加载中…
个人资料
  • 博客等级:
  • 博客积分:
  • 博客访问:
  • 关注人气:
  • 获赠金笔:0支
  • 赠出金笔:0支
  • 荣誉徽章:
正文 字体大小:

郑州大学远程教育《计算机专业英语》网考高分辅导QQ805006590

(2016-02-24 12:49:50)
标签:

计算机专业英语

网上考试

网络教育

代写作业

郑州大学远程教育

A digital computer is generally made up of five dstinct elements: a central processing unit,().

According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are __________________.

One of trends in computer development is _________,the effort to compress more circuit elements into smaller and smaller ______space

We can define a computer as a device that ______________________

A program is a sequence of ________ that can be executed by a computer.It can either be built into the hardware or exist independently in the form of ________.

The software that controls the interaction between the input and output hardware is called BIOS,which stands of __________

A general purpose computer has four main sections: _____________________________________________________.

The function of computer hardware is typically divided into three main categories.They are________________.

According to the text,the author mentions three of the most commonly used types of printer.They are ____________________.

The two most common types of scanners are _______ and _____

Windows 2000 is ( ).

The Windows 2000 product line includes ( ).

Active Directory supports ( ).

Common contemporary operating systems include __________________________.

Microsoft Windows currently supports _______ and _______file systems

A stack protocol can be used for ( ).

Queues that occur everyday life can be seen ( ).

The operations of a structured data type might act on ( ).

High-level languages are commonly classified as ________________________.

We can classify programming languages under two types:______________ languages and ____________languages.

Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes:

Newer ideas in computing such as______ have radically altered the traditional concepts that once determined program form and function

Software includes _____________ etc

The tools which Programming software usually provides include:

Computer programs fall into two major classes: ______ and ______.

Computer programming is the process of _______________ the source code of computer programs.

There are a number of processes, activities and practices that are unique to maintainers, for example:

The development process in the software life cycle involves four phases: analysis, design, implementation, and ________.

Software engineering is related to the disciplines of _____________________.

Database connection ________ allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.

ADO.NET relies on the services of .NET data providers.There are

The core of SQL is formed by a command language that allows the ________ and performing management and administrative functions.

The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are:

Security is usually enforced through __________________.

__________ provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.

The Application layer in TCP/IP Model is correspond to _______________ in OSI Model

The end equipment in a communication system includes ______.

The equipment ______.

There are AB_ between the DTEs.

The World Wide Web is a huge set of ________, linked by hyperlinks and URLs.

The web browsers which is normal used, such as________________.

The Internet carries various information resources and services, such as ______________________________ and the inter-linked hypertext documents

Hypermedia include ( )

The World Wide Web also subsumes previous Internet information systems such as ( ).

Their company used international lawyers to prosecute a crime ring involving software ________ in Thailand.

Information Systems has a number of different areas of work:

Some commentators say the outcome of the information revolution is likely to be as profound as the shift in ___________

A working GIS contains five key componets.They are ___________________.F

GIS work with two fundamentally different types of geographic models.They are the ______________.

Electronic commerce that is conducted between businesses is referred to as business-to-business or

which is the type of electronic commerce in the following choice

Electronic payments include ___________________.

In electronic commerce ,information search and discovery services include _____________.

Some viruses use ( ) and ( ) techniques to hide their existence.

If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.

A virus is a program that reproduces its own code by ( ).

which is the threat to computer security in the following choices ?

( )is a type of executable file .

Windows 2000 has the key technologies, they are ( ).

There are three types of application programs to translate source code into object code.They are __________

DTE is ______.

Electronic commerce that is conducted between businesses and consumers, on the other hand, is referred to as

Similar to viruses, you can also find malicious code in ( ).

( ) maybe a certain cause that some viruses infect upon.

Many viruses do harmful things such as ( ).

Viruses all have two phases to their execution, the ( ) and the ( ).

Active Directory can help you ( ).

With .NET, Microsoft is opening up a channel both to ________ in other programming languages and to non-.NET ________. (developers; components)

Electronic commerce may be defined as the entire set of processes that suport _____________activities on a(n) ________ and involve information analysis.

Some viruses, with no attack phase, often damage the programs or disks they infect because they ( ).

You want to ( ) maybe wake up a virus that has residented in memory.

Viruses can delay their attack for ( ).

What make it is difficult to agree on how to count viruses?

Computer is able to do different kinds of tasks.

Computers cannot work without the instructions sets.

There are no differences between the information processor and human (人类的) nervous system.

In the future, computers are capable of original thoughts.

Information can be input only by people.

A computer is a multi-functional electronic data processing machine and is made up of electronic components.

The computer can do nothing without a program.

According to computers’ power and size, we have desktop, laptop and handheld PCs.

Computers can be classified into microcomputer, mainframe and supercomputer by its program.

Secondary memory holds all of the essential memory that tells your computer how to be a computer.

One of the functions of an operating system is memory management.

Office 2000 is an incredible set of business tools.

Operating system sets up a directory of programs undergoing execution and the devices.

One of the five functions of an operating system is memory management.

A program can use a device if that hardware is unavailable.

Programs were thought of as a series of procedures.

All of us expect the programs robust, bug-free.

The most common bugs are poor logic and syntactic error.

Using debugger you cannot examine your variables.

Runtime bugs are easy to find.

The revolution of the software industry is producing good, solid, bulletproof programs at low cost and on time.

Software engineers develop software tools and collections of tools called programming environments to improve the development process.

The aspect of that,New capabilities can be added to the software without major changes to the underlying architecture is called Extensibility .

Within software engineering, programming is regarded as one phase in a software development process.

Requirements analysis is not critical to the success of a development project

DBMS are categorized according to the database model that they support.

A computer database relies upon DBMS to organize the storage of data.

All of these databases can not take advantage of indexing to increase their speed.

Database security denotes the system, processes, and procedures that protect a database software from unintended activity.

a relational database is just only a collection of relations.

The network architecture is a layer-based.

Control token is the only way of controlling access to a shared transmission medium.

The OSI model was not created by the ISO.

The TCP/IP Internet protocol suite is formed from three standards.

Most wide area networks, such as the PSTN, not use a mesh (sometimes referred to as a network) topology.

Hypertext extends the concept of hypermedia to other forms of information.

Because the Internet is made up of many diverse computers, so together they work like one world-wide computer system.

The World Wide Web ties the information together into a big collection of interactive multimedia resources.

Previously the Web provides a wealth of additional capabilities.

In Web pages, you can search database of mailing lists, but you can see pictures of your favorite band and their concert schedule.

Online shopping is the process consumers go through to purchase products or services over the Internet.

Electronic money is also called digital cash or electronic token

Designers of online shops should consider the effects of information load.

In general, shopping has always catered to middle class and upper class women.

Online content providers make money in two ways:advertisements and selling.

Computer security is a branch of technology known as information security as applied to computers.

Computer virus may affect the your phisical health .

The author thinks that understanding how an attacker approaches your computer system can help you protect it

Michelangelo is a file sector.

Computer virus is remote from us.

Workstation is a multi-user computer capable of supporting many hundreds or thousands of users simultaneously.

In its more general usage, a personal computer is a computer designed for using by one person at a time.

Operating systems are unique to their manufacturers.

Error recovery does not belong to operating system.

The earlier in the development process you find a problem, the more it costs to fix

Enforcing security is one of the major tasks of the DBA.

The OSI model is a foundation for all comparing protocols.

The OSI model is a network architecture.

Three techniques have been adopted for use of the medium access control in the LANs.

In the e-mail a user needs a message transfer agent.

Any computer which is connected to the Internet can communicate with any other Internet computer thanks to the rules of IP.

A microcomputer, also called personal computer, is a computer designed for an individual.

CDs usually store about 650GB.

A DVD holds even less information than a CD.

When you purchase a new computer, an operating software suitable to the hardware must be bought.

A powerful debugger can find nearly all of bugs.

A LAN is generally limited to the size of a department or an organization and often consists of 2 to 100 devices.

The four topologies in common use are star, router, ring and hub.

It was estimated that at this rapid growth everyone in the world would have an e-mail address in the near future.

The surfing is you can sel_ect paths to browse online resource.

If a person read a hypermedia document about mobile phones, then he might sel_ect a video show of a phone, but not hear the ring of it.

Floppy disks are the smallest type of storage, holding only 2.44MB.

With high-powered debuggers you should put your source code into the debugger.

Using debugger you can see each instruction as it executes.

TCP means it is on the network layer and IP means it is on the transport layer separately.

The World Wide Web is an architectural framework.

The Internet is a computer network which allows computers with distinctive software and hardware to communicate.

A LAN (Local area data networks) is a group of computers and the network devices connected together usually within the different buildings.

LAN may be used to interconnect computer-based equipment distributed around a factory or hospital complex.

With LANs, the limited physical separation of the subscriber DTEs allows simpler topologies to be used.

一、单项选择题(15道小题,共15分)

1、Hardware components are used for the purpose of ( ).(1分)

A、input B、output

C、central processing D、all of the above

2、The larger the system of the computer, the greater its ( ).(1分)

A、processing speeD B、storage capacity

C、both A and B D、neither A nor B

3、if we want to retrieve data from the database with SQL,we should use the comand of ( )(1分)

A、select B、update

C、delete D、insert

4、A ( ) copy is a copy of a current file made in order to protect against loss or damage.(1分)

A、har~D B、backup

C、soft D、file

5、The history of programming languages can be traced back almost to the invention of the ( )computer in th 1940s.(1分)

A、biologic B、electrical

C、analog D、digital

6、With Windows, you can run several powerful applications at once and switch quickly ( ) them.(1分)

A、A. between B、B. among

C、C. in D、D. on

7、Visual Basic has ( )versions.(1分)

A、one B、two

C、three D、four

8、The abbreviation HTTP stands for Hypertext ( ) Protocol.(1分)

A、Transfer B、Transportation

C、Transmission D、Transition

9、I didnˊt hear the phone last night, I ( ) asleep.(1分)

A、A. must be B、B. must have been

C、C. should be D、D. should have been

10、The most commonly used tool in the design phase is the ( ).(1分)

A、flowcharts B、object-relationship chart

C、topology chart D、structure chart

11、He was glad to find the fire( ) brightly.(1分)

A、A. burning B、B. burned

C、C. to bum D、D. have bum

12、Just a minute, I’m waiting for the computer to ( ) up. It won’t take long to start it.(1分)

A、activate B、scroll

C、boot D、log

13、According to Intel,there are ( )stages in the evlolution of e( )Business.(1分)

A、One B、Two

C、Three D、Four

14、ADO.NET is the ( ) model for .NET-based applications. (data access)(1分)

A、data mining B、data achieve

C、data process D、data access

15、The infamous “Michelangelo” ( ) strikes thousands of computers every year on March 6th.(1分)

A、cracker B、hacker

C、virus D、disease

二、多项选择题(15道小题,共45分)

1、With .NET, Microsoft is opening up a channel both to ( ) in other programming languages and to non-.NET ( ). (developers; components) (3分)

A、developers B、coder

C、components D、architecture

2、The operations of a structured data type might act on ( ). (3分)

A、a stack B、the values of the data type

C、component elements of the data structure D、a queue

3、Similar to viruses, you can also find malicious code in ( ). (3分)

A、Trojan Horses B、worms

C、logic bombs D、Microsoft Word Documents

4、There are AB( ) between the DTEs. (3分)

A、the modem B、communications equipment

C、digital-to-analog converter D、will be replaced by an upd( )ated standard

5、A general purpose computer has four main sections: ( ). (3分)

A、the input and output devices B、the memory

C、the control unit D、the arithmetic and logic unit (ALU),

E、the cpu

6、The end equipment in a communication system includes ( ). (3分)

A、computers B、CRTs

C、printers D、keyboards

7、Queues that occur everyday life can be seen ( ). (3分)

A、in an emergency room of a hospital B、in certain societies lacking equality

C、as people waiting for service at a bank D、as automobiles waiting for a traffic light

8、A stack protocol can be used for ( ). (3分)

A、subroutine calls B、operation of arithmetic

C、removing the latest element ins( )erted D、removing the earliest element ins( )erted

9、Windows 2000 is ( ). (3分)

A、new lease of Windows B、the same as Windows NT

C、an inventive technology D、used for building a scalable network

10、Hypermedia include ( ) (3分)

A、sounds B、video clips

C、text D、flash

E、vidoe F、images

11、( ) maybe a certain cause that some viruses infect upon. (3分)

A、a day B、a time

C、an external event on your PC D、a counter within the virus

12、Viruses can delay their attack for ( ). (3分)

A、days B、weeks

C、months D、years

13、The World Wide Web is a huge set of ( ), linked by hyperlinks and URLs. (3分)

A、interlinked documents B、images

C、flash D、all kinds of data

E、pages

14、According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are ( ). (3分)

A、microcomputers B、workstation

C、lenovo D、mainframes

E、note book F、minicomputers

15、The tools which Programming software usually provides include: (3分)

A、linkers B、text editors

C、interpreters D、debuggers

E、compilers

三、论述题(2道小题,共40分)

1、试阐述CPU对于计算机组成部件的作用。

(20分)

2、请谈谈你对现在互联网应用的一些认识

(20分)

.

专业承接代做点播、测试、网考、论文等,请加周老师QQ:805006590 (长期有效)

0

阅读 收藏 喜欢 打印举报/Report
  

新浪BLOG意见反馈留言板 欢迎批评指正

新浪简介 | About Sina | 广告服务 | 联系我们 | 招聘信息 | 网站律师 | SINA English | 产品答疑

新浪公司 版权所有