计算机专业英语 选择

合集下载

计算机的专业英语选择

计算机的专业英语选择

标准实用Multiple 11. The keyboard, mouse, monitor, and system unit are:2. Programs that coordinate computer resources, provide an interface, and run applications are known as:3. A browser is an example of a:4. Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.5. The smallest type of microcomputer:netbook handheld midrange tablet PC6. RAM is a type of:computer memory network secondary storage7. Unlike memory, this type of storage holds data and programs even aftermainframe midrangenetbookcentermedia specialized programutility programbasic application system application operating systemsutility programsapplication programs storage systems hardware software devices devicesstorage outputelectrical power to the computer system has been turned off.8. The type of file created by word processors to save, for example, memos, term papers, and letters.9. The change in connectivity that uses the Internet and the Web to shift many computer activities from a user ’s computer to computers on the Internet.definitioncomputingnetworkcloud high USB presentationworksheetdocumentdatabase secondary primary RAMROM标准实用10. The largest network in the world is [the]:Multiple 21. The network that connects computers all over the world.2. The rules for exchanging data between computers.3. Client-based e-mail accounts require this special program to be installed on your computer.4. Communities of individuals who share a common interest typically create Facebook:5. E-mail that does not require an e-mail program installed on a user's computer is known as:6. A very well-known microblog.Webmailu t il it y podcastblog profiles clients groups pageshyperlinku t il it y client e-mail JavaprotocolsWWW Web DSL Internet CERN Web LAN Facbeook InternetUSBWeb7. These programs continually look for new information and update search services ’ database programs.8. A type of search engine that submits requests to other search engines, organizes their responses, eliminates duplicate responses, orders hits, and then provides an edited list.ISPspecialized search enginedirectory search metasearch enginespidersf ilt e r s wikis IMWikipedia LinkedIn TwitterMySpace标准实用9. This is the Internet ’s equivalent to traditional cash.10. Using file transfer utility software, you can copy files to your computer from specially configured servers on the Internet. This is called:Multiple 31. This type of software works with end users, application software, and computer hardware to handle the majority of technical details.2. A rectangular area that can contain a document, program, or message.3. Programs that create text-based documents.DBMS suites spreadsheets word processors4. Programs that organize, analyze, and graph numeric data such as budgets and financial reports.DBMS suites spreadsheets word processors5. In a spreadsheet, the intersection of a row and column creates a:window dialog frame form box application general u t il it y purposesystem downloading filteringuploading bloggingdigital cash e-commerce icash Internetdollars6. A collection of related data that is the electronic equivalent of a file cabinet.7. A database tool that will quickly rearrange a ’s records according to tablespreadsheetprocessor f i l t e rword sortdatabasedocumenttable cell functionformulalabel cell a selected field.标准实用8. Programs that combine a variety of visual objects to create attractive, visually interesting presentations.9. The primary disadvantage of this type of package is that the capabilities of each function are not as extensive as in individual programs.10. A type of suite stored at a server on the Internet and available anywhere through Internet access.Multiple 41. These specialized graphics programs combine text and graphics to create publications of professional quality.2. Also known as drawing programs.3. Graphics programs used to create and edit vector images.desktop publishing programs imagegalleries image editorsillustration programsdesktop publishing programs image galleries image editorsillustration programsdesktop publishing programs image galleries image editorsillustration programsintegratedu t ility officecloud integrated softwareu t il it y officepresentation spreadsheetprocessor graphicsword DBMS ACTION4. An essential multimedia feature that allows user participation.5. Special programs used to create multimedia presentations.6. A widely used interactive animation application from Adobe.WYSIWYG FlashFuzzydesktop publishing programs image editors Flash editorsmultimedia authoring programsinteractivityimmersionraster Flash标准实用7. Programs for Web site design and HTML coding are called Web page editors or8. This area of artificial intelligence is also known as expert systems.9. A type of artificial intelligence that uses a database to provide assistance to users.10. Another name for the database used in expert systems that contains specific facts and rules.Multiple 51. What type of software works with users, application software, and computer hardware to handle the majority of technical details?2. The programs that convert programming instructions written by programmers into a language that computers understand and process are language:translators converters linguistsmanagersdapplication desktopsystem Linuxaccess table expert table knowledge base rulebase acoustics expert systems robotics virtualreality acoustics knowledge-based systems robotics virtualreality programseditorseditors HTML apps Web VR3. The ability to switch between different applications stored in memory is called:4. Graphic representations for a program, type of file, or function:softwarediversion programming multitaskinginterferenceoperational imageiconapp标准实用5. This operating system feature is controlled by a mouse and changes shape depending on its current function.6. The operating system based on Linux, designed for Netbook computers, and focused on Internet connectivity through cloud computing:7. The mobile operating system developed by Apple and originally called iPhone OS:Android BlackBerry OS IOS Mac OS8. A utility program that makes copies of files to be used in case the originals are lost or damaged:Backup and Restore Disk Cleanup Disk Defragmenter Compactor9. A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space, and improves system performance:Backup and Restore Disk Cleanup Disk Defragmenter Compactor10. Windows makes it easy to update drivers with Windows:Backup Restore Driver UpdateMultiple 61. This container houses most of the electrical components for a computer system.Windows ChromeUnix Mac pointer dialog mouse menu box2. Similar to notebooks, this system unit specializes in on-the-go Web browsing and e-mail access.chassis desktop media center netbook3. Computers can only recognize this type of electronic signal.analog bus digital maximum4. The main or motherboard is also known as the: carrier packagesystem system tuner board unit TV标准实用5. How many bytes can a 32-bit-word computer access at one time?6. In a microcomputer system, the central processing unit is contained on a single:RAM7. This type of memory divides large programs into parts and stores the parts on a secondary storage device.8. Also known as NIC, this adapter card is used to connect a computer to a:9. This provides a pathway to connect parts of the CPU to each other.bus Plug and Play wired wireless10. Older ports that have largely been replaced by faster, more flexible ports are called:buses expandable legacy renderedMultiple 7expansion graphics network AIArandom-access expanded virtual direct16 4 8 1processor computermobile system system board board module chip bus1. Most keyboards use an arrangement of keys known as:2. The device that controls a pointer displayed on the monitor.3. Also known as a roller ball, this device controls the pointer by rotating a ball with your thumb. trackball cordless joystick stylus mouse printer scanner mouse cordOptiKey QWERTY AlphaDaisy标准实用4. The type of screen that can be touched with more than one finger and supports zooming in and out by pinching and stretching your fingers.5. Flatbed and document are types of:6. Device used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips.7. The most widely used audio- input device.8. The monitor feature that specifies how often a displayed image is updated.9. Handheld, book-sized devices that display text and graphics.10. This technology allows television stations to broadcast their programming directly to smartphones, computers, and digital media players.Mobile HDTV DTV CRTLED whiteboards readerse-book lasers HDTV aspect ratio dot pitch refresh rateresolution ratemicrophone mouseTFT VR MICRFDIC UPC OMR monitors scanners headsetsHDTVs multitouch digitaldynamic OLEDMultiple 81. RAM is sometimes referred to as:2. The actual physical material that holds the data and programs. primary storage media disk access3. Measures how tightly these charges can be packed next to one another on the disk. ratio active memory secondary storage primary storageread only memory标准实用4. When a read/write head makes contact with the hard disk ’s surface, it causes a head:5. This hard-disk performance enhancement anticipates data needs.6. This type of storage uses pits and lands to represent 1s and 0s.7. DVD stands for:8. USB drives are also known as:9. An organizational strategy to promote efficient and safe use of data across the networks.10. A mass storage device that provides access to data archived on tapes.library system systemtape RAID f i l e NAS cloud dynamic data mission statemententerprise storage system RAIDuniversal optical drivesdrives flash ports state bus digital versatile disc dynamic versatile discdigital video data dynamic video disc optical cloudsolid state disk hard file decompression compression cachingdisk RAID f i l e scratch crashland pit cylinders densitysectors tracksMultiple 91. The concept related to using computer networks to link people and resources.2. A high-frequency transmission cable that delivers television signals as well as connects computers in a network.coaxial hi def 3-D twisted pair connectivityTCP/IP Wi-Fi GPS标准实用3. A short- range radio communication standard that transmits data over short distances of up to approximately 30 feet.4. The speed with which a modem transmits data is called its:5. The bandwidth typically used for DSL, cable, and satellite connections to the Internet.6. Every computer on the Internet has a unique numeric address called a(n):7. Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.8. A device that allows one LAN to be linked to other LANs or to larger networks.9. Typically using Wi-Fi technology, these wireless access points are typically available from public places such as coffee shops, libraries, bookstores, colleges, and universities.extranets hotspotsLANs PANs gateway network switch PAN IDSPCMCIAserver VPN NIC broadcast addresspacket DNS IP broadband voiceband basebandmedium band digital velocity dynamic rate modular rating transfer r a t eBluetoothbroadband TCP/IP DSL10. Star, tree, and mesh are three types of network:Multiple 101. The three primary privacy issues are accuracy, property, and:ownership s ecurity access e th ic s topologies s t r a te g ie s protocols devices标准实用2. To easily get names, addresses, and other details about a person using only his or her telephone number, government authorities and others use a(n):3. Browsers store the locations of sites visited in a:4. The browser mode that eliminates history files and blocks most cookies.5. The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:6. Computer criminals who specialize in stealing, trading, and using stolen credit cards over the Internet are known as:7. Programs that come into a computer system disguised as something else are called:8. The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:cyber-bullyingsocial media discrimination online harassmentunethical communicationviruseszombies Trojan horses bugsWeb scammersidentity carders thieves t r a d e r scyber card approval f ir e wa llidentityonline access phish privacydetect insertsleep f ir e wa ll h istor y menuto o l bard irectorykeystroke reverse cookie adware loggerworm9. Special hardware and software used to control access to a corporation ’ s private network is known as a(n):10. To prevent copyright violations, corporations often use:WPA DRMVPNACTcommunication gatespyware removal programantivirus program f ir e wa l l标准实用Multiple 111.Which of the basic organizational functions records all financial activity from billing customers to paying employees?accounting marketing production research2.What managerial level has information flow that is vertical,horizontal,and external?top supervisory middle foreman3.Which computer-based information system uses data from TPS and analytical tools to support middle managers?ESS MIS DSS TPS4.Accounts payable refers to money the company owes its suppliers for materials and services it has:created exported inventoried received5.What accounting activity keeps track of all summaries of all transactions?balance sheet general ledgerincome statement inventory control6.What accounting statement lists the overall financial condition of an organization?balance sheet general ledgerincome statement inventory control7.What type of report is produced at regular intervals?demand exception inventory periodic8. A DSS consists of four parts:user,system software,decision models,and:application software data operating systemspreadsheets9.What type of worker is involved with the distribution,communication,and creation of information?标准实用10. What type of program is designed to schedule, plan, and control project resources?Multiple 121. Facts or observations about people, places, things, and events are:data occurrences records tables2. The most basic logical data element such as a single letter, number, or special character is known as a:character element phrase record3. Each record in a database has at least one distinctive field, called the:key field structure type view4. One element of database security is to provide only authorized users with:5. The bridge between the logical and physical views of the data is provided by:passwordsr e la tio ns c lasses nodesschedulers managersa uditing pro jec t dtpinformationexecutive knowledge foreman6. Highly trained computer specialists who interact with the data administration subsystem are known as:7. In a network database, each child node may have more than one parent node; this is known as a:8. Connections between parent nodes and child nodes are provided by:many-to-many relationshiprelational relationshiphierarchy parentrelationshipDBMS data modelers database administrators relational s p e c i a l i s t s recordst a b le s DBMS SQL标准实用9. Two of the most significant advantages of multidimensional databases over relational databases are processing speed and:10. Object-oriented databases organize data by classes, attributes, methods, and:objects relations space timeMultiple 131. An information system is a collection of hardware, software, people, procedures, and:data DBMS specialists system analysts2. What is the first phase in the systems life cycle?3. Which phase in the systems life cycle involves installing the new system and training people?systems analysis systems implementationpreliminaryinvestigationsystems designneeds analysis systems analysis c onceptualization o b je c t if ic a tio n controlformatcharacters pointers objectsDBApreliminaryinvestigationsystem design4. This phase in the systems life cycle is concerned about determining system requirements not in design.systems analysis systems implementation5. Which systems analysis tool shows the relationship between input and output documents?6. These tools relieve the systems analysts of many repetitive tasks, develop clear documentation, and, for larger projects, coordinate team member activities.c hecklis td ecision t a b lechart grid data flowpreliminaryinvestigationsystem design标准实用7. Which systems life cycle phase is concerned with economic, technical, and operationalfeasibility?8. What type of feasibility evaluates whether the people within the organization will embrace or resist a new system?behavioral economic operational techinical9. Which approach to conversion begins by trying out a new system in only one part of an organization?direct pilot parallel phased10. An alternative to the systems life cycle approach using powerful development software, small specialized teams, and highly trained personnel.Multiple 141. A program is a list of instructions for the computer to follow to process:2. The major processing steps identified in a top-down program design are called:software hardware d i r e c t logicdata prototypingCASERAD AAD preliminaryinvestigationsystems design systems analysis systems implementationautomated systems life cycle data flow analyzers CASEflow chartsassembly instructions modules logic3.The programming logic structure in which one program statement follows another.4.One of the best ways to code effective programs is to use the three basic logic structures to create:content-markup programs pseudocodemodular languages structured programsc oncatenation r e p e titio n selec tio nloop标准实用5. Which step in the six-step programming procedure involves desk checking and searching for syntax and logic errors?6. Which step in the six-step programming procedure is the final step?7. Unlike traditional systems development, this software development approach focuses less on the procedures and more on defining the relationships between previously defined procedures.8. Natural languages are considered to be a:9. A compiler converts the programmer ’s procedural language program, called the source code, into a machine language code, called the:10. The 4GL languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a database.query application generator C11 COBOLMultiple 15interpreter codestructured codeobject code top-down code low- level language procedural language high- level languagemid- level languageobject-oriented context-markup module 2GLprogram documentation program maintenance program designprogram testprogram documentation program test program designprogram maintenance1. People who react to technology by thinking computers are magic boxes capable of solving all kinds of problems that computers really can ’t handle are:cynics frustrated na ï ve proactive2. The type of person that looks at technology in a positive realistic way is: frustrated proactive cynical na ï ve标准实用3. Books, journals, and trade associations are the best sources to help you:4. If your career is in marketing, it makes sense to develop a specialty in:database desktop publishingprogramming systems analysis and design5. What computer professional repairs and installs computer components and systems?computer technician data entry workerdesktop publisher software engineer6. What computer professional designs, tests, and researches encryption procedures?cryptographer network administratorprogrammer software engineer7. What computer professional uses database management software to determine the most efficient ways to organize and access data?cryptographer database administratorprogrammer software engineer8. What computer professional oversees the work of programmers, computer specialists, systems analysts, and other computer professionals?information systems manager network managersoftware engineer technical writerdevelop specialties maintain your computer competencydevelop personal contactslook for innovative opportunities9. What computer professional creates, tests, and troubleshoots computer programs?10. What computer professional plans and designs information systems?programmer systems analyst network managersoftware engineer programmer technical writernetwork managersoftware engineer。

为什么选计算机专业英语作文

为什么选计算机专业英语作文

为什么选计算机专业英语作文英文回答:Computer science is a rapidly growing field that offers a wide range of exciting career opportunities. Astechnology continues to advance, the demand for skilled computer science professionals is expected to grow exponentially.There are many reasons why someone might choose tomajor in computer science. Some people are drawn to thefield because of its intellectual challenges. Computer science requires students to develop strong problem-solving, analytical, and logical thinking skills. Others areattracted to the field because of its creative potential. Computer science students have the opportunity to designand develop new software applications, websites, and other digital products.In addition to the intellectual and creative challenges,computer science also offers a number of practical benefits. Computer science graduates are in high demand in a varietyof industries, including technology, finance, healthcare, and manufacturing. Computer science professionals also earn some of the highest salaries in the workforce.Of course, there are also some challenges associatedwith majoring in computer science. The coursework can be demanding, and students need to be prepared to work hard to succeed. Additionally, the field is constantly changing, so computer science professionals need to be committed to lifelong learning.Overall, majoring in computer science can be arewarding experience for those who are passionate about technology and problem-solving. Computer science graduates have a wide range of career opportunities, and they canearn some of the highest salaries in the workforce.中文回答:选择计算机科学专业的理由有很多。

计算机专业英语多选题

计算机专业英语多选题

1.A user interface we said here is __ABC________A.a text-based user interface or GUIB.an interface between a computer and its peripheral deviceC.an interaction between an operating system and a userD.an interaction between an application program and a user2.___A___provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.A.The Transport LayerB. Session LayerC. Network LayerE.Application Layer E. Presentation Layer3.Many viruses do harmful things such as (ABCD ).A.deleting filesB. slowing your PC downB.simulating typos D. changing random data on your disk4.We can classify programming languages under two types:(AB ) languages and ( )languages.A.high-levelB. low-levelC. advanced-levelD. basic-level5.With an Internet connection you can get some of the basic services available are:___ABCD_______A.E-mailB. TelnetC. FTPD. Usenet news6. A general purpose computer has four main sections: ( ABCE).A.the control unitB. the memoryC. the input and output devicesD. the cpuE. the arithmetic and logic unit (ALU),7.Windows 2000 has the key technologies, they are (ABCD ).A.securityB. active directoryC. flat directoryD. enterprise management8.The register file is___ACD_______A.addressed by much shorter addressesB. physically largeC.physically smallD. one the same chip as the CPU9. A stack protocol can be used for (A ).A.removing the latest element ins( )ertedB. removing the earliest element ins( )ertedC. subroutine callsD. operation of arithmetic expressions10.The end equipment in a communication system includes (ABCD ).A.printersB. computersC. CRTsD. keyboards11.Microsoft Office Professional 2000 include____ABCD______.A.Excel 2000B. PowerPoint 2000C. Word 2000D. Outlook 200012. A general purpose computer has four main sections: ______ABCE______A.the input and output devicesB. the memoryC. the arithmetic and logic unit (ALU),D. the cpuE. the control unit13.The two most common types of scanners are (BC ) and ( )A. hand-held scannersB. flatbed scannersC. auto scannersD. handler scanners14.Some viruses use (CD ) and ( ) techniques to hide their existence.A.quickly spreadB. replace a part of system softwareC. stealthD. polymorphic15.The Windows 2000 product line includes____ABCD______.A.Windows 2000 Datacenter ServerB. Windows 2000 ProfessionalC. Windows 2000 ServerD. Windows 2000 Advanced Server16.Similar to viruses, you can also find malicious code in (ABC ).A.Trojan HorsesB. logic bombsC. wormsD. Microsoft Word Documents17.Viruses all have two phases to their execution, the ( ) and the ( BD).A.create phaseB. attack phaseC. del( )ete phaseD. infection phase18.Active Directory can help you (ACD ).A.get off the limits of down level networksB. deliver complete enterprise security by itselfC. build a complex international networkD. manage every resource with a single logon19.High-level languages are commonly classified as (ACDE ).A.object-orientedB. automaticC. functionalD. logic languagesE. procedure-oriented20.(CD )is a type of executable file .A.TXT fileB. JPG fileC. EXE fileD. COM file21.( ABCD) maybe a certain cause that some viruses infect upon.A.an external event on your PCB. a dayC. a counter within the virusD. a time22.(BC )is a type of executable file .A.TXT fileB. EXE fileC. COM fileD. JPG file23.The web browsers which is normal used, such as(ABCE ).A.FirefoxB. Internet ExplorerC. OpraD. ICQE. Apple Safari24.Newer ideas in computing such as(ABDE ) have radically altered the traditional concepts that once determined program form and functionA.artificial intelligenceB. distributed computingC. software engineeringD. parallel computingE. data mining25.Microsoft Windows currently supports __AC___and _____file systemsA.NTFSB. OCFSC. FATD. ext2E. NILFS26.Modem is ____ACD______.A.a modulator/demodulatorB. a data setC. a demodulatorD. a modulator27.The equipment _AB_____.A.transfers the number of bits in serial formB.manipulates digital information internally in word unitsC.transfers the number of bits in parallelD. manipulates digital information internally in serial form28.Electronic commerce that is conducted between businesses is referred to as business-to-business or DA. C2CB. C2BC. e-commerceD. B2B29.The World Wide Web also subsumes previous Internet information systems such as (AC ).A.GopherB. FtpC. FTPD. Telnet relies on the services of .NET data providers.There are ABCDA.ConnectionB. Data AdapterC. DataReaderD. Command31.The development process in the software life cycle involves four phases: analysis, design, implementation, and ___ACDE_____.A.analysisB. auditC. implementationD. designE. testing32.The end equipment in a communication system includes __ABCD____.A.printersB. CRTsC. computersD. keyboards33.In electronic commerce ,information search and discovery services include (ABCDE ).A.search enginesB. information filtersC. software agentsD. directoriesE. electronic catalogs34.GIS work with two fundamentally different types of geographic models.They are the (BD ).A.geography modelB. vector modelC. mathematic modelD. raster modelE. data model35.The two most common types of scanners are ____AC___and _____A.flatbed scannersB. hand-held scannersC. auto scannersD. handler scanners36.Windows 2000 has the key technologies, they are ( ABCD).A.active directoryB. flat directoryC. enterprise managementD. securityputer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes: ABCA.Firmware which is software programmed resident to electrically programmable memorydevices on board mainboards or other types of integrated hardware carriers.B.Application software such as word processors which perform productive tasks for users.C.Middleware which controls and co-ordinates distributed systems.38.Software engineering is related to the disciplines of ___ADE_____A.project managementB. natural languageC. netural networkD. systems engineeringE. computer science39.What make it is difficult to agree on how to count viruses? ABCDA.some viruses can create different versions when they infect other programsB.just a trivial change may create a new virusC.some viruses can use polymorphic techniqueD.new virus arise from an existing virus40. A virus is a program that reproduces its own code by (ABC ).A.ins_erting into the middle of a fileB. simply placing a pointerC. adding to the end of a fileD. replacing another program41.Input devices include: ____ABCD______.A.the keyboardB. microphoneC. touch screenD. the mouse42.Viruses all have two phases to their execution, the ( ) and the ( AD).A.attack phaseB. create phaseC. del_ete phaseD. infection phase43.The equipment (BC ).A.manipulates digital information internally in serial formB.manipulates digital information internally in word unitsC.transfers the number of bits in serial formD.transfers the number of bits in parallel44.Office automation is___CD_______.A.. the computerB. communications technologyC. the application of computerD. used to improve the productivity of people45.The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are: ABCDEA.System.Data.SqlClient. Contains the SQL Server .NET Data Provider types.B.System.Data.Odbc. Contains the ODBC .NET Data Provider types.C.System.Data. Contains provider-independent types such as the DataSet and DataTable.D.System.Data.OracleClient. Contains the Oracle .NET Data ProviderE.System.Data.OleDb. Contains the OLE DB .NET Data Provider types.46.C++ is __ACD________.A.extended from CB. a superset of CC. object-orientedD. procedure-oriented47.Some viruses, with no attack phase, often damage the programs or disks they infect because they (AD ).A.have bugs in themB. show messages on your screenC. steal storageD. contain poor quality code48.Windows 2000 is ( A).A.an inventive technologyB. used for building a scalable networkB.the same as Windows NT D. new lease of Windows49.Some common applications related to electronic commerce are the following:A.TeleconferencingB. Online bankingC. EmailD. Instant messagingE. Enterprise content managementF. NewsgroupsG. Shopping cart software50. A program is a sequence of ( ) that can be executed by a computer.It can either be built into the hardware or exist independently in the form of (BC ).A.hardwareB. softwareC. instructionsD. data51.Electronic payments include ___ABCD______.A.credit card paymentsB. electronic checksC. digital currenciesD. cash payment52.The web browsers which is normal used, such as____ABCD_____.A.OpraB. Internet ExplorerC. FirefoxD. Apple SafariE. ICQputer programs fall into two major classes: __AC____and ____.A.application programsB. application suiteC. operating systemsD. database application54.Database connection ( B) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.A.pondB. poolingC. linkD. connection55.The development process in the software life cycle involves four phases: analysis, design, implementation, and (ABCE ).A.implementationB. designC. analysisD. auditE. testing56.Hypermedia include ( ABCDEF)A.video clipsB. imagesC. textD. flashE. vidoeF. sounds57.An asleep state is_____ABD_____ed to lessen wear-and tear on the computerB. used for saving energyC. indicated by the indicator light putting outD. a low power standby mode58.Electronic payments include (ABCD ).A.digital currenciesB. electronic checksC. credit card paymentsD. cash payment59.You want to (BCD ) maybe wake up a virus that has residented in memory.A.del( )ete a fileB. access a disketteC. execute a programD. copy a file60.Before you turn the power on with a new computer, you should make sure_____ABCD_____A.the computer system has been set upB. the computer is already out of the boxB.appropriate software have been installed D. appropriate cables are correctly connected61.Security is usually enforced through ___ABE________.A.access controlB. encryptionC. data retrievingD. data storingE. auditingputer programming is the process of ABCD__the source code of computer programs.A. testingB. maintainingC. debuggingD. writing63.Queues that occur everyday life can be seen ( ABCD).A.as automobiles waiting for a traffic lightB. as people waiting for service at a bankC. in certain societies lacking equalityD. in an emergency room of a hospital64.Static graphics include____AB______.A.animatorsB. photographsC. moviesD. pictures66.which is the threat to computer security in the following choices ? ABCDA. Computer CriminalsB. Human ErrorsC. Computer CrimeD. earthquake65.The attributes of the stack are______A____.A.queueB. FIFOC. built into their circuitryD. LIFO66.If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission. BDA.play musicB. stealing storageC. del( )ete filesD. pilfer CPU cycles67.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are _______ABDE___________. A.minicomputers B. mainframes C. note book D. workstation E. microcomputers F. lenovo68.The Application layer in TCP/IP Model is correspond to (ABD ) in OSI ModelA.Presentation LayerB. Session LayerC. Transport LayerD. Application LayerE. Network Layer69. A computer system user generally more cares for___ABD_______A.speed of computationB. storage sizeC. physical size of the computerD. efficiency of the computer71.Cache is____ABC______A. slowB. high costC. fastD. relatively small72.We can say a bus is simply_____ABC_____ .A. a wireB. a 16-bit busC. a group of wiresD. a 8-bit bus73.Viruses can delay their attack for (ABCD ).A.yearsB. monthsC. weeksD. days74.In order to increase our computer’s performance we need to____BCD______A.buy a L1 cacheB. have a much larger main memoryC. have a L2 cacheD. buy a L2 cache75.The software that controls the interaction between the input and output hardware is called BIOS,which stands of __A________A.Basic Input Output SystemB. Classic Input Output SystemB.Advanced Input Output System D. Junior Input Output System76.To enhance performance of a computer system we should____ACD______A.improve the pattern of referencing operandB. optimize the simple movement of dataC. optimize the basic sequence control mechanismD. use IF and LOOP instructions as many as possible77.Their company used international lawyers to prosecute a crime ring involving software ____A____in Thailand.A.piracyB. copyingC. duplicationD. cloning78.The software that controls the interaction between the input and output hardware is called BIOS,which stands of (B)A.Advanced Input Output SystemB. Basic Input Output SystemC. Classic Input Output SystemD. Junior Input Output System79.Some viruses use ( AC) and ( ) techniques to hide their existence.A.stealthB. quickly spreadC. polymorphicD. replace a part of system software80.Middleware lies in______ACD____A.the middle of interactions between different application programsB.the top of the layering vertical stackC.the top of an operating systemD.the middle of the layering vertical stack81.Software includes ( ACDE) etcA.video gamesB. all kinds of filesC. programsD. websitesE. mobile application82.The major functional components of an office automation system include: ___ABCD__A.electronic mailB. personal assistance featuresC. information storage and retrievalD. text processing83.The Internet carries various information resources and services, such as (ACDEF ) and the inter-linked hypertext documentsA.online chatB. talkingC. electronic mailD. file transferE. online gamingF. file sharing84. A processor is composed of:____ABCD______.A.an arithmeticB. a control unitC. RegistersD. logic unit85.Functions of the compiler used in RISC are ___ABC_______A.to optimize register usageB.to maximize register usageC.to allocate registers to those variables that will be used the most in a given time periodD.to compile a high level language program86. A digital computer is generally made up of five dstinct elements: a central processing unit,(ABCD).A.a busB. input devicesC. memeory storage devicesD. output devicesE. crt screen87.There are AB (CD)_between the DTEs.A.digital-to-analog converterB. the modemC. communications equipmentD. will be replaced by an upd_ated standard88.What make it is difficult to agree on how to count viruses? ABCDA.just a trivial change may create a new virusB.some viruses can use polymorphic techniqueC.some viruses can create different versions when they infect other programsD.new virus arise from an existing virus89.which aspect have to be considered in the design of a piece of software. ABCDEFGA.Fault-toleranceB. ExtensibilityC. ModularityD. CompatibilityE.MarketabilityF. PackagingG. Maintainability90.Active Directory can help you (ACD ).A.build a complex international networkB. deliver complete enterprise security by itselfC.manage every resource with a single logonD. get off the limits of down level networks91.Early computer solved_____CD_____ problems.A.controlB. engineeringC. mathematicalD. business applications92.The tools which Programming software usually provides include: ABCDEA.debuggersB. text editorsC. linkersD. compilersE. interpreters93.DTE is ( AB).A.data terminal equipmentB.the last piece of equipment that belonged to the subscriber in a data link systemC.satelliteD. Digital T-carrier94.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are ( BDEF).A.note bookB. microcomputersC. lenovoD. minicomputersE. workstationF. mainframes95.which is the type of electronic commerce in the following choice ACA.B2BB. C2CC. B2C96.The operations of a structured data type might act on (ABCD ).A.a stackB. the values of the data typeC. component elements of the data structureD. a queue97.Types of media include__ACD________.A.textB. animationC. audioD. full-motion video98. A virus is a program that reproduces its own code by (ABC ).A.simply placing a pointerB. adding to the end of a fileC. ins( )erting into the middle of a fileD. replacing another program99.According to the text,the author mentions three of the most commonly used types of printer.They are (BDE ).A.belt printerB. dot-matrix printers;C. array printerD. laser printerE. inkjet printers100.The end equipment in a communication system includes ___ABD_______A.keyboardsB. DCEC. CRTsD. computers101.Software includes _____ACDE________etcA.programsB. all kinds of filesC. video gamesD. websitesE. mobile application102.With .NET, Microsoft is opening up a channel both to ( ) in other programming languages and to ( BC). (developers; components)A.coderB. developersC. componentsD. architecturemon contemporary operating systems include (ABCD ).A.LinuxB. Microsoft WindowsC. SolarisD. Mac OS104.A mechanism for translating Internet hostnames into IP addresses is___BCD_______A.equipped into the general-purpose operating systemB.typically inside of operating system kernelC.as a middleware by author’s definitionD.typically outside of operating system kernel105.RISC is____ABC______ed for many computer manufacturers nowadaysB.guided to be built from studying the execution behavior of high-level language programsC.abbreviation of reduced instruction set computerD.abbreviation of complex instruction set computer106.With .NET, Microsoft is opening up a channel both to _BC_______in other programming languages and to ________. (developers; components)A.coderB. componentsC. developersD. architecture107.The tools which Programming software usually provides include: ABCDEpilersB. interpretersC. text editorsD. linkersE. debuggers108.The following products of software are belong to middleware____BCD______A.OracleB. IBM’s Web Sphere MQC. Java 2 PlatformD. J2EE109.The system manager used by a fast processor can____BCD______A.connect a networkB. monitor processor’s core temperatureC. monitor processor’s supply voltagesD. reset a system110.Queues that occur everyday life can be seen (ABCD ).A.as automobiles waiting for a traffic lightB. as people waiting for service at a bankC. in an emergency room of a hospitalD. in certain societies lacking equality111.C++ include the following pillars: ____ABCD______.A.data hidingB. polymorphismC. encapsulationD. inheritance112.Windows 2000 is____ACD______A.new lease of WindowsB. an inventive technologyC. the same as Windows NTD. used for building a scalable network113.We use paged virtual memory to___ABCD_______A.extend the size of memoryB. reduce latency of the diskC. store large program and data setD. increase bandwidth of the disk114.According to the physical size of computers we can classify the __ABCD____ computers into A. supercomputer B. minicomputer C. microcomputer D. mainframe115.Some common applications related to electronic commerce are the following: ABCDEFGA.EmailB. TeleconferencingC. Instant messagingD. Shopping cart softwareE.NewsgroupsF. Enterprise content managementG. Online banking116.One machine cycle in RISC has _B_________A.two machine instructionsB. one machine instructionC. four machine instructionsD. three machine instructions117.The function of computer hardware is typically divided into three main categories.They are____ADE_____.A.inputB. motherboardC. cpuD. storageE. output118.Active Directory supports ( ABCD).A.granular access controlB. inheritanceC. encapsulationD. delegation of administrative task119.The core of SQL is formed by a command language that allows the (ACDE ) and performing management and administrative functions.A.deletion of dataB. process of dataC. updating of dataD. retrieval of dataE. ins( )ertion of data120.Some commentators say the outcome of the information revolution is likely to be as profound as the shift in (ABCD )A.industrialB. agriculturalC. Service IndustryD. handicraft industry。

计算机的专业英语选择

计算机的专业英语选择

计算机的专业英语选择随着计算机技术的迅猛发展,计算机科学专业越来越受欢迎。

对于计算机科学专业的学生来说,掌握专业英语是必不可少的。

以下是计算机科学专业英语学习的一些建议和技巧。

1. 学习基础词汇:首先,学生应该掌握计算机科学中的基础词汇。

例如,操作系统(Operating System)、数据库(Database)、算法(Algorithm)等。

这些词汇是计算机科学的基础,理解这些词汇将有助于更好地理解计算机科学的概念和原理。

2.阅读专业材料:学生应该主动阅读计算机科学领域的专业材料,如学术论文、书籍等。

阅读这些材料可以帮助学生熟悉常见的专业术语和技术概念,并提高阅读和理解技巧。

3.参加学术会议和研讨会:学生可以参加计算机科学领域的学术会议和研讨会,与专业人士交流和讨论不仅可以提高英语口语能力,还可以了解最新的研究动态和发展趋势。

4.参加英语课程和辅导班:学生可以参加针对计算机科学专业英语的专门课程和辅导班。

这些课程和班级将帮助学生提高专业英语的听说读写能力,并为他们在学习和工作中的交流提供支持。

5.利用在线资源:学生可以利用各种在线资源来学习和提高计算机科学专业英语。

例如,MOOC(大规模开放在线课程)平台提供了许多计算机科学相关课程,学生可以通过这些课程学习和练习英语。

6.听写和口语练习:学生可以通过听写来提高专业英语的听写能力,如听写学术论文或专业报道。

此外,进行口语练习也是非常重要的,可以通过参加讨论班、辩论或与其他学生进行语言交流来提高口语表达能力。

7.编写技术文档:学生可以尝试编写技术文档,如报告、实验室报告或项目文档。

通过编写技术文档,学生不仅可以提高英语写作能力,还可以加深对计算机科学专业知识的理解和掌握。

8.与外教或母语为英语的学生交流:与外国教师或母语为英语的学生交流将帮助学生提高英语水平,并更好地理解和运用专业英语。

总之,计算机科学专业英语的选择对学生在学习和工作中的交流非常重要。

你在大学里选择计算机专业英语作文

你在大学里选择计算机专业英语作文

你在大学里选择计算机专业英语作文In the crucial juncture of my academic journey, I found myself standing at a crossroads, pondering over the various paths that lay ahead. Amidst the array of disciplines offered by the university, I chose to embark on the journey of Computer Science. This decision was not one that was taken lightly, but rather a culmination of my interests, passions, and aspirations.My interest in technology and its ever-evolving nature has always been a driving force in my life. The idea of being able to create something from nothing, to bring ideas and innovations to life through code, fascinated me. The allure of Computer Science lay in its potential to unlock new frontiers, to be a part of something that was constantly evolving and pushing the boundaries of human knowledge and understanding.Moreover, the practical applications of Computer Science in today's world are immense. It is not just about coding and programming, but also about solving real-world problems, improving lives, and driving innovation. The role of Computer Scientists in fields like healthcare, finance,education, and more, is becoming increasingly significant.I saw the potential to make a difference, to be a part of something that was making the world a better place.However, the decision to pursue Computer Science wasnot just based on its practical applications and potential for innovation. It was also about挑战自我,pushing my boundaries, and growing as an individual. I knew that this path would be challenging, but I was ready to embrace the opportunities and learn from the challenges that awaited me. My journey in Computer Science has been an exciting and rewarding one. The combination of theory and practice, the constant learning and exploration, have all contributed to my growth as a student and as a professional. The skillsand knowledge that I have gained through this journey have not only been academically rewarding but have also been instrumental in my personal and professional life.In conclusion, my choice to pursue Computer Science in university was not just a decision based on interests and passions, but also a commitment to personal growth and development. The opportunities and challenges that thisfield presents have been eye-opening and transformative,and I am excited about what the future holds for me as a Computer Scientist.**在大学里选择计算机专业**在我学术旅程的关键时刻,我站在了十字路口,思考着前方的各种道路。

我的计算机专业选择英语作文

我的计算机专业选择英语作文

我的计算机专业选择英语作文The Journey of Choosing Computer Science as My Major.The path to choosing computer science as my major has been a fascinating and rewarding one, filled with both challenges and moments of profound realization. It is a journey that began with a spark of curiosity and has since evolved into a passionate pursuit of knowledge and skills in this rapidly evolving field.My initial interest in computers stemmed from a childhood fascination with technology. I was always fascinated by the way computers could process vast amounts of information and execute complex tasks with seemingly magical precision. As I grew older, I started to delve deeper into the workings of computers, exploring the fundamentals of programming and understanding the intricate interplay between hardware and software.During my high school years, I had the opportunity totake several computer science courses that further piqued my interest. These courses introduced me to the foundational concepts of programming, algorithms, and data structures. I was particularly drawn to the logical and analytical nature of computer science, which required precise thinking and a deep understanding of problem-solving techniques.One of the defining moments in my journey.。

计算机专业英语考试试题及答案

计算机专业英语考试试题及答案

计算机专业英语考试试题及答案一、选择题1. Which of the following is NOT a programming language?A. JavaB. PythonC. HTMLD. CSS2. What does the acronym "SQL" stand for?A. Structured Query LanguageB. Simple Query LanguageC. Script Query LanguageD. Secure Query Language3. Which protocol is commonly used for sending and receiving emails?A. FTPB. HTTPC. SMTPD. TCP4. What does the term "CPU" refer to?A. Central Processing UnitB. Computer Processing UnitC. Central Program UnitD. Computer Program Unit5. Which of the following is NOT a type of network topology?A. StarB. RingC. MeshD. Scroll二、填空题1. HTML stands for Hypertext Markup Language, which is used for ____________.2. The process of converting source code into machine code is called ____________.3. IP address stands for ____________.4. The act of copying files from a remote server to a local computer is known as ____________.5. The programming language developed by Apple Inc. for iOS and macOS is ____________.三、简答题1. What is the difference between a compiler and an interpreter? Provide examples of programming languages that use each of these methods.2. Explain the concept of object-oriented programming (OOP) and provide an example of a programming language that utilizes this paradigm.3. Describe the client-server model and provide an example of a commonly used protocol within this model.四、论述题Discuss the impact of artificial intelligence (AI) on various industries. Provide examples of how AI is being used in fields such as healthcare, finance, and transportation. Analyze the potential benefits and challenges of implementing AI in these industries.答案:一、选择题1. C. HTML2. A. Structured Query Language3. C. SMTP4. A. Central Processing Unit5. D. Scroll二、填空题1. creating and structuring the content of a webpage2. compilation3. Internet Protocol4. downloading5. Swift三、简答题1. A compiler translates the entire source code into machine code before the program is executed. Examples of languages that use compilers are C, C++, and Java. On the other hand, an interpreter translates and executes the source code line by line. Python and Ruby are examples of languages that use interpreters.2. Object-oriented programming (OOP) is a programming paradigm that organizes data and functions into reusable objects. It focuses on the concept of classes and objects, allowing for code reuse and encapsulation. An example of a programming language that uses OOP is Java, where objects are instances of classes and can interact with each other through methods and attributes.3. The client-server model is a distributed computing architecture wherea server provides services or resources to multiple clients. The clients request and receive these resources through the network. An example of a commonly used protocol within this model is the Hypertext Transfer Protocol (HTTP), which is used for communication between web browsers (clients) and web servers.四、论述题Artificial intelligence (AI) has had a significant impact on various industries. In healthcare, AI is being used for diagnoses and treatments, analyzing medical images, and personalized medicine. For example, AI-powered algorithms can help detect diseases like cancer at an early stage, leading to better treatment outcomes. In finance, AI is utilized for fraud detection, algorithmic trading, and customer service. AI algorithms can analyze large amounts of financial data to identify patterns and make accurate predictions. In transportation, AI is being employed for autonomous vehicles, traffic management, and logistics optimization. Self-driving cars, for instance, use AI algorithms to navigate and make decisions on the road.The implementation of AI in these industries brings about many benefits, such as increased efficiency, improved accuracy, and cost savings. AI systems can process and analyze vast amounts of data much faster than humans, leading to faster and more accurate results. However, there are also challenges to consider. Privacy and security concerns arise as AI systems handle sensitive information. There is also the worry of job displacement, as AI automation may replace certain human tasks. Additionally, ethical considerations need to be addressed, such as bias in algorithms and the potential for AI to be used for malicious purposes.Overall, the impact of AI on various industries is undeniable. It has the potential to revolutionize healthcare, finance, transportation, and many other sectors. However, careful implementation and regulation are necessary to ensure its responsible and beneficial use.。

计算机专业英语

计算机专业英语
A、data storing
B、auditing C、encryption D、access control E、data retrieving 3、 relies on the services of .NET data providers.There are A、Connection B、Command C、DataReader D、Data Adapter 4、The core of SQL is formed by a command language that allows the ________ and pe rforming management and administrative functions. A、retrieval of data B、ins_ertion of data C、updating of data D、deletion of data E、process of data 5、The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are: A、System.Data.SqlClient. Contains the SQL Server .NET Data Provider types. B、System.Data.OracleClient. Contains the Oracle .NET Data Provider C、System.Data.OleDb. Contains the OLE DB .NET Data Provider types. D、System.Data.Odbc. Contains the ODBC .NET Data Provider types. E、System.Data. Contains provider-independent types such as the DataS et and DataTable. 第三题、判断题(每题 1 分,5 道题共 5 分)

计算机专业英语 考试

计算机专业英语 考试

一、选择题1.What is the process of converting a high-level programming language into machine languagecalled?A.Debuggingpilation(正确答案)C.ExecutionD.Interpretation2.Which of the following is a programming paradigm that organizes software design around data,and the operations performed on that data?A.Object-oriented programming(正确答案)B.Procedural programmingC.Functional programmingD.Event-driven programming3.In computer networks, what does the term "protocol" refer to?A. A set of rules governing the exchange of information between devices(正确答案)B.The physical connection between devicesC.The speed of data transmissionD.The type of data being transmitted4.What is the term used to describe the process of dividing a complex problem into smaller, moremanageable parts?A.Modularization(正确答案)B.OptimizationC.EncapsulationD.Polymorphism5.In computer security, what is the term for unauthorized access to or modification of data?A.EncryptionB.DecryptionC.Hacking(正确答案)D.Firewall6.Which of the following is a type of software that allows two or more computers tocommunicate and share resources?A.Operating systemB.Database management systemwork operating system(正确答案)D.Word processing software7.What is the term used to describe the process of identifying and correcting errors in computerprograms?A.Debugging(正确答案)B.TestingC.Codingpilation8.In computer graphics, what is the term for the number of distinct pixels that can be displayedon a screen?A.Resolution(正确答案)B.Color depthC.Refresh rateD.Aspect ratio。

你在大学里选择计算机专业英语作文

你在大学里选择计算机专业英语作文

你在大学里选择计算机专业英语作文Choosing Computer Science as My Major in UniversityIn today's fast-paced, technology-driven world, the field of computer science has become more important than ever before. As a result, many students, including myself, are choosing to major in computer science in university. This decision was not made lightly, but after careful consideration of my interests, goals, and the future job market.One of the main reasons I chose to major in computer science is my passion for technology and problem-solving. Ever since I was young, I have always been fascinated by computers and how they work. I enjoy the challenge of figuring out complex algorithms and writing code to solve real-world problems. The idea of creating software or applications that can make people's lives easier or more efficient is truly exciting to me.Furthermore, the demand for computer science professionals is constantly growing. With the rise of artificial intelligence, big data, and cybersecurity, there are endless opportunities for those with a background in computer science. Companies are constantly seeking skilled software engineers, data analysts, and IT specialists to help them stay ahead of thecompetition and adapt to the ever-changing technological landscape. By majoring in computer science, I am confident that I will have ample job prospects and opportunities for career growth in the future.In addition, studying computer science in university will provide me with a strong foundation of knowledge and skills that are relevant in today's digital age. From learning programming languages such as Java, Python, and C++, to gaining expertise in data structures, algorithms, and software development, I will acquire the necessary tools to succeed in the field of computer science. Furthermore, I will have the opportunity to work on hands-on projects, collaborate with peers, and learn from experienced professors who are experts in the field.Overall, choosing to major in computer science in university is an exciting and rewarding decision for me. I am confident that it will open up new opportunities, challenge me to grow and learn, and ultimately, allow me to pursue a fulfilling and successful career in the field of technology. I am excited to embark on this journey and see where it takes me in the future.。

计算机专业英语单选题

计算机专业英语单选题

1. A __D_copy is a copy of a current file made in order to protect against loss or damage.备份拷贝是为了防止丢失或损坏而制作的当前文件的副本。

A.softB.fileC.hardD.backup2.The most commonly used tool in the design phase is the ____D____.在设计阶段最常用的工具是结构图A.topology chartB.flowchartsC.object-relationship chartD.structure chart3.____A____refers to the parts of the computer that you can see and touch.硬件指的是你能看到和触摸到的电脑的各个部分A.HardwareB.InstructionC.HardshipD.Software4.if we want to retrieve data from the database with SQL,we should use the comand of D如果我们想用SQL从数据库中检索数据,我们应该使用comandA.ins_ertB.upd_ateC.del_eteD.sel_ect5.Which of the following is not the stages of programming?A下面哪个不是编程的阶段A.Print the program.B.Debug the program.pile the program.D.Write a program.6.Multimedia will become increasingly __B__ throughout every aspect of our lives.多媒体将在我们生活的各个方面变得越来越普遍A.preciseB.pervasiveC.permitD.passmunication through the Internet, the_C___ performs the reverse function.通过Internet进行通信,数据通信设备(DCE)执行反向功能。

计算机相关专业英语

计算机相关专业英语

计算机相关专业英语本文将介绍一些计算机相关专业英语,以帮助读者了解计算机领域的常用术语和技术。

一、计算机基础技术1. Computer Science:计算机科学2. Programming Languages:编程语言3. Operating Systems:操作系统4. Database Systems:数据库系统5. Computer Networks:计算机网络6. Algorithms:算法7. Data Structures:数据结构8. Artificial Intelligence:人工智能9. Machine Learning:机器学习二、编程语言1. Java2. C/C++3. Python4. JavaScript5. Ruby6. Perl三、前端开发技术1. HTML2. CSS3. JavaScript4. jQuery5. Bootstrap四、后端开发技术1. PHP2. 3. Node.js4. Ruby on Rails五、数据库管理1. MySQL2. Oracle3. SQL Server4. PostgreSQL六、计算机网络1. TCP/IP2. DNS3. HTTP4. FTP5. SMTP七、信息安全1. Encryption:加密2. Decryption:解密3. Firewall:防火墙4. Malware:恶意软件5. Antivirus:杀毒软件6. Vulnerability:漏洞以上是一些计算机相关专业英语,希望能对读者有所帮助。

计算机专业英语试题及答案

计算机专业英语试题及答案

计算机专业英语试题及答案1. 选择题1. Which of the following is not a programming language?a) Javab) HTMLc) Pythond) CSS答案: b) HTML2. Which protocol is used for sending and receiving email?a) HTTPSb) FTPc) SMTPd) DNS答案: c) SMTP3. What does the acronym CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Power Unit答案: a) Central Processing Unit4. Which programming language is commonly used for web development?a) C++b) Javac) JavaScriptd) Swift答案: c) JavaScript5. What does HTML stand for?a) Hyperlinks and Text Markup Languageb) Hyper Text Markup Languagec) Home Tool Markup Languaged) Hyper Text Modeling Language答案: b) Hyper Text Markup Language2. 填空题1. The process of converting high-level programming code into machine code is called ___________.答案: compilation2. HTTP stands for ___________ Transfer Protocol.答案: Hyper Text3. The process of testing software by executing it is called ___________.答案: debugging4. Java is an object-_____________ programming language.答案: oriented5. DNS stands for Domain Name ___________.答案: System3. 简答题1. What is the difference between TCP and UDP?答案: TCP (Transmission Control Protocol) is a connection-oriented protocol, which means it establishes a connection between the sender and receiver before transferring data. It ensures that all packets are received in the correct order and provides error checking. UDP (User Datagram Protocol), on the other hand, is a connectionless protocol that does not establish a direct connection before transmitting data. It does not guarantee packet delivery or order but is faster and more efficient for time-sensitive applications.2. What is the purpose of an operating system?答案: An operating system (OS) is a software that manages computer hardware and software resources and provides common services forcomputer programs. Its primary purpose is to enable the user to interact with the computer and provide a platform for running applications. It manages memory, file systems, input/output devices, and multitasking. The OS also handles system security and resource allocation to ensure optimal performance.4. 解答题请参考下文并给出自己的解答。

大学生《计算机专业英语》考试题目

大学生《计算机专业英语》考试题目

《计算机专业英语》一、Choice (选择)(15 题,每题1 分,共15 分)Choose the best answer for each blank.(从每题四个选项中,选出最合适的一项)1) As an operating system repeatedly allocates and frees storage space, many physically separated unused areas appear. This phenomenon is called ______.A. fragmentationB. compactionC. swappingD. paging2) We can use the word processor to _________ your documents.A. editB. computeC. translateD. unload3) _____________ infected computer may lose its data.A. FileB. Data baseC. VirusD. Program4) One use of networks is to let several computers share ____ such as file system, printers, and tape drives.A. CPUB. memoryC. resourcesD. data5) A firewall is a ____ system designed to ___ an organization’s network against threats.A. operating, preventB. programming, developC. security, protectD. service, exploit6) The ____ has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.A. applicationB. information systemC. networkD. operating system7) ____ is the address of a variable or a variable in which the address of anothervariable is stored.A. DirectorB. PointerC. ArrayD. Record8) C++ is used with proper ____ design techniques.A. object-orientedB. object-basedC. face to objectD. face to target9) A data ( ) is a file that contains metadata-that is, data about data.A. structureB. tableC. baseD. dictionary10) A network software consists of ( ), or rules by which processes can communicate.A. protocolsB. programsC. devicesD. computers11) The firewall device is a ( ) system for connecting a computer network toother computer network.A. hardwareB. softwareC. securityD. I/O12) We can use the word processor to _________ your documents.A. editB. computeC. translateD. unload13) _________ processing offers many ways to edit text and establish document formats. You can easily insert, delete, change, move and copy words or blocks of text.A. DataB. DatabaseC. WordD. File14) A ________ copies a photograph, drawing or page of text into the computer. A.scanner B.printer C.display D.Keyboard15) _________ is the sending and receiving of the message by computer. It is a fast, low-cost way of communicating worldwide.A.LAN B.Post office C.E-Mail D.Interface二、Cloze (完形填空)(4 篇篇20 题,每题1.5 分,共30 分)Choose the best answer for each blank.(从每题选项中,选出最合适的一项)Passage 1Have you ever wondered how information processed by the system unit is1) into a form that you can use? That is the role of output devices. While inputdevices convert what we understand into what the system unit can process, output devicesconvert what the system unit has processed into a form that we can understand. Output devices 2) machine language into letters, numbers, sounds, and images that peoplecan understand.Competent end users need to know about the most commonly used input devices, including keyboards, mice, 3) , digital cameras, digitizing tablets, voice recognition,and MIDI devices. Additionally, they need to know about the most commonly used output devices. And end users need to be aware of 4) input and output devices such as fax machines, multifunctional devices, 5) telephones, and terminals.1) A. converted B. convinced2) A. transact B. translate3) A. scanners B. scan4) A. combination B. communication5) A. Intranet B. InternetPassage 2ABC is an interactive programming language and environment for personal computing, originally 6) ____ as a good replacement for BASIC. It was designed by 7)____ a task analysis of the programming task.ABC is easy to learn (an hour or so for someone who has already programmed), and yet easy to use. Originally intended as a language for 8) ______, it has evolved into a powerful tool for beginners and experts alike.Some features of the language:op-down programmingSome features of the environment:logging outediting, or entering input to a program6) A. intending B. intended7) A. first does B. first doing8) A. beginners B. beginning9) A. easily be combined B. easy be combined10) A. is shown to B. is showing toPassage 3Bulletin Board Systems (BBS)Bulletin Board Systems are a 11)______ telecommunications services provided bythe internet, public information services, and 12)_______ of business firms, organization, and end user groups. An electronic bulletin board system allows you to post public or private messages that other end 13)______ can read by accessing the BBS with their computers. Establishing a small BBS for a business is not that difficult. Minimum requirements are a microcomputer with a hard disk drive, custom or packaged BBS 14)_______, modem and a telephone line. Bulletin Board System serves as a central location to post and pick up messages or upload and download data files or programs 24 hours a day. A BBS helps end users ask questions, get advice, locate and share information, and get 15)_______ touch with other end users.11) A. popular B. unpopular12) A. thousand B. thousands13) A. use B. users14) A. software B. hardware15) A. on B. inPassage 4A: displaying B: messages C: received D: network E: usersElectronic MailMillions of end 16)________ now depend on electronic mail (e-mail) to send andreceive electronic 17)________. You can send e-mail to anyone on your 18)________ for storage in his/her electronic mail boxes or magnetic disk drives. Whenever they are ready, they can read their electronic mail by 19)________ it on the video screens at their workstations. So, with only a few minutes of effort (and a microseconds of transmission),a message to one or many individuals can be composed, sent, and 20)_______.三、Term Translation (术语翻译)(10 题,每题1.5 分,共15 分)Write out their English abbreviations of the following terms and then translate them into Chinese.(写出下列专业术语的英文简称,并将其翻译成汉语)1) Personal Digital Assistant2) Wireless-Fidelity3)Digital Video Disc4)Joint Photographic Experts Group5)Graphical User Interface6)Professional Hypertext Preprocessor7)Simulation Language8)Object-oriented Programming9)Uninterruptable Power Supply10)Universal Serial Bus四、Short Answer (简答)(2 题,每题4 分,共8 分)Answer the following questions in English.(用英文回答下列问题)1)Please write down the components of hardware.2) Please write down the classification(分类)of operating system according to the application area(应用领域).五、Sentence Translation (句子翻译)(8 题,每题4 分,共32 分)Translate the following English sentences into Chinese.(将下列英文句子翻译成汉语)1) This input is digitized and converted to standard text that can be further processed by programs such as a word processor.2)The most common input devices are the keyboard and the mouse.3) The network operating system is designed to control the computers that are linked together via a network.4) The BIOS (Basic Input Output System)is responsible for waking up the computer when you turn it off.5)A primary purpose of programming languages is to enable programmers to express their intent for a computation more easily than they could with a lower-level language or machine code.6)During the last few decades, a large number of computer languages have been introduced.7) The entire office automation system comprises five sub-systems.8) Image Processing System allows end users to electronically capture, store, process, and retrieve images of documents.。

为什么选计算机专业英语作文

为什么选计算机专业英语作文

为什么选计算机专业英语作文英文回答:I chose to major in Computer Science and Engineering because of my passion for technology and problem-solving. Computer Science is a rapidly growing field that offers a wide range of career opportunities. By studying Computer Science, I can develop my skills in programming, software development, and data analysis, which are in high demand in today's job market.In addition, Computer Science is a field that is constantly evolving, with new technologies and innovations being introduced all the time. This means that there is always something new to learn and explore, which keeps the field exciting and challenging. For example, I am currently working on a project that involves developing a mobile app for a local business. This project has allowed me to apply my programming skills in a real-world setting and has given me valuable experience in software development.Furthermore, studying Computer Science has also helped me improve my problem-solving skills. In this field, I often encounter complex problems that require creative thinking and logical reasoning to solve. By working through these challenges, I have learned how to approach problems systematically and come up with effective solutions. This skill is not only valuable in the field of Computer Science but also in many other aspects of life.Overall, choosing to major in Computer Science and Engineering has been a rewarding experience for me. It has allowed me to pursue my passion for technology, develop valuable skills, and prepare myself for a successful career in the tech industry.中文回答:我选择主修计算机科学与工程是因为我对技术和解决问题的热情。

计算机专业英语(第1次考试)

计算机专业英语(第1次考试)
14、I didnˊt hear the phone last night, I ( ) asleep.(1分)
A、A. must be
B、B. must have been
C、C. should be
D、D. should have been
15、The data, when they are not encrypted, are called ( ).(1分)
考试课程:9025.计算机专业英语(第1次考试)考试时间:120分钟考场:123.15.57.119考试日期:2014-10-16
考号:13001184007姓名:曾渭权
剩余时间:
18:42
保存交卷帮助
窗体顶端
本卷共有3大题。
窗体底端
一、单项选择题(15道小题,共15分)
1、( )is a word processing tool that helps you to create quality documents.(1分)
A、CLR
B、CORB~A
C、OMG
D、IIS
4、( ) refers to the parts of the computer that you can see and touch.(1分)
A、Software
B、Hardware
C、Hardship
D、Instruction
5、how to translate the word "中央处理器"(1分)
A、plaintext
B、ciphertext
C、hypertext
D、context
二、多项选择题(15道小题,共45分)
1、There are AB( ) between the DTEs.(3分)

计算机专业英语

计算机专业英语

计算机专业英语(总分:45.00,做题时间:90分钟)一、{{B}}单项选择题{{/B}}(总题数:41,分数:45.00)1.The Web Browser is a simple program that enables a computer to ______ and view pages on the Web.(分数:1.00)A.downfallB.downgradeC.downwardD.download √解析:题目的大意是说:网页浏览器是一种能够使计算机下载并显示网页的简单程序。

选项中提供的几个单词的拼写比较接近,只有download(下载)比较符合题意。

downfall是坠落的意思,downgrade是下坡、降级的意思,downward是向下的意思。

2.E-mail is a fast, cheap and convenient way to ______ messages locally and internationally. (分数:1.00)A.give and getB.put and getC.send and receive √D.get in and get out解析:题目的大意是说:电子邮件是一种收发本地和全球信息的快速、廉价、方便的方式。

收发电子邮件使用send and receive(发生和接收),其他三种写法不适合用在收发电子邮件中。

3.Header and footer are strings of text that are placed at the ______ of each page of a document. (分数:1.00)A.left or rightB.up or downC.above or belowD.top or bottom √解析:题目的大意是:页眉和页脚是放在文档每一页顶部和底部的字符串。

在计算机屏幕或纸张等介质上,上下和左右分别使用top or bottom和left or right。

计算机专业英语

计算机专业英语

1、 is the ________ model for .NET-based applications. (data access)A、data miningB、data achieveC、data processD、data access2、____________, such as those supplied for OLE DB and ODBC, allow you to use data libraries designed for earlier data access technologies.A、Bridge providersB、Native providersC、D、3、__________, such as the SQL Server and Oracle providers, typically offer perf ormance improvements due, in part, to the fact that there is one less layer of abstraction.A、Native providersB、Bridge providersC、D、4、if we want to retrieve data from the database with SQL,we should use the comand ofA、sel_ectB、upd_ateC、del_eteD、ins_ert5、In SQL,______causes an object (a table, for example) to be created within the da tabase.A、ALTERB、dropC、createD、TRUNCATE第二题、多项选择题(每题2分,5道题共10分)1、Database connection ________ allows an application to reuse an existing connect ion from a pool instead of repeatedly establishing a new connection with the database.A、poolingB、pondC、connectionD、link2、Security is usually enforced through __________________.A、data storingB、auditingC、encryptionD、access controlE、data retrieving3、 relies on the services of .NET data providers.There areA、ConnectionB、CommandC、DataReaderD、Data Adapter4、The core of SQL is formed by a command language that allows the ________ and pe rforming management and administrative functions.A、retrieval of dataB、ins_ertion of dataC、updating of dataD、deletion of dataE、process of data5、The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are:A、System.Data.SqlClient. Contains the SQL Server .NET Data Providertypes.B、System.Data.OracleClient. Contains the Oracle .NET Data ProviderC、System.Data.OleDb. Contains the OLE DB .NET Data Provider types.D、System.Data.Odbc. Contains the ODBC .NET Data Provider types.E、System.Data. Contains provider-independent types such as the DataSet and DataTable.正确错误A computer database relies upon DBMS to organize the storage of data.正确错误All of these databases can not take advantage of indexing to increase their speed.正确错误Database security denotes the system, processes, and procedures that protect a database正确错误Enforcing security is one of the major tasks of the DBA.正确A BC DA(n) ________ is a connecting device that only regenerates the signal.A BC DWhereas a repeater operates only in the physical layer of the OSI model, a bridge operaA BC DA(n) ________ is usually a computer installed with the necessary software and aA BC DThe distinction between the two terms gateway andy are now used interchangeably.A、hubB、routerC、swtichD、gateway第二题、多项选择题(每题2分,5道题共10分)1、The equipment ______.A、manipulates digital information internally in serial formB、manipulates digital information internally in word unitsC、transfers the number of bits in parallelD、transfers the number of bits in serial form2、DTE is ______.A、Digital T-carrierB、data terminal equipmentC、satelliteD、the last piece of equipment that belonged to the subscriber in a data link system3、There are AB_ between the DTEs.A、the modemB、communications equipmentC、digital-to-analog converterD、will be replaced by an upd_ated standard4、__________ provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.A、The Transport LayerB、Session LayerC、Presentation Layer正确错误TCP means it is on the network layer and IP means it is on the transport layer separate正确错误The four topologies in common use are star, router, ring and hub.正确错误Three techniques have been adopted for use of the medium access control in the LANs.正确错误Control token is the only way of controlling access to a shared transmission medium.正确错误A BC DTo access a page on the WWW, one needs a ________A、routerB、codeC、passwordD、browser3、_____ is an architectural framework.A、httpB、wwwC、ftpD、dns4、_____ is built around hypertext and hypermedia.A、DNSB、HTTPC、The WebD、FTP5、__________is a network protocol used to transfer data from one computer to an other through a network such as the Internet.A、SMTPB、HttpC、DNSD、FTP第二题、多项选择题(每题2分,5道题共10分)1、Hypermedia include ( )A、soundsB、video clipsC、textD、flashE、vidoeF、images2、The World Wide Web also subsumes previous Internet information systems such as ( ).A、GopherB、TelnetC、FTPD、Ftp3、The Internet carries various information resources and services, such as ______________________________ and the inter-linked hypertext documentsA、electronic mailB、online chatC、file transferD、file sharingE、online gamingF、talking4、The World Wide Web is a huge set of ________, linked by hyperlinks and URLs.A、interlinked documentsB、imagesC、flashD、all kinds of dataE、pages5、The web browsers which is normal used, such as________________.A、Internet ExplorerB、FirefoxC、Apple SafariD、OpraE、ICQ第三题、判断题(每题1分,5道题共5分)1、Because the Internet is made up of many diverse computers, so together they work like o ne world-wide computer system.正确错误The World Wide Web ties the information together into a big collection of interactive m正确错误The surfing is you can sel ect paths to browse online resource.正确错误If a person read a hypermedia document about mobile phones, then he might sel正确错误Previously the Web provides a wealth of additional capabilities.正确错误A BC D According to Intel,there are _____________A、OneB、TwoC、ThreeD、Four3、A companyˊs ability to deploy and support customer-oriented ___________ sys tems will be of vital importance to its prosperity.A、e-LearningB、e-BankingC、e-BusinessD、e-Shopping4、When most people think of opening a Web business,the first thing that springs to mind i s selling products or ____________online.A、qualityB、servicesC、consciousnessD、5、A Web site is often more effective as a(n) _______ tool than a selling tool.A、PoliticB、TechnicalC、MarketingD、Electronical第二题、多项选择题(每题2分,5道题共10分)1、which is the type of electronic commerce in the following choiceA、B2BB、B2CC、C2C2、Electronic commerce that is conducted between businesses is referred to as business-to-business orA、C2CB、C2BC、B2BD、e-commerce3、Electronic commerce that is conducted between businesses and consumers, on the other ha nd, is referred to asA、B2CB、C2CC、B2BD、e-commerce4、Electronic commerce may be defined as the entire set of processes that suport _____________activities on a(n) ________ and involve information analysis.A、commercial,networkB、society,humanC、personal,society5、Electronic payments include ___________________.A、digital currenciesB、credit card paymentsC、electronic checksD、cash payment第三题、判断题(每题1分,5道题共5分)1、Online shopping is the process consumers go through to purchase products or services ov er the Internet.正确错误2、In general, shopping has always catered to middle class and upper class women.正确错误3、Electronic money is also called digital cash or electronic token正确错误4、Online content providers make money in two ways:advertisements and selling.正确错误5、Designers of online shops should consider the effects of information load.正确错误A BC DAnti-Virus protects your computer from viruses byA BC DA virus is aA BC DIn 2000, the number of viruses topped ( ).A BC DThe Whale will crea e ( ) different versions of itself when it infects files.A BC DC、logic bombsD、Microsoft Word Documents3、( ) maybe a certain cause that some viruses infect upon.A、a dayB、a timeC、an external event on your PCD、a counter within the virus4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.A、stealing storageB、pilfer CPU cyclesC、del_ete filesD、play music5、which is the threat to computer security in the following choices ?A、Computer CriminalsB、Computer CrimeC、earthquakeD、Human Errors第三题、判断题(每题1分,5道题共5分)1、Computer security is a branch of technology known as information security as applied to computers.正确错误2、Michelangelo is a file sector.正确错误3、Computer virus is remote from us.正确错误Computer virus may affect the your phisical health .正确错误The author thinks that understanding how an attacker approaches your computer system ca 正确错误When you are old and grey and full of sleep,And nodding by the fire, take down this book,And slowly read, and dream of the soft lookYour eyes had once, and of their shadows deep;How many loved your moments of glad grace,And loved your beauty with love false or true,But one man loved the pilgrim soul in you,And loved the sorrows of your changing face;And bending down beside the glowing bars,Murmur, a little sadly, how love fledAnd paced upon the mountains overheadAnd hid his face amid a crowd of stars.The furthest distance in the worldIs not between life and deathBut when I stand in front of youYet you don't know thatI love you.The furthest distance in the worldIs not when I stand in front of youYet you can't see my loveBut when undoubtedly knowing the love from both Yet cannot be together.The furthest distance in the worldIs not being apart while being in loveBut when I plainly cannot resist the yearningYet pretending you have never been in my heart. The furthest distance in the worldIs not struggling against the tidesBut using one's indifferent heartTo dig an uncrossable riverFor the one who loves you.倚窗远眺,目光目光尽处必有一座山,那影影绰绰的黛绿色的影,是春天的颜色。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Multiple 11. The keyboard, mouse, monitor, and system unit are:hardware output devices storage devices software2. Programs that coordinate computer resources, provide an interface, and run applications are known as:application programs operating systemsstorage systems utility programs3. A browser is an example of a:basic application specialized programsystem application utility program4. Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.mainframe media center midrange netbook5. The smallest type of microcomputer:netbook handheld midrange tablet PC6. RAM is a type of:computer memory network secondary storage7. Unlike memory, this type of storage holds data and programs even after electrical power to the computer system has been turned off.primary RAM ROM secondary8. The type of by word processors to save, for example, memos, term papers, and letters.database document presentation worksheet9. The change in connectivity that uses the Internet and the Web to shift many computer activities from a user’s computer to computers on the Internet.cloud computing high definition network USB10. The largest network in the world is [the]:Facbeook Internet Web USBMultiple 21. The network that connects computers all over the world.CERN Internet LAN Web2. The rules for exchanging data between computers.DSL protocols Web WWW3. Client-based e-mail accounts require this special program to be installed on your computer.e-mail client hyperlink Java utility4. Communities of individuals who share a common interest typically create Facebook:clients groups pages profiles5. E-mail that does not require an e-mail program installed on a user's computer is known as:blog podcast Webmail utility6. A very well-known microblog.LinkedIn MySpace Twitter Wikipedia7. These programs continually look for new information and update search services’ database programs.filters IM spiders wikis8. A type of search engine that submits requests to other search engines, organizes their responses, eliminates duplicate responses, orders hits, and then provides an edited list.directory search ISPmetasearch engine specialized search engine9. This is the Internet’s equivalent to traditional cash.digital cash e-commerce icash Internet dollars10. Using utility software, you can copy files to your computer from specially configured servers on the Internet. This is called:downloading filtering blogging uploadingMultiple 31. This type of software works with end users, application software, and computer hardware to handle the majority of technical details.application general purpose system utility2. A rectangular area that can contain a document, program, or message.dialog box form frame window3. Programs that create text-based documents.DBMS suites spreadsheets word processors4. Programs that organize, analyze, and graph numeric data such as budgets and financial reports.DBMS suites spreadsheets word processors5. In a spreadsheet, the intersection of a row and column creates a:cell formula function label6. A collection of related data that is the electronic equivalent of a .cell database document table7. A database tool that will quickly rearrange a table’s records according to a selected field.filter sort spreadsheet word processor8. Programs that combine a variety of visual objects to create attractive, visually interesting presentations.DBMS presentation graphics spreadsheet word processor9. The primary disadvantage of this type of package is that the capabilities of each function are not as extensive as in individual programs.integrated office software utility10. A type of suite stored at a server on the Internet and available anywhere through Internet access.cloud integrated office utilityMultiple 41. These specialized graphics programs combine text and graphics to create publications of professional quality.desktop publishing programs image editorsimage galleries illustration programs2. Also known as drawing programs.desktop publishing programs image editorsimage galleries illustration programs3. Graphics programs used to create and edit vector images.desktop publishing programs image editorsimage galleries illustration programs4. An essential multimedia feature that allows user participation.Flash interactivity immersion raster5. Special programs used to create multimedia presentations.desktop publishing programs Flash editorsimage editors multimedia authoring programs 6. A widely used interactive animation application from Adobe.ACTION Flash Fuzzy WYSIWYG7. Programs for Web site design and HTML coding are called Web page editors orapps HTML editors VR programs Web editors8. This area of artificial intelligence is also known as expert systems.acoustics knowledge-based systems robotics virtual reality9. A type of artificial intelligence that uses a database to provide assistance to users.acoustics expert systems robotics virtual reality10. Another name for the database used in expert systems that contains specific facts and rules.access table expert table knowledge base rule baseMultiple 51. What type of software works with users, application software, and computer hardware to handle the majority of technical details?dapplication desktop Linux system2. The programs that convert programming instructions written by programmers into a language that computers understand and process are language:converters linguists managers translators3. The ability to switch between different applications stored in memory is called:diversion multitasking operational interference programming 4. Graphic representations for a program, type of file, or function:app icon image software5. This operating system feature is controlled by a mouse and changes shape depending on its current function.dialog box menu mouse pointer6. The operating system based on Linux, designed for Netbook computers, and focused on Internet connectivity through cloud computing:Chrome Mac Unix Windows7. The mobile operating system developed by Apple and originally called iPhone OS:Android BlackBerry OS IOS Mac OS8. A utility program that makes copies of files to be used in case the originals are lost or damaged:Backup and Restore Disk Cleanup Disk Defragmenter Compactor9. A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space, and improves system performance:Backup and Restore Disk Cleanup Disk Defragmenter Compactor 10. Windows makes it easy to update drivers with Windows:Backup Restore Driver UpdateMultiple 61. This container houses most of the electrical components for a computer system.carrier package system board system unit TV tuner2. Similar to notebooks, this system unit specializes in on-the-go Web browsing and e-mail access.chassis desktop media center netbook3. Computers can only recognize this type of electronic signal.analog bus digital maximum4. The main or motherboard is also known as the:computer board processor mobile system system board 5. How many bytes can a 32-bit-word computer access at one time?1 48 166. In a microcomputer system, the central processing unit is contained on a single:bus chip module RAM7. This type of memory divides large programs into parts and stores the parts ona secondary storage device.direct expanded random-access virtual8. Also known as NIC, this adapter card is used to connect a computer to a:AIA expansion graphics network9. This provides a pathway to connect parts of the CPU to each other.bus Plug and Play wired wireless10. Older ports that have largely been replaced by faster, more flexible ports are called:buses expandable legacy renderedMultiple 71. Most keyboards use an arrangement of keys known as:Alpha Daisy OptiKey QWERTY2. The device that controls a pointer displayed on the monitor.cord mouse printer scanner3. Also known as a roller ball, this device controls the pointer by rotating a ball with your thumb.trackball joystick cordless mouse stylus4. The type of screen that can be touched with more than one finger and supports zooming in and out by pinching and stretching your fingers.digital dynamic multitouch OLED5. Flatbed and document are types of:headsets HDTVs monitors scanners6. Device used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips.MICR FDIC OMR UPC7. The most widely used audio-input device.mouse VR microphone TFT8. The monitor feature that specifies how often a displayed image is updated.aspect ratio dot pitch refresh rate resolution rate9. Handheld, book-sized devices that display text and graphics.e-book readers HDTV lasers whiteboards10. This technology allows television stations to broadcast their programming directly to smartphones, computers, and digital media players.CRT HDTV LED Mobile DTVMultiple 81. RAM is sometimes referred to as:primary storage ratio active memoryread only memory secondary storage2. The actual physical material that holds the data and programs.primary storage media disk access3. Measures how tightly these charges can be packed next to one another on the disk.density cylinders tracks sectors4. When a read/write head makes contact with the hard disk’s surface, it causes a head:crash land pit scratch5. This hard-disk performance enhancement anticipates data needs.disk caching RAID6. This type of storage uses pits and lands to represent 1s and 0s.cloud hard disk optical solid state7. DVD stands for:digital versatile disc digital video datadynamic versatile disc dynamic video disc8. USB drives are also known as:flash drives optical drives ports universal state bus9. An organizational strategy to promote efficient and safe use of data across the networks.cloud dynamic data mission statemententerprise storage system RAID10. A mass storage device that provides access to data archived on tapes.NAS RAID system tape libraryMultiple 91. The concept related to using computer networks to link people and resources.connectivity GPS TCP/IP Wi-Fi2. A high-frequency transmission cable that delivers television signals as well as connects computers in a network.coaxial hi def 3-D twisted pair3. A short-range radio communication standard that transmits data over short distances of up to approximately 30 feet.Bluetooth broadband DSL TCP/IP4. The speed with which a modem transmits data is called its:digital velocity dynamic rate modular rating transfer rate5. The bandwidth typically used for DSL, cable, and satellite connections to the Internet.baseband broadband medium band voiceband6. Every computer on the Internet has a unique numeric address called a(n):IP address DNS broadcast packet7. Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.PCMCIA NIC server VPN8. A device that allows one LAN to be linked to other LANs or to larger networks.IDS network gateway PAN switch9. Typically using Wi-Fi technology, these wireless access points are typically available from public places such as coffee shops, libraries, bookstores, colleges, and universities.hotspots extranets PANs LANs10. Star, tree, and mesh are three types of network:topologies protocols strategies devicesMultiple 101. The three primary privacy issues are accuracy, property, and:access ethics ownership security2. To easily get names, addresses, and other details about a person using only his or her telephone number, government authorities and others use a(n):adware cookie keystroke logger reverse directory worm3. Browsers store the locations of sites visited in a:history menu tool bar firewall4. The browser mode that eliminates history files and blocks most cookies.detect insert privacy sleep5. The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:access approval firewall online identity phish6. Computer criminals who specialize in stealing, trading, and using stolen credit cards over the Internet are known as:carders card scammers cyber traders identity thieves7. Programs that come into a computer system disguised as something else are called:Trojan horses viruses Web bugs zombies8. The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:cyber-bullying online harassmentsocial media discrimination unethical communication9. Special hardware and software used to control access to a corporation’s private network is known as a(n):antivirus program communication gatefirewall spyware removal program10. To prevent copyright violations, corporations often use:ACT DRM VPN WPAMultiple 111. Which of the basic organizational functions records all financial activity from billing customers to paying employees?accounting marketing production research2. What managerial level has information flow that is vertical, horizontal, and external?top supervisory middle foreman3. Which computer-based information system uses data from TPS and analytical tools to support middle managers?ESS MIS DSS TPS4. Accounts payable refers to money the company owes its suppliers for materials and services it has:created exported inventoried received5. What accounting activity keeps track of all summaries of all transactions?balance sheet general ledgerincome statement inventory control6. What accounting statement lists the overall financial condition of an organization?balance sheet general ledgerincome statement inventory control7. What type of report is produced at regular intervals?demand exception inventory periodic8. A DSS consists of four parts: user, system software, decision models, and:application software data operating system spreadsheets9. What type of worker is involved with the distribution, communication, and creation of information?executive foreman information knowledge10. What type of program is designed to schedule, plan, and control project resources?auditing dtp project managers schedulersMultiple 121. Facts or observations about people, places, things, and events are:data occurrences records tables2. The most basic logical data element such as a single letter, number, or special character is known as a:character element phrase record3. Each record in a database has at least one distinctive field, called the:key field structure type view4. One element of database security is to provide only authorized users with:classes nodes passwords relations5. The bridge between the logical and physical views of the data is provided by:DBMS records SQL tables6. Highly trained computer specialists who interact with the data administration subsystem are known as:DBMS data modelers database administrators relational specialists7. In a network database, each child node may have more than one parent node; this is known as a:hierarchy many-to-many relationshipparent relationship relational relationship8. Connections between parent nodes and child nodes are provided by:characters DBA objects pointers9. Two of the most significant advantages of multidimensional databases over relational databases are processing speed and:conceptualization control format objectification10. Object-oriented databases organize data by classes, attributes, methods, and:objects relations space timeMultiple 131. An information system is a collection of hardware, software, people, procedures, and:data DBMS specialists system analysts2. What is the first phase in the systems life cycle?needs analysis preliminary investigationsystems analysis systems design3. Which phase in the systems life cycle involves installing the new system and training people?preliminary investigation systems analysissystem design systems implementation4. This phase in the systems life cycle is concerned about determining system requirements not in design.preliminary investigation systems analysissystem design systems implementation5. Which systems analysis tool shows the relationship between input and output documents?checklist data flow decision table grid chart6. These tools relieve the systems analysts of many repetitive tasks, develop clear documentation, and, for larger projects, coordinate team member activities.automated systems life cycle CASEdata flow analyzers flow charts7. Which systems life cycle phase is concerned with economic, technical, and operational feasibility?preliminary investigation systems analysissystems design systems implementation8. What type of feasibility evaluates whether the people within the organization will embrace or resist a new system?behavioral economic operational techinical9. Which approach to conversion begins by trying out a new system in only one part of an organization?direct pilot parallel phased10. An alternative to the systems life cycle approach using powerful development software, small specialized teams, and highly trained personnel.AAD CASE prototyping RADMultiple 141. A program is a list of instructions for the computer to follow to process:data direct logic hardware software2. The major processing steps identified in a top-down program design are called:assembly instructions modules logic3. The programming logic structure in which one program statement follows another.concatenation loop repetition selection4. One of the best ways to code effective programs is to use the three basic logic structures to create:content-markup programs modular languagespseudocode structured programs5. Which step in the six-step programming procedure involves desk checking and searching for syntax and logic errors?program design program documentationprogram maintenance program test6. Which step in the six-step programming procedure is the final step?program design program documentationprogram test program maintenance7. Unlike traditional systems development, this software development approach focuses less on the procedures and more on defining the relationships between previously defined procedures.2GL context-markup module object-oriented8. Natural languages are considered to be a:high-level language low-level languagemid-level language procedural language9. A compiler converts the programmer’s procedural language program, called the source code, into a machine language code, called the:interpreter code object codestructured code top-down code10. The 4GL languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a database.query application generator C11 COBOLMultiple 151. People who react to technology by thinking computers are magic boxes capabl e of solving all kinds of problems that computers really can’t handle are:cynics frustrated naïve proactive2. The type of person that looks at technology in a positive realistic way is:cynical proactive naïve frustrated3. Books, journals, and trade associations are the best sources to help you:develop personal contacts develop specialtieslook for innovative opportunities maintain your computer competency 4. If your career is in marketing, it makes sense to develop a specialty in:database desktop publishingprogramming systems analysis and design5. What computer professional repairs and installs computer components and systems?computer technician data entry workerdesktop publisher software engineer6. What computer professional designs, tests, and researches encryption procedures?cryptographer network administratorprogrammer software engineer7. What computer professional uses database management software to determine the most efficient ways to organize and access data?cryptographer database administratorprogrammer software engineer8. What computer professional oversees the work of programmers, computer specialists, systems analysts, and other computer professionals?information systems manager network managersoftware engineer technical writer9. What computer professional creates, tests, and troubleshoots computer programs?network manager programmersoftware engineer technical writer10. What computer professional plans and designs information systems?network manager programmersoftware engineer systems analyst。

相关文档
最新文档