




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、1. A Di_ copy is a copy of a current file made in order to protect against lossor damage.备份拷贝是为了防止丢失或损坏而制作的当前文件的副本。A. softmost commonly used tool in the design phase is the D在设计阶段最常用的工具是结构图chartchart chart3. A refers to the parts of the computer that you can see and touch.硬件指的是你能看到和触摸到的电脑的各个部分A. Har
2、dware4. if we want to retrieve data from the database with SQL,we should use the comand of D如果我们想用SQL从数据库中检索数据,我们应该使用comandA. ins ert ate ete ect of the following is not the stages of programming?AF面哪个不是编程的阶段A. Print the program.the program.the program.a program.will become increasingly _B_ througho
3、ut every aspect of our lives.多媒体将在我们生活的各个方面变得越来越普遍A. precisethrough the Internet, the_C performs the reverse function.通过Internet进行通信,数据通信设备(DCE执行反向功能。A. CRT station controller (STACO) communications equipment (DCE) languages must first be translated into a(n) C language before they can be understood
4、 and processed by a computer高级语言必须首先被翻译成(n)机器语言,然后才能被计算机理解和处理。_A can reduce the amount of data sent or stored by partially eliminatinginherent redundancy.数据压缩可以通过部分消除固有的冗余来减少发送或存储的数据量。A. compression does Tim Berners-Lee's description about Web mean?D蒂姆伯纳斯-伯纳斯关于的描述是什么意思?Web 2 0是万维网上的一场革命is an ent
5、irely new concept.is a very popular now.is not defined clearly.is an revolution in the World Wide Webdo business through D.电子商务通过互联网和 EDI进行业务A. wire-photo meetingand EDI a B is used, all the devices in the network are connected to a single cable.当使用总线网络时,网络中的所有设备都连接到单个电缆。A. network network . network
6、networkD is used to communicate with another computer over telephone lines.调制解调器是用来与另一台计算机通过电话线进行通信的A. mouseis a single-language platform; calls from/to objects in other languages are possible through D , but this kind of support is not a ubiquitous part of the platform.J2EE是一个单一语言的平台;通过CORBA可以使用其他语
7、言的对象调用,但是这种支持并不是平台 中普遍存在的一部分。A. CLR15.(C )as a significant majority of market share in the desktop微软Windows占桌面市场份额的绝大部分A. Mac OS B. unix C. Microsoft Windows | D. linux insisted on leaving early (D ) I told him not to.他坚持要早走,尽管我告诉他不要这么做。A. butmemory which is stored on chips locatedD .存储在主板上的芯片上的主存A.
8、 on the CPUthe processorthe motherboard18. what does " neural network " mean?C神经网络”是什么意思A.精神网 B.自然网络C.神经网络D.社会网络19. Hardware components are used for the purpose of (B ).硬件组件用于上述所有的目的A. central processing B. all oflhe above C. input D output20. Small as it is, a personal computer can perfor
9、m the same program instructions as ( C).尽管它很小,但个人电脑可以执行与大型计算机相同的程序指令A. typewriter B. printersC. larger computers I D. human beings21. The A hidden in the infected system does not break out immediately;instead, it needs certain time or some condition before it breaks out.隐藏在受感染系统中的病毒不会立即爆发;相反,它需要一定的时
10、间或某种条件才能爆发.A. virusB. fileC. dataD. software22. “Multimedia " means that B.“多媒体”意味着它可以同时完成所有的工作。A. it can show a graph.B. it can do all above at the same time.B. C. it can play musicD. it can rotate a three-dimensional model.23. D is an architectural framework.wwwH一个架构框架。A. Dns B. httpC. ftp D.
11、 wwwthe following devices, which is NOT included in the list of the core components of modern computers B在以下设备中,不包括在现代计算机晶体管的核心组件列表中。A. RAM B. Transistor (晶体管) C. Microprocessor D. Chiplarger the system of the computer, the greater its ( A).计算机系统越大,存储容量就越大A. storage capacity I B. neither A nor BC. p
12、rocessing speedD.both A and B27. There are _B_ separate products that form the Windows 2000。有四种独立的产品构成了 Windows 2000。A. only one B.即rC. twoD. three28. The purpose of the A is to provide fully integrated analog services to users.AA的目的是为用户提供完全集成的模拟服务。A. ISDN B. HTTPC. WWW D. FTP29. Most operating syst
13、em have a standard set of A to handle the processing of all input and output instructions.大多数操作系统都有一组标准的控制指令来处理所有输入和输出指令的处理A. control instructions B. spreadsheet C. I/O operation D. data table30. In the system development process, (C ) and pseudocode are tools used by programmers in the implementati
14、on phase.在系统开发过程中,流程图和伪代码是程序员在实现阶段使用的工具A. object-relationship chart B. structure chartC. flowcharts D. toplogicchart31. Which of the following RDBMS is not open source according to this article? B根据本文,下列RDBM中哪一个不是开源的A. MySQL B. SQL ServerC. SQLiteD. PostgreSQL32. A(n) D is usually a computer install
15、ed with the necessary software and allows two networks, each with a completely different set of protocols, to communicate.网关通常是安装了必要软件的计算机,并允许两个网络,每个网络都有一个完全不同的协议集,用于 通信。A. RouterB. hubC. switchD. gateway33. A hardware or software malfunction can cause a system to (D ).硬件或软件故障会导致系统崩溃A. crackB. crush
16、C. collideD. crash34. A companyx s ability to deploy and support customer-oriented (B ) systems will be of vital importance to its prosperity.一家公司部署和支持以客户为导向的电子商务系统的能力将对其繁荣至关重要。A. e-LearningB. BusinessC. e-ShoppingD. e-Banking35. The abbreviation USB stands for Universal (B ) Bus.通用串行总线的缩写是 USBA. Sy
17、mmetricB. Serial | C. SyntacticD. Sequential36. In the system development process, the code is written in the B phase.在系统开发过程中,代码是在实现阶段编写的。A. testing B. implementationC. analysis D. design37. Visual Basic has C versions.Visual Basic 有三个版本。A. two B. one C. three | D. fo38. He was glad to find the fir
18、e(B ) brightly.他很高兴地发现火在熊熊燃烧。A. have bumB. b.ningC. burnedD. to bum39. In the system development process, the system analyst defines the user, needs, requirements and methods in the (B ) phase.在系统开发过程中,系统分析人员在分析阶段定义用户、需求、需求和方法A. DesignB. analysisC. testingD. implementation40. Chemical energy, (C ) f
19、rom fuel or other matters, can be transformed into heat energy.化学能,无论是燃料还是其他物质,都可以转化为热能。A. no matter how B. if or not C. whether D. not considered that41. Whereas a repeater operates only in the physical layer of the OSI model, a bridge operates in both the physical layer and the A layer of the OSIm
20、odel.A. data-link B. Physical Layer C. Transport Layer D. Network Layer42. Assembly-language instructions are a series of Dsystem is basedmachine codes B. words C. 0s and 1s D. abstract codes43. Whereas the decimal system is based on 10, the D on 2. There are only two digits in the latter system, 0
21、and 1.B. byte C. bit D. binary can come with me to the museumthis afternoon (B ) you don' t mind walking for half an hour.A. so far as B. if C. unless D. exceptis a storage location inside the processor.A. ALU B. Memory C. Control D. A register46. Which of the following items is NOTthe tradition
22、al tools for artists in Painter?A. Color pencil Bl Charcoal C. Felt pens C .Pattern pens47. if we want to retrieve data from the database with SQL,we should use the comand of ( A)A. selec 11 B. upda t e C. inser t D. dele t e48. The RGB value is composed of _D components.A. two B. four C. three D. o
23、ne49. A _ B is a device that enables the computer to handle sounds.A. network card B. sou,card C. monitor D. video card50. In the system development process, modularity is a very well-established principle used in the B phase.A. implementation B. design C. analysis D. testing51. All computers can pe
24、rform basic machine operations under the control of (A ).A. programs B. commands C. instructions D. operations52. Many viruses go resident in the memory like a (A ).A. tsr program B .exe file C. data file D. file53. Which of the following events did happen latest in the development of Painter? AA. C
25、orel Painter Sketch Pad was launched B. Painter 1 2 was releaseB. Painter was acquired by Corel Corporation. D."Floaters " were released withPalter54. Dis a word processing tool that helps you to crea t e quality documents.A. Outlook B. Excel C. Access D. Word |55. With Windows, you can ru
26、n several powerful applications at once and switch quickly ( A) them.A. among B. in C. between D. on56. According to Intel,there are B stages in the evlolution of eBusiness.A. Three B. F.r C. Two D. One57. Just a minute, I ' m waiting for the computer to ( C) up. It won' t take longto start
27、it.A. scroll B. log C. boot D. activate58. _C_ is a fast and powerful operating system, based on the UNIX .A. Windows 98 B. Office 2000 C. Linux D. Windows 200059. lease find the item that is not belong to the DBA C.A. integrity constrain specification B. schema definition C. DDL D. storage structur
28、e and access method definition60. The _C serves as an interface between hardware and software.A. application program B. system C. operating system D. controlunit61. According to BusinessWeek, the attacks reported in the first half of 2003 nearly match previous year's total number . CA. 86404 B.
29、34,876 C. 76,404 D. 56,35462. Which of the following emerged first in the history of software engineering?DA. Code repositories B. Commercial OOP languageC. Extreme programming D. Optimizing inspections63. A(n) ( ) is a connecting device that only regenerates the signal. CA. switch B. huB C. repeate
30、r D. router64. A(n) ( ) is usually a computer installed with the necessary software and allows two networks, each with a completely different set of protocols, to communicate.A. huB B. gateway,. switch D. router65. A computer virus is a computer program that is created to make and spread of itself.
31、DA. files B. programs C. virus D. copies66. Trojan Horses . AA. allow hackers to take control over a particular system or to steal very importantB. infect the computer without even having to click open email attachment or any program. C. quickly replicate itself and gradually attache to files, progr
32、ams or the hard drive.C. avoid the virus to attack computer67. A periodic refresh is needed to restore the information for the AA. DRAM B. SRAM C. EPROM D. EEPROM68. A virus is a DA. bad man B. beast C. computer D. program69. The display screen is the most common _C device used to show you what thec
33、omputer is doing.A. input B. electronic C. output p. printing70. A Website is often more effective as a(n)C tool than a sellingtool.A. Electronical B. Politic C. Marketing D. Techni,a71. We ll go to Paris for our holiday, (B ) it isnt too expensive.A. except B. unless C. so far as D. provided72. Wha
34、t does the phraseframe-based " mean appearing at the beginning of thearticle? CA. All generations of Ethernet base on the same architecture formats and the same interfaces for higher layers.B. All generation of Ethernet conform to the multi-layers structure of the OSI reference model.C. All gen
35、erations of Ethernet are built on improving infrastructure from coaxial cable to twisted pair.D. All generations of Ethernet base on the same physical layer as the underlyingframe.73. Anti-Virus protects your computer from viruses by ( C) your computer / s memory and disk devices.A. changing B. dele
36、ting C. scanning D. replacing74. C_ printers are being phased out and replaced by printers that can produceclean type.A. Drum B. Inkjet C. Dot-matrix D. Lasert ed within the75. In SQL,(B )causes an object (a table, for example) to be crea database.A. ALTER B.| crea t e C. dr op D. TRUNCATE76. The la
37、rgest and fastest computers are ( D).A. workstations B. hand-held PCs C. mainframe computers D. supercomputers77. These days it is not uncommon for one to see people usingBeverywhere-even on airplanes.A. microcomputers B. laptops C. desktops D. minicomputers78. To access a page on the WWW, one needs
38、 a (B ) that usually consists of three parts: a controller, a method, and an interpreter.A. password B. browser C. router D. code79. A C is a set of rules that controls the interaction of differentdevices in a network or internetwork.A. query B. dialog C. protocol D. model80. Each C is a unit of bot
39、h atomicity and consistency.A. schema details B. database C. transaction D. storage structure81. The distinction between the two terms gateway andBisdisappearing. They are now used interchangeably.A. swtich B. router C. hub D. gateway82. The attributes of the stack are (A ).83. The prisonersA. FIFO
40、B. LIFO C. built into their circuitry D. queuerequest (A ) more and better food is now consideration.A. for, under B. for, into C. for, on D. for, in84. Among the following products, which appeared the earliest during the computer software development history? AA. WordStajB. Space war C. MS-DOS D. V
41、isiCalc spreadsheet85. A(n) translates all the source code of a program written ina high-level language into object code prior to the ex ecution of th program. AA. compiler B. interpreter C. assemblers86. Which of the following is RIGHT about the infection strategies of viruses?BA. All original viru
42、ses must modify the copies in metamorphic viruses for spreaB. The success of viruses all relies on their fast infection rate to spreaC. All viruses pretend that they are executable files in order to replicate themselves.D. Viruses may take advantage of present network services to facilitate their sp
43、reaA.87. The OSI model has A layers.even B. four C. six D. five88. For some time, we ve been experiencing some ( ) in this particular program.It cannot run in a normal way. CA. defaults B. loops C. bugs D. routines89. The infamous “Michelangelo " D strikes thousands of computers every year on M
44、arch 6th.A. cracker B. hacker C. disease D. virus90. One of the differences between C# and Java is that Java runs on any platform with a Java Virtual B while C# only runs in Windows for the foreseeable future. A. Hardware B. Machine C. Program D. Software91. In the following descriptions, which is R
45、IGHTabout the functions of CPUsocket?A.All above.B. A CPU socket houses a CPU on motherboarC. A CPU socket provides heat sinkD. A CPU socket forms an interface both with the CPU and the PCB92. Videodisc and laser technology provide the ability to_BA. create some education files B. cost moreB. store
46、large amounts of data D. enhance other forms of education93. Which of the following is NOT attached to the motherboard via edge connectors and cables in a typical desktop computer? AA. Microprocessors BlControllers for video displayB. Peripheral devices(外部设备)D. External storage94. In the case of a(n
47、)D , a program is translated into e x ecutableform and e x ecuted one statment at a time rather than being translated completelybefore e x ecution.A. Debugger B. compiler C. assemblers D. interpreter95. D uses commandsthat are easier for programmers to understand than aremachine language commands.A.
48、 C language B. C+ language C. High-level language D. Assembly language96. is the ( ) model for .NET-based applications. (data access) AA. data access B. data achieve C. data mining D. data process97. ()that ,I could do it much better. AA. Were I do B. If I do C. Were I to do D. If I were do98. The r
49、aw data are stored on the disk using the AA. file system B|DBA C. DBMS D. data dictionary99. Why does the author give the example of Bliss?CA. To argue that the Bliss virus has characteristic of viruses as opposed to worms.B. To argue that the Bliss virus only remains chiefly a research curiosity.C.
50、 To argue that other operating systems may run viruses, not just Windows.D. To argue that the Bliss virus could be harmless even if user ran it on Unix.'s identity.100. Confidentiality of the message is not enough in a secure communication; (D ) is also needed. The receiver needs to be sure of t
51、he senderA. encryption B. authorization C. encapsulation D. authentication101. A(n)B is a sequence of code in a program e x ecutedrepeatedly,either fro afixed number of timesor until a certain condition is met.A. sel _ ected B. Lop102. The Whale will crea t e (D ) different versions of itself when i
52、t infects files.A. 32 B. 31 C. 30 D. 33103. A machine language is a(n) (B ) language in binary code that the computer can understand and e x ecute directly.A. flat level B. low-leel C. B D. high-level104. Which one is not a computer languages? _C_A. C+ B. CC. word 2000D. PASCAL105. The abbreviation
53、HTTP stands for HypertextA Protocol.A. Transfer Bl Transmission C. Transition D. Transportation106. Windows gives you more control over the _B you work.A. power B. operation C. energy D. way107. A mouse is a small device that a computer user pushes across a desk surface in order to point to a place
54、on a B and to select one or more action totake from that position.108.A. desktop B. display C. console D. platformWhich of the following items should be used for collecting and customizingcommon operations?Ba sequence ofA. Primary Key B. Stored Procedures C. Indices D. Foreign Key109. Computer progr
55、amming is the process of planning and creatingD for a computer to follow.A. process B. lines C. graphics D. steps110. The history of programming languages can be traced back almost to theinvention of the C computer in th 1940s.A. electrical B. biologic C. digital D. analog111. Whenmost people think
56、of opening a Webbusiness,the first thingthat springsto mind is selling products or B online.sharing andoneA. quality B. services C. consciousness112. Two common applications of LANs are B resource information resource sharing.A. software B. hardware C. computer D. network113. ( ) is built around hypertext andA. HTTP B. DNS C. The Web D. FTP114. In 2000, the number of viruses topped ( C).A. 500 B. 1000 C. 50000 DI7500115. A is a network protocol used to transfer data from computer to another through a network such as the Internet.A. FTP B.
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 推拿治疗学试题附答案详解【综合题】
- 解析卷-黑龙江省虎林市中考数学真题分类(数据分析)汇编定向练习试题(解析卷)
- 组合逻辑电路分析与设计试题及答案
- 2025年学前教育机构师资队伍教师培训与课程设计研究报告
- 济南先行投资集团有限责任公司及权属公司招聘笔试题库参考答案详解
- 2025年智能物流系统研发资金申请报告
- 考点解析-北师大版8年级数学上册期中试题及答案详解一套
- 2025至2030年中国硫铝酸盐水泥行业发展前景及投资战略咨询报告
- 2025年深海矿产资源勘探技术深海资源勘探技术产业发展与政策支持报告
- 2025年肿瘤早筛技术在宫颈癌早期诊断中的应用前景与市场潜力报告
- 2025年行政管理学专业试题及答案
- 校园绅士淑女教育实施纲要
- 企业安全管理机构的主要职责
- 2025至2030国内外海洋工程防腐应用趋势行业产业运行态势及投资规划深度研究报告
- 2023年生态环境综合行政执法考试参考题库(400题)
- 巡检员质量培训
- 胸腹瘘个案护理
- 护理课程思政讲课
- 2025年蜀道集团招聘笔试参考题库附带答案详解
- 《实践论》《矛盾论》导读课件
- 小学生防欺凌课件
评论
0/150
提交评论