计算机英语-.pdf

上传人:索**** 文档编号:76711807 上传时间:2023-03-11 格式:PDF 页数:11 大小:150.12KB
返回 下载 相关 举报
计算机英语-.pdf_第1页
第1页 / 共11页
计算机英语-.pdf_第2页
第2页 / 共11页
点击查看更多>>
资源描述

《计算机英语-.pdf》由会员分享,可在线阅读,更多相关《计算机英语-.pdf(11页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、1、Choose the best answer to complete the following sentences.1._refers to the parts of the computer that you can see and touch.A.Software B.Hardware C.Hardship D.Instruction 2.primary memory which is stored on chips located_.A.on the motherboard B.outside C.inside the processor D.on the CPU 3.The di

2、splay screen is the most common _device used to show you what the computer is doing.A.input B.printing C.output D.electronic 4.Windows gives you more control over the _you work.A.operation B.way C.energy D.power 5.The most important program on any computer is _.A.operation B.way C.energy D.power 6._

3、is a device that enables the computer to handle sounds.A.network card B.video card C.sound card D.monitor 7._is a word processing tool that helps you to create quality documents.A.Word 2000 B.Outlook 2000 C.Access 2000 D.Excel 2000 8.Anti-Virus protects your computer from viruses by _your computers

4、memory and disk devices.A.deleting B.changing C.scanning D.replacing 9.Multimedia will become increasingly_throughout every aspect of our lives.A.pass B.precise C.permit D.pervasive 10.The OSI model has _layers.A.four B.five C.six D.seven 1 2 3 4 5 6 7 8 9 10 B A C B A C A C D D 1、_ refers to the pa

5、rts of the computer that you can see and touch.A.Software B.Hardware C.Hardship D.Instruction 2、primary memory which is stored on chips located _.A.on the motherboard B.outside C.inside the processor D.on the CPU 3、The display screen is the most common _ device used to show you what the computer is

6、doing.A.input B.printing C.output D.electronic 4、Windows gives you more control over the _ you work.A.operation B.way C.energy D.power 5、The most important program on any computer is _.A.Operating System B.Virus C.software D.Office 2000 6、There are_ separate products that form the Windows 2000.A.onl

7、y one B.two C.three D.Four 7、C might best be _ as a medium-level language.A.developed B.decoded C.programmed D.described 8、Anti-Virus protects your computer from viruses by _ your computers memory and disk devices.A.deleting B.changing C.scanning D.replacing 9、Multimedia will become increasingly _ t

8、hroughout every aspect of our lives.A.pass B.precise C.permit D.pervasive 10、Communication through the Internet,the _ performs the reverse function.A.A station controller(STACO)B.DTE C.Data communications equipment(DCE)D.CRT 1 2 3 4 5 6 7 8 9 10 B A C B A D D C D C 1、A _ is used to communicate with

9、another computer over telephone lines.A xz.keyboard B.modem C.mouse D.Printer 2、A _32_ is a device that enables the computer to handle sounds.A.network card B.video card C.sound card D.Monitor 3、_ is a word processing tool that helps you to create quality documents.A.Word 2000 B.Outlook 2000 C.Acces

10、s 2000 D.Excel 2000 4、_ is a fast and powerful operating system,based on the UNIX O.S.A.Windows 2000 B.Office 2000 C.Windows 98 D.Linux 5、The OSI model has _ layers.A.four B.five C.six D.Seven 6、The purpose of the _ is to provide fully integrated analog services to users.A.ISDN B.WWW C.FTP D.HTTP 7、

11、Which one is not a computer languages?_ A.Word 2000 B.PASCAL C.C D.C+8、The _ is a language that was represented by long strings of ones and zeroes.A.machine language B.high-level language C.low-level language D.assembly language 9、The RGB value is composed of _ components.A.one B.two C.three D.Four

12、10、A virus is a _.A.program B.computer C.bad man D.beast 1 2 3 4 5 6 7 8 9 10 B C A D D D A A C A Multiple choices.1、Input devices include:_.A.the keyboard C.the mouse B.touch screen D.Microphone 2、A processor is composed of:_.A.a control unit C.an arithmetic B.logic unit D.Registers 3、The Windows 2

13、000 product line includes _.A.Windows 2000 Professional C.Windows 2000 Advanced Server B.Windows 2000 Server D.Windows 2000 Datacenter Server 4、Windows 2000 s advantages are lies in the sections that follow:_ A.Active Directory C.Networking B.Storage D.Enterprise Management 5、C+include the following

14、 pillars:_.A.encapsulation C.inheritance B.data hiding D.polymorphism 6、The major functional components of an office automation system include:_.A.text processing C.electronic mail B.information storage and retrieval D.personal assistance features 7、Static graphics include _.A.movies C.pictures B.an

15、imators D.photographs 8、The end equipment in a communication system includes _ A.computers C.CRTs B.DCE D.keyboards 9、Applications in the Internet can be found everywhere:_ A.in libraries C.at home B.in conference rooms D.at the moon 10、Many viruses do harmful things such as _.A.deleting files C.sim

16、ulating typos B.changing random data on your disk D.slowing your PC down 1 2 3 4 5 ABCD ABCD ABCD ABCD ABCD 6 7 8 9 10 ABCD CD ACD ABC ABCD 二、判断题:(每小题 1 分,共 10 分)1.As soon as you turn the computer off,the contents of RAM will disappear.()2.WinZip,WinRAR and Micro soft s Internet Explorer are all dat

17、a compression software.()3.Menu bar displays the names of the application and document.()4.A stack is a data type whose data structure is said to have a first-in/last-out(FILO)behavior,or protocol.()5.A processor can do everything without a program to provide control.()6.One of the functions of an o

18、perating system is memory management.()7.Multimedia is just two media:sound and pictures.()8.The network architecture is a layer-based.()9.In the e-mail a user needs a message transfer agent.()10.All virus scanners can kill most known viruses.()1 2 3 4 5 6 7 8 9 10 1.The operations of a structured d

19、ata type only act on the values of the data type.()2.When you purchase a new computer,an operating software suitable to the hardware must be bought.()3.One of the five functions of an operating system is memory management.()4.Operating systems are unique to their manufacturers.()5.Programs were thou

20、ght of as a series of procedures.()6.The heart of any computer system is the central processing unit(CPU).()7.Error recovery does not belong to operating system.()8.We can use multimedia in Education,Edutainment and so on.()9.When you send an e-mail you should provide the senders e-mail address.()10

21、.Viruses can cause programs crashing but cant cause entire hard disk deleting.()1 2 3 4 5 6 7 8 9 10 1.PDA is one of the components of CPU.()2.Operating system sets up a directory of programs undergoing execution and the devices.()3.The series of jobs awaiting execution is called a queue.()4.Many op

22、erating systems have similar characteristics.()5.Only a few bugs can trouble a program.()6.Keyboard and mouse are both the input devices of the computer.()7.Microsoft Word 2000 allows you to create many types of personal and business communications.()8.It was estimated that at this rapid growth ever

23、yone in the world would have an e-mail address in the near future.()9.FTP is a distributed bulletin board which offers a combination news and discussion service on thousands of topics.()10.C+language is a structured programming language.()1 2 3 4 5 6 7 8 9 10 1.Without systems software,application s

24、oftware in a computer is useless.()2.The TCP/IP Internet protocol suite is formed from five standards.()3.Windows XP is Microsofts most advanced desktop operating system.()4.A stack is a data type whose major attributes are determined by the rules governing the insertion and deletion of its elements

25、.()5.The main feature of queues is that they follow a first-come/first-served rule.()6.The Internet is a computer network which allows computers with distinctive software and hardware to communicate.()7.Any computer which is connected to the Internet can communicate with any other Internet computer

26、thanks to the rules of IP.()8.Because the Internet is made up of many diverse computers,so together they work like one world-wide computer system.()9.A LAN is generally limited to the size of a department or an organization and often consists of 2 to 100 devices.()10.The World Wide Web is an archite

27、ctural framework.()1 2 3 4 5 6 7 8 9 10 1.Your computer uses two types of memory:primary memory and secondary memory.()2.Error recovery does not belong to operating system.()3.Application software(also called end-user program)is designed to perform a specific function directly for the user.()4.Offic

28、e 2000 is an incredible set of business tools.()5.A scanner belongs to the output device.()6.A LAN(Local area data networks)is a group of computers and the network devices connected together usually within the different buildings.()7.A stack is a data type whose data structure is said to have a firs

29、t-in/last-out(FILO)behavior,or protocol.()8.Printer is the input device of the computer.()9.PROM is the abbreviation of portable read-only memory.()10.Linux is an operating system.()1 2 3 4 5 6 7 8 9 10 1.ALU is one of the components of CPU.()2.Software can be divided into two general classes:system

30、 software and application software.()3.A program can use a device if that hardware is unavailable.()4.CD-ROM stands for compact disk read-only memory.()5.Microsoft Word can help you design and manipulate spreadsheet electronically.()6.Data communications equipment(DCE)accepts the serial data stream

31、from the DTE.()7.HTML is used to write Web pages.()8.Microsoft SQL server 2000 is an operating system of the computer.()9.Word doesn t have the feature to accessing to World Wide Web.()JAVA is a structured programming language.()1 2 3 4 5 6 7 8 9 10 Reading comprehension.A computer virus is a comput

32、er program that is created to make and spread copies of itself.The program may however also be designed to have other effects on the systems it infects,ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days.According to BusinessWeek,the 76,404 attacks reported in th

33、e first half of 2003 nearly match previous years total number.As new antivirus tools are more powerful than before,the virus writers are getting a lot smarter with newer and creative ways to attack network systems.Lets first examine some common virus types:Basic Virus-a piece of software code that i

34、s developed to attack computers and network systems via e-mail or Internet connections.It quickly replicates itself and gradually attaches to files,programs or the hard drive.Trojan Horses-This is a program that doesnt replicate when entering a system but can be effectively used to open back doors.T

35、rojan Horses allow hackers to take control over a particular system or to steal very important data.Worm-this type of virus is able to spread itself automatically over the network from one computer to the next.During a worm attack,users computers get infected without even having to click open email

36、attachment or any program,etc.Since it is very difficult to avoid the virus,your best defense is a powerful antivirus program.In order to fight with such viruses,the software vendors should focus on making their products more robust.This may ask for a trade-off between user-friendliness and security

37、.In specific cases it may require line-by-line inspection,code retooling and even systems automation to defend the installed programs.Choose the best answer according to the passage.(根据上文的内容选择正确的答案。每小题2分,共 10分)1A computer virus is a computer program that is created to make and spread _ of itself.Apr

38、ograms Bvirus Ccopies Dfiles 2Worm spread itself except by _.Anetwork BE-mail Cprogram Dhardware 3Antivirus program can scan and _ virus.Aclean Bproduce Creplicate Dmake 4Trojan Horses _.Aquickly replicate itself and gradually attache to files,programs or the hard drive.Binfect the computer without

39、even having to click open email attachment or any program.Callow hackers to take control over a particular system or to steal very important data.Davoid the virus to attack computer.5According to BusinessWeek,the _ attacks reported in the first half of 2003 nearly match previous years total number.A

40、 86,404 B 76,404 C56,354 D34,876 1 2 3 4 5 C D A C B 选词填空Software testingSoftware testing,which is defined as the execution of a program to find its【1】,is a vital part of the software【2】.There are different types of testing,mainly,they are【3】or functional testing,which tests whether the【4】is the exp

41、ected result with the【5】input;and【6】(or glass box testing)which is performed to【7】problems with the【8】structure of a program.Debugging is the process of analyzing and locating bugs when software does not behave as expected.Software testing is a much more【9】means of identifying software【10】.Therefore

42、,debugging supports testing other than replacing testing.Answer:1 faults 6 white box testing 2 life cycle 7 reveal 3 black box testing 8 internal 4 output 9 valid 5 thorough 10 bug The Operating System The operating system is a【11】of system programs that,when executed,controls the【12】of the computer

43、.Sophisticated operating systems increase the【13】and consequently decrease the【14】of using a computer.Operating systems provide a software【15】,on top of which other programs,called【16】programs,can run.The application programs must be written to run on 【17】of a particular operating system.Your choice

44、 of operating system,therefore,determines,to a great extent,what applications you can 【18】.For PCs,the most popular operating systems are DOS,OS/2,and【19】,but others are【20】,such as Linux.Answer:11 set 16 application 12 operation 17 top 13 efficiency 18 run 14 cost 19 Windows 15 platform 20 availabl

45、e Choose the best answer for each of the blanks.Whenever new information is entered,it must【1】somewhere in the computer s【2】.Later,the CPU must also be【3】to get this information from memory.This is where RAM is needed.The CPU can【4】write to and read from RAM.RAM is called Random Access Memory【5】the

46、CPU can do directly to any memory location in it.The CPU does not have to look【6】all of RAM to find the spot it needs.But RAM only【7】the data temporarily.As soon as you switch the computer 【8】,all that information disappears from the RAM.When you switch the computer on again,the RAM is【9】,and ready【

47、10】a new program and new data.1.A.store B.be stored C.storing D.stored 2.A.processor B.printer C.memory D.mouse 3.A.easy B.capable C.good D.able black box testing internal bug faults reveal white box testing thorough valid output life cycle platform operation set top run available Windows efficiency

48、 cost application 4.A.both B.too C.also D.either 5.A.so B.therefore C.because D.for 6.A.on B.through C.for D.down upon 7.A.takes B.operates C.erases D.holds 8.A.off B.on C.up D.down 9.A.full B.empty C.zero D.blank 10.A.receive B.be received C.receiving D.received 11.1 2 3 4 5 6 7 8 9 10 B C D C C B

49、D A B A 选词填空(每空 2 分,共 10 分)Software Engineering,which means the application of engineering to software,is a method to develop,operate and maintain software.That is,the development of software is on a systematic,disciplined,quantitive basis.Before starting the development of software,you have to syst

50、ematically approach the problem.You have to understand the _requirements_(what the software is supposed to do),carry out the design,do the _coding_,carry out a rigorous testing,and release the software to the _customer_.Finallly,if the customer wants some changes,the software has to be modified.ASCI

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 应用文书 > 工作报告

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁