计算机英语含答案.doc_第1页
计算机英语含答案.doc_第2页
计算机英语含答案.doc_第3页
计算机英语含答案.doc_第4页
计算机英语含答案.doc_第5页
已阅读5页,还剩3页未读 继续免费阅读

付费下载

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

年级: 专业:_班级:_姓名:_学号:_座号:_成绩:_题 号一 二三四总 分得 分. Vocabulary(词汇题)(共20分)(一). Translate the following words and expressions into Chinese(写出下列词组的相应中文含义。)(共10分,每题1分)1. Mbps_ 2. pirated software_3. backup copy_ 4. fiber optics_5.user authentication_ 6. network security_7. surf the web_8. virus checker_9. search engine_ 10. encryption program_(二)Fill in the blanks with the corresponding English expressions.(根据中文写出相应的英语缩写或全称。) (共10分,每题1分)1. 统一资源定位符_ 2. 万维网_3. 信息技术_ 4. 数字用户线路_5. 个人数字助理_ 6. 电子数据交换_7. 数据加密系统_ 8. 因特网服务提供商_9. 移动电话_ 10.电子商务_. Reading comprehension(阅读理解,共40分)(一) 从供选择的答案中,选出应填入下面叙述中 内的最确切的解答,把相应编号写在答卷的对应栏内。(每小题1.5分,共15分)Passage A:Network managers have long 1 practical voice-over-IP(VoIP) solutions. VoIP 2 ease network management and decreases costs by converging at a companys telephone and data infrastructures into one network. And a VOIP solution implemented at a companys headquarters with far-reaching branch offices can 3 tremendous amounts of 4 in long distance phone bill, provided that solution delivers POTS-like voice 5 over the Internet. 供选择的答案: 1、( ):A、await B、awaited C、awaiting D、awaits 2、( ):A、promise B、promised C、promises D、promising 3、( ):A、get B、put C、save D、waste 4、( ):A、cash B、money C、space D、time 5、( ):A、frequency B、length C、quality D、quantityPassage B:Basically, a firewall is a 1 process or a set of integrated processes that runs on a router or 2 to control the flow of networked application traffic 3 through it. Typically, firewalls are placed on the entry point to a 4 network such as the Internet. They could be considered traffic cops(警察). The firewalls 5 is to ensure that all communication between an organizations network and the Internet conform to the organizations security policies. 供选择的答案 1、( ):A、dependent B、isolated C、related D、standalone 2、( ):A、browser B、client C、repeater D、server 3、( ):A、pass B、passed C、passing D、passes 4、( ):A、local B、national C、private D、public 5、( ):A、mole B、pole C、role D、rule(二)根据文章的内容判断下列句子的正误(每小题1.5分,共15分)Passage C:Personal computer software is based on specific operating systems and machines. The famous PC operating systems are DOS, Windows, OS/2, UNIX, Linux, and Mac OS.DOS (Disk Operating System) was the most popular operating system for IBM and IBM-compatible 16 bit personal computers. DOS is no longer widely used because it has a number of limitations. Microsoft built Windows as an extension of the widely installed DOS operating system. Windows provides not only a graphical user interface (GUI), but also memory management and multitasking capabilities.UNIX is an interactive, multi-user, multitasking operating system that is highly supportive of communications and networking. At present, UNIX is primarily used for workstations, minicomputers, and server computers in multi-user environments.Linux is the free UNIX. It has all of the features you would expect of a modern, fully fledged UNIX: true multitasking, virtual memory, shared libraries, demand loading, shared, proper memory management and TCP/IP networking.Mac OS (Macintosh Operating System) supports multitasking and networking and has a highly praised graphical user interface. Multimedia capabilities of this operating system allow Macintosh users to integrate video clip, stereo sound, and animated sequences with conventional text and graphics software. According to the passage C,tell whether the following statements are true (T) or false (F) (每小题1.5分)1、( ) Personal computer software is dependent on specific operating systems and machines. 2、( ) DOS can only work with 32-bit microprocessor. 3、( ) Windows is the 32-bit operating system with networking capability and Internet access. 4、( ) UNIX is an interactive, multi-user, multitasking operating system. 5、( ) The Linux operating system is free. It is the modified version of UNIX running on PCs. Passage D:Microsoft Word, known as Word, is a very powerful Windows word-processing package. It is a member of Microsoft office. Word offers many features, including desktop publishing and access to the World Wide Web. Because Word is part of the Microsoft Office, documents created in Word can be easily incorporated into Excel, PowerPoint and Access files. Word has several editions: Fig.1 The interface of Word XPWord 97, Word 2000 and Word XP. Microsoft Word XP is the current Windows version of this word processor. The following figure is the introduction of Word XP.Title bar displays the name of the current application and name of the current document Menu bar lists the names of the menus available Standard toolbar gives you quick access to frequently used editing functions. Names of buttons are displayed when the mouse rested over them.Scroll bars used to move through a document vertical and horizontal Ruler enables you to change left and right margins and to set or remove tab stops. Text area where you can edit your document.Status bar displays current document information. According to the passage D,tell whether the following statements are true (T) or false (F)(根据上文的内容判断下列句子的正误)(每题1.5分)1. ( ) Microsoft Word XP is a member of Microsoft office 2000. 2. ( ) Word doesnt have the feature to accessing to World Wide Web. 3. ( ) Documents created in Word are hard to be incorporated into PowerPoint. 4. ( ) Title bar displays the names of the application and document. 5. ( ) In the text area, you can edit your document. (三) Choose the best answer according to the passage E.(根据上文的内容选择正确的答案,10分,每题2分)Passage E:In order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer. If you want to solve the computational problem with a computer, you should learn how to program. The task of developing programs for the solution of computational problems is referred to as programming. Computer programming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise. So programming is breaking a task down into small steps.Programming is sometimes contrasted with (与相比)coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines of program text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others. Whats actually involved in programming - the actual process of writing programs? Heres a quick overview of the process: Write a program. Compile the program. Run the program. Debug the program. Repeat the whole process until the program is finished. Choose the best answer according to the passage E. (根据上文的内容选择最合适的答案)1( ) If you want to solve the computational problem with a computer, you should learn how to .A. calculate B. program C. add D. subtract2. ( ) Computer programming is the process of planning and creating a sequence of _for a computer to follow. A. steps B. process C. lines D. graphics3. ( ) The term “coder” is used to describe A. machine B. computer C. keyboard D. person4. ( ) In order to solve a computational problem, you can let a person or a to do it.A. machine B. computer C. keyboard D. mouse5. ( ) Which of the following is not the stages of programming? A. Write a program. B. Debug the program.C. Print the program. D. Compile the program. Single choice(单选题,每小题1分,共15分)1. ( ) The Internet is based on the concept of a (an) _ relationship between computers.A. browser/server B. client/customer C. entity/relationship D. client/server2. ( ) A user typically connects to the Internet in one of two ways: dedicated access and _ access.A. broadcasting B. point-to-point C. dial-up D. Internet3. ( ) are Internet addresses used by Web browsers to locate Internet resources.A. HTTP B. URLs C. DNS D. HTML 4. ( ) The amount of data that a computer network can transmit is called _ of the network and is usually measured in kilobits per second or megabits per second.A. baud rate B. frequency C. bit rate D. bandwidth5. ( ) An information revolution is now occurring from two interrelated aspects: social and development.A. economical B. technological C. 4GLs d. OOP languages6. ( ) The largest category of computer criminals is .A. hackers B. programmers C. employees D. employers7. ( ) People who gain unauthorized access to a computer system for malicious purposes are called .A. crackers B. hackers C. programmers D. operators8. ( ) All data transmitted over the Internet _ small units of information called packets.A. is used for B. is added by C. is divided by D. is divided into 9. ( ) A (an) _ is a destructive program which fills a computer system with self-replicating information, clogging(堵塞) the system so that its operations are slowed or stopped. A. worm B. time bomb C. Trojan horse D. logic bomb10. ( ) There will be”_,” so you wont have to wait for your PC to come to life.A. fast-on B. quick-on C. instant-on D. add-on11. ( ) The term _is used to describe an interlinked system of documents in which a user may jump from one document to another. A. hypertext B. hypermedia C. hyperlink D. HTTP12. ( ) _ allows an Internet user to connect to a distant computer and use that computer as if he or she were using it directly. A. WWW B. FTP C. E-mail D. Telnet13. ( ) Most major corporations today use special hardware and software called _to control access to their internal computer networks. A. virus checkers B. firewalls C. gateways D. detection programs 14. ( )_ occupations now take the biggest share of employment in many industrial societies such as the United States and the United Kingdom.A. mechanical engineering B. information-based C. electrical engineering D. biological engineering15. ( ) Unauthorized copyinga form of theftof programs for personal gain is called _. A. unauthorized access B. damage C. attack D. software piracy. Translate the following sentences into Chinese.(将下列句子翻译成汉语。共25分)1. The PCs growing popularity isnt surprising. Prices have fallen sharply while the power of the hardware and software has kept increasing. (3分)_2. Most Internet files are multimedia documentsthat is, text, graphics, photographs, audio, and video may be combined in a single document.(3分)_3. Dont expose the computer to extreme conditions. Direct sun, rain from an open window, extreme temperatures, cigarette smoke, and spilled(洒落的) drinks or food are harmful to microcomputers

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论