计算机专业英语作业1
- 格式:doc
- 大小:54.50 KB
- 文档页数:7
判断题:(共8题每题2分)1.High-level language is popular,because it is directly executable in computer without compiling.( )正确错误2.Client/server database system is no longer in use now.( )正确错误3.WWW provides access to a variety of Internet resources from different interfaces.( )正确错误4.Word doesn’t have the feature to accessing to World Wide Web.( )正确错误5.Menu bar displays the names of the application and document.( )正确错误6.The windows that are displayed when you start VB are known as the Visual Basic Integrated Development Environment(IDE).( )正确错误7.WinZip,WinRAR and Microsoft’s Internet Explorer are all data compression software.( )正确错误8.F1at-file style of database is suitable for large amounts of data.( )正确错误单词翻译:(共2题每题10分)1.desk publishing electronic spreadsheet hard diskdatabasecursor2.network permission computer virusemail attachment network securitysecurity patch翻译句子:(共7题每题4分)1.Information users only have to deal with one integrated environment rather than a number of separate information subsystems.信息用户只需要处理一个集成环境,而不是一系列独立的信息子系统。
版本:冶金工业出版社Keys to Exercises and Examinations第1单元Text11.(1)B(2)A(3)A(4)A(5)A(6)B(7)D(8)A(9)C(10)C2.(1)registering,predicting(2)Logs(3)boolean logic(4)graphical interface(5)integrated circuit3.(1)战争期间,冯·诺依曼在流体力学、弹道学、气象学、博弈论以及统计学等方面的专业性的意见,被很好地运用在了一些工程中。
(2)战后的冯·诺伊曼在高等研究中心专注于计算机和它的拷贝的发展。
4.(1)It was a massive steam-powered mechanical calculator designed to print astronomical tables.(2)John Louis von Neumann’s famous stored program concept says that the program is stored as data in the computer’s memory and the computer is able to manipulate it as data—for example,to load it from disk,store it back on disk, and move it in memory.This concept became a fundamental of modern computing.Text21.(1)A(2)B(3)B(4)B(5)D(6)C(7)B(8)A(9)A(10)C2.(1)parallel-operation(2)capacity(3)peripherals(4)sophisticated(5)microprocessors3.它们(液晶显示器)不像CRT显示那样,需要考虑几何学的、收敛的或是焦点问题,而且它们的清晰度使得人们可以在更小的屏幕上看到更高的分辨率。
Unit 1Text one1.Match the following words with their proper Chinese meanings.(中英文搭配)printer 打印机display 显示器floppy disk 软盘motherboard 主板CPU 中央处理器mouse 鼠标memory 存储器external modem 外部调制解调器hard disk 硬盘CD-ROM 只读光盘存储器Text two1. Choose the best answer for each of the blanks.(完形填空)Whenever new information is entered, it must 1 somewhere in the computer’s 2 . Later, the CPU must also be 3 to get this information from memory. This is where RAM is needed. The CPU can 4 write to and read from RAM. RAM is called Random Access Memory 5 the CPU can do directly to any memory location in it. The CPU does not have to look 6 all of RAM to find the spot it needs. But RAM only 7 the data temporarily. As soon as you switch the computer 8 , all that information disappears from the RAM. When you switch the computer on again, the RAM is 9 , and ready 10 a new program and new data.(1) A. store B. be stored C. storing D. stored(2) A. processor B. printer C. memory D. mouse(3) A. easy B. capable C. good D. able(4) A. both B. too C. also D. either(5) A. so B. therefore C. because D. for(6) A. on B. through C. for D. down upon(7) A. takes B. operates C. erases D. holds(8) A. off B. on C. up D. down(9) A. full B. empty C. zero D. blank(10) A. receive B. be received C. receiving D. received1-5:BCDCC6-10: BDABA2. Translate the following sentences into English.(汉译英)(1)我的计算机经常有出错信息产生,我不知道该怎么办。
计算机专业英语课后答案Lesson1Text AI. Complete the following sentences according to the information in the text.1. programmable, analog, digital2. continuous, discrete3. billing, shipping, receiving, inventory control4. computations, MPU, CPU5. Complex Instruction Set Computer6. Digital Signal Processing7. integer, logic8. buses, pulses,9. Random Access Memory, internal10. keyboards, mouse, monitors, printersII. Translate the following terms and phrases into Chinese.1. external devices 1. 外部设备2. output device 2. 输出设备3. parallel device 3. 并行设备4. assembly language 4. 汇编语言5. block device 5. 块设备6. floating point 6. 浮点7. data stream 7. 数据流8. input device 8. 输入设备9. integrated circuit 9. 集成电路10. main storage 10. 主存III. Translate the following terms and phrases into English.缩写完整形式中文意义1. ALU Arithmetic/Logic Unit 运算器2. CPU Central Processing Unit或CentralProcessor Unit中央处理器3. CISC Complex Instruction Set Computer 复杂指令集计算机4. DSP Digital Signal Processing 数字信号处理5. EPROM Erasable Programmable Read OnlyMemory 可擦可编程只读存储器6. LED light-emitting diode 发光二级管7. MODEM MOdulator, DEModulator 调制解调器8. RAM Random Access Memory 随机访问存储器9. ROM Read Only Memory 只读存储器10. RISC Reduced Instruction Set Computer 精简指令集计算机IV. Fill in the gaps with the words or phrases chosen from the box. Change the forms where necessary.1. instructions2. devices3. concept4. consuming5. integrated circuits6. space7. fit into8. Information Age9. embedded computer 10. controlV. Translate the following passage into Chinese.计算机能够储存和执行被叫做程序的许多指令,这使其非常通用并不同于计算器。
《计算机专业英语》参考答案Chapter 1 Computer ScienceText AExercises2.(a)out (b)with (c)in (d)in (e)in (f)with (g)for (h)aboutText BExercises3.(a)to (b)now (c)in (d)with (e)out (f)uponText CExercises1.(1)analyze, analytic (2)complicate, complex (3) collaborate, collaborative (4)vary, various (5)introduce, introductory (6)base, basic (7)create, creative (8)differ, different (9)free, freeChapter 2 Discrete Mathematics for Computer ScienceText AExercises1.C48 =70,C38 =562.6*25=1923.if a=0then i f b=0then return(0)else return(1+Add(0,b-1))else if b=0then return(1+Add(a-1,0))else return(1+1+Add(a-1,b-1))4.if Rest(S)=Øthen return(First(S))else if (First(S)<Largest(Rest(S)))return(Largest(Rest(S)))else Return(First(S))5.Now we can define function Concat(S1,S2) as:if(Length(S1)=0)then return(S2)else return(Cons(First(S1), Concat(Rest(S1),S2)))Text BExercises1.[Proof]:According to given conditions, we knowa n = a n-1 + 2na n-1 = a n-2 + 2(n-1)……a2 = a1 + 2*2a1 = 3sum all items in left side, and delete same items in the right side of equations, we can result thata n = 3 + 2(2+3+……+n-1+n)=1+n(n+1)=n2+n+1that is what we conclude.Text CExercises1.(1)depend, dependent (2) correspond, correspondent (3)grow, grown (4)solve, solvent (5) relate, relational (6)recur, recursive (7) validate, valid (8) conclude, conclusive (9) justify, justificative2.(1)connect-disconnect (2)possible-impossible (3)regular-irregular (4)measure-countermeasureChapter 3 Algorithms in the Real WorldText AExercises2. finite, solving, processing, effective, eventually, next, randomly3. by, in, on, in, on, from4. the algorithm can terminate.It is correct for sorting.If the length of array A is n, the time for computation is O(n2)Its memory cost n units.As n increase, its computational cost will become large.Text BExercises3.(1)—(e), (2)—(c), (3)—(d), (4)—(a), (5)—(b)4. inconvenience, incapacity, independence5.We couldn’t have lived without water.Chapter 4 Dictation SystemText AExercises2. forefront, institution, turnaround, boost, embrace, portfolio, handle, portable, issue, stringent3. off, on, from, into, in, to, over, to, on, toText BExercises2.(1)—(h), (2)—(g), (3)—(a), (4)—(j), (5)—(e), (6)—(f), (7)—(b), (8)—(i), (9)—(c), (10)—(d) Text CExercises3. organize,organizationaldictate,dictativeproduce,productiveadministrate,administrativetranscribe, transcriptivesimplify,simplicialimplement,implementativeprotect,protectiveChapter 10 Introduction to ComputersText AⅠ.1. hardware, software2. a Central Processing Unit (CPU), memory, an input device, an output device3. Input devices, Output devices4. An input device5. application software, system softwareⅡ.1. hardware 6. integrated circuit2. software 7. secondary storage3. a Central Processing Unit (CPU) 8. computer system4. application software 9. main memory5. operating system 10. scannerText BⅠ.1. The WYSIWYG2. cell3. finding, fixing4. Formulas5. headings across the top6. character, word, phraseⅡ.1. true 6. false2. true 7. false3. true 8. true4. true 9. true5. false 10. falseText C当使用计算机的时候,你必须知道与它“交流”。
比较题1.SRAM and DRAM*RAM is short for random access memory.@Static RAM(SRAM) keeps data in the main memory,without frequent refreshing,for as long as power is supplied to the cicuit. SRAM is very fast but it is much more expensive than DRAM and takes more space than DRAM. Dynamic RAM(DRAM) is the most often used RAM in today's computer.DRAM can hold its data if it is refreshed by special logic called the refresh circuit.It is much cheaper and take much less space than DRAM.2.System software and Application software*What is software?Collection of programs is called software .*What is computer softwar?It is defined as the instructions and associated data , stored in electronic format , that direct the computer to accomplish task.*what is the shareware ?Shareware is copyrighted software marketed under a “try before you buy” policy.@Systemsoftware is the stuff that make your computer work.The application software is generally the computer programs which are used for the purpose of performing special tasks using a computer,it trains the PC‟s brain for higher cognitive functions rather than just keeping the PC alive and connected to the other.*Examples about Application Software:(1)Accounting software(2)Collaboratire software(3)Compilers and Interpreters(4)Computers Games(5)Database(6)Educational software(7)E-mailN and W ANLAN:A LAN is a high-speed data network that covers a relatively small geographic area .It typically connects workstations, personal computer, printers, servers, and other devices.W AN:A W AN connect multiple geopgraphically nearby LANs to one another over great geographic distances. The speed available on a W AN waries depending on the cost of the connections and may be low. W ANs opeate using routers , which can “choose ” the most appropriate path for data to take to reacha network node.4.What's the difference between Software Engneering & System Engneering ?@System Engineernig is concerned with all aspects of computer based systems developmentincluding hardware ,software and process engineering.Software Engineering is part of this more general process.5.CRT & LCD@CRT: Calhoole ray lube displays had a standarditool form factor owing to the required shape of heavriy vacuum tubeLCD;Liquid cryslal Displays have a new seirse of style.Free from the bulky shap of CRT,today's flat panel vendors are letting their imaginations run free with monitors that are colourd and shaped to match a design concept.*Advantage of LCD monitor①LCD monitor consume less power②Do not produce electromagnetic radiation as CTRs do③Are right and slim in size④Do not flickers like CRT’s⑤Full viewable size6.Synchronous & Asynchronous@S:you need two separated cables with every clock pulse one data bit is transfermed.A:transmission clock and data are tranfermed with only one cable.7.RISC & CISC@CISC:Complex Instruction Set ComputerIt is microprocessor designIt is used to transulations are complex to machine understand;It is need large memory area;It is very slow in processRISC:Reduced Instruction Set ComputerIt is advanced microprocessor designIt is reduced the complex Set of CISCIt is need minimem-storageIt is very fast to compare with CISC8.Switch & Router@9.Windows OS and Unix OS@Windows OS:Be easily understood.Unix OS:The UNIX OS was desiged to let a number of programmers access the computer at the same time and share its resources.10.Multitasking & Multiuser@Multitasking:Many computers do just one thing at a time ,as anyone who uses a PC laptop can attest. Try logging onto your company …s network while opening your browser and while opening a word processing program .Chances are the processor will freeze for a few seconds while it sorts out the multiple instructions. Multiuser:The same design which permits multitasking permits multiple users to use the computer .The computer can take the commands of a number of users –determined by the design of the computer – to run programs , access files , and print documents at the same time.11.Multitasking & Parallel processing@Multitasking:A single CPU excutes several programs at onceParallel processing:More than one CPU excutes a single program12.3GPL & 4GPL@3GPL:A 3GPL was no longer a need to work in symbolics.Instead,a pogrammer could use a programming language what resembled more to the natural languages.4GPL :A fourth generation programming language is a programming language designed with a specific purpose in mind such as the development of commercial business software.Y ou can use to build an application without the third generation progamming language.13.Paraller processing and Compilier interpreter@14.switch RL and swich GPL@pare OSI with TCP/IPSimilarities :(1)both have layers(2)both have application layers(3)both have comparable transport and Network layers(4)packet ---switched technology is assumed(5)networking professional need to know both modelsdifferences :(1)TCP/IP combines presentation and session layer functions into its application layer.(2)TCP/IP combines the OSI data link and physical layers into one layer(3)TCP/IP simpler because it has few layers(4)OSI complex because it has multiple layers(5)TCP/IP have 4 layers , but OSI have 7 layerspilers and Interpreters@Compiler:A compiler is a computer program that translate a computer program written in one computer language into a program written in another computer language.Interpreter:An interpreter is a computer program that excutes other programs.简答题1.Field in AI①Games playing:programming computers to play games such as chess and checkers.②Expert system:programming computers to make decisions I real –life situations.③Natual language:programming computers to understand natural human language.④Neural networks:systems that simulate intelligence by attemping to reproduce the types of physical connections that occur in animal brains.⑤Robotics:programming computers to see and hear and react to other sensory stimuli .2.Write sth about Quanty Computing?@It was proposed in 1970‟s.It is based on quantum physics,b y taking advantages of certain quantum physics properties of atom or nuclei that allow them to work together as quantum bits or qubits to be the computer processor and memory . 3.Nano technologyIt is a field of science atoms is meant to control individual atoms and molecules to create computer chips and other devices that are thousand of times smaller them current technologies permit.4.Explain Register & it's type?@Only register can be directly indexed for input or output of an instruction, as defined by the instruction set.Types:Data register: Used to stored integer numbersAddress register: Hold memory addresses and are used to access memory General purpose register: It store data and addressFloating point register: Used to stored floating point numbers.Constant register : It hold read only values zero or one.Vector register : It hold single instruction and multiple data(SIMD).Special purpose register: It stored internal CPU data like stack pointer or processor status wordsInstruction register: the instruction currently being executed by the processer is stored here.5.10 lines about Data W arehouse & Data marts?@Data warehouse:Data warehouses are computer based information systems that are home for "secondhand"data that originated from either another application or from an external system or source.W arehouse optimize database query and reporting tools because of their ability to analyze data.They are a way for managers and decision makers to extract information quickly and easily in order to answer questions about their business.Data marts:It are smaller than data warehouse and genera lly contain information from a single department of a business or organization.The current trend in data warehousing is to develop a data warehouse with sevral smaller related data mats for specific kinds of queries and reports.6.Multimedia@Multimedia as the name suggests is an integration of various medium of communication which include text,graphics,animation,audio,still omages and motion video in a way that provides the user with a high level of control and interaction.Multimedia can be defined as any contains three or more of the following elements:text,still images,animation,sound,video and/or hypertext navigation.7.TCP/IP@TCP and IP were developed by Department of Defence of USA research project to connect a number of different networks designed by different vendors into a network of networks.It delivered a few basic services that everyone needs like file transfer,electronic mail,remote logon across a very large number of client and sever systems.TCP/IP is composed of layers:IP-is reponsible for moving packet of data from node to node.TCP-is responsible for verifying the correct delivery of data from client to server. Sockets-is a name given to the package of sunroutines that provide access to TCP/IP on most systems.8.What's bus and it's type?A bus is an important subsystem in computer architecture which transfers data or power between computer components inside a computer or butween computers.There are two types of bus:parallel bus and serial bus.Something about I/O Bus?9.Something about I/O System instructions?@There are four I/O buses in the modern PC architecture and each of them has several functions.They may lead to internal and external ports or they lead to other controlling buses,The four buses are:ISAPCI-which is the newer high speed multifunction I/O bus.AGP-which is only used for graphices adapter.USB-which is the new low speed I/O bus to replaces ISA.11.What's Internet?@Internet is consists of computers and router they obey the rules which is definited in the network. It allows users to communicate with their friends,to send message to the internet to shall the message.12.Basic Principles of 4GL includes?@(1)The Principle of Minimum W ork(2)The Principle of MInimum Skill(3)The Principle of avoiding alien syntax and mnemonics(4)The Principle of Minimum Time(5)The Principle of Minimum errors(6)The Principle of Minimum Maintenance(7)The Principle of Minimum Results13.Something about SQL?@SQL is short for`Structured Query Languages,which comprises one of the fundamental building blocks of modern database architecture.SQL defines the methods used to create and manipulate relational database on all major platforms.14.Parallel Bus and Serial Bus?Parallel Bus,which carries data words across multiple wires.Serial Bus,which carries data in bit-serial form.15.Features of Unix?@(1)Multitasking capability(2)Multiuser capability(3)Portability(4)UNIX programs(5)Library of applications software16.Something about 5th Generation Computers?@Fifth generation computing devices are based on artificial intelligence.AI includes the following fields:(1)games playing(2)expert systems:programming computers to make decisions in real-life situations(3)natural language:programming computers to understand natural human languages(4)neural netwoks(5)robotics17.What is an Internetwok?@An internetwork is a collection of individual networks,connected by intermediate networking devices.that functions as a single large network.Internetworking refers to the industy,products,and procedures that meet the challenge of creating and administering internetworks.18.ISO and OSI@ISO stands for International Standardization Organization and OSI System Interconnect Reference Model.The ISO/OSI is one of the most important systems architectures for talking about commucations.ISO/OSI is divided into seven layers,the pupose of each layer is to offer certain services to the higher layers.(画7层图)7 layers:(1)physical layer --- transmitting individual bits from one node to the next(2)data link layer --- data representation(3)network layer --- end to end communication(4)transport layer --- provide services from internet layer to application layer(5)session layer --- communication between hosts(6)presentation(7)application layer --- provide some applicationwork : interconnection between 2 or more computerpurpose of network :(1)sharing the file and applications(2)sharing hardware deviceskinds of network :(1)UK JANET (Joint Academic Network)(2)Europe EARN (European Academic Research Network)(3)USA ARPA net (Advanced Research Projects Agency Network )Application of network:(1)resource sharinghardware (computer resource , disks , prints )software (application software )(2)information sharingeasy accessibility from anywheresearch capability(3)communicationEmail , Message broadcast.Types of network :(1)LAN (Local Area Network) network in small geographical area(2)MAN (Metropolitan Area Network) network in a city(3)W AN (Wide Area Network) spread geographical20.URLS@URL stands for uniform resource locatorA URL is the address of document on the computer简写:(1) IC --- Integrated Circuit(2) PC --- Personal Computer(3) CPU ---Central Processing Unit(4) VDU --- Visual Display Unit(5) PCI --- Peripheral Component Interconnect(6) USB ---Universal Serial Bus(7) GUI --- Graphical User Interface(8) OSI --- Open System Interconnection(9) ISO --- International Standard Organization(10) HTTP --- Hypertext Markup Language(11) TCP --- Transfer Control Protocol / Internet Protocol(12) DNS --- Domain Name System(13) FTP --- File Transfer Protocol(14) UDP --- User Datagram Protocol(15) ARP --- Address Resolution Protoco。
计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hacker i. 黑客 10. switch j.防火墙1. 6. 2. 7. 3. 8. 4. 9. 5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
Perhaps we in our group resent this present generation so much because we fear they are stealing from us the leisure of our conservatism. How can we sit by if they too accept the status quo ante(原状) and if no one pushes forward?1. The reader may most safely conclude that the authorA. was a contemporary of Emerson.B. rebelled against authority when he was young.C. looks forward to having more leisure.D. considers himself a member of the older genera-tion.2. The main idea of the passage isA. a review of the American heritage of optimism.B. a praise of the young people's virtue.C. a deep concern about whether the young people will keep up the traditional pioneering spiritD. a defense of conservatism3. According to the passage, Emerson was esteemed(尊敬) forhisA. love of America as a country for younger generation.B. justification of the errors made by the old generation in the past.C. upholding of American heritage.D. confidence in the following generations on whom theD.Alice was so proud and wouldn't listen to her3.What made Alice decide to give a concert ?A.She wanted to prove that her teacher was wrongB.She wanted to please her teacherC.She was sure that she could sing beautifullyD.Somebody else wanted her to do so4.What is really meant by saying ,"You'll never be better than you were tonight ”?A.You gave performance tonight B.You won't make any improvement in futureC.You have never sung so well before D.You did much better before than tonight5.If Alice's teacher had told a lie ,she might have said .A."I don't like the performance”B."You have made no progress”C."The performance tonight is terrible”D."Your performance tonight is excellent”参考答案:DACBD15:[论述题]15.请将下列英语句子翻译成汉语,要求内容忠实原文,语句通顺,逻辑清楚,表达正确。
度秘D rgree of the serect(English name: duer) is baidu world conference in 2015, new toprovide users with assistant secretary of search service robot. It on a broad index of the real world, on the basis of service and information, relying on strong baidu search and intelligent interactive technology, by using machine learning and artificial intelligence instead of people's behavior, degree of secret as full-time secretary, to provide users with a variety of quality services. Everyone can have intimate secretary is the secret of the dream. Every one of us, whether it's a grader, or aged and old people, can through the secret equally enjoy Internet service, find desires.译文:度秘(英文名:duer):是百度在2015年世界大会上全新推出的,为用户提供秘书化搜索服务的机器人助理。
它在广泛索引真实世界的服务和信息的基础上,依托百度强大的搜索及智能交互技术,通过人工智能用机器不断学习和替代人的行为,度秘媲美专职秘书,为用户提供各种优质服务。
软件设计师-计算机专业英语(一)(总分80,考试时间90分钟)Originally introduced by Netscape Communications, (1) are a general mechanism which HTFP Server side applications, such as CGI (2) , can use to both store and retrieve information on the HTTP (3) side of the connection. Basically, Cookies can be used to compensate for the (4) nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (5) .1.A. BrowsersB. CookiesC. ConnectionsD. Scripts2.A. graphicsB. processesC. scriptsD. texts3.A. ClientB. EditorC. CreatorD. Server4.A. fixedB. flexibleC. stableD. stateless5.A. programsB. applicationsC. frameworksD. constraintsWebSQL is a SQL-like (6) language for extracting information from the web. Its capabilities for performing navigation of web (7) makes it a useful tool for automating several web-related tasks that require the systematic processing of either all the links in a (8) , all the pages that can be reached from a given URL through (9) that match a pattern, or a combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (10) Interface.6.A. queryB. transactionC. communicationD. programming7.A. browsersB. serversC. hypertextsD. clients8.A. hypertextB. pageC. protocolD. operation9.A. pathsB. chipsC. toolsD. directories10.A. RouterB. DeviceC. ComputerD. GatewayMIDI enables people to use (11) computers and electronic musical instruments. There are actually **ponents to MIDI, **munications" (12) .", the Hardware Interface and a distribution (13) called "Standard MIDI Files". In the context of the WWW, the most **ponent is the (14) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (15) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the **mon use of MIDI today.11.A. personalB. electronicC. multimediaD. network12.A. deviceB. protocolC. networkD. controller13.A. formatB. textC. waveD. center14.A. VideoB. FaxmailC. GraphicD. Audio15.A. messagesB. packetsC. frameD. informationCertificates are (16) documents attesting to the (17) of a public key to an individual or other entity. They allow verification of the claim that a given public key does in fact belong to a given individual. Certificates help prevent someone from using a phony key to (18) someone else. In their simplest form, Certificates contain a public key and a name. As commonly used, a certificate also contains an (19) date, the name of the CA that issued the certificate, a serial number, and perhaps other information. Most importantly, it contains the digital (20) of the certificate issuer.The most widely accepted format for certificates is X.509, thus, Certificates can be read or written by any **plying with X.509.16.A. textB. dataC. digitalD. structured17.A. connectingB. bindingC. composingD. conducting18.A. impersonateB. personateC. damageD. control19.A. communicationB. computationC. expectationD. expiration20.A. signatureB. markC. stampD. hypertextDOM is a platform-and language- (21) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently ,definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (22) . DOM is a (23) -based AP1 to documents, which requires the whole document to be represented in (24) while processing it. A simpler alternative to DOM is the event-based SAX, which can be used to process very large (25) documents that do not fit info the memory available for processing.21.A. specificB. neutralC. containedD. related22.A. textB. imageC. pageD. graphic23.A. tableB. treeC. controlD. event24.A. documentB. processorC. discD. memory25.A. XMLB. HTMLC. scriptD. webMelissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (26) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (27) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages (28) .As administrators seek to block dangerous email attachments through the recognition of well-known (29) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which while displaying some cute animation, simultaneously **mands in the background to steal your passwords and give the (30) access to your network.26.A. attachmentB. packetC. datagramD. message,27.A. virtualB. virusC. wormsD. bacteria28.A. memoryB. cachesC. portsD. registers29.A. namesB. cookiesC. softwareD. extensions30.A. crackerB. userC. customerD. clientNetworks can be interconnected by different devices. In the physical layer networks can be connected by (31) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches which operate at data link layer. They can accept (32) , examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process. In network layer, we have routers that can connect two networks. If two networks have (33) network layer, the muter may be able to translate between the packer formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (34) . As an example, gateways between Internet e-mail and X.400 e-mail must (35) the e-mail message and change various header fields.31.A. reapersB. relaysC. packagesD. modems32.A. framesB. packetsC. packagesD. cells33.A. specialB. dependentC. similarD. dissimilar34.A. syntaxB. semanticsC. languageD. format35.A. analyzeB. parseC. deleteD. createThe purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (36) of the technical requirements for the software product.During the requirements definition phase, the requirements definition team uses an interative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each (37) that it must meet. The starting point is usually a set of high level requirements from the (38) that describe the project or problem.In either case, the requirements definition team formulates an overall concept for 'the system and then defines (39) showing how the system will be operated, publishes the system and operations concept document and conducts a system concept review (SCR) .Following the SCR, the team derives (40) requirements for the system from the high level requirements and the system and operations concept using structured or object-oriented analysis. The team specifies the software functions and algorithms needed to satisfy each detailed requirement.36.A. functionB. definitionC. specificationD. statement37.A. criterionB. standardC. modelD. system38.A. producerB. customerC. programmerD. analyser39.A. rolesB. principlesC. scenariosD. scenes40.A. cotailedB. outlinedC. totalD. complete(41) is a protocol that a host uses to inform a router when it joins or leaves an Internet multicast group.(42) is an error detection code that most **munication networks use.(43) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.(44) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range of media.(45) is an identifier of a web page.41.A. ICMPB. SMTPC. IGMPD. ARP42.A. 4B/5BB. CRCC. Manchester CodeD. Huffman Code43.A. OSPFB. RIPC. RARPD. BGP44.A. ISDNB. X.25C. Frame RelayD. A TM45.A. HTTPB. URLC. HTMLD. TAGSpread spectrum simply means that data is sent in small pieces Over a number of the (46) frequencies available for use at any time in the specified range. Devices using (47) spread spectrum (DSSS) communicate by (48) each byte of data into several parts and sending them concurrently on different (49) . DSSS uses a lot of the available (50) , about 22 megahertz (MHz) .46.A. continuousB. highC. lowD. discrete47.A. direct-sequenceB. discrete-sequenceC. duplicate-sequenceD. dedicate-sequence48.A. splittingB. combiningC. packingD. compacting49.A. bitsB. frequenciesC. packetsD. messagesA. rateB. velocityC. bandwidthD. period(51) is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to **munication.(52) is a professional organization of individuals in multiple professions which focuses on effort on lower-layer protocols.(53) functions with two layers of protocols. It can connect networks of different speeds and can be adapted to an environment as it expands.(54) is the popular LAN developed under the direction of the IEEE802.5.(55) is the popular backbone technology for transmitting information at high speed with a high level of fault tolerance which is developed under the direction of ANSI.51.A. The MAC addressB. The IP addressC. The subnet addressD. The virtual address52.A. ISOB. ANSIC. CCITD. IEEE53.A. The hubB. The bridgeC. The routerD. The proxy54.A. EthernetB. Token BusC. Token RingD. DQDB55.A. X.25B. A TMC. FDDID. SMDS**munication uses high-frequency (56) waves that travel in straightlines through the air. Because the waves cannot (57) with the curvature of the earth, they can be (58) only over short distance. Thus, microwave is a good (59) for sending data between buildings in a city or on a large college campus. For longer distances, the waves must be relayed by means of "dishes" or (60) .These can be installed on towers, high buildings, and mountain tops.56.A. opticalB. radioC. electricalD. magnetic57.A. reflexB. distortC. bendD. absorbA. transmittedB. transformedC. convertedD. delivered59.A. materialB. equipmentC. mediumD. channel60.A. repeatersB. radarsC. telephonesD. antennasA socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running oncomputers attached to the network. A sockettwo addresses:. Sockets provide acommunication channel between one or more systems.There aresockets separately using TCP and UDP.61.A. uniqueB. separateC. sameD. dependent62.A. is made ofB. composed ofC. is composed OfD. is consisted of63.A. E-mail address and IP addressB. MAC address and port addressC. MAC address and IP addressD. port number and IP address64.A. full-duplexB. half-duplexC. simplexD. complex65.A. message and packetB. packet and frameC. stream and datagramD. flow and blockOpen Shortest Path First (OSPF) is a (66) routing algorithm that (67) work done on the OSI IS-IS intradomain routing protocol. This routing, as compared to distance-vector routing, requires (68) processing power. The (69) algorithm is used to calculate routes. OSPF routing table updates only take place when necessary, (70) at regular intervals.66.A. distance-vectorB. link-stateC. flow-basedD. selective floodingA. derived fromB. deviated fromC. was derived fromD. was deviated from68.A. moreB. lessC. sameD. most69.A. Bellman-FordB. Ford-FulkersonC. DijkstraD. RIP70.A. but ratherB. rather tooC. rather thanD. rather thatPacket-switching wireless networks are preferable (71) when transmissions are (72) because of the way charges are (73) per packet. Circuit-switched networks are preferable for transferring large files or for other lengthy transmissions because customers are (74) for the (75) of time they use the network.71.A. toB. forC. thanD. only72.A. longB. shortC. largeD. small73.A. computingB. incuriousC. incurredD. incurred74.A. chargedB. finedC. freeD. controlled75.A. pointB. startC. lengthD. endMultipurpose Internet Mail Extension (MIME) is a (76) document messaging standard in the Internet environment. With MIME, users can send (77) E-mail messages that include audio, video, graphices, and text to any other user of a TCP/IP network. Richtext information can also be (78) into messages. It defines the fonts, formats, and (79) features of a document so the document can be easily (80) on many different types of systems.76.A. completeB. compoundC. simpleD. efficient77.A. analogB. manyC. multimediaD. digital78.A. incorporatedB. filledC. storedD. filed79.A. colorB. sizeC. designD. layout80.A. restoredB. redisplayedC. storedD. executed。
习题+答案Write T or F to each statementT6. An asynchronous device is a clocked device.T7. A latch is an asynchronous device, because it functions at arbitrary times.T8. The repetition of clock pulse can vary from very low rate to very high rate.T9. A synchronous device changes its state only on the arrival of a clock pulse.F10. A clock input may occur at any time.T11. The clock pulses are used to synchronize all operations of the shift register.T13. A unidirectional shift register is capable of shifting in one direction only.F14. In a shift-left register the serial input determines what goes into the leftmost position during the shift register.F15. To provide parallel transfer capability some additional input and output lines should be provided to the shift register.Choose the best answer for each of the following1. How can the output of a logic gate be energized CA By changing its inputs.B By remaining its inputs unchanged.C By meeting the specific input condition.D By giving a pulse.3. A NAND gate consists of D .A an OR gate followed by an inverterB an AND gate followed by an inverterC an AND gate followed by an OR gateD an inverter followed by an AND gate4. Under what condition is the output of a two-input XOR gate logic-high BA Its inputs are simultaneously at the same logic level.B Its inputs are simultaneously at opposite logic levels.C Its inputs are logic-low.D its inputs are simultaneously logic-high.Write T or F for each statementT 1. The CPU uses the input and output units to communicate with the outside world.F2. Main memory is sometimes called external memory.F3. After execution the program and the related files of data and files of information will be retained in the main memory for later use.F4. Personal computers have not the features of the larger system..T5. Large systems offer higher processing speeds for user and return more data than PCs. F6. CPUs all size have primary storage, arithmetic logic, and the control section.F7. The output device is the heart of any computer system.T8. The input/output devices and auxiliary storage units of a computer system are called peripherals.F9. The instrument of interpretation and communication between humans and computers system of all sizes is CPU.F10 Special purpose computers can adapted to many situation by giving them an appropriate program. F11 .A minicomputer is the smallest and least expensive type of computer.T12. A special purpose computer performs only one specific task and thus lacks versatility.T13. The larger the system the greater is its processing speed, storage capacity.T14. Mainframe computers are designed to process complex scientific application.T 9. The main memory in a general-purpose computer is made up of RAM integratedcircuit chip.\F 10. When the power is turned on, the program counter is set the first address of thebootstrap loader by the software of the computer.T 11. The read-write heads contact the surface of the floppy disks.T 12. The data on a particular track will be switched automatically onto a spare track by the computer before a catastrophic failure would occur.F 14. The read write heads stay on the same track continuously when the disk drive isWorkingF 16. The possible symbols in the binary numbering system are q to 9.F 17. The decimal value of 16 is represented in 4 bits BCD as 00010101.F 18. Alphanumeric versions of BCD commonly use 6,7or 8 bits to represent characters.F 19. A 6 bit alphanumeric code can represent 128 different characters.F 22. Eight bit codes are limited to representing 128 different characters.T23. An extra check (or parity ) bit is often added to each 6, 7, or 8 bit character represented in storage so that it will be possible to detect coding errors that may occur.T24. If a computer uses an odd parity format to detect errors in character codes, thenevery valid character code will always have an odd number of 1 bits.T25. Processor comes with a unique set of operations called an instruction set.F 26. In an instruction, operands specify the function to be performed.T 27. A processor's job is to retrieve instruction from memory and perform step bystep operations,True or FalseF1 All operating systems on various computers take the same size.F 2 All operating systems were written in a low level language.T3 The user can't use the computers at all if there is no operating system on thecomputers.F4 The operating system exists in the lowest layer of a computer.T5 The system calls are provided by the operating system.T 6 A computer's operational software defines the schedule of jobs awaitingexecution.F7 Though an operating system can schedule the execution of jobs, it does notmanage the availability of I/O devices.T 8 The IOCS component of an operating system controls I/O operations.T9 It is a major problem for the operating system to map the logical file concept ontophysical storage devices such as magnetic tape or disk.F10 Files can only be direct access on a disk system.T 11 The logic structure and nomenclature of the different operating systems vary considerable.F12 The form of the system prompt is the same for every kind of operating system 13 You must boot the system, before you use a microcomputer.T14 Spooling is an approach to improving system performance by over aping the input of one job with the output of other jobs.T15 Multiprogramming allows time sharing.T1 6 When they first appeared, the microcomputers were provided with the operating system developed for computers.T17 By using the graphical user interface, what the users need to do is to "point and click" in order to accomplish their tasks.T18 The interface introduced by Windows is the object-oriented user interface.T failed in betting their future on Windows.Multiple Choice1 A computer's operating system is:Da resource managementb error recoveryc memory managementd all the above2 Which is the generalization of a two-level directory Da cycle graph directory structureb a tree-structuredc batch systemd all the above3 Which system may have no time constrains Ca real-time systemb time-share systemc batch systemd all the above4 The more popular micro operating system is:Da MS-DOSb CP/Mc UNIXd all the above5 What languages can be used to develop the operating systems Ca A machine language,b An assembly language.c A high level language,d all of the above.6 How does the operating system manage the resources of the computera It turns on or off the resources of the computer.b It makes them work together towards some common goals, or objectives.c It controls the way in which these resources are put to work.d It acts directly on the raw hardware.7 The function of an operating system is Da to drive the the raw hardware of the computerb to drive the resources of the computer in accordance with certain objectivesc to provide the higher layers of software with a simplified computerd all of the above11 The graphical user interface provides the users withA a simpler way to interact with their computersB a series of typed commandsC an intuitive sit of graphical icons that allowed the completion of common tasksD an intuitive set of graphical incons for users to "point and click" in order to accomplishtheir tasks, so that they didn't have to remember arcane words andcommands anymore12 Windows resemble the Macintosh inA providing a GUI which is introduced by MacintoshB providing a limited means of multitaskingC providing a Windows interface just like the GUID allowing users to load multiple programs and have them run in thebackground while doing other work in a window in the foregroundTrue or FalseF1 Flowcharting is used primarily for program design and rarely for systems design.T2 When programming in a procedure-oriented language, you should tell the computer'‘what to do' and 'how to do it'.T3 Assembler-level languages use mnemonics to represent instructions.T4 Machine language instructions are composed of a label, an opcode, and an operand.F5 Machine languages must be converted by a compiler to be used by the computer.F6 High-level languages require that programmers work with individual main storage locations.. 5T7 A compiler is translating program that converts high-level languages intomachine language.T9 A flowchart loop indicates the repetitive performance of steeps to process data.T10 None of the computers consists of hardware only.F11 Programs written in high-level language can be executed by the computers without the help of a translator program~T13 Each symbolic instruction has one-to-one correspondence with the machine instruction.T 14 Writing a program in a high-level language need not take account of the hardware of the computer.T 15 The opode of an assembly language instruction specifies the operation that is to be performed by the microprocessor.T 17 The mnemonic for the instruction is the symbolic representation of the actual binary code that the computer directly executes.T 18 A label is on the left of the assembly language statement.T 21 To enable the computer to solve an application problem programmers have to write programs in order to translate the application concepts into computerconcepts.T 22 A class is defined by grouping a user-defined type with all procedures andfunction that can be applied to it.T 23 The artificial intelligence research community did not agree with the concepts of object-oriented programming when in its early days.F24 Object-oriented programming languages are absolutely different from the LISP programming language.T 25 A program may produce incorrect output even if it runs OK.T 26 An error will occur if a program wants to use a deleted file.F 27 All the errors can be avoided.T 28 A warning will not terminate the program.T 29 Although we could not avoid all the runtime errors, we must take appropriate action when it happens.Match the following terms to the appropriate definition1 program2 programmer3 machine language4 assembler5 source6 object7 interpreter8 compilerA A computer program that translates an instruction into machine language, execute it, and then repeats the process for each instruction in a program until the program isB The set of statements that make up a computerC A computer program that reads a high-level languageD A computer-specific set of primitive or elementary instructions that allows people to communicate with a particularE A set of instruction that tells a computer what toF A program that translates an assembly-level language into machine language4.G Output from a compiler or assembler that is linked with other code to produce executable machine languageH A person who creates computerTrue or falseT1 The program specifications are written by the software engineers.F2 Coding a program will consume most of programmer's time and effort.T 3 Programmers should use flowchart and other visual aids when they are designing routines.F4 The goal of the test phase of program development is to "prove" that a particular program has been completely debugged.T 5 More programmers maintain programs rather than code programs.T 6 A structured program is made up of several modules.T 7 "Branching" capability is one the most intriguing properties of a digital computer.。
《计算机专业英语》第01章在线测试A BC DThese days it is not uncommon for one to see people usingA BC DJust a minute, I m waiting for the computer to ________A BC Dwhat does " neural network " mean?A BC Dhow to translate the word "A BC DC、output devicesD、a busE、crt screen2、According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are __________________.A、microcomputersB、workstationC、lenovoD、mainframesE、note bookF、minicomputers3、One of trends in computer development is _________,the effort to compress more circui t elements into smaller and smaller ______spaceA、microminiaturizationB、micromoduleC、chipD、chat4、We can define a computer as a device that ______________________A、accepts inputB、deal everythingC、processes dataD、stores dataE、produces output5、A program is a sequence of ________ that can be executed by a computer.It can either be built into the hardware or exist independently in the form of ________.正确错误Computer is able to do different kinds of tasks.正确错误There are no differences between the information processor and human (正确错误In the future, computers are capable of original thoughts.正确错误Information can be input only by people.正确错误。
一、Give out the full names for the following abbreviations(写出下列缩写词的全称)(15%)WAN__________________________________________________HTTP__________________________________________________NT____________________________________________________CEO__________________________________________________DBMS________________________________________________ISP___________________________________________________XML__________________________________________________BIOS_________________________________________________IT____________________________________________________WWW_______________________________________________二、Match the following words and expressions in the leftcolumn with those similar in meaning in the right)(10%)1. output devices a. 操作系统2. silicon b. 扩展存储器3. expanded memory c. 硅4. database administrator d. 输出设备5. operating system e. 汇编语言6. assembly language f. 数据库管理员7. gateway g. 数字图像处理8. laser technology h. 网关9. digital image processing i. 制造过程10.manufacturing process j. 激光技术1. ( ) 6. ( )2. ( ) 7. ( )3. ( ) 8. ( )4. ( ) 9. ( )5. ( ) 10.( )1. 高速打印机()2. 随机存取存储器( )3. 软件可靠性( )4. 面向服务的( )5. 光盘驱动器( )四、For each of the following blanks, four choices are given. Choosethe most appropriate one (从下面给出的四个选项中选择最恰当的答案)(30 %)1. Most system boards have two kinds of power connectors: _________ .A. AT and ISA stylesB. ATX and ISA stylesC. AT and EISA stylesD. AT and ATX styles2. A processor is composed of two functional units, they are _________.A. an arithmetic/logic unit and a storage unitB. a control unit and some registersC. a control unit and an arithmetic/logic unitD. some registers an arithmetic/logic unit3. _________ is a storage location inside the processor.A. A registerB. ALUC. ControlD. Memory4. A periodic refresh is needed to restore the information for the _________ .A. SRAMB. DRAMC. EPROMD. EEPROM5. The raw data are stored on the disk using the _________ .A. data dictionaryB. file systemC. DBMSD. DBA6. The _______ serves as an interface between hardware and software.A. systemB. application programC. operating systemD. control unit7. Most operating system have a standard set of _________ to handle the processing of all input and output instructions.A. spreadsheetB. control instructionsC. I/O operationD. data table8. _________ uses commands that are easier for programmers to understand than are machine language commands.A. Assembly languageB. High-level languageC. C languageD. C++ language9. When a _________ is used, all the devices in the network are connected to a single cable.A. bus networkB. ring networkC. star networkD. network10. Two common applications of LANs are _________ resource sharing and information resource sharing.A. softwareB. computerC. networkD. hardware11. With Internet Explorer and an Internet connection, you can search for and view information on the _________ .A. Active DesktopB. ProgramsC. Phone DialerD. World Wide Web12. Videodisc and laser technology provide the ability to_________A. cost moreB. create some education filesC. enhance other forms of educationD. store large amounts of data13. _________ refers to the process of a two dimensional picture by a digital computer .A. Pattern recognitionB. Image compressionC. Digital image processingD. Image data file format14. “Multimedia” means that _________ .A. it can play music.B. it can show a graph.C. it can rotate a three-dimensional model.D. it can do all above at the same time.15. Many companies use _________ to train their employees.A. technologyB. entertainmentC. multimedia applicationsD. animation五. To identify the following to be True or False accordingto computer knowledge( 根据计算机知识判别是非题)(10%)1. A register is a storage location inside the processor. ( )2. A system board is a heart of a computer. ( )3. The Memory addresses are expressed as binary numbers. ( )4. Metadata means data about data. ( )5. Without an operating system, we could not execute a user program. ( )6. A high-level language can be designed to only process scientific calculation.( )7. For information about using Internet Explorer, click the Help menu in Internet Explorer. ( )8. The development of videodisc is useful for distance education. ( )9. There are three general types of compression. ( )10. Multimedia is not only a product, but also a technology. ( )六.Reading comprehension(阅读理解)(25%)(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(10%)high-level language assembly language writtenmachine language notationA programming language, designed to facilitate the communication between human and computers, is a __________________ for describing computation in readable form. There are 3 levels of programming languages, they are __________________, which can be run directly by computer; __________________and______________. There are different high-level programming languages. Fortunately, most of them have many kinds of construct in common and vary only in the way that these must be__________________ . Therefore, first thing to be decided about a task is to choose which programming language is best suited for the job.Passage AThe central processing unit(CUP) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, which its speedand capacity have increased tremendously. Indeed, these changes have resulted inmicro-Computers that are small enough to fit on your desk and your lap.The CPU comprise the control unit and the arithmetic/logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices.The ALU performs all the arithmetic and logical(comparison) functions—that is, it adds, subtracts, multiplies, divides, and does comparison. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions , such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误)1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input/output devices are controlled by the control unit of the CPU. ( )3. The CPU comprises the control unit and memory. ( )4. The control unit performs all the arithmetic and logical functions. ( )5. The central processing unit (CPU) is the heart of the computer systems. ( )要求:明确标注每小题或每步骤得分点一. Give out the full names for the following abbreviations(写出下列缩写词的全称)(15%)( 本题共15分, 每小题1.5分)WAN: Wide Area NetworkHTTP: Hypertext Transport ProtocolNT: Net TechnologyCEO: Chief Executive OfficerDBMS: Database Management SystemsISP: Internet Service ProviderXML: eXtensible Markup languageBIOS: Basic Input/Output UnitIT: Information TechnologyWWW: World Wide Web二. Match the following words and expressions in the left column with thosesimilar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)( 本题共10分, 每小题1分)1. ( d ) 6. ( e )2. ( c ) 7. ( h )3. ( b ) 8. ( j )4. ( f ) 9. ( g )5. ( a ) 10.( i )三. Translate the following phrases into English(将下列短语翻译成英语)(10%)( 本题共10分, 每小题2分)1. high-speed printer2. Random Access Memory3. software reliability4. service-oriented5. optical disk driver四. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(30 %)( 本题共30分, 每小题2分)1. D2. C3. A4. B5. B6. C7. B8. A9. A 10. D 11. D 12. D13. C 14. D 15. C五.To identify the following to be True or False according to computer knowledge( 根据计算机知识判别是非题)(10%)( 本题共10分, 每小题1分)1. ( T )2. ( F)3. ( T )4. ( T )5. ( T )6. ( F )7. ( T )8. ( T )9. ( F )10. ( F )六.Reading comprehension(阅读理解)(25%)(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(10%)( 本题共10分, 每空2分)notation machine language assembly language high-level language written (3空和4空答案可互换)(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (15%)( 本题共15分, 每小题3分)1. ( F )2. ( T )3. ( F )4. ( F )5. ( T )。
计算机专业英语试题及答案1. 选择题1. Which of the following is not a programming language?a) Javab) HTMLc) Pythond) CSS答案: b) HTML2. Which protocol is used for sending and receiving email?a) HTTPSb) FTPc) SMTPd) DNS答案: c) SMTP3. What does the acronym CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Power Unit答案: a) Central Processing Unit4. Which programming language is commonly used for web development?a) C++b) Javac) JavaScriptd) Swift答案: c) JavaScript5. What does HTML stand for?a) Hyperlinks and Text Markup Languageb) Hyper Text Markup Languagec) Home Tool Markup Languaged) Hyper Text Modeling Language答案: b) Hyper Text Markup Language2. 填空题1. The process of converting high-level programming code into machine code is called ___________.答案: compilation2. HTTP stands for ___________ Transfer Protocol.答案: Hyper Text3. The process of testing software by executing it is called ___________.答案: debugging4. Java is an object-_____________ programming language.答案: oriented5. DNS stands for Domain Name ___________.答案: System3. 简答题1. What is the difference between TCP and UDP?答案: TCP (Transmission Control Protocol) is a connection-oriented protocol, which means it establishes a connection between the sender and receiver before transferring data. It ensures that all packets are received in the correct order and provides error checking. UDP (User Datagram Protocol), on the other hand, is a connectionless protocol that does not establish a direct connection before transmitting data. It does not guarantee packet delivery or order but is faster and more efficient for time-sensitive applications.2. What is the purpose of an operating system?答案: An operating system (OS) is a software that manages computer hardware and software resources and provides common services forcomputer programs. Its primary purpose is to enable the user to interact with the computer and provide a platform for running applications. It manages memory, file systems, input/output devices, and multitasking. The OS also handles system security and resource allocation to ensure optimal performance.4. 解答题请参考下文并给出自己的解答。
计算机专业英语课后答案(清华⼤学出版社第⼆版)第⼀章Computer system overview(操作系统概述)I. Pre-reading Questions1.What is a digital computer?The digital computer is a digital system that performs various computational tasks. The word “digital”implies that theinformation in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. Digital computer is also called electronic computer or computer.2.Are there any differences between the binary number system and the common decimal number system?The decimal digits has ten digits: 0,1,2,,, and 9. The binary number system has two digits: 0 and 1. The binary numbers use a base 2. The decimal digits use a base 10.3.How many types of computers do you know? Name at least four of them. Computers are usually classified into four broad categories: microcomputers, minicomputers, mainframe computers and supercomputers.II Fill in the following blanks.1.Application software is designed to accomplish real-world tasks in fields.2. An 8-bit signed integer can have any value between -128 and 1273. System software controls the computer and enables it to run the hardware and applications software.4. A computer system consists of hardware system and software system .5. List four types of computers: microcomputers, minicomputers , mainframe computers,and s upercomputers .III True or False.1. The software system is the physical equipment that you can see and touch. 1.F2. Typically, a data value is set to zero to represent FALSE and 1 value forTRUE. 2.F3. In the earliest general-purpose computer, most input and output media were magnetic disks. 3. F4.T4. Supercomputers are largest, fastest, and most expensive computer available.5. A computer system consists of hardware system and software system. 5. T IV Matching terms.1、(b) CPUThe processing unit is at the heart of a computer.2、(c) bit A unit of information conveyed by a single binary digit.3、(a) integrated circuit (IC)A complete electronic circuit that packages transistors and other electronic components on a small silicon chip.4、(d) ASCII A system for encoding characters as binary digits.V Translating Terms.(1) coding techniques 编码技术(2) application software 应⽤软件(3) floating point data 浮点数据(4) timesharing 分时,分时技术(5) storage capacities 存储容量VI Choose the best one of the four answers given to fill in each blank.This chapter introduces digital computer, data types, the evolution of computers, and types of computers. 1 is known to all, it’s hard to find a field in 2 computers are not being used. Digital computer, also called electronic computer or computer, is a digital system that 3 various computational tasks. Digital computers use the 4 number system, which has two digits: 0 and 1.By usingvarious coding 5 , groups of bits can be made to represent not only binary numbers 6 other discrete symbols, such as decimal digits or letters of the alphabet. A computer system consists of hardware system and software system. Programs tell the hardware what to do. 7 software is designed to accomplishreal-world tasks in fields such as accounting, entertainment, and engineering. Computers are usually 8 into four broad categories: microcomputers, minicomputers, mainframe computers, and supercomputers. It’s hard to give a 9 definition to each type because computer speeds and storage 10 change rapidly.1. A. As B. It C. As it D. That2. A. what B. which C. where D. when3. A. performs B. carries C. makes D. integrates4. A. decimal B. binary C. Arabian D. American5. A. technique B. Technology C. techniques D. technologies6. A. instead of B. rather than C. but also D. as well7. A. Application B. System C. Word D. Excel8. A. put B. made C. conducted D. classified9. A. precious B. progress C. proceeding D. precise10. A. capacities B. capable C. capabilities D. capacity1.A2. B3. A4. B5. C6. C7. A8. D9. D 1 0.CVII. Translate the following into English.1.By using various coding techniques, groups of bits can be made to represent not only binary numbers but also other discrete symbols.通过应⽤各种编码技术。
网址一:/hub/save-computer-from-Hackers网址二:/hub/What-is-Phishing姓名:**学号:************分校:通州(一)原文1.What is Computer Hacking?Computer hacking is a malicious act, so it is important for your computer and data to protect from Hacking. Computer Hacking refers to the process of making malicious modifications to a software or hardware to accomplish an aim outside the original creator's objective. Hackers are usually expert programmers who usually see hacking as a real life application of their skills.Hacking has become a nuisance in recent times and the protection from hacking has become more complex. Infact, the hackers have become so good that even the software giants are feeling a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years.Well, the Giants are not the only targets of these hackers, even common individuals are not safe. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities. They can get to your secrets and destroy your credit. The dangers are possibly endless.How to protect from HackingPrevention is Better Than Cure. The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system. Here, I am going to introduce some basic tips to save your computer and data from hackers.Using Antivirus SoftwareAntivirus software are one of the basic tools for your data and computer to protect from hacking. Antivirus software act as a protecting net that catches any potential threat before it reaches your system. They can prevent unauthorized access to your computer, protects your system from viruses and cloaks your data ports from intruders searching for any opening. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities.Nowadays anti virus software are completely automated. Go for the best when choosing anti virus software and make sure that you scan your system for viruses atleast once a week. Norton antivirus from Symantecis one of the leading products in the industry. Avastis another great antivirus tool to protect from hacking.Using FirewallWhat is a Firewall?A firewall is a set of programs located at the network gateway server which protects a private network from unauthorized access from other networks. The term firewall is originally referred to a wall intended to confine a fire.A firewall protects your computer from offensive websites and potential hackers. It keeps your data and information safe from unwanted intruders. Firewalls are designed to prevent unauthorized access to your network, much like a locked door.Thus firewall is a vital tool for your strategy against hackers so don't forget to set up one for your system. Microsoft has a built-in firewall software but you can also try the Symantec firewall.Using Anti Spyware SoftwareWhat is a Spyware?A spyware is a self installing software which secretly gathers information about a person's computing activities such as surfing habits and viewed sites. Spywares are truly a hacker's tool, not only collecting personal information but also interfering with user control by installing additional software and redirecting web browsers.Anti spyware software are designed to save your computer from hackers. They not only protect your computer by detection and removal of spywares but also preventing automatic installation of these malicious programs. Spysweeperis a great anti spyware software to guarantee a spyware free computer.Email SecurityEmail is one of the leading hacker's tools. Hackers use emails to transmit malicious software to your computer. Emails are usually very cheap which gives the hackers loads of opportunities. One of the basic tips to prevent hacking is to be extra careful with emails. The most important tip is that you should never hand out your real email address to a stranger. Never open an email arriving from an unknown source and never try to open an attachment with an email if you don't know the sender. Aviraantivirus is a useful tool to filter your emails for potential threats as well as provide premium protection for your computer.Software updatesHackers are always searching for security gaps in your system. Anti virus and anti spyware software usually lose their effectiveness with time as new and more advanced malicious programs are created by hackers.Its important to go for the latest security software in the market to guaranteemaximum security from threats. Make sure you frequently check out for software updates or set your software to update automatically.Internet SecurityBeing extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system. A great way to save yourself from hackers is to avoid visiting hacker controlled sites usually committed to porn, free downloads and online gaming. Also be extra careful while downloading something from an unknown source. Never ignore a security warning about a site. Its better to be safe than sorry.Educate YourselfWhen working for an offensive against hackers, the most important step is to educate yourself. Hacking is a dynamic topic with developments arising every moment. Hackers are intelligent and innovative and you should be prepared for it.Computers are vulnerable. No matter what you do, its impossible to be 100% save. Important data like personal detail and credit card information should never be saved directly on a computer. A password protector is a great way to protect this data.Another great way to secure your computer is to use a password on your computer. Well, it can't really save you if your computer gets stolen (in case of a laptop) but can save you from unauthorized people who can reach to your computer.Windows updateMicrosoft Windows is the best OS which comes with almost all the tools to protect you and your computer from hacking. To make the most of this, it is important to keep your windows updated. An easy way to do this is by checking for updates at Microsoft Windows Update. You can also set your windows security software to check for updates automatically so you don't miss anything. ...2. What is a Phishing Attack?Identity theft has become the new white collar crime and it has grown tremendously. Criminals that steal identities use them in a number of ways. One of the most common tricks is to use a stolen identity to open a line of credit. The line of credit is then depleted by the thief and the actual person receives the bill. Identities are also stolen for malicious intent, such as stealing a military officer’s email credentials in hopes of carrying out fictitious orders to troops.Phishing is a relatively new term to describe ploys used by criminals trying to steal identities. Phishing scams are on the rise:"During 2004, close to 2 million U. S. citizens had their checking accounts raided by cyber-criminals. With the average reported loss per incident estimated at $1200, total losses were close to $2 billion. The incidence of phishing e-mails―e-mails thatattempt to steal a consumer’s user name and password by imitating e-mail from a legitimate financial institution –has risen 4,000 percent over the past six months."•What is Phishing VideoThe term “phishing” is based on the term “fishing”. With fishing you bait a hook and try to catch fish. If you do not receive a bite, you often change the type of bait until you start catching fish. With phishing, the bait is typically an email that appears legitimate. The email typically asks for a bank customer to validate their information, however, the email redirects the customer to a fictitious bank site made to look like the legitimate bank site (James, 2005). The criminals hope the customer will not notice the redirected bank site is fictitious and that they will validate their account information. There are numerous phishing emails used as bait and criminals hope the more bait they use, the greater chances someone will fall for the scam.The key to preventing identity theft is awareness. Financial institutions typically do not ask for account information validation. Any emails that ask for account validation or social security numbers, should be validated. The link contained within the email can be checked for legitimacy. These links often go to bogus sites that can easily be determined by the website link. For example, if you bank at and you receive an email that has a link and takes you to .customer.cz, this should raise suspicion. Phishing scams not only use email, but the telephone is also used. A typical scam involves a telephone call with someone impersonating your credit card company and asking you to validate your social security number, date of birth, etc. Credit card companies already have this information and do not need you to validate it. A simple line of defense is to ask the caller for the credit card company’s number and call them back。
计算机专业英语大作业Patterns Instruction in Software EngineeringAbstract:The paper deals with a training system with a client-server architecture created for students who are learning to design and implement object-oriented software systems with reusable components, and also targeting those users who wish become accustomed with (or improve their skills related to) software design. The paper briefly presents the design patterns which are to be found in the software library, as well as the manner of applying them. The user of such a system has five types of patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out of which will be able to chose one/more than one, depending on the requirements of the system proposed for design.1.IntroductionMotto: “The software design patterns help you learn more from other people’s successes than from your own failures” [Mark Johnson] .A software system is a dynamic entity that undergoes multiple changes during its life-cycle, under the influence of factors such as: new user requirements, adding new functionalities, environment adjustment, etc. Therefore, apart from fulfilling those functions which it was designed to fulfill, a software application must be easily changeable, with some of its modules eventually re-used. Having this goal, the application must fulfill certain requirements regarding robustness, mobility, flexibility, scalability, etc. The software design principles are regarded as ways of obtaining the right and re-usable design. By applying abstractization and OOP languages polymorphic techniques, the open-shut principle and the substitution principle (Liskov) upon classes of problems, common solutions were reached – solutions which make up the so-called design patterns. The software patterns facilitate re-using design and architecture. If the design and/or architecture of a system were built with design patterns (techniques which have proven efficient), then they will be more accessible and easier to understand by those software developers who build new systems based on old design. The patterns help the software specialist chose that design that makes the system re-usable. In software engineering, “design pattern” (DP) means a solution applicable to a certain type of problems. A design pattern is a description model of how a problem should be solved. A pattern cannot be directly transformed in source code.The purpose of design patterns is to enable a “good” object-oriented design, and more than that –to make it reusable (which is more important than reusing the code, regardless of the fact that reusing the design often implies reusing the code). The quality of software design is proportional to the experience and previous knowledge of the one performing it. An expert applies solutions previously used and proven efficient for similar problems. When the expert finds a solution considered acceptable, he/sheuses it again. Design patterns solve specific design problems, making the OO more flexible, elegant and reusable. DP help beginners with software design, proposing patterns based on previous experience. A user who is familiar with the DP-s can apply them instantly in order to solve specific problems, without having to rediscover them. By using the software design patterns while designing an object-oriented architecture, one is guaranteed to obtain system compliance to software engineering principles, while also preserving the qualities of “good design”: reusable, flexible, robust .2. Design PatternsDepending on the DP purpose, the authors of GoF [4] proposed three main categories of patterns: creational patterns, structural patterns and behavioral patterns. These are the most well-known DP, but not the only ones. Other types of patterns emerged – more or less popular – as well as variations of the GoF patterns.A pattern has four essential components:1. Name: the name of the DP must describe in a few words a design pattern problem, its solutions and the solution’s effects.2. Problem: describes the situations when the pattern is applicable, explaining the problem as well as its context.3. Solution: describes the components of the design, the relationships between them, the responsibilities of each component and the way they interact. The solution does not describe a specific design for a certain situation or a correct implementation, because a pattern has a general character, referring to a plethora of contexts. The DP presents an abstract description of a problem and a general arrangement of the components (classes and objects) that solve the described problem.4. Effects: refer to the results of applying the pattern, which are very important when we evaluate the alternatives and we estimate the costs and benefits of applying the pattern. The effects of a pattern are also to be perceived in the flexibility, extensibility and portability of a system. DP identifies the classes and instances which participate, their role, collaboration and responsibility sharing between them.The design patterns that the user of the proposed system has at hand are: Factory Method and Builder (from the Creational Patterns category), Command, Mediator and Observer, (from the Behavioral Patterns category).3. The Architecture of the SystemThe platform is designed as a distributed application, providing the option of distance learning/tutoring by means of a computer network or the Internet.The application can be classified as having “three - tier" architecture, the Client part being represented by the configuration module and the tutoring material presentation module. The user connects to the system by means of a Login module, monitored by an Administrator agent (CerberusAgent).After authentication the user may have access to a configuring instrument (if the user connected to the system is the tutor) or to the user interface by means of which thelearning material will be presented (if the user is a student). This part of the application will be monitored by an interface agent (InterfaceAgent).The application server contains the agent platform that monitors the student activity, and a web server responsible for delivering the learning material to the user interface (Apache Tomcat).The third level consists of a xml database (Apache Xindice), which stores information about the structure of the course, student models, etc.The MTS training system is designed for students which learn to design and implement object-oriented software systems, with re-usable components, but also for those users who wish to become familiar with (or improve) software design. We present the approach of a multi-agent intelligent platform for tutoring student which provides a Student Model. The “modeling student process” used the overlay architecture (common for many tutoring systems) combined with the Bayesian Theory of Probability . The system’s tasks are distributed among the intelligent agents (software agents), each having clearly specified individual roles as following: administrator (Cerberus Agent); interface (InterfaceAgent); tutor (Tutor Agent); student (Student Agent). Moreover, the system has “three-tier” architecture and was implemented in Java language. We may well imagine software agents attached to every application or tutoring environment, each having an explicit representation of the users’ objectives, of their plans and resources. These agents communicate and negotiate with each other in order to fulfill their individual or group objectives. The multi-agent tutoring system (MTS) was designed and implemented within the Computer Science Department, in which resear ch focused upon “modeling” the student with a view to identifying the most suitable methods and tutoring strategies by taking into account individual knowledge and abilities.The user of this kind of system has all five types of previously described patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out of which will be able to use one or more, depending on the requirements of the system that needs to be designed.Depending on the needs of the user that must fulfill the requirements of the system, one selects from Tutor Agent the design patterns best suited for those functions. The patterns help build the menus of the application and the user interface. Then the database is built, as the user has permanent access to an example of application as similar as possible to the one which needs to be carried out. In order to develop an application, the student must know the Java programming language, must be familiar with MySql data servers and must be able to use the Eclipse platform. The Eclipse platform is an open source framework from IBM which aims to provide a variety of basic services for software developers [6].4. ConclusionsThe system wishes to be a useful working instrument for software application development training, for both students and other types of users. A design pattern together with an example of using that pattern may become a way of working insoftware design. Moreover, in this case applying design patterns –therefore design principles - in carrying out an object-oriented application results into a reusable design and reusable modules / components.Also, the resulting code enjoys more robustness and flexibility, these two characteristics being essential for developing new modules that would add new functionalities and operations to the application; the design/code of the application is open to extension and closed for changes, according to OCP.Another important aspect relates to the maintenance activities which the designed application will undergo along its life-cycle: they will more cost effective, as no change will disseminate through the entire system, the application code being built so that it isolates the volatile classes (according to the principle of reversing dependencies), the dependencies being in t he way”details depend upon abstractization” and not the other way around. The software patterns ensure compliance to design principles, as they contribute to obtaining a steady and efficient system, and they provide design discipline for students. Last but not least, using such a system in software engineering learning makes the process much more attractive and efficient. The design patterns approach in software engineering training fits thepedagogical Schemas Theory (created by Bartlett at the beginning of the 20th century) .A brief representation of the particular knowledge of the training domain can help the trainee to easier absorb the new information, while the organization and structuring of the knowledge as patterns will guide him/her in finding (remembering) the necessary information in a certain context. We believe that within such an approach one can create a training ontology from Software Engineering.软件工程模式教学摘要:本页处理一个C/S架构的训练系统,为学习设计和实施一个面向对象的用可重用组件的软件系统的学生而设计,也将目标瞄准那些用户谁希望成为(或提高他们的相关技能)软件设计习惯。
计算机专业英语作业1 第1-3章作业 一. Vocabulary( 词汇) (一).Translate the following words and expressions into Chinese(写出下列词组的汉语。) 1.central processing unit(CPU) 2.title bar 3.operating system 4.personal computer 5.menu bar 6.desk publishing 7.electronic spreadsheet 8.hard disk 9.database 10.Cursor
(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。) 1.随机存储器 2.只读存储器 3.传输控制协议 4.数字视频光盘 5.通用串行总线 6.计算机辅助设计 7.计算机辅助制造 8.中央处理器
(三).Translate the following Chinese into English.(根据汉语写出相应的英语。) 1.键盘 2.鼠标 3.扫描仪 4.打印机 5.输入 6.输出 7.显示器 8.存储器 9.数据库 10.操作系统 11.应用软件 12.字处理器 13.网络浏览器
二. Tell whether the following statements are true(T) or false(F).(判断正误。) 1.As soon as you turn the computer off, the contents of RAM will disappear. ( ) 2.Windows XP is Microsoft's most advanced desktop operating system. ( ) 3.Software can be divided into two general classes: system software and application software. ( ) 4.Microsoft Word XP is a member of Microsoft office 2000 . ( ) 5.Application software (also called end-user program) is designed to perform a specific function directly for the user. ( ) 6. Without systems software, application software in a computer is useless. ( ) 7. WinZip, WinRAR and Microsoft’s Internet Explorer are all data compression software. ( ) 8. Word doesn’t have the feature to accessing to World Wide Web. ( ) 9. Menu bar displays the names of the application and document. ( ) 10. Windows XP is Microsoft's most advanced desktop operating system. ( ) 三. Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。) (一). 1. central processing unit(CPU a. 操作系统 2. hardware b. 输入.
3. RAM(random access memory) c. 只读存储器
4. ROM(read-only memory) d. 应用软件
5. input e. 中央处理器
6. output f. 系统软件
7. operating system g. 硬件
8. application software h. 随机存储器
9. system software i. 内存
10. memory j. 输出
(二) . 1. binary system an input device 2. printer a compression software 3. Microsoft Word an operating system 4.Winzip a numbering system based on the digits 0 and 1 5. Internet Explorer. a part of Microsoft word interface
6. mouse an electronic spreadsheet 7. Microsoft Excell an output device 8. DOS a word processor 9. .title bar a web browser
四.Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。) 1.
The central processing unit (CPU) is the of the computer systems. Among other things, its configuration whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system , responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, while its and capacity have increased tremendously. Indeed, these changes have microcomputers that are small enough to fit on your desk or your lap.
2.
Word processor, ___________, Database are all application software. Word processor, a special program can enable a computer user to create a _______, store it on a _______, display it on a screen, even print it on a ______. The software such as ____________, WPS, StarOffice are word processors. Spreadsheet is different from a simple table, for whose _________ have predefined relationship to each other, and each of them sits in a ________. Among the spreadsheet applications, lotus 1-2-3 and ________ are the most famous. To access information from a database, the computer user need a ____________.
3.
Microsoft Word printer DBMS(database management system) Spreadsheet disk cell value Microsoft Excel document
Component heart result in speed determine
margin standard toolbar ruler title bar menu bar incorporate…into Microsoft Word XP is the current Window version of Word, and documents created in Word XP can be easily __________________ Excel, Power Point and Access files. In the interface of Word, the _________ displays the name of the current application and name of the current document; the ________lists the names of the menus available; the _____________gives the user quick access to frequently used editing functions; the _______enables the user to change left and right _______.
五. Translation.(翻译。) (一).Translate the following sentences into Chinese.(将下列句子翻译成汉语。) 1.Most microcomputer printers print one character at a time, usually at rates varying from 30 to perhaps 180 characters per seconds.