《计算机专业英语》第03章在线测试
- 格式:doc
- 大小:243.00 KB
- 文档页数:3
计算机英语试题3及答案一、选择题(每题2分,共20分)1. Which of the following is not a type of computer virus?A. TrojanB. WormC. Antivirus softwareD. Virus2. What does the acronym "CPU" stand for?A. Central Processing UnitB. Central Processing UnitC. Central Processing UnitD. Central Processing Unit3. In computer terminology, what does "RAM" refer to?A. Random Access MemoryB. Random Access MemoryC. Random Access MemoryD. Random Access Memory4. What is the primary function of a router?A. To store dataB. To transmit dataC. To receive dataD. To process data5. What is the term used to describe the process of converting data into a format that can be transmitted over anetwork?A. EncryptionB. CompressionC. DecompressionD. Encoding6. Which of the following is not a type of software?A. Operating systemB. Application softwareC. Utility softwareD. Hardware7. What does the acronym "GUI" stand for in the context of computer interfaces?A. Graphical User InterfaceB. Graphical User InterfaceC. Graphical User InterfaceD. Graphical User Interface8. What is the term for a computer program that is designed to perform a specific task?A. ApplicationB. ApplicationC. ApplicationD. Application9. What is the term used to describe a computer network that spans a relatively small area?A. LANB. LANC. LAND. LAN10. What does the acronym "USB" stand for?A. Universal Serial BusB. Universal Serial BusC. Universal Serial BusD. Universal Serial Bus二、填空题(每题2分,共20分)1. A computer virus is a type of malicious software that can replicate itself and spread to other computers without the user's permission.2. The central processing unit (CPU) is the primary component of a computer that performs most of the processing inside the computer.3. Random Access Memory (RAM) is a type of computer memory that can be read and changed freely and quickly.4. A router is a networking device that forwards data packets between computer networks.5. Encoding is the process of converting data into a format that can be transmitted over a network.6. Software is a collection of data or computer instructions that tell the hardware what to do and how to do it.7. A Graphical User Interface (GUI) is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators.8. An application is a computer program designed to help the user to perform specific tasks, such as word processing or web browsing.9. A Local Area Network (LAN) is a computer network that interconnects computers in a localized area.10. Universal Serial Bus (USB) is an industry standard developed in the 1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.三、简答题(每题10分,共40分)1. Explain the difference between a computer virus and a computer worm.A computer virus requires a host program to replicate itself, whereas a computer worm can replicate and spread independently without needing a host program.2. Describe the role of a firewall in computer security.A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the Internet.3. What are the benefits of using a cloud-based service? Cloud-based services offer benefits such as scalability, accessibility, cost-effectiveness, and the ability to store and process large amounts of data in a remote location.4. Discuss the importance of data backup and recovery in a computer system.Data backup and recovery are crucial for protecting against data loss due to hardware failure, software bugs, data corruption, or cyber-attacks. Regular backups ensure that data can be restored in the event of a system failure,minimizing downtime and potential financial loss.四、论述题(20分)Discuss the impact of the Internet of Things (IoT) on society and the economy.The Internet of Things (IoT) has had a profound impact on society and the economy by enabling the interconnection of everyday objects, allowing them to send and receive data. This has led to increased efficiency in various industries, improved quality of life through smart home technologies, and the creation of new business models and markets. However, it also raises concerns about data privacy and security, as well as the potential for increased surveillance and control.。
A BC DThe data, when they are not encrypted, are calledA BC DA virus is aA BC DMany viruses go resident in the memory like a ( ).A BC DNow, about ( ) different viruses account for all the viruses that actually spread in tA BC DC、attack phaseD、create phase2、( ) maybe a certain cause that some viruses infect upon.A、a dayB、a timeC、an external event on your PCD、a counter within the virus3、Many viruses do harmful things such as ( ).A、deleting filesB、simulating typosC、slowing your PC downD、changing random data on your disk4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.A、stealing storageB、pilfer CPU cyclesC、del_ete filesD、play music5、Some viruses, with no attack phase, often damage the programs or disks they infect bec ause they ( ).A、have bugs in themB、contain poor quality codeC、steal storageD、show messages on your screen第三题、判断题(每题1分,5道题共5分)正确错误Michelangelo is a file sector.正确错误Computer virus is remote from us.正确错误Computer virus may affect the your phisical health .正确错误The author thinks that understanding how an attacker approaches your computer system c 正确错误。
1 三、选 择 填 空Page 49 Unit 3 program interface system user storage classify unauthorized control document efficiently function detect internal security password input Operating Operating system system system for for for micro, micro, micro, mini, mini, mini, and and mainframe mainframe computers computers computers perform perform perform many many many services. services. services. These These services can be classified either as “external ”or “internal ”. The operating system provides external services that help users start programs, manage stored data, and maintain security. You, as the computer user, control these external functions. Using a command-line, menu-driven, or GUI user interface , an operating system provides you an operating system provides you with a way to select the programs you would like to use. The operating system also helps you find, rename, and delete documents and other data stored on disks or tapes. On many, but not all computer systems , the operating system helps you maintain security by checking your user ID (用户标识) ) and and password , , as as as well well well as as as protecting protecting protecting your your your data data data from from unauthorized access access and and revisions (修改). The The operating operating operating system system system provides provides internal services “behind behind the the the scenes scenes ”to to ensure ensure ensure that that that the the computer computer system system system functions functions efficiently . . These These These internal internal internal services services services are are are not not not generally generally generally under under under your your control , , but but but instead instead instead are are are controlled controlled controlled by by by the the the operating operating operating system system system itself. itself. itself. The The The operating operating operating system system system controls controls input and and output, output, allocates (分配) ) system system system resources, resources, resources, manages manages manages the the storage space space for for for programs programs and data, and detects equipment failure without any direction from you. Page 70 Unit 4 convert high-level execute processor interpreter send understand command accomplish code resulting run compile create process file A A programming programming programming language language language provides provides provides the the the tools tools tools a a a programmer programmer programmer uses uses uses to to create software software and and produce a lengthy list of instructions, called source code ,which defines the software environment in every detail-what it looks like ,how the user enters commands ,and how it manipulates data. A computer’computer’s microprocessor s microprocessor understands only machine language. Therefore, instructions written in a(n) high-level language must be translated into machine language before a computer can use them. The process of of translating translating translating instructions instructions instructions from from from a a a high-level high-level high-level language language language into into into machine machine machine language language can can be be accomplished by by two two two special special special types types types of of of programs: programs: programs: compilers compilers compilers and and interpreters . . A A compiler compiler translates translates translates all all all the the the instructions instructions instructions in in in a a a program program program as as as a a a single single batch (一批) ) ,and ,and ,and the the resulting machine language instructions, called object code (目标代码),are placed in a new file . Most of the the program program program files files files on on on a a a distribution distribution distribution CD CD CD for for for commercial commercial commercial software software software are are compiled so so that that that they they contain machine language instructions that are ready for the processor to execute. As an alternative to a compiler, an interpreter converts one instruction at a time while the program is running . An interpreter reads the first instruction, converts it into machine language, and . An interpreter reads the first instruction, converts it into machine language, and then sends it to the microprocessor. After the instruction is executed , the interpreter converts the next instruction, and so on. 2 Page 89 Unit 5 manage limit performance efficient memory develop technique system development programming store program engineer area factor environment Software development is concerned with creating computer programs that perform efficiently. In developing computer computer software, software, software, computer computer computer scientists scientists scientists and and and engineers engineers engineers study study study various various various areas areas areas and and techniques of software design, such as the best types of programming l anguages and algorithms to languages and algorithms to use in specific programs, how to efficiently store and retrieve information, and the computational limits of certain software-computer combinations. Software designers must consider many factors when developing a program. Often, program performance in one area m ust be sacrificed for the sake must be sacrificed for the sake of of the the the general general performance of of the the the software. software. software. For For For instance, instance, instance, since since since computers computers computers have have have only only only a a a limited limited amount of memory, software designers must limit the number of features they include in a software designers must limit the number of features they include in a program so that it will not require more memory than the systemi t is designed for can supply. it is designed for can supply. Software Software engineering engineering engineering is is is an an an area area area of of of software software development in in which which which computer computer computer scientists scientists scientists and and engineers study methods and tools that facilitate the efficient d evelopment of correct, reliable, and development of correct, reliable, and robust computer programs. Software engineers d evelop software tools and collections of tools called develop software tools and collections of tools called programming environments to to improve improve improve the the the development development development process. process. process. For For For example, example, example, tools tools tools can can can help help help to tomanage the many components of a large program that is being written by a team of programmers. Page 116 Unit 6 computer resource node dissimilar proper transmit limited protocol communicate enable bus connect disk network convert bridge A local area network(LAN) is a group of computers and other devices spread over a relativelylimited area and connected by a communications link that enables a ny device to interact with any any device to interact with any other other on on on the the network LANs LANs commonly commonly commonly include include include microcomputers microcomputers microcomputers and and and shared shared shared (often (often (often expensive expensive expensive ))resources such such as as as laser laser laser printers printers printers and and and large large large hard hard disks . . Most Most Most (modern) (modern) (modern) LANs LANs LANs can can can support support support a a a wide wide variety variety of of computers and and other other other devices. devices. devices. Each Each Each device device device must must must use use use the the proper physical physical and and and data-link data-link protocols for the particular LAN, and all devices that want to communicate w ith each other on the with each other on the LAN must use the same upper-level communications protocol .Although single LANs are geographically limited , separate LANs can be connected t o form larger networks. Similar LANs are to form larger networks. Similar LANs are linked by bridges , which act as transfer points between networks , which act as transfer points between networks ; dissimilar LANs are linked by gateways(网关), which both transfer data and convert it according to the protocols used by the receiving network. The devices on a LAN are known as nodes(节点),and the nodes a re connected by cabling(are connected by cabling(电缆) through which messages are transmitted . Nodes on a LAN can be wired together in any of basic . Nodes on a LAN can be wired together in any of basic layouts, known as bus, ring, and star. , ring, and star. 。
Unit Three office softwareSection One Warming Up1. word2. excel3. power point4. outlookSection Two Real WorldFind InformationTaskⅠ:1.She works in the Technical support department.2.He doesn’t know how to add pictures to a document.3.He uses MS Word 2007.4.The insert pictures dialog box will appear.5.Yes, he does.Task II: 1.F 2. F 3. F 4. T 5. TWords BuildingTask Ⅰ: 1.D 2. A 3.B 4.B 5. CTask Ⅱ: 1. creation 2.operation 3.selection 4.illustration 5.appearance Task Ⅲ: 1.D 2. B 3.F 4. H 5. E 6. I 7. G 8. J 9. A 10. CCheer up Your EarsTask Ⅰ:1.department 2.document 3.operate 4.place 5.icon6.screenshot7.see8.button9.location 10.callingTask Ⅱ: 1.wrong 2. laptop 3. check 4. software system 5. outsiderTask Ⅲ: 1. A 2. C 3. B 4. C 5. CTable TalkTask Ⅰ:1.the common office software2.All companies will install this software.3.Like communication tools4.Online shopping is very popular5.be savedSection Three Brighten Your Eyes办公软件简介办公软件的发展用来解决企业用户在沟通,计算,演示,和信息存储中所遇见的基本问题,是用于商务办公中的常见软件。
大工14春《专业英语(计算机英语)》在线测试3判断题单选题一、判断题(共10 道试题,共20 分。
)1. An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.( )A. 错误B. 正确-----------------选择:B2. A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )A. 错误B. 正确-----------------选择:B3. To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.()A. 错误B. 正确-----------------选择:B4. A Domain Name System is an Internet service that translates domain names to or from IP addresses.( )A. 错误B. 正确-----------------选择:B5. Electronic Commerce means buying and selling products and services online via the Internet.( )A. 错误B. 正确-----------------选择:B6. EDI is a set of computer interchange standards for business documents such as invoices, bills, and purchase orders.( )A. 错误B. 正确-----------------选择:B7. FTP is the messages, usually text, send from one person to another via the Internet.()A. 错误B. 正确-----------------选择:A8. To protect data, you need to implement a data backup and recovery plan.()A. 错误B. 正确。