




下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Chapter 1 Computers and Digital Basics 1A “All Things Digital”1. Data processing was the computing technology behind the first phase of the digital revolution.s hard dri2. Localsoftware refers to any software that is installed on a computer3. A computer network is a group of computers linked togethe
2、r to share data and resources.4. The process of converting text, numbers, sound, photos, or video into data that can be processed by a computer is calledigitization .5. Cloud computing provides access to information, applications, communications, and storage over the Internet.1 B Digital Devices” -c
3、omputer basics1.A computer is a digital device that processes data according to a series of stored instructions called a program or software.1. Computer data is temporarily stored in memory, but is usually transferred to storage where it can be left on a more permanent basis.2. Personalcomputers are
4、 available in desktop and portable models.3. A digital device, such as a computer, is called a(n) client,when it requests data from a server.4. A(n) microcontroller is a special-purpose microprocessor that is built into the machine it controls.5. A computer accepts input, processes data, stores data
5、, and produceosutput, according to a series of instructions.1C “Digital Data Representation ”1. Data representation refers to the format in which data is stored, processed, and transferred.2. Digital devices often use the binary number system to represent numeric data.3. Most computers use Unicode o
6、r Extended ASCIIcode to represent character data. (Hint: Use the acronym.)4. KB is the abbreviation forKilobyte.1D “Digital Processing”1. A(n) compiler converts all of the source code instructions into a new file containing object code.2. A microprocessor is hard-wired to perform a set of activities
7、 called a(n) instruction set.3. The ALU in your computer s microprocessor holdsrdeagtiastienr.4. The microprocessor s control unit contains ain(snt)ruction pointer< 指令指针 > that holds the address of the instruction being executed.5. The human-readable version of a program, createdi n a high-lev
8、el language by a programmer,is calledsource code.6. The ALU in your computer s microprocessor pseraforirtmhmetic and logical operations.7. The microprocessor co ntsrol unit fetches each instruction.1E “Password Security”1. An authentication protocol is any method that confirms a person s identity us
9、ing something the person knows, something the person possesses, or something the person is.2. On a(n)case-sensitive server, the user ID BJP is different from bjp.3. A(n) dictionary attack can guess your password if you are using commonpasswords or everyday words.4. A(n) phishing scam looks like a re
10、quest from your bank or an online payment service, but is actually a hacker who wants you to disclose your user ID and password.Chapter 2 Computer Hardware2A “Personal Computer Basics”1. A computer system unit houses the main circuit board, microprocessor, storage devices, and network card.2. Deskto
11、p and laptop computer platforms include PC, Mac, and Linux.3. Popular peripheral devices include printers, digital cameras, scanners,joysticks, and speakers.4. To determine whether two computers are compatible, you have to consider if they run the same software and use the same peripheral devices.5.
12、 A device driver is software usually run in the background without opening a window and is designed to help a peripheral device establish communication with a computer.2 B “Microprocessors and Memory ”1. A personal computer with an Intel Core i7 microprocessor is likely to operateat a speed of 3.4GH
13、Z.(Hint: Use the abbreviation.)2. A(n) front side bus is circuitry that transports data to and from the processor.3. 4004, 8088, Athlon, and Pentium are all types ofmicroprocessor.4. DDR2, virtual, and volatile are terms that apply to RAM. (Hint: Use the acronym.)5. The instructions for loading the
14、operating system into RAM when a computer is first turned on are stored in ROM. (Hint: Use the acronym.)6. A dual core processor allows a computer to execute multiple instructions at the same time to achieve parallel processing.7. RAM is volatile, which means that it cannot hold data when the comput
15、er power is off.8. A computer does not usually run out of RAM because it can use an area of the hard disk called virtual memory.2C “Storage Devices”1. Accesstime is typically faster for random-access devices than for sequential access devices.2. A magnetic storage device uses a readw-rite head to ma
16、gnetize particles that represent data.3. A hard disk drive that is rated at a speed of 7200 rpm<revolutions per minute>will give you faster access to your data than a drive rated at 5400. (Hint: Use the acronym.)4. CD-R technology allows you to write data on a disc, and then change that data.T
17、rueorfalse?False训以增加内容,但不能更改已经加入的内容 >5. A(n) SSD<Solid State Driveu>ses the same storage technology as a USB flash drive, but is not designed to be removable. (Hint: Use the acronym.)6. Accesstime is the average time it takes a computer to locate data on a storage medium and read it.7. A di
18、sk drive is a(n) random access device; a tape drive is a(n)sequential<M 序的 > access device.2D “Input and Output Devices”1. One type of graphics circuitry, referred to asintegrated graphics现成显卡 >, is built into a computer s system board.2. A(n) USB port provides one of the fastest, simplest
19、ways to connect peripheral devices. (Hint: Use the acronym.)3. In the context of computer display technology, response rate<响应率 > refers to the speed at which the screen image is repainted.4. The number of dots that form images and text on a monitor or printer is referred to as resolution<分
20、辨率 >.5. VGA, HDMI, and DVI are types of expansion ports that can be used for connecting a display device to a computer.Chapter 3 Software 3C “Installing Software and Upgrades”1. Most web applications require no installation and are accessedthrough a browser.2. On a PC, a(n)setup program guides yo
21、u through the installation process.3. Portable software can be copied to a flash drive and run without additionalinstallation.4. A(n) service pack is a set of patches that correct problems and address security vulnerabilities.3D “Buying Software” Software Copyrights and Licenses1. Copyright law allo
22、ws you to make an extra, or backup, copy of software as long as you do not defeat any copy protection mechanisms.2. Sharewarethat expires after a set period of time is often factory-installed on new computers.3. LibreOffice, Firefox, and Linux are examples of open source software that can be legally
23、 modified and redistributed.3E “Security Software”1. A computer virus can lurk< 潜伏 > in a computer for days or months, quietly replicating< 复制itself.2. A mass-mailingworm spreads to other computers by sending itself to all the addresses stored in the local e-mail client.3. A group of zombie
24、 computers controlled by a hacker is called a(nz)ombie.4. A virus signature is a unique section of malicious code that can be identifiedby antivirus software.Chapter4 Operating System and File Management4A “Operating System Basics”1. An operating system manages a computer rsesources,such as RAM , st
25、orage , and peripherals<:ffi过应用软件、设备软件和硬件 >.2. Most personal computer operating systems have multitasking capabilities so that they can simultaneously run two or more tasks, jobs , or programs.3. The core part of an operating system is called its kernel< 驻内存;提供最重要的服务:内存管理、文件夹访问 >.4. Duri
26、ng the boot process引动过程 >,a programW旨 BIOS> stored in ROM tells the hard disk to load the operating system Into RAM.5. Most computers today have graphical use门nterfaces*形用户界面 >.6. Microsoft windows featured the first graphical user interface .True or false? false<是微软是诗乐 >7. An open so
27、urce operating system called Linux is the foundation for several handheld operating systems, such as Symbian and Android OS.8. The two main software categories are application software and system software.4C “File System”1. .bmp , docx , exe , and . mov are examples of files extensions.2. A disk par
28、tition is a section of a hard disk drive that istreated as a separate storage unit.4D “File Management ”1. Logical file storage models , such as a filling cabinet or tree metaphor , help you visualize the organization of your computer2. A hard disk stores data in concentric circles called tracks , w
29、hich are divided into wedge-shapedsectors.3. The acronyms NTFS, HFS+, and MFT pertain to<从属于 > physical file storage models.Chapter 5 Local Area Networks5A “Network Building Blocks”1. A dorm-room network covers a limited area and is an example of a local area network.2. Each connection point o
30、n a network is referred to as a networknode.3. Communications protocols, such as TCP/IP,set standards for encoding and decoding data, guiding data to its destination, and mitigating the effects of noise.4. A(n) circuit switching< 电 路 交 换 > network establishes a dedicated connection between two
31、 devices, whereas a(n)packet switching network divides messages into small parcels and handles them on a first-come, first-served basis.5. IP Address can be assigned by an ISP or system manager, or can be automatically obtained from a(n) DHCP<Dynamic Host Configuration Protocoltl 态主机配置协议:自动分配动态地址
32、 > server.6. To connect to a LAN, a computer requires network circuitry, sometimes referred to as a network interface card<NIC>.7. A peer-to-peer network is simply a small version of a client/server network .8. True or false? False<p2网上各台计算机有相同的功能,无主从之分,一台计算机都是既可作为服务器,设定共享资源供网络中其他计算机所使用,
33、又可以作为工作站,没有专用的服务器,也没有专用的工作站 >9. A(n) dynamic IP address can be assigned to a network workstation by a DHCP server.5B “Wired and Wireless Technology”1. Todays most popular wired network technology is Ethernet and is defined by IEEE 802.3 standards.2. Wi-Fi is today s most popular wireless network
34、technology for LAN.Chapter 6 The Internet6A “Internet Technology ”1. TCP/IP is the primary protocol suite used on the Internet2. 204.127.129.1 is an example of an IPv4 address, True or False?Ture3. A(n) domain name server maintains a database of IP addresses thatcorrespond to addresses such as .4. M
35、ost ISP offer asymmetricVE对称 > Internet connections, meaning the downstream speed is faster than the upstream speed.5. The Internet backbone is a network of high-capacity communications links that provides the main routes for data traffic across the Internet.6. The top-level domain for most schoo
36、ls and universities isedu .7. On the Internet, TCPbreaks a message into packets, andIP is responsible foraddressing packets so that they can be routed to their destination.8. Computers on the Internet that act as servers use static IP addresses, whereas most other computers usedynamic IP addresses.6B “Fixed Internet Access”1. Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false?True.2. The two requirements for cable Internet service are circuitry to handl
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025-2030儿童社交能力发展的神经生物学基础及干预培训市场调研
- 2025-2030儿童植物观察教育的自然环境适配性研究
- 2025-2030儿童早期认知功能评估体系构建与临床应用前景分析
- 2025-2030儿童数字医疗产品在智力开发领域的医学合规研究
- 2025-2030儿童家具木材安全检测标准国际对比报告
- 2025-2030儿童发育数字化管理系统的医疗信息安全防护方案
- 2025-2030儿童冥想训练对前额叶皮层发育影响的fMRI研究及课程体系设计
- 2025-2030健身器材共享经济模式运营风险与对策报告
- 2025-2030健康家居理念下免漆门产品安全标准演进
- 2025-2030传统文化启蒙教育产品研发趋势与市场接受度调研
- 平舌音和翘舌音学习资料课件
- 免疫学MHC主要组织相容性复合体及其编码分子
- 医保基金监管
- 公司出差行程计划表excel模板
- 新产品APQP开发计划表
- ICU患者的早期活动
- LY/T 1145-1993松香包装桶
- JJF 1338-2012相控阵超声探伤仪校准规范
- GB/T 9114-2000突面带颈螺纹钢制管法兰
- 港口集团绩效考核方案
- 固体化学固体中的扩散
评论
0/150
提交评论