas of artificial intelligence are virtual reality, knowledge-based systems and robotics. Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer. Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users. Robotics is the field of study concerned with developing and using robots.CHAPTER51.Describe system software. What are the four types of system programs?System software works with end users, application software, and computer hardware to handle the majority of technical details. It consists of four types of programs: operating systems, utilities, device drivers and language translators.2.What are the basic functions of every operating system? What are the three basicoperating system categories?The basic functions of every operating system are : managing computer resources, providing a user interface, and running applications. The three basic operating system categories are: embedded, network and stand-alone.3.Explain the differences and similarities between Windows, Mac OS, and Linux.Windows is by far the most popular microcomputer operating system today. It comes in a variety of different versions and is designed to run with Intel and Intel-compatible microprocessors. Mac OS is not nearly as widely used as the Windows operating system. It is a powerful, easy-to-use operating system that is popular with professional graphic designs, desktop publishers, and many home users. While Windows, the Mac OS are proprietary operating systems, Linux is not. It is open source software free and available from many sources, including the Web.4.Discuss utilities. What are the five most essential utilities? What is autilities suite?Utilities are specialized programs designed to make computing easier. The five most essential utilities are: troubleshooting or diagnostic programs, antivirus programs, uninstall programs, backup programs and file compression programs.Utility suites combine several programs into one package.5.Explain the role of device drivers. Discuss the Add Printer Wizard and WindowsUpdate.A device driver works with the operating system to allow communication betweenthe device and the rest of the computer system. Each time the computer system is started, the operating system loads all of the device drivers into memory.Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used.Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver. Windows uses Windows Update to make reinstalling or updating device drivers easily.CHAPTER61.Describe the four basic types of system units.There are four basic types of system units: Desktop system units, Notebook system units, Tablet PC system units, and Handheld computer system units.Desktop system units typically contain the system’s electronic components and selected secondary storage devices.Notebook system units are portable and much smaller. They contain the electronic components, selected secondary storage devices, and input device.Tablet PC system units are highly portable devices that support the use of a stylus or pen to input commands and data.Handheld computer system units are the smallest and are designed to fit into the palm of one hand.2.Describe the two basic components of the CPU.The two basic components are: the control unit and the arithmetic-logic unit.Control unit tells the rest of the computer system how to carry out a program’s instructions.Arithmetic-logic unit performs two types of operations---arithmetic and logical.3.What are the differences and similarities between the three types of memory?There are three types of memory chips: RAM, ROM, and CMOS.RAM chips hold the program and data that the CPU is presently processing, everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.CMOS chip provides flexibility and expandability for a computer system. It contains essential information that is required every time the computer system is turned on. It is powered by a battery and does not lose its contents when the power is turned. Its contents can be changed to reflect changes in the computer system.4.Identify five expansion cards and describe the function of each.Five expansion cards are: graphics cards, sound cards, modem cards, NIC and TV tuner cards.Graphics cards connect the system board to the computer’s monitor, they convert the internal electronic signals to video signals so they can be displayed on the monitor.Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer. They also convert internal electronic signals to audio signals.Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.NIC are used to connect a computer to one or more other computers.TV tuner cards can changes the TV signal into one that can be displayed on you monitor.5.Identify and describe four standard ports and two specialized ports.Four standard ports are: serial ports, parallel ports, universal serial bus ports and FireWire ports.Serial ports are often used to connect a mouse, keyboard, modem, and many other devices to the system unit.Parallel ports are used to connect external devices that need to send or receivea lot of data over a short distance.USB ports are gradually replacing serial and parallel ports.FireWire ports provide connections to specialized FireWire devices.CHAPTER71.Define input and output devices.Input is any data or instructions that are used by a computer. Input devices are hardware used to translate what people understand into a form that computers can process.2.Describe the three categories of output devices.①There are a widely of different pointing devices including the mouse, joystick,touch screen, light pen, and stylus.A mouse controls a pointer that is displayed on the monitor.A joystick is the most popular input device for computer games. You control gameactions by varying the pressure, speed, and direction of the joystick.A touch screen is a particular kind of monitor with a clear plastic outer layer.A light pen is a light-sensitive pen-like device.A stylus acts with the computer through handwriting recognition software.②There are three types of scanning devices: optical scanners, card readers, barcode readers, and character and mark recognition devices.An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.Card readers interpret encoded information.Bar code readers are either handheld wand readers or platform scanners.Character and mark recognition devices are scanners that are able to recognize special characters and marks.③Image capturing devices include digital cameras and digital video cameras.Digital cameras capture still images. Digital video cameras capture motion.④Audio input can take many forms including the human voice and music.Voice recognition systems accept voice commands to control computer operations and to create document.MIDI is a standard for connecting musical instruments to the system unit.3.Describe the three categories if output devices.The most widely used output devices are monitors, printers and audio output.Monitors present visual images of text and graphics.Printers translate information that has been processed by the system unit and present the information on paper.Audio output devices translate audio information from the computer into sounds that people can understand.4. Define output an output devices.Output is processed data or information. Output devices are hardware used to translate information that has been processed by the system unit into a form that humans can understands.5. What are combination input and output devices? Describe four such devices.Devices combine features of input devices such as scanners with features of output devices like printers are called combination input and output devices.Combination devices include fax machines, multifunction devices, Internet telephones, and terminals.A fax machine is a standard tool in nearly every office.Multifunction devices combine the capabilities of a scanner, printer, fax, and copying machine.Internet telephones are specialized input and output devices for receiving and sending voice communication.Terminals are input and output device that connect you to a mainframe or other type of computer.CHAPTER81.Discuss the traditional and high-capacity floppy disksThe traditional floppy disk is the 3-inch disk. They have a thin exterior jacket made of hard plastic to protect the flexible disk inside.The high capacity floppy disks are 3 inches in diameter. They are able to store more information, are thicker, and require special disk drives.2.What are the three types of hard disks? Describe three ways to improve hard diskperformance.There are three types of hard disks: Internal hard disk, hard-disk cartridge, and hard-disk pack.Three ways to improve the performance of hard disks are disk caching, redundant arrays of inexpensive disks, and file compression/decompression.Disk caching improves hard-disk performance by anticipating data needs.Redundant arrays of inexpensive disks improve performance by expending external storage, improving access speed, and providing reliable storage.File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.3.What are the two most common optical disc formats? What is hi def ? Describethe basic types for each format.The two most common optical disc formats are CD and DVD. Hi def is the nextgeneration of optical discs.①There are four basic types of CDs: read only, write once, rewritable, andPicture and Photo CDs.Read only CDs cannot be written on or erased by the users, they are used to distribute large databases, references, and large software application packages.Write once CDs can be written to once, they are used to archive data and to record music download from the Internet.Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.②There are three types of DVDs: read only, write once, and rewriteable.Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.Rewriteable DVDs are competing rewriteable formats.4.Discuss solid-state storage, Internet hard drives, and magnetic tape. What arethe advantages and disadvantages of each?Solid-state storage does not have moving parts. Internet drives use the Internet to store data and information. Magnetic tape provides sequential access for backup.Solid-state storage is more expensive than the others, it is more reliable and requires less power.Internet drives are low cost and the flexibility to access information from any location using the Internet. Access speed is slower.Magnetic tapes provide slower sequential access. It is an effective and commonly used tool for backing up data.5. Discuss mass storage, enterprise storage system, and mass storage devices.Mass storage refers to the storage of large amounts of data in a persisting and machine-readable fashion. Enterprise storage systems are the computer storage systems designed for large-scale, high-technology environments of the modern storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tape drives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory.CHAPTER91.Define and discuss connectivity, the wireless revolution, and communications.①Connectivity is a concept related to using computer networks to link peopleand resources.②The single most dramatic change in connectivity and communications in the pastfive years has been the widespread use of mobile or wireless telephones. This wireless technology allows individuals to stay connected with one another from almost anywhere at any time, the revolution is just beginning.③Communication systems transmit data from one location to another. Everycommunication system has four basic elements: sending and receiving devices, communication channel, connection devices, and data transmission specifications.2.Identify and describe the various physical and wireless communications.①Physical connections use a solid medium to connect sending and receivingdevices.These connections include telephone lines, coaxial cable, and fiber-optic cables.Telephone lines consist of twisted pair cable, they have been the standard transmission medium for years for both voice and data.Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core.Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.②Wireless connections use the air to connect sending and receiving devices.Primary technologies used for wireless connections are infrared, broadcast radio, microwave, and satellite.Infrared uses infrared light waves to communicate over short distances.Broadcast radio communication uses special sending and receiving towers called transceivers.Microwave communication uses high-frequency radio waves.Satellite communication uses satellites orbiting about 22000 miles above the earth as microwave relay stations.3.Identify the standard Internet protocol and discuss its essential features.The standard protocol for the Internet is TCP/IP. The essential features of this protocol involve: identifying sending and receiving devices and reformatting information for transmission across the Internet.Identification: Every computer on the Internet has a unique number address called an IP address, the Internet uses IP addresses to deliver e-mail and to locateWeb sites.Reformatting: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the massage is sent, it is reformatted or broken down into small parts called packets, at the receiving end, the packets are reassembled into the correct order.4.Define and discuss the four principal network topologies.The four principal network topologies are star, bus, ring, and hierarchical.In a star network, a number of small computers or peripheral devices are linked to a central unit, all communications pass through this central unit.In a bus network, each device in the network handles its own communication control.In a ring network, each device is connected to two other devices, forming a ring.The hierarchical network consists of several computers linked to a central host computer, other computers are also hosts to other, smaller computers or to peripheral devices.5.Define and discuss the three most common network strategies.The most common network strategies are terminal, client/server, and peer-to-peer systems.①In a terminal network system, processing power is centralized in one largecomputer. For the end user it is lack of control and flexibility.②Client/server network system use one computer to coordinate and supplyservices to other nodes on the network. One advantage of the client/sever network strategy is the ability to handle very large networks efficiently. Another advantage is the ability of powerful network management software to monitor and control network activities. The major disadvantages are the cost of installation and maintenance.③In a peer-to-peer network system, nodes have equal authority and can act asboth clients and servers. The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.CHAPTER101.Discuss the impact of large database , private networks, the Internet, and theWeb on privacy.Large databases raise some serious concerns on privacy: identity theft and mistaken identity.The impact of private networks on privacy has the two parts: The first instance, of firms eavesdropping on employees, has inspired attempts at federallegislation. The second instance, in which online information services screen and reject messages, is a common activity with most commercial services.The internet brings illusion of anonymity, the web creates a history file, your web activity is monitored is by cookies. To respond to these privacy concerns,a code of fair information practice has been established.2.Discuss the carious kinds of computer criminals.Computer criminals are of five types:Employees: The largest category of computer criminals consists of those with the easiest access to computers-namely, employees.Outside users: Some suppliers or clients may have access to a company’s computer system.Hackers and crackers: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes.Organized crime: Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do, but for illegal purpose.Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.3. What are the principal measures used to protect computer security? What isencryption? How is it used by corporations and individuals?Some of the principal measures to protect computer security are encryption, restricting access, anticipating disasters, and backing up data.Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals are also using encryption programs to safeguard their private communications.4.What is ergonomics? How does computer use impact mental health? Physical health?Ergonomics is defined as the study of human factors related to things people use.The physical health matters related to computers that have received the most attention recently are the following: eyestrain and headache, back and neck pain, and repetitive strain injury. Computer technology creates some irritants that may be counter productive: noise, and electronic monitoring.5.Describe the basic elements of the Green PC and what you can do to protect the。

计算机科学与导论课后习题答案 第6章 程序设计与算法分析

计算机科学与导论课后习题答案  第6章  程序设计与算法分析
(3) 问题的边界应该清晰明确。只有这样才能精确地解决这些子问题,否则就会模棱两可,无从下手。
5.简述面向对象和结构化程序设计的区别。
答:面向对象是从本质上区别于传统的结构化方法的一种新方法、新思路。它吸收了结构化程序设计的全部优点,同时又考虑到现实世界与计算机之间的关系,认为现实世界是由一系列彼此相关并且能够相互通信的实体组成,这些实体就是面向对象方法中的对象,每个对象都有自己的自然属性和行为特征,而一类相似对象的共性的抽象描述,就是面向对象方法中的核心——类。
9.用图示法表示语言处理的过程。
答:语言处理的过程如图所示:
10.简述编译程序的概念。
编译程序是把高级语言程序(源程序)作为一个整体来处理,在应用源程序执行之前,就将程序源代码“翻译”成目标代码(机器语言),编译后与系统提供的代码库链接,形成—个完整的可执行的机器语言程序(目标程序代码)。
第6章 程序设计与算法分析
习题(答案)
一、选择题
1. A 2. D 3. A 4. C 5. D
6. B 7. B 8. D 9. ABCD 10. D
11. C 12. A 13. B 14. D 15. A
二、简答题
1.简述程序的概念。
答:一个程序就是能够实现特定功能的一组指令序列的集合。或者表示为:程序=算法+数据结构。
答:语法分析是编译过程的第二个阶段,任务是在词法分析的基础上将单词序列分解成各类语法短语,如“程序”、“语句”、“表达式”等等。
14.简述语义处理的功能。
答:编译过程中的语义处理实现两个功能:
(1) 审查每个语法结构的静态语义,即验证语法结构合法的程序是否真正有意义,有时把这个工作称为静态语义分析或静态审查。

计算机科学导论 (全英版)课后问答-推荐下载

计算机科学导论 (全英版)课后问答-推荐下载

CHAPTER11.Explain the five parts of an information system .What part do people play in this system?An information system has five parts: people, procedures, software, hardware and data.People: Are end users who use computer to make themselves more productive.Procedures: Specify rules or guidelines for computer operations.Software: Provides step-by-step instructions for computer hardware.Hardware: Processes the data to create information.Data: Consist of unprocessed facts including text, numbers, image and sounds.People are the most important part of any information system.2.What is system software? What kinds of programs are included in system software?System software helps the computer manage its own internal resources. It includes three kinds of programs: operating systems, utilities and device drivers programs.3.Define and compare basic and specialized application software. Describe some differenttypes of basic application software. Describe some types of specialized applications.Basic applications are the kinds of programs to be considered computer competent.Specialized applications are more narrowly focused on specific disciplines and occupations.Basic applications have some types, such as browser, word processor, spreadsheet ,and so on.Also specialized applications have many types, some of the best known are graphics, audio and video, multimedia, Web authoring ,and artificial intelligence programs.4.Describe the different types of computer. What is the most common type? What are thetypes of microcomputers?There are four types of computers: supercomputers, mainframe computers, minicomputers, and microcomputers.Supercomputers are the most powerful type of computer.Mainframe computers occupy specially wired, air-conditioned rooms, they are capable of great processing speeds and data storage.Minicomputers are refrigerator sized machines.Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of computer.Microcomputers are the most common type of computers.There are four types of microcomputers: Desktop computers, Notebook computers, Handheld computers and PDA.5.What is connectivity? How are the wireless revolution and connectivity related? What isa computer network? What is the Internet? What is the Web?Connectivity is the capability of you microcomputer to share the information with other computers.Wireless revolution dramatically affect connectivity.A computer network is a communications system connecting two or more computers.Internet is the largest network in the world.The Web provides a multimedia interface to the numerous resources available on the Internet.CHAPTER21.Discuss the uses of the Internet. Which activities have you participated in? Which one doyou think is the most popular?The most common uses of the Internet are the following: communicating, shopping, searching, entertainment, education, and so on. I have participated in almost all of them. I think communicating is the most popular.2.Explain the differences between the two most common types of providers.The two most common types of providers are National and wireless.National service providers provide access through standard telephone connections.Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.3.What are the basic elements of an e-mail message?A typical e-mail message has three basic elements: header, message and signature.4.What is social networking ? Describe the three types if social networking sites.Social networking is the grouping of individuals into specific groups. There are three basic categories of social networking sites: reuniting, friend-of-a-friend and common interest Reuniting sites are designed to connect people who have known one another but have lost touch. Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.Common interest sites bring together individuals that share common interests or hobbies.5.Describe the different types of search engines. Given an example of the type of search eachengine is best for.There are three types of search engines: crawler-based search engines, metasearch engines and specialized search enginesCrawler-based search engines, such as Google, create their listings automatically.Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates, orders the hits, and then provides the edited list to you .one of the best known is Dogpile.Specialized search engines focus on subject-specific Web sites. such as Environment.CHAPTER31.Explain the difference between general-purpose and special-purpose applications.General-purpose application are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems and presentation graphics.Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.2.Discuss the common features of most software programs. Describe the new interface towhat-if analysis?Most applications use a GUI, use windows to display information, and have menus to present commands.3.What is the difference between a function and a formula? How is a formula related towhat-if analysis?A formula is an instruction to calculate or process. Functions are prewritten formulas. A formularelated to what-if analysis is called recalculation.4.What are presentation graphics programs? How are they used?Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentation. People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional.5.What is the difference between an integrated package and a software suite? What are theadvantages and disadvantages od each?An integrated package is a single program that provides the functionality of a word processor, spreadsheet, database manager, and more. The primary disadvantage of an integrated package is that the capabilities of each function are not as extensive as in the individual programs. The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundled together and sold as agroup. It is significantly less expensive to buy a suite of applications than to buy eachapplication separatelyCHAPTER41.Describe graphics , including desktop publishers, image editors, illustration programs,image galleries, and graphics suites.Graphics are widely used to analyze data and to create professional-looking presentations;Desktop publishers focus on page design and layout and provide greater flexibility;Image editors are programs for creating and editing bitmap images; Illustration programs are used to create and to edit vector images; Image galleries are libraries of electronic images. These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;Graphics suites are some companies combining their separate graphics programs in groups.2.Discuss audio and video editing software.Audio editing software allows you to create and edit audio clips, most software allow you to add audio effects to your tracks. Video editing software allows you to reorganize, add effects, and more to your digital video footage.3.What is multimedia? How are multimedia presentations developed?Multimedia is the integration of all sorts of media into one presentation. The creation of interactive multimedia presentations follows several steps: Plan, Design, Create and Support.4.Describe Web authoring , including Web site design and Web authoring programs.Creating a site is called Web authoring. A web site design is an interactive multimedia form of communication, designing a web site begins with determining the site’s overall content, the overall site design is commonly represented in a graphical map. More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.5.Discuss three areas of artificial intelligence.The three areas of artificial intelligence are virtual reality, knowledge-based systems and robotics. Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer.Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users. Robotics is the field of study concerned with developing and using robots.1.Describe system software. What are the four types of system programs?System software works with end users, application software, and computer hardware to handle the majority of technical details. It consists of four types of programs: operating systems, utilities, device drivers and language translators.2.What are the basic functions of every operating system? What are the three basicoperating system categories?The basic functions of every operating system are : managing computer resources, providing a user interface, and running applications. The three basic operating system categories are: embedded, network and stand-alone.3.Explain the differences and similarities between Windows, Mac OS, and Linux.Windows is by far the most popular microcomputer operating system today. It comes in a variety of different versions and is designed to run with Intel and Intel-compatible microprocessors. Mac OS is not nearly as widely used as the Windows operating system. It isa powerful, easy-to-use operating system that is popular with professional graphic designs,desktop publishers, and many home users. While Windows, the Mac OS are proprietary operating systems, Linux is not. It is open source software free and available from many sources, including the Web.4.Discuss utilities. What are the five most essential utilities? What is a utilities suite?Utilities are specialized programs designed to make computing easier. The five most essential utilities are: troubleshooting or diagnostic programs, antivirus programs, uninstall programs, backup programs and file compression programs. Utility suites combine several programs into one package.5.Explain the role of device drivers. Discuss the Add Printer Wizard and Windows Update.A device driver works with the operating system to allow communication between the deviceand the rest of the computer system. Each time the computer system is started, the operating system loads all of the device drivers into memory. Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used.Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver. Windows uses Windows Update to make reinstalling or updating device drivers easily.1.Describe the four basic types of system units.There are four basic types of system units: Desktop system units, Notebook system units, Tablet PC system units, and Handheld computer system units.Desktop system units typically contain the system’s electronic components and selected secondary storage devices.Notebook system units are portable and much smaller. They contain the electronic components, selected secondary storage devices, and input device.Tablet PC system units are highly portable devices that support the use of a stylus or pen to input commands and data.Handheld computer system units are the smallest and are designed to fit into the palm of one hand.2.Describe the two basic components of the CPU.The two basic components are: the control unit and the arithmetic-logic unit.Control unit tells the rest of the computer system how to carry out a program’s instructions.Arithmetic-logic unit performs two types of operations---arithmetic and logical.3.What are the differences and similarities between the three types of memory?There are three types of memory chips: RAM, ROM, and CMOS.RAM chips hold the program and data that the CPU is presently processing, everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.CMOS chip provides flexibility and expandability for a computer system. It contains essential information that is required every time the computer system is turned on. It is powered by a battery and does not lose its contents when the power is turned. Its contents can be changed to reflect changes in the computer system.4.Identify five expansion cards and describe the function of each.Five expansion cards are: graphics cards, sound cards, modem cards, NIC and TV tuner cards.Graphics cards connect the system board to the computer’s monitor, they convert the internal electronic signals to video signals so they can be displayed on the monitor.Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer. They also convert internal electronic signals to audio signals.Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.NIC are used to connect a computer to one or more other computers.TV tuner cards can changes the TV signal into one that can be displayed on you monitor.5.Identify and describe four standard ports and two specialized ports.Four standard ports are: serial ports, parallel ports, universal serial bus ports and FireWire ports.Serial ports are often used to connect a mouse, keyboard, modem, and many other devices to the system unit.Parallel ports are used to connect external devices that need to send or receive a lot of data overa short distance.USB ports are gradually replacing serial and parallel ports.FireWire ports provide connections to specialized FireWire devices.CHAPTER71.Define input and output devices.Input is any data or instructions that are used by a computer. Input devices are hardware used to translate what people understand into a form that computers can process.2.Describe the three categories of output devices.①There are a widely of different pointing devices including the mouse, joystick, touch screen,light pen, and stylus.A mouse controls a pointer that is displayed on the monitor.A joystick is the most popular input device for computer games. You control game actions byvarying the pressure, speed, and direction of the joystick.A touch screen is a particular kind of monitor with a clear plastic outer layer.A light pen is a light-sensitive pen-like device.A stylus acts with the computer through handwriting recognition software.②There are three types of scanning devices: optical scanners, card readers, bar code readers,and character and mark recognition devices.An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.Card readers interpret encoded information.Bar code readers are either handheld wand readers or platform scanners.Character and mark recognition devices are scanners that are able to recognize special characters and marks.③Image capturing devices include digital cameras and digital video cameras.Digital cameras capture still images. Digital video cameras capture motion.④Audio input can take many forms including the human voice and music.Voice recognition systems accept voice commands to control computer operations and to create document.MIDI is a standard for connecting musical instruments to the system unit.3.Describe the three categories if output devices.The most widely used output devices are monitors, printers and audio output.Monitors present visual images of text and graphics.Printers translate information that has been processed by the system unit and present the information on paper.Audio output devices translate audio information from the computer into sounds that people can understand.4. Define output an output devices.Output is processed data or information. Output devices are hardware used to translate information that has been processed by the system unit into a form that humans can understands.5. What are combination input and output devices? Describe four such devices.Devices combine features of input devices such as scanners with features of output devices like printers are called combination input and output devices.Combination devices include fax machines, multifunction devices, Internet telephones, and terminals.A fax machine is a standard tool in nearly every office.Multifunction devices combine the capabilities of a scanner, printer, fax, and copying machine.Internet telephones are specialized input and output devices for receiving and sending voice communication.Terminals are input and output device that connect you to a mainframe or other type of computer.CHAPTER81.Discuss the traditional and high-capacity floppy disksThe traditional floppy disk is the 1.44MB 3-inch disk. They have a thin exterior jacket made of hard plastic to protect the flexible disk inside.The high capacity floppy disks are 3 inches in diameter. They are able to store more information, are thicker, and require special disk drives.2.What are the three types of hard disks? Describe three ways to improve hard diskperformance.There are three types of hard disks: Internal hard disk, hard-disk cartridge, and hard-disk pack.Three ways to improve the performance of hard disks are disk caching, redundant arrays ofinexpensive disks, and file compression/decompression.Disk caching improves hard-disk performance by anticipating data needs.Redundant arrays of inexpensive disks improve performance by expending external storage, improving access speed, and providing reliable storage.File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.3.What are the two most common optical disc formats? What is hi def ? Describe the basictypes for each format.The two most common optical disc formats are CD and DVD. Hi def is the next generation of optical discs.①There are four basic types of CDs: read only, write once, rewritable, and Picture and PhotoCDs.Read only CDs cannot be written on or erased by the users, they are used to distribute large databases, references, and large software application packages.Write once CDs can be written to once, they are used to archive data and to record music download from the Internet.Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.②There are three types of DVDs: read only, write once, and rewriteable.Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.Rewriteable DVDs are competing rewriteable formats.4.Discuss solid-state storage, Internet hard drives, and magnetic tape. What are theadvantages and disadvantages of each?Solid-state storage does not have moving parts. Internet drives use the Internet to store data and information. Magnetic tape provides sequential access for backup.Solid-state storage is more expensive than the others, it is more reliable and requires less power.Internet drives are low cost and the flexibility to access information from any location using the Internet. Access speed is slower.Magnetic tapes provide slower sequential access. It is an effective and commonly used tool for backing up data.5. Discuss mass storage, enterprise storage system, and mass storage devices.Mass storage refers to the storage of large amounts of data in a persisting and machine-readable fashion. Enterprise storage systems are the computer storage systems designed for large-scale, high-technology environments of the modern enterprises.Mass storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tapedrives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory.CHAPTER91.Define and discuss connectivity, the wireless revolution, and communications.①Connectivity is a concept related to using computer networks to link people and resources.②The single most dramatic change in connectivity and communications in the past five yearshas been the widespread use of mobile or wireless telephones. This wireless technology allows individuals to stay connected with one another from almost anywhere at any time, the revolution is just beginning.③Communication systems transmit data from one location to another. Every communicationsystem has four basic elements: sending and receiving devices, communication channel, connection devices, and data transmission specifications.2.Identify and describe the various physical and wireless communications.①Physical connections use a solid medium to connect sending and receiving devices.These connections include telephone lines, coaxial cable, and fiber-optic cables.Telephone lines consist of twisted pair cable, they have been the standard transmission medium for years for both voice and data.Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core.Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.②Wireless connections use the air to connect sending and receiving devices.Primary technologies used for wireless connections are infrared, broadcast radio, microwave, and satellite.Infrared uses infrared light waves to communicate over short distances.Broadcast radio communication uses special sending and receiving towers called transceivers.Microwave communication uses high-frequency radio waves.Satellite communication uses satellites orbiting about 22000 miles above the earth as microwave relay stations.3.Identify the standard Internet protocol and discuss its essential features.The standard protocol for the Internet is TCP/IP. The essential features of this protocol involve: identifying sending and receiving devices and reformatting information for transmission across the Internet.Identification: Every computer on the Internet has a unique number address called an IP address, the Internet uses IP addresses to deliver e-mail and to locate Web sites.Reformatting: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the massage is sent, it is reformatted or broken downinto small parts called packets, at the receiving end, the packets are reassembled into the correct order.4.Define and discuss the four principal network topologies.The four principal network topologies are star, bus, ring, and hierarchical.In a star network, a number of small computers or peripheral devices are linked to a central unit, all communications pass through this central unit.In a bus network, each device in the network handles its own communication control.In a ring network, each device is connected to two other devices, forming a ring.The hierarchical network consists of several computers linked to a central host computer, other computers are also hosts to other, smaller computers or to peripheral devices.5.Define and discuss the three most common network strategies.The most common network strategies are terminal, client/server, and peer-to-peer systems.①In a terminal network system, processing power is centralized in one large computer. For theend user it is lack of control and flexibility.②Client/server network system use one computer to coordinate and supply services to othernodes on the network. One advantage of the client/sever network strategy is the ability to handle very large networks efficiently. Another advantage is the ability of powerful network management software to monitor and control network activities. The major disadvantages are the cost of installation and maintenance.③In a peer-to-peer network system, nodes have equal authority and can act as both clients andservers. The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.CHAPTER101.Discuss the impact of large database , private networks, the Internet, and the Web onprivacy.Large databases raise some serious concerns on privacy: identity theft and mistaken identity.The impact of private networks on privacy has the two parts: The first instance, of firms eavesdropping on employees, has inspired attempts at federal legislation. The second instance, in which online information services screen and reject messages, is a common activity with most commercial services.The internet brings illusion of anonymity, the web creates a history file, your web activity is monitored is by cookies. To respond to these privacy concerns, a code of fair information practice has been established.2.Discuss the carious kinds of computer criminals.Computer criminals are of five types:Employees: The largest category of computer criminals consists of those with the easiest access to computers-namely, employees.Outside users: Some suppliers or clients may have access to a company’s computer system.Hackers and crackers: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes.Organized crime: Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do, but for illegal purpose.Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.3. What are the principal measures used to protect computer security? What is encryption?How is it used by corporations and individuals?Some of the principal measures to protect computer security are encryption, restricting access, anticipating disasters, and backing up data.Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals are also using encryption programs to safeguard their private communications.4.What is ergonomics? How does computer use impact mental health? Physical health?Ergonomics is defined as the study of human factors related to things people use.The physical health matters related to computers that have received the most attention recently are the following: eyestrain and headache, back and neck pain, and repetitive strain injury.Computer technology creates some irritants that may be counter productive: noise, and electronic monitoring.5.Describe the basic elements of the Green PC and what you can do to protect theenvironment.The basic elements of the Green PC are: System unit, display, and manufacturing.As a computer user, you can do to help protect the environment are the following:conserve, recycle, and educate.。

《计算机科学导论》第八章答案(包含讨论题)

《计算机科学导论》第八章答案(包含讨论题)

一、选择题1——5 DCBAC 6——10 DBCDA二、简答题1、操作系统就是合理管理并控制计算机系统内软、硬件资源,并能够合理组织工作流程、方便用户使用的程序的集合。

通常我们将操作系统的功能概括为两大功能:扩展的虚拟机功能、资源管理功能。

其中,资源管理功能包括了处理机管理、内存管理、设备管理、文件管理四大功能。

而扩展的虚拟机提供友好的人机交互以及程序级接口,使得计算机看上去像是功能扩展了的机器。

2、最常见的是按照操作系统的性质来划分的类型:分为批处理操作系统、分时操作系统、实时操作系统、网络操作系统、嵌入式操作系统。

它们的特点分别是:批处理系统的主要特点是系统吞吐量大、系统资源利用率较高、平均作业周转时间(作业从提交到结果输出的时间)较长,系统无交互力。

分时系统中往往支持多道程序执行,尽管如此,各运行任务具有独立性,互不影响;由于将处理机分时使用,使得用户与系统的及时交互成为可能,因此,分时系统具有较好的交互性;同时,系统资源利用率也得到了很大的提高。

实时系统具有事件驱动的特点,往往是由外部事件来触发系统的响应;实时系统要求的响应时间很短,以便及时响应事件,从而保证整个系统的实时性和高可靠性。

网络操作系统要求组成网络的各台计算机物理分散且高度自治,各计算机都有各自的软、硬件资源,系统的主要目的是共享网络资源、信息交换和协作。

嵌入式操作系统具有普通计算机具有的通常功能,但同时具有实时系统的特征,通常是更小的具有一定硬件控制功能的系统。

3、并发通常指多个任务可以在同一个时间段内同时执行,即允许多个任务在宏观上并行,微观上仍然是串行的(对于单CPU系统而言)。

并行指的是多个任务真正意义上的同时执行,换言之,多个任务可以在同一个时刻同时执行。

并发系统只能够是宏观上并行、微观上串行执行;而并行则在微观执行上也是并行的。

只有在多处理机系统中,任务的并行执行才是可能的。

并行系统往往也可以支持任务的并发执行。

计算机科学导论课后习题答案-第三章

计算机科学导论课后习题答案-第三章

数据存储After reading this chapter, the reader should be able to :了解计算机内部不同类型数据的不同表示方法理解整数的不同编码表示形式理解浮点数3.2存储数字3.2.1INTEGERREPRESENTATION INTEGER:整数无符号整数格式---没有符号的整数,它的范围介于0到正无穷之间。

范围:0~(2N-1)无符号整数的表示范围# of Bits ---------816Range-------------------------------------0 ~ 255 0 ~ 65,535表示法:(1)首先将整数变成二进制数;(2)如果二进制位数不足N位,则在二进制数的左边补0,使它的总位数为N位。

Example 3.1将7存储在8位存储单元中。

Solution首先将数据转换为二进制---111。

在高位加5个0让数据变成8位---00000111。

最后将数据存入存储单元。

Example 3.2将285存储在16位存储单元中。

00000001 00011110无符号整数的存储示例:在8位机和16位机中Decimal ------------7234258 24,760 1,245,6788-bit allocation------------0000011111101010overflowoverflowoverflow16-bit allocation------------------------------0000000000000111000000001110101000000001000000100110000010111000overflow译解(计算机如何读取并输出无符号整数):将N位二进制数从二制数系统转换到十进制系统。

Example内存中的无符号整数位串00101011 在输出设备上将显示为什么?43应用:(1)计数;(2)寻址。

计算机科学导论知识点

计算机科学导论知识点

计算机科学导论知识点English Answer:Introduction to Computer Science.Computer science is the study of computers and computation. It encompasses a wide range of topics, from hardware and software to algorithms and data structures.Hardware.Hardware is the physical components of a computer, such as the processor, memory, and storage. It is responsiblefor carrying out the instructions that are given to it bythe software.Software.Software is the set of instructions that tells the computer what to do. It is divided into two main categories:System software manages the computer's resources and provides basic services, such as file management and memory allocation.Application software performs specific tasks, such as word processing, spreadsheets, and games.Algorithms.Algorithms are step-by-step instructions that describe how to solve a problem. They are used in a wide variety of applications, from sorting data to searching the web.Data Structures.Data structures are ways of organizing data in memory. They are used to make it easier to access and manipulate data.Applications of Computer Science.Computer science is used in a wide range of applications, including:Business: Computer science is used to manage data, track inventory, and automate tasks.Science: Computer science is used to model complex systems, conduct simulations, and analyze data.Medicine: Computer science is used to diagnose diseases, develop new treatments, and manage patient records.Education: Computer science is used to create online courses, develop educational software, and provide access to information.Career Opportunities.There are a wide range of career opportunities in computer science, including:Software engineer: Develops and maintains software applications.Computer scientist: Researches new algorithms and data structures.Computer hardware engineer: Designs and builds computer hardware.IT specialist: Supports and manages computer networks and systems.Data analyst: Analyzes data to identify trends and patterns.中文回答:计算机科学导论。

计算机科学导论试题与答案

计算机科学导论试题与答案

计算机科学导论试题与答案一、选择题1. 计算机科学的起源可以追溯到()世纪。

A. 20B. 21C. 19D. 18答案:A2. 计算机的英文单词“computer”最早出现在()年。

A. 1940B. 1950C. 1960D. 1970答案:A3. 冯·诺依曼提出了计算机的体系结构,包括存储程序和程序控制的思想,这一体系结构被称为()。

A. 冯·诺依曼架构B. 哈佛架构C. 堆栈架构D. 寄存器架构答案:A4. 二进制只有两个数码,0和()。

A. 1B. 2C. AD. 5答案:A5. 在计算机中,数据是以()形式存储和处理的。

A. 二进制B. 十进制C. 八进制D. 十六进制答案:A6. 计算机的基本功能是对数据进行()。

A. 存储B. 传输C. 处理D. 显示答案:C7. 计算机病毒是一种()。

A. 软件B. 硬件C. 操作系统D. 网络协议答案:A8. 操作系统的主要功能是管理计算机的()。

A. 硬件资源B. 软件资源C. 网络资源D. 用户资源答案:A9. 互联网的起源可以追溯到()年。

A. 1969B. 1970C. 1980D. 1990答案:A10. 电子邮件的英文缩写是()。

A. E-mailB. E-bookC. E-commerceD. E-government答案:A二、填空题1. 计算机科学的五个基本领域是计算机系统结构、_______、软件工程、人工智能和计算机网络。

答案:算法与数据结构2. 计算机的基本单位是_______,它是由计算机的硬件和软件组成的。

答案:计算机系统3. 计算机的存储器分为为主存储器(_______)和辅助存储器(_______)。

答案:RAM;硬盘、光盘等4. 计算机病毒是一种特殊的程序,它可以通过_______途径传播。

答案:网络、移动存储设备等5. 互联网是由全球范围内的_______互联而成的网络。

答案:计算机三、简答题1. 请简要介绍计算机科学的发展历程。

《计算机导论》课后习题答案

《计算机导论》课后习题答案

第一章1、什么是计算机?答:计算机是一种能够按照事先存储的程序,自动、高速地对数据进行输入、处理、输出和存储的系统。

2、解释冯·诺依曼所提出的“储存程序”的概念。

答:由于计算机可以储存程序,从而使得计算机可以在程序的控制下自动地完成各种操作,而无需人工干涉。

3、计算机有那些特点?答:运算速度快、运算精度高、具有记忆能力、具有逻辑判断能力和存储程序。

4、计算机发展过程中各阶段的主要特点是什么?答:电子计算机发展的四个阶段是:第一代( 1946 ~ 1957 ),以电子管为逻辑部件,以阴极射线管、磁芯和磁鼓等为存储手段。

软件上采用机器语言,后期采用汇编语言。

第二代( 1958 ~ 1965 ),以晶体管为逻辑部件,内存用磁芯,外存用磁盘。

软件上广泛采用高级语言,并出现了早期的操作系统。

第三代( 1966 ~ 1971 ),以中小规模集成电路为主要部件,内存用磁芯、半导体,外存用磁盘。

软件上广泛使用操作系统,产生了分时、实时等操作系统和计算机网络。

第四代( 1971 至今),以大规模、超大规模集成电路为主要部件,以半导体存储器和磁盘为内、外存储器。

在软件方法上产生了结构化程序设计和面向对象程序设计的思想。

另外,网络操作系统、数据库管理系统得到广泛应用。

微处理器和微型计算机也在这一阶段诞生并获得飞速发展。

5、信息化社会对计算机人才的素质和知识结构有哪些要求?答:a)掌握计算机科学与技术的理论和本学科的主要知识体系。

b)在确定的环境中能够理解并且能够应用基本的概念、原理、准则,具备对工具及技巧进行选择与应用的能力。

c)完成一个项目的设计与实现,该项目应该涉及到问题的标识、描述与定义、分析、设计和开发等,为完成的项目撰写适当的文档。

该项目的工作应该能够表明自己具备一定的解决问题和评价问题的能力,并能表现出对质量问题的适当的理解和认识。

d)具备在适当的指导下进行单独工作的能力,以及作为团队成员和其他成员进行合作的能力。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

CHAPTER11.Explain the five parts of an information system .What part do people play inthis system?An information system has five parts: people, procedures, software, hardware and data.People: Are end users who use computer to make themselves more productive.Procedures: Specify rules or guidelines for computer operations.Software: Provides step-by-step instructions for computer hardware.Hardware: Processes the data to create information.Data: Consist of unprocessed facts including text, numbers, image and sounds.People are the most important part of any information system.2.What is system software? What kinds of programs are included in systemsoftware?System software helps the computer manage its own internal resources. It includes three kinds of programs: operating systems, utilities and device drivers programs.3.Define and compare basic and specialized application software. Describe somedifferent types of basic application software. Describe some types of specialized applications.Basic applications are the kinds of programs to be considered computer competent.Specialized applications are more narrowly focused on specific disciplines and occupations.Basic applications have some types, such as browser, word processor, spreadsheet ,and so on.Also specialized applications have many types, some of the best known are graphics, audio and video, multimedia, Web authoring ,and artificial intelligence programs.4.Describe the different types of computer. What is the most common type? Whatare the types of microcomputers?There are four types of computers: supercomputers, mainframe computers, minicomputers, and microcomputers.Supercomputers are the most powerful type of computer.Mainframe computers occupy specially wired, air-conditioned rooms, they are capable of great processing speeds and data storage.Minicomputers are refrigerator sized machines.Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of computer.Microcomputers are the most common type of computers.There are four types of microcomputers: Desktop computers, Notebook computers, Handheld computers and PDA.5.What is connectivity? How are the wireless revolution and connectivityrelated? What is a computer network? What is the Internet? What is the Web?Connectivity is the capability of you microcomputer to share the information with other computers.Wireless revolution dramatically affect connectivity.A computer network is a communications system connecting two or more computers.Internet is the largest network in the world.The Web provides a multimedia interface to the numerous resources available on the Internet.CHAPTER21.Discuss the uses of the Internet. Which activities have you participated in?Which one do you think is the most popular?The most common uses of the Internet are the following: communicating, shopping, searching, entertainment, education, and so on. I have participated in almost all of them. I think communicating is the most popular.2.Explain the differences between the two most common types of providers.The two most common types of providers are National and wireless.National service providers provide access through standard telephone connections.Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.3.What are the basic elements of an message?A typical message has three basic elements: header, message and signature.4.What is social networking ? Describe the three types if social networkingsites.Social networking is the grouping of individuals into specific groups. Thereare three basic categories of social networking sites: reuniting, friend-of-a-friend and common interestReuniting sites are designed to connect people who have known one another but have lost touch.Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.Common interest sites bring together individuals that share common interests or hobbies.5.Describe the different types of search engines. Given an example of the typeof search each engine is best for.There are three types of search engines: crawler-based search engines, metasearch engines and specialized search enginesCrawler-based search engines, such as Google, create their listings automatically.Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates, orders the hits, and then provides the edited list to you .one of the best known is Dogpile.Specialized search engines focus on subject-specific Web sites. such as Environment.CHAPTER31.Explain the difference between general-purpose and special-purposeapplications.General-purpose application are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems and presentation graphics.Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.2.Discuss the common features of most software programs. Describe the newinterface to what-if analysis?Most applications use a GUI, use windows to display information, and have menus to present commands.3.What is the difference between a function and a formula? How is a formularelated to what-if analysis?A formula is an instruction to calculate or process. Functions are prewrittenformulas. A formula related to what-if analysis is called recalculation.4.What are presentation graphics programs? How are they used?Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentation. People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional.5.What is the difference between an integrated package and a software suite?What are the advantages and disadvantages od each?An integrated package is a single program that provides the functionality ofa word processor, spreadsheet, database manager, and more. The primarydisadvantage of an integrated package is that the capabilities of each function are not as extensive as in the individual programs. The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundledtogether and sold as a group. It is significantly less expensive to buy a suite of applications than to buy each application separatelyCHAPTER41.Describe graphics , including desktop publishers, image editors, illustrationprograms, image galleries, and graphics suites.Graphics are widely used to analyze data and to create professional-looking presentations; Desktop publishers focus on page design and layout and provide greater flexibility; Image editors are programs for creating and editing bitmap images; Illustration programs are used to create and to edit vector images; Image galleries are libraries of electronic images. These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;Graphics suites are some companies combining their separate graphics programs in groups.2.Discuss audio and video editing software.Audio editing software allows you to create and edit audio clips, most software allow you to add audio effects to your tracks. Video editingsoftware allows you to reorganize, add effects, and more to your digital video footage.3.What is multimedia? How are multimedia presentations developed?Multimedia is the integration of all sorts of media into one presentation.The creation of interactive multimedia presentations follows several steps: Plan, Design, Create and Support.4.Describe Web authoring , including Web site design and Web authoring programs.Creating a site is called Web authoring. A web site design is an interactive multimedia form of communication, designing a web site begins with determining the site’s overall content, the overall site design is commonly represented in a graphical map. More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.5.Discuss three areas of artificial intelligence.The three areas of artificial intelligence are virtual reality, knowledge-based systems and robotics. Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer. Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users. Robotics is the field of study concerned with developing and using robots.CHAPTER51.Describe system software. What are the four types of system programs?System software works with end users, application software, and computer hardware to handle the majority of technical details. It consists of four types of programs: operating systems, utilities, device drivers and language translators.2.What are the basic functions of every operating system? What are the threebasic operating system categories?The basic functions of every operating system are : managing computer resources, providing a user interface, and running applications. The three basic operating system categories are: embedded, network and stand-alone.3.Explain the differences and similarities between Windows, Mac OS, and Linux.Windows is by far the most popular microcomputer operating system today. It comes in a variety of different versions and is designed to run with Intel and Intel-compatible microprocessors. Mac OS is not nearly as widely used as the Windows operating system. It is a powerful, easy-to-use operating system that is popular with professional graphic designs, desktop publishers, and many home users. While Windows, the Mac OS are proprietary operating systems, Linux is not. It is open source software free and available from many sources, including the Web.4.Discuss utilities. What are the five most essential utilities? What is autilities suite?Utilities are specialized programs designed to make computing easier. The five most essential utilities are: troubleshooting or diagnostic programs, antivirus programs, uninstall programs, backup programs and file compression programs. Utility suites combine several programs into one package.5.Explain the role of device drivers. Discuss the Add Printer Wizard andWindows Update.A device driver works with the operating system to allow communication betweenthe device and the rest of the computer system. Each time the computer system is started, the operating system loads all of the device drivers into memory.Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used.Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver. Windows uses Windows Update to make reinstalling or updating device drivers easily.CHAPTER61.Describe the four basic types of system units.There are four basic types of system units: Desktop system units, Notebook system units, Tablet PC system units, and Handheld computer system units.Desktop system units typically contain the system’s electronic components and selected secondary storage devices.Notebook system units are portable and much smaller. They contain the electronic components, selected secondary storage devices, and input device.Tablet PC system units are highly portable devices that support the use of a stylus or pen to input commands and data.Handheld computer system units are the smallest and are designed to fit into the palm of one hand.2.Describe the two basic components of the CPU.The two basic components are: the control unit and the arithmetic-logic unit.Control unit tells the rest of the computer system how to carry out a program’s instructions.Arithmetic-logic unit performs two types of operations---arithmetic and logical.3.What are the differences and similarities between the three types of memory?There are three types of memory chips: RAM, ROM, and CMOS.RAM chips hold the program and data that the CPU is presently processing, everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.CMOS chip provides flexibility and expandability for a computer system. It contains essential information that is required every time the computer system is turned on. It is powered by a battery and does not lose its contents when the power is turned. Its contents can be changed to reflect changes in the computer system.4.Identify five expansion cards and describe the function of each.Five expansion cards are: graphics cards, sound cards, modem cards, NIC and TV tuner cards.Graphics cards connect the system board to the computer’s monitor, they convert the internal electronic signals to video signals so they can be displayed on the monitor.Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer. They also convert internal electronic signals to audio signals.Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.NIC are used to connect a computer to one or more other computers.TV tuner cards can changes the TV signal into one that can be displayed on you monitor.5.Identify and describe four standard ports and two specialized ports.Four standard ports are: serial ports, parallel ports, universal serial bus ports and FireWire ports.Serial ports are often used to connect a mouse, keyboard, modem, and many other devices to the system unit.Parallel ports are used to connect external devices that need to send or receive a lot of data over a short distance.USB ports are gradually replacing serial and parallel ports.FireWire ports provide connections to specialized FireWire devices.CHAPTER71.Define input and output devices.Input is any data or instructions that are used by a computer. Input devices are hardware used to translate what people understand into a form that computers can process.2.Describe the three categories of output devices.①There are a widely of different pointing devices including the mouse,joystick, touch screen, light pen, and stylus.A mouse controls a pointer that is displayed on the monitor.A joystick is the most popular input device for computer games. You controlgame actions by varying the pressure, speed, and direction of the joystick.A touch screen is a particular kind of monitor with a clear plastic outerlayer.A light pen is a light-sensitive pen-like device.A stylus acts with the computer through handwriting recognition software.②There are three types of scanning devices: optical scanners, card readers,bar code readers, and character and mark recognition devices.An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.Card readers interpret encoded information.Bar code readers are either handheld wand readers or platform scanners.Character and mark recognition devices are scanners that are able to recognize special characters and marks.③Image capturing devices include digital cameras and digital video cameras.Digital cameras capture still images. Digital video cameras capture motion.④Audio input can take many forms including the human voice and music.Voice recognition systems accept voice commands to control computer operations and to create document.MIDI is a standard for connecting musical instruments to the system unit.3.Describe the three categories if output devices.The most widely used output devices are monitors, printers and audio output.Monitors present visual images of text and graphics.Printers translate information that has been processed by the system unit and present the information on paper.Audio output devices translate audio information from the computer into sounds that people can understand.4. Define output an output devices.Output is processed data or information. Output devices are hardware used to translate information that has been processed by the system unit into a form that humans can understands.5. What are combination input and output devices? Describe four such devices.Devices combine features of input devices such as scanners with features of output devices like printers are called combination input and output devices.Combination devices include fax machines, multifunction devices, Internet telephones, and terminals.A fax machine is a standard tool in nearly every office.Multifunction devices combine the capabilities of a scanner, printer, fax, and copying machine.Internet telephones are specialized input and output devices for receiving and sending voice communication.Terminals are input and output device that connect you to a mainframe or other type of computer.CHAPTER81.Discuss the traditional and high-capacity floppy disksThe traditional floppy disk is the 1.44MB 3-inch disk. They have a thin exterior jacket made of hard plastic to protect the flexible disk inside.The high capacity floppy disks are 3 inches in diameter. They are able to store more information, are thicker, and require special disk drives.2.What are the three types of hard disks? Describe three ways to improve harddisk performance.There are three types of hard disks: Internal hard disk, hard-disk cartridge, and hard-disk pack.Three ways to improve the performance of hard disks are disk caching, redundant arrays of inexpensive disks, and file compression/decompression.Disk caching improves hard-disk performance by anticipating data needs.Redundant arrays of inexpensive disks improve performance by expending external storage, improving access speed, and providing reliable storage.File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.3.What are the two most common optical disc formats? What is hi def ? Describethe basic types for each format.The two most common optical disc formats are CD and DVD. Hi def is the next generation of optical discs.①There are four basic types of CDs: read only, write once, rewritable, andPicture and Photo CDs.Read only CDs cannot be written on or erased by the users, they are used to distribute large databases, references, and large software application packages.Write once CDs can be written to once, they are used to archive data and to record music download from the Internet.Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.②There are three types of DVDs: read only, write once, and rewriteable.Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.Rewriteable DVDs are competing rewriteable formats.4.Discuss solid-state storage, Internet hard drives, and magnetic tape. Whatare the advantages and disadvantages of each?Solid-state storage does not have moving parts. Internet drives use the Internet to store data and information. Magnetic tape provides sequential access for backup.Solid-state storage is more expensive than the others, it is more reliable and requires less power.Internet drives are low cost and the flexibility to access information from any location using the Internet. Access speed is slower.Magnetic tapes provide slower sequential access. It is an effective and commonly used tool for backing up data.5. Discuss mass storage, enterprise storage system, and mass storage devices.Mass storage refers to the storage of large amounts of data in a persisting and machine-readable fashion. Enterprise storage systems are the computer storage systems designed for large-scale, high-technology environments of the modern enterprises.Mass storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tape drives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory.CHAPTER91.Define and discuss connectivity, the wireless revolution, and communications.①Connectivity is a concept related to using computer networks to link peopleand resources.②The single most dramatic change in connectivity and communications in thepast five years has been the widespread use of mobile or wireless telephones.This wireless technology allows individuals to stay connected with one another from almost anywhere at any time, the revolution is just beginning.③Communication systems transmit data from one location to another. Everycommunication system has four basic elements: sending and receiving devices, communication channel, connection devices, and data transmission specifications.2.Identify and describe the various physical and wireless communications.①Physical connections use a solid medium to connect sending and receivingdevices.These connections include telephone lines, coaxial cable, and fiber-optic cables.Telephone lines consist of twisted pair cable, they have been the standard transmission medium for years for both voice and data.Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core.Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.②Wireless connections use the air to connect sending and receiving devices.Primary technologies used for wireless connections are infrared, broadcast radio, microwave, and satellite.Infrared uses infrared light waves to communicate over short distances.Broadcast radio communication uses special sending and receiving towers called transceivers.Microwave communication uses high-frequency radio waves.Satellite communication uses satellites orbiting about 22000 miles above the earth as microwave relay stations.3.Identify the standard Internet protocol and discuss its essential features.The standard protocol for the Internet is TCP/IP. The essential features of this protocol involve: identifying sending and receiving devices and reformatting information for transmission across the Internet.Identification: Every computer on the Internet has a unique number address called an IP address, the Internet uses IP addresses to deliver and to locate Web sites.Reformatting: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the massage is sent, it is reformatted or broken down into small parts called packets, at the receiving end, the packets are reassembled into the correct order.4.Define and discuss the four principal network topologies.The four principal network topologies are star, bus, ring, and hierarchical.In a star network, a number of small computers or peripheral devices are linked to a central unit, all communications pass through this central unit.In a bus network, each device in the network handles its own communication control.In a ring network, each device is connected to two other devices, forming a ring.The hierarchical network consists of several computers linked to a central host computer, other computers are also hosts to other, smaller computers or to peripheral devices.5.Define and discuss the three most common network strategies.The most common network strategies are terminal, client/server, and peer-to-peer systems.①In a terminal network system, processing power is centralized in one largecomputer. For the end user it is lack of control and flexibility.②Client/server network system use one computer to coordinate and supplyservices to other nodes on the network. One advantage of the client/sever network strategy is the ability to handle very large networks efficiently.Another advantage is the ability of powerful network management software to monitor and control network activities. The major disadvantages are the cost of installation and maintenance.③In a peer-to-peer network system, nodes have equal authority and can actas both clients and servers. The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.CHAPTER101.Discuss the impact of large database , private networks, the Internet, andthe Web on privacy.Large databases raise some serious concerns on privacy: identity theft and mistaken identity.The impact of private networks on privacy has the two parts: The first instance, of firms eavesdropping on employees, has inspired attempts at federal legislation. The second instance, in which online information services screen and reject messages, is a common activity with most commercial services.The internet brings illusion of anonymity, the web creates a history file, your web activity is monitored is by cookies. To respond to these privacy concerns, a code of fair information practice has been established.2.Discuss the carious kinds of computer criminals.Computer criminals are of five types:Employees: The largest category of computer criminals consists of those with the easiest access to computers-namely, employees.Outside users: Some suppliers or clients may have access to a company’s computer system.Hackers and crackers: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes.Organized crime: Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do, but for illegal purpose.Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.3. What are the principal measures used to protect computer security? What isencryption? How is it used by corporations and individuals?Some of the principal measures to protect computer security are encryption, restricting access, anticipating disasters, and backing up data.Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals are alsousing encryption programs to safeguard their private communications.4.What is ergonomics? How does computer use impact mental health? Physicalhealth?Ergonomics is defined as the study of human factors related to things people use.The physical health matters related to computers that have received the most attention recently are the following: eyestrain and headache, back and neck pain, and repetitive strain injury. Computer technology creates some irritants that may be counter productive: noise, and electronic monitoring.5.Describe the basic elements of the Green PC and what you can do to protectthe environment.The basic elements of the Green PC are: System unit, display, and manufacturing.As a computer user, you can do to help protect the environment are the following:conserve, recycle, and educate.。

相关文档
最新文档