大工网院16秋《专业英语(计算机英语)》在线测试答案下载

[复制链接]
发表于 2017-2-15 09:05:29 | 显示全部楼层 |阅读模式
大工16秋《专业英语(计算机英语)》在线测试1

一、单选题:(共20题,每题4分)
1.(  ) is one of the components of the CPU, tells the rest of the computer system how to carry out a program's instructions.

  A. Control unit
  B. ALU
  C. RAM
  D. ROM
2.The two components of the CPU are connected by a kind of electronic roadway called a(an) (  ).

  A. USB
  B. bus
  C. port
  D. keyboard
3.The common input devices are the (  )and the keyboard.

  A. printer
  B. speaker
  C. monitor
  D. mouse
4.The (  ) is the communications medium for the entire computer system.

  A. system board
  B. input
  C. output
  D. bus
5.A (  ),also called a silicon chip or semiconductor,is a small piece of silicon that contains thousands of microminiature electronic circuit components, mainly transistors.

  A. bus
  B. chip
  C. port
  D. keyboard
6.A (  ) port is an interface that connects devices by transferring more than one bit at a time.

  A. serial
  B. parallel
  C. USB
  D. none of the above
7.The first computers used (  ) for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.

  A. vacuum tubes
  B. transistors
  C. integrated circuits
  D. microprocessors
8.A (  )is a communication device that enables computers to communicate via telephone lines or cable.

  A. modem
  B. hardware
  C. software
  D. processor
9.(  ) refers to the physical equipment that can perform the basic functions contained within the data processing cycle.

  A. Software
  B. Hardware
  C. Memory
  D. Mainframe
10.(  )(Reduced Instruction Set Computer) refers to processors that support fewer instructions than CISC chips. The reduced number of instructions enables them to execute instructions faster.

  A. CISC
  B. RISC
  C. RAM
  D. ROM
11.(  ) have more storage capacity than diskettes and also offer faster access to the data they hold.

  A. Hard disks
  B. Optical disks
  C. Zip disk
  D. CD
12.(  )(Complex Instruction Set Computer) refers to the processor architecture found in most conventional mainframes and personal computers. It supports many complex instructions.

  A. CISC
  B. RISC
  C. RAM
  D. ROM
13.(  ) can be in the form of programs, commands and user responses.

  A. Processor
  B. Instructions
  C. Mouse
  D. Port
14.(  ) are output devices that print characters, symbols, and graphics on a physical medium such as paper and a transparency file.

  A. Flat panel monitors
  B. Printers
  C. Keyboards
  D. Pointing device
15.A(  )is a cable which is capable of carrying signals representing data from one place to another.

  A. bus
  B. byte
  C. bit
  D. disk
16.(  ) performs arithmetic, comparison, and logic operations. It is one part of the CPU.

  A. RAM
  B. ROM
  C. CPU
  D. ALU
17.(  ) is summarized data or manipulated data.

  A. Information
  B. Hardware
  C. Software
  D. Procedure
18.Processing is done inside the computer in an area called the (  ).

  A. input devices
  B. output devices
  C. system unit
  D. central processing unit
19.The process of translating instructions into commands is called (  ).

  A. decoding
  B. register
  C. digital
  D. port
20.(  ) is the electronic device that interprets and carries out the basic instructions that operate the computer.

  A. Processor
  B. hardware
  C. memory
  D. CPU
三、判断题:(共10题,每题2分)
1.The ENIAC used thousands of vacuum tubes,which took up a lot of space and gave off a great deal of heat just like light bulbs do.(  )

  A. 对
  B. 错
2.Mouse belongs to output.(  )

  A. 对
  B. 错
3.The microprocessor led to the invention of personal computers,or microcomputers.(  )

  A. 对
  B. 错
4.Most electronic devices today use some form of integrated circuits placed on printed circuit boards.(  )

  A. 对
  B. 错
5.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of microprocessor.(  )

  A. 对
  B. 错
6.Accessing data from a floppy disk is called reading data.(  )

  A. 对
  B. 错
7.Modern operating systems usually come with a GUI.(  )

  A. 对
  B. 错
8.In 1947 three scientists, John Bardeen, William Shockley, and Walter Brattain working at AT&T's Bell Labs invented the transistor computer.(  )

  A. 对
  B. 错
9.The software and hardware components of a computer rely on each other and support each other.(  )

  A. 对
  B. 错
10.A location in RAM memory is accessed by its address.(  )

  A. 对
  B. 错
大工16秋《专业英语(计算机英语)》在线测试2

一、单选题:(共20题,每题4分)
1.A (  ) is a highly intelligent device that supports connectivity between both like and unlike LANs,and between LANs and WANs or MANs.

  A. router
  B. repeater
  C. switch
  D. bridge
2.(  ) is a device that functions as both a router and a bridge.

  A. Repeater
  B. Switch
  C. Gateway
  D. Brouter
3.A (  ) channel allows simultaneous message exchange in both directions.It really consists of two simplex channels, a forward channel and a reverse channel,linking the same points.

  A. half-duplex
  B. full-duplex
  C. simplex
  D. none of the above
4.(  ), difference between the lowest and highest frequencies transmitted in a particular channel or system.

  A. Amplitude
  B. Bandwidth
  C. Bridge
  D. Network
5.(  ) ,also known as service programs, perform specific tasks related to managing computer resources.

  A. Utilities programs
  B. System software
  C. Operating system
  D. none of the above
6.In a (  ) network, all microcomputers and other communication devices are connected to a continuous loop.

  A. bus
  B. star
  C. tree
  D. ring
7.(  ), set of conventions governing the exchange of data between hardware and /or software components in a communications network.

  A. Protocol
  B. Node
  C. Packet
  D. Network
8.(  ), computer shared by several users in a network.

  A. Protocol
  B. Server
  C. Network
  D. Node
9.(  ), the protocol for transferring HTML files on the Web.

  A. HTML
  B. ISP
  C. Client
  D. Server
10.(  ), type of local area network(LAN) in which all communications devices are connected in a continuous loop and messages are passed around the ring until they reach the right destination. There is no central server.

  A. Bus network
  B. Star network
  C. Ring network
  D. Hybrid network
11.(  ), interface that enables dissimilar networks to communicate with one another.

  A. Gateway
  B. Bridge
  C. Bandwidth
  D. none of the above
12.(  ), type of LAN that combines star, ring, bus networks, and etc.

  A. Bus network
  B. Star network
  C. Ring network
  D. Hybrid network
13.(  ), fixed-maximum-length block of data for transmission. The packet also contains information about its destination.

  A. Protocol
  B. Node
  C. Packet
  D. Network
14.In a (  ) network, all microcomputers and other communications devices are connected to a central hub, such as a file server or host computer, usually via (UTP).

  A. bus
  B. star
  C. tree
  D. ring
15.(  ), short for modulator/demodulator, device that converts digital signals into a representation of analog form(modulation) to send over phone lines;a receiving modem then converts the analog signal back to a digital signal(demodulation).

  A. Server
  B. Network
  C. Modem
  D. Gateway
16.(  ) is an acronym for local area network.It is a group of computers and other devices dispersed over a relatively limited area and connected by a communications link.

  A. LAN
  B. WAN
  C. MAN
  D. None of the above
17.(  ) is a subclass of software. It consists of a collection of programs that control the operations of a computer and its devices. It servers as the interface between the user and the computer hardware.

  A. System software
  B. Application software
  C. Operating system
  D. none of the above
18.(  ) controls how you enter data or instructions and how information is displayed on the computer screen.

  A. User interface
  B. Language translators
  C. Utilities programs
  D. System software
19.(  ), software used in corporate networks (intranets and extranets) to prevent unauthorized people from accessing the network.

  A. Firewall
  B. Modem
  C. Hypertext
  D. TCP
20.(  ), type of network in which all communications devices are connected to a common channel, with no central server.

  A. Bus network
  B. Star network
  C. Ring network
  D. none of the above
三、判断题:(共10题,每题2分)
1.A traditional private WAN can be expensive to build and manage.(  )

  A. 对
  B. 错
2.A backup program makes a copy of files you select.(  )

  A. 对
  B. 错
3.Windows versions before Windows 95 rely on DOS as the operating system.(  )

  A. 对
  B. 错
4.Object Oriented Programming(OOP) is a programming method that combines data and the instructions for processing that data into a self-sufficient "object" that can be used in other programs.(  )

  A. 对
  B. 错
5.Hardware also called a program, is the series of computer language coded instructions that tells the computer how to perform tasks.(  )

  A. 对
  B. 错
6.ERP is Enterprise resource planning software.(  )

  A. 对
  B. 错
7.View shortcut menus by right-clicking with the mouse.(  )

  A. 对
  B. 错
8.TCP provides reliable, full-duplex connections and reliable service by ensuring that data is resubmitted when transmission results in an error.(  )

  A. 对
  B. 错
9.Linux is an operating system similar to Unix.(  )

  A. 对
  B. 错
10.We abbreviate Virtual Private Networks to VPN.(  )

  A. 对
  B. 错
大工16秋《专业英语(计算机英语)》在线测试3

一、单选题:(共20题,每题4分)
1.(  ) stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.

  A. Relational Database
  B. Data Integrity
  C. Data Dictionary
  D. Data Warehouse
2.(  ) will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.

  A. Animation
  B. WAV
  C. Multimedia
  D. none of the above
3.(  ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.

  A. Asymmetric key
  B. Symmetric key
  C. Coputer virus
  D. Digital signatures
4.(  ) is a person who is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed.

  A. Database Management Administrator
  B. Data Integrity
  C. Data Dictionary
  D. Data Warehouse
5.(  )(MIS) are designed to take the relatively raw data available through a TPS and convert them into a summarized and aggregated form for managers, usually in a report format.

  A. Decision Support Systems
  B. Expert Systems
  C. Management Information Systems
  D. Data Mining
6.(  ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.

  A. JPEG
  B. MPEG
  C. MIDI
  D. none of the above
7.(  ), executable code that, when run by someone, infects other executable code in a computer.

  A. Computer Security
  B. Digital signatures
  C. Computer virus
  D. none of the above
8.(  ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.

  A. MIDI
  B. WAV
  C. RA
  D. Audio
9.(  ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.

  A. MP3
  B. MP4
  C. JPEG
  D. AVI
10.(  ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.

  A. Lossy compression
  B. Lossless compression
  C. Bitmap
  D. Vector image
11.(  ) is a computer technology that creates three dimensional real illusion in an artificial world.

  A. Vector image
  B. Bitmap
  C. JPEG
  D. Virtual Reality
12.(  )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.

  A. Asymmetric key
  B. Symmetric key
  C. Coputer virus
  D. Digital signatures
13.A (  ) is a line rented from a telephone company for the exclusive use of a customer to access Internet.

  A. leased line
  B. online payment
  C. credit card
  D. ISP
14.(  ), in networking, to establish the validity of a user or an object.

  A. Authenticate
  B. Decrypt
  C. Encryption
  D. Firewall
15.(  ), the process of compressing a file such that some data is lost after the file is compressed and decompressed.

  A. Lossy compression
  B. Lossless compression
  C. Bitmap
  D. Vector image
16.(  ) shorts for Audio-Video Interleaved. It is a video file format supported by Windows and some other software. It can handle the synchronous problem between audio and video information by using the video lossy compressing technology.

  A. AVI
  B. DAT
  C. BMP
  D. GIF
17.An (  ) is a company that provides access to the Internet.

  A. TCP/IP
  B. APRANET
  C. FTP
  D. ISP
18.(  ), technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.

  A. Computer Security
  B. Digital signatures
  C. Computer virus
  D. none of the above
19.Which one is a word processing and text editing tool?(  )

  A. Photoshop
  B. Word
  C. Extreme 3D
  D. Premiere
20.(  ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.

  A. JPEG
  B. MPEG
  C. MIDI
  D. none of the above
三、判断题:(共10题,每题2分)
1.To protect data, you need to implement a data backup and recovery plan.(  )

  A. 对
  B. 错
2.FTP is the messages, usually text, send from one person to another via the Internet.(  )

  A. 对
  B. 错
3.The standard protocol used for sending Internet e-mail is called SMTP. It works in conjunction with POP servers.(  )

  A. 对
  B. 错
4.A file is a collection of relation fields.(  )

  A. 对
  B. 错
5.Microsoft Access is a database management system from Microsoft, packaged with Microsoft Office.(  )

  A. 对
  B. 错
6.Java is a compiled object-oriented programming language used to write applets.(  )

  A. 对
  B. 错
7.Program flowchart is an outline of the logic of the program you will write.(  )

  A. 对
  B. 错
8.The Internet is  a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.(  )

  A. 对
  B. 错
9.To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.(  )

  A. 对
  B. 错
10.www.ap5u.com is an E-mail address.(  )

  A. 对
  B. 错
附件就是答案,需要的可以自己下载


大工16秋《专业英语(计算机英语)》在线测试1.rar

2.17 KB, 下载次数: 2, 下载积分: 贡献 1

售价: 3 金币  [记录]  [购买]

答案

大工16秋《专业英语(计算机英语)》在线测试2.rar

2.29 KB, 下载次数: 2, 下载积分: 贡献 1

售价: 3 金币  [记录]  [购买]

答案

大工16秋《专业英语(计算机英语)》在线测试3.rar

2.58 KB, 下载次数: 2, 下载积分: 贡献 1

售价: 3 金币  [记录]  [购买]

答案

快速回复 返回顶部 返回列表