《2022年2022年计算机英语复习题 .pdf》由会员分享,可在线阅读,更多相关《2022年2022年计算机英语复习题 .pdf(7页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、第 1 页 共 7 页计算机英语考试范围1,2,3,4,6,8,11,12 计算机英语考试题型与示例一、Filling the blanks.(填空,每题 2 分,共 20 分)1.The smallest unit of information handled by a computer is bit.A group of eight bits makes up a(n)_.二、Translate the following words and expressions into Chinese(写出下列词组的汉语。每题2 分,共 20分)1.source file _ 三、Translate
2、 the following words and expressions into English(写出下列词组的英语。每题 2 分,共 20 分)1.操作系统_ 四、Fill in the blank swith the corresponding English abbreviations(根据汉语写出相应的英语缩写或英文缩写的汉语意思,每题 2 分,共 10 分)1.中央处理器_ 2.B2B _ 五、Translate the following sentences into Chinese(将下列句子翻译成汉语。共30 分)1.Computer hardware is the equi
3、pment involved in the function of a computer and consists of the components that can be physically handled.名师资料总结-精品资料欢迎下载-名师精心整理-第 1 页,共 7 页 -第 2 页 共 7 页计算机英语复习题一、Filling the blanks.(填空)1.The smallest unit of information handled by a computer is bit.A group of eight bits makes up a(n)_.2.The functi
4、on of computer hardware is typically divided into three main categories.They are input,output,and _.3.Computer programs fall into two major classes:_ programs and operating systems.4.In the relational database model,data is organized in two-dimensional _ called relations.5.The largest category of co
5、mputer criminals is _.6.People who gain unauthorized access to a computer system for fun and challenge are called _.7._ is the unauthorized copying of programs for personal gain.8.Modern digital computers can e divided into four major categories on the basis of cost and performance.They are microcom
6、puter,workstation,minicomputer,and _.9.Video displays commonly take one of two forms.They are CRT-based screens and _screens.10.A _ translates all the source code of a program written in a high-level language into object code prior to the execution of the program.11.A _ is a program that is often us
7、ed to help find problems in other programs.12.As far as a DBMS is concerned,users can refer to both end users and _programs.13.The three-level architecture for a DBMS consists of the interal,_,and external levels.14.The largest category of computer criminals is _.15.People who gain unauthorized acce
8、ss to a computer system for malicious purposes are called _.16.Computer crime can take the forms of damage,theft,and _.17._ is the unauthorized copying of programs for personal gain.名师资料总结-精品资料欢迎下载-名师精心整理-第 2 页,共 7 页 -第 3 页 共 7 页18.The year 2000 was a turning point in electronic commerce.It marked t
9、he end of the“dot-com _.”19.Based on the types of participating _,electronic commerce can be classed into five categories:B2C,B2B,Business processes,C2C,and_.二、Translate the following words and expressions into Chinese(写出下列词组的汉语。)1.Artificial intelligence _ 2.address bus _ 3.object-oriented language
10、 _ 4.database administrator _ 5.database management system(DBMS)_ 6.backup copy _ 7.electronic break-in _ 8.Software engineering _ 9.Management information system_ 10.dot-matrix printer_ 11.data declaration _ 12.parallel computing _ 13.source file _ 14.system call _ 15.relational database model _ 16
11、.Hard disk_ 17.Electronic commerce_ 18.Relational database_ 19.database management system(DBMS)_ 20.1file server 21.peer-to-peer model 22.bus topology network 总线拓扑网络23.Ethernet protocol collection 以太网协议集24.proprietary network 专有网络25.utility package 实用软件包,公用程序包26.star network 星形网络27.B2G transaction 企
12、业对政府交易28.C2C transaction 消费者对消费者交易29.mobile telephone 移动电话30.dot-com bust 网络不景气名师资料总结-精品资料欢迎下载-名师精心整理-第 3 页,共 7 页 -第 4 页 共 7 页31.dot-com boom 网络繁荣32.digital piracy 数字盗版33.encryption program 加密程序34.backup copy 备份35.electronic break-in 电子入侵三、Translate the following words and expressions into English(写
13、出下列词组的英语。)1.操作系统_ 2.激光打印机_ 3.目标代码_ 4.计算机病毒_ 5.软件侵权_ 6.可执行程序_ 7.赋值语句_ 8.程序设计语言 _ 9.防火墙_ 10.喷墨打印机 _ 11.目标代码_ 12.应用程序_ 13.计算机病毒_ 14.电子公告板 _ 15.病毒检查程序_ 16.可执行程序_ 17.赋值语句_ 18.程序设计语言 _ 19.简单对象访问协议_ 20.局域网 local area network(LAN)21.广域网 wide area network(WAN)22.令牌环 token ring 23.无线网络wireless network 24.环形拓扑
14、结构ring topology 25.客户机/服务器模型client/server model 26.电子数据交换electronic data interchange(EDI)27.库存管理技术inventory management technology 28.知识产权intellectual property 29.条形码 bar code 名师资料总结-精品资料欢迎下载-名师精心整理-第 4 页,共 7 页 -第 5 页 共 7 页30.电子图书electronic book 31.个人数字助理personal digital assistant(PDA)32.企业对企业电子商务B2B
15、 electronic commerce 33.破坏性计算机程序destructive computer program 34.计算机病毒computer virus 35.软件侵权software piracy 36.硬盘驱动器hard-disk drive 37.病毒检查程序virus checker 38.主存储器primary storage 39.电子公告板electronic bulletin board 四、Fill in the blank swith the corresponding English abbreviations(根据汉语写出相应的英语缩写)1.中央处理器_
16、2.个人计算机_ 3.结构化查询语言_ 4.集成开发环境_ 5.简单对象访问协议 _ 6.广域网_ 7.ATM 8.DBMS 9.PC 10.WAN11.BIOS 基本输入/输出系统12.CPU 中央处理哭13.CRT 阴极射线管14.IC 集成电路15.LCD 液晶显示(器)16.SQL 结构化查询语言17.USB 通用串行总线18.VLSI 超大规模集成的19.VIRUS 计算机病毒20.HTTP 超文本传输协议21.WWW 万维网五、Translate the following sentences into Chinese(将下列句子翻译成汉语。)名师资料总结-精品资料欢迎下载-名师精
17、心整理-第 5 页,共 7 页 -第 6 页 共 7 页1.Computer hardware is the equipment involved in the function of a computer and consists of the components that can be physically handled.()2.Programming languages,in computer science,are the artificial languages used to write a sequence of instructions that can be run by
18、 a computer.()3.A computer program is a set of instructions that directs a computer to perform some processing function or combination of functions.()4.A software process is a set of activities that leads to the production of a software product.()5.Threats to computer security are computer crimes(in
19、cluding viruses and electronic break-ins)and natural and other hazards.()6.The pace of change brought about by new technologies has had a significant effect on the way people live,work,and play worldwide.New and emerging technologies challenge the traditional process of teaching and learning,and the
20、 way education is managed.It is frequently claimed that the most potent agent of change on present-day society will prove to be information technology(IT).IT,which an important area of study in its own right,is having a major impact across all curriculum areas.()7.A computer is an electronic device
21、that can receive a set of instructions,or program,and then carry out this program by performing calculations on numerical data or by manipulating other forms of information.()8.A software process is a set of activities that leads to the production of a software product.()9.A database management syst
22、em defines,creates,and maintains a database.()10.Although the rapid expansion and high levels of investment of the boom years are not likely to be repeated,the second wave of electronic commerce is well underway.名师资料总结-精品资料欢迎下载-名师精心整理-第 6 页,共 7 页 -第 7 页 共 7 页11.Threats to computer security are compu
23、ter crimes(including viruses and electronic break-ins)and natural and other hazards.()12.The pace of change brought about by new technologies has had a significant effect on the way people live,work,and play worldwide.New and emerging technologies challenge the traditional process of teaching and le
24、arning,and the way education is managed.It is frequently claimed that the most potent agent of change on present-day society will prove to be information technology(IT).IT,which an important area of study in its own right,is having a major impact across all curriculum areas.名师资料总结-精品资料欢迎下载-名师精心整理-第 7 页,共 7 页 -