计算机专业英语(一)
- 格式:doc
- 大小:56.50 KB
- 文档页数:4
计算机专业英语1210分Hard disk drives , floppy disk drives and _______drives serve as both input and output.magnetic正确答案:D310分A general purpose computer has four main components: the arithmetic logic unit (ALU),_______, the memory, and the input and output devices (collectively termed I/O).正确答案:A410分One means by which this is done is with a special signal called an _______ which can periodically cause the computer to stop executing instructions where it was and do something else instead.正确答案:C510分Some computers are designed to_________ their work across several CPUS in a multiprocessing configuration.正确答案:A⼆、阅读理解共1题,50分150分A general purpose computer has four main components: the arithmetic logic unit (ALU), the control unit, the memory, and the input and output devices (collectively termed I/O). These parts are interconnected by buses, often made of groups of wires. Inside each of these parts are trillions of small electrical circuits which can be turned off or on by means of an electronic switch. Each circuit represents a bit (binary digit) of information so that when the circuit is on it represents a “1”, and when off it represents a “0” (in positive logic representation). The Circuits are arranged in logic gates so that one or more of the circuits may control the state of one or more of the other circuits.The control unit, ALU, registers, and basic I/O (and often other hardware closely linked with these) are collectively known as a central processing unit (CPU). Early CPUs were composed of many separate components but since the mid-1970s CUPs have typically been constructed on a single integrated circuit called a microprocessor.The control unit (often called a control system or central controller) manages the computer’s various components; it reads and interprets, (decodes) the program instructions, transforming them into a series of control signals which activate other parts of the computer. Control systems in advanced computers may change the order ofsome instructions so as to improve performance.(1)、A general purpose computer has four main components: the arithmetic logic unit, the control unit, ________, and the input and output devices.正确答案:B(2)、If the circuit is on, it represents a ________(in positive logic representatio n).正确答案:A(3)、The central processing unit is composed of ________ components.正确答案:C(4)、the control unit can not _________.the program instructions.the program instructions into a series of contr ol signals.the program instructions.正确答案:C(5)、The control unit is called _________.central systemCPUcontrol circuit正确答案:D。
软件设计师-计算机专业英语(一)(总分80,考试时间90分钟)Originally introduced by Netscape Communications, (1) are a general mechanism which HTFP Server side applications, such as CGI (2) , can use to both store and retrieve information on the HTTP (3) side of the connection. Basically, Cookies can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (5) .1.A. BrowsersB. CookiesC. ConnectionsD. Scripts2.A. graphicsB. processesC. scriptsD. texts3.A. ClientB. EditorC. CreatorD. Server4.A. fixedB. flexibleC. stableD. stateless5.A. programsB. applicationsC. frameworksD. constraintsWebSQL is a SQL-like (6) language for extracting information from the web. Its capabilities for performing navigation of web (7) makes it a useful tool for automating several web-related tasks that require the systematic processing of either all the links in a (8) , all the pages that can be reached from a given URL through (9) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (10) Interface.6.A. queryB. transactionC. communicationD. programming7.A. browsersB. serversC. hypertextsD. clients8.A. hypertextB. pageC. protocolD. operation9.A. pathsB. chipsC. toolsD. directories10.A. RouterB. DeviceC. ComputerD. GatewayMIDI enables people to use (11) computers and electronic musical instruments. There are actually **ponents to MIDI, **munications" (12) .", the Hardware Interface and a distribution (13) called "Standard MIDI Files". In the context of the WWW, the most **ponent is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the **mon use of MIDI today.11.A. personalB. electronicC. multimediaD. network12.A. deviceB. protocolC. networkD. controller13.A. formatB. textC. waveD. center14.A. VideoB. FaxmailC. GraphicD. Audio15.A. messagesB. packetsC. frameD. informationCertificates are (16) documents attesting to the (17) of a public key to an individual or other entity. They allow verification of the claim that a given public key does in fact belong to a given individual. Certificates help prevent someone from using a phony key to (18) someone else. In their simplest form, Certificates contain a public key and a name. As commonly used, a certificate also contains an (19) date, the name of the CA that issued the certificate, a serial number, and perhaps other information. Most importantly, it contains the digital (20) of the certificate issuer.The most widely accepted format for certificates is X.509, thus, Certificates can be read or written by any **plying with X.509.16.A. textB. dataC. digitalD. structured17.A. connectingB. bindingC. composingD. conducting18.A. impersonateB. personateC. damageD. control19.A. communicationB. computationC. expectationD. expiration20.A. signatureB. markC. stampD. hypertextDOM is a platform-and language- (21) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently ,definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (22) . DOM is a (23) -based AP1 to documents, which requires the whole document to be represented in (24) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (25) documents that do not fit info the memory available for processing.21.A. specificB. neutralC. containedD. related22.A. textB. imageC. pageD. graphic23.A. tableB. treeC. controlD. event24.A. documentB. processorC. discD. memory25.A. XMLB. HTMLC. scriptD. webMelissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages (28) .As administrators seek to block dangerous email attachments through the recognition of well-known (29) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which while displaying some cute animation, simultaneously **mands in the background to steal your passwords and give the (30) access to your network.26.A. attachmentB. packetC. datagramD. message,27.A. virtualB. virusC. wormsD. bacteria28.A. memoryB. cachesC. portsD. registers29.A. namesB. cookiesC. softwareD. extensions30.A. crackerB. userC. customerD. clientNetworks can be interconnected by different devices. In the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the e-mail message and change various header fields.31.A. reapersB. relaysC. packagesD. modems32.A. framesB. packetsC. packagesD. cells33.A. specialB. dependentC. similarD. dissimilar34.A. syntaxB. semanticsC. languageD. format35.A. analyzeB. parseC. deleteD. createThe purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (36) of the technical requirements for the software product.During the requirements definition phase, the requirements definition team uses an interative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each (37) that it must meet. The starting point is usually a set of high level requirements from the (38) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for 'the system and then defines (39) showing how the system will be operated, publishes the system and operations concept document and conducts a system concept review (SCR) .Following the SCR, the team derives (40) requirements for the system from the high level requirements and the system and operations concept using structured or object-oriented analysis. The team specifies the software functions and algorithms needed to satisfy each detailed requirement.36.A. functionB. definitionC. specificationD. statement37.A. criterionB. standardC. modelD. system38.A. producerB. customerC. programmerD. analyser39.A. rolesB. principlesC. scenariosD. scenes40.A. cotailedB. outlinedC. totalD. complete(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.(42) is an error detection code that most **munication networks use.(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range of media.(45) is an identifier of a web page.41.A. ICMPB. SMTPC. IGMPD. ARP42.A. 4B/5BB. CRCC. Manchester CodeD. Huffman Code43.A. OSPFB. RIPC. RARPD. BGP44.A. ISDNB. X.25C. Frame RelayD. A TM45.A. HTTPB. URLC. HTMLD. TAGSpread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by (48) each byte of data into several parts and sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .46.A. continuousB. highC. lowD. discrete47.A. direct-sequenceB. discrete-sequenceC. duplicate-sequenceD. dedicate-sequence48.A. splittingB. combiningC. packingD. compacting49.A. bitsB. frequenciesC. packetsD. messagesA. rateB. velocityC. bandwidthD. period(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to **munication.(52) is a professional organization of individuals in multiple professions which focuses on effort on lower-layer protocols.(53) functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(54) is the popular LAN developed under the direction of the IEEE802.5.(55) is the popular backbone technology for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.51.A. The MAC addressB. The IP addressC. The subnet addressD. The virtual address52.A. ISOB. ANSIC. CCITD. IEEE53.A. The hubB. The bridgeC. The routerD. The proxy54.A. EthernetB. Token BusC. Token RingD. DQDB55.A. X.25B. A TMC. FDDID. SMDS**munication uses high-frequency (56) waves that travel in straightlines through the air. Because the waves cannot (57) with the curvature of the earth, they can be (58) only over short distance. Thus, microwave is a good (59) for sending data between buildings in a city or on a large college campus. For longer distances, the waves must be relayed by means of "dishes" or (60) .These can be installed on towers, high buildings, and mountain tops.56.A. opticalB. radioC. electricalD. magnetic57.A. reflexB. distortC. bendD. absorbA. transmittedB. transformedC. convertedD. delivered59.A. materialB. equipmentC. mediumD. channel60.A. repeatersB. radarsC. telephonesD. antennasA socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running oncomputers attached to the network. A sockettwo addresses:. Sockets provide acommunication channel between one or more systems.There aresockets separately using TCP and UDP.61.A. uniqueB. separateC. sameD. dependent62.A. is made ofB. composed ofC. is composed OfD. is consisted of63.A. E-mail address and IP addressB. MAC address and port addressC. MAC address and IP addressD. port number and IP address64.A. full-duplexB. half-duplexC. simplexD. complex65.A. message and packetB. packet and frameC. stream and datagramD. flow and blockOpen Shortest Path First (OSPF) is a (66) routing algorithm that (67) work done on the OSI IS-IS intradomain routing protocol. This routing, as compared to distance-vector routing, requires (68) processing power. The (69) algorithm is used to calculate routes. OSPF routing table updates only take place when necessary, (70) at regular intervals.66.A. distance-vectorB. link-stateC. flow-basedD. selective floodingA. derived fromB. deviated fromC. was derived fromD. was deviated from68.A. moreB. lessC. sameD. most69.A. Bellman-FordB. Ford-FulkersonC. DijkstraD. RIP70.A. but ratherB. rather tooC. rather thanD. rather thatPacket-switching wireless networks are preferable (71) when transmissions are (72) because of the way charges are (73) per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are (74) for the (75) of time they use the network.71.A. toB. forC. thanD. only72.A. longB. shortC. largeD. small73.A. computingB. incuriousC. incurredD. incurred74.A. chargedB. finedC. freeD. controlled75.A. pointB. startC. lengthD. endMultipurpose Internet Mail Extension (MIME) is a (76) document messaging standard in the Internet environment. With MIME, users can send (77) E-mail messages that include audio, video, graphices, and text to any other user of a TCP/IP network. Richtext information can also be (78) into messages. It defines the fonts, formats, and (79) features of a document so the document can be easily (80) on many different types of systems.76.A. completeB. compoundC. simpleD. efficient77.A. analogB. manyC. multimediaD. digital78.A. incorporatedB. filledC. storedD. filed79.A. colorB. sizeC. designD. layout80.A. restoredB. redisplayedC. storedD. executed。
Chapter 11.multi-core processor(多核处理器)------It is a single computing component with two or more independent actual processing units called “cores”, which are the units that read and execute program instructions.它是集成了两个或两个以上称为“核”的处理单元的计算部件,具有读取和执行程序指令的单元。
2.graphics processing unit(GPU)(图形处理单元)------A graphics processing unit, also occasionally called visual processing unit(VPU),is a specialized processor. It is designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display.它是一个图形处理单元,有时也被称为视觉处理单元VPU,一个专门的处理器。
它的设计目的是快速地操作和改变内存,以加速在帧缓冲区中创建图像,以便显示输出。
3.Wearable computer(可穿戴电脑)------A wearable computer, also known as a body-borne computer or wearable ,is a miniature electronic device that is worn by the bearer under, with or on top of clothing.穿戴式电脑,也被称为人体电脑或穿戴电脑,是一种微型电子设备,由持有者佩戴在身上或者衣服上。
模板
《计算机专业英语(一)》教学大纲
编写:杜小杰审核:
一、课程性质与地位
本课程是计算机科学与技术专业的学科基础课,计算机技术更深层的学习,需要国际化,同时目前核心技术基本都属于英文文献,因此,对计算机专业的技术人员来说,掌握计算机相关计算机英文概念、术语、短语及常见的英文表达方式是计算机专业研究的重要基础,使学生能够正确理解计算机屏幕上出现的英文信息,掌握计算机构件相关的英语词汇,最终具有阅读、交流,书写计算机学术性报告及论文的能力。
二、课程教学目标
通过本课程的学习,要求学生进一步学习及增加因为词汇、语法、语音等相关知识,使学生的英语水平不至于降低。
最主要的目标是掌握计算机专业的专业词汇、词组、术语,培养学生独立自主的专业学习水平,能够看懂因为文献,掌握英文书写的核心技术,能够比较熟练地看懂计算机屏幕信息的英语提示、菜单、帮助文件及出错信息,并能够基本阅读和翻译计算机的软、硬件手册、资料和说明书;学习和巩固计算机专业的基本概念和知识。
最终能够实现独立正确的阅读、交流、和书写计算机学术性技术报告及相关论文。
三、课程教学内容与要求
本门课程共30学时,均为理论学习,其中分为计算机专业英语(一)和计算机专业英语(二)两个学期讲授,计算机专业英语(一)主要讲授Computer Basic and Software Engineering。
其教学内容如下:
Part One Computer Basic
(一)目的要求
了解计算机的类型、计算机的发展;掌握硬件的基本知识,操作系统的分类、特点、
功能以及程序设计过程中涉及到的专业术语。
(二)教学内容
Unit 1 My computer
内容:关于个人计算机的组成和应用。
要求:掌握个人计算机的组成,及重点汇和表示方式。
Unit 2 Computer Architecture/The Universal Serial Bus
内容:关于个人计算机的体系结构、计算机的主要功能元件。
要求:掌握计算机体系结构,及重点汇和表示方式。
Unit 3 Operating System
内容:计算机的软件系统及其应用。
要求:掌握计算机的软件系统,及重点汇和表示方式。
Unit 4 Computer Language and Programming
内容:介绍程序设计语言的分类和发展,程序语言之间的转换及工作原理。
要求:掌握程序设计语言的分类及高级语言的特点,及重点汇和表示方式。
(三)重点与难点
重点:计算机系统的组成、操作系统以及编程语言的英文表示。
难点:编译语言的种类以及操作系统的功能及其相关的英文表示。
Part Two Software Engineering
(一)目的要求
掌握计算机程序的分类;软件工程的含义以及软件的生命周期以及数据库等相关专业知识和其英文表述。
(二)教学内容
Unit 5 Software Engineering
内容:软件开发过程,软件设计理念。
要求:掌握软件开发的基本过程及软件设计理念及模型,及重点汇和表示方式。
Unit 6 Software life cycle
内容:介绍软件生命周期的概念和各个阶段的任务
要求:掌握软件生命周期的各个阶段名称和主要任务的重点汇和表示方式。
Unit 7 Database
内容:介绍数据库的基本概念,数据库模型及其每种模型的优缺点。
要求:掌握数据库的基本概念和数据库模型及其重点汇和表示方式。
(三)重点与难点
重点:软件生命周期中各个阶段的主要任务以及关系数据库管理系统的功能。
难点:软件设计、测试、维护阶段以及数据库相关知识涉及到的专业术语的认识。
四、学时分配表
五、课程考核与成绩评定
本课程可采用课堂讲授、课堂讨论等进行课堂教学;课后可以安排学生阅读相关章节的英语专业书籍或是文章,以巩固课堂教学效果,熟练掌握英语专业词汇和术语。
考试采用闭卷方式。
本课程为考试课,考核方式采用笔试,闭卷;
总评成绩为:考试成绩(60%)+ 平时成绩(40%);
平时成绩主要由学生的出勤(40%)和作业(60%)情况进行评定。
六、推荐教材及参考书
推荐教材:
《计算机英语》, 刘艺王春生,机械工业出版社, 2005
参考书目:
《计算机英语》, 刘兆敏主编,清华大学出版社, 2003
《新概念计算机英语(英文影印版)》, Stephen Haag, Maeve Cummings, Alan I Rea, Jr, 清华大学出版社, 2003。