计算机科学导论 (全英版)课后问答

计算机科学导论 (全英版)课后问答
计算机科学导论 (全英版)课后问答

CHAPTER1

1.Explain the five parts of an information system.What part do people play in this system?

An information system has five parts: people, procedures, software, hardware and data.

People: Are end users who use computer to make themselves more productive.

Procedures: Specify rules or guidelines for computer operations.

Software: Provides step-by-step instructions for computer hardware.

Hardware: Processes the data to create information.

Data: Consist of unprocessed facts including text, numbers, image and sounds.

People are the most important part of any information system.

2.What is system software? What kinds of programs are included in system software?

System software helps the computer manage its own internal resources. It includes three kinds of programs: operating systems, utilities and device drivers programs.

3.Define and compare basic and specialized application software. Describe some different

types of basic application software. Describe some types of specialized applications.

Basic applications are the kinds of programs to be considered computer competent.

Specialized applications are more narrowly focused on specific disciplines and occupations.

Basic applications have some types, such as browser, word processor, spreadsheet ,and so on.

Also specialized applications have many types, some of the best known are graphics, audio and video, multimedia, Web authoring ,and artificial intelligence programs.

4.Describe the different types of computer. What is the most common type? What are the

types of microcomputers?

There are four types of computers: supercomputers, mainframe computers, minicomputers, and microcomputers.

Supercomputers are the most powerful type of computer.

Mainframe computers occupy specially wired, air-conditioned rooms, they are capable of great processing speeds and data storage.

Minicomputers are refrigerator sized machines.

Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of computer.

Microcomputers are the most common type of computers.

There are four types of microcomputers: Desktop computers, Notebook computers, Handheld computers and PDA.

5.What is connectivity? How are the wireless revolution and connectivity related? What is

a computer network? What is the Internet? What is the Web?

Connectivity is the capability of you microcomputer to share the information with other computers.

Wireless revolution dramatically affect connectivity.

A computer network is a communications system connecting two or more computers.

Internet is the largest network in the world.

The Web provides a multimedia interface to the numerous resources available on the Internet.

CHAPTER2

1.Discuss the uses of the Internet. Which activities have you participated in? Which one do

you think is the most popular?

The most common uses of the Internet are the following: communicating, shopping, searching, entertainment, education, and so on. I have participated in almost all of them. I think communicating is the most popular.

2.Explain the differences between the two most common types of providers.

The two most common types of providers are National and wireless.

National service providers provide access through standard telephone connections.

Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.

3.What are the basic elements of an e-mail message?

A typical e-mail message has three basic elements: header, message and signature.

4.What is social networking ? Describe the three types if social networking sites.

Social networking is the grouping of individuals into specific groups. There are three basic categories of social networking sites: reuniting, friend-of-a-friend and common interest Reuniting sites are designed to connect people who have known one another but have lost touch.

Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.

Common interest sites bring together individuals that share common interests or hobbies.

5.Describe the different types of search engines. Given an example of the type of search

each engine is best for.

There are three types of search engines: crawler-based search engines, metasearch engines and specialized search engines

Crawler-based search engines, such as Google, create their listings automatically. Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates, orders the hits, and then provides the edited list to you .one of the best known is Dogpile. Specialized search engines focus on subject-specific Web sites. such as Environment.

CHAPTER3

1.Explain the difference between general-purpose and special-purpose applications.

General-purpose application are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems and presentation graphics.

Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.

2.Discuss the common features of most software programs. Describe the new interface to

what-if analysis?

Most applications use a GUI, use windows to display information, and have menus to present commands.

3.Whatis the difference between a function and a formula? How is a formula related to

what-if analysis?

A formula is an instruction to calculate or process. Functions are prewritten formulas. A

formula related to what-if analysis is called recalculation.

4.What are presentation graphics programs? How are they used?

Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentation. People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional.

5.What is the difference between an integrated package and a software suite? What are

the advantages and disadvantages od each?

An integrated package is a single program that provides the functionality of a word processor, spreadsheet, database manager, and more. The primary disadvantage of an integrated package is that the capabilities of each function are not as extensive as in the individual programs. The primary advantages are cost and simplicity.

A software suite is a collection of separate application programs bundled together and sold as

a group. It is significantly less expensive to buy a suite of applications than to buy each

application separately

CHAPTER4

1.Describe graphics , including desktop publishers, image editors, illustration programs,

image galleries, and graphics suites.

Graphics are widely used to analyze data and to create professional-looking presentations;

Desktop publishers focus on page design and layout and provide greater flexibility;

Image editors are programs for creating and editing bitmap images;

Illustration programs are used to create and to edit vector images;

Image galleries are libraries of electronic images. These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;

Graphics suites are some companies combining their separate graphics programs in groups.

2.Discuss audio and video editing software.

Audio editing software allows you to create and edit audio clips, most software allow you to add audio effects to your tracks. Video editing software allows you to reorganize, add effects, and more to your digital video footage.

3.What is multimedia? How are multimedia presentations developed?

Multimedia is the integration of all sorts of media into one presentation. The creation of interactive multimedia presentations follows several steps: Plan, Design, Create and Support.

4.Describe Web authoring , including Web site design and Web authoring programs.

Creating a site is called Web authoring. A web site design is an interactive multimedia form of communication, designing a web site begins with determining the site’s overall content, the overall site design is commonly represented in a graphical map. More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.

5.Discuss three areas of artificial intelligence.

The three areas of artificial intelligence are virtual reality, knowledge-based systems and robotics. Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer.

Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users. Robotics is the field of study concerned with developing and using robots.

1.Describe system software. What are the four types of system programs?

System software works with end users, application software, and computer hardware to handle the majority of technical details. It consists of four types of programs: operating systems, utilities, device drivers and language translators.

2.What are the basic functions of every operating system? What are the three basic

operating system categories?

The basic functions of every operating system are : managing computer resources, providing a user interface, and running applications. The three basic operating system categories are: embedded, network and stand-alone.

3.Explain the differences and similarities between Windows, Mac OS, and Linux.

Windows is by far the most popular microcomputer operating system today. It comes in a variety of different versions and is designed to run with Intel and Intel-compatible microprocessors. Mac OS is not nearly as widely used as the Windows operating system. It is

a powerful, easy-to-use operating system that is popular with professional graphic designs,

desktop publishers, and many home users. While Windows, the Mac OS are proprietary operating systems, Linux is not. It is open source software free and available from many sources, including the Web.

4.Discuss utilities. What are the five most essential utilities? What is a utilities suite?

Utilities are specialized programs designed to make computing easier. The five most essential utilities are: troubleshooting or diagnostic programs, antivirus programs, uninstall programs,backup programs and file compression programs.Utility suites combine several programs into one package.

5.Explain the role of device drivers. Discuss the Add Printer Wizard and Windows

Update.

A device driver works with the operating system to allow communication between the device

and the rest of the computer system. Each time the computer system is started, the operating system loads all of the device drivers into memory. Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used.

Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver. Windows uses Windows Update to make reinstalling or updating device drivers easily.

1.Describe the four basic types of system units.

There are four basic types of system units: Desktop system units, Notebook system units, Tablet PC system units, and Handheld computer system units.

Desktop system units typically contain the system’s electronic components and selected secondary storage devices.

Notebook system units are portable and much smaller. They contain the electronic components, selected secondary storage devices, and input device.

Tablet PC system units are highly portable devices that support the use of a stylus or pen to input commands and data.

Handheld computer system units are the smallest and are designed to fit into the palm of one hand.

2.Describe the two basic components of the CPU.

The two basic components are: the control unit and the arithmetic-logic unit.

Control unit tells the rest of the computer system how to carry out a program’s instructions.

Arithmetic-logic unit performs two types of operations---arithmetic and logical.

3.What are the differences and similarities between the three types of memory?

There are three types of memory chips: RAM, ROM, and CMOS.

RAM chips hold the program and data that the CPU is presently processing, everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.

ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.

CMOS chip provides flexibility and expandability for a computer system. It contains essential information that is required every time the computer system is turned on. It is powered by a battery and does not lose its contents when the power is turned. Its contents can be changed to reflect changes in the computer system.

4.Identify five expansion cards and describe the function of each.

Five expansion cards are: graphics cards, sound cards, modem cards, NIC and TV tuner cards.

Graphics cards connect the system board to the computer’s monitor, they convert the internal electronic signals to video signals so they can be displayed on the monitor.

Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer. They also convert internal electronic signals to audio signals.

Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.

NIC are used to connect a computer to one or more other computers.

TV tuner cards can changes the TV signal into one that can be displayed on you monitor.

5.Identify and describe four standard ports and two specialized ports.

Four standard ports are: serial ports, parallel ports, universal serial bus ports and FireWire ports.

Serial ports are often used to connect a mouse, keyboard, modem, and many other devices to the system unit.

Parallel ports are used to connect external devices that need to send or receive a lot of data over a short distance.

USB ports are gradually replacing serial and parallel ports.

FireWire ports provide connections to specialized FireWire devices.

CHAPTER7

1.Define input and output devices.

Input is any data or instructions that are used by a computer. Input devices are hardware used to translate what people understand into a form that computers can process.

2.Describe the three categories of output devices.

①There are a widely of different pointing devices including the mouse, joystick, touch screen,

light pen, and stylus.

A mouse controls a pointer that is displayed on the monitor.

A joystick is the most popular input device for computer games. You control game actions by

varying the pressure, speed, and direction of the joystick.

A touch screen is a particular kind of monitor with a clear plastic outer layer.

A light pen is a light-sensitive pen-like device.

A stylus acts with the computer through handwriting recognition software.

②There are three types of scanning devices: optical scanners, card readers, bar code readers,

and character and mark recognition devices.

An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.

Card readers interpret encoded information.

Bar code readers are either handheld wand readers or platform scanners.

Character and mark recognition devices are scanners that are able to recognize special characters and marks.

③Image capturing devices include digital cameras and digital video cameras.

Digital cameras capture still images. Digital video cameras capture motion.

④Audio input can take many forms including the human voice and music.

V oice recognition systems accept voice commands to control computer operations and to

create document.

MIDIis a standard for connecting musical instruments to the system unit.

3.Describe the three categories if output devices.

The most widely used output devices are monitors, printers and audio output.

Monitors present visual images of text and graphics.

Printers translate information that has been processed by the system unit and present the information on paper.

Audio output devices translate audio information from the computer into sounds that people can understand.

4. Define output an output devices.

Output is processed data or information. Output devices are hardware used to translate information that has been processed by the system unit into a form that humans can understands.

5. What are combination input and output devices? Describe four such devices.

Devices combine features of input devices such as scanners with features of output devices like printers are called combination input and output devices.

Combination devices include fax machines, multifunction devices, Internet telephones, and terminals.

A fax machine is a standard tool in nearly every office.

Multifunction devices combine the capabilities of a scanner, printer, fax, and copying machine.

Internet telephones are specialized input and output devices for receiving and sending voice communication.

Terminals are input and output device that connect you to a mainframe or other type of computer.

CHAPTER8

1.Discuss the traditional and high-capacity floppy disks

The traditional floppy disk is the 1.44MB 3-inch disk. They have a thin exterior jacket made of hard plastic to protect the flexible disk inside.

The high capacity floppy disks are 3 inches in diameter. They are able to store more information, are thicker, and require special disk drives.

2.What are the three types of hard disks? Describe three ways to improve hard disk

performance.

There are three types of hard disks: Internal hard disk, hard-disk cartridge, and hard-disk pack.

Three ways to improve the performance of hard disks are disk caching, redundant arrays of inexpensive disks, and file compression/decompression.

Disk caching improves hard-disk performance by anticipating data needs.

Redundant arrays of inexpensive disks improve performance by expending external storage, improving access speed, and providing reliable storage.

File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.

3.What are the two most common optical disc formats? What is hi def ? Describe the basic

types for each format.

The two most common optical disc formats are CD and DVD. Hi def is the next generation of optical discs.

①There are four basic types of CDs: read only, write once, rewritable, and Picture and Photo

CDs.

Read only CDs cannot be written on or erased by the users, they are used to distribute large databases, references, and large software application packages.

Write once CDs can be written to once, they are used to archive data and to record music download from the Internet.

Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.

Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.

②There are three types of DVDs: read only, write once, and rewriteable.

Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.

Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.

Rewriteable DVDs are competing rewriteable formats.

4.Discuss solid-state storage, Internet hard drives, and magnetic tape. What are the

advantages and disadvantages of each?

Solid-state storage does not have moving parts. Internet drives use the Internet to store data and information. Magnetic tape provides sequential access for backup.

Solid-state storage is more expensive than the others, it is more reliable and requires less power.

Internet drives are low cost and the flexibility to access information from any location using the Internet. Access speed is slower.

Magnetic tapes provide slower sequential access. It is an effective and commonly used tool for backing up data.

5. Discuss mass storage, enterprise storage system, and mass storage devices.

Mass storagerefers to the storage of large amounts of data in a persisting and machine-readable fashion. Enterprise storagesystems are the computer storage systems designed for large-scale, high-technology environments of the modern enterprises.Mass storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tape drives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory.

CHAPTER9

1.Define and discuss connectivity, the wireless revolution, and communications.

①Connectivity is a concept related to using computer networks to link people and resources.

②The single most dramatic change in connectivity and communications in the past five years

has been the widespread use of mobile or wireless telephones. This wireless technology allows individuals to stay connected with one another from almost anywhere at any time, the revolution is just beginning.

③Communication systems transmit data from one location to another. Every communication

system has four basic elements: sending and receiving devices, communication channel, connection devices, and data transmission specifications.

2.Identify and describe the various physical and wireless communications.

①Physical connections use a solid medium to connect sending and receiving devices.

These connections include telephone lines, coaxial cable, and fiber-optic cables.

Telephone lines consist of twisted pair cable, they have been the standard transmission medium for years for both voice and data.

Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core.

Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.

②Wireless connections use the air to connect sending and receiving devices.

Primary technologies used for wireless connections are infrared, broadcast radio, microwave, and satellite.

Infrared uses infrared light waves to communicate over short distances.

Broadcast radio communication uses special sending and receiving towers called transceivers.

Microwave communication uses high-frequency radio waves.

Satellite communication uses satellites orbiting about 22000 miles above the earth as microwave relay stations.

3.Identify the standard Internet protocol and discuss its essential features.

The standard protocol for the Internet is TCP/IP. The essential features of this protocol involve: identifying sending and receiving devices and reformatting information for transmission across the Internet.

Identification: Every computer on the Internet has a unique number address called an IP address, the Internet uses IP addresses to deliver e-mail and to locate Web sites.

Reformatting: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the massage is sent, it is reformatted or broken down into small parts called packets, at the receiving end, the packets are reassembled into the correct order.

4.Define and discuss the four principal network topologies.

The four principal network topologies are star, bus, ring, and hierarchical.

In a star network, a number of small computers or peripheral devices are linked to a central unit, all communications pass through this central unit.

In a bus network, each device in the network handles its own communication control.

In a ring network, each device is connected to two other devices, forming a ring.

The hierarchical network consists of several computers linked to a central host computer, other computers are also hosts to other, smaller computers or to peripheral devices.

5.Define and discuss the three most common network strategies.

The most common network strategies are terminal, client/server, and peer-to-peer systems.

①In a terminal network system, processing power is centralized in one large computer. For

the end user it is lack of control and flexibility.

②Client/server network system use one computer to coordinate and supply services to other

nodes on the network. One advantage of the client/sever network strategy is the ability to handle very large networks efficiently. Another advantage is the ability of powerful network management software to monitor and control network activities. The major disadvantages are the cost of installation and maintenance.

③In a peer-to-peer network system, nodes have equal authority and can act as both clients

and servers. The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.

CHAPTER10

1.Discuss the impact of large database , private networks, the Internet, and the Web on

privacy.

Large databases raise some serious concerns on privacy: identity theft and mistaken identity.

The impact of private networks on privacy has the two parts: The first instance, of firms eavesdropping on employees, has inspired attempts at federal legislation. The second instance, in which online information services screen and reject messages, is a common activity with most commercial services.

The internet brings illusion of anonymity, the web creates a history file, your web activity is monitored is by cookies. To respond to these privacy concerns, a code of fair information

practice has been established.

2.Discuss the carious kinds of computer criminals.

Computer criminals are of five types:

Employees: The largest category of computer criminals consists of those with the easiest access to computers-namely, employees.

Outside users: Some suppliers or clients may have access to a company’s computer system.

Hackers and crackers: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes.

Organized crime: Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do,but for illegal purpose.

Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.

3. What are the principal measures used to protect computer security? What is encryption?

How is it used by corporations and individuals?

Some of the principal measures to protect computer security are encryption, restricting access, anticipating disasters, and backing up data.

Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.

Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals are also using encryption programs to safeguard their private communications.

4.What is ergonomics? How does computer use impact mental health? Physical health?

Ergonomics is defined as the study of human factors related to things people use.

The physical health matters related to computers that have received the most attention recently are the following: eyestrain and headache, back and neck pain, and repetitive strain injury. Computer technology creates some irritants that may be counter productive: noise, and electronic monitoring.

5.Describe the basic elements of the Green PC and what you can do to protect the

environment.

The basic elements of the Green PC are: System unit, display, and manufacturing.

As a computer user, you can do to help protect the environment are the following:

conserve, recycle, and educate.

高级英语第三版课后答案整理

Lesson 1 Question: 1. Why did John Koshak decide to stay although he knew the hurricane would be bad? For the following reasons: For one thing, the house was 23 feet above sea level; for another,he was unwilling to abandon his home. 2. How did the man prepare for the hurricane? Why was a generator necessary? They filled bathtubs and pails. Besides, they checked out batteries for portable radio and flashlights, and fuel for the lantern. A generator was necessary because John's father wired several light bulbs to it and prepared a connection to the refrigerator. 3. What made it impossible for the Koshak to escape? It was impossible for the Koshers to escape both by car and on foot. The car's electrical system had been killed by water. Meanwhile, the water became too deep for them to escape on foot. 4. Why did John Koshak feel a crushing guilt? Because he blamed himself for underestimating the power of the hurricane and then endangering the whole family by his wrong decision not to flee safer inland. 5. Why did Grandma Koshak ask children to be sing? A: Because she knew how frightened the children were and wanted to boost their spirit. 6. What was a hurricane party? What happened to the party gores? A hurricane party was the one that was held by several vacationers to enjoy the spectacle of the hurricane with a clear and broad view in the fancy Richelieu Apartments from where they believed they would be safe. Richelieu Apartments were smashed apart by the hurricane and 26 people perished. 7. What did Grandma Koshak mean when she said," We lost practically all our possessions, but the family came through it. When I think of that, I realize we lost nothing important?" She meant that human lives are more important than material possessions. 8. How did the community of Gulfport act after Hurricane Camille was over? They managed to make their lives return to normal and began rebuilding their community without any delay. Paraphrase: 1. We're elevated 23 feet. Our house is 23 feet above sea level. 2. The place has been here since 1915, and no hurricane has ever bothered it. The house was built in 1915 and since then no hurricane has done any damage to it. 3. We can batten down and ride it out. We can prepare ourselves for the hurricane and manage to survive it without much damage. 4. The generator was doused, and the lights went out. Water got into the generator, and it didn't work. As a result, the lights were put out. 5. Everybody out the back door to the cars! Everybody go out though the back door and get into the cars. 6. The electrical system had been killed by water. The electrical system in the cars had been destroyed by water. 7. John watched the water lap at the steps, and felt a crushing guilt. When John watched the water inch its way up the steps, he felt a strong sense of guilt because he b

计算机科学导论答案

2011年计算机导论修订第二版课后练习答案 第一章一、简答题 1、什么是计算机? 计算机系统是一种能够按照事先存储的程序,自动、高速的对数据进行输入、处理、输出和存储的系统。一个计算机系统包括硬件和软件两大部分。 2、解释冯·诺依曼所提出的“存储程序”概念。 把程序和数据都以二进制的形式同意存放在存储器中,由机器自动执行。不同的程序解决不同的问题,实现了计算机通用计算的功能, 3、计算机有哪些主要的特点? 运算速度快`精度高 计算机的字长越长,其精度越高,现在世界上最快的计算机每秒可以运算几十万次以上。一般计算机可以有市纪委甚至几十位(二进制)有效数字,计算精度可由千分之几到百万分之几,是任何计算工具所望尘莫及的。具有逻辑判断和记忆能力 计算机有准确的逻辑判断能力和高超的记忆能力。能够进行各种逻辑判断,并根据判断的结果自动决定下一步应该执行的指令。高度的自动化和灵活性 计算机采取存储程序方式工作,即把编号的程序输入计算机,机器便可依次逐条执行,这就使计算机实现了高度的自动化和灵活性。 4、计算机有哪些主要的用途? (1)科学计算(2)数据处理 (3) 实时控制(4)人工智能 (5)计算机辅助工程和辅助教育(6)娱乐和游戏 5、计算机发展中各个阶段的主要特点是什么?第一代计算机特征是采用电子管作为主要元器件第二代计算机特征是采用晶体管作为主要器件 第三代计算机特征是半导体中小规模集成电路第四代计算机特征是大规模和超大规模集成电路 6信息化社会的主要特点是什么? 1·建立完善的信息基础设施 2·采用先进的信息技术 3·建立广泛的信息产业 4·拥有高素质的信息人才 5·构建良好的信息环境 7、信息化社会对计算机人才的素质和知识结构有哪些要求? 在信息化社会中所需要的计算机人才是多方位的,不仅需要研究型、设计型的人才,而且需要应用型的人才;不仅需要开发型人才而且需要维护型、服务型、操作型的人才。要求计算机人才具有较高的综合素质和创新能力,并对于新技术的发展具有良好的适应性。 8、说明计算机科学与技术学科的知识体系及知识领域、知识单元和知识点的含义。 9计算机科学的研究范畴主要包括哪些? 计算机科学技术的研究范畴主要包括计算机理论、硬件、软件、网络及其应用等。二、选择题 1 计算机是接受命令,处理输入以及产生【数据】的系统 2 冯·诺依曼的主要贡献是【提出了存储程序概念】 3 共科学研究,军事和大型组织用的高速,大容量计算机是【巨型计算机】 4 计算机硬件由5个基本部分组成,下面【总线】不属于这5个基本组成部分 5 其内容在电源断掉以后就消失又被暂时存储器的条件是【内存储器】 6 拥有高度结构化和组织化的数据文件被称为【数据库】 7 计算机系统必须具备的两部分是【硬件和软件】 8 计算机处理的5个要素是【输入,输出,处理,打印和存储】

高级英语 课后习题答案

Unit1 Paraphrase 1.Our house is 23 feet above sea level. 2.The house was built in1915, and since then no hurricane has done any damage to it. 3.We can make the necessary preparations and survive the hurricane without much damage. 4.Water got into the generator, it stopped working. As a result all lights were put out. 5.Everyone go out through the back door and get into the cars! 6.The electrical systems in the cars had been destroyed/ruined by water. 7.As john watched the water inch its way up the steps, he felt a strong sense of guilt because he blamed himself for endangering the family by making the wrong decision not to flee inland. 8.Oh, God, please help us to get through this dangerous situation. 9.She sang a few words alone and then her voice gradually grew dimmer and stopped. 10.Janis didn't show any fear on the spot during the storm, but she revealed her feelings caused by the storm a few nights after the hurricane by getting up in the middle of the night and crying softly. Practice with words and expressions A 1.main:a principal pipe, conduit, or line in a distributing system for water, gas, electricity, etc.

计算机科学导论试卷A

黄河科技学院2010 - 2011学年第一学期期末考试《计算机科学导论》课程试题(A卷) 适用类别普招层次专科专业计算机网络技术年级 10级试 卷代码: 注意事项: 1、本卷采用了分卷制,已将试题纸与答题纸分开。请考生将答案按原题号顺序,写在答题纸上。在试题纸上书写答案,一律无效。交卷时,应分别交验试题纸、答题纸和草稿纸。 2、请在答题纸规定的位置书写姓名、座号、学号等信息。 3、请自觉遵守考场纪律。 一,单项选择题(每小题1分,共30分) 1.组成计算机主机的主要是_____。 A 运算器和控制器 B 中央处理器和主存储器 C 运算器和外设 D 运算器和存储器 2.下面各组设备中,同时包括了输入设备、输出设备和存储设备的是_____。 A CRT、CPU、ROM B 绘图仪、鼠标器、键盘 C 鼠标器、绘图仪、光盘 D 磁带、打印机、激光印字机3.计算机中,运算器的主要功能是完成_____。 A 代数和逻辑运算 B 代数和四则运算 C 算术和逻辑运算 D 算术和代数运算 4.在微机中,I/O的中文意思是_____。 A 读写存储器 B 操作系统 C 输入输出 D 接口电路 5.若要将数字作为文字输入到单元格,需先输入一个_____。 A 单引号 B 双引号 C 0 D 半角空格 6.为解决某一特定的问题而设计的指令序列称为_____。 A 文档 B 语言 C 系统 D 程序 7.通常所说的“裸机”是指计算机仅有_____。 A 硬件系统 B 软件 C 指令系统 D CPU 8.某单位的人事管理程序属于_____。 A 系统程序 B 系统软件 C 应用软件 D 目标软件 -------------各类专业好文档,值得你下载,教育,管理,论文,制度,方案手册,应有尽 有--------------

_“大学计算机基础”课程简介

“大学计算机基础”课程简介 1.课程编码:18012625 课程中文名称:大学计算机基础 课程英文名称:The Fundamentals of Computer 课程负责人:郭松涛 2.学时学分:40学时(其中:理论教学24学时,实验教学32/2学时),2.5学分 3、适用专业:大学本科各专业 4.预修课程:无 5.内容简介: 该课程是根据教育部非计算机专业计算机基础课程教学指导分委员会提出的高等学校计算机基础课程教学(1+X体系)基本要求而设立的大学本科各专业第一门计算机课程,是在原有《计算机文化基础》课程的基础上,根据21世纪人才培养的新要求,结合信息技术的研究成果与发展趋势,以及教育技术在教学改革中的应用现状和水平,对教学内容、体系结构做了重大的修改。该课程指导学生全面了解计算机知识体系,掌握计算机基础知识,为后继计算机课程的选修奠定坚实的基础。 该课程介绍了计算机系统基础知识(包括:计算机概述、计算机的组成、计算机工作原理、计算机硬软件系统、计算机的指令和指令系统、信息表示、运算基础等);操作系统基础知识(包括:操作系统概述、基本工作原理、主要功能模块、Windows操作系统简介及使用方法和Linux 操作系统简介等;办公自动化基础知识(办公自动化的特点和系统构成、常用办公自动化设备、常用办公自动化软件、MS-Office中Word、Excel、PowerPoint的使用等、国产WPS Office特点及功能等);程序设计基础知识(包括:程序设计语言概念、算法与数据结构、程序设计的基本过程、程序设计基本思想等);数据库技术基础知识(包括:数据库系统概述、Access数据库管理系统基本知识、关系模型基础、SQL语言简介等);计算机网络及应用基础知识(包括:网络基础知识、局域网和Internet的使用、Internet信息检索及软件使用、网页设计与网站建立、电子商务应用等);多媒体技术基础知识(包括:多媒体与流媒体概述、多媒体系统的硬件构成、多媒体系统的软件环境、数据压缩与存储知识、多媒体应用系统开发方法等);信息安全与社会社会责任知识(包括:信息安全及网络攻击防范、计算机病毒的危害及防范、数据加密、数字签名、数据备份、防火墙技术、社会责任与职业道德规范、信息安全的法律法规、软件知识产权保护等)。 该课程是学习计算机的入门课程,是大学本科各专业学生作为“普通高等学校大学计算机公共课系列”的第一门必修课程。它既注重计算机基础知识的系统介绍,又面向计算机的操作应用。使学生进入大学,就系统的掌握计算机的知识体系,以便后继相关课程的选课和学习。 从09级开始,我校“大学计算机基础”课程实行分级教学,分为基础班和提高班。基础班针对计算机知识基础薄弱或中学没有学习相关计算机信息技术课程的学生,提高班针对已经掌握了计算机基本知识,或具有了操作计算机基本能力的学生,通过开学分级测试分班。

南开18秋学期(清考)《计算机科学导论》在线作业(第二版)

(多选题) 1: ROM的主要类型包括 A: ROM B: PROM C: EPROM D: CDROM 正确答案: (多选题) 2: 操作系统的特性包括 A: 并发性 B: 共享性 C: 虚拟性 D: 不确定性 正确答案: (多选题) 3: 计算机应用软件可用于 A: 科学计算 B: 文字处理 C: 工程设计 D: 数据处理 正确答案: (多选题) 4: 鼠标的主要部件有 A: 位置采样机构 B: 传感器 C: 专用处理芯片 D: 电荷耦合器件 正确答案: (多选题) 5: 计算机中操作系统的任务包括 A: 进程调度 B: 内存管理 C: 文件管理 D: 总线管理 正确答案: (判断题) 1: 门是对电信号执行基础运算的设备,用于接受一个输入信号,生成一个输出信号A: 错误 B: 正确 正确答案: (判断题) 2: 机器语言是内置在计算机电路中的指令,用助记码表示 A: 错误 B: 正确 正确答案: (判断题) 3: 布尔代数提供的是在集合{0,1}上的运算和规则 A: 错误 B: 正确 正确答案: (判断题) 4: 摩尔定律是指一个集成电路板上能够容纳的电路数量每年增长一倍 A: 错误 B: 正确 正确答案: (判断题) 5: 稳定排序算法是指占用有限额外空间的算法 A: 错误 B: 正确 正确答案: (判断题) 6: 网络协议就是为网络数据交换而制定的规则 A: 错误

(判断题) 7: 硬件是计算机系统中有形的装置和设备的总称 A: 错误 B: 正确 正确答案: (判断题) 8: 关系是元组的集合而不是元组的列表因此元组的出现顺序无关紧要A: 错误 B: 正确 正确答案: (判断题) 9: 实体是指某种抽象事物的集合 A: 错误 B: 正确 正确答案: (判断题) 10: 同步是一种进程相互合作的思想描述进程间相互制约的问题 A: 错误 B: 正确 正确答案: (判断题) 11: 软件危机完全是由软件自身的特点决定的 A: 错误 B: 正确 正确答案: (判断题) 12: 编译器是把用高级语言编写的程序翻译成机器码的程序 A: 错误 B: 正确 正确答案: (判断题) 13: 硬件是指计算机系统中有形设备和装置的总称 A: 错误 B: 正确 正确答案: (判断题) 14: 如果有三个或更多重复字符出现,适宜使用行程长度编码进行压缩A: 错误 B: 正确 正确答案: (判断题) 15: 视频中的一幅图像叫做一帧 A: 错误 B: 正确 正确答案: (单选题) 1: 软件测试说明书的完成时间应该在 A: 需求分析阶段开始 B: 需求分析阶段结束 C: 测试阶段开始 D: 测试阶段结束 正确答案: (单选题) 2: 目前应用最广泛的计算机网络拓扑结构是 A: 星型拓扑 B: 网状拓扑 C: 树状拓扑 D: 环状拓扑 正确答案: (单选题) 3: 在布尔运算中,下列计算错误的是哪个 A: 1+1=2

计算机科学导论第三版答案Ch-18

C H A P T E R18 Artificial Intelligence (Solutions to Odd-Numbered Review Questions and Problems) Review Questions Q18-1.An interrogator asks a set of questions that are forwarded to a computer and a human being. The interrogator receives two sets of responses: one from the computer and one from the human. After careful examination of the two sets, if the interrogator cannot definitely tell which set has come from the com- puter, the computer has passed the intelligent test. Some experts think that this is an accurate definition of an intelligent system; some think that the test is not necessarily the definition of an intelligent system. Q18-3.LISP is a programming language that manipulates lists. LISP treats data, as well as a program, as a list,. This means a LISP program can change itself. This feature matches with the idea of an intelligent agent that can learn from the environment and improves its behavior. PROLOG is a language that can build a database of facts and a knowledge base of rules. A program in PRO- LOG can use logical reasoning to answer questions that can be inferred from the knowledge base. Q18-5.Propositional logic is a language made of a set of sentences that can be used to do logical reasoning about the world. In propositional logic, a symbol that rep- resents a sentence is atomic; it cannot be broken to find some information about its components. To do so, we need predicate logic, the logic that defines the relation between the parts in a proposition. Q18-7. A ruled-based system represents knowledge using a set of rules that can be used to deduce some new facts from already-known facts. The semantic net- work is a graphical representation of entities and their relationships. Q18-9.The five stages of image processing are edge detection, segmentation, finding depth, finding orientation, and object recognition. Q18-11.Neural networks try to simulate the learning process of the human brain using a networks of artificial neurons. 1

计算机科学导论第三版答案

第1章概述 习题(答案) 一?选择题 1. D 2. B 3. CD 4. C 5.A 6. ABC 7. A 8. C 9.B10. B 11. C12. A13. ABC14.B15. ABCD 16.C17.ABCDE 二?简答题 1简述计算机的发展阶段 计算机的出现是20世纪最辉煌的成就之一,按照采用的电子器件划分,计算机大致经历了四个阶段。 1. 第一代计算机(1946 —1957) 其主要特征是逻辑器件使用了电子管,用穿孔卡片机作为数据和指令的输入设备,用磁鼓 或磁带作为外存储器,使用机器语言编程。第一台计算机需要工作在有空调的房间里,如果希

望它处理什么事情,需要把线路重新连接接,把成千上万的线重新焊接。 1949年发明了可以存储程序的计算机,这些计算机使用机器语言编程,可存储信息和自动处理信息,存储和处理信息的方法开始发生革命性的变化。 第一代计算机体积大、运算速度低、存储容量小、可靠性低。几乎没有什么软件配置,主要用于科学计算。尽管如此,第一代计算机却奠定了计算机的技术基础,如二进制、自动计算及程序设计等,对以后计算机的发展产生了深远的影响。其代表机型有:ENIAC、IBM650(小 型机卜IBM709(大型机)等。 2. 第二代计算机(1958 —1964) 其主要特征是使用晶体管代替了电子管,内存储器采用了磁芯体,引入了变址寄存器和浮 点运算部件,利用I/O处理机提高了输入输出能力。这不仅使得计算机的体积缩小了很多,同时增加了机器的稳定性并提高了运算速度,而且计算机的功耗减小,价格降低。在软件方面配 置了子程序库和批处理管理程序,并且推出了Fortran、COBOL、ALGOL等高级程序设计语言及相应的编译程序,降低了程序设计的复杂性。除应用于科学计算外,它还开始应用在数据处理和工业控制等方面。其代表机型有IBM7090、IBM7094、CDC7600等。 3. 第三代计算机(1965 —1972) 其主要特征是用半导体中、小规模集成电路(Integrated Circuit,IC)作为元器件代替晶体管等分立元件,用半导体存储器代替磁芯存储器,使用微程序设计技术简化处理机的结构,这使 得计算机的体积和耗电量显著减小,而计算速度和存储容量却有较大提高,可靠性也大大加强。在软件方面则广泛地引入多道程序、并行处理、虚拟存储系统和功能完备的操作系统,同时还提供了大量的面向用户的应用程序。计算机开始定向标准化、模块化、系列化,此外,计算机的应用进入到许多科学技术领域。代表机器有IBM 360系列、富士通F230系列等。 4. 第四代计算机(1972年至今) 其主要特征是使用了大规模和超大规模集成电路,使计算机沿着两个方向飞速向前发展。 一方面,利用大规模集成电路制造多种逻辑芯片,组装出大型、巨型计算机,使运算速度向每秒十万亿次、百万亿次及更高速度发展,存储容量向百兆、千兆字节发展,巨型机的出现,推动了许多新兴学科的发展。另一方面,利用大规模集成电路技术,将运算器、控制器等部件集成在一个很小的集成电路芯片上,从而出现了微处理器。微型计算机、笔记本型和掌上型等超微型计算机的诞生是超大规模集成电路应用的直接结果,并使计算机很快进入到寻常百姓家。完善的系统软件、丰富的系统开发工具和商品化的应用程序的大量涌现,以及通信技术和计算 机网络的飞速发展,使得计算机进入了一个快速发展的阶段。 现在很多国家正在研制新一代的计算机,新一代计算机将是微电子技术、光学技术、超导 技术、电子仿生技术等多学科相结合的产物。它能进行知识处理、自动编程、测试和排错,以及用自然语言、图形、声音和各种文字进行输入和输出。新一代计算机的研究目标是打破计算机现有的体系结构,使得计算机能够具有像人那样的思维、推理和判断能力。已经实现的非传统计算技术有超导计算、量子计算、生物计算、光计算等。未来的计算机可能是超导计算机、量子计算机、生物计算机、光计算机、纳米计算机或DNA计算机等。

计算机科学导论试卷

试题纸 课程名称:计算机科学导论适用专业年级:2005级 考生学号:考生姓名:……………………………………………………………………………………………………… 题号一二三四总分得分 一、单选题:(每题1分,共30分) 1.第四代计算机采用的主要电子元器件是()。 (A)晶体管(B)中、小规模集成电路 (C)超大规模集成电路(D)微处理集成电路 2.在计算机系统中,一个字节的二进制位数为()。 (A)16 (B)8 (C)4 (D)由CPU型号决定 3.一个完整的计算机系统包括()。 (A)计算机及其外部设备(B)系统软件与应用软件 (C)硬件系统与软件系统(D)主机、键盘、显示器 4.微型计算机中运算器的主要功能是()。 (A)控制计算机的运行(B)负责存取存储器中的数据 (C)算术运算和逻辑运算(D)分析指令并执行 5.系统软件中最重要的是()。 (A)工具软件(B)数据库管理软件 (C)语言处理软件(D)操作系统 6.下列计算机语言中,CPU能直接识别的是()。 (A)自然语言(B)高级语言(C)汇编语言(D)机器语言 7.某单位自行开发的工资管理系统,按计算机应用的类型划分,它属于()。 A)应用程序B)工具软件C)系统程序D)文字处理程序 8.CPU包括()。 (A)内存和控制器(B)控制器和运算器 (C)高速缓存和运算器(D)控制器、运算器和内存 9.十进制数(-123)的补码表示为()。 (A)11111011 (B)10000100 (C)10000101 (D)01111011 10.在下列4个不同进制的数中,最小的数是()。 (A)(11011101)2(B)(98)10(C)(147)8(D)(6A)16

《计算机科学导论》(第三版 )弗罗赞(翻译)

Chapter 1 练习 复习题 1.定义一个基于图灵模型的计算机。 答:Turing proposed that all kinds of computation could be performed by a special kind of a machine. He based the model on the actions that people perform when involved in computation. He abstracted these actions into a model for a computational machine that has really changed the world. 图灵模型假设各种各样的运算都能够通过一种特殊的机器来完成,图灵机的模型是基于各种运算过程的。图灵模型把运算的过程从计算机器中分离开来,这确实改变了整个世界。 2.定义一个基于冯·诺伊曼模型的计算机。 答:The von Neumann Model defines the components of a computer, which are memory, the arithmetic logic unit (ALU), the control unit and the input/output subsystems. 冯·诺伊曼模型定义了计算机的组成,它包括存储器、算术逻辑单元、控制单元和输入/输出系统。 3.在基于图灵模型的计算机中,程序的作用是什么? 答:Based on the Turing model a program is a set of instruction that tells the computer what to do. 基于图灵模型的计算机中程序是一系列的指令,这些指令告诉计算机怎样进行运算。 4.在基于冯·诺伊曼模型的计算机中,程序的作用是什么? 答:The von Neumann model states that the program must be stored in the memory. The memory of modern computers hosts both programs and their corresponding data. 冯·诺伊曼模型的计算机中,程序必须被保存在存储器中,存储程序模型的计算机包括了程序以及程序处理的数据。 5.计算机中有哪些子系统? 答:The subsystems of the von Neumann model are memory, the arithmetic/logic unit (ALU), the control unit, and the input/output. 冯·诺伊曼模型的计算机中子系统包括存储器、算术逻辑单元、控制单元和输入/输出单元。 6.计算机中存储器子系统的功能是什么? 答:Memory is the storage area used for programs and data. 存储器的功能是用来保存程序和数据的。 7.计算机中ALU子系统的功能是什么? 答:The arithmetic/logic unit (ALU) is where calculations and logical operations take place. 计算机中ALU子系统的功能是进行算术和逻辑运算的地方。 8.计算机中控制单元子系统的功能是什么? 答:The control unit controls the operations of the memory, ALU, and the input/output subsystem. 计算机中控制单元子系统的功能是控制存储器、算术逻辑单元和输入/输出的运行。 9.计算机中输入/输出子系统的功能是什么?

高级英语课后习题答案

Unit1 1.An inblance between the rich and poor is the oldest and most fatal ailment of republics 贫富不均乃共和政体最致命的宿疾 2.Their poverty is a temporary misfortune,if they are poor and meek,they eventually will inherit the earth 他们的贫穷只是一种暂时性的不幸,如果他们贫穷但却温顺,他们最终将成为世界的主人 3.Couples in love should repair to R H Macy?s not their bedroom 热恋的夫妇应该在梅西百货商店过夜,而不是他们的新房 4.The American beauty rose can be produced in the splendor and fragrance which bring cheer to its beholder only by sacrificing the early buds which grow up around it.and so is in economic life.It?s merely the working out of the a law of the nature and a law of god 美国这朵玫瑰花以其华贵与芳香让观众倾倒,赞不绝口,而她之所以能被培植就是因为在早期其周围的花蕾被插掉了,在经济生活中情况亦是如此。这是自然规律和上帝的意志在起作用 5.(it has become) an economically not unrewarding enterprise. (它已成为)经济上收入不菲的行业 6.There is~~no form of oppression that is quiet so great,no constriction on thought and effort quiet so comprehensive,as that which come from having no money at all 没有哪种压迫比身无分文更厉害,也没有哪种对思想和行为的束缚比一无所有来得更全面彻底 7.Freedom we rightly cherish,cherishing it,we should not use it as a cover for denying freedom to those in need 我们珍惜自由式对的。正因为珍惜自由,我们就不能以此为借口,不给最需要自由的人自由 8.Whether they be in Erhiopa,the south bronx,or even in such an Elysium as LosAngeles,we resolve to keep them off our minds 不管他们生活在埃塞俄比亚,还是在纽约的南部布朗克斯区,甚至是洛杉矶这样的天堂,人们都决心不去为这些人操心 9~~he is enjoy, as indicated, unparalleled popularity in high Washington circles. 如上述所说,他在华盛顿高层当中有无比的威望 https://www.360docs.net/doc/1611812758.html,passion , along with the association public effort is the least comfortable.the least convenient course of behavior and action in our time同情心,加上与之相关的社会努力是人们这个年代,最令人不快的行为何行动方针 Unit2 1.It was an idyllic life ,and we lived close to our family and to the comforts and safety a small town could afford 这是一种田园式的生活,我们和亲戚住的很近,享受着小镇生活所能给予我们的舒服和安全 2.But papa was a man of enterprise,he realized that the untouched Ten Thousand Islands off the southwest coast of the sate were rich in soil for crops and in game for food 但父亲是一个很有上进心的人,他知道佛罗里达州西南海岸的万岛群岛还没有被开发,那儿土壤肥沃,适于耕种,而且猎物充足,不必担心食物来源 3.This third day out,and the days to come,found us in the unsettled wilds of florida 出发后的第三天以及以后的日子里,我们都在佛罗里达无人居住的荒野中穿行 4.Its underwater grasses looked like green ribbons,constantly unrolling,and the trees held thick sprays of wild orchids 水里的水草就像绿色的丝带不断地伸展开来,野兰花一簇一簇地挂满了枝头 5.The burly arms of oaks were huge with ferns and blooming bromeliads.Redbirds,tanagers and painted buntings flew back and forth across the trail,leaving a child with the impression that the woods were tossing with jewels

计算机科学导论2011_试卷A

华南农业大学期末考试试卷(A卷) 2011学年第1学期考试科目:计算机科学导论 考试类型:闭卷考试时间:120分钟学号姓名年级专业2011(软件学院)软件工程 1. Fill-in-the-blank / short-answer questions (45 marks, 15questions. 3 marks each blank/question) (1) Programs and the _________________ they represent are collectively referred to as________________, in contrast to machine itself, which is known as _________________. Algorithms, software, hardware (2) The binary bit pattern of hexadecimal pattern 5FD97 is ____________________. 0101 1111 1101 1001 0111 (3) The equivalent tow’s complement form using eight-bit pattern of the base ten representation -12 is ______________________. 11110100

(4) A ______________ is a memory area used for the temporary storage of data, usually as a step in ________________ the data. Buffer, transferring (5) CASE is the abbreviations of ______________________________________________ in software engineering. Computer Aided Software Engineering (6) Data compression schemes fall into two categories. Some are ____________, others are _____________. ____________ schemes are those that do not lose information in compression process. ______________ schemes are those that may lead to the loss of information. lossless, lossy, lossless, lossy (7) RISC means ______________________________________________. Reduced Instruction Set Computing/Computer (8) What is the stored program concept? The idea of storing a computer’s program in its memory or A program can be encoded as bit patterns and stored in main memory. (9) A machine’s instruction can be categorized into three groups, what are they? The data transfer group, the arithmetic/logic group and the control group.

相关文档
最新文档