福建农林大学计算机专业英语课后单选1(40分).doc_第1页
福建农林大学计算机专业英语课后单选1(40分).doc_第2页
福建农林大学计算机专业英语课后单选1(40分).doc_第3页
福建农林大学计算机专业英语课后单选1(40分).doc_第4页
福建农林大学计算机专业英语课后单选1(40分).doc_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

计算机英语课后单选1-11、 A computer system solves a problem by accepting input,processing problem,and producing output.2、 The amount of effective work of a computer can be indicated by storage size directly.3、 Computer systems consist of hardware and software.4、 Computer that can solve only one kind of problem is a special-purpose machine.5、 Computer that can solve many different kinds of problems is a general-purpose machine.6、 Software instruct the hardware.7、 Hardware is difficult and expensive to change.8、 We usually show the computer components in a block diagram.1-21、 We usually call our computers machines.2、 An instruction set can sometimes be referred to as machine instructions.3、 The binary language is called machine language.4、 We dont confuse the processors instruction set with the instructions of high-level programming languages.5、 An instruction consists of operations and operands.6、 An operand that refers to data in the memory is called an address.7、 A timer can give precisely timed electrical signals.8、 A processor includes two functional units,they are control unit and ALU.9、 The ways by which the control unit works are analogous to a telephone switch-board with intelligence.10、 The control unit takes out the instructions from memory.1-31、 There are three desiderata in the memory system,they are size,speed and cost.2、 Even with the high speed DRAM as real memory,the high performance processors still have the latency problem.3、 A microcomputer has a built in ROM chip,it is called sometimes ROM BIOS.4、 Items stored in RAM can be accessed both easily and in any order (randomly).5、 Magnetic disk has two types,they are hard disks and floppy disks.6、 CD-ROM is abbreviated from Compact Disk ROM.7、 Read/write head detects or writes magnetized spots on the iron-oxide coating of the tape.8、 The locations of a RAM are maintained by the control unit.9、 The closest memory to the CPU is called as L1 cache.10、 The processor addresses the disk with virtual memory.2.11,Buffering can overlap the input,output,and computation of a single job .2,Operating systems should meet certain specific standards as modern computer hardwares sophistication .3,The main task of the job management is the scheduling of jobs.4,In order to create the job queue the operating system should weighing a variety of factors.5,If more than one job require to be processed the operating system should compare the priority of these jobs.6,Batch systems automate job sequencing by a resident monitor.7,spooling allowed the CPU to overlap the I/O operation with the computation.8,Time sharing can be got by multiprogramming.9,real time systems and multiprocessor systems are other operating system types.10,To monitor the devices being used the operating system establishes a table in which programs are matched against The device being used.3-11. After determining your needs to purchase a PC,it is most important to choose among the hardware and software alternatives available2. You can easily make expensive mistakes if youre uncertain about what you want a system to do3. We call the software that contain a word processor,spreadsheet and other programs an application suite4. A specific piece of software may determine which operating system you need to use.5. Selecting a operating system is the first thing in deciding the overall platform you will be looking for.6. Configuration decisions involve primarily determining the size of the machine desired.7. Besides the size of PC,the other specifications you should consider are the size of the hardware,type of removable storage,amount of memory,and so forth.8. After establishing a set of needs,it is absolutely necessary to make a checklist of the features youve determined4.11,The purpose of computer network is data communication and resource sharing.2,Network architecture is called a set of layers and protocols.3,There are two important network architectures the OSI reference model and the TCP/IP reference model.4,OSI reference model was proposed by application layer)5,OSI deals with connecting open system.6,TCP/IP reference model has two parts TCP and IP.7,Two end-to-end protocols in the transport layer are TCP and UDP.8,UDP is a connectionless protocol.9,TCP is connection-oriented protocol.10,The job of the network layer is to deliver IP packets.11,On top of the transport layer is the application layer.12,The application layer contains all the higher-level protocols, such as FTP,SMTP and so on.4.21,Local area network is a network that connects geographically close resources.2,Most LAN are of the client-server or peer-to-peer mode.3,Star topology is the most widespread topology for LAN.4,Ethernet product dominates the LAN world today.5,In LAN we have two access methods, they are randomly or in a deterministic order.6,CSMA/CD stands for Carrier Sense Multiple Access / Collision Detection.7,The 100Base-T Ethernet has a star address.8,Switches are basically multi-port bridges.9,Switch working at layer 2 users the MAC address.10,A bridge can learn which address reside on each of its ports.11,Using switches we can divide the network into a number of segments.12,The Gigabit Ethernet is developed based on the successes of Ethernet and fiber-optic communications.13,IEEE 802.11 standard uses CDMA,FHSS and DSSS techniques.14,IEEE 802.11a is designed for 5GHZ.15,WAP is used for accessing Web pages by mobile phones.5-11、 WWW is a large network of Internet servers.2、 Internet is the largest global internet-works.3、 ARPAnet is the landmark packet-switching network.4、 GUI is abbreviated from Graphical User Interface.5、 Many business correspondences are transferred via electronic mail.6、 IE is produces by Microsoft Corp.7、 We access a Web page by using a URL.8、 We can use the FTP to send or receive arbitrarily large files.9、 Many leading-edge network technologies come from Internet community.10、 Telnet is a standard terminal emulation protocol.6-11、 Until now there has always been a clear division.2、 You can dial in wherever your Internet Service Provider has a POP.3、 VPN expands the Intranet applications functionality.4、 The gateway router is the boundary between a private and public network.5、 A company can be assured that the connection is always available by using leased lines.6、 Intranets are typically used to communicate proprietary information.7、 A VPN can encrypt the data going between the salespersons laptop and the Intranet Web server.8、 VPN blurs the line between a public and private network.8-11. The process used to create a software product from its initial conception to its public release is known as the software development life cycle model2. There are many different methods that can be used for developing software,and no one is necessarily the best for a particular project.3. If your word processor or spreadsheet software has lots of little bugs or it just doesnt seem quite finished,it was likely created with the code-and-fix model4. A project using the waterfall model moves down a series of steps starting from an initial idea to a final product.5. Its not quite Utopia,but the spiral model goes a long way in addressing many of the problems inherent with the other models while adding a few of its own nice touches.6. The general idea behind the spiral model is that you dont define everything in detail at the very beginning.8-21. Requirements analysis answers “Will a computer help?”2. One of the goal of the background study in system analysis is to identify opportunities to improve systems performance.3. The word processor plays a central role in secretarys work.4. For a detailed functional specification a good understanding of the existing system serves as a basis.5. The first step of making a requirement list of your application is to make a list of potential applications.6. A system analyst would analyze an existing system.7. The requirement analysis is important because it plays a major role in determining the design of specific software and hardware systems.8. The analyst should always examine the existing system to see if needs can be met without a new system.9-11、The system software package that handles the difficult tasks associated with creating ,accessing,and maintaining database records Database management system(DBMS).2、Data written on index cards early database.3、MIS a network of computer-based data processing procedures.4、Database Computer programs are required to perform the necessary storage and retrieval operations.5、DBMS A software that can organize,process,and present selected data elements from the database.6、A database consisting of internally and externally produced data underlying MIS structure.7、Combining the horizontal managerial levels with the vertical specia

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论