版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、计算机专业英语多选题 1.a user interface we said here is _abc_ a. a text-based user interface or gui b. an interface between a computer and its peripheral device c. an interaction between an operating system and a user d. an interaction between an application program and a user 2. a provides transparent transf
2、er of data between end users, providing reliable data transfer services to the upper layers. a. the transport layer b. session layer c. network layer e. application layer e. presentation layer 3. many viruses do harmful things such as (abcd ). a. deleting files b. slowing your pc down b. simulating
3、typos d. changing random data on your disk 4. we can classify programming languages under two types:(ab ) languages and ( )languages. a. high-level b. low-level c. advanced-level d. basic-level 5. with an internet connection you can get some of the basic services available are:_abcd_ a. e-mail b. te
4、lnet c. ftp d. usenet news 6. a general purpose computer has four main sections: ( abce). a. the control unit b. the memory c. the input and output devices d. the cpu e. the arithmetic and logic unit (alu), 7. windows 2000 has the key technologies, they are (abcd ). a. security b. active directory c
5、. flat directory d. enterprise management 8. the register file is_acd_ a. addressed by much shorter addresses b. physically large c.physically small d. one the same chip as the cpu 9. a stack protocol can be used for (a ). a. removing the latest element ins( )erted b. removing the earliest element i
6、ns( )erted c. subroutine calls d. operation of arithmetic expressions 10. the end equipment in a communication system includes (abcd ). a. printers b. computers c. crts d. keyboards 11. microsoft office professional 2000 include_abcd_. a. excel 2000 b. powerpoint 2000 c. word 2000 d. outlook 2000 12
7、. a general purpose computer has four main sections: abce a. the input and output devices b. the memory c. the arithmetic and logic unit (alu), d. the cpu e. the control unit 13. the two most common types of scanners are (bc ) and ( ) a. hand-held scanners b. flatbed scanners c. auto scanners d. han
8、dler scanners 14. some viruses use (cd ) and ( ) techniques to hide their existence. a. quickly spread b. replace a part of system software c. stealth d. polymorphic 15. the windows 2000 product line includes_abcd_. a. windows 2000 datacenter server b. windows 2000 professional c. windows 2000 serve
9、r d. windows 2000 advanced server 16. similar to viruses, you can also find malicious code in (abc ). a. trojan horses b. logic bombs c. worms d. microsoft word documents 17. viruses all have two phases to their eecution, the ( ) and the ( bd). a. creae phase b. attack phase c. del( )ete phase d. in
10、fection phase 18. active directory can help you (acd ). a. get off the limits of down level networks b. deliver complete enterprise security by itself c. build a complex international network d. manage every resource with a single logon 19. high-level languages are commonly classified as (acde ). a.
11、 object-oriented b. automatic c. functional d. logic languages e. procedure-oriented 20. (cd )is a type of eecutable file . a. txt file b. jpg file c. exe file d. com file 21. ( abcd) maybe a certain cause that some viruses infect upon. a. an external event on your pc b. a day c. a counter within th
12、e virus d. a time 22. (bc )is a type of eecutable file . a. txt file b. exe file c. com file d. jpg file 23. the web browsers which is normal used, such as(abce ). a. firefox b. internet explorer c. opra d. icq e. apple safari 24. newer ideas in l 25. microsoft windows currently supports ac and file
13、 systems a. ntfs b. ocfs c. fat d. ext2 e. nilfs 26. modem is _acd_. a. a modulator/demodulator b. a data set c. a demodulator d. a modulator 27. the equipment ab. a. transfers the number of bits in serial form b. manipulates digital information internally in word units c. transfers the number of bi
14、ts in parallel d. manipulates digital information internally in serial form 28. electronic commerce that is conducted between businesses is referred to as business-to-business or d a. c2c b. c2b c. e-commerce d. b2b 29. the world wide web also subsumes previous internet information systems such as (
15、ac ). a. gopher b. ftp c. ftp d. telnet 30. ado.net relies on the services of .net data providers.there are abcd a. connection b. data adapter c. datareader d. command 31. the development process in the software life cycle involves four phases: analysis, design, implementation, and acde. a. analysis
16、 b. audit c. implementation d. design e. testing 32. the end equipment in a communication system includes abcd. a. printers b. crts c. computers d. keyboards 33. in electronic commerce ,information search and discovery services include (abcde ). a. search engines b. information filters c. software a
17、gents d. directories e. electronic catalogs 34. gis work with two fundamentally different types of geographic models.they are the (bd ). a. geography model b. vector model c. mathematic model d. raster model e. data model 35. the two most common types of scanners are ac and a. flatbed scanners b. ha
18、nd-held scanners c. auto scanners d. handler scanners 36. windows 2000 has the key technologies, they are ( abcd). a. active directory b. flat directory c. enterprise management d. security 37. computer software, or just software is a general term used to describe a collection of computer programs,
19、procedures and documentation that perform some tasks on a computer system.the term includes: abc a. firmware which is software programmed resident to electrically programmable memory devices on board mainboards or other types of integrated hardware carriers. b. application software such as word proc
20、essors which perform productive tasks for users. c. middleware which controls and co-ordinates distributed systems. 38. software engineering is related to the disciplines of ade a. project management b. natural language c. netural network d. systems engineering e. computer science 39. what make it i
21、s difficult to agree on how to count viruses? abcd a. some viruses can creae different versions when they infect other programs b. just a trivial change may creae a new virus c. some viruses can use polymorphic technique d. new virus arise from an existing virus 40. a virus is a program that reprodu
22、ces its own code by (abc ). a. inserting into the middle of a file b. simply placing a pointer c. adding to the end of a file d. replacing another program 41. input devices include: _abcd_. a. the keyboard b. microphone c. touch screen d. the mouse 42. viruses all have two phases to their eecution,
23、the ( ) and the ( ad). a. attack phase b. creae phase c. delete phase d. infection phase 43. the equipment (bc ). a. manipulates digital information internally in serial form b. manipulates digital information internally in word units c. transfers the number of bits in serial form d. transfers the n
24、umber of bits in parallel 44. office automation is_cd_. a. . the computer b. communications technology c. the application of computer d. used to improve the productivity of people 45. the types (classes, structs, enums, and so on) associated with each .net data provider are located in their own name
25、spaces are: abcde a. system.data.sqlclient. contains the sql server .net data provider types. b. system.data.odbc. contains the odbc .net data provider types. c. system.data. contains provider-independent types such as the dataset and datatable. d. system.data.oracleclient. contains the oracle .net
26、data provider e. system.data.oledb. contains the ole db .net data provider types. 46. c+ is _acd_. a. extended from c b. a superset of c c. object-oriented d. procedure-oriented 47. some viruses, with no attack phase, often damage the programs or disks they infect because they (ad ). a. have bugs in
27、 them b. show messages on your screen c. steal storage d. contain poor quality code 48. windows 2000 is ( a). a. an inventive technology b. used for building a scalable network b. the same as windows nt d. new lease of windows 49. some common applications related to electronic commerce are the follo
28、wing: a. teleconferencing b. online banking c. email d. instant messaging e. enterprise content management f. newsgroups g. shopping cart software 50. a program is a sequence of ( ) that can be eecuted by a computer.it can either be built into the hardware or exist independently in the form of (bc ). a. hardware b. software c. instructions d. data 51. electronic payments include abcd. a. credit card payments b. electronic checks c. digital currencies d. cash payment 52. the web browsers which is normal used, such asabcd. a. opra b. internet explorer c. firef
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- Z商业银行私人银行业务优化研究
- 2026儿童博物馆教育功能开发与学校合作模式创新研究报告
- 口腔护理技能培训课程
- 深度解析(2026)《GBT 26821-2011物流管理信息系统功能与设计要求》
- 人工鼻的清洁与消毒护理规范
- 深度解析(2026)《GBT 25441-2022 吸尘器电机》
- 深度解析(2026)《GBT 24421.1-2023服务业组织标准化工作指南 第1部分:总则》:引领服务新时代的标准化体系构建之道
- 下肢动脉闭塞症的康复新方法
- YDT 2092-2015《网上营业厅安全防护要求》(2026年)宣贯培训
- CYT 32-1999《再生阳图型PS版》(2026年)宣贯培训
- 成都市河湖水生态综合治理技术导则
- 职业技术学校《直播运营实务》课程标准
- NB-T42011-2013往复式内燃燃气发电机组气体燃料分类、组分及处理技术要求
- NB-T+10488-2021水电工程砂石加工系统设计规范
- 合理用药知识健康讲座(完美版)课件
- 多格列艾汀使用指南2024课件
- 中考必备1600个词汇核心
- 安监部门加油站重点检查内容
- 《论语》知识考试参考题库(含答案)
- 院前急救诊疗常规和技术操作规范2022版
- 英语答题卡2023年全国小学生英语能力测评(NEPTP)低年级组
评论
0/150
提交评论