《计算机专业英语》第03章在线测试
- 格式:docx
- 大小:75.43 KB
- 文档页数:3
A BC DThe data, when they are not encrypted, are calledA BC DA virus is aA BC DMany viruses go resident in the memory like a ( ).A BC DNow, about ( ) different viruses account for all the viruses that actually spread in tA BC DC、attack phaseD、create phase2、( ) maybe a certain cause that some viruses infect upon.A、a dayB、a timeC、an external event on your PCD、a counter within the virus3、Many viruses do harmful things such as ( ).A、deleting filesB、simulating typosC、slowing your PC downD、changing random data on your disk4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.A、stealing storageB、pilfer CPU cyclesC、del_ete filesD、play music5、Some viruses, with no attack phase, often damage the programs or disks they infect bec ause they ( ).A、have bugs in themB、contain poor quality codeC、steal storageD、show messages on your screen第三题、判断题(每题1分,5道题共5分)正确错误Michelangelo is a file sector.正确错误Computer virus is remote from us.正确错误Computer virus may affect the your phisical health .正确错误The author thinks that understanding how an attacker approaches your computer system c 正确错误。
1 三、选 择 填 空Page 49 Unit 3 program interface system user storage classify unauthorized control document efficiently function detect internal security password input Operating Operating system system system for for for micro, micro, micro, mini, mini, mini, and and mainframe mainframe computers computers computers perform perform perform many many many services. services. services. These These services can be classified either as “external ”or “internal ”. The operating system provides external services that help users start programs, manage stored data, and maintain security. You, as the computer user, control these external functions. Using a command-line, menu-driven, or GUI user interface , an operating system provides you an operating system provides you with a way to select the programs you would like to use. The operating system also helps you find, rename, and delete documents and other data stored on disks or tapes. On many, but not all computer systems , the operating system helps you maintain security by checking your user ID (用户标识) ) and and password , , as as as well well well as as as protecting protecting protecting your your your data data data from from unauthorized access access and and revisions (修改). The The operating operating operating system system system provides provides internal services “behind behind the the the scenes scenes ”to to ensure ensure ensure that that that the the computer computer system system system functions functions efficiently . . These These These internal internal internal services services services are are are not not not generally generally generally under under under your your control , , but but but instead instead instead are are are controlled controlled controlled by by by the the the operating operating operating system system system itself. itself. itself. The The The operating operating operating system system system controls controls input and and output, output, allocates (分配) ) system system system resources, resources, resources, manages manages manages the the storage space space for for for programs programs and data, and detects equipment failure without any direction from you. Page 70 Unit 4 convert high-level execute processor interpreter send understand command accomplish code resulting run compile create process file A A programming programming programming language language language provides provides provides the the the tools tools tools a a a programmer programmer programmer uses uses uses to to create software software and and produce a lengthy list of instructions, called source code ,which defines the software environment in every detail-what it looks like ,how the user enters commands ,and how it manipulates data. A computer’computer’s microprocessor s microprocessor understands only machine language. Therefore, instructions written in a(n) high-level language must be translated into machine language before a computer can use them. The process of of translating translating translating instructions instructions instructions from from from a a a high-level high-level high-level language language language into into into machine machine machine language language can can be be accomplished by by two two two special special special types types types of of of programs: programs: programs: compilers compilers compilers and and interpreters . . A A compiler compiler translates translates translates all all all the the the instructions instructions instructions in in in a a a program program program as as as a a a single single batch (一批) ) ,and ,and ,and the the resulting machine language instructions, called object code (目标代码),are placed in a new file . Most of the the program program program files files files on on on a a a distribution distribution distribution CD CD CD for for for commercial commercial commercial software software software are are compiled so so that that that they they contain machine language instructions that are ready for the processor to execute. As an alternative to a compiler, an interpreter converts one instruction at a time while the program is running . An interpreter reads the first instruction, converts it into machine language, and . An interpreter reads the first instruction, converts it into machine language, and then sends it to the microprocessor. After the instruction is executed , the interpreter converts the next instruction, and so on. 2 Page 89 Unit 5 manage limit performance efficient memory develop technique system development programming store program engineer area factor environment Software development is concerned with creating computer programs that perform efficiently. In developing computer computer software, software, software, computer computer computer scientists scientists scientists and and and engineers engineers engineers study study study various various various areas areas areas and and techniques of software design, such as the best types of programming l anguages and algorithms to languages and algorithms to use in specific programs, how to efficiently store and retrieve information, and the computational limits of certain software-computer combinations. Software designers must consider many factors when developing a program. Often, program performance in one area m ust be sacrificed for the sake must be sacrificed for the sake of of the the the general general performance of of the the the software. software. software. For For For instance, instance, instance, since since since computers computers computers have have have only only only a a a limited limited amount of memory, software designers must limit the number of features they include in a software designers must limit the number of features they include in a program so that it will not require more memory than the systemi t is designed for can supply. it is designed for can supply. Software Software engineering engineering engineering is is is an an an area area area of of of software software development in in which which which computer computer computer scientists scientists scientists and and engineers study methods and tools that facilitate the efficient d evelopment of correct, reliable, and development of correct, reliable, and robust computer programs. Software engineers d evelop software tools and collections of tools called develop software tools and collections of tools called programming environments to to improve improve improve the the the development development development process. process. process. For For For example, example, example, tools tools tools can can can help help help to tomanage the many components of a large program that is being written by a team of programmers. Page 116 Unit 6 computer resource node dissimilar proper transmit limited protocol communicate enable bus connect disk network convert bridge A local area network(LAN) is a group of computers and other devices spread over a relativelylimited area and connected by a communications link that enables a ny device to interact with any any device to interact with any other other on on on the the network LANs LANs commonly commonly commonly include include include microcomputers microcomputers microcomputers and and and shared shared shared (often (often (often expensive expensive expensive ))resources such such as as as laser laser laser printers printers printers and and and large large large hard hard disks . . Most Most Most (modern) (modern) (modern) LANs LANs LANs can can can support support support a a a wide wide variety variety of of computers and and other other other devices. devices. devices. Each Each Each device device device must must must use use use the the proper physical physical and and and data-link data-link protocols for the particular LAN, and all devices that want to communicate w ith each other on the with each other on the LAN must use the same upper-level communications protocol .Although single LANs are geographically limited , separate LANs can be connected t o form larger networks. Similar LANs are to form larger networks. Similar LANs are linked by bridges , which act as transfer points between networks , which act as transfer points between networks ; dissimilar LANs are linked by gateways(网关), which both transfer data and convert it according to the protocols used by the receiving network. The devices on a LAN are known as nodes(节点),and the nodes a re connected by cabling(are connected by cabling(电缆) through which messages are transmitted . Nodes on a LAN can be wired together in any of basic . Nodes on a LAN can be wired together in any of basic layouts, known as bus, ring, and star. , ring, and star. 。
Unit Three office softwareSection One Warming Up1. word2. excel3. power point4. outlookSection Two Real WorldFind InformationTaskⅠ:1.She works in the Technical support department.2.He doesn’t know how to add pictures to a document.3.He uses MS Word 2007.4.The insert pictures dialog box will appear.5.Yes, he does.Task II: 1.F 2. F 3. F 4. T 5. TWords BuildingTask Ⅰ: 1.D 2. A 3.B 4.B 5. CTask Ⅱ: 1. creation 2.operation 3.selection 4.illustration 5.appearance Task Ⅲ: 1.D 2. B 3.F 4. H 5. E 6. I 7. G 8. J 9. A 10. CCheer up Your EarsTask Ⅰ:1.department 2.document 3.operate 4.place 5.icon6.screenshot7.see8.button9.location 10.callingTask Ⅱ: 1.wrong 2. laptop 3. check 4. software system 5. outsiderTask Ⅲ: 1. A 2. C 3. B 4. C 5. CTable TalkTask Ⅰ:1.the common office software2.All companies will install this software.3.Like communication tools4.Online shopping is very popular5.be savedSection Three Brighten Your Eyes办公软件简介办公软件的发展用来解决企业用户在沟通,计算,演示,和信息存储中所遇见的基本问题,是用于商务办公中的常见软件。
大工14春《专业英语(计算机英语)》在线测试3判断题单选题一、判断题(共10 道试题,共20 分。
)1. An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.( )A. 错误B. 正确-----------------选择:B2. A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )A. 错误B. 正确-----------------选择:B3. To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.()A. 错误B. 正确-----------------选择:B4. A Domain Name System is an Internet service that translates domain names to or from IP addresses.( )A. 错误B. 正确-----------------选择:B5. Electronic Commerce means buying and selling products and services online via the Internet.( )A. 错误B. 正确-----------------选择:B6. EDI is a set of computer interchange standards for business documents such as invoices, bills, and purchase orders.( )A. 错误B. 正确-----------------选择:B7. FTP is the messages, usually text, send from one person to another via the Internet.()A. 错误B. 正确-----------------选择:A8. To protect data, you need to implement a data backup and recovery plan.()A. 错误B. 正确。
计算机专业英语测试题一、词汇测试题(每小题1分,共20分)(一).Translate the following words and expressions into Chinese (共10分,每题1分)1.Cyber cafe2.microcomputer3.ROM4.Object-oriented programming5.utility program6.system specification7.database administrator8.modulator-demodulator9.client/server model10.spreadsheet program(二).Translate the following terms or phrases from Chinese into English (共10分,每题1分)1.中央处理器2.广域网3.超级计算机4.电子商务5.计算机安全6.计算机文化7.网站8.域名9.数据库管理系统10.软件工程二、完型填空题(每空1分,共20分)Fill in each of the blanks with one of the words given in the list following each paragraph, making changes if necessary:1. Computer hardware is the involved in the of a computer and consists of the that can be physically handled. The function of these components is typically divided into three main categories: , , and . Components in these categories connect to , specifically, the computer’s central unit (CPU), the electronic that provides the computational ability and control of the computer, via wires or circuitry called bus.microprocessors component processing functionoutput equipment input circuitry storage2.In the relational model, data is organized in two-dimensionalcalled . There is no or structure imposed on the data. The tables or relations are, however, related to each other. The database management system (RDBMS) the data so that its external is a of relation or tables. This does not mean that data is stored as tables: the physical of the data is independent of the way in which the is logically organized.hierarchical set organize relational relationdata storage view network table三、英译汉题(每题10分,共20分)Translate the following passage from English into Chinese:1.The field of computer science has grown rapidly since the1950s due to the increase in their use. Computer programs have undergone many changes during this time in response to user need and advances in technology. Newer ideas in computing such as parallel computing, distributed computing, and artificial intelligence, have radically altered the traditional concepts that once determined program form and function. In parallelcomputing parts of a problem are worked on simultaneously by different processors, and this speed up the solution of the problem. Another type of parallel computing called distributed computing use CPUs from many interconnected computers to solve problems. Research into artificial intelligence (AI) has led to several other new styles of programming.2.High-level languages are commonly classified asprocedure-oriented, functional, objected-oriented, logic languages. The most common high-level languages today are procedure-oriented languages. In these languages, one or more related blocks of statements that perform some complete function are grouped together into a program module, or procedure, and given a name such as “procedure A”. If the same sequence of operations is needed elsewhere in the program, a simple statement can be used to refer back to the procedure. In essence, a procedure is just a mini-program. A large program can be constructed by grouping together procedures that perform different tasks.四、汉译英题(20分)最著名的互联网例子是因特网。
计算机专业英语试题三答案Ⅰ.Vocabulary(词汇)(共60分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共20分,每题2分)1.application software应用软件2.audio input devices声音输入设备3. business-to-consumer (B2C)企业对消费者4. gateway网关5. coaxial cable同轴电缆6.database administrator数据库管理员7.embedded operating system嵌入式操作系统8.language translator语言翻译程序9.hierarchical network层次型网络10.Microblog微博(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
共20分,每题2分)1.图形用户界面GUI2.高清晰度多媒体接口HDMI3.乐器数字接口MIDI4.统一资源定位器 URL5.综合服务数字网ISDN6.加速图形接口AGP7.精简指令集计算机RISC8.超文本传送协议HTTP9.文件传送协议FTP10.密送Bcc(三)Multiple Choices(多选题,每题2分,共20分)Circle the letter or fill in the correct answer.1. Multimedia, Web authoring, graphics, and virtual reality programs are examples of __________.a. special-purpose applicationsb. occupational applicationsc. general-purpose applicationsd. basic applicationse. c and d2. In a relational database, data is organized into __________.a. fieldsb. columnsc. recordsd. tablese. rows3. The resolution of a screen is the __________ number of pixels that the screen can display.a. averageb. maximumc. minimumd. middlee. none of the above4. Which are the types of the non-impact printer?a. thermal printerb. dot matrix printerc. laser printerd. ink-jet printere. all of the above5. When you send an e-mail, you can enter the e-mail address of a person in the __________ field. All other recipients of that message will be able to see that the person has received a copy of the message.a. Ccb. Bccc. Subjectd. Toe. all of the above6. Every valid character in a computer that uses even (71) must always have an even number of 1 bit.a. parity (奇偶)b. checkc. testd. compare7. The maximum number of data that can be expressed by 8 bits is (72).a. 64b. 128c. 255d. 2568. Integration (73) is the process of verifying that the components of a system work together as described in the program design and system design specifications.a. tryingb. checkingc. testingd. coding9. GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in (74).a. an imageb. a filec. a windowd. a page10. Computer (75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.a. storageb. devicec. networkd. processor参考答案:1.e 2.d 3. b 4. acd 5. a 6.a 7.c 8.c 9.a 10.cⅡ. Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
《计算机专业英语》第03章在线测试
《计算机专业英语》第03章在线测试剩余时间:8:42
答题须知:1、本卷满分20分。
2、答完题后,请一定要单击下面的“交卷”按钮交卷,否则无法记录本试卷的成绩。
3、在交卷之前,不要刷新本网页,否则你的答题结果将会被清空。
第一题、单项选择题(每题1分,5道题共5分)
1、A ________ copy is a copy of a current file made in order to protect against loss or damage.
A、hard
B、backup
C、soft
D、file
2、The infamous “Michelangelo”________ strikes thousands of computers every year on March 6th.
A、cracker
B、hacker
C、virus
D、disease
3、Windows gives you more control over the ________ you work.
A、operation
B、way
C、energy
D、power
4、The most important program on any computer is________.
A、Operating System
B、Virus
C、software
D、Office 2000
5、The attributes of the stack are ( ).
A、FIFO
B、LIFO
C、queue
D、built into their circuitry
第二题、多项选择题(每题2分,5道题共10分)
1、The Windows 2000 product line includes ( ).
A、Windows 2000 Professional
B、Windows 2000 Advanced Server
C、Windows 2000 Server
D、Windows 2000 Datacenter Server
2、Active Directory supports ( ).
A、delegation of administrative task
B、granular access control
C、encapsulation
D、inheritance
3、Active Directory can help you ( ).
A、deliver complete enterprise security by itself
B、build a complex international network
C、manage every resource with a single logon
D、get off the limits of down level networks
4、Windows 2000 is ( ).
A、new lease of Windows
B、the same as Windows NT
C、an inventive technology
D、used for building a scalable network
5、Common contemporary operating systems include __________________________.
A、Mac OS
B、Microsoft Windows
C、Linux
D、Solaris
第三题、判断题(每题1分,5道题共5分)
1、Operating systems are unique to their manufacturers.
正确错误
2、Office 2000 is an incredible set of business tools.
正确错误
3、Operating systems are not unique to their manufacturers.
正确错误
4、When you purchase a new computer, an operating software suitable to the hardware must be bought.
正确错误
5、Error recovery does not belong to operating system.
正确错误
交卷。