计算机英语 期末
《计算机英语》期末考试及答案
《计算机英语》A卷本卷满分100分,90分钟完卷。
得分:一、选出下列单词所缺字母组合(共10小题,每小题2分,共20分)。
1.Unau__orized (未经许可的)A. teB. toC.thD. tt2.Interpret__ (直译程序,口译者)A. eoB. erC. rrD. re3.Domi__te (支配、占优势)A. naB. noC. nuD. ne4.Majori__ (多数,大多数)A.tiB. tyC. ttD. to5.Stead__y (稳定地)A.liB. lyC. ilD. ll6.__ternative (二者选一)A.olB.auD.al7.Multi__dia (多媒体)A.meB.miC.moD.mm8.Stand__d (标准的)A.anB.raC.arD.ae9.Down___d (下载)oB.loaC.loeD.lod10.Ter__nal (终点站)A.miB.meC.mmD.mo二、单项选择题(共10小题,每小题2分,共20分)。
11. What should you_____?A. didB. doesC. doD. done12. ---Congratulations---______________A.The same to youB.Just so soC. Not at allD.Thank you.13. Happy life rely on_____ hard.A. workB. workingC. worksD. to work14. She is a ____ girl.A. beautyB. beautiesC. beautifulD. beautifully15.---I won the match.---____________A. Well doneB. Bad luckC. What a pityD. Is that so?16. ---How do you do?---_____________A.Nice to meet youB. I am very wellC .How do you do D.Fine,thanks.and you17. He expresses an interest ___ reading.A. inB. onC. atD.to18.She _______ English for seven years.A. studyB. studiesC. studiedD. has studied19. ---Thank you for your help.---___________________.A. No problemB. yes,you areC. Never changeD.No thanks20. She goes to the library ______.A. readB. to readC. readingD. reads三、阅读理解(共5题,每小题4分,共20分)。
计算机专业英语期末复习题及参考答案
一单选题 (共10题,总分值30分 )1. hacker (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙2. functional testing (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙3. relational database (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙4. firewall (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙5. software testing (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙6. audi (3 分)B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙7. application software (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙8. machine language (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库J. 防火墙9. memory (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙10. structured programming (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙二填空题 (共1题,总分值5分 )11. Microsoft Word XP is the current Window versionof Word, and documents created in Word XP can beeasily _________________________________Excel, Power Point and Access files. In the interface of Word, the_________________________________displays the name of the current application and name of the current document;the_________________________________lists the names of the menus available;the_________________________________gives the user quick access to frequently used editingfunctions; the_________________________________enables theuser to change left and right margin.toolbarrulertitle barmenu barincorporate into (5 分)三翻译题 (共10题,总分值50分 )12. hard disk (5 分)13. 集成开发环境(5 分)14. 通用串行总线(5 分)15. network security (5 分)16. software maintenance (5 分)17. electronic commerce (5 分)18. 广域网(5 分)19. 结构化查询语言(5 分)20. management information system (5 分)21. 面向对象编程(5 分)四阅读理解 (共1题,总分值15分 )22. The Internet, then known as ARPANET, wasbrought online in 1969, which initiallyconnected four major computers at universitiesin the southwestern US . The early Internet wasused by computer experts , engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personalcomputers in those days, and anyone who used it, whether a computer professional or an engineeror scientist or librarian, had to learn to use a very complex system.The Internet matured in the 1970's as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today' s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources.In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network.Since the Internet was initially funded by the government, it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 1990's, when independent commercial networks began to grow.(四) Choose the best answer according to Passage C.(根据上文的内容选择正确的答案。
计算机专业英语期末必考题及答案总结
switchSwitches (Switch) is an identification based on the MAC ( network card hardware address) , complete the package forwarding packets functional network equipmentA router is a device that forwards data packets between computer networks, creating an overlay internetwork. 路由器(Router)是连接因特网中各局域网、广域网的设备,它会根据信道的情况自动选择和设定路由,以最佳路径,按前后顺序发送信号的设备路由器是为信息流或数据分组选择路由的设备。
Router is a routing device to select the flow of information or data packetRouter (Router) is connected to the Internet , LAN, WAN equipment ,it will automatically select the channel and routing settings , the best path , according to the equipment before and after the order to send signals区别Switch refers to any network -level data relay equipment (although multi-finger bridge ) , while the router is more focused on the network layerThe first switch is a data link layer in the OSI / RM open architecture , which is the second layer , while the router is a beginning design work at the network layer of the OSI modelThe switch is a physical address or MAC address to determine the destination address of the forwarding data . While the router is to use the IP address)to determine the data forwarding address交换机是一个物理地址或MAC地址来确定转发数据的目的地址。
计算机英语期末考试试题及答案
计算机英语期末考试试题及答案一、选择题1. 在计算机网络中,IP地址用于标识网络上的的哪个设备?A. 路由器B. 交换机C. 服务器D. 主机答案:D2. 在计算机安全中,以下哪项属于恶意软件?A. 防火墙B. 杀毒软件C. 木马病毒D. 数据备份答案:C3. 在计算机术语中,RAM代表什么?A. 随机读取存储器B. 只读存储器C. 可擦除可编程读取存储器D. 磁盘存储器答案:A4. 在计算机网络中,HTTP协议是用于实现什么功能的?A. 网络连接B. 文件传输C. 数据加密D. 网络浏览答案:D5. 下列哪个不属于常见的文件压缩格式?A. .zipB. .rarC. .isoD. .txt答案:D二、填空题1. 在计算机程序中,循环结构可以用来多次执行特定的代码段,常见的循环结构包括_______和_______。
答案:for、while2. 在计算机图像处理中,________是指将一幅图像分割成若干个连续的小区域,并对每个小区域进行处理。
答案:图像分割三、判断题1. 计算机网络是指将多台计算机通过通信设备连接起来,实现信息共享和资源共享。
答案:正确2. 在计算机程序中,注释是用来向其他程序员解释代码功能的。
答案:正确四、简答题请简述计算机网络的优点和缺点。
优点:1. 资源共享:计算机网络可以实现多台计算机之间的文件共享、打印共享等,提高资源利用率;2. 信息交流:计算机网络可以快速传输信息,实现实时通信,方便人们之间的交流;3. 远程访问:计算机网络可以远程访问其他计算机,方便远程办公和学习。
缺点:1. 安全性问题:计算机网络容易受到黑客攻击和恶意软件感染,存在一定的安全隐患;2. 依赖性:对于依赖网络的应用和服务而言,一旦网络故障,将会导致服务中断,影响工作和生活;3. 隐私问题:在计算机网络中,个人信息和隐私面临泄露的风险,需要加强数据保护和隐私保护措施。
答案仅供参考,具体答案可能根据题目要求有所变化。
计算机英语期末考试试题
计算机英语期末考试试题1.C hoose the best answer to each of the following questions. (20%)1.is used to communicate with another computer over telephone linesA. keyboard B .modem C. printer D. mouse2.is a device that enables the computer to handle sounds.A. network cardB. video cardC. sound cardD. monitor3.refers to the parts of the computer that you can see and touch.A. SoftwareB. HardwareC. HardshipD. Instruction4. The display screen is the most common device used to show you what thecomputer is doing.A. inputB. printingC. outputD. electronic5.are programs that provide access to Web resourcesA. browsersB. databaseC. URLD. E-commerce6.is a word processing tool that helps you to create quality documents.A. Word 2003B. Outlook 2003C. Access 2003D. Excel 20037.is a fast and powerful operating system, based on the UNIX O.S.A. Windows 2003B. Office 2003C. Windows 2003D. Linux8.A virus is aA. programB. computerC. bad manD. beast9.TCP/IP are the two standard protocols for communications on the.A. webB. computerC. InternetD. network10.B2C involves individuals selling to.A. clientB. consumerC. corporationD. company11.Decide whether the following statements are True or False. (20%)1.( ) The CPU is the processor of a computer.2.( ) Windows NT is designed for replacement of Windows.3.( ) A computer is only connected by cable lines, such as telephone lines.4.( ) Air can be used to transit data.5.( ) Search engines help you to locate information on the Web6.( ) B2C involves individuals selling to individuals.7.( ) Databases are widely used8.( ) Oracle is the largest database system vendor in the world.9.( ) Complete access and complete security are good for information security10.( ) Portable computer can fit in a briefcase or even in the palm of your hand. 111.Translation: English to Chinese (20%)1.CPU2. OS3. LAN4. B2B5. CEO6. ATM7.DBMS 8. URL9.personal computer _____________________________________________________10.storage device _______________________________________________________rmation exchanges ________________________________________________12.protocol _____________________________________________________________13.broadband ____________________________________________________________14.browser ______________________________________________________________15.search engine ________________________________________________________16.update _______________________________________________________________17.Web Site _____________________________________________________________18.human resources _________________________________________________________19.environment _____________________________________________________________puter virus __________________________________________________________IV. Word-matching (20%)1. LCD a.主页2. menus b.黑客3. bus c.超链接4. WAN d.冲浪5. home page eh父日日业力、下]6. E-commerce f菜单7. hacker g总线8. surfing h广域网9. delete i电子商务10. hyperlink j删除V. Translation (20%)puter hardware has four parts: the central processing unit (CPU) and memory, storagehardware, input hardware, and output hardware.2.Software refers to computer programs.puter network is a system connecting two or more computers.munication is the most popular Internet activity5.The backbone of this electronic commerce is the Internet.6.DBMS has the ability to access large amounts of data efficiently.7.Security is important throughout the information life-cycle8.If you have access to a personal computer (PC) and can connect to the Internet with a browser,you can do business online.9.Business receive raw materials as input, add value to them through various processes, and sellthe finished product as output to customers.10.As new viruses are created everyday, upgrade your anti-virus software regularly.。
计算机专业英语期末测试卷
计算机专业英语试题命题人:王晓萍姓名:__________ 班级:___________ 分数:__________________ 一、英汉互译并写出缩写的全称(20分)1.Tree structure__结构树_________ 2.Supervisor password____超级密码_________3.PC _________计算机________________10.计算机程序___computer program_________________11.软件测试______softwaretesting_______________12. 子文件夹________________ 13. 主菜单_________main menu_________14. 微处理器________________15. 升级软件________________16. 副作用__________________17. 搜索引擎________________18. 备份____________________19. 足够内存_________memory_______20. 域名___________dns_________二、判断题(对的填T, 错的填F)(5分)2 病毒通常会具有副作用()3 反病毒软件只可以扫描病毒()三、选择题(25分其中英语的每题2分)6. The basic units of a computer system are as follows: _________A. CPU, memory and diskB. CPU, input and output unitC. CPU, memory and I/O systemD. CPU, memory and ALU7. Today, ______can give you a video camera, a fax machine, a CD-ROM drive, ect.A. input devicesB. expansion cardsC. output deviceD. joystick8. When power is removed, information in the semiconductor memory is ________ .A. reliableB. lostC. manipulatedD. remain9. _________ is designed to manage large bodies of information.A. a file systemB. a transactionC. a database systemD. a database language10. A characteristic of operating system is _________ .A. resource managementB. memory managementC. error recoveryD. all the above11. An ISP supplies a _________ that you can dial from your computer to log on the internet server.A. public keyB. private keyC. service numberD. help file12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. Followings are some image data file formats, which is wrong? _______A.*.TIFB. *.DOCC. *.BMPD. *.GIF14. By adding _________ to your programs, you can make computers more interesting and much more fun for the user.A. multimediaB. textC. musicD. picture15. Followings are all software, which is not the antivirus software?A Kaspersky Antivirus B. Jiangming softwareC. Rising softwareD. Spyware四、将左列的词汇与右列相应的汉语匹配。
计算机英语期末测试卷B卷
一、Decide the following statements True or False according to the passage.判断,对T,错误F.(6分)1. A domain name is the Web address that we type in the Web browser. ( )2.Some domain names are the same, so it’s difficult to find your page. ( )3.Domain names should be easy to remember. ( )4. A host is a computer that stores the Web pages. ( )5.Dreamweaver is the only software to create websites. ( )6.Exchanging links with other websites will bring you more visitors. ( )二.Complete the sentences with the proper forms of the words or phrases given.选词填空。
(8分)1.1.____________ _____, it’s warmer in the south than in the north.2. Can you find a domain name which is ______________ yours?3. Many host computers are __________ by Internet companies.4. The clear _______________can help visitors to look for information quickly.5. When making Web pages, _______________ the looks of your homepage.6. Where did you ____________the Web host?7. Would you like to _____________ links with me?8. This is a big network with _______________ computers working regularly.三.Translate the following sentences into Chinese。
计算机专业英语期末试题及参考答案
山东外国语职业技术大学成人高等教育2021年第二学期期末考试学习方式: 函授/业余时间:120分钟考试科目:《course》(总分)100分集中闭卷考试特别提醒:1、所有答案均须填写在答题卷上,否则无效。
2、每份答卷上均须准确填写专业、身份证号码、所属学习中心名称、学号、姓名等。
一单选题 (共40题,总分值80分 )1. application software (2 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙2. Before switching on the power of the machine,make sure that the power source voltage()the specifications. (2 分)A. Complies withB. Complies toC. Complies inD. Complies by3. We must measure and ()to determine howmuch paint will be needed. (2 分)A. DescribeB. EditC. DiagnoseD. Calculate4. A()is a device that enables the computerto handle sounds. (2 分)A. Network cardB. Video cardC. Sound cardD. monitor5. Therefore,()are considered to be thetypical form of programmable automation. (2 分)A. Measurement systemsB. Actuating systemsC. NC systemsD. Feedback systems6. Joseph Jacquard developed a method to controltextile looms by using a()。
《计算机专业英语》期末考试试卷附答案
《计算机专业英语》期末考试试卷附答案一、Translate the following words and expressions into Chinese.(写出下列词组的汉语意思) (每题2分,共20分)1.bandwidth:2.browser:mand button:4.Control Panel:5.data structure:6.fiber-optic table:7.hardcopy:8.hypermedia:9.information superhighway:10.high-level language:二、Match the following words and expressions in the left column with those similar meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
) (每题2分,共20分)1.HTTP: a . 数据库管理系统2.ISP : b. 应用程序设计接口3.SQL : c . 基本输入/输出系统4.WWW: d. 数字视频光盘5.DBMS:. e .互联网服务提供商6.BIOS: f . 中央处理单元7.API :g . 结构化查询语言8.DVD:. h .直接存储器存取9.DMA :i .超文本传输协议10.CPU :j .万维网三、Tell whether the following statements are true(T) or false(F) according to the passage A(根据下文的内容判断下列句子的正误)(15分每题3分)Passage A:For a Web user, the home page is the first Web page that is displayed after starting a Web browser like Netscape's Navigator or Microsoft's Internet Explorer. The browser is usually preset so that the home page is the first page of the browser manufacturer. However, you can set it to open to any Web site. For example, you can specify that or be your home page. You can also specify that there be no home page (a blank space will be displayed) in which case you choose the first page from your bookmark list or enter a Web address.For a Web site developer, a home page is the first page presented when a user selects a site on the World Wide Web. The usual address for a Web site is the home page address, although you can enter the address (Uniform Resource Locator) of any page and have that page sent to you.1. Home pages for a Web user or a Web site developer have the same meanings.()2. The home page displayed on a Web browser is usually preset by the browser manufacturer.()3. The home page for a Web user can be reset to any Web site you prefer.()4. You have to enter or select Web addresses every time with a blank space on your Web browser.()5. Web addresses usually lead to relative home pages.()四、choose the best answer according to the passage B.(根据下文的内容选择正确的答案。
计算机网络英语期末复习试题及答案
《计算机网络英语》期末复习试题及答案一选择题1.A ( ) protocol is used to move a datagram over an individual link.A application-layerB transport-layerC network-layerD link-layer2.The units of data exchanged by a link-layer protocol are called ( ).A datagramsB framesC segmentsD messages3.Which of the following protocols is not a link-layer protocol? ( )A EthernetB PPPC HDLCD IP4.In the following four descriptions, which one is not correct? ( )A link-layer protocol has the node-to-node job of moving network-layer datagrams over a single link in the path.B The services provided by the link-layer protocols may be different.C A datagram must be handled by the same link-layer protocols on the different links in the path.D The actions taken by a link-layer protocol when sending and receiving frames include error detection, flow control and random access.5.Which of the following services can not offered by a link-layer protocol? ( )A congestion controlB Link AccessC Error controlD Framing6.( ) protocol serves to coordinate the frame transmissions of the many nodes when multiple nodes share a single broadcast link.A ARPB MACC ICMPD DNS7.In the following four descriptions about the adapter, which one is not correct? ( )A The adapter is also called as NIC.B The adapter is a semi-autonomous unit.C The main components of an adapter are bus interface and the link interface.D The adapter can provide all the link-layer services.8.Consider CRC error checking approach, the four bit generator G is 1011, and suppose that the data D is 10101010, then the value of R is( ).A 010B 100C 011D 1109.In the following four descriptions about random access protocol, which one is not correct? ( )A In slotted ALOHA, nodes can transmit at random time.B In pure ALOHA, if a frame experiences a collision, the node will immediately retransmit it with probability p.C The maximum efficiency of a slotted ALOHA is higher than a pure ALOHA.D In CSMA/CD, one node listens to the channel before transmitting.10.In the following descriptions about MAC address, which one is not correct? ( )A The MAC address is the address of one node’s adapter.B No two adapters have the same MAC address.C The MAC address doesn’t change no matter where the adapter goes.D MAC address has a hierarchical structure.11.The ARP protocol can translate ( ) into ( ). ( )A host name, IP addressB host name, MAC addressC IP address, MAC addressD broadcast address, IP address12.The value of Preamble field in Ethernet frame structure is ( )A 10101010 10101010……10101010 11111111B 10101011 10101011……10101011 10101011C 10101010 10101010……10101010 10101011D 10101010 10101010……10101010 1010101013.There are four steps in DHCP, the DHCP server can complete ( ).A DHCP server discoveryB DHCP server offersC DHCP requestD DHCP response14.In CSMA/CD, the adapter waits some time and then returns to sensing the channel. In the following four times, which one is impossible? ( )A 0 bit timesB 512 bit timesC 1024 bit timesD 1028 bit times15.The most common Ethernet technologies are 10BaseT and 100BaseT. “10” and “100”indicate( ).A the maximum length between two adaptersB the minimum length between two adaptersC the transmission rate of the channelD the transmission rate of the node16.The principal components of PPP include but not( ).A framingB physical-control protocolC link-layer protocolD network-layer protocol17.In the following four options, which service can not be provided by switch? ( )A filteringB self-learningC forwardingD optimal routing18.In the following four services, which one was be required in PPP? ( )A packet framingB error detectionC error correctionD multiple types of link19.The ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces is( ).A filteringB forwardingC self-learningD optimal routing20.In ( ) transmission(s), the nodes at both ends of a link may transmit packets at the same time.A full-duplexB half-duplexC single-duplexD both full-duplex and half-duplex21.Consider the data D is 01110010001, if use even parity checking approach, the parity bit is( ①), if use odd parity checking approach, the parity bit is( ②). ( )A ①0 ②1B ①0 ②0C ①1 ②1D ①1 ②022.In the following four descriptions about parity checks, which one is correct? ( )A Single-bit parity can detect all errors.B Single-bit parity can correct one errors.C Two-dimensional parity not only can detect a single bit error, but also can correct that error.D Two-dimensional parity not only can detect any combination of two errors, but also can correct them.23.MAC address is ( ) bits long.A 32B 48C 128D 6424.Wireless LAN using protocol ( ).A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.1125.The following protocols are belonging to multiple access protocols except for ( ).A channel partitioning protocolsB routing protocolsC random access protocolsD taking-turns protocols26.Which of the following is not belonging to channel partitioning protocols? ( )A CSMAB FDMC CDMAD TDM27.In the following four descriptions about CSMA/CD, which one is not correct? ( )A A node listens to the channel before transmitting.B If someone else begins talking at the same time, stop talking.C A transmitting node listens to the channel while it is transmitting.D With CSMA/CD, the collisions can be avoided completely.28.( ) provides a mechanism for nodes to translate IP addresses to link-layer address.A IPB ARPC RARPD DNS29.A MAC address is a ( )address.A physical-layerB application-layerC link-layerD network-layer30.Which of the following is correct? ( )A No two adapters have the same MAC address.B MAC broadcast address is FF-FF-FF-FF-FF-FF.C A portable computer with an Ethernet card always has the same MAC address, no matter where the computer goes.D All of the above31.In the following four descriptions, which one is not correct? ( )A ARP resolves an IP address to a MAC address.B DNS resolves hostnames to IP addresses.C DNS resolves hostnames for hosts anywhere in the Internet.D ARP resolves IP addresses for nodes anywhere in the Internet.32.In the LAN, ( )protocol dynamically assign IP addresses to hosts.A DNSB ARPC DHCPD IP33.DHCP protocol is a four-step process: ①DHCP request. ②DHCP ACK. ③DHCP server discovery. ④DHCP server offer(s). The correct sequence is ( )A ①②③④B ③②①④C ③④①②D ①④③②34.In the Ethernet frame structure, the CRC field is ( )bytes.A 2B 4C 8D 3235.In the Ethernet frame structure, the Data field carries the ( ).A IP datagramB segmentC frameD message36.In the following four descriptions, which one is not correct? ( )A Ethernet uses baseband transmission.B All of the Ethernet technologies provide connection-oriented reliable service to the network layer.C The Ethernet 10Base2 technology uses a thin coaxial cable for the bus.D The Ethernet 10BaseT technology uses a star topology.37.Ethernet’s multiple access protocol is ( ).A CDMAB CSMA/CDC slotted ALOHAD token-passing protocol38.In the following four descriptions about CSMA/CD, which one is not correct? ( )A An adapter may begin to transmit at any time.B An adapter never transmits a frame when it senses that some other adapter is transmitting.C A transmitting adapter aborts its transmission as soon as it detects that another adapter is also transmitting.D An adapter retransmits when it detects a collision.39.Which of the following descriptions about CSMA/CD is correct? ( )A No slots are used.B It uses carrier sensing.C It uses collision detection.D All of the above.40.The Ethernet 10BaseT technology uses( )as its physical media.A fiber opticsB twisted-pair copper wireC coaxial cableD satellite radio channel41.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( )meters.A 100B 200C 500D 1042.A ( )is a physical-layer device that acts on individual bits rather than on frames.A switchB hubC routerD gateway43.A hub is a ( )device that acts on individual bits rather than on frames.A physical-layerB link-layerC network-layerD ransport-layer44.A switch is a( )device that acts on frame.A physical-layerB link-layerC network-layerD transport-layer45.In the following four descriptions, which one is not correct? ( )A Switches can interconnect different LAN technologies.B Hubs can interconnect different LAN technologies.C There is no limit to how large a LAN can be when switches are used to interconnect LAN segments.D There is restriction on the maximum allowable number of nodes in a collision domain when hubs are used to interconnect LAN segments.46.The ability to determine whether a frame should be forwarded to some interface or should just be dropped is ( ).A filteringB forwardingC self-learningD optimal routing47.Which of the following devices is not a plug and play device? ( )A hubB routerC switchD repeater48.Which of the following devices is not cut-through device? ( )A hubB routerC switchD repeater49.In the following four descriptions, which one is not correct? ( )A Switches do not offer any protection against broadcast storms.B Routers provide firewall protection against layer-2 broadcast storms.C Both switches and routers are plug and play devices.D A router is a layer-3 packet switch, a switch is a layer-2 packet switch.50.Which device has the same collision domain? ( )A HubB SwitchC RouterD Bridge51.IEEE802.2 protocol belong to ( )layerA networkB MACC LLCD physical52.IEEE802.11 protocol defines ( )rules.A Ethernet BusB wireless WANC wireless LAND Token Bus53.In data link-layer, which protocol is used to share bandwidth? ( )A SMTPB ICMPC ARPD CSMA/CD54.When two or more nodes on the LAN segments transmit at the same time, there will be a collision and all of the transmitting nodes well enter exponential back-off, that is all of the LAN segments belong to the same( ).A collision domainB switchC bridgeD hub55.( )allows different nodes to transmit simultaneously and yet have their respective receivers correctly receive a sender’s encoded data bits.A CDMAB CSMAC CSMA/CDD CSMA/CA56.Because there are both network-layer addresses (for example, Internet IP addresses) and link-layer addresses (that is, LAN addresses), there is a need to translate between them. Forthe Internet, this is the job of ( ).A RIPB OSPFC ARPD IP57.PPP defines a special control escape byte, ( ). If the flag sequence, 01111110 appears anywhere in the frame, except in the flag field, PPP precedes that instance of the flag pattern with the control escape byte.A 01111110B 01111101C 10011001D 1011111058.The device ( ) can isolate collision domains for each of the LAN segment.A modemB switchC hubD NIC59.In the following four descriptions about PPP, which one is not correct? ( )A PPP is required to detect and correct errors.B PPP is not required to deliver frames to the link receiver in the same order in which they were sent by the link sender.C PPP need only operate over links that have a single sender and a single receiver.D PPP is not required to provide flow control.60.In the PPP data frame, the( ) field tells the PPP receivers the upper-layer protocol to which the received encapsulated data belongs.A flagB controlC protocolD checksum61.PPP’s link-control protocols (LCP) accomplish ( ).A initializing the PPP linkB maintaining the PPP linkC taking down the PPP linkD all of the above62.The PPP link always begins in the ( ) state and ends in the ( ) state. ( )A open, terminatingB open, deadC dead, deadD dead, terminating63.For( ) links that have a single sender at one end of the link and a single receiver at the other end of the link.A point-to-pointB broadcastC multicastD all of the above64.With ( )transmission, the nodes at both ends of a link may transmit packets at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous65.With ( ) transmission, a node can not both transmit and receive at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous66.Which of the following functions can’t be implemented in the NIC? ( )A encapsulation and decapsulationB error detectionC multiple access protocolD routing67.Which of the following four descriptions is wrong? ( )A The bus interface of an adapter is responsible for communication with the adapter’s parent node.B The link interface of an adapter is responsible for implementing the link-layer protocol.C The bus interface may provide error detection, random access functions.D The main components of an adapter are the bus interface and the link interface. 68.For odd parity schemes, which of the following is correct? ( )A 011010001B 111000110C 110101110D 00011011069.( )divides time into time frames and further divides each time frame into N time slots.A FDMB TMDC CDMAD CSMA70.With CDMA, each node is assigned a different ( )A codeB time slotC frequencyD link71.Which of the following four descriptions about random access protocol is not correct? ( )A A transmission node transmits at the full rate of the channelB When a collision happens, each node involved in the collision retransmits at once.C Both slotted ALOHA and CSMA/CD are random access protocols.D With random access protocol, there may be empty slots.72.PPP defines a special control escape byte 01111101. If the data is b1b201111110b3b4b5, the value is( )after byte stuffing.A b1b20111110101111110b3b4b5B b1b20111111001111101b3b4b5C b5b4b30111111001111101b2b1D b5b4b30111110101111110b2b173.MAC address is in ( ) of the computer.A RAMB NICC hard diskD cache74.Which of the following is wrong? ( )A ARP table is configured by a system administratorB ARP table is built automaticallyC ARP table is dynamicD ARP table maps IP addresses to MAC addresses75.NIC works in ( )layer.A physicalB linkC networkD transport76.In LAN, if UTP is used, the common connector is( ).A AUIB BNCC RJ-45D NNI77.The modem’s function(s) is(are) ( ).A translates digital signal into analog signalB translates analog signal into digital signalC both translates analog signal into digital signal and translates digital signal into analog signalD translates one kind of digital signal into another digital signal78.( )defines Token-Ring protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.279.( )defines Token-Bus protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.280.( ) defines CSMA/CD protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.281.The computer network that concentrated in a geographical area, such as in a building or on a university campus, is ( )A a LANB a MANC a WAND the Internet82.The MAC address is ( ) bits long.A 32B 48C 128D 25683.Which of the following four descriptions about MAC addresses is wrong? ( )A a MAC address is burned into the adapter’s ROMB No two adapters have the same addressC An adapter’s MAC address is dynamicD A MAC address is a link-layer address84.Which of the following four descriptions about DHCP is correct? ( )A DHCP is C/S architectureB DHCP uses TCP as its underlying transport protocolC The IP address offered by a DHCP server is valid foreverD The DHCP server will offer the same IP address to a host when the host requests an IP address85.The ( )field permits Ethernet to multiplex network-layer protocols.A preambleB typeC CRCD destination MAC address86.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( ) meters.A 50B 100C 200D 50087.An entry in the switch table contains the following information excepts for ( )A the MAC address of a nodeB the switch interface that leads towards the nodeC the time at which the entry for the node was placed in the tableD the IP address of a node二、阅读理解The central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, while its speed and capacity have increased tremendously. Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap.The CPU comprises the control unit and the arithmetic / logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices. The ALU performs all the arithmetic and logical (comparison) functions — that is, it adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.Tell whether the following statements are true(T) or false(F) according to the passage A.(根据上文的内容判断下列句子的正误)1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control unit of the CPU. ( )3. The CPU comprises the control unit and memory. ( )4. The control unit performs all the arithmetic and logical (comparison) functions5. The central processing unit (CPU) is the heart of the computer systems. ( )三、翻译下面的文章。
计算机英语 期末
Chapter 1 Computer Science in EnglishI. Fill in the following blanks.1. _________ is designed to accomplish real-world tasks in fields.2. An 8-bit signed integer can have any value between ____ and3. ____ controls the computer and enables it to run the hardware and applications software.4. A computer system consists of ____ and ____ .5. List four types of computers: ___ , ___ , ___ and ____ .II. True or False.1. The software system is the physical equipment that you can see and touch.2. Typically, a data value is set to zero to represent FALSE and 1 value for TRUE.3. In the earliest general-purpose computer, most input and output media were magnetic disks.4. Supercomputers are largest, fastest, and most expensive computer available.5. A computer system consists of hardware system and software system.III. Matching terms.(a) integrated circuit (IC) (b) CPU (c) bit (d) ASCII1._______ The processing unit is at the heart of a computer.2._______ A unit of information conveyed by a single binary digit.3._______A complete electronic circuit that packages transistors and other electronic components on a small silicon chip.4._______ A system for encoding characters as binary digits.IV. Translating Terms.(1) coding techniques(2) application software(3) floating point data(4) timesharing(5) storage capacitiesVII. Choose the best one of the four answers given to fill in each blank.This chapter introduces digital computer, data types, the evolution of computers, and types of computers. 1 is known to all, it’s hard to find a field in 2 computers are not being used. Digital computer, also called electronic computer or computer, is a digital system that 3 various computational tasks. Digital computers use the 4 number system, which has two digits: 0 and 1. By using various coding 5 , groups of bits can be made to represent not only binary numbers 6 other discrete symbols, such as decimal digits or letters of the alphabet.A computer system consists of hardware system and software system. Programs tell the hardware what to do. 7 software is designed to accomplish real-world tasks in fields such as accounting, entertainment, and engineering. Computers are usually 8 into four broad categories: microcomputers, minicomputers, mainframe computers, and supercomputers. It’s hard to give a 9 definition to each type because computer speeds and storage 10 change rapidly.1. A. As B. It C. As it D. That2. A. what B. which C. where D. when3. A. performs B. carries C. makes D. integrates4. A. decimal B. binary C. Arabian D. American5. A. technique B. technologyC. techniquesD. technologies6. A. instead of B. rather thanC. but alsoD. as well7. A. Application B. System C. Word D. Excel8. A. put B. made C. conducted D. classified9. A. precious B. progress C. proceeding D. precise10. A. capacities B. capable C. capabilities D. capacityVIII. Translate the following into English.1. By using various coding techniques, groups of bits can be made to represent not only binary numbers but also other discrete symbols.2. System software includes not only the complex programs used by technicians to create application software in the first place but also the organizational programs needed to start up the computer and govern its use of other programs.3. Data are numbers and other binary-code information that are operated on to achieve required computational results.4. Rather than arithmetically or logically manipulating characters, a computer may concatenate strings of characters, replace some characters with others, or otherwise manipulate character strings.5. Software applications like word processing, electronic spreadsheets, database management programs, painting and drawing programs, desktop publishing, and so forth became commercially available, giving more people reasons to use a computer.Chapter 2 Computer Science in EnglishI. Fill in the following blanks.1. The computer hardware consists of three major parts which are the CPU, the memory subsystem, and _______.2. There are two major types of memory: Random Access Memory (RAM) and _____.3. The cache memory in personal computers is constructed from_______.4. _______provides a method for transferring information between internal storage and external I/O devices.5. Data transfer between the central computer and I/O devices may be handled in a variety of modes. These modes are programmed I/O, _______, and direct memory access (DMA).II. True or False.1. The data bus always receives data from the CPU, and the CPU never reads the data bus.2. Main memory holds whatever programs and data are available for immediate use by the CPU.3. Dynamic RAM does not have to be refreshed.4. Dot-matrix printer work by squirting tiny droplets of liquid ink at the paper.5. The auxiliary memory is very small, relatively expensive, and has very high access speed.III. Matching terms.(A) ALU (B) RAM (C) E2PROM (D) DMA1.________ an electrically erasable PROM2.________ A transfer mode that can be improved is the transfer of data between memory and I/O devices.3.________ The unit which performs most arithmetic and logical operations4.________ Memory that is erased when the computer is turned off.IV. Translating Terms.1. system buses2. virtual memory3. computer architecture4. instruction set5. direct memory accessVII. Choose the best one of the four answers given to fill in each blank.A computer system 1 of hardware system and software system. The hardware of the computer is usually divided into three major parts or three 2 subsystems: the CPU, the memory subsystem, and the I/O 3 . The CPU is made up of three major parts, Register Set, the 4 logic unit, or ALU, and Control Unit. It performs many operations and controls computer. Memory is also known as 5 memory or main memory, which is cataloged into two major types of memory: Random Access Memory (RAM) and Read Only Memory (ROM). It refers to the 6 in the computer that hold whatever programs and data are available 7 immediate use by the CPU, along with the program’s data. Computer systems include special hardware 8 between the CPU and peripherals to supervise and synchronize all input and output transfers. These components are called 9 units because they interface between the processor bus and the peripheral device. The I/O subsystem allows the CPU to 10 with input and output devices.1. A. consists B. makes up C. constitutes D. comprise2. A. premier B. primary C. preliminary D. elementary3. A. system B. machine C. subsystem D. device4. A. mathematic B. authorative C. arithmetic D. authoritative5. A.external B.exterior C. Interior D. internal6. A. circuits B. wires C. lines D. hardware7. A.by B. for C. with D. in8. A.software B. setting C. listing D. components9. A. singular B.dual C. interface D. compact10. A.handle B. interact C. respond D. linkVIII. Translate the following into English.1. By asserting these internal and external control signals in the proper sequence, the control unit causes the CPU and the rest of the computer to perform the operation needed to correctly process instructions.2. In a computer with virtual memory, less-used parts of programs are shifted from RAM to a hard disk and are moved back only when needed.3. A technique used to compensate for the mismatch in operating speeds is to employ an extremely fast, small cache between the CPU and main memory whose access time is close to processor logic clock cycle time.4. The data transfer rate of peripherals is usually slower than the transfer rate of the CPU, and consequently, a synchronization mechanism may be needed.5. In some computers the interrupt vector is an address that points to a location in memory where the beginning address of the I/O service routine is stored.Chapter 3 Computer System ArchitectureI. Fill in the following blanks.1. It is characteristic of ________ that several computations can be in process in distinct segments at the same time.2. ___________ is made possible by associating a register with each segment in the pipeline.3. The vector instruction includes the initial address of the operands, _______, and the operation to be performed.4.______ processors have fewer and simpler instructions than _______ processors.5. The sequence of instructions read from memory constitutes an______.The operations performed on the data in the processor constitutes a_________.II. True or False.1. Shift registers operate in serial fashion all the bits of the word at a time.2. RISC processors have larger instruction sets that often include some particularly complex instructions.3. SIMD represents an organization that includes many processing units under the supervision ofa common control unit.4. Parallel processing is established by distributing the data among the multiple functional units.5. RISC is a complex instruction set computer.III. Matching terms.(a) SISD (b) SIMD (c) MISD (d) MIMD1._______ multiple instruction stream, single data stream2._______ single instruction stream, multiple data stream3._______ multiple instruction stream, multiple data stream4._______ single instruction stream, single data streamIV. Translating Terms.1. parallel processing2. pipeline processing3. vector processing4. scalar processor5. backward compatibilityVII. Choose the best one of the four answers given to fill in each blank.In computer engineering, computer architecture is the ___1___ design and fundamental operational structure of a computer system. It is a ___2___ and functional description of requirements, especially speeds and interconnections, and design implementations for the various parts of a computer ____3___ largely on the way by which the central processing unit (CPU) performs internally and accesses addresses in memory. Computer system architecture ___4___ the design of the four ___5___: parallel processing, pipelining, vector processing and RISC. Parallel processing system is used to provide simultaneous data-processing tasks for the purpose of increasing the ___6__ speed of a computer systemand is able to perform ___7___data processing to achieve faster execution time. A pipeline is a set of data processing elements connected in series, so that the output of one element is the input of the next one. The elements of a pipeline are often ___8___ in parallel or in time-sliced fashion. A vector processor, is a CPU design that is able to run mathematical operations on multiple data elements simultaneously. Computers with vector processing capabilities are in demand in 9___ applications. RISC processors have fewer and __10___ instructions than CISC processors. As a result, their control units are less complex and easier to design.1. A. lastest B. conceptual C. ideal D. simple2. A. plan B. design C. blueprint D. concept3. A. relying B. depending C. attaching D. focusing4. A. refers B. speaks C. involves D. interacts5. A. ingredients B. types C. kinds D. lists6. A. computational B. computer C. computation D. computing7. A. current B. compound C. concurrent D. massive8. A. displayed B. carried C. accomplished D. executed9. A. special B. specialized C. specific D. especial10. A. simple B. simplifying C. singular D. simplerVIII. Translate the following into English.1. The purpose of parallel processing is to speed up the computer processing capability and increase its throughput, that is, the amount of processing that can be accomplished during a given interval of time.2. It is characteristic of pipelines that several computations can be in process in distinct segments at the same time.3. To achieve the required level of high performance it is necessary to utilize the fastest and most reliable hardware and apply innovative procedures from vector and parallel processing techniques.4. In general, the greater the number of instructions in an instruction set, the larger the propagation delay is within the CPU.5. Although CISC processors are more complex, this complexity does not necessarily increase development costs.Chapter 4 Algorithms and Data StructureI. Fill in the following blanks.1. Each primitive consists of two parts: ________and ________.2. A________is a notational system in which ideas can be expressed informally during the algorithm development process.3. The ________is refer to the computational time required by an algorithm.4. We define the worst case running time of an algorithm to be the _______ running time of that algorithm over all possible inputs of size n.5. A ______ is one of the most fundamental data structures used to store a collection of data items.II. True or False.1. A number of different algorithms can exist for solving a computational problem, and each of these algorithms could have a same running time complexity.2. The divide-and-conquer algorithm is a bottom-up technique that usually begins by solving the smallest subproblems, the dynamic programming solves problems in a top-down fashion.3. An important property of arrays is that their size and shape are constant.4. If all of the elements stored in a list are of the same type, then the list is said to be heterogeneous. However, if different types of elements are stored in the list, then the list is said to be homogeneous.5. A queue is a dynamic set that obeys the LIFO property.IV. Translating Terms.1. parallel algorithm2. exhaustive search3. dynamic programming4. doubly-linked list5. two-dimensional arrayVII. Choose the best one of the four answers given to fill in each blank.Algorithms are essential to the way computers process information, because a computer program is 1 an algorithm that tells the computer what specific 2 to perform in certain order in order to carry out a specified task, such as calculating employees’paychecks or printing students’report cards. Thus, an algorithm can be considered to be 3 sequence of operations that can be performed by a turning-complete system. In fact, a data structure is a way of 4 data in a computer so that it can be used efficiently. Often a carefully 5 data structure will allow the 6 efficient algorithm to be used. The choice of the data structure often begins from the choice of an 7 data type. A well-designed data structure allows a variety of critical operations to be performed, using as few resources, both execution time and memory space, as possible. Data structures are implemented by a 8 language as data types and the references and operations they provide. Moreover, different kinds of data structures are 9 to different kinds of applications, and some are highly specialized to certain tasks. For example, B-trees are particularly well-suited for implementation of databases, 10 networks of machines rely on routing tables to function.1. A. essentially B. essential C. partially D. mainly2. A. methods B. steps C. plans D. exercises3. A. some B. a C. the D. any4. A. receiving B. storing C. input D. output5. A. chosen B. made C. programmed D. picked6. A. very B. most C. more D. less7. A. abstract B.concrete C. special D. certain8. A. basic B. running C. programming D. advanced9. A. comforted B. suited C. compared D. hooked10. A. therefore B. with C. when D. whileVIII. Translate the following into English.1. In short, communication problems arise when the language used for an algorithm's representation is not precisely defined or when information is not given in adequate detail.2. Another common algorithmic structure involves that the need to continue executing a statement or sequence of statements as long as some condition remains true.3. In many algorithms, running time will vary not only for inputs of different sizes, but also for different inputs of the same size.4. Thus, dynamic programming is a bottom-up technique that usually begins by solving the smallest subproblems, saving these results, and then reusing them to solve larger and larger subproblems until the solution to the original problem is obtained.Chapter 5 Programming and LanguagesI. Fill in the following blanks.1. In programming, the documentation is classified _______, ______ and ________.2. A _________is a list of instructions or statements for directing the computer to perform a required data-processing task.3. The lowest level of programming languages is _______.4. Very-high-level languages are often called _________.5.________allow questions or commands to be framed in a more conversational way or in alternative forms.II. True or False.1. The computer hardware recognizes only assembly language instruction.2. A program written in the assembly language of one microprocessor can run on a computer that has a different microprocessor.3. Assembly languages are platform-independent, but high-level languages are not platform -independent.4. The 4GLs are also called nonprocedural languages.5. Each assembly language instruction corresponds to one unique machine code instruction. IV. Translating Terms.1. derived class2. Inheritance3. markup languages4. Hyperlinks5. Java virtual machineVII. Choose the best one of the four answers given to fill in each blank.A total computer system includes both hardware system and software system. Hardware consists of the 1 components and all associated equipment. Software refers to the programs that are 2 for the computer. It is possible to be familiar with various 3 of computer software without being concerned with details of how the computer hardware operates.A programming language is a language used to write computer programs, which involvea computer 4 some kind of computation or algorithm and possibly control over5 devices such as printers, robots, and so on. Programming languages differ from6 languages in that natural languages are only used for interaction between people, while programming languages also allow humans to communicate7 to machines. Some programming languages are used by one device8 control another. A prominent 9of programming languages is to provide instructions to a computer. Thousands of different programming languages have been 10 , and new languages are created every year.1. A. mental B. possible C.essential D. physical2. A. design B. spoken C. written D. made3. A. parts B. kinds C.types D. aspects4. A.performed B. to perform C. performing D. performs5. A.intenal B. external C. inside D. outside6. A. natural B. Human C. computer D. artificial7. A.orders B. instructions C. codes D. calls8. A. to B. for C. with D. over9. A. show B. research C. purpose D. study10. A. creating B. created C. to create D. creationVIII. Translate the following into English.1. Documentation is needed for everyone who will be involved with the program——users, operators, and programmers.2. Rather, programs written in a high-level language or assembly language are converted to machine language, which is then executed by the computer.3. The corresponding programs set forth precise procedures, or series of instructions, and the programmer has to follow a proper order of actions to solve a problem.4. 4GLs may not entirely replace third-generation languages because they are usually focused on specific tasks and hence offer fewer options.5. Inheritance is the means by which objects of a class can access member variables and functions contained in a previously defined class, without having to restate those definitions.Chapter 6 Operating SystemsI. Fill in the following blanks.1. The portion of an operating system that defines the interface between the operating system and its users is often called the .2. An operating system’s kernel consists of the file management, _______, I/O management, and the scheduler.3. _______ contains all the information that is required by the operating system to manage the process, including its current state, resources allocated to it, priority and other relevant data.4. A _____process is waiting for the completion of some event, such as an I/O operation.5. There are three general approaches to dealing with deadlock: ______, ______ and .II. True or False.1. A blocked process is one that is not currently executing but that is ready to be executed as soon as the operating system dispatches it.2. Semaphores are used for signaling among processes and can be used readily to enforce a mutual-exclusion discipline.3. A consumable resource is one that is not depleted or destroyed by use, such as an I/O channel or a region of memory.4. Windows 3.x are support for longer filenames and Plug and Play.5. UNIX is a multi-user, multitasking operating system with built-in networking capability.IV. Translating Terms.1. graphical user interface (GUI)2. process control block3. mutual exclusion4. Semaphores5. concurrent processesVII. Choose the best one of the four answers given to fill in each blank.An operating system is the software component of a computer system that is responsible 1 the management and coordination of activities and the 2 of the resources of the computer. The operating system (OS) acts as a host for application programs that are run on the machine. As a host, one of the purposes of an operating system is 3 the details of the operation of the hardware. This relieves application programs 4 having to manage these details and makes 5 easier to write applications. Almost all computers, including hand-held computers, desktop computers, supercomputers, and 6 modern video game consoles, use an operating system of some type.Operating systems offer a number of services to application programs and users. Applications access these services through application programming 7 (APIs) or system calls. By 8 these interfaces, the application can request a service from the operating system, pass parameters, and receive the results of the operation. Users may also 9 with the operating system by typing commands or using a graphical user interface (GUI).Common contemporary operating systems include Windows XP, Mac OS X, Amiga OS, Linux and Solaris. Microsoft Windows has a significant majority of market 10 in the desktop and notebook computer markets.1. A. in B. with C. over D. for2. A. sharing B. using C. commanding D. controlling3. A. handling B. to handle C. handle D. handled4. A. to B. from C. since D. due5. A. that B. which C. this D. it6. A. more B. even C. great D. so7. A. internet B. indications C. interfaces D. interchange8. A. invoke B. to invoke C. invoking D. invoked9. A. interacted B. interact C. interactive D. nteraction10. A. part B. place C. strategy D. ShareVIII. Translate the following into English.1. The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system.2. Modern shells perform this task by means of a graphical user interface (GUI) in which objects to be manipulated, such as files and programs, are represented pictorially on the monitor screen as icons.3. The basic technique for a time-sharing system is to have multiple users simultaneously using the system through terminals, with the operating system interleaving the execution of each user program in a short burst, or quantum, of computation.4. A real-time process or task is one that is executed in connection with some process or functionor set of events external to the computer system and that must meet one or more deadlines to interact effectively and correctly with the external environment.5. Providing a similar interface to Windows 9x, it is a multitasking, multiprocessing operating system with built-in support for large networks of computers——that is, Windows NT is a multi-user system.Chapter 7 Applications softwareI. Fill in the following blanks.1. ________ software allows you to create and edit documents.2. ________ is a activity of moving quickly upward or downward through the text or other screen display.3. The software which is the layer of software closest to the user is ________ .4. Microsoft Excel and Lotus 1-2-3 are the principal ________ programs.5. ________ is software that is used on a network and serves a group of users working together on the same project.II. True or False.1. Word processing and database management system are two most popular applications.2. Electronic spreadsheet software enables you to perform “what-if ” calculations.3. A worksheet is composed of fields, records, and files.4. You can access the World Wide Web using multimedia authoring software.5. OLE is used to collect information from the user and display helpful messages.III. Matching the terms.(A)Cell (B) Macro (C) Workflow software (D) Function (E) Integrated software1._______ The feature that allows you to use a single keystroke, command, or toolbar button to automatically issue a predetermined series of commands.2._______ The place where a row and a column intersect in the spreadsheet software.3._______ The built-in formulas that perform common calculations in the spreadsheet software.4._______ Software that can help workers understand and redesign the steps that make up a particular process.5._______ Software that combine the features of several applications programs——such as word processing, spreadsheet, database, graphics, and communications——into one software package.VII. Choose the best one of the four answers given to fill in each blank.Application software is the software designed to help you solve problems specific to business or perform specific business tasks. It is a 1 of computer software that employs the capabilities of a computer directly and 2 to a task that the user wishes to perform. This should be 3 with system software which is involved in integrating a computer's various capabilities, but typically does not 4 apply them in the performance of tasks that benefit the user. The exact definition between system software 5 as operating systems and application software is not precise, however, and is occasionally subject 6 controversy. An application thus differs from an operating system which runs a computer, a utility which performs maintenance or general-purpose chores, and a programming language 7which computer programs are created. 8 on the work for which it was designed, an application can manipulate text, numbers, graphics, or a combination of these elements. Some application packages offer 9 computing power by focusing on a single task, such as word processing; others, called 10 software, offer somewhat less power but include several applications, such as a word processor, a spreadsheet, and a database program.1. A. Subclass B. class C. Kind D. type2. A. Thorough B. Thoroughly C. Through D. although3. A. Compared B. comparing C. contrasted D. contrasting4. A. indirectly B. mainly C. directly D. necessarily5. A. such B. so C. much D. in6. A. to B. in C. with D. under7. A. for B. with C. in D. on8. A. Depend B. To depend C. Depended D. Depending9. A. considerate B. consider C. consideration D. considerable10. A. whole B. single C. integrated D. massVIII. Translate the following into English.1. Application software is the software designed to help you solve problems specific to business or perform specific business tasks.2. Although applications software packages differ in their use of specific commands and functions, most of them have some features in common.3. Many applications software programs allow you to copy an item from one document and then paste it into another document or application, or copy an item and place the copy in another part of the same document.4. The user can do all these manipulations on screen, in “wysiwyg”fashion, before printing out hardcopy.5. It’s worth noting that word processing programs (and indeed most forms of applications software) come from the manufacturer with default settings.11。
《计算机专业英语》期末考查试卷(B卷)及答案
适用专业:translate them into Chinese.(20points)1、GUI2、RAM3、OS4、BIOS5、ALU(20points)( )1.Who contributed the stored-program technique first?A.V on NeumannB.ThomasC.Bill gatesD.John P.Eckert( )2.What is the main component of ENIAC?A.VLSIB.LSIC.transistorD.vacuum tube( )3.Data enters the computer is call .rmationB.inputC.outputD.program( )4.A computer usually have the following secondary devices except .A.CD-ROMB.tapeC.video diskD.floppy disk( )5.There are several stages in the software development process.Afive B.two C.three D.four( )6. How many frames do films require per second?A.24B.30C.60D.288( )7.The is the speed at which a hard drive finds data.A.capacityB.versionC.costD. average access time( )8.There are several kinds of system software,such as .A.Microsoft WordB.DelphiC.virusD.Windows( )9. Multimedia PC can run multimedia application, normally equipped with a sound card, a high-resolution color monitor and .A.modemB.registerC.CD-ROM driveD.synthesizer( )10.Which protocol does Internet mainly use?A.The OSI reference modelB.TCP/IPC.File Transfer PotocolD.HTTPⅢ.Match the following terms or phrases. (20points)1、position ( ) A.生存周期2、sample ( ) B.模拟系统3、workstation ( ) C.维护4、install ( ) D.补丁5、processor ( ) E.指令6、debug ( ) F.安装7、circuit ( ) G.工作站8、instruction ( ) H.处理器9、memory ( ) I.终端10、register ( ) J.存储器11、patch ( ) K.采样12、maintain ( ) L.调试13、lifecycle ( ) M.远程登录14、performance ( ) N.电路15、desktop ( ) O.定位16、telnet ( ) P.寄存器17、terminal ( ) Q.性能18、project ( ) R.项目19、encode ( ) S.桌面20、simulator ( ) T.编码Ⅳ.Translate the following sentences into Chinese. (20points)1. For the vast majority of ordinary home and business users, what really matters on their home computers may be four things related to technology.2.If a user accesses a document containing a macro virus and unwittingly executes this macro virus, it can then copy itself into that application's startup files. The computer is now infected——a copy of the macro virus resides on the machine.3.The way in which a virus becomes active depends on how the virus has been designed,e.g. macro viruses can become active if the user simply opens,closes or saves an infected document.4.A boot sector virus can only infect a machine if it is used to boot-up your computer,e.g. if you start your computer by using a floppy disk with an infected boot sector, your computer is likely to be infected.Ⅴ. Writting(20points)What is network? Please try to describe it by your own words(no less than 100 words).《计算机专业英语》期末考查试卷答案(B)Ⅰ.Write the full names of the following words and translate them into Chinese.1.GUI:Graphical User Interface 图形用户界面2.RAM:Random Access Memory 随机存储器3.OS:Operating System 操作系统4.BIOS:Basic Input Output System 基本输入输出系统5.ALU: Arithmetic and Logic Unit 算术和逻辑单元Ⅱ.Choose the best words for the following sentences.ADBBA ADDABⅢ.Match the following terms or phrases.O K G F H L N E J P D C A Q S M I R T BⅣ.Translate the following sentences into Chinese.1、对于绝大多数一般的家庭和商业用户来说,技术上真正重要的是以下四项:噪音、尺寸、键盘和显示器。
《计算机专业英语》期末考试试卷A卷及答案
适用专业:1、What is the name of the first electronic numerical computer? ()A. Altair 8800B. ENIACC. ENV ACD. All wrong2、Which does not use the stored-program technique? ()A. Altair 8800B. ENV ACC. ENIACD. All wrong3、What does RAM stand for? ()A. A power supplyB. Random Access MemoryC. Read-only MemoryD. All wrong4、The main component of ENIAC is ()A.TransitorB. Vacuum cubeC. LSID. All wrong5、Who contributed the stored-program technique first? ()A. Bill GatesB. John P.EckertC. Von NeumannD. All wrong6、Which is not one of the four parts that comprise a processor? ()A. ClockB. MemoryC. RegisterD. ALU7、A computer system contains input device, output device, CPU and _________. ()A. ROMB. RAMC. MemoryD. Register8、The processor consists of ____________. ()A. clock, ALU, register and operation codeB. ALU, instruction control, clock and registerC. CPU, memory, register and clockD. instruction control, clock, operation code and operand9、Which is the heart and soul of a computer, and it can manipulate data and control all the rest part of the computer? ()A. MemoryB. Input deviceC. RegisterD. CPU10、Which of the following tells CPU where to find the data to be manipulated? ()A. ClockB. Instruction control unitC. Operation codeD. Operand11、When we buy a computer, we usually consider the ________ first, that means a clock’s frequency. ()A. Main frequencyB. boardC. displayD. keyboard12、________ holds control information, key data and some intermediate results. ()A. RegisterB. Instruction control unitC. ALUD. Storage13、When electric current does not pass through transistors on the microchip, the switch is ________ and it represents a ____________. ()A. Off, 1B. Off, 0C. On, 1D. On, 014、An OA consists of one or more ________ that manage the operations of a computer. ()A. InterfacesB. ProgramsC. Kernel techniquesD. Account number15、In order to complete specific file and program management tasks, Windows XP uses a ________ that icons can easily be seen on the screen. ()A. Plug and PlayB. Media PlayerC. GUID. IE16、Which is the enhanced network property of Windows XP? ()A. Remote desktopB. Multi-user operationC. IE 6.0D. A and C17、Early on, program worked with the most primitive ______________. ()A. Natural languageB. High-level languageC. Assembly languageD. Machine language18、The first assembly languages emerged in the late ______________. ()A. 1940sB. 1950sC. 1960sD. 1970s19、The __________ is language that was represented by long strings of ones-zeroes. ()A. High-level languageB. Assembly languageC. Machine languageD. Low-level language20、__________ can be assigned different values within the program. ()A. ExpressionsB. ParametersC. VariablesD. Pointers21、Which is a piece of a statement that describes a series of computations to be performed on some of program’s variables? ()A. An expressionB. A functionC. A variableD. A pointer22、A protocol is a set of ______________. ()A. DriversB. ServersC. RegulationsD. hardwares23、Which of the following statements are not the steps of website design? ( )A. Determine consumersB. Webpage designC. Surf the WWWD. Publish the website24、When you edit your webpage, your steps do not include ____________. ( )A. Create user-friendly navigationB. Page layoutC. Publish your websiteD. Using graphic25、____________ is not search engine? ( )A. GoogleB. baiduC. NetscapeD. taobao二、连线题(25小题,每题1分,共25分)注:从右侧表中选择最合适的选项,将对应的标号填入左表中。
计算机专业英语期末试题及答案
计算机专业英语试题及答案Ⅰ. Vocabulary(词汇)(30分) (一).Translate the the following following following words words words and and and expressions expressions expressions into into into Chinese(Chinese(写出下列词组的汉语。
)(共10分,每题1分) 1.operating system 2.requirements analysis 3.network security 4.data structure 5.decision support system 6. relational database 7. software crisis 8. computer virus 9. email attachment 10.central processing unit ( CPU ) (二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分) 1.数据库管理系统 2.传输控制协议.传输控制协议 3.多文档界面 4.面向对象编程 5.只读存储器 6.数字视频光盘 7.计算机辅助设计 8.结构化查询语言 9.通用串行总线 10.企业之间的电子商务交易方式.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分) 1. multimedia a.字处理器字处理器2. software life cycle b.交换机交换机3. structured programming c.多媒体多媒体4. functional testing d.局域网局域网5. word processor e.结构化程序设计结构化程序设计6. code windows f.软件生命周期软件生命周期7. firewall g.功能测试功能测试8. LAN h.代码窗口代码窗口9. hacker i.黑客黑客10. switch j.防火墙防火墙1. 6. 2. 7. 3. 8. 4. 9. 5. 10. Ⅱ. Comprehension(阅读理解) (一)Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
计算机专业英语期末作业
第一篇参考文献AN APPLICATION OF THE FELLEGI-SUNTER MODEL OF RECORD LINKAGE TO THE 1990 U.S. DECENNIALCENSUS记录连接的FELLEGI-SUNTER模型在美国1990年十年人口普查中的应用William E. Winkler and Yves ThibaudeauU.S. Bureau of the CensusAbstract:This paper describes a methodology for computer matching the Post Enumeration Survey with the Census. Computer matching is the first stage of a process for producing adjusted Census counts. All crucial matching parameters are computed solely using characteristics of the files being matched. No a priori knowledge of truth of matches is assumed. No previously created lookup tables are needed. The methods are illustrated with numerical results using files from the 1988 Dress Rehearsal Census for which the truth of matches is known.Key words and phrases : EM Algorithm ; String Comparator Metric ; LP Algorithm; Decision Rule ; Error Rate.摘要:本文介绍了一种电脑匹配人口普查的覆核统计调查的方法。
计算机英语期末考试作文
计算机英语期末考试作文As the end of the semester approaches, students are faced with the daunting task of preparing for their computer English final exam. This crucial assessment not only tests their knowledge of the subject matter but also their ability to effectively communicate in English. For many students, this exam represents the culmination of months of hard work and dedication. It is a time to showcase what they have learned and demonstrate their proficiency in both computer science and English language skills. The computer English final exam covers a wide range of topics, from programming languages to technical writing. Students must be well-versed in the terminology and concepts related to both computer science andEnglish in order to succeed. This requires a deep understanding of complex algorithms, data structures, and software development principles, as well as the ability to effectively convey this information in written form. The examchallenges students to think critically, analyze information, and articulate their thoughts clearly and concisely. Preparing for the computer English final exam can be a stressful and overwhelming experience for many students. The pressure to perform well can lead to feelings of anxiety and self-doubt. Students may spend countless hours studying, reviewing notes, and completing practice exams in an effort to feel confident and prepared. The fear of failure looms large, as the outcome of the exam can have a significant impact on their academic standing and future opportunities. Despite the challenges and pressures associated with the computer English final exam, it also presents an opportunity for growth and development. By engaging with the material, students can deepen their understanding of computer science concepts and improve their English language skills. The exam encourages students to push themselves beyond their comfort zones, to think critically and creatively, and to communicate effectively in a professional setting. It is a chance to demonstrate their knowledge and abilities, to showcase their potential, and to set themselves apart from their peers. In addition to the academic benefits of the computer English final exam, it also serves as a valuable learning experience for students. The process of preparingfor and taking the exam teaches important skills such as time management, organization, and problem-solving. It requires students to prioritize theirstudies, set goals, and work diligently towards achieving them. The exam fosters a sense of discipline and resilience, as students must persevere through challenges and setbacks in order to succeed. As the day of the computer English final exam approaches, students may feel a mix of emotions – excitement, nervousness, anticipation. They have put in the time and effort to prepare, and now it is time to put their knowledge and skills to the test. The exam represents a culmination of their hard work and dedication throughout the semester, a chance to demonstrate what they have learned and how far they have come. It is a moment of truth, a challenge to rise to the occasion and show what they are capable of achieving.。
计算机专业英语期末考复习资料(推荐文档)
考试范围:Unit 1,Unit2, Unit3.3,3.4,3.5, Unit 4.1, 课后练习,以及翻译练习一,单选15题(30%)范围:1.ENIAC were called ____A__,and typically cost more than a million dollarsA. mainframesB. PCC. minicomputerD. Microcomputerputers are _____D___devices that can follow ________ to accept input, process that input, and procedure information.A. electric, wordsB. electrical, instructuresC. electronic, wordsD. electronic instructions3.___D__ printer uses heat element to produce images on heat-sensitive paper.A. Dot-MatrixB.Ink-JetC. LaserD.Thermal4.____A__ directs the movement of electronic signals between memory and the ALU.A. Control unitB.CPUC. MotherboardD.Memory5._____B__ is short for characters per second.A. MIPS(每秒钟百万条指令)B.CPS(中央处理系统)C. CPUD.OS6._____A___ operating system is the most widely used operating system.A. WindowsB.UnixC. LinuxD.Mac7.DOS means_____C___.A. 光盘操作系统B. 软盘操作系统C.磁盘操作系统 D. 硬盘操作系统8.Software Crisis means_____D___.A. 软件开发B. 软件需求C.硬件危机 D. 软件危机9.下面哪个单词的含义是“封装”____B____.A. inheritance (继承)B. encapsulationC. polymorphism (多态性)D. prototype (原型;样机;样品)10.____B___is just a particular type of computer system.A. BrowserB.JavaC. PlatformD.Virtual machine (虚拟机)11. B is used to communicate with another computer over telephonelines.A. keyboardB. modemC. mouseD. printer12. C is a device that enables the computer to handle sounds.A. network cardB. video cardC. sound cardD. monitor13. A is a word processing tool that helps you to create qualitydocuments.A. Word 2003B. Outlook 2003C. Access 2003D. Excel 200314. B is the latest(最新)desktop version of the Windows operatingsystem from Microsoft.A. Windows NTB. Windows 7C. Windows VistaD. WindowsXP15.Which one is not a computer languages? AA. PowerpointB. PASCALC. JavaD. C++16.The heart of a computer system is _ A___A.CPUB. hard diskC. memoryD. main board17.A virus(病毒)is a A.A. programB. computerC. bad manD. beast18.The basic hardware(基本硬件)components of a personal computerconsist of the D .A. keyboard and mouseB. storage devices(存储设备)and displayC. CPUD. all of above19.The central processing unit (CPU) has two parts:A .A. control unit(控制单元)and ALU(算术逻辑单元)B. ALU and registerC. register(注册)and control unitD. ALU and memory20.The more popular operating system is B operating system.A. MS DOSB. WindowsC. UNIXD. Linux21.The desirable features(特点)of the software produced by object-oriented designs(面向对象设计)are the following aspects expect D .A. minimal coupling(最小的耦合)B. functional cohesion(函数内聚)C. information hiding(信息隐藏)D. hierarchical date base(层次数据库)22.Which one of the following descriptions(描述)is not true aboutsoftware crisis? CA. Software is hard to estimate and scheduled.(软件难以评估和使用)B. Software becomes increasingly expensive.(软件变得越来越昂贵)C. Software is almost impossible to identify.(软件是几乎不可能确定)D. Software is almost impossible to manage. (软件是几乎是不可能的管理)23.In computer science, AI is the abbreviation(简称)of theB .A. Adequate IntakeB. Artificial Intelligence(人工智能)C. Analogy InputD. Appreciative Inquiry24 C are the only languages understood by computers.A. High-level languagesB. Assembly languages(汇编语言)C. Machine languages(机器语言)D. Object-oriented programming languages25.The biggest in size, the most expensive in price than any other is classified(分类)and known as A .A. Super ComputersB. MainframesC. MinicomputersD.Portable Computers二,判断10题(10%)范围:以课后练习为主三,阅读理解4篇20题(40%)P16 4,5,6段P37 倒1 P57 倒数2段(java)P67 1,3,5,6段1、In order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer.If you want to solve the computational problem with a computer, you should learn how to program.The task of developing programs for the soultion of computational problems is referred to as programming.Computer programming is the process of planning and creating a sequence of steps for a computer to follow.In general,this process will help usresolve a problem,which is either too tedious (冗长的) or difficult to work out otherwise.So programming is breaking a task down into small steps.译:为解决计算问题,其解决方案必须被指定在一个计算步骤的序列,每一个可能由一个人或一个数字计算机。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Chapter1Computer Science in EnglishI.Fill in the following blanks.1._________is designed to accomplish real-world tasks in fields.2.An8-bit signed integer can have any value between____and3.____controls the computer and enables it to run the hardware and applications software.4.A computer system consists of____and____.5.List four types of computers:___,___,___and____.II.True or False.1.The software system is the physical equipment that you can see and touch.2.Typically,a data value is set to zero to represent FALSE and1value for TRUE.3.In the earliest general-purpose computer,most input and output media were magnetic disks.4.Supercomputers are largest,fastest,and most expensive computer available.5.A computer system consists of hardware system and software system.III.Matching terms.(a)integrated circuit(IC)(b)CPU(c)bit(d)ASCII1._______The processing unit is at the heart of a computer.2._______A unit of information conveyed by a single binary digit.3._______A complete electronic circuit that packages transistors and other electronic components on a small silicon chip.4._______A system for encoding characters as binary digits.IV.Translating Terms.(1)coding techniques(2)application software(3)floating point data(4)timesharing(5)storage capacitiesVII.Choose the best one of the four answers given to fill in each blank.This chapter introduces digital computer,data types,the evolution of computers,and types of computers.1is known to all,it’s hard to find a field in2computers are not being used.Digital computer,also called electronic computer or computer,is a digital system that3 various computational tasks.Digital computers use the4number system,which has two digits:0and1.By using various coding5,groups of bits can be made to represent not only binary numbers6other discrete symbols,such as decimal digits or letters of the alphabet.A computer system consists of hardware system and software system.Programs tell the hardware what to do.7software is designed to accomplish real-world tasks in fields such as accounting,entertainment,and puters are usually8into four broad categories:microcomputers,minicomputers,mainframe computers,and supercomputers.It’s hard to give a9definition to each type because computer speeds and storage10 change rapidly.1.A.As B.It C.As it D.That2.A.what B.which C.where D.when3.A.performs B.carries C.makes D.integrates4.A.decimal B.binary C.Arabian D.American5.A.technique B.technologyC.techniquesD.technologies6.A.instead of B.rather thanC.but alsoD.as well7.A.Application B.System C.Word D.Excel8.A.put B.made C.conducted D.classified9.A.precious B.progress C.proceeding D.precise10.A.capacities B.capable C.capabilities D.capacityVIII.Translate the following into English.1.By using various coding techniques,groups of bits can be made to represent not only binary numbers but also other discrete symbols.2.System software includes not only the complex programs used by technicians to create application software in the first place but also the organizational programs needed to start up the computer and govern its use of other programs.3.Data are numbers and other binary-code information that are operated on to achieve required computational results.4.Rather than arithmetically or logically manipulating characters,a computer may concatenate strings of characters,replace some characters with others,or otherwise manipulate character strings.5.Software applications like word processing,electronic spreadsheets,database management programs,painting and drawing programs,desktop publishing,and so forth became commercially available,giving more people reasons to use a computer.Chapter2Computer Science in EnglishI.Fill in the following blanks.1.The computer hardware consists of three major parts which are the CPU,the memory subsystem,and_______.2.There are two major types of memory:Random Access Memory(RAM)and_____.3.The cache memory in personal computers is constructed from_______.4._______provides a method for transferring information between internal storage and external I/O devices.5.Data transfer between the central computer and I/O devices may be handled in a variety of modes.These modes are programmed I/O,_______,and direct memory access(DMA).II.True or False.1.The data bus always receives data from the CPU,and the CPU never reads the data bus.2.Main memory holds whatever programs and data are available for immediate use by the CPU.3.Dynamic RAM does not have to be refreshed.4.Dot-matrix printer work by squirting tiny droplets of liquid ink at the paper.5.The auxiliary memory is very small,relatively expensive,and has very high access speed.III.Matching terms.(A)ALU(B)RAM(C)E2PROM(D)DMA1.________an electrically erasable PROM2.________A transfer mode that can be improved is the transfer of data between memory and I/O devices.3.________The unit which performs most arithmetic and logical operations4.________Memory that is erased when the computer is turned off.IV.Translating Terms.1.system buses2.virtual memoryputer architecture4.instruction set5.direct memory accessVII.Choose the best one of the four answers given to fill in each blank.A computer system1of hardware system and software system.The hardware of the computer is usually divided into three major parts or three2subsystems:the CPU, the memory subsystem,and the I/O3.The CPU is made up of three major parts, Register Set,the4logic unit,or ALU,and Control Unit.It performs many operations and controls computer.Memory is also known as5memory or main memory,which is cataloged into two major types of memory:Random Access Memory(RAM)and Read Only Memory(ROM).It refers to the6in the computer that hold whatever programs and data are available7immediate use by the CPU,along with the program’s data. Computer systems include special hardware8between the CPU and peripherals to supervise and synchronize all input and output transfers.These components are called9 units because they interface between the processor bus and the peripheral device.The I/O subsystem allows the CPU to10with input and output devices.1.A.consists B.makes up C.constitutes prise2.A.premier B.primary C.preliminary D.elementary3.A.system B.machine C.subsystem D.device4.A.mathematic B.authorative C.arithmetic D.authoritative5.A.external B.exterior C.Interior D.internal6.A.circuits B.wires C.lines D.hardware7.A.by B.for C.with D.in8.A.software B.setting C.listing ponents9.A.singular B.dual C.interface pact10.A.handle B.interact C.respond D.linkVIII.Translate the following into English.1.By asserting these internal and external control signals in the proper sequence,the control unit causes the CPU and the rest of the computer to perform the operation needed to correctly process instructions.2.In a computer with virtual memory,less-used parts of programs are shifted from RAM to a hard disk and are moved back only when needed.3.A technique used to compensate for the mismatch in operating speeds is to employ an extremely fast,small cache between the CPU and main memory whose access time is close to processor logic clock cycle time.4.The data transfer rate of peripherals is usually slower than the transfer rate of the CPU,and consequently,a synchronization mechanism may be needed.5.In some computers the interrupt vector is an address that points to a location in memory where the beginning address of the I/O service routine is stored.Chapter3Computer System ArchitectureI.Fill in the following blanks.1.It is characteristic of________that several computations can be in process in distinct segments at the same time.2.___________is made possible by associating a register with each segment in the pipeline.3.The vector instruction includes the initial address of the operands,_______,and the operation to be performed.4.______processors have fewer and simpler instructions than_______processors.5.The sequence of instructions read from memory constitutes an______.The operations performed on the data in the processor constitutes a_________.II.True or False.1.Shift registers operate in serial fashion all the bits of the word at a time.2.RISC processors have larger instruction sets that often include some particularly complex instructions.3.SIMD represents an organization that includes many processing units under the supervision ofa common control unit.4.Parallel processing is established by distributing the data among the multiple functional units.5.RISC is a complex instruction set computer.III.Matching terms.(a)SISD(b)SIMD(c)MISD(d)MIMD1._______multiple instruction stream,single data stream2._______single instruction stream,multiple data stream3._______multiple instruction stream,multiple data stream4._______single instruction stream,single data streamIV.Translating Terms.1.parallel processing2.pipeline processing3.vector processing4.scalar processor5.backward compatibilityVII.Choose the best one of the four answers given to fill in each blank.In computer engineering,computer architecture is the___1___design and fundamental operational structure of a computer system.It is a___2___and functional description of requirements,especially speeds and interconnections,and design implementations for the various parts of a computer____3___largely on the way by which the central processing unit (CPU)performs internally and accesses addresses in puter system architecture ___4___the design of the four___5___:parallel processing,pipelining,vector processing and RISC.Parallel processing system is used to provide simultaneous data-processing tasks for the purpose of increasing the___6__speed of a computer systemand is able to perform___7___data processing to achieve faster execution time.A pipeline is a set of data processing elements connected in series,so that the output of one element is the input of the next one.The elements of a pipeline are often___8___in parallel or in time-sliced fashion.A vector processor,is a CPU design that is able to run mathematical operations on multiple data elements simultaneously. Computers with vector processing capabilities are in demand in9___applications.RISC processors have fewer and__10___instructions than CISC processors.As a result,their control units are less complex and easier to design.stest B.conceptual C.ideal D.simple2.A.plan B.design C.blueprint D.concept3.A.relying B.depending C.attaching D.focusing4.A.refers B.speaks C.involves D.interacts5.A.ingredients B.types C.kinds D.listsputational puter putation puting7.A.current pound C.concurrent D.massive8.A.displayed B.carried C.accomplished D.executed9.A.special B.specialized C.specific D.especial10.A.simple B.simplifying C.singular D.simplerVIII.Translate the following into English.1.The purpose of parallel processing is to speed up the computer processing capability and increase its throughput,that is,the amount of processing that can be accomplished during a given interval of time.2.It is characteristic of pipelines that several computations can be in process in distinct segments at the same time.3.To achieve the required level of high performance it is necessary to utilize the fastest and most reliable hardware and apply innovative procedures from vector and parallel processing techniques.4.In general,the greater the number of instructions in an instruction set,the larger the propagation delay is within the CPU.5.Although CISC processors are more complex,this complexity does not necessarily increase development costs.Chapter4Algorithms and Data StructureI.Fill in the following blanks.1.Each primitive consists of two parts:________and________.2.A________is a notational system in which ideas can be expressed informally during the algorithm development process.3.The________is refer to the computational time required by an algorithm.4.We define the worst case running time of an algorithm to be the_______running time of that algorithm over all possible inputs of size n.5.A______is one of the most fundamental data structures used to store a collection of data items.II.True or False.1.A number of different algorithms can exist for solving a computational problem,and each of these algorithms could have a same running time complexity.2.The divide-and-conquer algorithm is a bottom-up technique that usually begins by solving the smallest subproblems,the dynamic programming solves problems in a top-down fashion.3.An important property of arrays is that their size and shape are constant.4.If all of the elements stored in a list are of the same type,then the list is said to be heterogeneous.However,if different types of elements are stored in the list,then the list is said to be homogeneous.5.A queue is a dynamic set that obeys the LIFO property.IV.Translating Terms.1.parallel algorithm2.exhaustive search3.dynamic programming4.doubly-linked list5.two-dimensional arrayVII.Choose the best one of the four answers given to fill in each blank.Algorithms are essential to the way computers process information,because a computer program is1an algorithm that tells the computer what specific2to perform in certain order in order to carry out a specified task,such as calculating employees’paychecks or printing students’report cards.Thus,an algorithm can be considered to be3 sequence of operations that can be performed by a turning-complete system.In fact,a data structure is a way of4data in a computer so that it can be used efficiently.Often a carefully5data structure will allow the6efficient algorithm to be used. The choice of the data structure often begins from the choice of an7data type.A well-designed data structure allows a variety of critical operations to be performed,using as few resources,both execution time and memory space,as possible.Data structures are implemented by a8language as data types and the references and operations they provide. Moreover,different kinds of data structures are9to different kinds of applications, and some are highly specialized to certain tasks.For example,B-trees are particularly well-suited for implementation of databases,10networks of machines rely on routing tables to function.1.A.essentially B.essential C.partially D.mainly2.A.methods B.steps C.plans D.exercises3.A.some B.a C.the D.any4.A.receiving B.storing C.input D.output5.A.chosen B.made C.programmed D.picked6.A.very B.most C.more D.less7.A.abstract B.concrete C.special D.certain8.A.basic B.running C.programming D.advancedforted B.suited pared D.hooked10.A.therefore B.with C.when D.whileVIII.Translate the following into English.1.In short,communication problems arise when the language used for an algorithm's representation is not precisely defined or when information is not given in adequate detail.2.Another common algorithmic structure involves that the need to continue executing a statement or sequence of statements as long as some condition remains true.3.In many algorithms,running time will vary not only for inputs of different sizes,but also for different inputs of the same size.4.Thus,dynamic programming is a bottom-up technique that usually begins by solving the smallest subproblems,saving these results,and then reusing them to solve larger and larger subproblems until the solution to the original problem is obtained.Chapter5Programming and LanguagesI.Fill in the following blanks.1.In programming,the documentation is classified_______,______and________.2.A_________is a list of instructions or statements for directing the computer to perform a required data-processing task.3.The lowest level of programming languages is_______.4.Very-high-level languages are often called_________.5.________allow questions or commands to be framed in a more conversational way or in alternative forms.II.True or False.1.The computer hardware recognizes only assembly language instruction.2.A program written in the assembly language of one microprocessor can run on a computer that has a different microprocessor.3.Assembly languages are platform-independent,but high-level languages are not platform -independent.4.The4GLs are also called nonprocedural languages.5.Each assembly language instruction corresponds to one unique machine code instruction. IV.Translating Terms.1.derived class2.Inheritance3.markup languages4.Hyperlinks5.Java virtual machineVII.Choose the best one of the four answers given to fill in each blank.A total computer system includes both hardware system and software system.Hardware consists of the1components and all associated equipment.Software refers to the programs that are2for the computer.It is possible to be familiar with various3 of computer software without being concerned with details of how the computer hardware operates.A programming language is a language used to write computer programs,which involve a computer4some kind of computation or algorithm and possibly control over 5devices such as printers,robots,and so on.Programming languages differ from6 languages in that natural languages are only used for interaction between people,while programming languages also allow humans to communicate7to machines.Some programming languages are used by one device8control another.A prominent9of programming languages is to provide instructions to a computer.Thousands of different programming languages have been10,and new languages are created every year.1.A.mental B.possible C.essential D.physical2.A.design B.spoken C.written D.made3.A.parts B.kinds C.types D.aspects4.A.performed B.to perform C.performing D.performs5.A.intenal B.external C.inside D.outside6.A.natural B.Human puter D.artificial7.A.orders B.instructions C.codes D.calls8.A.to B.for C.with D.over9.A.show B.research C.purpose D.study10.A.creating B.created C.to create D.creationVIII.Translate the following into English.1.Documentation is needed for everyone who will be involved with the program——users, operators,and programmers.2.Rather,programs written in a high-level language or assembly language are converted to machine language,which is then executed by the computer.3.The corresponding programs set forth precise procedures,or series of instructions,and the programmer has to follow a proper order of actions to solve a problem.4.4GLs may not entirely replace third-generation languages because they are usually focused on specific tasks and hence offer fewer options.5.Inheritance is the means by which objects of a class can access member variables and functions contained in a previously defined class,without having to restate those definitions.Chapter6Operating SystemsI.Fill in the following blanks.1.The portion of an operating system that defines the interface between the operating system and its users is often called the.2.An operating system’s kernel consists of the file management,_______,I/O management,and the scheduler.3._______contains all the information that is required by the operating system to manage the process,including its current state,resources allocated to it,priority and other relevant data.4.A_____process is waiting for the completion of some event,such as an I/O operation.5.There are three general approaches to dealing with deadlock:______,______and.II.True or False.1.A blocked process is one that is not currently executing but that is ready to be executed as soon as the operating system dispatches it.2.Semaphores are used for signaling among processes and can be used readily to enforce a mutual-exclusion discipline.3.A consumable resource is one that is not depleted or destroyed by use,such as an I/O channel or a region of memory.4.Windows3.x are support for longer filenames and Plug and Play.5.UNIX is a multi-user,multitasking operating system with built-in networking capability.IV.Translating Terms.1.graphical user interface(GUI)2.process control block3.mutual exclusion4.Semaphores5.concurrent processesVII.Choose the best one of the four answers given to fill in each blank.An operating system is the software component of a computer system that is responsible1 the management and coordination of activities and the2of the resources of the computer.The operating system(OS)acts as a host for application programs that are run on the machine.As a host,one of the purposes of an operating system is3the details of the operation of the hardware.This relieves application programs4having to manage these details and makes5easier to write applications.Almost all computers,including hand-held computers,desktop computers,supercomputers,and6modern video game consoles,use an operating system of some type.Operating systems offer a number of services to application programs and users.Applications access these services through application programming7(APIs)or system calls.By8these interfaces,the application can request a service from the operating system,pass parameters,and receive the results of the ers may also9with the operating system by typing commands or using a graphical user interface(GUI).Common contemporary operating systems include Windows XP,Mac OS X,Amiga OS,Linux and Solaris.Microsoft Windows has a significant majority of market10in the desktop and notebook computer markets.1.A.in B.with C.over D.for2.A.sharing ing manding D.controlling3.A.handling B.to handle C.handle D.handled4.A.to B.from C.since D.due5.A.that B.which C.this D.it6.A.more B.even C.great D.so7.A.internet B.indications C.interfaces D.interchange8.A.invoke B.to invoke C.invoking D.invoked9.A.interacted B.interact C.interactive D.nteraction10.A.part B.place C.strategy D.ShareVIII.Translate the following into English.1.The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system.2.Modern shells perform this task by means of a graphical user interface(GUI)in which objects to be manipulated,such as files and programs,are represented pictorially on the monitor screen as icons.3.The basic technique for a time-sharing system is to have multiple users simultaneously using the system through terminals,with the operating system interleaving the execution of each user program in a short burst,or quantum,of computation.4.A real-time process or task is one that is executed in connection with some process or functionor set of events external to the computer system and that must meet one or more deadlines to interact effectively and correctly with the external environment.5.Providing a similar interface to Windows9x,it is a multitasking,multiprocessing operating system with built-in support for large networks of computers——that is,Windows NT is a multi-user system.Chapter7Applications softwareI.Fill in the following blanks.1.________software allows you to create and edit documents.2.________is a activity of moving quickly upward or downward through the text or other screen display.3.The software which is the layer of software closest to the user is________.4.Microsoft Excel and Lotus1-2-3are the principal________programs.5.________is software that is used on a network and serves a group of users working together on the same project.II.True or False.1.Word processing and database management system are two most popular applications.2.Electronic spreadsheet software enables you to perform“what-if”calculations.3.A worksheet is composed of fields,records,and files.4.You can access the World Wide Web using multimedia authoring software.5.OLE is used to collect information from the user and display helpful messages.III.Matching the terms.(A)Cell(B)Macro(C)Workflow software(D)Function(E)Integrated software1._______The feature that allows you to use a single keystroke,command,or toolbar button to automatically issue a predetermined series of commands.2._______The place where a row and a column intersect in the spreadsheet software.3._______The built-in formulas that perform common calculations in the spreadsheet software.4._______Software that can help workers understand and redesign the steps that make up a particular process.5._______Software that combine the features of several applications programs——such as word processing,spreadsheet,database,graphics,and communications——into one software package.VII.Choose the best one of the four answers given to fill in each blank.Application software is the software designed to help you solve problems specific to business or perform specific business tasks.It is a1of computer software that employs the capabilities of a computer directly and2to a task that the user wishes to perform. This should be3with system software which is involved in integrating a computer's various capabilities,but typically does not4apply them in the performance of tasks that benefit the user.The exact definition between system software5as operating systems and application software is not precise,however,and is occasionally subject6 controversy.An application thus differs from an operating system which runs a computer,a utility which performs maintenance or general-purpose chores,and a programming language7which computer programs are created.8on the work for which it was designed,an application can manipulate text,numbers,graphics,or a combination of these elements.Some application packages offer9computing power by focusing on a single task,such as word processing;others,called10software,offer somewhat less power but include several applications,such as a word processor,a spreadsheet,and a database program.1.A.Subclass B.class C.Kind D.type2.A.Thorough B.Thoroughly C.Through D.althoughpared paring C.contrasted D.contrasting4.A.indirectly B.mainly C.directly D.necessarily5.A.such B.so C.much D.in6.A.to B.in C.with D.under7.A.for B.with C.in D.on8.A.Depend B.To depend C.Depended D.Depending9.A.considerate B.consider C.consideration D.considerable10.A.whole B.single C.integrated D.massVIII.Translate the following into English.1.Application software is the software designed to help you solve problems specific to business or perform specific business tasks.2.Although applications software packages differ in their use of specific commands and functions, most of them have some features in common.3.Many applications software programs allow you to copy an item from one document and then paste it into another document or application,or copy an item and place the copy in another part of the same document.4.The user can do all these manipulations on screen,in“wysiwyg”fashion,before printing out hardcopy.5.It’s worth noting that word processing programs(and indeed most forms of applications software)come from the manufacturer with default settings.11。