最强计算机基础英语总结
合集下载
相关主题
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
8 The increase in_broadband_connections in homes is a key element in the second wave of electronic commerce.
第十二章
1 Accoring to the text, the largest category of computer criminals is _employees_.
7.The smallest unit of information handled by a computer is bit, which is the abbreviation of binary digit , A group of eight bits makes up a(n) byte .
2 People who gain unauthorized access to a computer system for fun and challenge are called _hackers _.
3 Peopleuter system for malicious purposes are called _crackers_.
4.According to the text, modern digital computer can be divided into four major categories on the basis of cost and performance. They are microcomputers, workstations , minicomputers,and mainframes .
2 Most people use the terms “electeonic commerce” and “electronic__business_interchangeably.
3 Based on the types of participating_entities_electronic commerce can be classified into five categories:B2B, B2B, business processes , C2C, and _B2G__.
2.A digital computer is generally made up of five distinct elements: a central proccessing unit, input devices, memory storage devices, output devices,and a bus.
6 The first wave of eletronic commerce was dominated by_ U.S.或American_companies.
7 In the first wave, there was an over-emphasis on creating new large enterprises to exploit eletronic commerce opportunities because of the easy access to start-up_capital.
4 Computer crime can take the form of damage_theft, and manipulation _.
6.A program is a sequence of instructions that can be executed by a computer. It can either be built be built into the hardware or exist independently in the form of software.
第八章
1、According to the geographical area covered ,a computer network is often classified as either a LAN , a(n) MAN ,or a WAN.
2、A net work can also be classified as either a(n) open network or a(n) closed network according to whether its internal operation is based on designs in the public domain or on innovation owned and controlled by a particular entity.
6 According to the text,the two main types of storage devices are_disk drives_and_memory _.
7 It can be said that having a steady power source is important for a computer because RAM is_volatile_memory.
英语(期末复习)
第一章
1.According to many historians,the true pioneers of the modern digital computer are Charles Babbage and Augusta Ada Byron .
5 In the text,the author mentions thess of the most commonly uesd types of printers. They are_dot-matrix printers_,laser printer,and__inkjet printers _.
3.The two most common types of scanners are flatbed scanners and hand-held scanners .
4.Video displays commonly task one of two forms, they are CRT-based screens and LCD-based screens.
4 The three most commonly used categories of eletronic commerce and B2C , _B2B__,and business processes.
5 In C2C trnasactions, one party is selling, and thus as a business, so they are sometimes treated as part of _B2C_electronic commerce.
8、Althought it is often used , the term peer-to-peer network is not very appropriate.
第十一章
1 The year 2000 was a turning point in electronic commerce. It maked the end of the “dot-com__boom ___”.
8.One of the trends in computer development is microminiaturization ,the effort to computer more circuit elements into smaller and smaller chip space.
4、A popular protocol in networks based on the ring topology is the token ring protocol developed by IBM in the 1970s.
5、In a(n) Ethernet system ,the right to transmit messages is controlled by the protocol know as CSMA/CD.
8 A(n)_serial_connection transfers only one piece of data at a time while a(n)_parallel_connection transfers blocks of information at the same time.
3.The microprocessor is a central processing unit on a single chip. It was made possible in the mid-1970s with the introduction of the LSI circuit and the VLSI circuit.
6、The client / server model for interprocess communication defines the basic roles played by the processes as either a client or a server.
7、The peer-to-peer model involves two processes communicating as equals and usually executing on a(n) temporary basis.
5.The first electronic computers, such as Colossus and ENIAC created in Britain and the United States respectively,used vacuum tubes, which later gave place to transistors .
第二章
1.The function of computer hardware is typically divided into there main categories. They are input ;, output ,and storage .
2.The software that controls the interaction between the input and output hardware is called BIOS, which stands for Basic Input/Output System .
3、A network can also be classified according to its topology .Among the most popular topologies are the bus topology , ring topology, and star topology.
第十二章
1 Accoring to the text, the largest category of computer criminals is _employees_.
7.The smallest unit of information handled by a computer is bit, which is the abbreviation of binary digit , A group of eight bits makes up a(n) byte .
2 People who gain unauthorized access to a computer system for fun and challenge are called _hackers _.
3 Peopleuter system for malicious purposes are called _crackers_.
4.According to the text, modern digital computer can be divided into four major categories on the basis of cost and performance. They are microcomputers, workstations , minicomputers,and mainframes .
2 Most people use the terms “electeonic commerce” and “electronic__business_interchangeably.
3 Based on the types of participating_entities_electronic commerce can be classified into five categories:B2B, B2B, business processes , C2C, and _B2G__.
2.A digital computer is generally made up of five distinct elements: a central proccessing unit, input devices, memory storage devices, output devices,and a bus.
6 The first wave of eletronic commerce was dominated by_ U.S.或American_companies.
7 In the first wave, there was an over-emphasis on creating new large enterprises to exploit eletronic commerce opportunities because of the easy access to start-up_capital.
4 Computer crime can take the form of damage_theft, and manipulation _.
6.A program is a sequence of instructions that can be executed by a computer. It can either be built be built into the hardware or exist independently in the form of software.
第八章
1、According to the geographical area covered ,a computer network is often classified as either a LAN , a(n) MAN ,or a WAN.
2、A net work can also be classified as either a(n) open network or a(n) closed network according to whether its internal operation is based on designs in the public domain or on innovation owned and controlled by a particular entity.
6 According to the text,the two main types of storage devices are_disk drives_and_memory _.
7 It can be said that having a steady power source is important for a computer because RAM is_volatile_memory.
英语(期末复习)
第一章
1.According to many historians,the true pioneers of the modern digital computer are Charles Babbage and Augusta Ada Byron .
5 In the text,the author mentions thess of the most commonly uesd types of printers. They are_dot-matrix printers_,laser printer,and__inkjet printers _.
3.The two most common types of scanners are flatbed scanners and hand-held scanners .
4.Video displays commonly task one of two forms, they are CRT-based screens and LCD-based screens.
4 The three most commonly used categories of eletronic commerce and B2C , _B2B__,and business processes.
5 In C2C trnasactions, one party is selling, and thus as a business, so they are sometimes treated as part of _B2C_electronic commerce.
8、Althought it is often used , the term peer-to-peer network is not very appropriate.
第十一章
1 The year 2000 was a turning point in electronic commerce. It maked the end of the “dot-com__boom ___”.
8.One of the trends in computer development is microminiaturization ,the effort to computer more circuit elements into smaller and smaller chip space.
4、A popular protocol in networks based on the ring topology is the token ring protocol developed by IBM in the 1970s.
5、In a(n) Ethernet system ,the right to transmit messages is controlled by the protocol know as CSMA/CD.
8 A(n)_serial_connection transfers only one piece of data at a time while a(n)_parallel_connection transfers blocks of information at the same time.
3.The microprocessor is a central processing unit on a single chip. It was made possible in the mid-1970s with the introduction of the LSI circuit and the VLSI circuit.
6、The client / server model for interprocess communication defines the basic roles played by the processes as either a client or a server.
7、The peer-to-peer model involves two processes communicating as equals and usually executing on a(n) temporary basis.
5.The first electronic computers, such as Colossus and ENIAC created in Britain and the United States respectively,used vacuum tubes, which later gave place to transistors .
第二章
1.The function of computer hardware is typically divided into there main categories. They are input ;, output ,and storage .
2.The software that controls the interaction between the input and output hardware is called BIOS, which stands for Basic Input/Output System .
3、A network can also be classified according to its topology .Among the most popular topologies are the bus topology , ring topology, and star topology.