计算机专业英语(Timothy J.O'Leary2008影印版)课后练习题答案
计算机科学引论(2008)影印版课后答案

Chapter 1Crssword Puzzle1.people2.end user3.procedures4.document file5.device driver6.database files7.operation system8.hardware9.Internet10.modem11.softwarermation13.data14.tablet PCMultiple Choice1. b2. b3. a4. b5. d6. d7. a8. c9. d10.dMatching:1----e2----f3----i4----h5---a6----c7---g8---b9---d10—jOpen-ended1.An information system has five parts: people, procedures, software, hardware and data.People: Are end users who use computer to make themselves more productive.Procedures: Specify rules or guidelines for computer operations.Software: Provides step-by-step instructions for computer hardware.Hardware: Processes the data to create information.Data: Consist of unprocessed facts including text, numbers, image and sounds.People are the most important part of any information system.2.System software helps the computer manage its own internal resources. It includes three kindsof programs: operating systems, utilities and device drivers programs.3.Basic applications are the kinds of programs to be considered computer competent.Specialized applications are more narrowly focused on specific disciplines and occupations.Basic applications have some types, such as browser, word processor, spreadsheet ,and so on.Also specialized applications have many types, some of the best known are graphics, audio and video, multimedia, Web authoring ,and artificial intelligence programs.4.There are four types of computers: supercomputers, mainframe computers, minicomputers,and microcomputers.Supercomputers are the most powerful type of computer.Mainframe computers occupy specially wired, air-conditioned rooms, they are capable of great processing speeds and data storage.Minicomputers are refrigerator sized machines.Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of computer.Microcomputers are the most common type of computers.There are four types of microcomputers: Desktop computers, Notebook computers, Handheld computers and PDA.5.Connectivity is the capability of you microcomputer to share the information with othercomputers.Wireless revolution dramatically affect connectivity.A computer network is a communications system connecting two or more computers.Internet is the largest network in the world.The Web provides a multimedia interface to the numerous resources available on the Internet.Chapter2Crossword Puzzle:1.hits2.ISP3.spam4.applets5.surf, search engine6.URL7.ftp8.carder9.attachment10.B2B11.Browser12.filter13.link14.downloading, DSLMultiple Choice:1. d2. a3. c4. c5. a6. a7. a8. a9. d10.bMatching:1----i2----d3----g4----e5---f6----c7---h8---j9---a10—bOpen-Ended1.The most common uses of the Internet are the following: communicating, shopping, searching,entertainment, education, and so on. I have participated in almost all of them. I think communicating is the most popular.2. The two most common types of providers are National and wireless.National service providers provide access through standard telephone connections.Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.3. A typical e-mail message has three basic elements: header, message and signature.4. Social networking is the grouping of individuals into specific groups. There are three basic categories of social networking sites: reuniting, friend-of-a-friend and common interest Reuniting sites are designed to connect people who have known one another but have lost touch.Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.Common interest sites bring together individuals that share common interests or hobbies.5. There are three types of search engines: crawler-based search engines, metasearch engines and specialized search enginesCrawler-based search engines, such as Google, create their listings automatically. Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates, orders the hits, and then provides the edited list to you .one of the best known is Dogpile.Specialized search engines focus on subject-specific Web sites. such as Environment.Chapter 3Crossword Puzzle1.menu2.worksheet3.table4.window5.DBMS6.master slide7.dialog box8.software suite9.word wrap10.sort11.cell12.range13.column14.database15.toolbar16.document17.slides18.queryMultiple Choice1. d2. c3. b4. d5. d6. a7. b8. b9. c10.bMatching1.j2. a3. c4.h5. b7.i8. e9.g10.fOpen-Ended1.General-purpose application are widely used in nearly every discipline and occupation. Theyinclude word processors, spreadsheets, database management systems and presentation graphics.Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.2.Most applications use a GUI, use windows to display information, and have menus to presentcommands.3. A formula is an instruction to calculate or process. Functions are prewritten formulas. Aformula related to what-if analysis is called recalculation.4.Presentation graphics are programs that combine a variety of visual objects to create attractive,visually interesting presentation. People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional.5.An integrated package is a single program that provides the functionality of a word processor,spreadsheet, database manager, and more. The primary disadvantage of an integrated package is that the capabilities of each function are not as extensive as in the individual programs. The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundled together and sold asa group. It is significantly less expensive to buy a suite of applications than to buy eachapplication separatelyChapter 4Crossword Puzzle1.bitmap image2.VRML3.morphing4.story board5.interactivity6.ACID7.fuzzy logic8.blog9.web authoring10.graphical map11.pixels12.link13.vector image14.AI15.flashMultiple Choice2. a3. a4. b5. a6. b7. c8. b9. a10.bMatching1.i2.g3. d4. e5. c6. f7.h8. b9.j10.aOpen-Ended1.Graphics are widely used to analyze data and to create professional-looking presentations;Desktop publishers focus on page design and layout and provide greater flexibility;Image editors are programs for creating and editing bitmap images;Illustration programs are used to create and to edit vector images;Image galleries are libraries of electronic images. These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;Graphics suites are some companies combining their separate graphics programs in groups. 2.Audio editing software allows you to create and edit audio clips, most software allow you toadd audio effects to your tracks. Video editing software allows you to reorganize, add effects, and more to your digital video footage.3.Multimedia is the integration of all sorts of media into one presentation. The creation ofinteractive multimedia presentations follows several steps: Plan, Design, Create and Support.4.Creating a site is called Web authoring. A web site design is an interactive multimedia form ofcommunication, designing a web site begins with determining the site’s overall content, the overall site design is commonly represented in a graphical map. More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.5.The three areas of artificial intelligence are virtual reality, knowledge-based systems androbotics. Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer.Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users. Robotics is the field of study concerned with developing and using robots.Chapter 5Crossword Puzzle1.folderwork server3.GUI4.fragmented5.backup, booting6.warm boot7.windows8.utility suite9.driver10.icons11.tracks12.NOSMultiple Choice1. c2. d3. c4. a5. a6. c7. b8. b9. a10.cMatching1.j2. d3. f4. b5.g6.h7. a8. e9.i10.cOpen-Ended1.System software works with end users, application software, and computer hardware tohandle the majority of technical details. It consists of four types of programs: operating systems, utilities, device drivers and language translators.2.The basic functions of every operating system are : managing computer resources, providing auser interface, and running applications. The three basic operating system categories are: embedded, network and stand-alone.3.Windows is by far the most popular microcomputer operating system today. It comes in avariety of different versions and is designed to run with Intel and Intel-compatible microprocessors. Mac OS is not nearly as widely used as the Windows operating system. It isa powerful, easy-to-use operating system that is popular with professional graphic designs,desktop publishers, and many home users. While Windows, the Mac OS are proprietary operating systems, Linux is not. It is open source software free and available from many sources, including the Web.4.Utilities are specialized programs designed to make computing easier. The five most essentialutilities are: troubleshooting or diagnostic programs, antivirus programs, uninstall programs, backup programs and file compression programs. Utility suites combine several programs into one package.5. A device driver works with the operating system to allow communication between the deviceand the rest of the computer system. Each time the computer system is started, the operating system loads all of the device drivers into memory. Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used.Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver. Windows uses Windows Update to make reinstalling or updating device drivers easily.Chapter 6Crossword Puzzle1.system unit2.microprocessor3.bus width4.memory5.cable6.plug and play7.byte8.cache9.ASCII10.system clockMultiple Choice1. d2. b3. c4. b5. b6. a7. a8. c9. b10.dMatching1.j2. a3. c4.h5.g6.i7. d8. e9. f10.bOpen-Ended1.There are four basic types of system units: Desktop system units, Notebook system units,Tablet PC system units, and Handheld computer system units.Desktop system units typically contain the system’s electronic components and selected secondary storage devices.Notebook system units are portable and much smaller. They contain the electronic components, selected secondary storage devices, and input device.Tablet PC system units are highly portable devices that support the use of a stylus or pen to input commands and data.Handheld computer system units are the smallest and are designed to fit into the palm of one hand.2.The two basic components are: the control unit and the arithmetic-logic unit.Control unit tells the rest of the computer system how to carry out a program’s instructions.Arithmetic-logic unit performs two types of operations---arithmetic and logical.3.There are three types of memory chips: RAM, ROM, and CMOS.RAM chips hold the program and data that the CPU is presently processing, everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.CMOS chip provides flexibility and expandability for a computer system. It contains essential information that is required every time the computer system is turned on. It is powered by a battery and does not lose its contents when the power is turned. Its contents can be changed to reflect changes in the computer system.4.Five expansion cards are: graphics cards, sound cards, modem cards, NIC and TV tuner cards.Graphics cards connect the system board to the computer’s monitor, they convert the internal electronic signals to video signals so they can be displayed on the monitor.Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer. They also convert internal electronic signals to audio signals.Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.NIC are used to connect a computer to one or more other computers.TV tuner cards can changes the TV signal into one that can be displayed on you monitor.5.Four standard ports are: serial ports, parallel ports, universal serial bus ports and FireWireports.Serial ports are often used to connect a mouse, keyboard, modem, and many other devices to the system unit.Parallel ports are used to connect external devices that need to send or receive a lot of data over a short distance.USB ports are gradually replacing serial and parallel ports.FireWire ports provide connections to specialized FireWire devices.Chapter 7Crossword Puzzle1.dot pitch2.keyboard3.wheel button4.mechanical5.dumb6.OMR7.refresh rate8.dpi9.webcam10.digital camera11.toggle12.printer13.joystick14.HDTV15.UPC16.pixel17.flexibleMultiple Choice1. a2. b3. a4. b5. d6. a7. d8. c9. d10.bMathing1.i2. e3. f4.j5. a6. b7.g8. d9. c10.hOpen-Ended1.Input is any data or instructions that are used by a computer. Input devices are hardware usedto translate what people understand into a form that computers can process.2.①There are a widely of different pointing devices including the mouse, joystick, touch screen,light pen, and stylus.A mouse controls a pointer that is displayed on the monitor.A joystick is the most popular input device for computer games. You control game actions byvarying the pressure, speed, and direction of the joystick.A touch screen is a particular kind of monitor with a clear plastic outer layer.A light pen is a light-sensitive pen-like device.A stylus acts with the computer through handwriting recognition software.②There are three types of scanning devices: optical scanners, card readers, bar code readers,and character and mark recognition devices.An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.Card readers interpret encoded information.Bar code readers are either handheld wand readers or platform scanners.Character and mark recognition devices are scanners that are able to recognize special characters and marks.③Image capturing devices include digital cameras and digital video cameras.Digital cameras capture still images. Digital video cameras capture motion.④Audio input can take many forms including the human voice and music.V oice recognition systems accept voice commands to control computer operations and to create document.MIDI is a standard for connecting musical instruments to the system unit.3.The most widely used output devices are monitors, printers and audio output.Monitors present visual images of text and graphics.Printers translate information that has been processed by the system unit and present the information on paper.Audio output devices translate audio information from the computer into sounds that people can understand.4. Output is processed data or information. Output devices are hardware used to translateinformation that has been processed by the system unit into a form that humans can understands.5. Devices combine features of input devices such as scanners with features of output deviceslike printers are called combination input and output devices.Combination devices include fax machines, multifunction devices, Internet telephones, and terminals.A fax machine is a standard tool in nearly every office.Multifunction devices combine the capabilities of a scanner, printer, fax, and copying machine.Internet telephones are specialized input and output devices for receiving and sending voice communication.Terminals are input and output device that connect you to a mainframe or other type of computer.Chapter 8Crossword Puzzle1.track2.raid3.access time4.pits and lands5.disk caching6.online storage7.sector8.floppy9.zip10.cylinder11.densityMultiple Choice1. a2. a3. c4. a5. c6. a7. c8. d9. d10.cMatching1.g2. a3.j4.i5. d6. b7.h8. c9. f10.eOpen-Ended1.The traditional floppy disk is the 1.44MB 3-inch disk. They have a thin exterior jacket madeof hard plastic to protect the flexible disk inside.The high capacity floppy disks are 3 inches in diameter. They are able to store more information, are thicker, and require special disk drives.2.There are three types of hard disks: Internal hard disk, hard-disk cartridge, and hard-diskpack.Three ways to improve the performance of hard disks are disk caching, redundant arrays of inexpensive disks, and file compression/decompression.Disk caching improves hard-disk performance by anticipating data needs.Redundant arrays of inexpensive disks improve performance by expending external storage, improving access speed, and providing reliable storage.File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.3.The two most common optical disc formats are CD and DVD. Hi def is the next generation ofoptical discs.①There are four basic types of CDs: read only, write once, rewritable, and Picture and PhotoCDs.Read only CDs cannot be written on or erased by the users, they are used to distribute large databases, references, and large software application packages.Write once CDs can be written to once, they are used to archive data and to record music download from the Internet.Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.②There are three types of DVDs: read only, write once, and rewriteable.Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.Rewriteable DVDs are competing rewriteable formats.4.Solid-state storage does not have moving parts. Internet drives use the Internet to store dataand information. Magnetic tape provides sequential access for backup.Solid-state storage is more expensive than the others, it is more reliable and requires less power.Internet drives are low cost and the flexibility to access information from any location using the Internet. Access speed is slower.Magnetic tapes provide slower sequential access. It is an effective and commonly used tool for backing up data.5. Mass storage refers to the storage of large amounts of data in a persisting andmachine-readable fashion. Enterprise storage systems are the computer storage systems designed for large-scale, high-technology environments of the modern enterprises.Mass storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tape drives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory.Chapter 9Crossword Puzzle1.client2.bus networkwork gateway4.modulation5.base station6.packets7.analog8.GPS9.topology10.nic11.bps12.Bluetooth13.node14.bandwidth15.dsl16.hubMultiple Choice1. c2. b3. a4. d5. c6. d7. b8. b9. b10.dMatching1.g2. b3. a4.i5.h6. e7. c8.j9. d10.fOpen-Ended1.①Connectivity is a concept related to using computer networks to link people and resources.②The single most dramatic change in connectivity and communications in the past five yearshas been the widespread use of mobile or wireless telephones. This wireless technology allows individuals to stay connected with one another from almost anywhere at any time, the revolution is just beginning.③Communication systems transmit data from one location to another. Every communicationsystem has four basic elements: sending and receiving devices, communication channel, connection devices, and data transmission specifications.2.①Physical connections use a solid medium to connect sending and receiving devices.These connections include telephone lines, coaxial cable, and fiber-optic cables.Telephone lines consist of twisted pair cable, they have been the standard transmission medium for years for both voice and data.Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core.Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.②Wireless connections use the air to connect sending and receiving devices.Primary technologies used for wireless connections are infrared, broadcast radio, microwave, and satellite.Infrared uses infrared light waves to communicate over short distances.Broadcast radio communication uses special sending and receiving towers called transceivers.Microwave communication uses high-frequency radio waves.Satellite communication uses satellites orbiting about 22000 miles above the earth as microwave relay stations.3.The standard protocol for the Internet is TCP/IP. The essential features of this protocol involve:identifying sending and receiving devices and reformatting information for transmission across the Internet.Identification: Every computer on the Internet has a unique number address called an IP address, the Internet uses IP addresses to deliver e-mail and to locate Web sites.Reformatting: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the massage is sent, it is reformatted or broken down into small parts called packets, at the receiving end, the packets are reassembled into the correct order.4.The four principal network topologies are star, bus, ring, and hierarchical.In a star network, a number of small computers or peripheral devices are linked to a central unit, all communications pass through this central unit.In a bus network, each device in the network handles its own communication control.In a ring network, each device is connected to two other devices, forming a ring.The hierarchical network consists of several computers linked to a central host computer, other computers are also hosts to other, smaller computers or to peripheral devices.5.The most common network strategies are terminal, client/server, and peer-to-peer systems.①In a terminal network system, processing power is centralized in one large computer. Forthe end user it is lack of control and flexibility.②Client/server network system use one computer to coordinate and supply services to othernodes on the network. One advantage of the client/sever network strategy is the ability to handle very large networks efficiently. Another advantage is the ability of powerful network management software to monitor and control network activities. The major disadvantages are the cost of installation and maintenance.③In a peer-to-peer network system, nodes have equal authority and can act as both clientsand servers. The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.Chapter 10Crossword Puzzle1.cookie2.surge protector3.mal ware4.ergonomics5.cracker6.keystroke logger7.snoopware8.hacker9.history fileMultiple Choice1. a2. a3. d4. b5. a6. c7. d8. c9. b10.dMatching1.g2.h3. f4. a5. b6. c7.j8. d9.i10.eOpen-Endedrge databases raise some serious concerns on privacy: identity theft and mistaken identity.The impact of private networks on privacy has the two parts: The first instance, of firms eavesdropping on employees, has inspired attempts at federal legislation. The second instance, in which online information services screen and reject messages, is a common activity with most commercial services.The internet brings illusion of anonymity, the web creates a history file, your web activity ismonitored is by cookies. To respond to these privacy concerns, a code of fair information practice has been established.2. Computer criminals are of five types:Employees: The largest category of computer criminals consists of those with the easiest access to computers-namely, employees.Outside users: Some suppliers or clients may have access to a company’s computer system.Hackers and crackers: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes.Organized crime: Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do, but for illegal purpose.Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.3. Some of the principal measures to protect computer security are encryption, restricting access,anticipating disasters, and backing up data.Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals are also using encryption programs to safeguard their private communications.4.Ergonomics is defined as the study of human factors related to things people use.The physical health matters related to computers that have received the most attention recently are the following: eyestrain and headache, back and neck pain, and repetitive strain injury. Computer technology creates some irritants that may be counter productive: noise, and electronic monitoring.5.The basic elements of the Green PC are: System unit, display, and manufacturing.As a computer user, you can do to help protect the environment are the following:conserve, recycle, and educate.Chapter 11Crossword Puzzle1.purchasing2.marketing3.top4.purchase order5.research6.exception7.ess8.data worker9.demander11.tactical12.knowledge worker13.mis14.payroll。
计算机专业英语2008影印版-复习资料

Unit 11.Operating systems are programs that coordinate computer resources,provide an interfacebetween user and the computer,and run applications. 协调计算机资源,用户和计算机之间提供一个接口,运行应用程序。
2.Device drivers are specialized programs designed to allow particular input or output devicesto communicate with the rest of the computer system. 设备驱动程序是专门的程序设计为允许特定的输入或输出设备与计算机系统的其余部分。
3.System unit:the system unit is a container that houses most of the electronic components thatmake up a computer system. 系统单元:系统单元是一个容器,房子的大部分电子元件组成一个计算机系统。
4.Optical discs use laser technology and have the greatest capacity光盘使用激光技术和具有最大的能力5.*Connectivity is the capability of your microcomputer to share information with othercomputers连接是微机的功能与其他计算机共享信息6.Procedures are rules or guidelines to follow when using software,hardware,and date.they aretypically documented in manuals written by computer professionals. 程序规则或指导方针在使用软件,硬件,和日期。
《计算机专业英语》习题参考答案

《计算机专业英语》习题参考答案Lesson 1I.1. Operating System2. Fetch-evaluate-execute3. Front-side bus4. Dual-core processor5. Basic Input/Output System(BIOS)II.1. 指令是特定各式的二进制数列,它们对于每台机器都是唯一的。
2. CPU是中央处理单元的简称,每个字母分开发音。
3. 大多数计算在中央处理器中进行。
4. 双核是指一个处理器上有两个完整运算内核的CPU。
5. 处理器:是微处理器或CPU的缩写。
6. 集成电路:即芯片,是由半导体材料制成的一种电子设备。
III.1. F2. T3. TIV.1.ALU, CU, Register2.memory3.processor4.the CPULesson 2I.1.Static Random Access Memory(SRAM)2.Dynamic Random Access Memory(DRAM)3.Virtual Memory4.Physical Memory5.Level 1 Cache6.Level 2 Cache7.HDD access speedII.1.动态随机存储器之所以称为“动态”是因为它每秒钟被刷新数千次。
2.RAM:是计算机中存储操作系统、应用程序和当前正是用数据的地方。
3.ROM由计算机中一小块长寿命电池供电。
4.RAM缓存是由高速静态随机存储器构成的存储器。
III.1. F2. F3. F4. TIV.1. non-volatile2. compiler3. volatile4. DRAMLesson 3I.1. Motherboard2. PC Case3. Hard Disk Drive(HDD)4. Optical mouse5. RAM6. Mobile DiskII.1.PC是有很多组件构成的一个系统。
计算机专业英语(2008影印版)课后习题Multiple choice题目,答案及翻译

1、A common term that describes the combination of traditional computer and communication technologies isb. information technology一个描述了传统的计算机和通信技术结合的常见的术语B.信息技术2、Procedures are typically documented in manuals written byb. computer specialists程序一般是在手册撰写记录的B.计算机专家3、Which of the following is an example of connectivity?a. Internet下列哪一项是连接的一个例子吗?A.互联网4、Windows XP, windows Vista, and Macintosh OS X are all examples ofb. operating systems Windows XP,Windows Vista,和Macintosh OS X都是例子B.操作系统5、Because of their size and cost, these computers are relatively rare.d. supercomputers由于它们的尺寸和成本,这些电脑是比较少见的。
D.超级计算机6、The system component that controls and manipulates data in order to produce information is called thed. microprocessor系统组成,控制和操纵数据来产生信息称为D.微处理器7、A system component that translates data and programs that humans can understand into a form that the computer can process is called a(n)c. output device一个系统组件,将人类可以理解成计算机能够处理的形式的数据和程序被称为C.输出设备8、A CD is an example of a(n)c. optical disc CD是一个例子(N)C.光盘9、If you want to communicate a message or persuade other people, you would typically use this type of software.d. presentation如果你想传达信息或说服别人,你通常会使用这种类型的软件。
计算机专业英语(2008影印版)课后习题答案(包括crossword_puzzle的句子翻译)

Computing Essentials 2008课后练习题答案详解Chapter 1: Information Technology, The Internet, and Y ouCrossword Puzzle Answers: (p22)Across1 、The most essential part of an information system. People信息系统最基本的部分。
人7 、Coordinates computer resources. Operating System协调计算机资源。
操作系统10 、Modifies signals for processing. Modem修改信号以便处理。
调制解调器12 、Data that has been processed by the computer. Information计算机处理过的数据。
信息13 、Unprocessed facts. Data没处理过的事实。
数据14 、Notebook computer that accepts handwritten input.. Tablet PC可以用手写输入的笔记本电脑。
平板电脑DownNum. Clue Answer2 、Uses computers to become more productive. End User使用电脑变得更有效率。
终端用户3 、Rules or guidelines to follow when using software, hardware, and data. Procedures使用软件,硬件和数据时遵循的规则或指引。
指令说明书4 、Created by word processors. Document Files文字处理创建出来的。
文档文件5 、Specialized programs that allow input and output devices to communicate. Device Drivers 允许输入和输出设备通信的专业程序。
计算机专业英语影印版(Computing Essentials 2008课后答案大全)第三单元Basic Application Software

Crossword Puzzle Answers:Open Ended Questions:1.Explain the difference between general-purpose and special-purpose applications.General-purpose applications are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems, and presentation graphics.special-purpose applications are more narrowly focused on specific disciplines and occupations, such as graphics programs, audio and video editors,2.Discuss the common features of most software programs. Describe the new interfaceintroduced with 2007 Microsoft Office.The newest Office version, 2007 Microsoft Office, has a redesigned interface that is intended to make it easier for users to find and use all the features of an application. This new designintroduces ribbons, contextual tabs, galleries, and more.• Ribbons replace menus and toolbars by organizing commonly used commands into a set of tabs.These tabs display command buttons that are the most relevant to the tasks being performed by the user.• Contextual tabs are tabs that appear automatically. These tabs only appear when they are needed and anticipate the next operations to be performed by the user.• Galleries simplify the process of making a selection from a list of alternatives. This isaccomplished by replacing many dialog boxes with visual presentations of potential results.This new interface is the first major change in over a decade.3.What is the difference between a function and a formula? How is a formula related to what-if analysis?A formula is an instruction to calculate or process. Functions are prewritten formulas providedby the spreadsheet program that perform calculations such as adding a series of cells. If a change is made to one or more numbers in a spreadsheet, all related formulas will automaticallyrecalculate and charts will be recreated. Observing these changes is what-if analysis.4.What are presentation graphics programs? How are they used?Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentations. They are excellent tools to communicate a message and to persuade people.5.What is the difference between an integrated package and a software suite? Whatare the advantages and disadvantages of each?An integrated package is a single program that provides the functionality of a wordprocessor, spreadsheet, database manager, and more. The primary disadvantage of an integrated package is that the capabilities of each function (such as word processing) are not as extensive as in the individual programs (such as Microsoft Word). The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundled together andsold as a group. While the applications function exactly the same whether purchased in a suite or separately, it is significantly less expensive to buy a suite of applications than to buy each application separately.1. Expanding Your Technology exercise #3 Shareware explores how shareware programswork and what the risks involved in using them are.2.Writing About Technology exercise #1 Acquiring Software asks the student to explorefive ways of acquiring software. And asks if it is wrong to obtain and use unauthorized software.Web Tools1.Applying Technology exercise #3 Corel WordPerfect Office Suite has the studentresearch the suite and compare/contrast it to the Microsoft Office suite. It asks thestudent to do critical thinking and decide which is better for them.2. Expanding Your Technology exercise #2 Sharing Data between Applications has thestudent research object linking and embedding. The student is asked to provide examples and be able to define the difference between linking and embedding.Software Tools1.Applying Technology exercise #1 Speech Recognition explores the technology of speechrecognition software. How it is configured and what are its uses. It asks them to writeabout the advantages and disadvantages of it.2.Applying Technology exercise #2 Presentation Graphics explores the requirements,features, and uses of a presentation graphics application found on the website.3.Applying Technology exercise #3 Corel WordPerfect Office Suite has the studentscompare and contrast the Corel Suite with the Microsoft Suite products, and asks them to choose one.Writing Skills1.Applying Technology exercise #1 Speech Recognition explores the technology of speechrecognition software. How it is configured and what are its uses. It asks them to writeabout the advantages and disadvantages of it.2.Applying Technology exercise #3 Corel WordPerfect Office Suite has the studentscompare and contrast the Corel Suite with the Microsoft Suite products, and asks them to choose one.3.Expanding Your Knowledge exercise #1 How Speech Recognition Works has the studentexplore how speech recognition could enhance applications and to describe a profession that could benefit from it.4.Expanding Your Technology exercise #3 Shareware explores how shareware programswork and what the risks involved in using them are.5.Writing About Technology exercise #1 Acquiring Software asks the student to explorefive ways of acquiring software. And asks if it is wrong to obtain and use unauthorized software.6.Writing About Technology exercise #2 Software Standards has the student explore theissue of standardization of computer software. It asks them to find out about therequirements of certifications and how compliance is handled.。
计算机专业英语2008影印版选择题的翻译加答案

CHAPTER 11、A common term that describes the combination of traditional computer and communication technologies isb. information technology一个描述了传统的计算机和通信技术结合的常见的术语B.信息技术2、Procedures are typically documented in manuals written byb. computer specialists程序一般是___在手册撰写记录的B.计算机专家3、Which of the following is an example of connectivity?a. Internet下列哪一项是连接的一个例子吗?A.互联网4、Windows XP, windows Vista, and Macintosh OS X are all examples ofb. operating systemsWindows XP,Windows Vista,和Macintosh OS X都是__的例子B.操作系统5、Because of their size and cost, these computers are relatively rare.d. supercomputers由于它们的尺寸和成本,这些电脑是比较少见的。
D.超级计算机6、The system component that controls and manipulates data in order to produce information is called thed. microprocessor系统组成,控制和操纵数据来产生信息称为D.微处理器7、A system component that translates data and programs that humanscan understand into a form that the computer can process is called a(n)c. output device一个系统组件,将人类可以理解成计算机能够处理的形式的数据和程序被称为C.输出设备8、A CD is an example of a(n)c. optical discCD是___的简称C.光盘9、If you want to communicate a message or persuade other people, you would typically use this type of software.d. presentation如果你想传达信息或说服别人,你通常会使用这种类型的软件。
计算机专业英语试题及答案(A卷)

湖北职业技术学院2008-2009学年度第一学期期末考核试卷考核课程: 《计算机专业英语》 考试类型: 理论 考试方式: 闭卷笔试 学生所在院系: 信息技术学院 年 级: 2007 级 试 卷: A姓名: 班级: 学号:Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%)1. 软件工程 ( )2. 算术逻辑运算 ( )3. 机器码 ( )4. 帮助菜单 ( )5. 图形技术 ( )6. 中间件 ()7. 电子商务 ( )8. 办公自动化 ( )9. 计算机病毒( )10. 可执行文件( )column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)1. memory unit a. 半导体存储器2. intelligence b. 机制3. semiconductor memory c. 存储单元4. data definition language d. 数据定义语言5. mechanism e. 通信6. machine language f. 机器语言7. communication g. 智能8. element distance h. 桌面操作系统9. desktop operating system i. 输入/输出设备10.input/output device j.像素距离1. () 6. ()2. () 7. ()3. () 8. ()4. () 9. ()5. () 10.()Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)1. 只读存储器 _________ 6. 超文本标记语言_________2. 中央处理器_________ 7. 计算机辅助设计_________3. 基本输入输出系统_________ 8. 万维网联盟_________4. 信息技术_________ 9. 图形用户界面_________5. 万维网_________ 10. 兆赫_________Ⅳ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15%)1. The basic units of a computer system are as follows: _________A. CPU, memory and diskB. CPU, input and output unitC. CPU, memory and I/O systemD. CPU, memory and ALU2. A mouse is a small device that a computer user pushes across a desk surface inorder to point to a place on a _________ and to select one or more action to take from that position.A. desktopB. displayC. consoleD. platform3. The control unit fetches _________ from memory and decodes them.A. dataB. informationC. resultsD. instructions4. When power is removed, information in the semiconductor memory is________.A. reliableB. lostC. manipulatedD. remain5. Please find the item that is not belong to the DBA _________.A. storage structure and access method definitionB. schema definitionC. integrity constrain specificationD. DDL6. Each_________ is a unit of both atomicity and consistency.A. transactionB. databaseC. storage structureD. schema details7. A characteristic of operating system is _________.A. resource managementB. memory managementC. error recoveryD. all the above8. Assembly-language instructions are a series of _________.A. 0s and 1sB. abstract codesC. machine codesD. words9. Software engineering is some certain _______.A. programsB. methodsC. productsD. managements10. An advantage of a ring network is that it needs less _________ .A. computerB. networkC. cableD. information11. An ISP supplies a _________ that you can dial from your computer to log on the internet server.A. public keyB. private keyC. service numberD. help file12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. E-commerce do business through _________.A. face-to-face meetingB. computerC. wire-photoD. Internet and EDI14. Every transaction in electronic commerce includes information flow, commercial flow, _______ and material flow.A. data flowB. currency flowC. merchandise flowD.15. The _________ hidden in the infected system does not break out immediately; instead, it needs certain time or some condition before it breaks out.A. fileB. dataC. softwareD. virus(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)high-level language assembly language writtenmachine language notationA programming language, designed to facilitate the communication between human and computers, is a __________________ for describing computation in readable form. There are 3 levels of programming languages, they are __________________, which can be run directly by computer; __________________and______________. There are different high-level programming languages. Fortunately, most of them have many kinds of construct in common and vary only in the way that these must be__________________ . Therefore, first thing to be decided about a task is to choose which programming language is best suited for the job.Passage AThe hardware of a digital computer system is divided into four functional sections. The block diagram of Fig.2-4 shows the four basic units of simplified computer: the input unit, central processing unit, memory unit, and output unit.Each section has a special function in terms of overall computer operation.Fig.2-4 A Digital ComputerThe central processing unit (CPU) is the heart of the computer system. It is responsible for performing all arithmetic operations and logic decisions initiated by the program. In addition to arithmetic and logic functions, the CPU controls overall system operation. There are two main sections found in the CPU of a typical personal computer system: the arithmetic-logic section and the control section. But these two sections are not unique to personal computer. They are found in CPUs of all sizes.Every processor comes with a unique set of operations such as ADD, STORE, or LOAD that represent the processor’s instruction set. Computer designers are fond of calling their computer machines, so the instruction set is sometimes referred to as machine instruction and the binary language in which they are written is called machine language.The memory unit of the computer is used to store information such as numbers, names, and addresses. By “store”, we mean that memory has the ability to hold this information for processing or for outputting for later time. The programs that define how the computer is to process data also reside in memory.In computer system, memory is divided into two different sections, known as main storage and auxiliary storage. They are also sometimes called internal memory and external memory respectively. External memory is used for long term storage of information that is not in use. For instance, it holds programs, files of data, and files of information. In most computers, this part of memory employs storage on magnetic media such as magnetic tapes, magnetic disks, and magnetic drums. This is because they have the ability to store large amount of data. Internal memory is a smaller segment of memory used to temporary storage of programs, data, and information. For instance, when a program is to be executed, its instructions are first brought from external memory into internal memory together with the files of data and information that it will affect. After this, the program isexecuted and its files updated while they are held in internal memory. When the processing defined by the program is completed, the updated files are returned to external memory. Here the program and files are retained for use at later time. (二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (10%)1. The four basic units of simplified computer: the input unit, central processing unit, memory unit, and output unit. ( )2. The CPU is responsible for performing some arithmetic operations and logic decisions. ( )3. “ADD AX, BX” is an instruction of machine language. ( )4. Main storage and auxiliary storage are sometimes called internal memory and external memory respectively. ( )5. The binary language which they are written in machine instruction is called machine language. ( )Passage BIn order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer. If you want to solve the computational problem with a computer, you should learn how to program. The task of developing programs for the solution of computational problems is referred to as programming. Computer programming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise. So programming is breaking a task down into small steps.Programming is sometimes contrasted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines of program text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others.What's actually involved in programming - the actual process of writing programs? Here's a quick overview of the process:· Write a program.· Compile the program.· Run the program.· Debug the program.· Repeat the whole process until the program is finished.(三) Choose the best answer according to the passage B.(根据上文的内容选择正确的答案)(10%)1.If you want to solve the computational problem with a computer, you should learn how to_________.A. calculateB. programC. addD. subtract2. Computer programming is the process of planning and creating a sequence of _________ for a computer to follow.A. stepsB. processC. linesD. graphics3. The term coder is used to describe _________.A. machineB. computerC. keyboardD. person4. In order to solve a computational problem, you can let a person or a _________to do it.A. machineB. computerC. keyboardD. mouse5. Which of the following is not the stage of programming? _________.A. Write a program.B. Debug the program.C. Print the program.D. Compile the program.Passage CA computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days. According to Business Week, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number. As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:Basic Virus a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.Trojan Horses - This is a program that doesn't replicate when entering asystem but can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)1.A computer virus is a computer program that is created to make and spread _________of itself.A. programsB. virusC. copiesD. files 2.Worm spread itself except by_________. .A. networkB. E-mailC. programD. hardware 3.Antivirus program can scan and_________ virus.A. cleanB. produceC. replicateD. make 4.Trojan Horses_________ .A.quickly replicate itself and gradually attach to files, programs or the hard drive. B.infect the computer without even having to click open email attachment or any program.C.allow hackers to take control over a particular system or to steal very important data.D.avoid the virus to attack computer.5.According to Business Week, the_________ attacks reported in the first half of 2003 nearly match previous year's total number .A. 86,404B. 76,404C. 56,354D. 34,876(一)T ranslate the following sentences into Chinese(将下列句子翻译成汉语)(12%)1. For developing a software product, the development process is divided into 5 stages: Requirements Analysis & Specification, Design, Coding, Testing, and Maintenance.2. Functional testing tests whether the output is the expected result with the valid input.3. EDI refers to the electronic exchange of business information between two companies using a specific and structured format over private networks.4.Some applications, such as Word, allow for several windows in a special mode called MDI in which you can open multiple documents within the same application.(二)T ranslate the following paragraph into Chinese.(将下段文章翻译成汉语)(8%)Input Devices. Computer systems use many devices for input purpose. SomeInput Devices allow direct human/machine communication, while some first require data to be recorded on an input medium such as magnetic material. Devices that read data magnetically recorded on specially coated plastic tapes or flexible or floppy plastic disks are popular. The keyboard of a workstation connected directly to or online to a computer is an example of a direct input device. Additional direct input devices include the mouse, input pen, touch screen, and microphone. Regardless of the type of device used, all are components for interpretation and communication between people and computer systems.命题教师游彦教研室主任签字【第页共页】湖北职业技术学院2008-2009学年度第一学期期末考核试卷参考答案及评分标准考核课程:计算机英语考试类型:理论考试方式:闭卷笔试学生所在院系:信息技术学院年级:2007 试卷:A执笔人:要求:明确标注每小题或每步骤得分点Ⅰ. Translate the following phrases into English(将下列短语翻译成英语)(10%)( 本题共10分, 每小题1分)1. software engineering2. Arithmetic Logical operations3. machine code4. Help menu5. graphics technology6. middleware7. E-commerce8. office automation9. computer virus10. executable fileⅡ. Match the following words and expressions in the left column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)( 本题共10分, 每小题1分)1. ( c ) 6. ( f )2. ( g ) 7. ( e )3. ( a ) 8. ( j )4. ( d ) 9. ( h )5. ( b ) 10.( i )Ⅲ. Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写) (10%)( 本题共10分, 每小题1分)1. ROM 6. HTML2. CPU 7. CAD3. BIOS 8. W3C4. IT 9. GUI5. WWW 10. MHzⅣ. For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答案)(15%)( 本题共15分, 每小题1分)1. C2. B3. D4. B5. D6. A7. A8. B9. B 10. C 11. C 12. A 13.D 14. B 15. DⅤ. Reading comprehension(阅读理解)(35%)(一) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语, 以其适当的形式填空)(5%)( 本题共5分, 每空1分)notation machine language assembly language high-level language written (3空和4空答案可互换)(二) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误) (10%)( 本题共10分, 每小题2分)1. ( T )2. ( F )3. ( F )4. ( T )5. ( T )(三) Choose the best answer according to the passage B.(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. B2. A3. D4. B5. C(四) Choose the best answer according to the passage C(根据上文的内容选择正确的答案)(10%)( 本题共10分, 每小题2分)1. C2. A3. A4. C5. BⅥ. Translation.翻译(20%)(一) Translate the following sentences into Chinese(将下列句子翻译成汉语)(12%)( 本题共12分, 每小题3分)1.开发一个软件产品,开发过程分为五个步骤:需求分析和说明,设计,写代码,测试和维护。