郑州大学远程教育-网教《计算机专业英语》在线测试 (2) 满分辅导QQ805006590
(2016-02-26 11:48:44)
标签:
计算机专业英语在线测试网络教育代写作业郑州大学远程教育 |
第一题、单项选择题(每题1分,5道题共5分)
1、After I finished the last paragraph, I moved the ________ back to the third paragraph and del_eted
A、icon B、mouse
C、joystick D、cursor
2、These days it is not uncommon for one to see people using ________ everywhere--even on airplanes.
A、laptops B、desktops
C、minicomputers D、microcomputers
3、Just a minute, I’m waiting for the computer to ________ up. It won’t take long to start it.
A、activate B、scroll
C、boot D、log
4、what does " neural network " mean?
A、精神网 B、自然网络
C、神经网络 D、社会网络
5、how to translate the word "中央处理器"
A、central processing unit B、central progress unit
C、central process unit D、
第二题、多项选择题(每题2分,5道题共10分)
1、A digital computer is generally made up of five dstinct elements: a central processing unit,().
A、input devices B、memeory storage devices
C、output devices D、a bus E、crt screen
2、According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are __________________.
A、microcomputers B、workstation
C、lenovo D、mainframes E、note book F、minicomputers
3、One of trends in computer development is _________,the effort to compress more circuit elements into smaller and smaller ______space
A、microminiaturization B、micromodule
C、chip D、chat
4、We can define a computer as a device that ______________________
A、accepts input B、deal everything
C、processes data D、stores data E、produces output
5、A program is a sequence of ________ that can be executed by a computer.It can either be built into the hardware or exist independently in the form of ________.
A、instructions B、data
C、hardware D、software
第三题、判断题(每题1分,5道题共5分)
1、Computers cannot work without the instructions sets.
正确 错误
2、Computer is able to do different kinds of tasks.
正确 错误
3、There are no differences between the information processor and human (人类的) nervous system.
正确 错误
4、In the future, computers are capable of original thoughts.
正确 错误
5、Information can be input only by people.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)
1、The abbreviation USB stands for Universal ________ Bus.
A、Serial B、Sequential
C、Symmetric D、Syntactic
2、A ______ is a device that enables the computer to handle sounds.
A、network B、video card
C、sound card D、monitor
3、You can come with me to the museum this afternoon ( ) you don’t mind walking for half an hour.
A、unless B、so far as
C、except D、if
4、It looks as though there ( ) some problems with my computer. Because it is so slow.
A、was B、were
C、has been D、had been
5、The largest and fastest computers are ( ).
A、mainframe computers B、supercomputers
C、hand-held PCs D、workstations
第二题、多项选择题(每题2分,5道题共10分)
1、The function of computer hardware is typically divided into three main categories.They are________________.
A、input B、output
C、cpu D、storage E、motherboard
2、The software that controls the interaction between the input and output hardware is called BIOS,which stands of __________
A、Classic Input Output System B、Junior Input Output System
C、Advanced Input Output System D、Basic Input Output System
3、The two most common types of scanners are _______ and _____
A、handler scanners B、flatbed scanners
C、hand-held scanners D、auto scanners
4、According to the text,the author mentions three of the most commonly used types of printer.They are ____________________.
A、laser printer B、dot-matrix printers;
C、array printer D、inkjet printers E、belt printer
5、A general purpose computer has four main sections: _____________________________________________________.
A、the input and output devices B、the memory
C、the control unit D、the arithmetic and logic unit (ALU), E、the cpu
第三题、判断题(每题1分,5道题共5分)
1、The computer can do nothing without a program.
正确 错误
2、In its more general usage, a personal computer is a computer designed for using by one person at a time.
正确 错误
3、Computers can be classified into microcomputer, mainframe and supercomputer by its program.
正确 错误
4、Workstation is a multi-user computer capable of supporting many hundreds or thousands of users simultaneously.
正确 错误
5、Secondary memory holds all of the essential memory that tells your computer how to be a computer.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)
1、A ________ copy is a copy of a current file made in order to protect against loss or damage.
A、hard B、backup
C、soft D、file
2、The infamous “Michelangelo” ________ strikes thousands of computers every year on March 6th.
A、cracker B、hacker
C、virus D、disease
3、Windows gives you more control over the ________ you work.
A、operation B、way
C、energy D、power
4、The attributes of the stack are ( ).
A、FIFO B、LIFO
C、queue D、built into their circuitry
5、( )as a significant majority of market share in the desktop
A、linux B、Microsoft Windows
C、unix D、Mac OS
第二题、多项选择题(每题2分,5道题共10分)
1、Windows 2000 has the key technologies, they are ( ).
A、flat directory B、security
C、active directory D、enterprise management
2、Active Directory supports ( ).
A、delegation of administrative task B、granular access control
C、encapsulation D、inheritance
3、Active Directory can help you ( ).
A、deliver complete enterprise security by itself B、build a complex international network
C、manage every resource with a single logon D、get off the limits of down level networks
4、Windows 2000 is ( ).
A、new lease of Windows B、the same as Windows NT
C、an inventive technology D、used for building a scalable network
5、Common contemporary operating systems include __________________________.
A、Mac OS B、Microsoft Windows
C、Linux D、Solaris
第三题、判断题(每题1分,5道题共5分)
1、Operating systems are unique to their manufacturers.
正确 错误
2、One of the functions of an operating system is memory management.
正确 错误
3、A program can use a device if that hardware is unavailable.
正确 错误
4、Operating system sets up a directory of programs undergoing execution and the devices.
正确 错误
5、Error recovery does not belong to operating system.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)
1、For some time, we’ve been experiencing some ________ in this particular program. It cannot run in a normal way.
A、routines B、loops
C、bugs D、defaults
2、Whereas the decimal system is based on 10, the ________ system is based on 2. There are only two digits in the latter system, 0 and 1.
A、bilateral B、binary
C、byte D、bit
3、Which one is not a computer languages?
A、PASCAL B、word 2000
C、C D、C++
4、Visual Basic has _______versions.
A、one B、two
C、three D、four
5、High-level languages must first be translated into a(n) __________ language before they can be understood and processed by a computer
A、Machine B、common
C、Usual D、Advanced
第二题、多项选择题(每题2分,5道题共10分)
1、Queues that occur everyday life can be seen ( ).
A、in an emergency room of a hospital B、in certain societies lacking equality
C、as people waiting for service at a bank D、as automobiles waiting for a traffic light
2、A stack protocol can be used for ( ).
A、subroutine calls B、operation of arithmetic
C、removing the latest element ins_erted D、removing the earliest element ins_erted
3、The operations of a structured data type might act on ( ).
A、a stack B、the values of the data type
C、component elements of the data structure D、a queue
4、We can classify programming languages under two types:______________ languages and ____________languages.
A、advanced-level B、high-level
C、low-level D、basic-level
5、High-level languages are commonly classified as ________________________.
A、procedure-oriented B、functional
C、logic languages D、object-oriented E、automatic
第三题、判断题(每题1分,5道题共5分)
1、Programs were thought of as a series of procedures.
正确 错误
2、The earlier in the development process you find a problem, the more it costs to fix
正确 错误
3、The most common bugs are poor logic and syntactic error.
正确 错误
4、With high-powered debuggers you should put your source code into the debugger.
正确 错误
5、Using debugger you cannot examine your variables.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)
1、A(n) ________ translates all the source code of a program written in a high-level language into object code prior to the execution of th program.
A、interpreter B、compiler
C、assemblers D、
2、In the case of a(n) _________, a program is translated into executable form and executed one statment at a time rather than being translated completely before execution.
A、Debugger B、assemblers
C、compiler D、interpreter
3、A(n) ______ is a sequence of code in a program executed repeatedly,either fro a fixed number of times or until a certain condition is met.
A、Loop B、sel_ected
C、 D、
4、One of the differences between C# and Java is that Java runs on any platform with a Java Virtual ______________ while C# only runs in Windows for the foreseeable future.
A、Machine B、Software
C、Hardware D、Program
5、J2EE is a single-language platform; calls from/to objects in other languages are possible through ________, but this kind of support is not a ubiquitous part of the platform.
A、CLR B、CORBA
C、OMG D、IIS
第二题、多项选择题(每题2分,5道题共10分)
1、There are three types of application programs to translate source code into object code.They are __________
A、application suite B、assemblers
C、compilers D、interpreters
2、Newer ideas in computing such as______ have radically altered the traditional concepts that once determined program form and function
A、data mining B、parallel computing
C、distributed computing D、artificial intelligence E、software engineering
3、Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes:
A、Application software such as word processors which perform productive tasks for users. B、Middleware which controls and co-ordinates distributed systems.
C、Firmware which is software programmed resident to electrically programmable memory devices on board mainboards or other types of integrated hardware carriers.
4、Software includes _____________ etc
A、websites B、programs
C、video games D、mobile application E、all kinds of files
5、The tools which Programming software usually provides include:
A、linkers B、text editors
C、interpreters D、debuggers E、compilers
第三题、判断题(每题1分,5道题共5分)
1、(本题空白。您可以直接获得本题的1分)
2、(本题空白。您可以直接获得本题的1分)
3、(本题空白。您可以直接获得本题的1分)
4、(本题空白。您可以直接获得本题的1分)
5、(本题空白。您可以直接获得本题的1分)
第一题、单项选择题(每题1分,5道题共5分)
1、Data ________ can reduce the amount of data sent or stored by partially eliminating inherent redundancy.
A、compression B、conversion
C、configuration D、compilation
2、In the system development process, the system analyst defines the user, needs, requirements and methods in the ________ phase.
A、design B、analysis
C、testing D、implementation
3、In the system development process, the code is written in the ________ phase.
A、design B、implementation
C、analysis D、testing
4、The most commonly used tool in the design phase is the ________.
A、flowcharts B、object-relationship chart
C、topology chart D、structure chart
5、In the system development process, ________ and pseudocode are tools used by programmers in the implementation phase.
A、toplogic chart B、object-relationship chart
C、flowcharts D、structure chart
第二题、多项选择题(每题2分,5道题共10分)
1、The development process in the software life cycle involves four phases: analysis, design, implementation, and ________.
A、analysis B、design
C、implementation D、audit E、testing
2、Software engineering is related to the disciplines of _____________________.
A、computer science B、netural network
C、project management D、systems engineering E、natural language
3、which aspect have to be considered in the design of a piece of software.
A、Compatibility B、Extensibility
C、Fault-tolerance D、Maintainability E、Marketability F、ModularityG、Packaging
4、Computer programming is the process of _______________ the source code of computer programs.
A、writing B、testing
C、debugging D、maintaining
5、There are a number of processes, activities and practices that are unique to maintainers, for example:
A、Transition: a controlled and coordinated sequence of activities during which a system is transferred progressively from the developer to the maintainer B、Service Level Agreements (SLAs) and specialized (domain-specific) maintenance contracts negotiated by maintainers
C、Modification Request and Problem Report Help Desk: a problem-handling process used by maintainers to prioritize, documents and route the requests they receive D、Modification Request acceptance/rejection: modification request work over a certain size/effort/complexity may be rejected by maintainers and rerouted to a developer
第三题、判断题(每题1分,5道题共5分)
1、The revolution of the software industry is producing good, solid, bulletproof programs at low cost and on time.
正确 错误
2、Software engineers develop software tools and collections of tools called programming environments to improve the development process.
正确 错误
3、Requirements analysis is not critical to the success of a development project
正确 错误
4、The aspect of that,New capabilities can be added to the software without major changes to the underlying architecture is called Extensibility .
正确 错误
5、Within software engineering, programming is regarded as one phase in a software development process.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)
1、ADO.NET is the ________ model for .NET-based applications. (data access)
A、data mining B、data achieve
C、data process D、data access
2、____________, such as those supplied for OLE DB and ODBC, allow you to use data libraries designed for earlier data access technologies.
A、Bridge providers B、Native providers
C、 D、
3、__________, such as the SQL Server and Oracle providers, typically offer performance improvements due, in part, to the fact that there is one less layer of abstraction.
A、Native providers B、Bridge providers
C、 D、
4、if we want to retrieve data from the database with SQL,we should use the comand of
A、sel_ect B、upd_ate
C、del_ete D、ins_ert
5、In SQL,______causes an object (a table, for example) to be created within the database.
A、ALTER B、drop
C、create D、TRUNCATE
第二题、多项选择题(每题2分,5道题共10分)
1、Database connection ________ allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.
A、pooling B、pond
C、connection D、link
2、Security is usually enforced through __________________.
A、data storing B、auditing
C、encryption D、access control E、data retrieving
3、ADO.NET relies on the services of .NET data providers.There are
A、Connection B、Command
C、DataReader D、Data Adapter
4、The core of SQL is formed by a command language that allows the ________ and performing management and administrative functions.
A、retrieval of data B、ins_ertion of data
C、updating of data D、deletion of data E、process of data
5、The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are:
A、System.Data.SqlClient. Contains the SQL Server .NET Data Provider types. B、System.Data.OracleClient. Contains the Oracle .NET Data Provider
C、System.Data.OleDb. Contains the OLE DB .NET Data Provider types. D、System.Data.Odbc. Contains the ODBC .NET Data Provider types. E、System.Data. Contains provider-independent types such as the DataSet and DataTable.
第三题、判断题(每题1分,5道题共5分)
1、DBMS are categorized according to the database model that they support.
正确 错误
2、A computer database relies upon DBMS to organize the storage of data.
正确 错误
3、Database security denotes the system, processes, and procedures that protect a database software from unintended activity.
正确 错误
4、Enforcing security is one of the major tasks of the DBA.
正确 错误
5、a relational database is just only a collection of relations.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)
1、The OSI model has _____ layers.
A、four B、five
C、six D、seven
2、The purpose of the A is to provide fully integrated analog services to users.
A、ISDN B、WWW
C、FTP D、HTTP
3、A(n) ________ is a connecting device that only regenerates the signal.
A、hub B、repeater
C、router D、switch
4、Whereas a repeater operates only in the physical layer of the OSI model, a bridge operates in both the physical layer and the ________ layer of the OSI model.
A、Transport Layer B、Network Layer
C、data-link D、Physical Layer
5、A(n) ________ is usually a computer installed with the necessary software and allows two networks, each with a completely different set of protocols, to communicate.
A、hub B、gateway
C、switch D、router
第二题、多项选择题(每题2分,5道题共10分)
1、The end equipment in a communication system includes ______.
A、computers B、CRTs
C、printers D、keyboards
2、The equipment ______.
A、manipulates digital information internally in serial form B、manipulates digital information internally in word units
C、transfers the number of bits in parallel D、transfers the number of bits in serial form
3、DTE is ______.
A、Digital T-carrier B、data terminal equipment
C、satellite D、the last piece of equipment that belonged to the subscriber in a data link system
4、__________ provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.
A、The Transport Layer B、Session Layer
C、Presentation Layer D、Application Layer E、Network Layer
5、The Application layer in TCP/IP Model is correspond to _______________ in OSI Model
A、Application Layer B、Presentation Layer
C、Session Layer D、Transport Layer E、Network Layer
第三题、判断题(每题1分,5道题共5分)
1、A LAN (Local area data networks) is a group of computers and the network devices connected together usually within the different buildings.
正确 错误
2、LAN may be used to interconnect computer-based equipment distributed around a factory or hospital complex.
正确 错误
3、Most wide area networks, such as the PSTN, not use a mesh (sometimes referred to as a network) topology.
正确 错误
4、With LANs, the limited physical separation of the subscriber DTEs allows simpler topologies to be used.
正确 错误
5、Control token is the only way of controlling access to a shared transmission medium.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)
1、The abbreviation HTTP stands for Hypertext ________ Protocol.
A、Transfer B、Transportation
C、Transmission D、Transition
2、To access a page on the WWW, one needs a ________ that usually consists of three parts: a controller, a method, and an interpreter.
A、router B、code
C、password D、browser
3、_____ is an architectural framework.
A、http B、www
C、ftp D、dns
4、_____ is built around hypertext and hypermedia.
A、DNS B、HTTP
C、The Web D、FTP
5、__________is a network protocol used to transfer data from one computer to another through a network such as the Internet.
A、SMTP B、Http
C、DNS D、FTP
第二题、多项选择题(每题2分,5道题共10分)
1、Hypermedia include ( )
A、sounds B、video clips
C、text D、flash E、vidoe F、images
2、The World Wide Web also subsumes previous Internet information systems such as ( ).
A、Gopher B、Telnet
C、FTP D、Ftp
3、The Internet carries various information resources and services, such as ______________________________ and the inter-linked hypertext documents
A、electronic mail B、online chat
C、file transfer D、file sharing E、online gaming F、talking
4、The World Wide Web is a huge set of ________, linked by hyperlinks and URLs.
A、interlinked documents B、images
C、flash D、all kinds of data E、pages
5、The web browsers which is normal used, such as________________.
A、Internet Explorer B、Firefox
C、Apple Safari D、Opra E、ICQ
第三题、判断题(每题1分,5道题共5分)
1、The Internet is a computer network which allows computers with distinctive software and hardware to communicate.
正确 错误
2、Any computer which is connected to the Internet can communicate with any other Internet computer thanks to the rules of IP.
正确 错误
3、It was estimated that at this rapid growth everyone in the world would have an e-mail address in the near future.
正确 错误
4、The surfing is you can sel_ect paths to browse online resource.
正确 错误
5、If a person read a hypermedia document about mobile phones, then he might sel_ect a video show of a phone, but not hear the ring of it.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)0、(本题空白。您可以直接获得本题的1分)
0、(本题空白。您可以直接获得本题的1分)
0、(本题空白。您可以直接获得本题的1分)
0、(本题空白。您可以直接获得本题的1分)
0、(本题空白。您可以直接获得本题的1分)
第二题、多项选择题(每题2分,5道题共10分)
1、Their company used international lawyers to prosecute a crime ring involving software ________ in Thailand.
A、cloning B、copying
C、duplication D、piracy
2、Information Systems has a number of different areas of work:
A、Information Systems Strategy B、Information Systems Management
C、Information Systems Development D、Information Systems Implement
3、Some commentators say the outcome of the information revolution is likely to be as profound as the shift in ___________
A、agricultural B、industrial
C、handicraft industry D、Service Industry
4、A working GIS contains five key componets.They are ___________________.
A、hardware B、result
C、data D、people E、methods F、softwareG、purpose
5、GIS work with two fundamentally different types of geographic models.They are the ______________.
A、vector model B、geography model
C、data model D、mathematic model E、raster model
第三题、判断题(每题1分,5道题共5分)
1、(本题空白。您可以直接获得本题的1分)
2、(本题空白。您可以直接获得本题的1分)
3、(本题空白。您可以直接获得本题的1分)
4、(本题空白。您可以直接获得本题的1分)
5、(本题空白。您可以直接获得本题的1分)
第一题、单项选择题(每题1分,5道题共5分)
1、Some restaurants have provided touch ________ computers to enable their customers to order food via the computer without having to tell someone.
A、menu B、window
C、display D、screen
2、According to Intel,there are _____________stages in the evlolution of e_Business.
A、One B、Two
C、Three D、Four
3、A companyˊs ability to deploy and support customer-oriented ___________ systems will be of vital importance to its prosperity.
A、e-Learning B、e-Banking
C、e-Business D、e-Shopping
4、When most people think of opening a Web business,the first thing that springs to mind is selling products or ____________online.
A、quality B、services
C、consciousness D、
5、A Web site is often more effective as a(n) _______ tool than a selling tool.
A、Politic B、Technical
C、Marketing D、Electronical
第二题、多项选择题(每题2分,5道题共10分)
1、Some common applications related to electronic commerce are the following:
A、Email B、Enterprise content management
C、Instant messaging D、Newsgroups E、Online banking F、TeleconferencingG、Shopping cart software
2、which is the type of electronic commerce in the following choice
A、B2B B、B2C
C、C2C
3、Electronic commerce that is conducted between businesses is referred to as business-to-business or
A、C2C B、C2B
C、B2B D、e-commerce
4、In electronic commerce ,information search and discovery services include _____________.
A、software agents B、electronic catalogs
C、directories D、information filters E、search engines
5、Electronic payments include ___________________.
A、digital currencies B、credit card payments
C、electronic checks D、cash payment
第三题、判断题(每题1分,5道题共5分)
1、Online shopping is the process consumers go through to purchase products or services over the Internet.
正确 错误
2、In general, shopping has always catered to middle class and upper class women.
正确 错误
3、Electronic money is also called digital cash or electronic token
正确 错误
4、Online content providers make money in two ways:advertisements and selling.
正确 错误
5、Designers of online shops should consider the effects of information load.
正确 错误
第一题、单项选择题(每题1分,5道题共5分)
1、Confidentiality of the message is not enough in a secure communication; ________ is also needed. The receiver needs to be sure of the sender’s identity.
A、encryption B、authorization
C、authentication D、encapsulation
2、The data, when they are not encrypted, are called ________.
A、plaintext B、ciphertext
C、hypertext D、context
3、Anti-Virus protects your computer from viruses by ________ your computerˊs memory and disk devices.
A、deleting B、changing
C、scanning D、replacing
4、In 2000, the number of viruses topped ( ).
A、500 B、1000
C、7500 D、50000
5、The Whale will create ( ) different versions of itself when it infects files.
A、30 B、31
C、32 D、33
第二题、多项选择题(每题2分,5道题共10分)
1、( )is a type of executable file .
A、COM file B、TXT file
C、JPG file D、EXE file
2、Similar to viruses, you can also find malicious code in ( ).
A、Trojan Horses B、worms
C、logic bombs D、Microsoft Word Documents
3、Viruses all have two phases to their execution, the ( ) and the ( ).
A、infection phase B、del_ete phase
C、attack phase D、create phase
4、Many viruses do harmful things such as ( ).
A、deleting files B、simulating typos
C、slowing your PC down D、changing random data on your disk
5、which is the threat to computer security in the following choices ?
A、Computer Criminals B、Computer Crime
C、earthquake D、Human Errors
第三题、判断题(每题1分,5道题共5分)
1、Computer security is a branch of technology known as information security as applied to computers.
正确 错误
2、Michelangelo is a file sector.
正确 错误
3、Computer virus is remote from us.
正确 错误
4、Computer virus may affect the your phisical health .
正确 错误
5、The author thinks that understanding how an attacker approaches your computer system can help you protect it
正确 错误
.
专业承接代做点播、测试、网考、作业、论文等,请加周老师QQ:805006590 (长期有效)