计算机专业英语第3章在线测试
计算机英语试题3及答案

计算机英语试题3及答案一、选择题(每题2分,共20分)1. Which of the following is not a type of computer virus?A. TrojanB. WormC. Antivirus softwareD. Virus2. What does the acronym "CPU" stand for?A. Central Processing UnitB. Central Processing UnitC. Central Processing UnitD. Central Processing Unit3. In computer terminology, what does "RAM" refer to?A. Random Access MemoryB. Random Access MemoryC. Random Access MemoryD. Random Access Memory4. What is the primary function of a router?A. To store dataB. To transmit dataC. To receive dataD. To process data5. What is the term used to describe the process of converting data into a format that can be transmitted over anetwork?A. EncryptionB. CompressionC. DecompressionD. Encoding6. Which of the following is not a type of software?A. Operating systemB. Application softwareC. Utility softwareD. Hardware7. What does the acronym "GUI" stand for in the context of computer interfaces?A. Graphical User InterfaceB. Graphical User InterfaceC. Graphical User InterfaceD. Graphical User Interface8. What is the term for a computer program that is designed to perform a specific task?A. ApplicationB. ApplicationC. ApplicationD. Application9. What is the term used to describe a computer network that spans a relatively small area?A. LANB. LANC. LAND. LAN10. What does the acronym "USB" stand for?A. Universal Serial BusB. Universal Serial BusC. Universal Serial BusD. Universal Serial Bus二、填空题(每题2分,共20分)1. A computer virus is a type of malicious software that can replicate itself and spread to other computers without the user's permission.2. The central processing unit (CPU) is the primary component of a computer that performs most of the processing inside the computer.3. Random Access Memory (RAM) is a type of computer memory that can be read and changed freely and quickly.4. A router is a networking device that forwards data packets between computer networks.5. Encoding is the process of converting data into a format that can be transmitted over a network.6. Software is a collection of data or computer instructions that tell the hardware what to do and how to do it.7. A Graphical User Interface (GUI) is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators.8. An application is a computer program designed to help the user to perform specific tasks, such as word processing or web browsing.9. A Local Area Network (LAN) is a computer network that interconnects computers in a localized area.10. Universal Serial Bus (USB) is an industry standard developed in the 1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.三、简答题(每题10分,共40分)1. Explain the difference between a computer virus and a computer worm.A computer virus requires a host program to replicate itself, whereas a computer worm can replicate and spread independently without needing a host program.2. Describe the role of a firewall in computer security.A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the Internet.3. What are the benefits of using a cloud-based service? Cloud-based services offer benefits such as scalability, accessibility, cost-effectiveness, and the ability to store and process large amounts of data in a remote location.4. Discuss the importance of data backup and recovery in a computer system.Data backup and recovery are crucial for protecting against data loss due to hardware failure, software bugs, data corruption, or cyber-attacks. Regular backups ensure that data can be restored in the event of a system failure,minimizing downtime and potential financial loss.四、论述题(20分)Discuss the impact of the Internet of Things (IoT) on society and the economy.The Internet of Things (IoT) has had a profound impact on society and the economy by enabling the interconnection of everyday objects, allowing them to send and receive data. This has led to increased efficiency in various industries, improved quality of life through smart home technologies, and the creation of new business models and markets. However, it also raises concerns about data privacy and security, as well as the potential for increased surveillance and control.。
计算机专业英语Unit3

Section 2 Passages
பைடு நூலகம்
Section 3 Skill in Focus
•
Section 4 Extended Reading
Unit 3 Operation System
Section 1 Situational Dialogue
System Crash 1、在使用计算机的过程中,你遇到过系统崩溃的情况吗, 简单描述一下。
• • • •
Unit 3 Operation System
Section 2 Passage A: Categories of Operating System
1、你所知道的操作系统有哪些 2、你觉得未来操作系统的发展趋势是什么
Unit 3 Section 2 Passage A
• OS • software • application program • resource • error • batch processing • real-time • multi-tasking • multi-user • distributed • time sharing • desktop
• •
• •
Unit 3 Section 1
•
Zhang Ning: Well, there might many causes for system crash. One of them is software. The simplest operation like installing and uninstalling might cause a crash in system. Problems within the system may also do that, so you have to be very careful when deleting DLL files, modifying Windows registry, or upgrading the operating system. Another cause is the hardware problem. Have you tried backing up the files? It would be a great help in system restoration when the problem doesn’t lie in the hardware. Cheng Hong: The service personnel installed a ghost program for me when I bought the computer. Will I lose the data in my hard disk if it is restored? Qian Liang: Not except the data on C: drive, where files on your desktop or in My Documents are stored. You may move them into other locations with a bootable disk or under DOS if there are any. Cheng Hong: There are a lot of learning materials in My Documents and on the desktop. Would you please help me transfer them? It might save me the trouble of calling for customer services, and what’s more important, I’d learn a lot from you. Qian Liang: No problem.
计算机专业英语Unit 3

Unit 3Text 11.Match each of the words or phrases with their Chinese meaning.disk 磁盘modem 调制解调器driver 驱动器printer 打印机display 显示器mouse 鼠标keyboard 键盘computer 计算机2.Fill a correct word learned in this text in each of the blanks.(1)The display of the computer is also called______.Screen(2)The function of a ____ is to print the information or data on a piece of paper.printer(3)The keyboard is one of the _____devices.input(4) A modem plays an important role when you want to use the ______.internet3. Translation.(1)我是一个操作员。
I am a computer programmer.(2)什么是电子计算机?What is a electronic computer?(3)我有一个键盘。
I have a keyboard(4)It costs me 4000 Yuan to buy a computer.买一台电脑需要花费我4000元人民币。
(5)I am now finding a file that was deleted by mistake.我正在找一个不小心被我误删的文件。
(6)There was some problems with my mouse. Maybe it’s not clean.我的鼠标器有点问题,也许是它不干净了。
大工17秋《专业英语(计算机英语)》在线测试123满分

⼤⼯17秋《专业英语(计算机英语)》在线测试123满分⼤⼯17秋《专业英语(计算机英语)》在线测试1需要QQ2959415429 微信 open4511⼀、单选题 (共 20 道试题,共 80 分)1.(), difference between the lowest and highest frequencies transmitted in a particular channel or system.A.AmplitudeB.BandwidthC.Bridgework2.( ) also called a Personal computer or PC, defines a computer, which is designed for general use by a single person. It can perform all of its inputting, processing, outputting, and storage activities by itself.A.MicrocomputerB.SupercomputerC.MainframeD.Minicomputer3.( ) programs are used to recover deleted or damaged(corrupted) files.A.Data recoveryB.System callC.System crashD.System software4.( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures5.( ) refers to the physical equipment that can perform the basic functions contained within the data processing cycle.A.SoftwareB.HardwareC.MemoryD.CPU6.Which one is a word processing and text editing tool?A.PhotoshopB.WordC.Extreme 3DD.Premiere7.( ) are the peripherals that allow users to enter data, programs, commands, and user responses into a computer and transform them into a suitable form for processing.A.RAMB.ROMC.Input devicesD.Memory8.The first computers used () for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.A.vacuum tubesB.transistorsC.integrated circuitsD.microprocessors9.() performs arithmetic, comparison, and logic operations. It is one part of the CPU.A.RAMB.ROMC.CPUD.ALU10.( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures11.Processing is done inside the computer in an area called the ( ).A.input devicesB.output devicesC.system unitD.central processing unit12.A ( ) can be written to once. After that they can be read many times without deterioration but cannot be written on or erased.A.CD-RB.CD-ROMC.CD-RWD.DVD13.( ) provides reliable, full-duplex connections and reliable service by ensuring that data is resubmitted when transmission results in an error.A.TCPB.ARPC.UDPD.IP14.( ) is an outline of the logic of the program you will write.A.Program flowchartsB.Logic structuresC.PseudocodeD.Design15.Linux is an operating system similar to ( ) that is becoming more and more popular.A.Windows 98B.Windows 2000C.Windows XPD.Unix16.( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.A.MIDIB.WAVC.RAD.Audio17.In a ( ) network, all microcomputers and other communication devices are connected to a continuous loop.A.busB.starC.treeD.ring18.() have more storage capacity than diskettes and also offer faster access to the data they hold.A.Hard disksB.Optical disksC.Zip diskD.CD19.In 1947 three scientists, John Bardeen, William Shockley, and Walter Brattain working at( )invented the transistor computer.A.BaiduB.MicrosoftC.AT&T's Bell LabsD.Yahoo20.( ), to send files from a user's microcomputer to another computer. Compare with download.A.UploadB.TelecommutingC.HypertextD.Online service⼆、判断题 (共 10 道试题,共 20 分)1.Mouse belongs to output.()A.错误B.正确2.CPU stands for Central Processing Unit. It performs the system's calculating and processing.A.错误B.正确N, communications network that covers a wide geographical area, such as a state or a country.( )A.错误B.正确4.WWW stands for "World Wide Web"; it is the large global collection of Internet servers which support hypertext documents coded in HTML, and transferred via HTTP.A.错误B.正确5.The transistor computer did not last as long as the vacuum tube computer lasted, but it was less important in the advancement of computer technology.A.错误B.正确6.Object Oriented Programming(OOP) is a programming method that combines data and the instructions for processing that data into a self-sufficient "object" that can be used in other programs.()A.错误B.正确7.Windows versions before Windows 95 rely on DOS as the operating system.()A.错误B.正确 is an E-mail address.A.错误B.正确9.An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.A.错误B.正确10.View shortcut menus by right-clicking with the mouse.()A.错误B.正确⼤⼯17秋《专业英语(计算机英语)》在线测试2⼀、单选题 (共 20 道试题,共 80 分)1.The two components of the CPU are connected by a kind of electronic roadway called a(an) ().BB.busC.portD.keyboard2.The operation system ( ).A.manages the disks and filesB.manages the computer's resourcesC.manages the computer's memoryD.All of the above3.() ,also known as service programs, perform specific tasks related to managing computer resources.A.Utilities programsB.System softwareC.Operating systemD.none of the above4.():In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.A.Asymmetric keyB.Symmetric keyC.Coputer virusD.Digital signatures5.A () port is an interface that connects devices by transferring more than one bit at a time.A.serialB.parallelBD.none of the above6.( ), software used in corporate networks (intranets and extranets) to prevent unauthorized people from accessing the network.A.FirewallB.ModemC.HypertextD.TCP7.The common input devices are the ()and the keyboard.A.printerB.speakerC.monitorD.mouse8.A ( ) channel allows simultaneous message exchange in both directions.It really consists of two simplex channels, a forward channel and a reverse channel,linking the same points.A.half-duplexB.full-duplexC.simplexD.none of the above9.(), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.A.Lossy compressionB.Lossless compressionC.BitmapD.Vector image10.( ) have more storage capacity than diskettes and also offer faster access to the data they hold.A.Hard disksB.Optical disksC.Zip diskD.CD11.The ( ) is automatically loaded into RAM soon after you turn on, or "boot" the computer.A.application softwareB.operating softwareC.shellpiler12.The ( ) is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.A.InternetB.WWWC.ARPANETD.ISP13.A()is a cable which is capable of carrying signals representing data from one place to another.A.busB.byteC.bitD.disk14.A backup program ( ).A.makes a copy of files you selectB.returns you to the previous programC.undoes the last change you madeD.None of the above15.A ( ) is an electronic device that operates under the control of instructions stored in its own memory, which can according to specified rules, produce results,and store the results for future use.puterB.CPUC.input deviceD.output device16.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of( ).A.microprocessorB.transistorC.chipD.circuit17.We abbreviate Virtual Private Networks to ( ).A.NICB.VPNC.HUBD.MODEM18.The technical development that marks the third generation of computers is the use of () in computers.A.vacuum tubesB.integrated circuitsC.transistorsD.virtual memory19.( ), interface that enables dissimilar networks to communicate with one another.A.GatewayB.BridgeC.BandwidthD.none of the above20.ERP is ( ).A.Enterprise resource planning softwareB.Enterprise Application IntegrationC.Electronic Application IntegrationD.None of the above.⼆、判断题 (共 10 道试题,共 20 分)1.Output devices are peripherals that allow users to enter data, programs, commands, and user responses into a computer and transform them into a suitable form for processing.( )A.错误B.正确2.CPU stands for Central Processing Unit. It performs the system's calculating and processing.A.错误B.正确3.An ISP is a company that provides access to the Internet.A.错误B.正确4.Memory also called main memory, primary storage, RAM, is an internal storage area in the computer, where data and programs designed for immediate processing are held.A.错误B.正确5.Device drivers are specialized programs designed to allow particular input or output devices to communicate with the rest of the computer system.( )A.错误B.正确6.A compilier is software that looks at an entire high-level program before translating it into machine language.A.错误B.正确7.A location in RAM memory is accessed by its address.()A.错误B.正确8.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of microprocessor.()A.错误B.正确9.Software also called a program, is the series of computer language coded instructions that tells the computer how to perform tasks.A.错误B.正确10.Java is a compiled object-oriented programming language used to write applets.A.错误B.正确⼤⼯17秋《专业英语(计算机英语)》在线测试3-0012⼀、单选题 (共 20 道试题,共 80 分)1.An ( ) is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.A.Electronic CommerceB.Credit cardC.Online paymentD.none of the above2.The technical development that marks the third generation of computers is the use of () in computers.A.vacuum tubesB.integrated circuitsC.transistorsD.virtual memory3.( ), the process of changing plaintext data into enciphered text through an algorithm.B.EncryptionC.AuthenticateD.Hacker4.( ), also called communications network; a system of interconnected computers, telephones, or other communications devices.A.ProtocolB.NodeC.Packetwork5.Processing is done inside the computer in an area called the ( ).A.input devicesB.output devicesC.system unitD.central processing unit6.A (),also called a silicon chip or semiconductor,is a small piece of silicon that contains thousands of microminiature electronic circuit components, mainly transistors.A.busB.chipC.portD.keyboard7.() is the electronic device that interprets and carries out the basic instructions that operate the computer.A.ProcessorB.hardwareC.memoryD.CPU8.( ) also called a Personal computer or PC, defines a computer, which is designed for general use by a single person. It can perform all of its inputting, processing, outputting, and storage activities by itself.A.MicrocomputerB.SupercomputerC.MainframeD.Minicomputer9.The process of translating instructions into commands is called ( ).A.decodingB.registerC.digitalD.port10.A ()is a communication device that enables computers to communicate via telephone lines or cable.A.modemB.hardwareC.software11.( ) is a way of transferring files over the Internet from one computer to another.A.InternetB.FTPC.E-mailD.ISP12.()(Reduced Instruction Set Computer) refers to processors that support fewer instructions than CISC chips. The reduced number of instructions enables them to execute instructions faster.A.CISCB.RISCC.RAMD.ROM13.The first computers used () for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms.A.vacuum tubesB.transistorsC.integrated circuitsD.microprocessors14.() (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.A.JPEGB.MPEGC.MIDID.none of the above15.() controls how you enter data or instructions and how information is displayed on the computer screen.er interfacenguage translatorsC.Utilities programsD.System software16.The standard protocol used for sending Internet e-mail is called ( ). It works in conjunction with POP servers.A.SMTPB.WWWC.TCPD.UDP17.The common input devices are the ( ) and the ( ).A.keyboard,printerB.keyboard,microphoneC.mouse,monitorD.mouse,keyboard18.() will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.A.AnimationB.WAVC.MultimediaD.none of the above19.( ) is an outline of the logic of the program you will write.A.Program flowchartsB.Logic structuresC.PseudocodeD.Design20.A ( ) converts the programmer's procedural language program, called the source code, into a machine language code, called the object code.pilerB.AssemblerC.InterpreterD.Code generator⼆、判断题 (共 10 道试题,共 20 分)1.A bus is a cable which is capable of carrying signals representing data from one place to another.( )A.错误B.正确2.Application software consists of programs that perform specific tasks for users.( )A.错误B.正确3.The fourth generation computers can be characterized by both the jump to monolithic integrated circuits and the invention of microprocessor.()A.错误B.正确4.The ENIAC used thousands of vacuum tubes,which took up a lot of space and gave off a great deal of heat just like light bulbs do.A.错误B.正确5.Asymmetric key(Public Key),in encryption, one key is used to both lock and unlock data.( )A.错误B.正确6.CPU is the soul of a computer.A.错误B.正确7.View shortcut menus by right-clicking with the mouse.()A.错误B.正确8.ERP is Enterprise resource planning software.A.错误B.正确9.Device drivers are specialized programs designed to allow particular input or output devices to communicate with the rest of the computer system.( )A.错误B.正确10.A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )A.错误B.正确。
计算机专业英语第3章在线测试

A BC DThe data, when they are not encrypted, are calledA BC DA virus is aA BC DMany viruses go resident in the memory like a ( ).A BC DNow, about ( ) different viruses account for all the viruses that actually spread in tA BC DC、attack phaseD、create phase2、( ) maybe a certain cause that some viruses infect upon.A、a dayB、a timeC、an external event on your PCD、a counter within the virus3、Many viruses do harmful things such as ( ).A、deleting filesB、simulating typosC、slowing your PC downD、changing random data on your disk4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.A、stealing storageB、pilfer CPU cyclesC、del_ete filesD、play music5、Some viruses, with no attack phase, often damage the programs or disks they infect bec ause they ( ).A、have bugs in themB、contain poor quality codeC、steal storageD、show messages on your screen第三题、判断题(每题1分,5道题共5分)正确错误Michelangelo is a file sector.正确错误Computer virus is remote from us.正确错误Computer virus may affect the your phisical health .正确错误The author thinks that understanding how an attacker approaches your computer system c 正确错误。
计算机专业英语第三单元习题答案

5.machine code机器码
6.assembly code汇编码
7.Trojan horse特洛伊木马程序
8.software package软件包
2.low-level; high-level
3.low-level
4.Machine
5.functional;logic
6.Statement
7.Module
8.digital
II.Translate the following terms or phrases from English into Chinese and vice versa:
8.pull-down menu下拉菜单
9.dialog box对话框
10.scroll bar滚动条
Section C
I.Fill in the blanks with the information given in the text:
1.Objects
2.platform-independent
14.assignment statement赋值语句
15.logic language逻辑语言
16.machine language机器语言
17.procedural language过程语言
18.programming language程序设计语言
19.run a computer program运行计算机程序
3.Multithreading
4.Runtime
II.Translate the following terms or phrases from English into Chinese and vice versa:
计算机专业英语试题及答案

计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hackeri. 黑客 10. switchj. 防火墙1. 6.2. 7.3. 8.4. 9.5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
计算机专业英语第3版unit3

2011-5-16
计算机专业英语(第3版)
1
3.1 Multimedia
As the name suggests, multimedia is a set of more than one media element used to produce a concrete and more structured way of communication. With growing and very fast changing information technology, multimedia has become a crucial part of computer world.
计算机专业英语(第3版) 11
Notes
[1] As a multimedia programmer, you can choose what font to display text in, how big (or small) it should be, and what color it should be displayed in. “As a multimedia programmer”作状语, “what …, how…, what…”是并列的宾语从句。 译文:一个多媒体程序员可以选择要显示文本的字 体、字号大小以及颜色。
Unit 3 Multimedia and Its Applications
3.1 3.2 3.3 3.4 3.5 Multimedia Computer Graphics and Images Computer Aided Design Computer Animation Multimedia Software
2011-5-16
计算机专业英语(第3版)
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
A B
C D
The data, when they are not encrypted, are called
A B
C D
A virus is a
A B
C D
Many viruses go resident in the memory like a ( ).
A B
C D
Now, about ( ) different viruses account for all the viruses that actually spread in t
A B
C D
C、attack phase
D、create phase
2、( ) maybe a certain cause that some viruses infect upon.
A、a day
B、a time
C、an external event on your PC
D、a counter within the virus
3、Many viruses do harmful things such as ( ).
A、deleting files
B、simulating typos
C、slowing your PC down
D、changing random data on your disk
4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission.
A、stealing storage
B、pilfer CPU cycles
C、del_ete files
D、play music
5、Some viruses, with no attack phase, often damage the programs or disks they infect bec ause they ( ).
A、have bugs in them
B、contain poor quality code
C、steal storage
D、show messages on your screen
第三题、判断题(每题1分,5道题共5分)
正确错误
Michelangelo is a file sector.
正确错误
Computer virus is remote from us.
正确错误
Computer virus may affect the your phisical health .
正确错误
The author thinks that understanding how an attacker approaches your computer system c 正确错误。