
《试题答案+计算机专业英语1》由会员分享,可在线阅读,更多相关《试题答案+计算机专业英语1(15页珍藏版)》请在文档大全上搜索。
1、what does " neural network " mean?A、社会网络B、神经网络C、精神网D、自然网络Just a minute, Im waiting for the computer to up. It wont take long to start it.A、logB、scrollC、activateD、bootAfter I finished the last paragraph, I moved the back to the third paragraph and deletedA、iconB、cursorC、mouseD、joystickThese
2、 days it is not uncommon for one to see people using everywhere-even on airplanes.A、laptopsB、microcomputersC、minicomputersD、desktopshow to translate the word "中央处理器"A、central processing unitB、central process unitC、central progress unitA digital computer is generally made up of five dstinct
3、 elements: a central processing unit,().A、output devicesB、memeory storage devicesC、crt screenD、input devicesE、a busWe can define a computer as a device that A、accepts inputB、stores dataC、processes dataD、deal everythingE、produces outputA program is a sequence of that can be eecuted by a computer.It c
4、an either be built into the hardware or exist independently in the form of .A、hardwareB、softwareC、instructionsD、dataOne of trends in computer development is ,the effort to compress more circuit elements into smaller and smaller spaceA、chatB、microminiaturizationC、chipD、micromoduleThere are no differe
5、nces between the information processor and human (人类的) nervous system.错Computers cannot work without the instructions sets.错In the future, computers are capable of original thoughts.错Information can be input only by people.错Computer is able to do different kinds of tasks.对A is used to communicate wi
6、th another computer over telephone lines.A、keyboardB、mouseC、modemD、printerThe larger the system of the computer, the greater its ( ).A、neither A nor BB、processing speedC、both A and BD、storage capacityA is a device that enables the computer to handle sounds.A、networkB、video cardC、monitorD、sound cardT
7、he software that controls the interaction between the input and output hardware is called BIOS,which stands of A、Advanced Input Output SystemB、Classic Input Output SystemC、Basic Input Output SystemD、Junior Input Output System refers to the parts of the computer that you can see and touch.A、Instructi
8、onB、HardshipC、SoftwareD、HardwareA hardware or software malfunction can cause a system to .A、crushB、crashC、collideD、crackChemical energy, ( ) from fuel or other matters, can be transformed into heat energy.A、no matter howB、if or notC、whetherD、not considered thatHe insisted on leaving early ( ) I told
9、 him not to.A、althoughB、whileC、butD、whenA general purpose computer has four main sections: A、the arithmetic and logic unit (ALU),B、the memoryC、the control unitD、the cpuE、the input and output devicesThe two most common types of scanners are and A、handler scannersB、flatbed scannersC、auto scannersD、han
10、d-held scannersAccording to the text,the author mentions three of the most commonly used types of printer.They are .A、dot-matrix printers;B、laser printerC、inkjet printersD、array printerE、belt printerThe function of computer hardware is typically divided into three main categories.They are.A、storageB
11、、motherboardC、cpuD、inputE、outputSecondary memory holds all of the essential memory that tells your computer how to be a computer.错Computers can be classified into microcomputer, mainframe and supercomputer by its program.错In its more general usage, a personal computer is a computer designed for usin
12、g by one person at a time.错A processor can do everything without a program to provide control.错A microcomputer, also called personal computer, is a computer designed for an individual.对Workstation is a multi-user computer capable of supporting many hundreds or thousands of users simultaneously.对For
13、some time, weve been experiencing some in this particular program. It cannot run in a normal way.A、bugsB、loopsC、defaultsD、routinesHigh-level languages must first be translated into a(n) language before they can be understood and processed by a computerA、AdvancedB、MachineC、UsualD、commonVisual Basic h
14、as versions.A、twoB、oneC、threeD、fourA stack protocol can be used for ( ).A、subroutine callsB、operation of arithmetic expressionsC、removing the earliest element insertedD、removing the latest element insertedQueues that occur everyday life can be seen ( ).A、in certain societies lacking equalityB、as peo
15、ple waiting for service at a bankC、in an emergency room of a hospitalD、as automobiles waiting for a traffic lightUsing debugger you can see each instruction as it eecutes.对With high-powered debuggers you should put your source code into the debugger.对Programs were thought of as a series of procedure
16、s.对All of us expect the programs robust, bug-free.对A powerful debugger can find nearly all of bugs.对A(n) translates all the source code of a program written in a high-level language into object code prior to the eecution of th program.A、compilerB、assemblersC、interpreterOne of the differences between
17、 C# and Java is that Java runs on any platform with a Java Virtual while C# only runs in Windows for the foreseeable future.A、MachineB、ProgramC、HardwareD、SoftwareJ2EE is a single-language platform; calls from/to objects in other languages are possible through , but this kind of support is not a ubiq
18、uitous part of the platform.A、CLRB、IISC、OMGD、CORBAIn the case of a(n) , a program is translated into eecutable form and eecuted one statment at a time rather than being translated completely before eecution.A、compilerB、assemblersC、interpreterD、DebuggerA(n) is a sequence of code in a program eecuted
19、repeatedly,either fro a fixed number of times or until a certain condition is met.A、LoopB、selectedNewer ideas in computing such as have radically altered the traditional concepts that once determined program form and functionA、software engineeringB、data miningC、distributed computingD、parallel comput
20、ingE、artificial intelligenceThe tools which Programming software usually provides include:A、linkersB、text editorsC、debuggersD、interpretersE、compilersSoftware includes etcA、websitesB、video gamesC、mobile applicationD、programsE、all kinds of filesComputer software, or just software is a general term use
21、d to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes:A、Middleware which controls and co-ordinates distributed systems.B、Application software such as word processors which perform productive tasks for users.C、Firm
22、ware which is software programmed resident to electrically programmable memory devices on board mainboards or other types of integrated hardware carriers.There are three types of application programs to translate source code into object code.They are A、assemblersB、interpretersC、compilersD、applicatio
23、n suiteThere are a number of processes, activities and practices that are unique to maintainers, for example:A、Modification Request and Problem Report Help Desk: a problem-handling process used by maintainers to prioritize, documents and route the requests they receiveB、Service Level Agreements (SLA
24、s) and specialized (domain-specific) maintenance contracts negotiated by maintainersC、Transition: a controlled and coordinated sequence of activities during which a system is transferred progressively from the developer to the maintainerD、Modification Request acceptance/rejection: modification reque
25、st work over a certain size/effort/complexity may be rejected by maintainers and rerouted to a developerThe most commonly used tool in the design phase is the .A、object-relationship chartB、structure chartC、flowchartsD、topology chartIn the system development process, the system analyst defines the us
26、er, needs, requirements and methods in the phase.A、designB、testingC、implementationD、analysisIn the system development process, the code is written in the phase.A、designB、analysisC、testingD、implementationIn the system development process, modularity is a very well-established principle used in the ph
27、ase.A、analysisB、designC、testingD、implementationThe development process in the software life cycle involves four phases: analysis, design, implementation, and .A、auditB、designC、implementationD、analysisE、testingComputer programming is the process of the source code of computer programs.A、testingB、debu
28、ggingC、writingD、maintainingRequirements analysis is not critical to the success of a development project错Within software engineering, programming is regarded as one phase in a software development process.对The aspect of that,New capabilities can be added to the software without major changes to the
29、underlying architecture is called Extensibility .对Database connection allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.A、poolingB、connectionC、pondD、link, such as the SQL Server and Oracle providers, typically offe
30、r performance improvements due, in part, to the fact that there is one less layer of abstraction.A、Native providersB、Bridge providersIn SQL,causes an object (a table, for example) to be creaed within the database.A、TRUNCATEB、creaeC、drpD、ALTERADO.NET relies on the services of .NET data providers.Ther
31、e areA、DataReaderB、Data AdapterC、CommandD、ConnectionThe core of SQL is formed by a command language that allows the and performing management and administrative functions.A、retrieval of dataB、insertion of dataC、updating of dataD、process of dataE、deletion of dataSecurity is usually enforced through .
32、A、data storingB、auditingC、access controlD、data retrievingE、encryptionThe types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are:A、System.Data.Odbc. Contains the ODBC .NET Data Provider types.B、System.Data. Contains provider-independ
33、ent types such as the DataSet and DataTable.C、System.Data.OracleClient. Contains the Oracle .NET Data ProviderD、System.Data.SqlClient. Contains the SQL Server .NET Data Provider types.E、System.Data.OleDb. Contains the OLE DB .NET Data Provider types.A computer database relies upon DBMS to organize t
34、he storage of data.对Database security denotes the system, processes, and procedures that protect a database software from unintended activity.错DBMS are categorized according to the database model that they support.对a relational database is just only a collection of relations错Enforcing security is on
35、e of the major tasks of the DBA.对All of these databases can not take advantage of indexing to increase their speed.错DTE is .A、Digital T-carrierB、the last piece of equipment that belonged to the subscriber in a data link systemC、data terminal equipmentD、satellite provides transparent transfer of data
36、 between end users, providing reliable data transfer services to the upper layers.A、Session LayerB、Network LayerC、Presentation LayerD、Application LayerE、The Transport LayerA(n) is usually a computer installed with the necessary software and allows two networks, each with a completely different set o
37、f protocols, to communicate.A、hubB、switchC、routerD、gatewayThe purpose of the A is to provide fully integrated analog services to users.A、HTTPB、WWWC、FTPD、ISDNThere are AB between the DTEs.A、will be replaced by an updated standardB、the modemC、digital-to-analog converterD、communications equipmentThe Ap
38、plication layer in TCP/IP Model is correspond to in OSI ModelA、Transport LayerB、Application LayerC、Presentation LayerD、Session LayerE、Network LayerThe equipment .A、transfers the number of bits in parallelB、transfers the number of bits in serial formC、manipulates digital information internally in wor
39、d unitsD、manipulates digital information internally in serial formThe end equipment in a communication system includes .A、printersB、computersC、CRTsD、keyboardsThe four topologies in common use are star, router, ring and hub.对Control token is the only way of controlling access to a shared transmission
40、 medium.对Most wide area networks, such as the PSTN, not use a mesh (sometimes referred to as a network) topology.错TCP means it is on the network layer and IP means it is on the transport layer separately.错A LAN is generally limited to the size of a department or an organization and often consists of
41、 2 to 100 devices.对Three techniques have been adopted for use of the medium access control in the LANs.错LAN may be used to interconnect computer-based equipment distributed around a factory or hospital complex.错To access a page on the WWW, one needs a that usually consists of three parts: a controll
42、er, a method, and an interpreter.A、passwordB、browserC、codeD、routerThe abbreviation HTTP stands for Hypertext Protocol.A、TransferB、TransmissionC、TransportationD、Transition is an architectural framework.A、ftpB、httpC、wwwD、dnsHypermedia include ( )A、vidoeB、imagesC、flashD、soundsE、video clipsF、textThe Wor
43、ld Wide Web is a huge set of , linked by hyperlinks and URLs.A、imagesB、interlinked documentsC、pagesD、flashE、all kinds of dataThe web browsers which is normal used, such as.A、OpraB、Apple SafariC、FirefoxD、ICQE、Internet ExplorerFTP is a distributed bulletin board which offers a combination news and dis
44、cussion service on thousands of topics.对In the e-mail a user needs a message transfer agent.对Previously the Web provides a wealth of additional capabilities.错The World Wide Web ties the information together into a big collection of interactive multimedia resources.错It was estimated that at this rapi
45、d growth everyone in the world would have an e-mail address in the near future.对Any computer which is connected to the Internet can communicate with any other Internet computer thanks to the rules of IP.对In Web pages, you can search database of mailing lists, but you can see pictures of your favorit
46、e band and their concert schedule.错The World Wide Web ties the information together into a big collection of interactive multimedia resources.错Hypertext extends the concept of hypermedia to other forms of information.对The World Wide Web is an architectural framework.对Because the Internet is made up
47、of many diverse computers, so together they work like one world-wide computer system.错Their company used international lawyers to prosecute a crime ring involving software in Thailand.A、duplicationB、cloningC、piracyD、copyingInformation Systems has a number of different areas of work:A、Information Sys
48、tems DevelopmentB、Information Systems ManagementC、Information Systems StrategyD、Information Systems ImplementGIS work with two fundamentally different types of geographic models.They are the A、mathematic modelB、data modelC、vector modelD、geography modelE、raster modelSome commentators say the outcome
49、of the information revolution is likely to be as profound as the shift in A、industrialB、agriculturalC、handicraft industryD、Service IndustryA working GIS contains five key componets.They are .A、peopleB、hardwareC、dataD、purposeE、resultF、softwareG、methodsIn electronic commerce ,information search and di
50、scovery services include .A、software agentsB、search enginesC、electronic catalogsD、information filtersE、directoriesOnline shopping is the process consumers go through to purchase products or services over the Internet.对Designers of online shops should consider the effects of information load.对Electro
51、nic money is also called digital cash or electronic token对A Web site is often more effective as a(n) tool than a selling tool.A、PoliticB、ElectronicalC、MarketingD、TechnicalA companys ability to deploy and support customer-oriented systems will be of vital importance to its prosperity.A、e-ShoppingB、e-
52、LearningC、e-BusinessD、e-BankingAccording to Intel,there are stages in the evlolution of eBusiness.A、TwoB、ThreeC、FourD、Onewhich is the type of electronic commerce in the following choiceA、C2CB、B2BC、B2CElectronic commerce that is conducted between businesses is referred to as business-to-business orA、
53、C2CB、e-commerceC、B2BD、C2BElectronic commerce may be defined as the entire set of processes that suport activities on a(n) and involve information analysis.A、personal,societyB、society,humanC、commercial,networkA virus is a .A、programB、bad manC、beastD、computerA virus is a program that reproduces its ow
54、n code by ( ).A、replacing another programB、adding to the end of a fileC、inserting into the middle of a fileD、simply placing a pointerSome viruses use ( ) and ( ) techniques to hide their existence.A、stealthB、polymorphicC、quickly spreadD、replace a part of system softwareThe author thinks that underst
55、anding how an attacker approaches your computer system can help you protect it对Computer virus is remote from us.错Confidentiality of the message is not enough in a secure communication; is also needed. The receiver needs to be sure of the senders identity.A、authenticationB、authorizationC、encapsulatio
56、nD、encryptionMany viruses go resident in the memory like a ( ).A、.exe fileB、tsr programC、.com fileD、data fileViruses can delay their attack for ( ).A、monthsB、daysC、yearsD、weeksNow, about ( ) different viruses account for all the viruses that actually spread in the wild.A、150B、1800C、30D、3000which is
57、the threat to computer security in the following choices ?A、earthquakeB、Computer CriminalsC、Computer CrimeD、Human Errorsvirus is a program that reproduces its own code by ( ).A、simply placing a pointerB、replacing another programC、adding to the end of a fileD、inserting into the middle of a fileSome v
58、iruses use ( ) and ( ) techniques to hide their existence.A、replace a part of system softwareB、stealthC、polymorphicD、uickly spreadWhat make it is difficult to agree on how to count viruses?A、just a trivial change may creae a new virusB、some viruses can use polymorphic techniqueC、some viruses can cre
59、ae different versions when they infect other programsD、new virus arise from an existing virus( ) maybe a certain cause that some viruses infect upon.A、an external event on your PCB、a dayC、a timeD、a counter within the virusThe Whale will creae ( ) different versions of itself when it infects files.A、
60、31B、30C、33D、32Many viruses go resident in the memory like a ( ).A、.exe fileB、.com fileC、tsr programD、data fileThe data, when they are not encrypted, are called .A、ciphertextB、plaintextC、contextD、hypertextMichelangelo is a file sector.错The author thinks that understanding how an attacker approaches y
61、our computer system can help you protect it对Computer security is a branch of technology known as information security as applied to computers.对The attributes of the stack are ( ).A、LIFOB、built into their circuitryC、queueD、FIFOThe most important program on any computer is.A、VirusB、Office 2000C、Operating SystemD、softwarei