计算机英语期末考试试题

合集下载

《计算机英语》期末考试及答案

《计算机英语》期末考试及答案

《计算机英语》A卷本卷满分100分,90分钟完卷。

得分:一、选出下列单词所缺字母组合(共10小题,每小题2分,共20分)。

1.Unau__orized (未经许可的)A. teB. toC.thD. tt2.Interpret__ (直译程序,口译者)A. eoB. erC. rrD. re3.Domi__te (支配、占优势)A. naB. noC. nuD. ne4.Majori__ (多数,大多数)A.tiB. tyC. ttD. to5.Stead__y (稳定地)A.liB. lyC. ilD. ll6.__ternative (二者选一)A.olB.auD.al7.Multi__dia (多媒体)A.meB.miC.moD.mm8.Stand__d (标准的)A.anB.raC.arD.ae9.Down___d (下载)oB.loaC.loeD.lod10.Ter__nal (终点站)A.miB.meC.mmD.mo二、单项选择题(共10小题,每小题2分,共20分)。

11. What should you_____?A. didB. doesC. doD. done12. ---Congratulations---______________A.The same to youB.Just so soC. Not at allD.Thank you.13. Happy life rely on_____ hard.A. workB. workingC. worksD. to work14. She is a ____ girl.A. beautyB. beautiesC. beautifulD. beautifully15.---I won the match.---____________A. Well doneB. Bad luckC. What a pityD. Is that so?16. ---How do you do?---_____________A.Nice to meet youB. I am very wellC .How do you do D.Fine,thanks.and you17. He expresses an interest ___ reading.A. inB. onC. atD.to18.She _______ English for seven years.A. studyB. studiesC. studiedD. has studied19. ---Thank you for your help.---___________________.A. No problemB. yes,you areC. Never changeD.No thanks20. She goes to the library ______.A. readB. to readC. readingD. reads三、阅读理解(共5题,每小题4分,共20分)。

计算机英语考试题目及答案

计算机英语考试题目及答案

计算机英语考试题目及答案一、选择题1. What does HTML stand for?a) Hyper Text Markup Languageb) High Technology Multimedia Languagec) Home Tool Management Languaged) Human Token Marker Language答案:a) Hyper Text Markup Language2. Which of the following is not a programming language?a) Javab) Pythonc) HTMLd) C++答案:c) HTML3. What is the purpose of CSS?a) To add interactivity to web pagesb) To structure the content of web pagesc) To define the layout and style of web pagesd) To create dynamic web pages答案:c) To define the layout and style of web pages4. What is the function of a router in a computer network?a) To connect computers to the internetb) To store and manage data on a networkc) To protect the network from security threatsd) To direct network traffic between devices答案:d) To direct network traffic between devices5. Which of the following is a commonly used database management system?a) Microsoft Wordb) Adobe Photoshopc) MySQLd) Windows Media Player答案:c) MySQL二、填空题1. The process of converting source code into machine code is called ________.答案:compilation2. The most widely used programming language for web development is ________.答案:JavaScript3. TCP/IP stands for ________.答案:Transmission Control Protocol/Internet Protocol4. The physical components of a computer are referred to as ________.答案:hardware5. SQL stands for ________.答案:Structured Query Language三、简答题1. What are the advantages of using cloud computing?答案:Cloud computing offers several advantages, including:- Cost savings: Companies can reduce their infrastructure costs by using cloud services instead of maintaining their own hardware.- Scalability: Cloud services can easily scale up or down based on demand, allowing businesses to only pay for what they need.- Flexibility: Users can access cloud services from anywhere with an internet connection, enabling remote work and collaboration.- Disaster recovery: Cloud providers often have backup systems in place, ensuring data can be recovered in case of a disaster.- Automatic updates: Cloud services are typically updated regularly by the provider, ensuring users have access to the latest features and security patches.2. Explain the difference between HTTP and HTTPS.答案:HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is not secure, meaning that the data being transmitted can be intercepted and read by anyone. HTTPS (Hypertext Transfer Protocol Secure), on the other hand, is a secure version of HTTP. It uses encryption to ensure that data is encrypted before transmission, making it much more difficult for hackers to intercept and read. HTTPS is commonly used for secure online transactions, such as submitting credit card information or personal details.四、编程题请编写一个Python程序,实现计算圆的面积和周长的功能。

计算机专业英语期末复习题及参考答案

计算机专业英语期末复习题及参考答案

一单选题 (共10题,总分值30分 )1. hacker (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙2. functional testing (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙3. relational database (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙4. firewall (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙5. software testing (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙6. audi (3 分)B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙7. application software (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙8. machine language (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库J. 防火墙9. memory (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙10. structured programming (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙二填空题 (共1题,总分值5分 )11. Microsoft Word XP is the current Window versionof Word, and documents created in Word XP can beeasily _________________________________Excel, Power Point and Access files. In the interface of Word, the_________________________________displays the name of the current application and name of the current document;the_________________________________lists the names of the menus available;the_________________________________gives the user quick access to frequently used editingfunctions; the_________________________________enables theuser to change left and right margin.toolbarrulertitle barmenu barincorporate into (5 分)三翻译题 (共10题,总分值50分 )12. hard disk (5 分)13. 集成开发环境(5 分)14. 通用串行总线(5 分)15. network security (5 分)16. software maintenance (5 分)17. electronic commerce (5 分)18. 广域网(5 分)19. 结构化查询语言(5 分)20. management information system (5 分)21. 面向对象编程(5 分)四阅读理解 (共1题,总分值15分 )22. The Internet, then known as ARPANET, wasbrought online in 1969, which initiallyconnected four major computers at universitiesin the southwestern US . The early Internet wasused by computer experts , engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personalcomputers in those days, and anyone who used it, whether a computer professional or an engineeror scientist or librarian, had to learn to use a very complex system.The Internet matured in the 1970's as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today' s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources.In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network.Since the Internet was initially funded by the government, it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 1990's, when independent commercial networks began to grow.(四) Choose the best answer according to Passage C.(根据上文的内容选择正确的答案。

计算机英语期末考试试题及答案

计算机英语期末考试试题及答案

计算机英语期末考试试题及答案一、选择题1. 在计算机网络中,IP地址用于标识网络上的的哪个设备?A. 路由器B. 交换机C. 服务器D. 主机答案:D2. 在计算机安全中,以下哪项属于恶意软件?A. 防火墙B. 杀毒软件C. 木马病毒D. 数据备份答案:C3. 在计算机术语中,RAM代表什么?A. 随机读取存储器B. 只读存储器C. 可擦除可编程读取存储器D. 磁盘存储器答案:A4. 在计算机网络中,HTTP协议是用于实现什么功能的?A. 网络连接B. 文件传输C. 数据加密D. 网络浏览答案:D5. 下列哪个不属于常见的文件压缩格式?A. .zipB. .rarC. .isoD. .txt答案:D二、填空题1. 在计算机程序中,循环结构可以用来多次执行特定的代码段,常见的循环结构包括_______和_______。

答案:for、while2. 在计算机图像处理中,________是指将一幅图像分割成若干个连续的小区域,并对每个小区域进行处理。

答案:图像分割三、判断题1. 计算机网络是指将多台计算机通过通信设备连接起来,实现信息共享和资源共享。

答案:正确2. 在计算机程序中,注释是用来向其他程序员解释代码功能的。

答案:正确四、简答题请简述计算机网络的优点和缺点。

优点:1. 资源共享:计算机网络可以实现多台计算机之间的文件共享、打印共享等,提高资源利用率;2. 信息交流:计算机网络可以快速传输信息,实现实时通信,方便人们之间的交流;3. 远程访问:计算机网络可以远程访问其他计算机,方便远程办公和学习。

缺点:1. 安全性问题:计算机网络容易受到黑客攻击和恶意软件感染,存在一定的安全隐患;2. 依赖性:对于依赖网络的应用和服务而言,一旦网络故障,将会导致服务中断,影响工作和生活;3. 隐私问题:在计算机网络中,个人信息和隐私面临泄露的风险,需要加强数据保护和隐私保护措施。

答案仅供参考,具体答案可能根据题目要求有所变化。

计算机英语期末考试试题

计算机英语期末考试试题

计算机英语期末考试试题1.C hoose the best answer to each of the following questions. (20%)1.is used to communicate with another computer over telephone linesA. keyboard B .modem C. printer D. mouse2.is a device that enables the computer to handle sounds.A. network cardB. video cardC. sound cardD. monitor3.refers to the parts of the computer that you can see and touch.A. SoftwareB. HardwareC. HardshipD. Instruction4. The display screen is the most common device used to show you what thecomputer is doing.A. inputB. printingC. outputD. electronic5.are programs that provide access to Web resourcesA. browsersB. databaseC. URLD. E-commerce6.is a word processing tool that helps you to create quality documents.A. Word 2003B. Outlook 2003C. Access 2003D. Excel 20037.is a fast and powerful operating system, based on the UNIX O.S.A. Windows 2003B. Office 2003C. Windows 2003D. Linux8.A virus is aA. programB. computerC. bad manD. beast9.TCP/IP are the two standard protocols for communications on the.A. webB. computerC. InternetD. network10.B2C involves individuals selling to.A. clientB. consumerC. corporationD. company11.Decide whether the following statements are True or False. (20%)1.( ) The CPU is the processor of a computer.2.( ) Windows NT is designed for replacement of Windows.3.( ) A computer is only connected by cable lines, such as telephone lines.4.( ) Air can be used to transit data.5.( ) Search engines help you to locate information on the Web6.( ) B2C involves individuals selling to individuals.7.( ) Databases are widely used8.( ) Oracle is the largest database system vendor in the world.9.( ) Complete access and complete security are good for information security10.( ) Portable computer can fit in a briefcase or even in the palm of your hand. 111.Translation: English to Chinese (20%)1.CPU2. OS3. LAN4. B2B5. CEO6. ATM7.DBMS 8. URL9.personal computer _____________________________________________________10.storage device _______________________________________________________rmation exchanges ________________________________________________12.protocol _____________________________________________________________13.broadband ____________________________________________________________14.browser ______________________________________________________________15.search engine ________________________________________________________16.update _______________________________________________________________17.Web Site _____________________________________________________________18.human resources _________________________________________________________19.environment _____________________________________________________________puter virus __________________________________________________________IV. Word-matching (20%)1. LCD a.主页2. menus b.黑客3. bus c.超链接4. WAN d.冲浪5. home page eh父日日业力、下]6. E-commerce f菜单7. hacker g总线8. surfing h广域网9. delete i电子商务10. hyperlink j删除V. Translation (20%)puter hardware has four parts: the central processing unit (CPU) and memory, storagehardware, input hardware, and output hardware.2.Software refers to computer programs.puter network is a system connecting two or more computers.munication is the most popular Internet activity5.The backbone of this electronic commerce is the Internet.6.DBMS has the ability to access large amounts of data efficiently.7.Security is important throughout the information life-cycle8.If you have access to a personal computer (PC) and can connect to the Internet with a browser,you can do business online.9.Business receive raw materials as input, add value to them through various processes, and sellthe finished product as output to customers.10.As new viruses are created everyday, upgrade your anti-virus software regularly.。

计算机专业英语期末复习题(精选)

计算机专业英语期末复习题(精选)

计算机专业英语期末复习题I. Decide if the following statements are true (T) or false (F)1. Few makers have incorporated a USB hub into their products.2. The Internet began to boom in 1990.3. Encryption means adding a password to the access of a computer.4. The aim of compression formats is to reduce file size.5. WWW provides access to a variety of internet resources fromdifferent interfaces.6. All commercial operating systems can be modified by everyone.7. HTML is a language used to write documents for the8. Computers have greatly reduced the amount of paper in offices.9. Other electronic devices like TV can also trol your PC.10. Everyone can make suggestions to improve the Linux operatingsystem.11. You could edit a video like a document file with cutting and pastingon cheap editing computers five years ago.12. By the hyperlink, the user is nected to the document specified bythe link.参考答案:1 F2 F3 T4 T 5F6 F7 T8 T9 T 10T11 F 12 TII. Give the Corresponding Translation.1. recovery2. server3. ROM4. machine language5. operating system6. interface7. software 8. RAM9. process 10. network11. memory 12. USB13. database 14. debug15. cache 16. CPU1. 多媒体2. 音频3. 键盘4. 激活5. 内存6. 浏览器7. 服务器 8. 输出9. 黑客 10. 病毒11. 显示器 12. 对象参考答案:1. 恢复2. 服务器3. 只读存储器(只读内存)4. 机器语言5. 操作系统6. 接口、界面7. 软件8. 随机存取存储器9. 过程10. 络11. 内存12. 通用串行总线13. 数据库 14. 调试15. 高速缓冲存储器16. 中央处理器1. multimedia2. audio3. keyboard4. activate5. memory6. browser7. server 8. output9. hacker 10. virus11. monitor 12. objectIII. T ranslate the Following Sentences into Chinese 12%1.Microsoft’s Windows 2000 is a powerful yet flexible operating systemdesigned for large applications in networked environments.2.A computer virus is a computer program that is created to make andspread copies of itself.3.Spreadsheet applications are computer programs that let you createand manipulate spreadsheets.4.An optical mouse doesn’t have a ball on the bottom and can usually beused without a mouse pad.5.A small network may only nect two computers inside a home to sharea single printer and Internet nection.6.The older DOS operating systems and some versions of Unix andLinux use a command interface, though graphical versions of Unix and Linux are now available.参考答案:1.windows 2000是一种为络环境下大型程序而设计的强大而灵活的操作系统。

中职计算机专业英语期末测试题三及答案

中职计算机专业英语期末测试题三及答案

期末测试题三一、Translate the following words and expressions into Chinese(写出下列词组的汉语。

10个,每题2分,共20分)1.transmission media2.bus network3.management information system4.transaction processing5.decision support system6.Electronic commerce7.digital video8.credit card9.data warehouse10.real-time二、Tell whether the following statements are true(T) or false(F).(判断题。

10个,每小题1分,共10分。

)1.A WAN is a network that connects LANs and nodes across a wide geographical area.2.WWW provides access to a variety of Internet resources from different interfaces.3.The chief responsibility of TCP/IP is to ensure reliable point-to-point connectivity.4.The main focus of MIS is the management function of an organization. 5.Compared with simple non-EDI-based purchase, EDI purchase is faster, cheaper and convenient.6. A multimedia system allows end users to share, communicate and processa variety of forms of information in an integrated manner7. Data warehouse is a single source of information to understand different subjects.8.Data warehouse only contains current information.9. New antivirus software is always more effective in defending virus attack.10. Hackers sometimes can disguise themselves as internal users and attack your system undetected.三、Translation. 翻译句子(5个,每题4分,共20分)1.Spreadsheet applications are computer programs that let you create and manipulate spreadsheets.2.Word offers many features, including desktop publishing and access to the World Wide Web.3.As you create a specific document, such as a business letter or resume, Word provides wizards, which ask questions and then use your answers to format the document before you type the text of the document. 4.Users often save their work frequently onto nonvolatile secondary storage devices such as diskettes or hard disks.5.When editing in Word, a user can change left and right margins with the Ruler.四.Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary.(从下列方框中选择合适的词或表达,以其适当的形式填空,1题,共20分)A programming language, designed to () the communication between human and computers, is a ()or describing computation in readable form. There are 3 levels of programming languages, they are (), which can be run directly by computer; () and machine language. There are different high-level programming languages. Fortunately, most of them have manykinds of ()in common and vary only in the way that these must be (). Therefore, first thing to be decided about a task is to choose which programming language is best suited for the job.五.英语作文 (本题型共一大题,共30分。

《计算机专业英语》期末考试试卷

《计算机专业英语》期末考试试卷

2014年下学期《计算机专业英语》期中考试试卷班级:_________ 姓名:________ 学号:________ 计分:________ I. 根据图片把方框里的单词或词组填入对应的空格。

(14分)1. __________________2. _________________3. __________________4. _________________5. __________________6. _________________7. __________________II. 中英文配对:将中文前的字母填入其对应的英文前的空格里。

(20分)_____ 1. input device a. 闪盘_____ 2. RAM b. 只读光盘_____ 3. floppy disk c. 芯片_____ 4. memory bank d. 移动硬盘_____ 5. output device e. 输入设备_____ 6. flash disk f. 随机存储器_____ 7. chip g. 软盘_____ 8. mobile hard disk h. 输出设备_____ 9. motherboard i. 内存条_____ 10. CD-ROM j. 主板III. 阅读理解:AMary: Hello, PC Support Center. This is Mary. What can I do for you? Customer: Hello. this is Chen Lin. I’m calling because I have some questions about my disk.Mary: Hi, Chen Lin. You can tell me one by one.Customer: I’m afraid I’ll run out of disk space. What shall I do?Mary: OK, running out of hard disk space is no big deal. You can just start moving old junks off to the CDs or you can just add a second hard disk. Customer: Oh, I see. Are there any signs before the hard drive fails?Mary: Yes, the signs may include strange sounds, noise, popping or similar problems.Customer: Thanks for your helpMary: You’re welcome.根据上文判断以下句子是否正确,正确的写“T”,错误的写“F”。

计算机专业英语期末试题及参考答案

计算机专业英语期末试题及参考答案

山东外国语职业技术大学成人高等教育2021年第二学期期末考试学习方式: 函授/业余时间:120分钟考试科目:《course》(总分)100分集中闭卷考试特别提醒:1、所有答案均须填写在答题卷上,否则无效。

2、每份答卷上均须准确填写专业、身份证号码、所属学习中心名称、学号、姓名等。

一单选题 (共40题,总分值80分 )1. application software (2 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙2. Before switching on the power of the machine,make sure that the power source voltage()the specifications. (2 分)A. Complies withB. Complies toC. Complies inD. Complies by3. We must measure and ()to determine howmuch paint will be needed. (2 分)A. DescribeB. EditC. DiagnoseD. Calculate4. A()is a device that enables the computerto handle sounds. (2 分)A. Network cardB. Video cardC. Sound cardD. monitor5. Therefore,()are considered to be thetypical form of programmable automation. (2 分)A. Measurement systemsB. Actuating systemsC. NC systemsD. Feedback systems6. Joseph Jacquard developed a method to controltextile looms by using a()。

计算机英语考试题含答案

计算机英语考试题含答案
A.Universal Serial Bus
er System Bus
er Storage Bus
D.Universal Storage Bus
答案:A
3.What is the primary function of a router in a computer network?
A.To store data
A.To prevent unauthorized access
B.To speed up internet connections
C.To store data
D.To print documents
答案:A
9.What does"GUI"stand for in the context of computer systems?
答案:D
5.What does"RAM"stand for in computer terminology?
A.Random Access Method
B.Random Access Memory
C.Remote Access Memory
D.Rapid Access Memory
答案:B
6.What is the term for a collection of data stored on a computer?
A.Application
B.Software
C.Utility
D.Script
答案:D
二、填空题(每题
1.The basic unit of data in a computer is called a____________.
答案:bit

技工学校电脑英语期末考试试卷

技工学校电脑英语期末考试试卷

省机械高级技工学校潮州分校11计网班《计算机英语》期末考试卷班级姓名座号成绩题号一二三四五六评分得分一、单项选择,请为下列问题选择正确的答案,并将答案的字母写在题号前。

(每题1.5分,共15分) ( )1.The typical interface elements include prompts, wizard, commands, and so on. A. keyboard B. menu C. text D. mouse ( )2.A (An) is a collection of micro c ircuit elements such circuit elements such a s as as wires, transistors, capacitors wires, transistors, capacitors and registers packed on a very small square of silicon. A. CPU B. IC C. RAM D. ROM ( )3.A(An) can give graphical prompt to help users perform tasks. A. prompt B. command-line C. icon D. wizard ( )4.A(An) provide more commands when users make a selection from the main menu. A. dialog box B. icon C. submenu D. prompt ( )5.T o use use a a interface, interface, users users users have have have to to to input input input various various various commands commands commands correctly, correctly, correctly, or or or an an an error error message appears on the screen. A.GUI B. command-line C. menu D. dialog box ( )6. GUI users as the basic interface element and users can manipulate the small icon on the screen instead of entering commands or selecting menu options. A. commands B. prompts C. graphical objects D. natural voice ( )7. )7. Unlike Unlike Unlike clumsy clumsy clumsy operation operation operation of of of command-line, command-line, command-line, the the interface interface makes makes makes it it it easier easier easier for for for users users users to to input a command to the computer. A. prompt B. menu C. character D. natural language ( )8. )8. The The code code uses uses uses seven seven seven bits bits bits to to to represent represent represent 128 128 128 symbols, symbols, symbols, including including including upper upper upper case case case and and lowercase letters, special control codes, numerals, etc. A. EBCDIC B. binary C. ASCII D. MIDI ( )9. A can display options associated with a command by a window on the screen. A. dialog box B. menu C. submenu D. prompt ( )10. The in the CPU directs and coordinates the operations of the entire computer system A. CU B. IC C. CPU D. ALU 二、填空题。

计算机网络英语期末复习试题及答案

计算机网络英语期末复习试题及答案

《计算机网络英语》期末复习试题及答案一选择题1.A ( ) protocol is used to move a datagram over an individual link.A application-layerB transport-layerC network-layerD link-layer2.The units of data exchanged by a link-layer protocol are called ( ).A datagramsB framesC segmentsD messages3.Which of the following protocols is not a link-layer protocol? ( )A EthernetB PPPC HDLCD IP4.In the following four descriptions, which one is not correct? ( )A link-layer protocol has the node-to-node job of moving network-layer datagrams over a single link in the path.B The services provided by the link-layer protocols may be different.C A datagram must be handled by the same link-layer protocols on the different links in the path.D The actions taken by a link-layer protocol when sending and receiving frames include error detection, flow control and random access.5.Which of the following services can not offered by a link-layer protocol? ( )A congestion controlB Link AccessC Error controlD Framing6.( ) protocol serves to coordinate the frame transmissions of the many nodes when multiple nodes share a single broadcast link.A ARPB MACC ICMPD DNS7.In the following four descriptions about the adapter, which one is not correct? ( )A The adapter is also called as NIC.B The adapter is a semi-autonomous unit.C The main components of an adapter are bus interface and the link interface.D The adapter can provide all the link-layer services.8.Consider CRC error checking approach, the four bit generator G is 1011, and suppose that the data D is 10101010, then the value of R is( ).A 010B 100C 011D 1109.In the following four descriptions about random access protocol, which one is not correct? ( )A In slotted ALOHA, nodes can transmit at random time.B In pure ALOHA, if a frame experiences a collision, the node will immediately retransmit it with probability p.C The maximum efficiency of a slotted ALOHA is higher than a pure ALOHA.D In CSMA/CD, one node listens to the channel before transmitting.10.In the following descriptions about MAC address, which one is not correct? ( )A The MAC address is the address of one node’s adapter.B No two adapters have the same MAC address.C The MAC address doesn’t change no matter where the adapter goes.D MAC address has a hierarchical structure.11.The ARP protocol can translate ( ) into ( ). ( )A host name, IP addressB host name, MAC addressC IP address, MAC addressD broadcast address, IP address12.The value of Preamble field in Ethernet frame structure is ( )A 10101010 10101010……10101010 11111111B 10101011 10101011……10101011 10101011C 10101010 10101010……10101010 10101011D 10101010 10101010……10101010 1010101013.There are four steps in DHCP, the DHCP server can complete ( ).A DHCP server discoveryB DHCP server offersC DHCP requestD DHCP response14.In CSMA/CD, the adapter waits some time and then returns to sensing the channel. In the following four times, which one is impossible? ( )A 0 bit timesB 512 bit timesC 1024 bit timesD 1028 bit times15.The most common Ethernet technologies are 10BaseT and 100BaseT. “10” and “100”indicate( ).A the maximum length between two adaptersB the minimum length between two adaptersC the transmission rate of the channelD the transmission rate of the node16.The principal components of PPP include but not( ).A framingB physical-control protocolC link-layer protocolD network-layer protocol17.In the following four options, which service can not be provided by switch? ( )A filteringB self-learningC forwardingD optimal routing18.In the following four services, which one was be required in PPP? ( )A packet framingB error detectionC error correctionD multiple types of link19.The ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces is( ).A filteringB forwardingC self-learningD optimal routing20.In ( ) transmission(s), the nodes at both ends of a link may transmit packets at the same time.A full-duplexB half-duplexC single-duplexD both full-duplex and half-duplex21.Consider the data D is 01110010001, if use even parity checking approach, the parity bit is( ①), if use odd parity checking approach, the parity bit is( ②). ( )A ①0 ②1B ①0 ②0C ①1 ②1D ①1 ②022.In the following four descriptions about parity checks, which one is correct? ( )A Single-bit parity can detect all errors.B Single-bit parity can correct one errors.C Two-dimensional parity not only can detect a single bit error, but also can correct that error.D Two-dimensional parity not only can detect any combination of two errors, but also can correct them.23.MAC address is ( ) bits long.A 32B 48C 128D 6424.Wireless LAN using protocol ( ).A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.1125.The following protocols are belonging to multiple access protocols except for ( ).A channel partitioning protocolsB routing protocolsC random access protocolsD taking-turns protocols26.Which of the following is not belonging to channel partitioning protocols? ( )A CSMAB FDMC CDMAD TDM27.In the following four descriptions about CSMA/CD, which one is not correct? ( )A A node listens to the channel before transmitting.B If someone else begins talking at the same time, stop talking.C A transmitting node listens to the channel while it is transmitting.D With CSMA/CD, the collisions can be avoided completely.28.( ) provides a mechanism for nodes to translate IP addresses to link-layer address.A IPB ARPC RARPD DNS29.A MAC address is a ( )address.A physical-layerB application-layerC link-layerD network-layer30.Which of the following is correct? ( )A No two adapters have the same MAC address.B MAC broadcast address is FF-FF-FF-FF-FF-FF.C A portable computer with an Ethernet card always has the same MAC address, no matter where the computer goes.D All of the above31.In the following four descriptions, which one is not correct? ( )A ARP resolves an IP address to a MAC address.B DNS resolves hostnames to IP addresses.C DNS resolves hostnames for hosts anywhere in the Internet.D ARP resolves IP addresses for nodes anywhere in the Internet.32.In the LAN, ( )protocol dynamically assign IP addresses to hosts.A DNSB ARPC DHCPD IP33.DHCP protocol is a four-step process: ①DHCP request. ②DHCP ACK. ③DHCP server discovery. ④DHCP server offer(s). The correct sequence is ( )A ①②③④B ③②①④C ③④①②D ①④③②34.In the Ethernet frame structure, the CRC field is ( )bytes.A 2B 4C 8D 3235.In the Ethernet frame structure, the Data field carries the ( ).A IP datagramB segmentC frameD message36.In the following four descriptions, which one is not correct? ( )A Ethernet uses baseband transmission.B All of the Ethernet technologies provide connection-oriented reliable service to the network layer.C The Ethernet 10Base2 technology uses a thin coaxial cable for the bus.D The Ethernet 10BaseT technology uses a star topology.37.Ethernet’s multiple access protocol is ( ).A CDMAB CSMA/CDC slotted ALOHAD token-passing protocol38.In the following four descriptions about CSMA/CD, which one is not correct? ( )A An adapter may begin to transmit at any time.B An adapter never transmits a frame when it senses that some other adapter is transmitting.C A transmitting adapter aborts its transmission as soon as it detects that another adapter is also transmitting.D An adapter retransmits when it detects a collision.39.Which of the following descriptions about CSMA/CD is correct? ( )A No slots are used.B It uses carrier sensing.C It uses collision detection.D All of the above.40.The Ethernet 10BaseT technology uses( )as its physical media.A fiber opticsB twisted-pair copper wireC coaxial cableD satellite radio channel41.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( )meters.A 100B 200C 500D 1042.A ( )is a physical-layer device that acts on individual bits rather than on frames.A switchB hubC routerD gateway43.A hub is a ( )device that acts on individual bits rather than on frames.A physical-layerB link-layerC network-layerD ransport-layer44.A switch is a( )device that acts on frame.A physical-layerB link-layerC network-layerD transport-layer45.In the following four descriptions, which one is not correct? ( )A Switches can interconnect different LAN technologies.B Hubs can interconnect different LAN technologies.C There is no limit to how large a LAN can be when switches are used to interconnect LAN segments.D There is restriction on the maximum allowable number of nodes in a collision domain when hubs are used to interconnect LAN segments.46.The ability to determine whether a frame should be forwarded to some interface or should just be dropped is ( ).A filteringB forwardingC self-learningD optimal routing47.Which of the following devices is not a plug and play device? ( )A hubB routerC switchD repeater48.Which of the following devices is not cut-through device? ( )A hubB routerC switchD repeater49.In the following four descriptions, which one is not correct? ( )A Switches do not offer any protection against broadcast storms.B Routers provide firewall protection against layer-2 broadcast storms.C Both switches and routers are plug and play devices.D A router is a layer-3 packet switch, a switch is a layer-2 packet switch.50.Which device has the same collision domain? ( )A HubB SwitchC RouterD Bridge51.IEEE802.2 protocol belong to ( )layerA networkB MACC LLCD physical52.IEEE802.11 protocol defines ( )rules.A Ethernet BusB wireless WANC wireless LAND Token Bus53.In data link-layer, which protocol is used to share bandwidth? ( )A SMTPB ICMPC ARPD CSMA/CD54.When two or more nodes on the LAN segments transmit at the same time, there will be a collision and all of the transmitting nodes well enter exponential back-off, that is all of the LAN segments belong to the same( ).A collision domainB switchC bridgeD hub55.( )allows different nodes to transmit simultaneously and yet have their respective receivers correctly receive a sender’s encoded data bits.A CDMAB CSMAC CSMA/CDD CSMA/CA56.Because there are both network-layer addresses (for example, Internet IP addresses) and link-layer addresses (that is, LAN addresses), there is a need to translate between them. Forthe Internet, this is the job of ( ).A RIPB OSPFC ARPD IP57.PPP defines a special control escape byte, ( ). If the flag sequence, 01111110 appears anywhere in the frame, except in the flag field, PPP precedes that instance of the flag pattern with the control escape byte.A 01111110B 01111101C 10011001D 1011111058.The device ( ) can isolate collision domains for each of the LAN segment.A modemB switchC hubD NIC59.In the following four descriptions about PPP, which one is not correct? ( )A PPP is required to detect and correct errors.B PPP is not required to deliver frames to the link receiver in the same order in which they were sent by the link sender.C PPP need only operate over links that have a single sender and a single receiver.D PPP is not required to provide flow control.60.In the PPP data frame, the( ) field tells the PPP receivers the upper-layer protocol to which the received encapsulated data belongs.A flagB controlC protocolD checksum61.PPP’s link-control protocols (LCP) accomplish ( ).A initializing the PPP linkB maintaining the PPP linkC taking down the PPP linkD all of the above62.The PPP link always begins in the ( ) state and ends in the ( ) state. ( )A open, terminatingB open, deadC dead, deadD dead, terminating63.For( ) links that have a single sender at one end of the link and a single receiver at the other end of the link.A point-to-pointB broadcastC multicastD all of the above64.With ( )transmission, the nodes at both ends of a link may transmit packets at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous65.With ( ) transmission, a node can not both transmit and receive at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous66.Which of the following functions can’t be implemented in the NIC? ( )A encapsulation and decapsulationB error detectionC multiple access protocolD routing67.Which of the following four descriptions is wrong? ( )A The bus interface of an adapter is responsible for communication with the adapter’s parent node.B The link interface of an adapter is responsible for implementing the link-layer protocol.C The bus interface may provide error detection, random access functions.D The main components of an adapter are the bus interface and the link interface. 68.For odd parity schemes, which of the following is correct? ( )A 011010001B 111000110C 110101110D 00011011069.( )divides time into time frames and further divides each time frame into N time slots.A FDMB TMDC CDMAD CSMA70.With CDMA, each node is assigned a different ( )A codeB time slotC frequencyD link71.Which of the following four descriptions about random access protocol is not correct? ( )A A transmission node transmits at the full rate of the channelB When a collision happens, each node involved in the collision retransmits at once.C Both slotted ALOHA and CSMA/CD are random access protocols.D With random access protocol, there may be empty slots.72.PPP defines a special control escape byte 01111101. If the data is b1b201111110b3b4b5, the value is( )after byte stuffing.A b1b20111110101111110b3b4b5B b1b20111111001111101b3b4b5C b5b4b30111111001111101b2b1D b5b4b30111110101111110b2b173.MAC address is in ( ) of the computer.A RAMB NICC hard diskD cache74.Which of the following is wrong? ( )A ARP table is configured by a system administratorB ARP table is built automaticallyC ARP table is dynamicD ARP table maps IP addresses to MAC addresses75.NIC works in ( )layer.A physicalB linkC networkD transport76.In LAN, if UTP is used, the common connector is( ).A AUIB BNCC RJ-45D NNI77.The modem’s function(s) is(are) ( ).A translates digital signal into analog signalB translates analog signal into digital signalC both translates analog signal into digital signal and translates digital signal into analog signalD translates one kind of digital signal into another digital signal78.( )defines Token-Ring protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.279.( )defines Token-Bus protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.280.( ) defines CSMA/CD protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.281.The computer network that concentrated in a geographical area, such as in a building or on a university campus, is ( )A a LANB a MANC a WAND the Internet82.The MAC address is ( ) bits long.A 32B 48C 128D 25683.Which of the following four descriptions about MAC addresses is wrong? ( )A a MAC address is burned into the adapter’s ROMB No two adapters have the same addressC An adapter’s MAC address is dynamicD A MAC address is a link-layer address84.Which of the following four descriptions about DHCP is correct? ( )A DHCP is C/S architectureB DHCP uses TCP as its underlying transport protocolC The IP address offered by a DHCP server is valid foreverD The DHCP server will offer the same IP address to a host when the host requests an IP address85.The ( )field permits Ethernet to multiplex network-layer protocols.A preambleB typeC CRCD destination MAC address86.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( ) meters.A 50B 100C 200D 50087.An entry in the switch table contains the following information excepts for ( )A the MAC address of a nodeB the switch interface that leads towards the nodeC the time at which the entry for the node was placed in the tableD the IP address of a node二、阅读理解The central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, while its speed and capacity have increased tremendously. Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap.The CPU comprises the control unit and the arithmetic / logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices. The ALU performs all the arithmetic and logical (comparison) functions — that is, it adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.Tell whether the following statements are true(T) or false(F) according to the passage A.(根据上文的内容判断下列句子的正误)1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control unit of the CPU. ( )3. The CPU comprises the control unit and memory. ( )4. The control unit performs all the arithmetic and logical (comparison) functions5. The central processing unit (CPU) is the heart of the computer systems. ( )三、翻译下面的文章。

《计算机专业英语》期末考查试卷(B卷)及答案

《计算机专业英语》期末考查试卷(B卷)及答案

适用专业:translate them into Chinese.(20points)1、GUI2、RAM3、OS4、BIOS5、ALU(20points)( )1.Who contributed the stored-program technique first?A.V on NeumannB.ThomasC.Bill gatesD.John P.Eckert( )2.What is the main component of ENIAC?A.VLSIB.LSIC.transistorD.vacuum tube( )3.Data enters the computer is call .rmationB.inputC.outputD.program( )4.A computer usually have the following secondary devices except .A.CD-ROMB.tapeC.video diskD.floppy disk( )5.There are several stages in the software development process.Afive B.two C.three D.four( )6. How many frames do films require per second?A.24B.30C.60D.288( )7.The is the speed at which a hard drive finds data.A.capacityB.versionC.costD. average access time( )8.There are several kinds of system software,such as .A.Microsoft WordB.DelphiC.virusD.Windows( )9. Multimedia PC can run multimedia application, normally equipped with a sound card, a high-resolution color monitor and .A.modemB.registerC.CD-ROM driveD.synthesizer( )10.Which protocol does Internet mainly use?A.The OSI reference modelB.TCP/IPC.File Transfer PotocolD.HTTPⅢ.Match the following terms or phrases. (20points)1、position ( ) A.生存周期2、sample ( ) B.模拟系统3、workstation ( ) C.维护4、install ( ) D.补丁5、processor ( ) E.指令6、debug ( ) F.安装7、circuit ( ) G.工作站8、instruction ( ) H.处理器9、memory ( ) I.终端10、register ( ) J.存储器11、patch ( ) K.采样12、maintain ( ) L.调试13、lifecycle ( ) M.远程登录14、performance ( ) N.电路15、desktop ( ) O.定位16、telnet ( ) P.寄存器17、terminal ( ) Q.性能18、project ( ) R.项目19、encode ( ) S.桌面20、simulator ( ) T.编码Ⅳ.Translate the following sentences into Chinese. (20points)1. For the vast majority of ordinary home and business users, what really matters on their home computers may be four things related to technology.2.If a user accesses a document containing a macro virus and unwittingly executes this macro virus, it can then copy itself into that application's startup files. The computer is now infected——a copy of the macro virus resides on the machine.3.The way in which a virus becomes active depends on how the virus has been designed,e.g. macro viruses can become active if the user simply opens,closes or saves an infected document.4.A boot sector virus can only infect a machine if it is used to boot-up your computer,e.g. if you start your computer by using a floppy disk with an infected boot sector, your computer is likely to be infected.Ⅴ. Writting(20points)What is network? Please try to describe it by your own words(no less than 100 words).《计算机专业英语》期末考查试卷答案(B)Ⅰ.Write the full names of the following words and translate them into Chinese.1.GUI:Graphical User Interface 图形用户界面2.RAM:Random Access Memory 随机存储器3.OS:Operating System 操作系统4.BIOS:Basic Input Output System 基本输入输出系统5.ALU: Arithmetic and Logic Unit 算术和逻辑单元Ⅱ.Choose the best words for the following sentences.ADBBA ADDABⅢ.Match the following terms or phrases.O K G F H L N E J P D C A Q S M I R T BⅣ.Translate the following sentences into Chinese.1、对于绝大多数一般的家庭和商业用户来说,技术上真正重要的是以下四项:噪音、尺寸、键盘和显示器。

《计算机专业英语》期末考试试卷A卷及答案

《计算机专业英语》期末考试试卷A卷及答案

适用专业:1、What is the name of the first electronic numerical computer? ()A. Altair 8800B. ENIACC. ENV ACD. All wrong2、Which does not use the stored-program technique? ()A. Altair 8800B. ENV ACC. ENIACD. All wrong3、What does RAM stand for? ()A. A power supplyB. Random Access MemoryC. Read-only MemoryD. All wrong4、The main component of ENIAC is ()A.TransitorB. Vacuum cubeC. LSID. All wrong5、Who contributed the stored-program technique first? ()A. Bill GatesB. John P.EckertC. Von NeumannD. All wrong6、Which is not one of the four parts that comprise a processor? ()A. ClockB. MemoryC. RegisterD. ALU7、A computer system contains input device, output device, CPU and _________. ()A. ROMB. RAMC. MemoryD. Register8、The processor consists of ____________. ()A. clock, ALU, register and operation codeB. ALU, instruction control, clock and registerC. CPU, memory, register and clockD. instruction control, clock, operation code and operand9、Which is the heart and soul of a computer, and it can manipulate data and control all the rest part of the computer? ()A. MemoryB. Input deviceC. RegisterD. CPU10、Which of the following tells CPU where to find the data to be manipulated? ()A. ClockB. Instruction control unitC. Operation codeD. Operand11、When we buy a computer, we usually consider the ________ first, that means a clock’s frequency. ()A. Main frequencyB. boardC. displayD. keyboard12、________ holds control information, key data and some intermediate results. ()A. RegisterB. Instruction control unitC. ALUD. Storage13、When electric current does not pass through transistors on the microchip, the switch is ________ and it represents a ____________. ()A. Off, 1B. Off, 0C. On, 1D. On, 014、An OA consists of one or more ________ that manage the operations of a computer. ()A. InterfacesB. ProgramsC. Kernel techniquesD. Account number15、In order to complete specific file and program management tasks, Windows XP uses a ________ that icons can easily be seen on the screen. ()A. Plug and PlayB. Media PlayerC. GUID. IE16、Which is the enhanced network property of Windows XP? ()A. Remote desktopB. Multi-user operationC. IE 6.0D. A and C17、Early on, program worked with the most primitive ______________. ()A. Natural languageB. High-level languageC. Assembly languageD. Machine language18、The first assembly languages emerged in the late ______________. ()A. 1940sB. 1950sC. 1960sD. 1970s19、The __________ is language that was represented by long strings of ones-zeroes. ()A. High-level languageB. Assembly languageC. Machine languageD. Low-level language20、__________ can be assigned different values within the program. ()A. ExpressionsB. ParametersC. VariablesD. Pointers21、Which is a piece of a statement that describes a series of computations to be performed on some of program’s variables? ()A. An expressionB. A functionC. A variableD. A pointer22、A protocol is a set of ______________. ()A. DriversB. ServersC. RegulationsD. hardwares23、Which of the following statements are not the steps of website design? ( )A. Determine consumersB. Webpage designC. Surf the WWWD. Publish the website24、When you edit your webpage, your steps do not include ____________. ( )A. Create user-friendly navigationB. Page layoutC. Publish your websiteD. Using graphic25、____________ is not search engine? ( )A. GoogleB. baiduC. NetscapeD. taobao二、连线题(25小题,每题1分,共25分)注:从右侧表中选择最合适的选项,将对应的标号填入左表中。

计算机专业英语期末试题及答案

计算机专业英语期末试题及答案

计算机专业英语试题及答案Ⅰ. Vocabulary(词汇)(30分) (一).Translate the the following following following words words words and and and expressions expressions expressions into into into Chinese(Chinese(写出下列词组的汉语。

)(共10分,每题1分) 1.operating system 2.requirements analysis 3.network security 4.data structure 5.decision support system 6. relational database 7. software crisis 8. computer virus 9. email attachment 10.central processing unit ( CPU ) (二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。

) (共10分,每题1分) 1.数据库管理系统 2.传输控制协议.传输控制协议 3.多文档界面 4.面向对象编程 5.只读存储器 6.数字视频光盘 7.计算机辅助设计 8.结构化查询语言 9.通用串行总线 10.企业之间的电子商务交易方式.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。

)(10分,每空1分) 1. multimedia a.字处理器字处理器2. software life cycle b.交换机交换机3. structured programming c.多媒体多媒体4. functional testing d.局域网局域网5. word processor e.结构化程序设计结构化程序设计6. code windows f.软件生命周期软件生命周期7. firewall g.功能测试功能测试8. LAN h.代码窗口代码窗口9. hacker i.黑客黑客10. switch j.防火墙防火墙1. 6. 2. 7. 3. 8. 4. 9. 5. 10. Ⅱ. Comprehension(阅读理解) (一)Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。

计算机专业英语期末试题及答案A

计算机专业英语期末试题及答案A

信息工程学院学院计算机专业英语课程期末考试试卷A一、Translate the following words and expressions into Chinese.(写出下列词组汉语思) (10分每题1分)::button:Panel:structure:table::8.hypermedia:9.information superhighway:language:二、Match the following words and expressions in the left column with those similar meaning in the right column.(将左列的词汇与右列相应的汉语匹配。

) (10分每题1分): a . 数据库管理系统: b. 应用程序设计接口: c . 基本输入/输出系统: d. 数字视频光盘:. e .互联网服务提供商: f . 中央处理单元: g . 结构化查询语言:.h .直接存储器存取: i .超文本传输协议: j .万维网三、Tell whether the following statements are true(T) or false(F) according to the passageA(根据下文的内容判断下列句子的正误)(15分每题3分)Passage A:For a Web user, the home page is the first Web page that is displayed after startinga Web browser like Netscape's Navigator or Microsoft's Internet Explorer. The browseris usually preset so that the home page is the first page of the browser manufacturer. However, you can set it to open to any Web site. For example, you can specify that orbe your home page. You can also specify that there be no home page (a blank space willbe displayed) in which case you choose the first page from your bookmark list or entera Web address.For a Web site developer, a home page is the first page presented when a user selectsa site on the World Wide Web. The usual address for a Web site is the home page address,although you can enter the address (Uniform Resource Locator) of any page and have thatpage sent to you.1. Home pages for a Web user or a Web site developer have the same meanings.()2. The home page displayed on a Web browser is usually preset by the browser manufacturer.()3. The home page for a Web user can be reset to any Web site you prefer.()4. You have to enter or select Web addresses every time with a blank space on your Webbrowser.()5. Web addresses usually lead to relative home pages.()四、choose the best answer according to the passage B.(根据下文的内容选择正确的答案。

计算机专业英语期末测试卷

计算机专业英语期末测试卷

计算机专业英语期末测试卷计算机专业英语试题命题⼈:王晓萍姓名:__________ 班级:___________ 分数:__________________ ⼀、英汉互译并写出缩写的全称(20分)1.Operating system_____________ 2.Network security_____________ 3.Tree structure_______________ 4.Supervisor password____________ 5.Application software____________ 6.PC _________________________ 7.Computer virus________________ 8.BIOS__________________ 9.CPU________________________10.计算机程序____________________11.软件测试_____________________ 12. ⼦⽂件夹________________13. 主菜单__________________14. 微处理器________________15. 升级软件________________16. 副作⽤__________________17. 搜索引擎________________18. 备份____________________19. ⾜够内存________________20. 域名____________________⼆、判断题(对的填T, 错的填F)(5分)1 计算机病毒是⼀种程序()2 病毒通常会具有副作⽤()3 反病毒软件只可以扫描病毒()4 假如想要进⾏表格计算,我们要选择PowerPoint.()5 Microsoft Office是⼀款办公⾃动化软件。

()三、选择题(25分其中英语的每题2分)1 “firewall”的意思是()A 防⽕墙B 防盗⽹C 核导弹D 不锈钢2 假如想要进⾏⽂本编辑,我们需要选择的程序是()A PPTB ExcelC PSD Word3 ISP代表的是()A 游戏玩家B 等级C 因特⽹服务提供商D QQ4 下列哪种邮箱的写法是正确的()A 123445566677B dihgoojgngjjpngn@C 845446738@/doc/b0a025e8c8d376eeaeaa31ae.htmlD 都努⼒及格哈@/doc/b0a025e8c8d376eeaeaa31ae.html5 下列说法正确的是()A骇客是指对计算机感兴趣且精通的狂热分⼦B⿊客是指侵⼊别⼈计算机,进⾏破坏的⼈C⿊客是指长的很⿊的⼈DAB都对6. The basic units of a computer system are as follows: _________A. CPU, memory and diskB. CPU, input and output unitC. CPU, memory and I/O systemD. CPU, memory and ALU7. Today, ______can give you a video camera, a fax machine, a CD-ROM drive, ect.A. input devicesB. expansion cardsC. output deviceD. joystick8. When power is removed, information in the semiconductor memory is ________ .A. reliableB. lostC. manipulatedD. remain9. _________ is designed to manage large bodies of information.A. a file systemB. a transactionC. a database systemD. a database language10. A characteristic of operating system is _________ .A. resource managementB. memory managementC. error recoveryD. all the above11. An ISP supplies a _________ that you can dial from your computer to log on the internet server.A. public keyB. private keyC. service numberD. help file12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. Followings are some image data file formats, which is wrong? _______A.*.TIFB. *.DOCC. *.BMPD. *.GIF14. By adding _________ to your programs, you can make computers more interesting and much more fun for the user.A. multimediaB. textC. musicD. picture15. Followings are all software, which is not the antivirus software?A Kaspersky Antivirus B. Jiangming softwareC. Rising softwareD. Spyware四、将左列的词汇与右列相应的汉语匹配。

英文版计算机试题及答案

英文版计算机试题及答案

英文版计算机试题及答案一、选择题(每题2分,共20分)1. Which of the following is not a function of an operating system?A. Process managementB. Memory managementC. Data storageD. File management2. In a computer network, what does the term "bandwidth" refer to?A. The width of the network cableB. The maximum rate of data transferC. The number of users connectedD. The speed of the network processor3. What is the primary purpose of a firewall?A. To prevent unauthorized access to a networkB. To encrypt dataC. To manage network trafficD. To store user passwords4. Which of the following is a type of software used for creating and editing documents?A. Spreadsheet softwareB. Database softwareC. Word processing softwareD. Graphics software5. What is the term used to describe the process of converting data from one format to another?A. Data migrationB. Data transformationC. Data conversionD. Data translation6. What does the acronym "CPU" stand for in computing?A. Central Processing UnitB. Central Processing UnitC. Computer Processing UnitD. Computing Processing Unit7. What is the function of a router in a network?A. To connect multiple networksB. To store dataC. To provide power to devicesD. To print documents8. What is the process of finding and fixing errors in software called?A. DebuggingB. PatchingC. UpdatingD. Patching9. Which of the following is a type of computer virus that replicates itself by attaching to other programs?A. TrojanB. WormC. RansomwareD. Spyware10. What is the term for the graphical representation of data on a computer screen?A. Data visualizationB. Data representationC. Data graphingD. Data mapping二、填空题(每题2分,共20分)1. The _________ is the primary memory used by a computer to store data and instructions that are currently being processed.2. A _________ is a type of software that allows users to create and edit images.3. The process of converting analog signals to digital signals is known as _________.4. A _________ is a collection of data stored in a structured format.5. The _________ is a hardware component that connects a computer to a network.6. In computer programming, a _________ is a sequence of statements that perform a specific task.7. The _________ is a type of malware that hides its presence and waits for a trigger to activate.8. A _________ is a type of software that is designed to protect a computer from unauthorized access.9. The _________ is the process of organizing and managing data in a database.10. A _________ is a type of software that allows users tocreate and edit spreadsheets.三、简答题(每题10分,共30分)1. Describe the role of a server in a computer network.2. Explain the difference between a compiler and an interpreter in programming.3. Discuss the importance of data backup and recovery in a computing environment.四、编程题(每题15分,共30分)1. Write a simple program in Python that calculates the factorial of a given number.2. Create a function in Java that takes an array of integers and returns the largest number in the array.答案:一、选择题1. C2. B3. A4. C5. C6. A7. A8. A9. B10. A二、填空题1. RAM (Random Access Memory)2. Graphics software3. Analog-to-digital conversion4. Database5. Network interface card (NIC)6. Function or procedure7. Trojan8. Antivirus software9. Database management10. Spreadsheet software三、简答题1. A server in a computer network is a powerful computer or system that manages network resources, including hardware and software, and provides services to other computers on the network, such as file storage, web hosting, and print services.2. A compiler is a program that translates source codewritten in a programming language into machine code that a computer can execute. An interpreter, on the other hand, reads and executes the source code line by line without the need for a separate compilation step.3. Data backup and recovery are crucial in a computing environment to prevent data loss due to hardware failure, software bugs, or malicious attacks. Regular backups ensure that data can be restored to a previous state in case of corruption or deletion.四、编程题1. Python Program for Factorial Calculation:```pythondef factorial(n):if n == 0:return 1 else:。

计算机专业英语期末考复习资料(推荐文档)

计算机专业英语期末考复习资料(推荐文档)

考试范围:Unit 1,Unit2, Unit3.3,3.4,3.5, Unit 4.1, 课后练习,以及翻译练习一,单选15题(30%)范围:1.ENIAC were called ____A__,and typically cost more than a million dollarsA. mainframesB. PCC. minicomputerD. Microcomputerputers are _____D___devices that can follow ________ to accept input, process that input, and procedure information.A. electric, wordsB. electrical, instructuresC. electronic, wordsD. electronic instructions3.___D__ printer uses heat element to produce images on heat-sensitive paper.A. Dot-MatrixB.Ink-JetC. LaserD.Thermal4.____A__ directs the movement of electronic signals between memory and the ALU.A. Control unitB.CPUC. MotherboardD.Memory5._____B__ is short for characters per second.A. MIPS(每秒钟百万条指令)B.CPS(中央处理系统)C. CPUD.OS6._____A___ operating system is the most widely used operating system.A. WindowsB.UnixC. LinuxD.Mac7.DOS means_____C___.A. 光盘操作系统B. 软盘操作系统C.磁盘操作系统 D. 硬盘操作系统8.Software Crisis means_____D___.A. 软件开发B. 软件需求C.硬件危机 D. 软件危机9.下面哪个单词的含义是“封装”____B____.A. inheritance (继承)B. encapsulationC. polymorphism (多态性)D. prototype (原型;样机;样品)10.____B___is just a particular type of computer system.A. BrowserB.JavaC. PlatformD.Virtual machine (虚拟机)11. B is used to communicate with another computer over telephonelines.A. keyboardB. modemC. mouseD. printer12. C is a device that enables the computer to handle sounds.A. network cardB. video cardC. sound cardD. monitor13. A is a word processing tool that helps you to create qualitydocuments.A. Word 2003B. Outlook 2003C. Access 2003D. Excel 200314. B is the latest(最新)desktop version of the Windows operatingsystem from Microsoft.A. Windows NTB. Windows 7C. Windows VistaD. WindowsXP15.Which one is not a computer languages? AA. PowerpointB. PASCALC. JavaD. C++16.The heart of a computer system is _ A___A.CPUB. hard diskC. memoryD. main board17.A virus(病毒)is a A.A. programB. computerC. bad manD. beast18.The basic hardware(基本硬件)components of a personal computerconsist of the D .A. keyboard and mouseB. storage devices(存储设备)and displayC. CPUD. all of above19.The central processing unit (CPU) has two parts:A .A. control unit(控制单元)and ALU(算术逻辑单元)B. ALU and registerC. register(注册)and control unitD. ALU and memory20.The more popular operating system is B operating system.A. MS DOSB. WindowsC. UNIXD. Linux21.The desirable features(特点)of the software produced by object-oriented designs(面向对象设计)are the following aspects expect D .A. minimal coupling(最小的耦合)B. functional cohesion(函数内聚)C. information hiding(信息隐藏)D. hierarchical date base(层次数据库)22.Which one of the following descriptions(描述)is not true aboutsoftware crisis? CA. Software is hard to estimate and scheduled.(软件难以评估和使用)B. Software becomes increasingly expensive.(软件变得越来越昂贵)C. Software is almost impossible to identify.(软件是几乎不可能确定)D. Software is almost impossible to manage. (软件是几乎是不可能的管理)23.In computer science, AI is the abbreviation(简称)of theB .A. Adequate IntakeB. Artificial Intelligence(人工智能)C. Analogy InputD. Appreciative Inquiry24 C are the only languages understood by computers.A. High-level languagesB. Assembly languages(汇编语言)C. Machine languages(机器语言)D. Object-oriented programming languages25.The biggest in size, the most expensive in price than any other is classified(分类)and known as A .A. Super ComputersB. MainframesC. MinicomputersD.Portable Computers二,判断10题(10%)范围:以课后练习为主三,阅读理解4篇20题(40%)P16 4,5,6段P37 倒1 P57 倒数2段(java)P67 1,3,5,6段1、In order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer.If you want to solve the computational problem with a computer, you should learn how to program.The task of developing programs for the soultion of computational problems is referred to as programming.Computer programming is the process of planning and creating a sequence of steps for a computer to follow.In general,this process will help usresolve a problem,which is either too tedious (冗长的) or difficult to work out otherwise.So programming is breaking a task down into small steps.译:为解决计算问题,其解决方案必须被指定在一个计算步骤的序列,每一个可能由一个人或一个数字计算机。

计算机 专英期末试题

计算机 专英期末试题

Part IListen to the audio for each question. Determine which lecture the audio came from and write the letter that corresponds to the answer on the space provide below. Each answer may be used more than once. Each question will be repeated twice before continuing to the next question. This entire section will be repeated twice. (2 point per question, 20 points total)A. Creation of the ComputerB. NerdsC. How the Internet worksD. Pirates of Silicon Valley1. _______ 6. _______2. _______7. _______3. _______8. _______4. _______9. _______5. _______10. _______Part IIListen to both statements I and II for each question. Determine which statement is related to the concept stated in the question. Choose the SINGLE correct answer in the space provided. Each answer may be used more than once. Each question will be repeated twice before continuing to the next question. This entire section will be repeated twice. (2 point per question, 20 points total)A. I onlyB. II onlyC. Both I and IID. None of the above1. ________ What is a G U I.2. ________ The purpose of a proxy.3. ________ Reasons why Macintosh did not sell very well against IBM’s PC.4. ________ Mainframe Computers.5. ________ Apple’s Killer Applicati on.6. ________ Charles Babbage’s Machines.7. ________ A type of spreadsheet program.8. ________ The invention of the Microprocessor.9. ________ Hollerith’s tabulating machine.10. ________ Reason(s) why IBM entered the PC market.Part IIIBase y our answers on the audio you’ve heard for each question. Answer question in the space provided as either T(True) or F(False). Each question will be repeated twice before continuing to the next question. This entire section will be repeated twice.(2 point per question, 20 points total)1. __ T______ Data packets are of different sizes.2. ___?_____ Windows 95 is the biggest product launch in the history of the PC.3. ___?____ IBM made computers for large companies, not personal computers.4. ____F____ Xerox dominated the computer industry in the 1970’s.5. ____F____ The Macintosh was cheaper than the IBM PC.6. ___ F_____ Early computational tables were perfect without any mistakes.7. ___T_____ Intel didn’t understand the power of their microprocessors at first.8. ___T_____ There was a culture clash between IBM and Microsoft9. ___F_____ Steve Jobs sold over a hundred Apple I computers.10. ____?____ Hollerith’s machine is capable of handling the railroad business.Part IV5 point per question, 40 points totalAnswer each of the following questions completely in the space provided in the following pages. Make sure the answer provided address all the sub questions.1. List the following according to the order they were invented and their importance:UNIV AC, Colossus, Analytical Engine, ENIAC, Personal Computersa)Analytical Engineb) Colossusc) UNIV ACd) ENIACe) Personal Computers2. Explain what Steve Ballmer meant by “Riding the Bear”: Who was the bear and whydo you need to ride it? What is a KLOC and why did Steve Ballmer have a problem with IBM using KLOCs?3. Please describe the functions and purpose of each of the following networkcomponents, be as complete as possible:Router – A router looks at a packet and determines the direction to send (router) the packet.Proxy – A proxy server provides a layer of security as a filter to prevent access to undesirable websites.Firewall – It examines the contents of the incoming and outgoing packets to determine whether or not to let it through; It provides a security layer to the network.4. Please explain why IBM developed their own operating system OS/2? And why didMicrosoft agree to develop OS/2 for IBM?5. Write the name of the company the following people started and what was eachperson’s contribution to the PC revolution?Paul Allen –_____ Microsoft __________ ;He established the Microsoft with Bill Gates and bought the Q-DOS from others.Steve Wozniak – _____Apple__________ ;He established the Apple with Steve Jobs and invented the AppleⅠand AppleⅡ.Ed Roberts – ___MITS____________ ;He invented the first pc Altair 88006. What is the concept of a killer application? What was Apple II’s killer application?What was IBM’s killer application?7. What were the 3 things shown to Steve Jobs at PARC? And what does each of the 3things do?a)b)c)8. Why did Steve Jobs want to develop the Macintosh? Why didn’t the Macintosh sellvery well against IBM’s PC? Why did Macintosh become popular?。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

计算机英语期末考试试题
I. Choose the best answer to each of the following questions. (20%)
is used to communicate with another computer over telephone lines
A. keyboard B .modem C. printer D. mouse
a device that enables the computer to handle sounds.
A. network card
B. video card
C. sound card
D. monitor
3. __________ refers to the parts of the computer that you can see and touch.
A. Software
B. Hardware
C. Hardship
D. Instruction
4. The display screen is the most common device used to show you what
the computer is doing.
A. input
B. printing
C. output
D. electronic
5. _________ are programs that provide access to Web resources
A. browsers
B. database
C. URL
D. E-commerce
is a word processing tool that helps you to create quality documents.
A. Word 2003
B. Outlook 2003
C. Access 2003
D. Excel 2003
7. __________ is a fast and powerful operating system, based on the UNIX .
A. Windows 2003
B. Office 2003
C. Windows 2003
D. Linux
8. A virus is a __________
A. program
B. computer
C. bad man
D. beast
9. TCP/IP are the two standard protocols for communications on the __________.
A. web
B. computer
C. Internet
D. network
10. B2C involves individuals selling to ___________.
A. client
B. consumer
C. corporation
D. company
II. Decide whether the following statements are True or False. (20%)
1.( ) The CPU is the processor of a computer.
2.( ) Windows NT is designed for replacement of Windows.
3.( ) A computer is only connected by cable lines, such as telephone
lines.
4.( ) Air can be used to transit data.
5.( ) Search engines help you to locate information on the Web
6.( ) B2C involves individuals selling to individuals.
7.( ) Databases are widely used
8.( ) Oracle is the largest database system vendor in the world.
9.( ) Complete access and complete security are good for information
security
10.( ) Portable computer can fit in a briefcase or even in the palm of
your hand.
III. Translation: English to Chinese (20%)
1. CPU_____________________
2. OS __________________________
3. LAN_____________________
4. B2B__________________________
5. CEO_____________________
6. ATM__________________________
7. DBMS____________________ 8. URL__________________________
9. personal computer _______________________________________
10. storage device _________________________________________
11. information exchanges ___________________________________
12. protocol ______________________________________________
13. broadband ____________________________________________
_______________________________________________
15. search engine __________________________________________
16. update ________________________________________________
Site _______________________________________________
18. human resources _________________________________________
19. environment _____________________________________________
20. computer virus ___________________________________________
IV. Word-matching (20%)
1.LCD a. 主页
2.menus b. 黑客
3.bus c.超链接
4.WAN d. 冲浪
5.home page e液晶显示器
6.E-commerce f 菜单
7.hacker g 总线
8.surfing h 广域网
9.delete i电子商务
10.hyperlink j 删除
V.Translation (20%)
1. Computer hardware has four parts: the central processing unit (CPU) and memory,
storage hardware, input hardware, and output hardware.
2. Software refers to computer programs.
3. Computer network is a system connecting two or more computers.
4. Communication is the most popular Internet activity
5. The backbone of this electronic commerce is the Internet.
6. DBMS has the ability to access large amounts of data efficiently.
7. Security is important throughout the information life-cycle
8. If you have access to a personal computer (PC) and can connect to the Internet
with a browser, you can do business online.
9. Business receive raw materials as input, add value to them through various
processes, and sell the finished product as output to customers.
10. As new viruses are created everyday, upgrade your anti-virus software
regularly.。

相关文档
最新文档