计算机文化复习知识点.doc_第1页
计算机文化复习知识点.doc_第2页
计算机文化复习知识点.doc_第3页
计算机文化复习知识点.doc_第4页
计算机文化复习知识点.doc_第5页
已阅读5页,还剩3页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Introduction to Computers(ALL)True/FalseIndicate whether the sentence or statement is true or false.1.The price of a microcomputer typically starts at several hundred thousand dollars and can easily exceed $1 million._2.The system unit is the case that holds the main circuit boards, microprocessor, power supply, and hard drive._3.A national ISP is probably better than a local ISP for people who travel frequently._4.Every Web page has a unique address called a URL (Uniform Resource Locator)._5.Web-based e-mail gives you the option of downloading your mail or leaving it on the server._6.You can usually identify the microprocessor when looking inside a computer, as it is the only chip on the motherboard._7.Cache size is not of particular significance to consumers because it is not configurable._8.A trackball looks like the tip of an eraser embedded in the keyboard of a notebook computer._9.User-executable program files have .exe filename extensions._10.Instructions written in machine language must be translated into a high-level language before a computer can use them._11.The Windows operating system gets its name from the rectangular work areas that appear on the screen-based desktop._12.If a file has the right extension for a particular application program, you will see it in the list of files that you can open with that software._13.An operating system maintains a list of files called a table for each storage disk, tape, CD, or DVD._14.Today, just about every computer uses one or more microprocessors as its CPU._ 15.A tablet computer is similar in size to a notebook computer, but features a touch-sensitive screen that can be used for input instead of a keyboard._16.A handheld computer, with add-ons, is powerful enough to handle all of the tasks performed by a desktop computer._17.Inexpensive add-ons to handheld computers make it possible to send and receive e-mail._ 18.Application software is a set of computer programs that helps a person carry out a task._ 19.Communication between all of the different devices on the Internet is made possible by HTTP (Hypertext Transfer Protocol), a standard set of protocols for electronically addressing and transmitting data._20.A password is a series of characters that verifies the user ID and is similar to a PIN._ 21.The computers and software that store and distribute Web pages are called Web clients._22.Any file that travels with an e-mail message is called an e-mail MIME._23.Most personal computers use Unicode, although Extended ASCII code is becoming increasingly popular._24.The prefix tera- means trillion._25.Most of the processors in todays Macs use RISC technology._26.Intel is continually upgrading its line of Pentium processors._27.An optical disk, such as a CD, is not susceptible to humidity, fingerprints, dust, magnets, or spilled soft drinks, and its useful life is estimated at more than 200 years._28.A trackball looks like the tip of an eraser embedded in the keyboard of a notebook computer._29.On most monitors, the viewable image does not stretch to the edge of the screen._30.Few of todays desktop operating systems provide multitasking capabilities._31.You should try to avoid storing your data files in subdirectories and should instead store them in the root directory of your hard disk._32.The Save option on the File menu saves the latest version of a file under its current name and at its current location._33.In Windows Explorer, a device icon can be opened by clicking directly on the icon, rather than on the plus sign._34.The File Allocation Table keeps track of a list of clusters and which are empty and which hold data._35.When a file is deleted, the clusters that contained the file are rewritten._36.Virus trigger events are often keyed to a specific date._37.Denial of Service attacks occur when useless network traffic overwhelms the networks processing capability and essentially brings all communications to a halt._38.Bogus virus e-mail messages usually contain a long list of people in the To: and Cc: boxes._39.A boot disk is a floppy disk or CD that contains the operating system files needed to start your computer without accessing the hard disk._40.Unlike fiber-optic cables, twisted pair and coaxial cables do not conduct or transmit electrical signals._41.Fiber-optic cable is a bundle of extremely thin tubes of glass._42.A parcel switching network divides messages into small parcels and handles them on a “first come, first served” basis._43.Most data communications systems implement synchronous protocol._44.An example of a Network Service Provider (NSP) is AOL._45.IP breaks a message or file into packets._46.IE and Firefox updates only cost $10 a year._47.The current trend is to use the term PDF to refer to any helper application or plug-in that helps a browser display a particular file format._48.A text editor is similar to word processing software._49.Java applets are sometimes blocked by network firewalls._50.Java applets are not allowed to open, modify, delete, or create files on your computer._51.JavaScript must be compiled into bytecode, but Java applets do not need to be compiled._52.ActiveX is supported by Netscape, Linux, and Mac OS, but not Microsoft Internet Explorer._53.You can use a scanner to convert a printed image into a bitmap graphic._54.A card reader acts just like an external disk drive by treating your memory cards like floppy disks._55.It is easier to edit an object in a vector graphic than an object in a bitmap._56.On Web pages, vector graphics appear with the same consistent quality on all computer screens._57.Video is easier to edit if you divide it into several files, each containing a one-to-two minute segment of footage._58.Some PDAs and smartphones can be configured to play digital videos, including movie trailers, TV shows, and even feature-length movies._59.Because of its cost, a workstation is often dedicated to design tasks, and is not used for typical microcomputer applications._60.A WAN provides connectivity within a limited geographical area, usually spread over several buildings._61.The coaxial cable that provides you with more than 100 channels of cable TV has a lower bandwidth than your home telephone line._62.The Domain Name System is a database stored on the main Internet computer._63.HTML tags work in pairs._64.The current trend is to use the term PDF to refer to any helper application or plug-in that helps a browser display a particular file format._65.In an HTTP communication, your browser opens a socket, connects to a similar open socket at the Web server, and issues a command, such as send me an HTML document._66.If you turn off cookies, you probably wont be able to make online purchases._67.Cookies use your name for identification purposes._68.Frames have fallen out of favor-probably because some Web designers littered Web pages with frames that remained on the screen even after visitors linked to other sites._69.The photos that you take with a digital camera are stored in the cameras memory modules until you transfer them to your computer._70.Bitmaps resize better than vector graphics._71.Bitmaps generally require less storage space than vector images.Modified True/FalseIndicate whether the sentence or statement is true or false. If false, change the identified word or phrase to make the sentence or statement true._1.The ALU uses registers to hold data that is being processed. _2.A(n) laser printer has a nozzle-like print head that sprays ink onto paper to form characters and graphics. _3.The self-installing executable file automatically unzips itself and starts the setup program. _4.A software license is a legal contract that defines the ways in which you may use a computer program. _5.A filename extension is usually related to the file schema. _6.A virus verification is usually a section of the virus program that outlines a unique series of instructions. _7.The Registry is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system. _8.A local area network that uses TCP/IP is called a(n) intranet. _9.Downstream transmission refers to the data that you send. _10.A Web page can be stored as a file called a(n) ISP document. _11.Java is a high-level programming language developed by Sun Microsystems that has become a popular programming tool for Web-based projects. _12.Small Java applications are call Java controls. _13.When you save a file, you must provide it with a valid filename that adheres to specific rules, referred to as file-naming rubrics. _14.Some operating systems contain a list of extended words that are used as commands or special identifiers. _15.A file specification is also sometimes known as a(n) route. _16.Gradients can be used to create shading and three-dimensional effects. _17.Like vector graphics, 3-D graphics are stored as a set of instructions. _18.A CD rapper grabs tracks from an audio CD and stores them in Wave format. _Multiple ChoiceIdentify the letter of the choice that best completes the statement or answers the question._1.A _ computer is similar in size to a notebook computer, but features a touch-sensitive screen that can be used for input.a.PDAb.tabletc.desktopd.microcomputer_2.A(n) _ is typically used as an electronic appointment book, address book, calculator, and notepad.a.ADP (Automatic Data Processor)b.PAD (Personal Assistant Device)c.PDA (Personal Digital Assistant)d.DPA (Digital Processor Automaton)_3.The term _ device designates equipment that might be added to a computer system to enhance its functionality.a.digitalb.systemc.diskd.peripheral_4.Most Web pages contain _ to related documents and media files.a.iconsb.keysc.linksd.passages_5.A group of Web pages is usually referred to as a Web _.a.book.b.pamphlet.c.place.d.site._6._ is similar to POP but it gives you the option of downloading your mail or leaving it on the server.a.SMTP (Simple Mail Transfer Protocol)b.IMAP (Internet Messaging Access Protocol)c.PIN (Private Identification Number)d.URL (Uniform Resource Locator)_7.The microprocessors _ unit fetches each egratedc.circuitd.control_8._ is a temporary holding area for data, application program instructions, and the operating system.a.ROMb.CMOSc.Disk storaged.RAM_9.Unlike disk storage, most RAM is _.egratedc.non-volatiled.volatile_10.If a program exceeds the allocated space in RAM, the operating system uses an area of the hard disk called _ memory to store parts of a program or data file until they are egrated_11._ alignment refers to the horizontal position of text.a.Documentb.Characterc.Paragraphd.Leading_12.A _ is a number that you want to use in a calculation.a.labelb.valuec.referenced.cell_13.A _ is any text that is used to describe data.a.labelb.captionc.rosterd.key_14.A _ holds one item of data relevant to a record.a.fieldb.recordc.structured.table_15.Database software is also referred to as _.a.DBMSb.structured softwarec.rolodexd.archival_16.A single database _ is similar to a Rolodex or an index card.a.fieldb.recordc.tabled.None of the above_17.On a PC, the root directory is typically identified by the device letter followed by a(n) _.a.forward slashb.ampersandc.colond.backslash_18._, such as MCI, Sprint, or AT&T, supply ISPs with access to high-speed transmission lines that form the backbone of the Internet.a.DNSs (Domain Name Servers)b.E-mail Serversc.NSPs (Network Service Providers)d.Web Servers_19.An Internet utility called _ sends a signal to a specific Internet address and waits for a reply.a.Tracerouteb.PING (Packet Internet Groper)c.ICMP (Internet Control Message Protocol)d.PANG (Packet Acoustic Networking)_20.Many Internet connection methods provide faster _(the data you receive) transmission rates than _ (the data that you send) rates.a.downstream,upstreamb.upstream,downstreamc.outer bank,inner bankd.inner bank, outer bank_21.The Web is based on the concept of _, a collection of documents that can be related by links.a.hypertextb.cookiesc.portsd.tags_22.Your browser displays an error message when a Web server sends a _ status code to indicate that the requested resource does not exist.a.200b.404c.500d.303_23.A _ signal represents the absence of color.a.0b.1c.56d.255_24.Scanners and digital cameras commonly store bitmaps in _ format because it supports True Color and can be easily converted into other graphics file formats.a.BMPb.TIFFc.PCXd.GIF_25.One of the big disadvantages of _ is that it is not suitable for vocals.a.MIDIb.RealAudioc.AIFd.MP3Short Answer1.What is the single most important characteristic that distinguishes a computer from other simpler and less versatile devices, such as calculators and hand-held electronic dictionaries?2.What is the difference between downloading and uploading?3.What is a search engine?4.How can you protect the data on a floppy disk?5.What is document production software?6.What is a copyright?7.What is the difference between the Save and Save As options?8.Briefly describe a peer-to-peer network.9.When XML is described as being extensible. What does this mean?10.What are the most popular scripting languages? Name two other alternative s

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论