英文计算机导论试题
计算机英语考试题目及答案
计算机英语考试题目及答案一、选择题1. What does HTML stand for?a) Hyper Text Markup Languageb) High Technology Multimedia Languagec) Home Tool Management Languaged) Human Token Marker Language答案:a) Hyper Text Markup Language2. Which of the following is not a programming language?a) Javab) Pythonc) HTMLd) C++答案:c) HTML3. What is the purpose of CSS?a) To add interactivity to web pagesb) To structure the content of web pagesc) To define the layout and style of web pagesd) To create dynamic web pages答案:c) To define the layout and style of web pages4. What is the function of a router in a computer network?a) To connect computers to the internetb) To store and manage data on a networkc) To protect the network from security threatsd) To direct network traffic between devices答案:d) To direct network traffic between devices5. Which of the following is a commonly used database management system?a) Microsoft Wordb) Adobe Photoshopc) MySQLd) Windows Media Player答案:c) MySQL二、填空题1. The process of converting source code into machine code is called ________.答案:compilation2. The most widely used programming language for web development is ________.答案:JavaScript3. TCP/IP stands for ________.答案:Transmission Control Protocol/Internet Protocol4. The physical components of a computer are referred to as ________.答案:hardware5. SQL stands for ________.答案:Structured Query Language三、简答题1. What are the advantages of using cloud computing?答案:Cloud computing offers several advantages, including:- Cost savings: Companies can reduce their infrastructure costs by using cloud services instead of maintaining their own hardware.- Scalability: Cloud services can easily scale up or down based on demand, allowing businesses to only pay for what they need.- Flexibility: Users can access cloud services from anywhere with an internet connection, enabling remote work and collaboration.- Disaster recovery: Cloud providers often have backup systems in place, ensuring data can be recovered in case of a disaster.- Automatic updates: Cloud services are typically updated regularly by the provider, ensuring users have access to the latest features and security patches.2. Explain the difference between HTTP and HTTPS.答案:HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is not secure, meaning that the data being transmitted can be intercepted and read by anyone. HTTPS (Hypertext Transfer Protocol Secure), on the other hand, is a secure version of HTTP. It uses encryption to ensure that data is encrypted before transmission, making it much more difficult for hackers to intercept and read. HTTPS is commonly used for secure online transactions, such as submitting credit card information or personal details.四、编程题请编写一个Python程序,实现计算圆的面积和周长的功能。
英文版计算机试题及答案
英文版计算机试题及答案Section 1: Multiple Choice Questions (MCQs)1. Which of the following is NOT a programming language?a) Javab) HTMLc) Pythond) SQLAnswer: b) HTML2. What does CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Program UnitAnswer: a) Central Processing Unit3. Which of the following is NOT an input device?a) Keyboardb) Mousec) Printerd) ScannerAnswer: c) Printer4. What does RAM stand for?a) Read-Only Memoryb) Random Access Memoryc) Recordable Audio Mediad) Runtime Activity MonitorAnswer: b) Random Access Memory5. Which of the following is NOT a type of computer network?a) LAN (Local Area Network)b) WAN (Wide Area Network)c) MAN (Metropolitan Area Network)d) CAN (Campus Area Network)Answer: d) CAN (Campus Area Network)Section 2: Short Answer Questions1. Define the term "algorithm."Answer: An algorithm is a step-by-step procedure or set of rules for solving a specific problem or completing a specific task.2. What is object-oriented programming (OOP)?Answer: Object-oriented programming is a programming paradigm that organizes code into objects, which are instances of classes. It emphasizes the concept of objects and their interactions to solve complex problems.3. Explain the difference between static and dynamic memory allocation.Answer: Static memory allocation is performed at compile-time, where memory is allocated for variables and objects before the program execution starts. Dynamic memory allocation, on the other hand, is performed at runtime using functions like malloc() or new(). It allows for the allocation and deallocation of memory during program execution.4. What is the purpose of an operating system?Answer: The operating system is responsible for managing computer hardware and software resources, providing an interface between the user and the computer, and ensuring that various programs and applications can run smoothly. It also provides file management, process management, and memory management.5. Name three programming paradigms.Answer: Three programming paradigms are procedural programming, object-oriented programming, and functional programming.Section 3: Coding Questions1. Write a Java program to find the factorial of a given number.```javaimport java.util.Scanner;public class Factorial {public static void main(String[] args) {Scanner input = new Scanner(System.in);System.out.print("Enter a number: ");int number = input.nextInt();int factorial = 1;for (int i = 1; i <= number; i++) {factorial *= i;}System.out.println("The factorial of " + number + " is " + factorial); }}```2. Write a Python program to check if a number is prime or not.```pythondef is_prime(number):if number < 2:return Falsefor i in range(2, int(number/2)+1):if number % i == 0:return Falsereturn Truenumber = int(input("Enter a number: "))if is_prime(number):print(number, "is prime.")else:print(number, "is not prime.")```3. Write a C program to reverse a given string. ```c#include <stdio.h>#include <string.h>void reverse_string(char* str) {int length = strlen(str);for (int i = 0; i < length/2; i++) {char temp = str[i];str[i] = str[length - i - 1];str[length - i - 1] = temp;}}int main() {char str[100];printf("Enter a string: ");gets(str);reverse_string(str);printf("Reversed string: %s", str);return 0;}```Note: The code provided above is just examples for the coding questions. Please ensure to compile and test the programs before using them in production.Conclusion:In this article, we discussed multiple-choice questions, short answer questions, and coding questions related to computer science and programming. These questions cover various aspects of computer knowledge and can be used for self-assessment or preparation for exams or interviews.。
计算机导论二版课后标准答案(含简称集锦)
计算机导论期末复习试题【英文简称】1.PC:个人计算机Personal Computer2.CPU:中央处理器Central Processing Unit3.RAM:随机存储器Random Access Memory4.LAN:网卡(网卡正式用语应为Network Card)5.MODEM:数据卡或调制解调器Modem6.HUB:集线器7.SWITCH:交换机8.USB:通用串行总线Universal Serial Bus9.IDE:电子集成驱动器Integrated Drive Electronics10.SATA:串行高级技术附件Serial Advanced Technology Attachment 11.SCSI:指SCSI接口规格Small Computer System12.AGP:PC图形系统接口Accelerated Graphics Port13.PCI:外围装置连接端口Peripheral Component Interconnect14.BIOS:基本输入/输出系统Basic Input Output System15.CMOS:互补金属氧化物半导体Complementary Metal Oxide Semiconductor 16.OS:操作系统Operating System17.DOS:磁盘操作系统Disk Operating System18.bit:位(0与1这两种电路状态),计算机数据最基本的单位19.Byte:字节20.RISC :精简指令集系统;21.ALU:算术逻辑单元;22.URL:统一资源定位器23.DBMS:数据库管理系统;24.HTML:超文本标记语言;25.SQL:结构化查询语言;26.MPU:微处理器;27.FTP:文件传输协议28.MIS:管理信息系统;29.TCP:传输控制协议30.CAD:计算机辅助设计31.SMTP :简单邮件传输协议32.DBMS:数据库管理系统33.TCP/IP:传输控制协议/网际协议34.URL:统一资源定位器35.CAM:计算机辅助制造36.POP3:邮局协议37.Intranet :企业内部网38.CPU:中央处理单元39.HTTP:超文本传输协议40.RAM:随机存储器41.DOS:磁盘操作系统42.ASCII :美国信息交换标准码43.DBMS:数据库管理系统44.TCP/IP:传输控制协议/网际协议45.URL:统一资源定位器46.CAI:计算机辅助教学47.Internet :国际互联网48.ROM:只读存储器49.FTP:文件传输协议50.DBS:数据库系统51.LAN:局域网52.MAN:城域网53.WAN:广域网54.DDR:双通道动态随机存储器Double Data Rate55.CIMS:计算机集成制造系统Computer-Integrated Manufacturing System 56.ERP:企业资源计划57.DNS:域名服务器Domain Name System58.GUI:图形用户界面Graphics User Interface59.PnP:即插即用Plug and Play60.RAID:廉价冗余磁盘阵列Redundant Arrays of Inexpensive Disks 61.WWW:万维网World Wide Web62.XML:可扩充标记语言eXtensible Markup Language63.MIP:每秒百万条指令Million Instructions Per Second64.CAE:计算机辅助工程Computer Aided Engineering65.CASE:计算机辅助软件工程Computer Aided Software Engineering 66.DHTML:动态HTML ,Dynamic HTML67.DIY:自己动手作Do It Yourself68.DRAM:动态随机存取存储器Dynamic Random Access Memory。
计算机导论单选题
hardStudent: ___________________________________________________________________________29. Mark works in the marketing division of a company that manufactures microprocessors for computers. The head of his division has asked him to send him an e-mail with predictions for the following year company sales. What type of software is he most likely to use?A. DatabaseB. WorksheetC. PresentationD. Document30. Which program, among the following, allows a user to eliminate unwanted file fragments and maximize on optimizing computer operations?A. System softwareB. Operating systemC. Application softwareD. Utilities31. Which among the following can be classified as being both Internet services and browser-related programs?A. Consumer-to-consumer e-commerceB. Domain namesC. Search enginesD. Web utilities32. The extensions .gov, .edu, .mil, and, .net are calledA. top-level domains.B. e-mail targets.C. domain extensions.D. mail to addresses.33. Wendy is looking for some information on the Internet. She types on the browser. Once the browser is connected, a document file is sent back to Wendy's computer. What does this document contain?A. Location or address of the resourcesB. Domain codeC. Hypertext Markup LanguageD. Web page34. John Kerry would like to get in touch with his ex-girlfriend's friend and ask her out on a date. He knows that they both keep in touch via the Internet. Which is the most suitable option for John?A. To join B. To join C. To join D. To join 35. Which of the following search types would be best suited for finding out who was touring drummer for Marty Robbins in 1965?A. Directory searchB. Keyword searchC. In-site searchD. Reference search36. Creating a bar graph using data selected from a spread sheet is an example of a(n)A. analytical graph.B. graphics software.C. pie chart.D. spreadsheet.37. While working on a document the verbal command "copy" is given and the selected text gets copied. This means that the application supportsA. input keys.B. internal inputs.C. speech recognition.D. commands.38. OLE stands forA. Online Link Embedding.B. Object Link Export.C. Object Linking and Embedding.D. Online Link Emulation.39. When additional information requested appears in the form of visual presentations of what the final result would be, then this list is referred to asA. buttons.B. galleries.C. ribbons.D. contextual tabs.40. Although basic application software programs may include multimedia features, the user interaction in them is very limited becauseA. they are accessed in a linear fashion.B. users don't know about them.C. they are not compatible with the program.D. they cannot be accessed by the users directly.41. One difference between desktop publishing and word processing isA. that desktop publishing allows you to create documents that have professional quality layout and type styles.B. that the first uses graphics, while the second uses text.C. that word processing allows the user to add graphics to a document, while desktop publishing doesn't.D. that word processors work at the command line, while desktop processors work with graphics.42. Vector images areA. composed of pixels.B. composed of thousands of dots.C. slightly more difficult to manipulate than other images.D. composed of objects such as lines, rectangles, and ovals.43. Morphing is aA. way of linking related information.B. way of editing audio.C. sound effect.D. visual effect.44. Ralph travels extensively, and uses a PDA to access his official e-mails when he is not at the office. He also has a desktop at his workplace, which downloads a copy of these e-mails for his records. Identify the categories of operating systems in this example.A. Network and embeddedB. Embedded and stand-aloneC. Stand-alone and networkD. Network, embedded, and stand-alone45. This open source software is free and available from many sources.A. WindowsB. MacintoshC. LinuxD. NetWare46. The next version of Mac OS, which is scheduled to be introduced in late 2006, and allows appropriately equipped Apple computers to use both Mac OS and Windows XP is called:A. TigerB. SpotlightC. DashboardD. Leopard47. Goback Personal Edition is a part ofA. McAfee Office.B. Norton SystemWorks.C. V Communications SystemSuite.D. Visual Studio.48. Which of the following is helpful in enhancing graphics performance, 3-D animations and transferring video data?A. AGPB. ISAC. Graphic coprocessorsD. FireWire buses49. When you reboot your system, the computer takes instructions to start from theA. DRAM.B. SDRAM.C. DDR.D. ROM.50. Precisely timed electrical beats or impulses that indicate the speed of processing or power of a computer system are calledA. the clock speed.B. the beat.C. the pulse.D. the system speed.51. All of the following are commonly used units of measurement to describe memory capacity, except:A. Megabyte (MB).B. Gigabyte (GB).C. Terabyte (TB).D. Nanobyte (NB).52. An automatic identification system used to track objects, people or animals is called a(n)A. image processor.B. smart card.C. RFID tag.D. NIC.53. On the motherboard, the connection points for chips are referred to asA. slots.B. sockets.C. ports.D. lines.54. In case there is a space constraint, the best type of monitor to be used is a:A. flat-panel monitor.B. CRT monitor.C. projector monitor.D. e-book monitor.55. Two categories of laser printers areA. thermal, and personal.B. personal, and shared.C. ink-jet, and high-definition.D. active-matrix, and passive matrix.56. OMR, OCR, and MICR are all types ofA. Radio Frequency Card Readers (RFID).B. magnetic card readers.C. bar code readers.D. character and mark recognition devices.57. Which of the following types of character recognition systems is used for standardized testing like the Graduate Record Examination (GREs)?A. UPCB. MICRC. OMRD. OCR58. What kind of a specialized device or monitor technology is especially useful for graphic artists?A. Flat-panel monitorB. CRT monitorC. High-definition television (HDTV)D. e-books59. DVD-RAMA. is a new type of primary memory.B. is a type of WORM.C. is rewriteable.D. can only store up to 100 MB of data.60. Which of the following statements on hard-disk packs is incorrect?A. Their capacity far exceeds the other types of hard disks.B. They have multiple recording platters aligned one above the other.C. All the access arms of the hard-disk pack move in and out together.D. Both the read/write heads are activated at a given moment.61. These discs have a capacity of 25 to 50 gigabytes.A. HD DVDB. CDC. DVDD. Blu-Ray62. Optical discsA. can hold over 100 gigabytes of data.B. use magnetic charges to represent 1s and 0s.C. typically use a single track that spirals toward the center of the disk.D. are used to distribute large software application packages.63. All of the following are true of DVD-ROM drives exceptA. they are also known as erasable optical discs.B. they can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres.C. they are also known as DVD players.D. DVD-ROM stands for "digital versatile disc–read only memory".64. Hard disks store and organize files using all the following, exceptA. tracks.B. sectors.C. cylinders.D. paths.65. The hard disk's disk surface is scratched and some or all of the data is destroyed when there is aA. head crash.B. cylinder crash.C. track crash.D. sector crash.sdg Key29. (p. 14) Mark works in the marketing division of a company that manufactures microprocessors for computers. The head of his division has asked him to send him an e-mail with predictions for the following year company sales. What type of software is he most likely to use?a. DatabaseB. Worksheetc. Presentationd. DocumentWorksheets are used to analyze things like budgets and to predict sales.Difficulty: HardOLeary - 001 Chapter... #2230. (p. 8) Which program, among the following, allows a user to eliminate unwanted file fragments and maximize on optimizing computer operations?a. System softwareb. Operating systemc. Application softwareD. UtilitiesUtilities (service programs) perform specific tasks related to managing computer resources.Difficulty: HardOLeary - 001 Chapter... #831. (p. 46) Which among the following can be classified as being both Internet services and browser-related programs?a. Consumer-to-consumer e-commerceb. Domain namesc. Search enginesD. Web utilitiesWeb utilities are specialized utility programs that make using the Internet and the Web easier and safer.Difficulty: HardOLeary - 002 Chapter... #2332. (p. 32) The extensions .gov, .edu, .mil, and, .net are calledA. top-level domains.b. e-mail targets.c. domain extensions.d. mail to addresses.Top-level domains (TLD) such as .gov, .edu, .mil, and, .net are used to identify the type of organization.Difficulty: HardOLeary - 002 Chapter... #1033. (p. 32) Wendy is looking for some information on the Internet. She types on the browser. Once the browser is connected, a document file is sent back to Wendy's computer. What does this document contain?a. Location or address of the resourcesb. Domain codeC. Hypertext Markup Languaged. Web pageOnce the browser has connected to the Web site, a document file is sent back to the person's computer which contains Hypertext Markup Language (HTML).Difficulty: HardOLeary - 002 Chapter... #1334. (p. 36) John Kerry would like to get in touch with his ex-girlfriend's friend and ask her out on a date. He knows that they both keep in touch via the Internet. Which is the most suitable option for John?a. To join b. To join C. To join Friend-of-a-friend sites (for instance, ) are designed to bring together two people who do not know one another but share a common friend.Difficulty: HardOLeary - 002 Chapter... #1835. (p. 40) Which of the following search types would be best suited for finding out who was touring drummer for Marty Robbins in 1965?a. Directory searchB. Keyword searchc. In-site searchd. Reference searchIn a keyword search, you enter a keyword or phrase (like "Marty Robbins" drummer 1965) reflecting the information you want.Difficulty: HardOLeary - 002 Chapter... #1936. (p. 72) Creating a bar graph using data selected from a spread sheet is an example of a(n)A. analytical graph.b. graphics software.c. pie chart.d. spreadsheet.Analytical graphs or charts are visual representations of data in a worksheet.Difficulty: HardOLeary - 003 Chapter... #1637. (p. 65) While working on a document the verbal command "copy" is given and the selected text gets copied. This means that the application supportsa. input keys.b. internal inputs.C. speech recognition.d. commands.Speech recognition is the ability to accept voice input to select menu options and dictate text.Difficulty: HardOLeary - 003 Chapter... #738. (p. 87) OLE stands fora. Online Link Embedding.b. Object Link Export.C. Object Linking and Embedding.d. Online Link Emulation.OLE is an acronym for Object Linking and Embedding.Difficulty: HardOLeary - 003 Chapter... #2539. (p. 65) When additional information requested appears in the form of visual presentations of what the final result would be, then this list is referred to asa. buttons.B. galleries.c. ribbons.d. contextual tabs.Galleries simplify the process of making a selection from a list of alternatives by replacing many dialog boxes with visual presentations of potential results.Difficulty: HardOLeary - 003 Chapter... #640. (p. 104) Although basic application software programs may include multimedia features, the user interaction in them is very limited becauseA. they are accessed in a linear fashion.b. users don't know about them.c. they are not compatible with the program.d. they cannot be accessed by the users directly.Although basic applications include multimedia features, they create documents that are generally accessed in a linear fashion and provide very limited user interaction.Difficulty: HardOLeary - 004 Chapter... #1341. (p. 98-99) One difference between desktop publishing and word processing isA. that desktop publishing allows you to create documents that have professional quality layout and type styles.b. that the first uses graphics, while the second uses text.c. that word processing allows the user to add graphics to a document, while desktop publishing doesn't.d. that word processors work at the command line, while desktop processors work with graphics.Desktop publishing allows you to mix text and graphics to create publications of professional quality.Difficulty: HardOLeary - 004 Chapter... #242. (p. 100) Vector images area. composed of pixels.b. composed of thousands of dots.c. slightly more difficult to manipulate than other images.D. composed of objects such as lines, rectangles, and ovals.Vector images use geometric shapes or objects.Difficulty: HardOLeary - 004 Chapter... #943. (p. 108) Morphing is aa. way of linking related information.b. way of editing audio.c. sound effect.D. visual effect.Morphing is a special effect in which one image seems to melt into another.Difficulty: HardOLeary - 004 Chapter... #1844. (p. 130) Ralph travels extensively, and uses a PDA to access his official e-mails when he is not at the office. He also has a desktop at his workplace, which downloads a copy of these e-mails for his records. Identify the categories of operating systems in this example.a. Network and embeddedB. Embedded and stand-aloned. Network, embedded, and stand-aloneEmbedded operating systems are used for handheld computers and smaller devices like PDAs. Stand-alone operating systems, also called desktop operating systems, control a single desktop or notebook computer.Difficulty: HardOLeary - 005 Chapter... #845. (p. 133) This open source software is free and available from many sources.a. Windowsb. MacintoshC. Linuxd. NetWareLinus Torvalds allowed free distribution of the operating system code and encouraged others to modify and further develop the code.Difficulty: HardOLeary - 005 Chapter... #1446. (p. 133) The next version of Mac OS, which is scheduled to be introduced in late 2006, and allows appropriately equipped Apple computers to use both Mac OS and Windows XP is called:a. Tigerb. Spotlightc. DashboardD. LeopardThe next version of Mac OS, Leopard, is scheduled to be introduced in late 2006. It includes Boot Camp, which allows appropriately equipped Apple computers to use both Mac OS and Windows XP.Difficulty: HardOLeary - 005 Chapter... #1847. (p. 138) Goback Personal Edition is a part ofa. McAfee Office.B. Norton SystemWorks.d. Visual Studio.Goback Personal Edition is a part of Norton SystemWorks.Difficulty: HardOLeary - 005 Chapter... #2448. (p. 170) Which of the following is helpful in enhancing graphics performance, 3-D animations and transferring video data?A. AGPb. ISAc. Graphic coprocessorsd. FireWire busesAccelerated graphics port (AGP) is helpful in enhancing graphics performance, 3-D animations and transferring video data.Difficulty: HardOLeary - 006 Chapter... #2349. (p. 164) When you reboot your system, the computer takes instructions to start from thea. DRAM.b. SDRAM.c. DDR.D. ROM.ROM chips typically contain special instructions for detailed computer operations.Difficulty: HardOLeary - 006 Chapter... #2150. (p. 165) Precisely timed electrical beats or impulses that indicate the speed of processing or power of a computer system are calledA. the clock speed.c. the pulse.d. the system speed.The system clock is located on a small specialized chip that produces precisely timed electrical beats or impulses. The clock speed for powerful microcomputers is measured in gigahertz (GHz) or billions of beats per second.Difficulty: HardOLeary - 006 Chapter... #2251. (p. 164) All of the following are commonly used units of measurement to describe memory capacity, except:a. Megabyte (MB).b. Gigabyte (GB).c. Terabyte (TB).D. Nanobyte (NB).There are three commonly used units of measurement to describe memory capacity, Megabyte (MB), Gigabyte (GB), and Terabyte (TB).Difficulty: HardOLeary - 006 Chapter... #2052. (p. 163) An automatic identification system used to track objects, people or animals is called a(n)a. image processor.b. smart card.C. RFID tag.Specialty processors called RFID tags are information chips that are embedded in merchandise to track their locations.Difficulty: HardOLeary - 006 Chapter... #1653. (p. 160) On the motherboard, the connection points for chips are referred to asa. slots.B. sockets.d. lines.Sockets provide the connection point on the motherboard for chips.Difficulty: HardOLeary - 006 Chapter... #554. (p. 199) In case there is a space constraint, the best type of monitor to be used is a:A. flat-panel monitor.c. projector monitor.d. e-book monitor.Because CRTs are too bulky to be transported easily, portable monitors, known as flat-panel monitors, were developed.Difficulty: HardOLeary - 007 Chapter... #1755. (p. 202) Two categories of laser printers area. thermal, and personal.B. personal, and shared.c. ink-jet, and high-definition.d. active-matrix, and passive matrix.Personal laser printers typically do not support color, are less expensive, and are used by many single users. Shared laser printers typically support color, are more expensive, and are used (shared) by a group of users.Difficulty: HardOLeary - 007 Chapter... #2356. (p. 194) OMR, OCR, and MICR are all types ofa. Radio Frequency Card Readers (RFID).b. magnetic card readers.c. bar code readers.D. character and mark recognition devices.These are all character and mark recognition devices, which are scanners that are able to recognize special characters and marks.Difficulty: HardOLeary - 007 Chapter... #1357. (p. 194) Which of the following types of character recognition systems is used for standardized testing like the Graduate Record Examination (GREs)?a. UPCb. MICRC. OMRd. OCROMR is used to score multiple-choice tests such as the GRE.Difficulty: HardOLeary - 007 Chapter... #1258. (p. 200) What kind of a specialized device or monitor technology is especially useful for graphic artists?a. Flat-panel monitorb. CRT monitorC. High-definition television (HDTV)The video and still images in a high-definition television (HDTV) can then be digitized, edited, and stored on disk for later use. This technology is very useful to graphic artists, designers, and publishers.Difficulty: HardOLeary - 007 Chapter... #2159. (p. 227) DVD-RAMa. is a new type of primary memory.b. is a type of WORM.C. is rewriteable.d. can only store up to 100 MB of data.DVD-RAM is rewriteable.Difficulty: HardOLeary - 008 Chapter... #2060. (p. 224) Which of the following statements on hard-disk packs is incorrect?a. Their capacity far exceeds the other types of hard disks.b. They have multiple recording platters aligned one above the other.c. All the access arms of the hard-disk pack move in and out together.D. Both the read/write heads are activated at a given moment.Only one of the read/write heads is activated at a given moment.Difficulty: HardOLeary - 008 Chapter... #1361. (p. 228) These discs have a capacity of 25 to 50 gigabytes.a. HD DVDb. CDc. DVDD. Blu-RayBlu-Ray is a very different format than either the DVD or the HD DVD format and has a capacity of 25 to 50 gigabytes.Difficulty: HardOLeary - 008 Chapter... #2162. (p. 226) Optical discsa. can hold over 100 gigabytes of data.b. use magnetic charges to represent 1s and 0s.C. typically use a single track that spirals toward the center of the disk.d. are used to distribute large software application packages.Unlike the concentric tracks and wedge-shaped sectors used for floppy and hard disks, however, optical discs typically use a single track that spirals toward the center of the disk.Difficulty: HardOLeary - 008 Chapter... #1763. (p. 227) All of the following are true of DVD-ROM drives exceptA. they are also known as erasable optical discs.b. they can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres.c. they are also known as DVD players.d. DVD-ROM stands for "digital versatile disc–read only memory".Rewriteable—CD-RW stands for compact disc rewritable, also known as erasable optical discs.Difficulty: HardOLeary - 008 Chapter... #1964. (p. 222) Hard disks store and organize files using all the following, excepta. tracks.b. sectors.c. cylinders.D. paths.Hard disks store and organize files using tracks, sectors, and cylinders.Difficulty: HardOLeary - 008 Chapter... #965. (p. 222) The hard disk's disk surface is scratched and some or all of the data is destroyed when there is aA. head crash.b. cylinder crash.c. track crash.d. sector crash.A head crash occurs when a read/write head makes contact with the hard disk's surface or with particles on its surface, and some or all of the data is destroyed.Difficulty: HardOLeary - 008 Chapter... #10。
大学英语计算机试题及答案
大学英语计算机试题及答案1. Multiple Choice Questions1. What is the purpose of a compiler?a) to convert high-level programming code into machine codeb) to debug and fix errors in a programc) to manage memory allocation in a programd) to handle user input and outputAnswer: a) to convert high-level programming code into machine code2. Which of the following is an object-oriented programming language?a) Cb) Javac) Assemblyd) FortranAnswer: b) Java3. What is the function of an operating system?a) to compile and execute programsb) to provide an interface for users to interact with the computerc) to manage hardware resources and schedule tasksd) to store and retrieve data from a databaseAnswer: c) to manage hardware resources and schedule tasks4. What does HTML stand for?a) Hyper Text Markup Languageb) High-level Machine Languagec) Home Tool for Management and Learningd) Human Translated Multimedia LanguageAnswer: a) Hyper Text Markup Language5. Which of the following is a database management system?a) Microsoft Excelb) Adobe Photoshopc) Oracle Databased) NotepadAnswer: c) Oracle Database2. Fill in the Blanks1. The process of finding and fixing errors in a program is called ______.Answer: debugging2. The ______ is responsible for controlling and coordinating the activities of all hardware and software components in a computer system.Answer: operating system3. In object-oriented programming, a ______ is a blueprint for creating objects.Answer: class4. HTTP stands for ______.Answer: Hypertext Transfer Protocol5. SQL stands for ______.Answer: Structured Query Language3. Short Answer Questions1. Explain the difference between compiler and interpreter.Answer: A compiler translates the entire program into machine code before execution, whereas an interpreter translates and executes the program line by line.2. What is an algorithm?Answer: An algorithm is a step-by-step procedure or a set of rules for solving a specific problem or completing a specific task.3. Name two types of computer memory.Answer: RAM (Random Access Memory) and ROM (Read-Only Memory).4. What is a network protocol?Answer: A network protocol is a set of rules and conventions that govern the communication between devices on a network.5. Explain the concept of recursion in programming.Answer: Recursion is the process of a function calling itself, either directly or indirectly. It allows for solving complex problems by breaking them down into smaller, more manageable parts.4. Essay Questions1. Discuss the impact of artificial intelligence on society.Answer: Artificial intelligence has the potential to revolutionize various aspects of society, including healthcare, transportation, and employment. It can improve diagnosis and treatment in medicine, enable self-driving cars, and automate repetitive tasks. However, concerns about job displacement and ethical implications of AI must also be considered.2. Describe the major components of a computer system and their functions.Answer: A computer system consists of the central processing unit (CPU) which performs calculations and executes instructions, memory for temporary data storage, input devices for receiving user input, output devices for displaying or presenting information, and storage devices for long-term data retention.3. Compare and contrast object-oriented programming and procedural programming.Answer: Object-oriented programming (OOP) focuses on objects that contain both data and behavior, allowing for modular and reusable code. Procedural programming, on the other hand, uses procedures or functions toperform tasks. OOP promotes code organization, while procedural programming is more procedural and linear in nature.4. Discuss the advantages and disadvantages of cloud computing.Answer: Benefits of cloud computing include scalability, cost-effectiveness, and easy accessibility to data and services. However, concerns such as data security, dependency on internet connectivity, and potential vendor lock-in should be considered.5. Explain the concept of cybersecurity and its importance.Answer: Cybersecurity refers to the practice of protecting computer systems and networks from unauthorized access, damage, or theft of data. It is of paramount importance in today's digital age to safeguard personal information, prevent cybercrimes, and maintain the integrity of critical infrastructure.Note: The above article provides an example of how a 5000-10000 word essay on "University English Computer Exam Questions and Answers" can be structured and written. The exact content and length may vary depending on the specific questions and answers provided.。
计算机英语试题及答案
计算机英语试题及答案一、选择题(每题2分,共20分)1. The basic unit of data in a computer is:A. ByteB. BitC. KilobyteD. Megabyte答案:B2. Which of the following is not a function of an operating system?A. Memory managementB. Process managementC. Hardware managementD. Web browsing答案:D3. The term "CPU" stands for:A. Central Processing UnitB. Computer Personal UnitC. Computer Programming UnitD. Cybernetic Processing Unit答案:A4. In computer networking, "LAN" refers to:A. Local Area NetworkB. Long-Distance Area NetworkC. Local Access NetworkD. Long-Access Network答案:A5. What is the role of a "router" in a computer network?A. To connect different networksB. To store dataC. To print documentsD. To control access to the internet答案:A6. The process of converting programs into machine language is known as:A. InterpretationB. CompilationC. DebuggingD. Encryption答案:B7. Which of the following is a type of programming language?A. HTMLB. JPEGC. MP3D. DOCX答案:A8. What does "GUI" stand for in computing?A. Graphical User InterfaceB. General User InterfaceC. Graphical User InformationD. Global User Interface答案:A9. A "firewall" is a security device designed to:A. Prevent unauthorized access to a networkB. Control the temperature in a computer roomC. Store firewalls for later useD. Monitor the flow of data in a network答案:A10. The acronym "URL" stands for:A. Uniform Resource LocatorB. Unique Resource LocatorC. Universal Resource LocatorD. User Resource Locator答案:A二、填空题(每题2分,共20分)11. The binary system uses only two digits: 0 and ______.答案:112. A gigabyte is larger than a megabyte, with 1 gigabyte equal to 1,024 megabytes.13. The most common type of connection between a computer and the internet is through a(n) ______.答案:modem14. In programming, a ______ is a sequence of instructions that a computer can execute.答案:program15. A ______ is a type of software that allows users to browse the internet.答案:web browser16. The ______ is the primary component of a computer that performs most of the processing.答案:CPU17. Data encryption is a method of converting data into a code to ______ unauthorized access.答案:prevent18. A ______ is a set of rules governing the structure of data and the way it is transmitted.答案:protocol19. The ______ is a type of software that provides a graphical interface for interacting with the computer.答案:operating system20. A ______ is a hardware device that connects multiple computers together in a network.答案:switch三、简答题(每题10分,共20分)21. Explain the difference between a compiler and aninterpreter in programming.答案:A compiler is a software tool that translates the entire source code of a program into machine language before execution. It processes the code as a whole and produces an executable file that can be run independently of the compiler. On the other hand, an interpreter translates and executes the source code line by line or block by block, without creatinga separate executable file. Interpreters run the codedirectly and are typically used for scripting languages.22. Describe the function of a database management system (DBMS).答案:A database management system (DBMS) is a software system that allows users to create, modify, and manage databases. It provides a way to store, organize, and retrieve data efficiently. The main functions of a DBMS includecreating the structure of a database, entering and retrieving data, maintaining data integrity, and controlling access tothe data. It also supports advanced operations such as querying, indexing, and transaction management.四、翻译题(每题15分,共30分)23. 将以下句子从英文翻译成中文:"The Internet of Things (IoT) is a network of physical objects embedded with electronics, software, sensors, andnetwork connectivity which enables these objects to collect and exchange data."答案:物联网(。
(完整word版)计算机专业英语试题
计算机专业英语试题I.V ocabulary(词汇)(30分)(一)Translate the following words and expressions into Chinese.(写出下列词组的汉语。
共10分,每题1分)1.Operating system____________2.white bOx testing__________3.hard disk_________4.management information system_______________5.electronic commerce___________________6.relational database__________________7.software engineering___________________8.software maintenance__________________9.menu bar______________10. network security___________________(二)Fill in the blank swith the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
共10分,每题1分)1.只读存储器__________ 2.广域网___________3.传输控制协议___________ 4,文件传送[输]协议__________5.通用串行总线__________ 6.面向对象编程____________7.集成开发环境___________ 8.结构化查询语言___________9.数据库管理系统___________ 10.开放系统互连______(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
(完整word)计算机专业英语试题及答案,推荐文档
计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hacker i. 黑客 10. switch j.防火墙1. 6. 2. 7. 3. 8. 4. 9. 5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
计算机专业英语考试试题及答案
计算机专业英语考试试题及答案一、选择题1. Which of the following is NOT a programming language?A. JavaB. PythonC. HTMLD. CSS2. What does the acronym "SQL" stand for?A. Structured Query LanguageB. Simple Query LanguageC. Script Query LanguageD. Secure Query Language3. Which protocol is commonly used for sending and receiving emails?A. FTPB. HTTPC. SMTPD. TCP4. What does the term "CPU" refer to?A. Central Processing UnitB. Computer Processing UnitC. Central Program UnitD. Computer Program Unit5. Which of the following is NOT a type of network topology?A. StarB. RingC. MeshD. Scroll二、填空题1. HTML stands for Hypertext Markup Language, which is used for ____________.2. The process of converting source code into machine code is called ____________.3. IP address stands for ____________.4. The act of copying files from a remote server to a local computer is known as ____________.5. The programming language developed by Apple Inc. for iOS and macOS is ____________.三、简答题1. What is the difference between a compiler and an interpreter? Provide examples of programming languages that use each of these methods.2. Explain the concept of object-oriented programming (OOP) and provide an example of a programming language that utilizes this paradigm.3. Describe the client-server model and provide an example of a commonly used protocol within this model.四、论述题Discuss the impact of artificial intelligence (AI) on various industries. Provide examples of how AI is being used in fields such as healthcare, finance, and transportation. Analyze the potential benefits and challenges of implementing AI in these industries.答案:一、选择题1. C. HTML2. A. Structured Query Language3. C. SMTP4. A. Central Processing Unit5. D. Scroll二、填空题1. creating and structuring the content of a webpage2. compilation3. Internet Protocol4. downloading5. Swift三、简答题1. A compiler translates the entire source code into machine code before the program is executed. Examples of languages that use compilers are C, C++, and Java. On the other hand, an interpreter translates and executes the source code line by line. Python and Ruby are examples of languages that use interpreters.2. Object-oriented programming (OOP) is a programming paradigm that organizes data and functions into reusable objects. It focuses on the concept of classes and objects, allowing for code reuse and encapsulation. An example of a programming language that uses OOP is Java, where objects are instances of classes and can interact with each other through methods and attributes.3. The client-server model is a distributed computing architecture wherea server provides services or resources to multiple clients. The clients request and receive these resources through the network. An example of a commonly used protocol within this model is the Hypertext Transfer Protocol (HTTP), which is used for communication between web browsers (clients) and web servers.四、论述题Artificial intelligence (AI) has had a significant impact on various industries. In healthcare, AI is being used for diagnoses and treatments, analyzing medical images, and personalized medicine. For example, AI-powered algorithms can help detect diseases like cancer at an early stage, leading to better treatment outcomes. In finance, AI is utilized for fraud detection, algorithmic trading, and customer service. AI algorithms can analyze large amounts of financial data to identify patterns and make accurate predictions. In transportation, AI is being employed for autonomous vehicles, traffic management, and logistics optimization. Self-driving cars, for instance, use AI algorithms to navigate and make decisions on the road.The implementation of AI in these industries brings about many benefits, such as increased efficiency, improved accuracy, and cost savings. AI systems can process and analyze vast amounts of data much faster than humans, leading to faster and more accurate results. However, there are also challenges to consider. Privacy and security concerns arise as AI systems handle sensitive information. There is also the worry of job displacement, as AI automation may replace certain human tasks. Additionally, ethical considerations need to be addressed, such as bias in algorithms and the potential for AI to be used for malicious purposes.Overall, the impact of AI on various industries is undeniable. It has the potential to revolutionize healthcare, finance, transportation, and many other sectors. However, careful implementation and regulation are necessary to ensure its responsible and beneficial use.。
(完整word版)计算机导论试卷及答案
一、Multiple Choice单选题(每个空2分,共40分)1. Turing Machine is ( C ).A。
the very first electronic computer B。
the first general-purpose computerC. an abstract mathematical modelD. the first commercial computer2.The transistor was used to make the main processing component in the hardware in the ( B ) generation of computer。
A。
first B. second C。
third D. fourth3。
In computing discipline we always analyse problems by removing complexity and details,leaving only the necessary information。
This mental thinking way is ( D ).A。
engineering B. top-down design C. simplicity D. abstraction4.813 is not a number in ( C )number system。
A. hexadecimalB. decimalC. octal D。
12-base5.The information in real world is often ( A )while computer can only represent ( D )information。
This is a limitation of computing。
A。
analog B. decimal C. binary D. digital6. The following are audio formats except ( C )。
计算机专业英语试题
计算机专业英语试题一、选择题(20分,每题2分)1. There are two main sections found in the CPU of a typical personal computer system: the arithmetic-logic section and ( ).A. the control sectionB. the registersC. the data processing sectionD. the bus section2. ( ) is the functional unit that provides the computer with logical and computational capabilities.A. The control unitB. MemoryC. The Arithmetic/Logical UnitD. Register3. One megabyte equals approximately ( ).A. 1000000 bytesB. 1024 bytesC. 65535 bytesD. 10000 bytes.4. When power is removed, information in the semiconductor memory is ( ).A. reliableB. lostC. manipulatedD. remain5. The ( ) are usually located at the top of the keyboard and they are used to give the computer commands.A. function keysB. arrow keysC. numeric keysD. special-purpose keys6. In Excel, formulas and functions can be used to perform statistics or computations of data in ( ).A. electronic spreadsheetsB. sheetsC. filesD. documents7. To facilitate execution of I/O operations, most ( ) have a standard set of control instructions to handle the processing of all input and output instructions.A. operating systemsB. softwareC. system dataD. I/O system8. ( ) may near to relation to any given computer but does assume that a computer is going to be used.A. A high-level programming languageB. Machine languageC. A low-level programming languageD. Assembly language9. The ( ) must retrieve each of the required physical records and construct the logical view of the data requested by the user.A. data processorB. databaseC. DBMSD. MIS10. Computers that are part of a ( ) can share data, messages, graphics, printers, fax machines, modems, CD-ROMs, hard disks, and other data storage equipment.A. systemB. unitC. structureD. network二、词汇题(15分,每个1分)(一)写出下列缩略词的全称DBMS()RAM ()LAN()TCP/IP ( ) SQL ( )(二)将下列短语翻译成英语中央处理器()多道程序设计()缓冲技术()办公自动化()汇编语言()(三)将下列英文短语翻译成汉语Machine Language ()Object-Oriented Language ( ) bus topology ( ) The data link layer ( ) Entity-relationship (ER) modeling ( )三、翻译题(35分,句子每题5分,段落每题10分)1. In a big mainframe computer the processor is called a Central Processing Unit, or CPU, while ina microcomputer, it is usually known as a microprocessor.2. The program, which tells the computers what to do and the data, which provide the information needed to solve the problem, are kept inside the computer in a place called memory.3. A modem is a device that converts data from digital computer signals to analog signals that can be sent over a phone line.4. Microsoft Excel is a spreadsheet program that allows you to organize data, complete calculations, make decisions, graph data, develop professional looking reports, publish organized data on the Web, and access real-time data from Web sites.5. Operating systems can use virtual memory to run processes that require more main memory than is actually available.6. An operating system is a program, which acts as an interface between a user of a computer and the computer hardware. The purpose of an operating system is to provide an environment in which a user may execute programs. The primary goal of an operating system is thus to make the computer system convenient to use. A secondary goal is to use the computer hardware in an efficient manner. An operating system is similar to a government. Its hardware, software, and data provide the basic resource of a computer system. The operating system provides the means for the proper use of these resources in the operation of the computer system. Like government, the operating system performs no useful function by itself. It simply provides an environment within which other programs can do useful work.四、问答题(30分,每题10分)1.What is a Processor? Describe components of the Processor.2. Describe the basic application software: Microsoft Office automation (Word, Excel, PPT).3. Describe the seven layers of the OSI reference model.。
计算机导论双语试题及答案
计算机导论双语试题及答案(题目)(正文)Part I(选择题)请在每道题后方括号内写出你认为正确的选项。
1. 计算机科学的定义是什么?A. 研究计算机硬件的科学。
B. 研究计算机软件的科学。
C. 研究计算机及其应用的科学。
[C]2. 计算机硬件主要包括以下哪些组成部分?A. CPU和内存。
B. 操作系统和应用软件。
C. 输入设备和输出设备。
[C]3. 下列哪个是计算机二进制系统中使用的数字?A. 十进制。
B. 二进制。
[B]C. 八进制。
4. 哪种编程语言是计算机与人类交互的桥梁?A. 机器语言。
B. 汇编语言。
C. 高级语言。
[C]5. 下列哪种计算机网络覆盖范围最广?A. 局域网。
B. 城域网。
C. 互联网。
[C]Part II(问答题)请用英文回答以下问题。
1. What is the difference between hardware and software?Hardware refers to the physical components of a computer system, such as the CPU and memory, while software refers to the programs and data used by the computer.2. What is the binary system in computing?The binary system is a number system that uses only two digits, 0 and 1, to represent all numeric values and data in a computer.3. What is the role of an operating system in a computer?The operating system acts as an intermediary between the user and the computer hardware, managing the resources and providing a user-friendly interface for interacting with the computer.4. What is the significance of computer networks?Computer networks allow computers to communicate and share resources, enabling the exchange of information and facilitating collaboration on a global scale.5. What is programming language?A programming language is a set of instructions and rules used to write computer programs, allowing humans to communicate their instructions to the computer.Part III(编程题)请用您熟悉的编程语言完成以下任务。
(完整word版)计算机导论试卷及答案
一、Multiple Choice单选题(每个空2分,共40分)1. Turing Machine is ( C ).A. the very first electronic computerB. the first general-purpose computerC. an abstract mathematical modelD. the first commercial computer2.The transistor was used to make the main processing component in the hardware in the ( B ) generation of computer.A. firstB. secondC. thirdD. fourth3. In computing discipline we always analyse problems by removing complexity and details, leaving only the necessary information. This mental thinking way is ( D ).A. engineeringB. top-down designC. simplicityD. abstraction4.813 is not a number in ( C ) number system.A. hexadecimalB. decimalC. octalD. 12-base5.The information in real world is often ( A ) while computer can only represent ( D ) information. This is a limitation of computing.A. analogB. decimalC. binaryD. digital6. The following are audio formats except ( C ).A. mp3B. wavC. gifD. au7.English is represented in ( D ) character set.A.ASCIIB. UnicodeC. neither ASCII nor UnicodeD. either ASCII or Unicode8. Images can be represented in ( C ).A.raster-graphics formatB. vector-graphics formatC. either A or BD. neither A nor B9.The most fundamental operations performed by computer hardware is ( D ).A.logical functions such as NOT, AND and ORB.arithmetic operations such as addition, subtraction and multiplicationC.instructions such as load, store and processD.on or off of an electrical flow10.In a ( A ) circuit, the input values explicitly determine the output.binationalB. sequentialC. S-R latchD. register11. Small storage area in CPU is called ( A ).A. registerB. memoryC. diskD. ROM12. The von Neumann architecture’s two primary components are its ( B ) , which stores both instructions and data, and its processor, which provides operations for modifying the contents of the memory.A. control unitB. memoryC. input/output devicesD. secondary storage devices13. Imperative programming languages are abstractions of the underlying von Neumann computer architecture. The central features of imperative languages are variables, which model the memory cells; and ( A ), which model data transmitted from memory to the CPU.A. assignment statementsB. Boolean expressionsC. conditional statementsD. looping statements14. Object-oriented languages have an essential ingredient ( B ) which enforces information hiding.A. objectB. encapsulationC. inheritanceD. polymorphism15. The concept of process is defined as a ( D ) in execution.A. applicationB. softwareC. processD. program16. ( B ) is the technique of keeping multiple programs in main memory at the same time.A. MultimediaB. MultiprogrammingC. MultiuserD. Multiprocessor17. In a(n) ( A ), response time is crucial; a minimum response time is guaranteed to the user.A. real-time systemB. time-sharing systemC. batch systemD. operating system18. File extension indicates ( A ).A.file media typeB. file operationC. file protectionD. file location19. The World Wide Web is both an infrastructure of information and the network software used to access it. The Web is comprised of web sites and web pages connected by ( C ) .A. gatewaysB. URLsC. linksD. wires二、Fill in the Blanks(每空2分,共20×2=40分)1. The fundamental question underlying all of computing is: What can be (efficiently) automated?2. The place value of digit '1' in 1039 in 13-base number system is 133.3. Negative decimal number -10 is represented as 10001010 in 8-bit sign-magnitude binary, and represented as 11110110 in 8-bit 2's complement.4.Binary real number 0.11 is 0.75 in decimal.5. Suppose a language containing 200 characters. To represent this language in computer, we need at least 8 bits to represent each character.6.The yellow color is represented as the RGB value (255,255,0) .7. The key problem in representing video information in computer is CODEC/compression .8. As for the following circuit, the Boolean expression of the output is A·B+(A+B) .When A is 0 and B is 1, the output is 1 .9. One approach to developing an algorithm is using the top-down design methodology which breaks a problem up into a set of subproblems, the solutions of which create a solution to the overall problem. This approach results in a hierarchical/tree structure of modules.10.In Pep/7 virtual computer, if we want to load a decimal number 7 into A register, the instruction should be written as 00001000 00000000 00000111 .11. In Pep/7 virtual computer, given the following state of memory (in hexadecimal),0001 A20002 110003 FF0004 00After the execution of the instruction “00001001 00000000 00000011”, the content of the A register is FF00 (in hexadecimal).12. Suppose that list of cylinder requests is 30, 40, 12, 20, 66. Assume that the disk is positioned at cylinder 20. If Shortest-Seek-Time-First disk scheduling algorithm is used ,the order in which these requests are handled is 20,12,30,40,66 .ing the directory tree shown in Figure 11.4 , Page 372 in the textbook, assuming the current working directory is C:\WINDOWS\System, the absolute path of john.doc is C:\My Documents\letters , and the relative path of john.doc is ..\..\My Documents\letters .14.The network protocol that breaks messages into packets, reassembles them at the destination, and takes care of errors is TCP .15.Broadband is network technologies that generally provide data transfer speeds greater than 128K bps.16. Web pages are created using HTML, a language that uses tags to indicate the nature of a piece of information and how it should be displayed. Every HTML document is interpreted by (web) browser to be shown as a web page.三、Reading Comprehension(每小题2分,共2×5=10分)Broadly, all files can be classified as either a text file or a binary file. In a text file the bytes of data are organized as characters from the ASCII or Unicode character sets. A binary file requires a specific interpretation of the bits based on the information in the file.The terms text file and binary file are somewhat misleading. They seem to imply that the information in a text file is not stored as binary data. Ultimately, all information on a computer is stored as binary digits. These terms refer to how those bits are formatted: as pieces of 8 or 16 bits, interpreted as characters, or in some other special format.Some information lends itself to a character representation, which often makes it easier for a human to read and modify. Any text editor can be used to create, view, and change the contents of a text file, no matter what specific type of information it contains. For other information types, it is more logical and efficient to represent data by defining a specific binary format and interpretation. Only programs set up to interpret that type of data can be used to view or modify it.1. Which of the following statements is false? ( C )A. A text file contains data organized as charactersB. A text file does not require information to interpret its bytes of dataC. A text file is not stored as binary dataD.A text file is composed of pieces of 8 or 16 bits2. The phrase “those bits” refers to ( B ) in previous sentences.A.“all information on a computer”B.“binary digits”C.“the information in a text file”D.“binary data ”3. Suppose there are two different text editors: “ed1” and “ed2”. Text file “txt1”is created by ed1. Then “txt1” can be viewed and modified by ( C ).A. only “ed1”B. only “ed2”C. either “ed1” or “ed2”D. neither “ed1” nor “ed2”4. Suppose there are two binary files “b1” and “b2” . “b1” is created by program “p1”, and “b2” is created by program “p2”. Which of the following statements is true? ( D )A.“p1” can not modify “b1”B.“p1” can not modify “b2”C.“p1” may not be able to modify “b1”D.“p1” may not be able to modify “b2”5. “For other information types, it is more logical and efficient to represent data by defining a specific binary format and interpretation”means “other information types” should be stored as ( B ).A. text filesB. binary filesC. programsD. computer information四、Answer The Following Questions(每小题5分,共10分)1. Convert decimal number 1019 and 2150 to octal numbers. Then add these two numbers in octal number system.1019=177382150=41468(以上3分)17738+41468=61418(以上2分)2. When we create a C++ program as a .cpp file in Visual C++6.0 and click “run”to run the program, what actually happens?C++ is a high-level programming language. Programs written in it must be translated into machine code to be run by the computer.compiler or interpreted: translates C++ program into object file or machine code file .exe 2分(linker: link the object file and library codes into an executable file .exe)machine code file is loaded into memory by loader . 画横线的关键词每个1分。
2013级《计算机导论(双语)》期末考试试题A卷
2013-2014学年第1学期2013级《计算机导论》期末考试试题A卷考试时间:2013年12 月15日班级学号姓名✧要求答案写在答题纸上,不必抄题;✧要求在每个大题号(I, II, III,IV,V)前划一个满页的横线,以便教师批阅;✧要求在答题纸和试题纸上都写上班级、学号和姓名,交卷时一并交上来。
I、Choice Questions(25 questions, 1 score for each question)1.In the von Neumann model, the _____ subsystem performs calculations and logical operations.a. ALUb. input/outputc. memoryd. control unit2.According to the von Neumann model, _____ stored in memory.a. only data areb. only programs arec. data and programs ared. none of the above3.In extended ASCII, each symbol is _____ bits.a. 7b. 8c. 9d. 104.An image can be represented in a computer using the _____ method.a. bitmap graphicb. vector graphicc. matrix graphicd. a or b5.How many symbols can be represented by a bit pattern with 10 bits?a. 128b. 256c. 512d. 10246. A byte consists of _____ bits.a. 4b. 8c. 32d. 167.To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then _____ the bit patternand the mask.a. NOTb. ANDc. ORd. XOR8.In _____ number representation, there are two representations for 0.a. sign-and-magnitudeb. one’s complementc. two’s complementd. a and b9.In paging, a program is divided into equally sized sections called _____.a. pagesb. framesc. segmentsd. partitions10.The _____ scheduler creates a process from a job and changes a process back to a job.a. jobb. processc. virtuald. queue11.A process in the ready state goes to the running state when _____.a. it finishes runningb. it enters memoryc. it gets access to the CPUd. it requests I/O12.Every process is a _____.a. jobb. programc. partitiond. a and b13._____ is a program that facilitates the execution of other programs.a. An operating systemb. Hardwarec. A queued. An application program14._____ can occur if a process has too many resource restrictions.a. Starvationb. Synchronizationc. Pagingd. Deadlock15.The _____ layer of the OSI model is responsible for node-to-node delivery of a frame betweentwo adjacent stationsa. transportb. networkc. data-linkd. session16.The network layer protocol of TCP/IP is called _____.a. TCPb. UDPc. IPd. a and b17._____ topology needs cable terminators.a. busb. ringc. stard. all of the above18.A router operates at _____ layer of the OSI model.a. all layersb. the first four layersc. the first three layersd. application19.The _____ memory contains a copy of a portion of main memory.a. CPUb. cachec. maind. ROM20.If the memory address space is 16 MB and the word size is 8 bits, then _____ bits are needed toaccess each word.a. 8b.16c. 24d. 3221.In the _____ method to synchronize the operation of the CPU with the I/O device, the I/O deviceinforms the CPU when it is ready for data transfer.a. programmed I/Ob. DMAc. isolated I/Od. interrupt-driven I/O22.The data in _____ are erased if the computer is powered down.a. RAMb. ROMc. a tape drived. a CD-ROM23._____ is a protocol for mail services.a. FTPb. SMTPc. TELNETd. HTTP24.A _____ document has fixed contents.a. staticb. dynamicc. actived. all of the above25.The OSI model has _____ layers.a. 5b. 6c. 7d. any of the aboveII、Questions(5 questions, 4 scores for each question)1.What are the parts of a CPU?2.What steps are needed to convert audio data to bit patterns?3.What are the steps in a machine cycle? four types of network connecting devices.5.What are four necessary conditions for deadlock?III、Calculation(5 subjects, 4 scores for each subject)1.ing an 8-bit allocation, first convert the following numbers to two’s complement, do the3.4.There are four bytes (xC1, x80, x00, x00) in memory with 32-bits IEEE format, representing asingle precision floating-point number, show the floating-point number in decimal.5.Change the -19.875 decimal numbers to binary numbers, and show it in 32-bit IEEE format, andthen convert the result to hexadecimal.IV、Analyzing(3 subjects)1.( 6 scores ) A computer uses memory-mapped I/O addressing. The address bus uses 10 lines (10bits). If memory is made of 1000 words, how many four-register controllers can be accessed by this computer?2.( 7 scores ) A list contains the following elements. Using the binary search algorithm, trace thesteps followed to find 56. At each step, show the values of first, last and mid.8, 13, 17, 26, 44, 56, 88, 973.( 7 scores ) Using the selection sort algorithm, manually sort the following list and show yourwork in each pass.14, 7, 23, 31, 40, 56, 78, 9, 2V、Design(2 subjects)1.( 7 scores ) Write a recursive algorithm in pseudocode to find the greatest common divisor (gcd)of two integers using following defintion.gcd ( x , y ) = x if y = 0gcd ( x , y ) = gcd ( y , x mod y ) otherwise2.( 8 scores ) Draw a flowchart for an algorithm that finds the largest of a set of integers. You donot know the number of integers.。
计算机英语 试题及答案
计算机英语试题及答案Introduction:In this article, we will provide you with a collection of computer English exam questions along with their answers. This will serve as a helpful resource for those studying computer science or preparing for any computer-related exams. Please note that the format of the questions and answers will be presented in a clear and organized manner, without the use of section numbers or headings.Question 1:What is the difference between RAM and ROM?Answer:RAM stands for Random Access Memory, whereas ROM stands for Read Only Memory. The main difference between these two is that RAM is a volatile memory that can be read from and written to by the computer, while ROM is non-volatile and its contents are not easily altered.Question 2:What is the purpose of an operating system?Answer:An operating system (OS) is a software that manages computer hardware and software resources and provides common services for computer programs. Its primary purpose is to enable user interaction with the computer and ensure the efficient execution of programs.Briefly explain the concept of object-oriented programming (OOP).Answer:Object-oriented programming is a programming paradigm that organizes software design around objects, which can contain data and code. It focuses on the concepts of encapsulation, inheritance, and polymorphism, allowing for modular and reusable code.Question 4:What is a firewall and what role does it play in computer security?Answer:A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its main role is to prevent unauthorized access to or from a private network, providing an additional layer of protection against cyber threats.Question 5:What is the difference between HTTP and HTTPS?Answer:HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure. The main difference between them is that HTTP is not secure and data transmitted using this protocol is not encrypted, making it vulnerable to eavesdropping. In contrast, HTTPS encrypts the data, ensuring secure communication over the internet.Define the term "cloud computing" and explain its advantages.Answer:Cloud computing refers to the delivery of computing services, including storage, servers, software, databases, networking, and more, over the internet. Its advantages include cost savings, scalability, flexibility, remote accessibility, and automatic software updates.Question 7:What is the purpose of a database management system (DBMS)?Answer:A DBMS is a software that allows users to create, manage, and manipulate databases. Its purpose is to provide an interface for interacting with databases, ensuring efficient storage, retrieval, and manipulation of data.Question 8:Explain the concept of artificial intelligence (AI) and provide an example of its application.Answer:Artificial intelligence is a branch of computer science that deals with creating intelligent machines that can perform tasks requiring human-like intelligence. One example of AI application is machine learning algorithms that analyze large datasets to make predictions or identify patterns.Question 9:What are the common programming languages used for web development?Answer:Common programming languages used for web development include HTML, CSS, JavaScript, Python, PHP, and Ruby. These languages are used to create web pages, define their appearance, enable interactivity, and handle server-side processes.Question 10:Define the term "network topology" and describe the four basic types.Answer:Network topology refers to the physical or logical layout of interconnected devices in a computer network. The four basic types are:1. Bus Topology: All devices are connected to a central backbone, calleda bus.2. Star Topology: All devices are connected to a central hub or switch.3. Ring Topology: Devices are connected in a closed loop, forming a ring.4. Mesh Topology: Each device is connected to every other device in the network.Conclusion:In this article, we have presented a collection of computer English exam questions along with their answers. These questions cover various aspects ofcomputer science and provide a comprehensive overview of important concepts. We hope that this resource will be useful to those studying computer science or preparing for related exams.。
计算机技术导论试题及答案(Introduction to computer technology questions and answers)
计算机技术导论试题(3)及答案(Introduction to computer technology questions (3) and answers)Judgment question(1) the gradual development of software is the trend of computer development. (a)Correct mistake(2) the basic number of the 8 decimal system is from 1 to 8.(b)Correct mistake(3) the formula of Radix weight expansion can be used to convert the number of R Radix to 10 decimal number. (a)Correct mistake(4) there are also byte order problems in UTF-8. (b)Correct mistake(5) at work, the power is suddenly interrupted and all the information in the ROM will be lost. B)Correct mistake(6) the commonly used CD-ROM disk can only read the information and cannot write it. (a)Correct mistake(7). In the virtual memory of the memory hierarchy "memory - secondary level. (a)Correct mistake(8) computer software refers to programs running on a computer.(b)Correct mistake(9) the name of the Excel worksheet is determined by the file name. (b)Correct mistake(10) graphics and graphics related data cannot be processed in Excel. (b)Correct mistake(11) the number of tuples in a relation is limited. (a)Correct mistake(12) the database is the core of the database system. (b)Correct mistake(13) in a database system, data is no longer oriented to an application, but is described and organized as a whole and managed uniformly by DBMS, so data can be shared by multiple users and multiple applications. (a)Correct mistake(14) DNS is not only a distributed database, but also a service of application layer in TCP/IP protocol. (a)Correct mistake(15) using interconnect devices, hubs can form a bus type network. (b)Correct mistake(16) the computer network is logically divided into data processing subnet and communication subnet. (b)Correct mistake(17) Dreamweaver can only page layout in tabular form. (b)Correct mistake(18) using the framework structure, you can browse multiple pages at home. (a)Correct mistake(19) in a symmetric key cryptography system, the two parties must share the secret key in advance. (a)Correct mistake(20) in order to realize secure communication, in the public key cryptography system, the encryption key is secret, and the decryption key is public. (b)Correct mistakeRadio examination(21) the host consists of (a).ALU, memory and controllerArithmetic and controllerInput device and output deviceMemory and controller(22) large cluster computer technology is a computer system that uses a number of separate (b) computers that work like a machine.CPUComputerROMCRT(23) the largest number of the following is (D).(1010010) 2(512) 8(00101000) BCD(235) 16(24). Known Chinese characters "study" of the machine code is D1A7H, which is the national standard code (a).5127HFive thousand one hundred and twenty-seven4907HFour thousand nine hundred and seven(25) the number of 8 bit complement machines in -128 is (a).(10000000) 2(11111111) 2(01111111) 2Cannot represent(26) the data range of the integer N represented by 8 bit word length complement is (a).-128 to 127-127 to 127-127 to 128-128 to 128(27). N 8 bit integer code representation of the data range is(B).-128 to 127-127 to 127-127 to 128-128 to 128(28) the complement number (10000000) 2, arithmetic right shift, one bit and logical shift to one bit, respectively, are (a).(11000000) 2 and (01000000) 2(01000000) 2 and (11000000) 2(01000000) 2 and (01000000) 2(11000000) 2 and (11000000) 2(29).Which operation can eliminate 0 bits (a) of some bits in a data?.andorwrongXOR(30) one encoding of a character in a UCS-4 encoding scheme requires C bytes.OneTwoFourEight(31) the following items do not belong to the computer performance index (D).FrequencyWord lengthOperation speedDo you have CD-ROM?(32) keyboard, mouse and (b) are all part of the important user interfacePrinterMonitorScannerHandwriting pen(33) which does not belong to the external device (a)?.Internal storageExternal memoryinput deviceoutput device(34) which does not belong to the output device (a)?.Light penMonitorPrinterLoudspeaker box(35). 1MB= (b) bytes.Two hundred and tenTwo hundred and twentyTwo hundred and thirtyTwo hundred and forty(36) which of the following software does not belong to system software (d)?.CompilerDiagnostic programLarge databaseFinancial management software(37) the following software that does not have the diskpartition function is (D).FdiskPqmagicDiskGeniusFlash(38) icons are one of the most important features of Windows(D). Is an error description of the iconIcons can be grouped togetherIcons can represent programs and can also represent documentsIcons can represent programs whose windows are minimizedIcons represent only one application(39) there is a start button below the desktop of Windows, and the statement about it is incorrect (a).Use it only when it is powered offClick it to appear a menu that contains the Windows commandIt is the entrance to the running programIt is the most common way to execute programs(40) the method of exiting the current application is (D).Press the Esc keyPress the Ctrl+Esc keyPress the Alt+Esc keyPress the Alt+F4 key(41) about adding the shortcut start button in the quick start zone of the taskbar, it is incorrect (B).Moving the icons on the desktop to the "quick start" zone is to prevent the other programs window from blocking itAfter moving the icons on the desktop to the "quick start" zone, the icons on the desktop do not existDrag icons from the desktop to the quick launch zone with the mouseAfter dragging to the quick launch zone, icons still exist on the desktop(42) after clicking the minimize button, the current window(C).The current window will disappearThe current window is closedThe current window is reduced to iconsopen the control menu(43). To create a folder in C, the following (d) operation is wrong.Start > "program" > "command prompt" > implementation of "MD C: \ \ directory name" command pathMy computer > C > > open the specified folder "file" > "new" > "folder"Start > "program" > "Explorer" > specified folder > "file" > "new" > "folder"The "start" > > "run" in the dialog box input "MD C: \ \ directory path name" command "to determine >"(44) when you format a disk in Windows, if you want to fully examine the disk surface and mark the bad sectors, select (b) in the formatting type in the formatting dialog box.fastcomprehensiveCopy only system filesQuick and comprehensive(45) after a command in a menu of the Windows application is selected, an additional menu (or submenu) appears on the right of the menu, which is the command (D).Heel"..."Is there a "before"?"GreyFollowed by triangular symbols(46) the method of exiting the current application is (D).Press the Esc keyPress the Ctrl+Esc keyPress the Alt+Esc keyPress the Alt+F4 key(47) Excel software is a (C).Large database systemoperating systemApplication softwareSystems software(48) in the worksheet, to select the discontinuous region, press the (b) key first,Then click the cell area you want.AltCtrlShiftDel(49) when you open the help topic: Microsoft system information help window, you should click the (a) tab to display the list of basic functions of Word.CatalogeditoptionHelp(50) the role of DELETE in SQL is (B).insert recordDelete recordfind recordUpdate record(51) the role of FROM in SQL is (a).Specifies the table of queriesDelete recordGroupingUpdate record(52) if a relationship is R (student number, name, gender, age), then (a) can be used as the primary key of the relationship.Student numberFull nameGenderAge(53). (d) a desktop database system.SybaseOracleDB2Access(54) multimedia information does not include (C). Audio and videoAnimation, imagesSound card, CDText and image(55) Huffman (Hoffman) encoding belongs to (B). Lossy codingLossless coding techniqueComplete coding techniqueHybrid coding(56) the digital process of sound is (C). Quantization, sampling, encodingCoding, quantization, samplingSampling, quantization, encodingSampling, encoding and quantizing(57). (b) not the Photoshop layer merge method. flatten imageMerge DownMerge VisibleAdd Layer Mask(58). (c) cannot be set by user in Flash.key framePlain frameTransition frameNull keyframe(59). (c) not the basic type of Flash animation. frame-by-frame animationGraphics animationThree-dimensional animationMotion animation(60) graphics and images have unique visual meanings in expressing information. The following is not (B).Capable of carrying a wealth of informationAble to cross language barriers and promote communicationVivid and intuitive informationData is easy to store and process(61) the following is the format of the vector graphics file(D).WMFJPGGIFBMP(62). What teachers have 10000 pieces of resolution of 1024 x 768 color (32 bits) of precious historical pictures of the Second World War, he wanted to send these pictures and burn it to disc, each disc can store 600MB hypothesis information,where teachers need CD (C).1005020075(63) in a computer network, a computer that usually provides and manages shared resources is known as a.The serverWorkstationgatewaybridge(64) both UDP and TCP are (d) layer protocols.Physicsdata linknetworktransmission(65) the following is used to measure the capacity of communication channels (D).AgreementIP addressdata packetbandwidth(66) routing is the primary function of the (d) layer in the OSI model.physical layerdata link layertransport layernetwork layer(67) host domain name consists of four sub domains, in which (d) subdomain is the highest level domain.WwwSCUTEdu(68) the following protocol for the transport layer is (B).ARPUDPFTPICMP(69) the following resources belonging to the subnet device are(B).Communication control processorThe serverCommunication lineCommunication equipment(70). (a) is the first computer network to achieve resource sharing.ARPANETInternetEthernetWeb(71) in the HTML file, if the picture "image.jpg" is inserted into the page, the following is the correct wording (D).<a href= "image.jpg" ><img= "image.jpg" ><a href= "image.jpg" ><img src= "image.jpg" >(72).In the table of the HTML document, merging two cells should use the property of (a).ColSpanColwrapNowrapNowspan(73) the BGCOLOR attribute should be placed in the (d) tag.<html> Tags<head> Tags<title> Tags<body> Tags(74) which picture format (d) should be used to place a high quality picture on a web page?.Picture.BmpPicture.PngPicture.GifPicture.Jpg or JPEG(75) if an element's outer layer applies the HTML style, the inner layer applies the CSS pattern, which is at work (C).The blending effect of two stylesConflicts cannot be applied simultaneouslycss styleHTML Styles(76) in the public key cryptography algorithm, (a) is open.Key used for encryptionKey used for decryptionThe key used for encryption and the key used for decryptionNo key(77) logically, the firewall is (a).Filter, limiter, analyzerBastion hostCoordination of hardware and softwareIsolation belt(78) the following algorithms belong to the public key cryptography system (a).RSADES3DESAES(79) the following functions that are not part of the network firewall function are (D).Control access to the web siteRestricting the exposure of protected subnetsMandatory security policyClear virus(80) the following shortcomings that do not belong to link encryption are (D).High hardware overheadThe operation and maintenance cost is greatThe key processing overhead is largeSlowA multiple-choice question(81) the computer hierarchy includes (ABCD).Microprogram layerMachine language layerOS layerAssembly language layer(82) what is the lower right corner of a number (CD), which isa sixteen decimal number.BDHSixteen(83) the following description is correct (BC)The original code can be obtained from each oneThe original code and its complement as positiveThe bit shift of the complement symbol is obtainedIn all codes, the positive symbol bit is 0, and the positive symbol bit is 1(84) according to the location and function of the memory in the computer, the memory includes (BCD).registerInternal storageExternal memoryCache memory(85) the commonly used disk partition software is (ABC).FdiskPqmagicDiskGeniusFlash(86) the database system has (ACD) characteristics.Data structuringHigh redundancydata sharingData independence(87) according to the network working model, the network can be divided into (BD).Campus networkP2PInternetClient / server network(88). (ABCD) the function of the network operating system.communication servicesNetwork management servicePrint serviceDatabase service(89) in the following HTML tag, there is a (ABD) bilateral tag.HeadABrH3(90) the main form of intrusion detection architecture is (ACD).Host basedHardware basedNetwork-basedDistributed。
计算机科学导论试题与答案
计算机科学导论试题与答案一、选择题1. 计算机科学的起源可以追溯到()世纪。
A. 20B. 21C. 19D. 18答案:A2. 计算机的英文单词“computer”最早出现在()年。
A. 1940B. 1950C. 1960D. 1970答案:A3. 冯·诺依曼提出了计算机的体系结构,包括存储程序和程序控制的思想,这一体系结构被称为()。
A. 冯·诺依曼架构B. 哈佛架构C. 堆栈架构D. 寄存器架构答案:A4. 二进制只有两个数码,0和()。
A. 1B. 2C. AD. 5答案:A5. 在计算机中,数据是以()形式存储和处理的。
A. 二进制B. 十进制C. 八进制D. 十六进制答案:A6. 计算机的基本功能是对数据进行()。
A. 存储B. 传输C. 处理D. 显示答案:C7. 计算机病毒是一种()。
A. 软件B. 硬件C. 操作系统D. 网络协议答案:A8. 操作系统的主要功能是管理计算机的()。
A. 硬件资源B. 软件资源C. 网络资源D. 用户资源答案:A9. 互联网的起源可以追溯到()年。
A. 1969B. 1970C. 1980D. 1990答案:A10. 电子邮件的英文缩写是()。
A. E-mailB. E-bookC. E-commerceD. E-government答案:A二、填空题1. 计算机科学的五个基本领域是计算机系统结构、_______、软件工程、人工智能和计算机网络。
答案:算法与数据结构2. 计算机的基本单位是_______,它是由计算机的硬件和软件组成的。
答案:计算机系统3. 计算机的存储器分为为主存储器(_______)和辅助存储器(_______)。
答案:RAM;硬盘、光盘等4. 计算机病毒是一种特殊的程序,它可以通过_______途径传播。
答案:网络、移动存储设备等5. 互联网是由全球范围内的_______互联而成的网络。
答案:计算机三、简答题1. 请简要介绍计算机科学的发展历程。
英文计算机导论试题
2009-2010学年第1学期2009级《计算机导论》考试试题A卷考试时间:2009年月班级学号姓名请将答案写在答题纸上,写明题号,不必抄题,字迹工整、清晰;请在答题纸和试题纸上都写上你的班级,学号和姓名,交卷时请将试题纸、答题纸和草纸一并交上来。
I、Choice Questions(20 questions, 1 score for each question)1. Every computer today is based on the _____ model.a. von Neumannb. Microsoftc. Inteld. input/output2. The CPU includes a small number of storage buffers that hold data temporarily, called ________.a. cacheb. registersc. memoryd. disk drives3. To store a byte, you need ______ electronic switches.a. 1b. 4c. 8d. 164. According to the von Neumann model, _________ are stored in memory.a. datab. programsc. algorithmd. a and b5. Computer scientists have defined three constructs for a structures program or algorithm, asserting that a program must be made of a combination of them. Which of the following is NOT among them?a. Decisionb. Sequencec. Flowchartingd. Repetition5.6. The output data depend on the combination of the ________ and the program.a. memory sizeb. input datac. processor modeld. processor speed7. In ______ number representation, there are two representations for 0a. sign-and-magnitude .b. one’s complementc. tw o’s complementd. a and b8. The uniform representation for storing data is called ________.a. textb. a bit patternc. a switchd. ISO9. To unset (force to 0) all the bits of a bit pattern, make a mask of all 0s and then ______the bit pattern and the mask.a. ORb. NOTc. XORd. AND10. A bit pattern of three bits can take on how many different states?a. sixteenb. eightc. fourd. three11. A program is a set of ________ written in a(n) ________ language.a. directions, humanb. mathematical operations, mathematicalc. codes, binaryd. instructions, computer12. A ______ bus connects the CPU and memory.a. controlb. addressc. datad. all of the above13. A router operates at ______ layer of the OSI model.a. all layersb. the first four layersc. the first three layersd. application14. The ______ scheduler creates a process from a job and changes a process back to a job.a. processb. queuec. jobd. virtual15. For ______ sort, n-1 passes and tow loops are needed to sort the data..a. selectionb. insertionc. bubbled. all of the above16. An operating system program called the ______ gets the program into memory.a. translatorb. loaderc. downloadd. processor17. When you try to store a number that is not within the range defined by the allocation, what happens?a. The system automatically allocates more space.b. The processor halts.c. Nothing; the processor just drops the extra bitsd. You get an overflow error.18. In a linked list, each element contains ______.a. a link and a recordb. data and a recordc. data and a linkd. all of the above19. A process in the running state goes to ready state when _______.a. get access to CPUb. Time slot exhaustedc. I/O requestedd. it finishes running20. The bit pattern 11000111 _________ to flip the leftmost bits.a. XOR 11111000b. OR 11111000c. NOTd. AND 11111000II、Questions( 6 questions, 5 scores for each question)1. What’s the definition of an operating system?2. What are the subsystems of the von Neumann computer model?3. Name four types of network connecting devices.4. Define the three constructs used in structured programming.5. Name the layers of the OSI model?6. What’s the formal definition of an algorithm?III、Calculation( 5 subjects, 5 scores for each subject)1. Change the following 8-bit two’s complement numbers to decimal.(1). 1000000 (2). 01100100 (3). 11001000 (4). 11000011 (5).110101012. Change the following decimal numbers to 8-bit two’s complement integers, and then convert the result to hexadecimal.(1). -48 (2). 25 (3). -127 (4). 98 (5). -553. Using an 8-bit allocation, first convert each of the following numbers to two’s complement, do the operation, and then convert the result to hexadecimal.(1) 35+63 (2) 35-63 (3) -35 +63 (4) -35-63 (5) 63-14. Show the result of the following operations, and then convert the result to hexadecimal.(1) NOT 129 (2) 15 AND 10 (3) x55 OR xAA (4) 100 AND 255(5) (xFF XOR xBB) AND (xFF OR xBB)5. Change the +12.625 decimal numbers to binary numbers, and show it in 32-bit IEEE format, and then convert the result to hexadecimal.IV. Analyzing and Design (5 subjects, 5 scores for each subject)1. Using the bubble sort algorithm, manually sort the following list and show your work in each pass:12, 6, 78, 31, 50, 46, 99, 2, 20, 442. A list contains the following elements. Using the binary search algorithm, trace the steps followed to find 66. At each step, show the values of first, last and mid.2, 5, 18, 28, 30, 40, 66, 1003 Write an algorithm in pseudocode to find the smallest of a set of 10000 numbers (the biggest data is 255 among the numbers).4. Write a recursive algorithm to find the combination of n objects taken k at a time using following definition.C(n,k)=1 , if k=0 or n=kC(n,k)=C(n-1,k)+(n-1,k-1) , if n>k>05. Imaging a power plant that pumps water to a city using eight pumps(P8, P7, P6, P5, P4, P3, P2, and P1). The states of the pumps (on or off) can be represented by 8-bit pattern. For example, the pattern 10001111 shows that pumps 1 to 4(from right), and 8 are on (running) while pumps 5, 6, and 7 are off (shut down). How can you shut down all pumps, after two minutes, let the pump P2 and P5 running, and after one hour, shut down the P2 pump and turn on the P6 pump simultaneously, and remain the P5 running too?。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
2009-2010学年第1学期2009 级《计算机导论》考试试题A卷考试时间:2009年月班级学号姓名✧请将答案写在答题纸上,写明题号,不必抄题,字迹工整、清晰;✧请在答题纸和试题纸上都写上你的班级,学号和姓名,交卷时请将试题纸、答题纸和草纸一并交上来。
I、Choice Questions(20 questions, 1 score for each question)1. Every computer today is based on the _____ model.a. von Neumannb. Microsoftc. Inteld. input/output2. The CPU includes a small number of storage buffers that hold data temporarily, called ________.a. cacheb. registersc. memoryd. disk drives3. To store a byte, you need ______ electronic switches.a. 1b. 4c. 8d. 164. According to the von Neumann model, _________ are stored in memory.a. datab. programsc. algorithmd. a and b5. Computer scientists have defined three constructs for a structures program or algorithm, assertingthat a program must be made of a combination of them. Which of the following is NOT among them?a. Decisionb. Sequencec. Flowchartingd. Repetition5.6. The output data depend on the combination of the ________ and the program.a. memory sizeb. input datac. processor modeld. processor speed7. In ______ number representation, there are two representations for 0a. sign-and-magnitude .b. one’s complementc. two’s complementd. a and b8. The uniform representation for storing data is called ________.a. textb. a bit patternc. a switchd. ISO9. To unset (force to 0) all the bits of a bit pattern, make a mask of all 0s and then ______the bitpattern and the mask.a. ORb. NOTc. XORd. AND10. A bit pattern of three bits can take on how many different states?a. sixteenb. eightc. fourd. three11. A program is a set of ________ written in a(n) ________ language.a. directions, humanb. mathematical operations, mathematicalc. codes, binaryd. instructions, computera. controlb. addressc. datad. all of the above13. A router operates at ______ layer of the OSI model.a. all layersb. the first four layersc. the first three layersd. application14. The ______ scheduler creates a process from a job and changes a process back to a job.a. processb. queuec. jobd. virtual15. For ______ sort, n-1 passes and tow loops are needed to sort the data..a. selectionb. insertionc. bubbled. all of the above16. An operating system program called the ______ gets the program into memory.a. translatorb. loaderc. downloadd. processor17. When you try to store a number that is not within the range defined by the allocation, what happens?a. The system automatically allocates more space.b. The processor halts.c. Nothing; the processor just drops the extra bitsd. Y ou get an overflow error.18. In a linked list, each element contains ______.a. a link and a recordb. data and a recordc. data and a linkd. all of the above19. A process in the running state goes to ready state when _______.a. get access to CPUb. Time slot exhaustedc. I/O requestedd. it finishes running20. The bit pattern 11000111 _________ to flip the leftmost bits.a. XOR 11111000b. OR 11111000c. NOTd. AND 11111000II、Questions( 6 questions, 5 scores for each question)1. What’s the definition of an operating system?2. What are the subsystems of the von Neumann computer model?3. Name four types of network connecting devices.4. Define the three constructs used in structured programming.5. Name the layers of the OSI model?6. What’s the formal definition of an algorithm?III、Calculation( 5 subjects, 5 scores for each subject)1. Change the following 8-bit two’s complement numbers to decimal.(1). 1000000 (2). 01100100 (3). 11001000 (4). 11000011 (5).110101012. Change the following decimal numbers to 8-bit two’s complement integers, and then convert the result to hexadecimal.(1). -48 (2). 25 (3). -127 (4). 98 (5). -553. Using an 8-bit allocation, first convert each of the following numbers to two’s complement, do the operation, and then convert the result to hexadecimal.(1) 35+63 (2) 35-63 (3) -35 +63 (4) -35-63 (5) 63-14. Show the result of the following operations, and then convert the result to hexadecimal.(1) NOT 129 (2) 15 AND 10 (3) x55 OR xAA(4) 100 AND 255(5) (xFF XOR xBB) AND (xFF OR xBB)5. Change the +12.625 decimal numbers to binary numbers, and show it in 32-bit IEEE format, and then convert the result to hexadecimal.IV. Analyzing and Design (5 subjects, 5 scores for each subject)1. Using the bubble sort algorithm, manually sort the following list and show your work in each pass:12, 6, 78, 31, 50, 46, 99, 2, 20, 442. A list contains the following elements. Using the binary search algorithm, trace the steps followed to find 66. At each step, show the values of first,last and mid.2, 5, 18, 28, 30, 40, 66, 1003 Write an algorithm in pseudocode to find the smallest of a set of 10000 numbers (the biggest data is 255 among the numbers).4. Write a recursive algorithm to find the combination of n objects taken k at a time using following definition.C(n,k)=1 , if k=0 or n=kC(n,k)=C(n-1,k)+(n-1,k-1) , if n>k>05. Imaging a power plant that pumps water to a city using eight pumps(P8, P7, P6, P5, P4, P3, P2, and P1). The states of the pumps (on or off) can be represented by 8-bit pattern. For example, the pattern 10001111 shows that pumps 1 to 4(from right), and 8 are on (running) while pumps 5, 6, and 7 are off (shut down). How can you shut down all pumps, after two minutes, let the pump P2 and P5 running, and after one hour, shut down the P2 pump and turn on the P6 pump simultaneously, and remain the P5 running too?。