大工13春《专业英语(计算机英语)》在线测试答案
大工13春《专业英语(计算机英语)》在线测试1试卷总分:100 测试时间:--
一、判断题(共10道试题,共20分。)
1.Most electronic devices today use some form of integrated circuits placed on printed circuit boards.( )
A. 错误
B. 正确
满分:2分
2.The microprocessor led to the invention of personal computers,or microcomputers.( )
A. 错误
B. 正确
满分:2分
3.Mouse belongs to output.( )
A. 错误
B. 正确
满分:2分
4.A location in RAM memory is accessed by its address.( )
A. 错误
B. 正确
满分:2分
5.In 1947 three scientists, John Bardeen, William Shockley, and Walter Brattain working at AT&T's Bell Labs invented the transistor computer.( )
A. 错误
B. 正确
满分:2分
6.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of microprocessor.( )
A. 错误
B. 正确
满分:2分
7.The ENIAC used thousands of vacuum tubes,which took up a lot of space and gave off a great deal of heat just like light bulbs do.( )
A. 错误
B. 正确
满分:2分
8.Modern operating systems usually come with a GUI.( )
A. 错误
B. 正确
满分:2分
9.Accessing data from a floppy disk is called reading data.( )
A. 错误
B. 正确
满分:2分
10.The software and hardware components of a computer rely on each other and support each other.( )
A. 错误
B. 正确
满分:2分
二、单选题(共20道试题,共80分。)
1.( ) can be in the form of programs, commands and user responses.
A. Processor
B. Instructions
C. Mouse
D. Port
满分:4分
2.( ) performs arithmetic, comparison, and logic operations. It is one part of the CPU.
A. RAM
B. ROM
C. CPU
D. ALU
满分:4分
3.A ( )is a communication device that enables computers to communicate via telephone lines or cable.
A. modem
B. hardware
C. software
D. processor
满分:4分
4.( )(Complex Instruction Set Computer) refers to the processor architecture found in most conventional mainframes and personal computers. It supports many complex instructions.
A. CISC
B. RISC
C. RAM
D. ROM
满分:4分
5.( ) have more storage capacity than diskettes and also offer faster access to the data they hold.
A. Hard disks
B. Optical disks
C. Zip disk
D. CD
满分:4分
6.The common input devices are the ( )and the keyboard.
A. printer
B. speaker
C. monitor
D. mouse
满分:4分
7.( ) are output devices that print characters, symbols, and graphics on a physical medium such as paper and a transparency file.
A. Flat panel monitors
B. Printers
C. Keyboards
D. Pointing device
满分:4分
8.Processing is done inside the computer in an area called the ( ).
A. input devices
B. output devices
C. system unit
D. central processing unit
满分:4分
9.The process of translating instructions into commands is called ( ).
A. decoding
B. register
C. digital
D. port
满分:4分
10.( )(Reduced Instruction Set Computer) refers to processors that support fewer instructions than CISC chips. The reduced number of instructions enables them to execute instructions faster.
A. CISC
B. RISC
C. RAM
D. ROM
满分:4分
11.The ( ) is the communications medium for the entire computer system.
A. system board
B. input
C. output
D. bus
满分:4分
12.The first computers used ( ) for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.
A. vacuum tubes
B. transistors
C. integrated circuits
D. microprocessors
满分:4分
13.( ) is the electronic device that interprets and carries out the basic instructions that operate the computer.
A. Processor
B. hardware
C. memory
D. CPU
满分:4分
14.A ( ),also called a silicon chip or semiconductor,is a small piece of silicon that contains thousands of microminiature electronic circuit components, mainly transistors.
A. bus
B. chip
C. port
D. keyboard
满分:4分
15.A( )is a cable which is capable of carrying signals representing data from one place to another.
A. bus
B. byte
C. bit
D. disk
满分:4分
16.The two components of the CPU are connected by a kind of electronic roadway called a(an) ( ).
A. USB
B. bus
C. port
D. keyboard
满分:4分
17.A ( ) port is an interface that connects devices by transferring more than one bit at a time.
A. serial
B. parallel
C. USB
D. none of the above
满分:4分
18.( ) refers to the physical equipment that can perform the basic functions contained within the data processing cycle.
A. Software
B. Hardware
C. Memory
D. Mainframe
满分:4分
19.( ) is one of the components of the CPU, tells the rest of the computer system how to carry out a program's instructions.
A. Control unit
B. ALU
C. RAM
D. ROM
满分:4分
20.( ) is summarized data or manipulated data.
大工13春《专业英语(计算机英语)》在线测试2
试卷总分:100 测试时间:--
一、判断题(共10道试题,共20分。)
1.ERP is Enterprise resource planning software.( )
A. 错误
B. 正确
满分:2分
2.A backup program makes a copy of files you select.( )
A. 错误
B. 正确
满分:2分
3.Object Oriented Programming(OOP) is a programming method that combines data and the instructions for processing that data into a self-sufficient "object" that can be used in other programs.( )
A. 错误
B. 正确
满分:2分
4.We abbreviate Virtual Private Networks to VPN.( )
A. 错误
B. 正确
满分:2分
5.TCP provides reliable, full-duplex connections and reliable service by ensuring that data is resubmitted when transmission results in an error.( )
A. 错误
B. 正确
满分:2分
6.View shortcut menus by right-clicking with the mouse.( )
A. 错误
B. 正确
满分:2分
7.A traditional private WAN can be expensive to build and manage.( )
A. 错误
B. 正确
满分:2分
8.Hardware also called a program, is the series of computer language coded instructions that tells the computer how to perform tasks.( )
A. 错误
B. 正确
满分:2分
9.Linux is an operating system similar to Unix.( )
A. 错误
B. 正确
满分:2分
10.Windows versions before Windows 95 rely on DOS as the operating system.( )
A. 错误
B. 正确
满分:2分
二、单选题(共20道试题,共80分。)
1.In a ( ) network, all microcomputers and other communication devices are connected to a continuous loop.
A. bus
B. star
C. tree
D. ring
满分:4分
2.( ) controls how you enter data or instructions and how information is displayed on the computer screen.
A. User interface
B. Language translators
C. Utilities programs
D. System software
满分:4分
3.( ), fixed-maximum-length block of data for transmission. The packet also contains information about its destination.
A. Protocol
B. Node
C. Packet
D. Network
满分:4分
4.( ), type of LAN that combines star, ring, bus networks, and etc.
A. Bus network
B. Star network
C. Ring network
D. Hybrid network
满分:4分
5.( ), type of local area network(LAN) in which all communications devices are connected in a continuous loop and messages are passed around the ring until they reach the right destination. There is no central server.
A. Bus network
B. Star network
C. Ring network
D. Hybrid network
满分:4分
6.A ( ) is a highly intelligent device that supports connectivity between both like and unlike LANs,and between LANs and WANs or MANs.
A. router
B. repeater
C. switch
D. bridge
满分:4分
7.( ), short for modulator/demodulator, device that converts digital signals into a representation of analog form(modulation) to send over phone lines;a receiving modem then converts the analog signal back to a digital signal(demodulation).
A. Server
B. Network
C. Modem
D. Gateway
满分:4分
8.( ), computer shared by several users in a network.
A. Protocol
B. Server
C. Network
D. Node
满分:4分
9.( ), set of conventions governing the exchange of data between hardware and /or software components in a communications network.
A. Protocol
B. Node
C. Packet
D. Network
满分:4分
10.( ), the protocol for transferring HTML files on the Web.
A. HTML
B. ISP
C. Client
D. Server
满分:4分
11.( ), difference between the lowest and highest frequencies transmitted in a particular channel or system.
A. Amplitude
B. Bandwidth
C. Bridge
D. Network
满分:4分
12.( ), software used in corporate networks (intranets and extranets) to prevent unauthorized people from accessing the network.
A. Firewall
B. Modem
C. Hypertext
D. TCP
满分:4分
13.( ) ,also known as service programs, perform specific tasks related to managing computer resources.
A. Utilities programs
B. System software
C. Operating system
D. none of the above
满分:4分
14.( ) is an acronym for local area network.It is a group of computers and other devices dispersed over a relatively limited area and connected by a communications link.
A. LAN
B. WAN
C. MAN
D. None of the above
满分:4分
15.( ) is a device that functions as both a router and a bridge.
A. Repeater
B. Switch
C. Gateway
D. Brouter
满分:4分
16.( ), type of network in which all communications devices are connected to a common channel, with no central server.
A. Bus network
B. Star network
C. Ring network
D. none of the above
满分:4分
17.( ), interface that enables dissimilar networks to communicate with one another.
A. Gateway
B. Bridge
C. Bandwidth
D. none of the above
满分:4分
18.A ( ) channel allows simultaneous message exchange in both directions.It really consists of two simplex channels, a forward channel and a reverse channel,linking the same points.
A. half-duplex
B. full-duplex
C. simplex
D. none of the above
满分:4分
19.In a ( ) network, all microcomputers and other communications devices are connected to a central hub, such as a file server or host computer, usually via (UTP).
A. bus
B. star
C. tree
D. ring
满分:4分
20.( ) is a subclass of software. It consists of a collection of programs that control the operations of a computer and its devices. It servers as the interface between the user and the computer hardware.
大工13春《专业英语(计算机英语)》在线测试3
试卷总分:100 测试时间:--
一、判断题(共10道试题,共20分。)
1.FTP is the messages, usually text, send from one person to another via the Internet.( )
A. 错误
B. 正确
满分:2分
2.A file is a collection of relation fields.( )
A. 错误
B. 正确
满分:2分
3.The Internet is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.( )
A. 错误
B. 正确
满分:2分
4.www.asp.com is an E-mail address.( )
A. 错误
B. 正确
满分:2分
5.The standard protocol used for sending Internet e-mail is called SMTP. It works in conjunction with POP servers.( )
A. 错误
B. 正确
满分:2分
6.Microsoft Access is a database management system from Microsoft, packaged with Microsoft Office.( )
A. 错误
B. 正确
满分:2分
7.To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.( )
A. 错误
B. 正确
满分:2分
8.Program flowchart is an outline of the logic of the program you will write.( )
A. 错误
B. 正确
满分:2分
9.Java is a compiled object-oriented programming language used to write applets.( )
A. 错误
B. 正确
满分:2分
10.To protect data, you need to implement a data backup and recovery plan.( )
A. 错误
B. 正确
满分:2分
二、单选题(共20道试题,共80分。)
1.( ) shorts for Audio-Video Interleaved. It is a video file format supported by Windows and some other software. It can handle the synchronous problem between audio and video information by using the video lossy compressing technology.
A. AVI
B. DAT
C. BMP
D. GIF
满分:4分
2.( ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4分
3.( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:4分
4.( ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4分
5.( ) is a person who is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed.
A. Database Management Administrator
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:4分
6.( )(MIS) are designed to take the relatively raw data available through a TPS and convert them into a summarized and aggregated form for managers, usually in a report format.
A. Decision Support Systems
B. Expert Systems
C. Management Information Systems
D. Data Mining
满分:4分
7.( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:4分
8.( ) is a computer technology that creates three dimensional real illusion in an artificial world.
A. Vector image
B. Bitmap
C. JPEG
D. Virtual Reality
满分:4分
9.( ), the process of compressing a file such that some data is lost after the file is compressed and decompressed.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4分
10.A ( ) is a line rented from a telephone company for the exclusive use of a customer to access Internet.
A. leased line
B. online payment
C. credit card
D. ISP
满分:4分
11.( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.
A. MIDI
B. WAV
C. RA
D. Audio
满分:4分
12.( ), executable code that, when run by someone, infects other executable code in a computer.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4分
13.Which one is a word processing and text editing tool( )
A. Photoshop
B. Word
C. Extreme 3D
D. Premiere
满分:4分
14.( ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4分
15.An ( ) is a company that provides access to the Internet.
A. TCP/IP
B. APRANET
C. FTP
D. ISP
满分:4分
16.( ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.
A. MP3
B. MP4
C. JPEG
D. AVI
满分:4分
17.( ), in networking, to establish the validity of a user or an object.
A. Authenticate
B. Decrypt
C. Encryption
D. Firewall
满分:4分
18.( ) will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.
A. Animation
B. WAV
C. Multimedia
D. none of the above
满分:4分
19.( ) stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
A. Relational Database
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:4分
20.( ), technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4分
页:
[1]