大工14春《专业英语(计算机英语)》在线测试答案
大工14春《专业英语(计算机英语)》在线测试1试卷总分:100 测试时间:--
一、判断题(共10道试题,共20分。)
1.ROM stands for Random Access Memory.It is the main location for holding programs and data that the CPU is presently processing.
A. 错误B. 正确
满分:2分
2.The software and hardware components of a computer rely on each other and support each other.( )
A. 错误
B. 正确
满分:2分
3.The first generation computers were huge,slow,expensive,and often undependable.
A. 错误
B. 正确
满分:2分
4.Transistors were a tremendous breakthrough in advancing the computer.
A. 错误
B. 正确
满分:2分
5.USB port is a new industry wide standard that will eventually eliminate the need to install adapter cards.( )
A. 错误
B. 正确
满分:2分
6.CPU is the soul of a computer.
A. 错误
B. 正确
满分:2分
7.Windows versions before Windows 95 rely on DOS as the operating system.( )
A. 错误
B. 正确
满分:2分
8. Input devices are hardware components that can convey information to a user in a form that they can use.( )
A. 错误
B. 正确
满分:2分
9.Data structures organize data in ways that make algorithms more efficient.
A. 错误
B. 正确
满分:2分
10.A backup program makes a copy of files you select.( )
A. 错误
B. 正确
满分:2分
二、单选题(共20道试题,共80分。)
1.( ) is the electronic device that interprets and carries out the basic instructions that operate the computer.
A. Processor
B. hardware
C. memory
D. CPU
满分:4分
2.The two components of the CPU are connected by a kind of electronic roadway called a(an) ( ).
A. USB
B. bus
C. port
D. keyboard
满分:4分
3.A( )is a cable which is capable of carrying signals representing data from one place to another.
A. bus
B. byte
C. bit
D. disk
满分:4分
4.Data structures are () because they tend to be modular and context-free.
A. efficient
B. abstract
C. reusable
D. consistant
满分:4分
5.One of the properties ofa list that makes a () structure more inviting than a contiguous one is the need to insert and delete entries inside the list.
A. adjacent
B. linked
C. contiguous
D. serial
满分:4分
6.Data structures provide a more understandable way to look at data; thus, they offer a level of () in solving problems.
A.
efficiency
B. abstraction
C. reusability
D. consistancy
满分:4分
7.( ) can be in the form of programs, commands and user responses.
A. Processor
B. Instructions
C. Mouse
D. Port
满分:4分
8. A ( ) port is an interface that connects devices by transferring more than one bit at a time.
A. serial
B. parallel
C. USB
D. none of the above
满分:4分
9.In a ( ) network, all microcomputers and other communication devices are connected to a continuous loop.
A. bus
B. star
C. tree
D. ring
满分:4分
10. In 1947 three scientists, John Bardeen, William Shockley, and Walter Brattain working at( )invented the transistor computer.
A. Baidu
B. Microsoft
C. AT&T's Bell Labs
D. Yahoo
满分:4分
11.The first generation of computer is ( ).
A. vacuum tubes
B. transistors
C. integrated circuits
D. microprocessors
满分:4分
12.() is the a kind of OS functions that implements resource sharing by the users of a computer system.
A. user interface function
B. resource allocation function
C. allocation from a pool
D. partitioning of resources
满分:4分
13.The technical development that marks the third generation of computers is the use of () in computers.
A.
vacuum tubes
B. integrated circuits
C. transistors
D. virtual memory
满分:4分
14.A ( ) can be written to once. After that they can be read many times without deterioration but cannot be written on or erased.
A. CD-R
B. CD-ROM
C. CD-RW
D. DVD
满分:4分
15.A location in RAM memory is accessed by its( )
A. contents
B. address
C. storage unit
D. storage capacity
满分:4分
16.A ( ) is an electronic device that operates under the control of instructions stored in its own memory, which can according to specified rules, produce results,and store the results for future use.
A. computer
B. CPU
C. input device
D. output device
满分:4分
17.( ) have more storage capacity than diskettes and also offer faster access to the data they hold.
A. Hard disks
B. Optical disks
C. Zip disk
D. CD
满分:4分
18.( ) is an acronym for local area network.It is a group of computers and other devices dispersed over a relatively limited area and connected by a communications link.
A. LAN
B. MAN
C. WAN
D. None of the obove
满分:4分
19.A () is list in which all insertions are performed at one end while all deletions are made at the other.
A. queue
B. stack
C. linked list
D. set
满分:4分
20.The () generation computers are characterized by LSI and VLSI.
A. first
B. second
C. third
D. fourth
大工14春《专业英语(计算机英语)》在线测试2
试卷总分:100 测试时间:--
一、判断题(共10道试题,共20分。)
1.The internet is an interconnected network of thousands of networks and millions of computers.
A. 错误
B. 正确
满分:2分
2.Application software consists of programs that perform specific tasks for users.
A. 错误
B. 正确
满分:2分
3. Language translators convert the programming instructions into a language that computers understand and process.( )
A. 错误
B. 正确
满分:2分
4.A traditional private WAN can be expensive to build and manage.( )
A. 错误
B. 正确
满分:2分
5.Bridge, interface that enables WANs to communicate.
A. 错误
B. 正确
满分:2分
6.Windows versions before Windows 95 rely on DOS as the operating system.( )
A. 错误
B. 正确
满分:2分
7. Telnet enables users to execute terminal sessions with local hosts.
A. 错误
B. 正确
满分:2分
8.A backup program makes a copy of files you select.
A. 错误
B. 正确
满分:2分
9. C++ is an object-oriented programming language.( )
A. 错误
B. 正确
满分:2分
10.Gateway, interface that enables dissimilar networks to communicate with one another.( )
A. 错误
B. 正确
满分:2分
二、单选题(共20道试题,共80分。)
1. ( ), underlined words or highlighted items in a Web site's page that indicate links to other sites(Via hypertext).
A. Hyperlinks
B. Upload
C. Online service
D. none of the above
满分:4分
2.( ), also called communications network; a system of interconnected computers, telephones, or other communications devices.
A. Protocol
B. Node
C. Packet
D. Network
满分:4分
3.Two types of software are ( ) and application software.
A. system software
B. system call
C. system crash
D. system hardware
满分:4分
4.( ) controls how you enter data or instructions and how information is displayed on the computer screen.
A. User interface
B. Language translators
C. Utilities programs
D. System software
满分:4分
5.( ), the protocol for transferring HTML files on the Web.
A. HTML
B. ISP
C. Client
D. Server
满分:4分
6.( ) also called a program, is the series of computer language coded instructions that tells the computer how to perform tasks.
A. Software
B. Hardware
C. Compiler
D. Interpreter
满分:4分
7.( ), software used in corporate networks (intranets and extranets) to prevent unauthorized people from accessing the network.
A. Firewall
B. Modem
C. Hypertext
D. TCP
满分:4分
8.( ), short for modulator/demodulator, device that converts digital signals into a representation of analog form(modulation) to send over phone lines;a receiving modem then converts the analog signal back to a digital signal(demodulation).
A. Server
B. Network
C. Modem
D. Gateway
满分:4分
9.( ) is a subclass of software. It consists of a collection of programs that control the operations of a computer and its devices. It servers as the interface between the user and the computer hardware.
A. System software
B. Application software
C. Operating system
D. none of the above
满分:4分
10.( ), fixed-maximum-length block of data for transmission. The packet also contains information about its destination.
A. Protocol
B. Node
C. Packet
D. Network
满分:4分
11.The most widely used personal computer software is ( ) software.
A. Communications
B. Word Processing
C. Database Management
D. Electronic Spreadsheets
满分:4分
12.( ) provides reliable, full-duplex connections and reliable service by ensuring that data is resubmitted when transmission results in an error.
A. TCP
B. ARP
C. UDP
D. IP
满分:4分
13.The ( ) is automatically loaded into RAM soon after you turn on, or "boot" the computer.
A. application software
B. operating software
C. shell
D. compiler
满分:4分
14.The CPU executes programs coded in a lower level language called the ( ).
A. utility program
B.language translator
C. machine language
D. backup
满分:4分
15.( ), difference between the lowest and highest frequencies transmitted in a particular channel or system.
A. Amplitude
B. Bandwidth
C. Bridge
D. Network
满分:4分
16.ERP is ( ).
A. Enterprise resource planning software
B. Enterprise Application Integration
C. Electronic Application Integration
D. None of the above.
满分:4分
17.( ) is an operating system similar to Unix.
A. Windows NT
B. MS-DOS
C. OS/2
D. Linux
满分:4分
18.In ( ) mode, the communication is unidirectional, like a one-way street. Only one of the two stations on a link can transmit;the other can only receive.
A. half-duplex
B. full-duplex
C. simplex
D. none of the above
满分:4分
19.We abbreviate Virtual Private Networks to ( ).
A. NIC
B. VPN
C. HUB
D. MODEM
满分:4分
20.( ) programs are used to recover deleted or damaged(corrupted) files.
A. Data recovery
B. System call
C. System crash
D. System software
大工14春《专业英语(计算机英语)》在线测试3
试卷总分:100 测试时间:--
一、判断题(共10道试题,共20分。)
1.An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.( )
A. 错误
B. 正确
满分:2分
2.A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )
A. 错误
B. 正确
满分:2分
3.To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.( )
A. 错误
B. 正确
满分:2分
4.A Domain Name System is an Internet service that translates domain names to or from IP addresses.( )
A. 错误
B. 正确
满分:2分
5.Electronic Commerce means buying and selling products and services online via the Internet.( )
A. 错误
B. 正确
满分:2分
6.EDI is a set of computer interchange standards for business documents such as invoices, bills, and purchase orders.( )
A. 错误
B. 正确
满分:2分
7.FTP is the messages, usually text, send from one person to another via the Internet.( )
A. 错误
B. 正确
满分:2分
8.To protect data, you need to implement a data backup and recovery plan.( )
A. 错误
B. 正确
满分:2分
9.Program flowchart is an outline of the logic of the program you will write.( )
A. 错误
B. 正确
满分:2分
10.A file is a collection of relation fields.( )
A. 错误
B. 正确
满分:2分
二、单选题(共20道试题,共80分。)
1.( ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4分
2.( ) is a way of transferring files over the Internet from one computer to another.
A. Internet
B. FTP
C. E-mail
D. ISP
满分:4分
3.( ) stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
A. Relational Database
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:4分
4.( ) is a protocol that lets a user log in to a remote computer and use programs and data that the remote owner has made available, just as if it were their own computer.
A. FTP
B. WWW
C. Telnet
D. NSFNET
满分:4分
5.( ), the process of changing plaintext data into enciphered text through an algorithm.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
满分:4分
6.A ( ) is a line rented from a telephone company for the exclusive use of a customer to access Internet.
A. leased line
B. online payment
C. credit card
D. ISP
满分:4分
7.( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.
A. MIDI
B. WAV
C. RA
D. Audio
满分:4分
8.( ), executable code that, when run by someone, infects other executable code in a computer.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4分
9.( ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.
A. MP3
B. MP4
C. JPEG
D. AVI
满分:4分
10.( ), referring to a person who breaks into computer systems for the challenge or steal computer resources or corrupt a computer's data.
A. Hacker
B. Password
C. DES
D. Authenticate
满分:4分
11.( ) is a person who is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed.
A. Database Management Administrator
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:4分
12.( ) ,conversion of either encoded or enciphered text into plaintext.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
满分:4分
13.( ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4分
14.( ) is a computer technology that creates three dimensional real illusion in an artificial world.
A. Vector image
B. Bitmap
C. JPEG
D. Virtual Reality
满分:4分
15.( ), a secret code assigned to a user which is known by the computer system. Knowledge of the password associated with the user ID is considered proof of authorization.
A. Hacker
B. Password
C. DES
D. Authenticate
满分:4分
16.( ) is the messages, usually text, send from one person to another via the Internet.
A. TCP/IP
B. Telnet
C. FTP
D. E-mail
满分:4分
17.( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:4分
18.( ), in networking, to establish the validity of a user or an object.
A. Authenticate
B. Decrypt
C. Encryption
D. Firewall
满分:4分
19.( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:4分
20.( ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4分
页:
[1]