计算机英语 选择题
计算机英语考试题目及答案

计算机英语考试题目及答案一、选择题1. What does HTML stand for?a) Hyper Text Markup Languageb) High Technology Multimedia Languagec) Home Tool Management Languaged) Human Token Marker Language答案:a) Hyper Text Markup Language2. Which of the following is not a programming language?a) Javab) Pythonc) HTMLd) C++答案:c) HTML3. What is the purpose of CSS?a) To add interactivity to web pagesb) To structure the content of web pagesc) To define the layout and style of web pagesd) To create dynamic web pages答案:c) To define the layout and style of web pages4. What is the function of a router in a computer network?a) To connect computers to the internetb) To store and manage data on a networkc) To protect the network from security threatsd) To direct network traffic between devices答案:d) To direct network traffic between devices5. Which of the following is a commonly used database management system?a) Microsoft Wordb) Adobe Photoshopc) MySQLd) Windows Media Player答案:c) MySQL二、填空题1. The process of converting source code into machine code is called ________.答案:compilation2. The most widely used programming language for web development is ________.答案:JavaScript3. TCP/IP stands for ________.答案:Transmission Control Protocol/Internet Protocol4. The physical components of a computer are referred to as ________.答案:hardware5. SQL stands for ________.答案:Structured Query Language三、简答题1. What are the advantages of using cloud computing?答案:Cloud computing offers several advantages, including:- Cost savings: Companies can reduce their infrastructure costs by using cloud services instead of maintaining their own hardware.- Scalability: Cloud services can easily scale up or down based on demand, allowing businesses to only pay for what they need.- Flexibility: Users can access cloud services from anywhere with an internet connection, enabling remote work and collaboration.- Disaster recovery: Cloud providers often have backup systems in place, ensuring data can be recovered in case of a disaster.- Automatic updates: Cloud services are typically updated regularly by the provider, ensuring users have access to the latest features and security patches.2. Explain the difference between HTTP and HTTPS.答案:HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is not secure, meaning that the data being transmitted can be intercepted and read by anyone. HTTPS (Hypertext Transfer Protocol Secure), on the other hand, is a secure version of HTTP. It uses encryption to ensure that data is encrypted before transmission, making it much more difficult for hackers to intercept and read. HTTPS is commonly used for secure online transactions, such as submitting credit card information or personal details.四、编程题请编写一个Python程序,实现计算圆的面积和周长的功能。
计算机英语试题3及答案

计算机英语试题3及答案一、选择题(每题2分,共20分)1. Which of the following is not a type of computer virus?A. TrojanB. WormC. Antivirus softwareD. Virus2. What does the acronym "CPU" stand for?A. Central Processing UnitB. Central Processing UnitC. Central Processing UnitD. Central Processing Unit3. In computer terminology, what does "RAM" refer to?A. Random Access MemoryB. Random Access MemoryC. Random Access MemoryD. Random Access Memory4. What is the primary function of a router?A. To store dataB. To transmit dataC. To receive dataD. To process data5. What is the term used to describe the process of converting data into a format that can be transmitted over anetwork?A. EncryptionB. CompressionC. DecompressionD. Encoding6. Which of the following is not a type of software?A. Operating systemB. Application softwareC. Utility softwareD. Hardware7. What does the acronym "GUI" stand for in the context of computer interfaces?A. Graphical User InterfaceB. Graphical User InterfaceC. Graphical User InterfaceD. Graphical User Interface8. What is the term for a computer program that is designed to perform a specific task?A. ApplicationB. ApplicationC. ApplicationD. Application9. What is the term used to describe a computer network that spans a relatively small area?A. LANB. LANC. LAND. LAN10. What does the acronym "USB" stand for?A. Universal Serial BusB. Universal Serial BusC. Universal Serial BusD. Universal Serial Bus二、填空题(每题2分,共20分)1. A computer virus is a type of malicious software that can replicate itself and spread to other computers without the user's permission.2. The central processing unit (CPU) is the primary component of a computer that performs most of the processing inside the computer.3. Random Access Memory (RAM) is a type of computer memory that can be read and changed freely and quickly.4. A router is a networking device that forwards data packets between computer networks.5. Encoding is the process of converting data into a format that can be transmitted over a network.6. Software is a collection of data or computer instructions that tell the hardware what to do and how to do it.7. A Graphical User Interface (GUI) is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators.8. An application is a computer program designed to help the user to perform specific tasks, such as word processing or web browsing.9. A Local Area Network (LAN) is a computer network that interconnects computers in a localized area.10. Universal Serial Bus (USB) is an industry standard developed in the 1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.三、简答题(每题10分,共40分)1. Explain the difference between a computer virus and a computer worm.A computer virus requires a host program to replicate itself, whereas a computer worm can replicate and spread independently without needing a host program.2. Describe the role of a firewall in computer security.A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the Internet.3. What are the benefits of using a cloud-based service? Cloud-based services offer benefits such as scalability, accessibility, cost-effectiveness, and the ability to store and process large amounts of data in a remote location.4. Discuss the importance of data backup and recovery in a computer system.Data backup and recovery are crucial for protecting against data loss due to hardware failure, software bugs, data corruption, or cyber-attacks. Regular backups ensure that data can be restored in the event of a system failure,minimizing downtime and potential financial loss.四、论述题(20分)Discuss the impact of the Internet of Things (IoT) on society and the economy.The Internet of Things (IoT) has had a profound impact on society and the economy by enabling the interconnection of everyday objects, allowing them to send and receive data. This has led to increased efficiency in various industries, improved quality of life through smart home technologies, and the creation of new business models and markets. However, it also raises concerns about data privacy and security, as well as the potential for increased surveillance and control.。
计算机英语考试题库

计算机英语考试题库1. 选择题(1) Which of the following is NOT an example of a programming language?a) Pythonb) Javac) HTMLd) CSS(2) What does CPU stand for?a) Central Processing Unitb) Control Processing Unitc) Computer Programming Unitd) Central Programming Unit(3) Which of the following is NOT a type of malware?a) Virusb) Trojanc) Routerd) Worm(4) What does HTML stand for?a) Hyperlink Text Markup Languageb) Hyper Text Markup Languagec) High Text Markup Languaged) Hyperlink Text Manipulation Language(5) What is the purpose of a firewall?a) To block access to websitesb) To protect against malware attacksc) To increase internet speedd) To encrypt confidential data2. 填空题(1) The process of converting source code into machine code is called ___________.(2) TCP stands for ___________.(3) ___________ is a programming language commonly used for web development.(4) RAM stands for ___________.(5) A ___________ is a unique identifier for a network adapter.3. 简答题(1) What is the difference between hardware and software in a computer system?Hardware refers to the physical components of a computer system, such as the monitor, keyboard, and motherboard. Software, on the other hand, refers to the programs and data that are stored on the computer and control its operations. Hardware is tangible and can be seen and touched, while software is intangible and cannot be physically interacted with.(2) What is the purpose of an operating system?An operating system (OS) is a software that manages computer hardware and software resources and provides common services for computer programs. Its purpose is to facilitate the execution of user programs and make it easier for users to interact with the computer. The OS handles tasks such as process management, memory management, file management, and device management.(3) Explain the concept of object-oriented programming.Object-oriented programming (OOP) is a programming paradigm that organizes data and behaviors into objects, which are instances of classes. A class defines the structure and behavior of objects, and objects can interact with each other through methods and attributes. OOP promotes modular and reusable code, as well as encapsulation and abstraction of data. This approach allows for more efficient and easier development, maintenance, and modification of software systems.4. 问答题(1) What are the main programming paradigms?The main programming paradigms include:- Procedural programming: Focuses on procedures or routines that manipulate data.- Object-oriented programming: Focuses on organizing data and behaviors into objects.- Functional programming: Focuses on using mathematical functions and avoids changing state and mutable data.- Logical programming: Focuses on using logical rules and constraints to solve problems.- Imperative programming: Focuses on expressing computation steps explicitly and changing program state.- Event-driven programming: Focuses on handling events and responding to user actions or system events.- Parallel programming: Focuses on executing tasks concurrently to improve performance.(2) What are the differences between HTTP and HTTPS?HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) are both protocols used for communication over the internet. The main differences are:- Security: HTTP is not secure and data is transmitted as plain text, making it vulnerable to interception and manipulation. HTTPS encrypts data using SSL/TLS protocols, providing confidentiality and integrity.- Port: HTTP uses port 80 by default, while HTTPS uses port 443.- Certificate: HTTPS requires a digital certificate from a trusted Certificate Authority (CA) to establish a secure connection. HTTP does not require a certificate.- Speed: HTTPS may be slightly slower than HTTP due to the encryption and decryption processes.5. 名词解释(1) Firewall: A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, preventing unauthorized access and protecting against malware and other cyber threats.(2) Cache: In computing, a cache is a high-speed data storage layer that stores frequently accessed or recently used data. It serves as a temporary storage to improve data retrieval speed and reduce latency. Caches can be found at different levels in a computer system, such as CPU cache, web browser cache, and DNS cache.(3) Algorithm: An algorithm is a set of step-by-step instructions or rules used to solve a problem or perform a task. It provides a clear and unambiguous method for solving a problem, and it is an essential concept in computer science and programming. Algorithms can be represented using pseudocode, flowcharts, or programming languages.(4) Encryption: Encryption is the process of converting plain text or data into a coded form, known as ciphertext, using an encryption algorithm and a secret key. It ensures the confidentiality and integrity of data by making itunreadable to unauthorized users. Encryption is widely used in data transmission, online banking, and secure communication.(5) Database: A database is an organized collection of structured data stored and accessed electronically. It is designed to efficiently store, retrieve, and manage large volumes of data. Databases are used in various applications, such as e-commerce, customer relationship management (CRM), inventory management, and more.。
计算机专业英语多选题

1.A user interface we said here is __ABC________A.a text-based user interface or GUIB.an interface between a computer and its peripheral deviceC.an interaction between an operating system and a userD.an interaction between an application program and a user2.___A___provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.A.The Transport LayerB. Session LayerC. Network LayerE.Application Layer E. Presentation Layer3.Many viruses do harmful things such as (ABCD ).A.deleting filesB. slowing your PC downB.simulating typos D. changing random data on your disk4.We can classify programming languages under two types:(AB ) languages and ( )languages.A.high-levelB. low-levelC. advanced-levelD. basic-level5.With an Internet connection you can get some of the basic services available are:___ABCD_______A.E-mailB. TelnetC. FTPD. Usenet news6. A general purpose computer has four main sections: ( ABCE).A.the control unitB. the memoryC. the input and output devicesD. the cpuE. the arithmetic and logic unit (ALU),7.Windows 2000 has the key technologies, they are (ABCD ).A.securityB. active directoryC. flat directoryD. enterprise management8.The register file is___ACD_______A.addressed by much shorter addressesB. physically largeC.physically smallD. one the same chip as the CPU9. A stack protocol can be used for (A ).A.removing the latest element ins( )ertedB. removing the earliest element ins( )ertedC. subroutine callsD. operation of arithmetic expressions10.The end equipment in a communication system includes (ABCD ).A.printersB. computersC. CRTsD. keyboards11.Microsoft Office Professional 2000 include____ABCD______.A.Excel 2000B. PowerPoint 2000C. Word 2000D. Outlook 200012. A general purpose computer has four main sections: ______ABCE______A.the input and output devicesB. the memoryC. the arithmetic and logic unit (ALU),D. the cpuE. the control unit13.The two most common types of scanners are (BC ) and ( )A. hand-held scannersB. flatbed scannersC. auto scannersD. handler scanners14.Some viruses use (CD ) and ( ) techniques to hide their existence.A.quickly spreadB. replace a part of system softwareC. stealthD. polymorphic15.The Windows 2000 product line includes____ABCD______.A.Windows 2000 Datacenter ServerB. Windows 2000 ProfessionalC. Windows 2000 ServerD. Windows 2000 Advanced Server16.Similar to viruses, you can also find malicious code in (ABC ).A.Trojan HorsesB. logic bombsC. wormsD. Microsoft Word Documents17.Viruses all have two phases to their execution, the ( ) and the ( BD).A.create phaseB. attack phaseC. del( )ete phaseD. infection phase18.Active Directory can help you (ACD ).A.get off the limits of down level networksB. deliver complete enterprise security by itselfC. build a complex international networkD. manage every resource with a single logon19.High-level languages are commonly classified as (ACDE ).A.object-orientedB. automaticC. functionalD. logic languagesE. procedure-oriented20.(CD )is a type of executable file .A.TXT fileB. JPG fileC. EXE fileD. COM file21.( ABCD) maybe a certain cause that some viruses infect upon.A.an external event on your PCB. a dayC. a counter within the virusD. a time22.(BC )is a type of executable file .A.TXT fileB. EXE fileC. COM fileD. JPG file23.The web browsers which is normal used, such as(ABCE ).A.FirefoxB. Internet ExplorerC. OpraD. ICQE. Apple Safari24.Newer ideas in computing such as(ABDE ) have radically altered the traditional concepts that once determined program form and functionA.artificial intelligenceB. distributed computingC. software engineeringD. parallel computingE. data mining25.Microsoft Windows currently supports __AC___and _____file systemsA.NTFSB. OCFSC. FATD. ext2E. NILFS26.Modem is ____ACD______.A.a modulator/demodulatorB. a data setC. a demodulatorD. a modulator27.The equipment _AB_____.A.transfers the number of bits in serial formB.manipulates digital information internally in word unitsC.transfers the number of bits in parallelD. manipulates digital information internally in serial form28.Electronic commerce that is conducted between businesses is referred to as business-to-business or DA. C2CB. C2BC. e-commerceD. B2B29.The World Wide Web also subsumes previous Internet information systems such as (AC ).A.GopherB. FtpC. FTPD. Telnet relies on the services of .NET data providers.There are ABCDA.ConnectionB. Data AdapterC. DataReaderD. Command31.The development process in the software life cycle involves four phases: analysis, design, implementation, and ___ACDE_____.A.analysisB. auditC. implementationD. designE. testing32.The end equipment in a communication system includes __ABCD____.A.printersB. CRTsC. computersD. keyboards33.In electronic commerce ,information search and discovery services include (ABCDE ).A.search enginesB. information filtersC. software agentsD. directoriesE. electronic catalogs34.GIS work with two fundamentally different types of geographic models.They are the (BD ).A.geography modelB. vector modelC. mathematic modelD. raster modelE. data model35.The two most common types of scanners are ____AC___and _____A.flatbed scannersB. hand-held scannersC. auto scannersD. handler scanners36.Windows 2000 has the key technologies, they are ( ABCD).A.active directoryB. flat directoryC. enterprise managementD. securityputer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes: ABCA.Firmware which is software programmed resident to electrically programmable memorydevices on board mainboards or other types of integrated hardware carriers.B.Application software such as word processors which perform productive tasks for users.C.Middleware which controls and co-ordinates distributed systems.38.Software engineering is related to the disciplines of ___ADE_____A.project managementB. natural languageC. netural networkD. systems engineeringE. computer science39.What make it is difficult to agree on how to count viruses? ABCDA.some viruses can create different versions when they infect other programsB.just a trivial change may create a new virusC.some viruses can use polymorphic techniqueD.new virus arise from an existing virus40. A virus is a program that reproduces its own code by (ABC ).A.ins_erting into the middle of a fileB. simply placing a pointerC. adding to the end of a fileD. replacing another program41.Input devices include: ____ABCD______.A.the keyboardB. microphoneC. touch screenD. the mouse42.Viruses all have two phases to their execution, the ( ) and the ( AD).A.attack phaseB. create phaseC. del_ete phaseD. infection phase43.The equipment (BC ).A.manipulates digital information internally in serial formB.manipulates digital information internally in word unitsC.transfers the number of bits in serial formD.transfers the number of bits in parallel44.Office automation is___CD_______.A.. the computerB. communications technologyC. the application of computerD. used to improve the productivity of people45.The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are: ABCDEA.System.Data.SqlClient. Contains the SQL Server .NET Data Provider types.B.System.Data.Odbc. Contains the ODBC .NET Data Provider types.C.System.Data. Contains provider-independent types such as the DataSet and DataTable.D.System.Data.OracleClient. Contains the Oracle .NET Data ProviderE.System.Data.OleDb. Contains the OLE DB .NET Data Provider types.46.C++ is __ACD________.A.extended from CB. a superset of CC. object-orientedD. procedure-oriented47.Some viruses, with no attack phase, often damage the programs or disks they infect because they (AD ).A.have bugs in themB. show messages on your screenC. steal storageD. contain poor quality code48.Windows 2000 is ( A).A.an inventive technologyB. used for building a scalable networkB.the same as Windows NT D. new lease of Windows49.Some common applications related to electronic commerce are the following:A.TeleconferencingB. Online bankingC. EmailD. Instant messagingE. Enterprise content managementF. NewsgroupsG. Shopping cart software50. A program is a sequence of ( ) that can be executed by a computer.It can either be built into the hardware or exist independently in the form of (BC ).A.hardwareB. softwareC. instructionsD. data51.Electronic payments include ___ABCD______.A.credit card paymentsB. electronic checksC. digital currenciesD. cash payment52.The web browsers which is normal used, such as____ABCD_____.A.OpraB. Internet ExplorerC. FirefoxD. Apple SafariE. ICQputer programs fall into two major classes: __AC____and ____.A.application programsB. application suiteC. operating systemsD. database application54.Database connection ( B) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.A.pondB. poolingC. linkD. connection55.The development process in the software life cycle involves four phases: analysis, design, implementation, and (ABCE ).A.implementationB. designC. analysisD. auditE. testing56.Hypermedia include ( ABCDEF)A.video clipsB. imagesC. textD. flashE. vidoeF. sounds57.An asleep state is_____ABD_____ed to lessen wear-and tear on the computerB. used for saving energyC. indicated by the indicator light putting outD. a low power standby mode58.Electronic payments include (ABCD ).A.digital currenciesB. electronic checksC. credit card paymentsD. cash payment59.You want to (BCD ) maybe wake up a virus that has residented in memory.A.del( )ete a fileB. access a disketteC. execute a programD. copy a file60.Before you turn the power on with a new computer, you should make sure_____ABCD_____A.the computer system has been set upB. the computer is already out of the boxB.appropriate software have been installed D. appropriate cables are correctly connected61.Security is usually enforced through ___ABE________.A.access controlB. encryptionC. data retrievingD. data storingE. auditingputer programming is the process of ABCD__the source code of computer programs.A. testingB. maintainingC. debuggingD. writing63.Queues that occur everyday life can be seen ( ABCD).A.as automobiles waiting for a traffic lightB. as people waiting for service at a bankC. in certain societies lacking equalityD. in an emergency room of a hospital64.Static graphics include____AB______.A.animatorsB. photographsC. moviesD. pictures66.which is the threat to computer security in the following choices ? ABCDA. Computer CriminalsB. Human ErrorsC. Computer CrimeD. earthquake65.The attributes of the stack are______A____.A.queueB. FIFOC. built into their circuitryD. LIFO66.If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission. BDA.play musicB. stealing storageC. del( )ete filesD. pilfer CPU cycles67.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are _______ABDE___________. A.minicomputers B. mainframes C. note book D. workstation E. microcomputers F. lenovo68.The Application layer in TCP/IP Model is correspond to (ABD ) in OSI ModelA.Presentation LayerB. Session LayerC. Transport LayerD. Application LayerE. Network Layer69. A computer system user generally more cares for___ABD_______A.speed of computationB. storage sizeC. physical size of the computerD. efficiency of the computer71.Cache is____ABC______A. slowB. high costC. fastD. relatively small72.We can say a bus is simply_____ABC_____ .A. a wireB. a 16-bit busC. a group of wiresD. a 8-bit bus73.Viruses can delay their attack for (ABCD ).A.yearsB. monthsC. weeksD. days74.In order to increase our computer’s performance we need to____BCD______A.buy a L1 cacheB. have a much larger main memoryC. have a L2 cacheD. buy a L2 cache75.The software that controls the interaction between the input and output hardware is called BIOS,which stands of __A________A.Basic Input Output SystemB. Classic Input Output SystemB.Advanced Input Output System D. Junior Input Output System76.To enhance performance of a computer system we should____ACD______A.improve the pattern of referencing operandB. optimize the simple movement of dataC. optimize the basic sequence control mechanismD. use IF and LOOP instructions as many as possible77.Their company used international lawyers to prosecute a crime ring involving software ____A____in Thailand.A.piracyB. copyingC. duplicationD. cloning78.The software that controls the interaction between the input and output hardware is called BIOS,which stands of (B)A.Advanced Input Output SystemB. Basic Input Output SystemC. Classic Input Output SystemD. Junior Input Output System79.Some viruses use ( AC) and ( ) techniques to hide their existence.A.stealthB. quickly spreadC. polymorphicD. replace a part of system software80.Middleware lies in______ACD____A.the middle of interactions between different application programsB.the top of the layering vertical stackC.the top of an operating systemD.the middle of the layering vertical stack81.Software includes ( ACDE) etcA.video gamesB. all kinds of filesC. programsD. websitesE. mobile application82.The major functional components of an office automation system include: ___ABCD__A.electronic mailB. personal assistance featuresC. information storage and retrievalD. text processing83.The Internet carries various information resources and services, such as (ACDEF ) and the inter-linked hypertext documentsA.online chatB. talkingC. electronic mailD. file transferE. online gamingF. file sharing84. A processor is composed of:____ABCD______.A.an arithmeticB. a control unitC. RegistersD. logic unit85.Functions of the compiler used in RISC are ___ABC_______A.to optimize register usageB.to maximize register usageC.to allocate registers to those variables that will be used the most in a given time periodD.to compile a high level language program86. A digital computer is generally made up of five dstinct elements: a central processing unit,(ABCD).A.a busB. input devicesC. memeory storage devicesD. output devicesE. crt screen87.There are AB (CD)_between the DTEs.A.digital-to-analog converterB. the modemC. communications equipmentD. will be replaced by an upd_ated standard88.What make it is difficult to agree on how to count viruses? ABCDA.just a trivial change may create a new virusB.some viruses can use polymorphic techniqueC.some viruses can create different versions when they infect other programsD.new virus arise from an existing virus89.which aspect have to be considered in the design of a piece of software. ABCDEFGA.Fault-toleranceB. ExtensibilityC. ModularityD. CompatibilityE.MarketabilityF. PackagingG. Maintainability90.Active Directory can help you (ACD ).A.build a complex international networkB. deliver complete enterprise security by itselfC.manage every resource with a single logonD. get off the limits of down level networks91.Early computer solved_____CD_____ problems.A.controlB. engineeringC. mathematicalD. business applications92.The tools which Programming software usually provides include: ABCDEA.debuggersB. text editorsC. linkersD. compilersE. interpreters93.DTE is ( AB).A.data terminal equipmentB.the last piece of equipment that belonged to the subscriber in a data link systemC.satelliteD. Digital T-carrier94.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are ( BDEF).A.note bookB. microcomputersC. lenovoD. minicomputersE. workstationF. mainframes95.which is the type of electronic commerce in the following choice ACA.B2BB. C2CC. B2C96.The operations of a structured data type might act on (ABCD ).A.a stackB. the values of the data typeC. component elements of the data structureD. a queue97.Types of media include__ACD________.A.textB. animationC. audioD. full-motion video98. A virus is a program that reproduces its own code by (ABC ).A.simply placing a pointerB. adding to the end of a fileC. ins( )erting into the middle of a fileD. replacing another program99.According to the text,the author mentions three of the most commonly used types of printer.They are (BDE ).A.belt printerB. dot-matrix printers;C. array printerD. laser printerE. inkjet printers100.The end equipment in a communication system includes ___ABD_______A.keyboardsB. DCEC. CRTsD. computers101.Software includes _____ACDE________etcA.programsB. all kinds of filesC. video gamesD. websitesE. mobile application102.With .NET, Microsoft is opening up a channel both to ( ) in other programming languages and to ( BC). (developers; components)A.coderB. developersC. componentsD. architecturemon contemporary operating systems include (ABCD ).A.LinuxB. Microsoft WindowsC. SolarisD. Mac OS104.A mechanism for translating Internet hostnames into IP addresses is___BCD_______A.equipped into the general-purpose operating systemB.typically inside of operating system kernelC.as a middleware by author’s definitionD.typically outside of operating system kernel105.RISC is____ABC______ed for many computer manufacturers nowadaysB.guided to be built from studying the execution behavior of high-level language programsC.abbreviation of reduced instruction set computerD.abbreviation of complex instruction set computer106.With .NET, Microsoft is opening up a channel both to _BC_______in other programming languages and to ________. (developers; components)A.coderB. componentsC. developersD. architecture107.The tools which Programming software usually provides include: ABCDEpilersB. interpretersC. text editorsD. linkersE. debuggers108.The following products of software are belong to middleware____BCD______A.OracleB. IBM’s Web Sphere MQC. Java 2 PlatformD. J2EE109.The system manager used by a fast processor can____BCD______A.connect a networkB. monitor processor’s core temperatureC. monitor processor’s supply voltagesD. reset a system110.Queues that occur everyday life can be seen (ABCD ).A.as automobiles waiting for a traffic lightB. as people waiting for service at a bankC. in an emergency room of a hospitalD. in certain societies lacking equality111.C++ include the following pillars: ____ABCD______.A.data hidingB. polymorphismC. encapsulationD. inheritance112.Windows 2000 is____ACD______A.new lease of WindowsB. an inventive technologyC. the same as Windows NTD. used for building a scalable network113.We use paged virtual memory to___ABCD_______A.extend the size of memoryB. reduce latency of the diskC. store large program and data setD. increase bandwidth of the disk114.According to the physical size of computers we can classify the __ABCD____ computers into A. supercomputer B. minicomputer C. microcomputer D. mainframe115.Some common applications related to electronic commerce are the following: ABCDEFGA.EmailB. TeleconferencingC. Instant messagingD. Shopping cart softwareE.NewsgroupsF. Enterprise content managementG. Online banking116.One machine cycle in RISC has _B_________A.two machine instructionsB. one machine instructionC. four machine instructionsD. three machine instructions117.The function of computer hardware is typically divided into three main categories.They are____ADE_____.A.inputB. motherboardC. cpuD. storageE. output118.Active Directory supports ( ABCD).A.granular access controlB. inheritanceC. encapsulationD. delegation of administrative task119.The core of SQL is formed by a command language that allows the (ACDE ) and performing management and administrative functions.A.deletion of dataB. process of dataC. updating of dataD. retrieval of dataE. ins( )ertion of data120.Some commentators say the outcome of the information revolution is likely to be as profound as the shift in (ABCD )A.industrialB. agriculturalC. Service IndustryD. handicraft industry。
计算机英语期末考试试题及答案

计算机英语期末考试试题及答案一、选择题1. 在计算机网络中,IP地址用于标识网络上的的哪个设备?A. 路由器B. 交换机C. 服务器D. 主机答案:D2. 在计算机安全中,以下哪项属于恶意软件?A. 防火墙B. 杀毒软件C. 木马病毒D. 数据备份答案:C3. 在计算机术语中,RAM代表什么?A. 随机读取存储器B. 只读存储器C. 可擦除可编程读取存储器D. 磁盘存储器答案:A4. 在计算机网络中,HTTP协议是用于实现什么功能的?A. 网络连接B. 文件传输C. 数据加密D. 网络浏览答案:D5. 下列哪个不属于常见的文件压缩格式?A. .zipB. .rarC. .isoD. .txt答案:D二、填空题1. 在计算机程序中,循环结构可以用来多次执行特定的代码段,常见的循环结构包括_______和_______。
答案:for、while2. 在计算机图像处理中,________是指将一幅图像分割成若干个连续的小区域,并对每个小区域进行处理。
答案:图像分割三、判断题1. 计算机网络是指将多台计算机通过通信设备连接起来,实现信息共享和资源共享。
答案:正确2. 在计算机程序中,注释是用来向其他程序员解释代码功能的。
答案:正确四、简答题请简述计算机网络的优点和缺点。
优点:1. 资源共享:计算机网络可以实现多台计算机之间的文件共享、打印共享等,提高资源利用率;2. 信息交流:计算机网络可以快速传输信息,实现实时通信,方便人们之间的交流;3. 远程访问:计算机网络可以远程访问其他计算机,方便远程办公和学习。
缺点:1. 安全性问题:计算机网络容易受到黑客攻击和恶意软件感染,存在一定的安全隐患;2. 依赖性:对于依赖网络的应用和服务而言,一旦网络故障,将会导致服务中断,影响工作和生活;3. 隐私问题:在计算机网络中,个人信息和隐私面临泄露的风险,需要加强数据保护和隐私保护措施。
答案仅供参考,具体答案可能根据题目要求有所变化。
高三英语计算机语言单选题40题(含答案)

高三英语计算机语言单选题40题(含答案)1.The computer's CPU is like the ______ of a car.A.engineB.wheelC.seatD.window答案:A。
CPU(中央处理器)就像汽车的发动机一样,是计算机的核心部件。
选项B“wheel”是轮子;选项C“seat”是座位;选项D“window”是窗户,都与CPU 的功能和作用不相符。
2.The monitor is often called the ______ of a computer.A.heartB.eyeC.handD.foot答案:B。
显示器通常被称为计算机的眼睛,因为它像眼睛一样展示信息。
选项A“heart”是心脏;选项C“hand”是手;选项D“foot”是脚,都不符合显示器的特点。
3.The hard drive is like a computer's ______.A.memory bankB.speakerC.keyboardD.mouse答案:A。
硬盘就像计算机的存储库,用于存储数据。
选项B“speaker”是扬声器;选项C“keyboard”是键盘;选项D“mouse”是鼠标,都与存储功能无关。
4.The RAM of a computer is similar to the ______ of a building.A.foundationB.roofC.wallD.door答案:A。
计算机的随机存取存储器((RAM)类似于建筑物的基础,为计算机的运行提供临时的存储空间。
选项B“roof”是屋顶;选项C“wall”是墙;选项D“door”是门,都与RAM 的作用不相符。
5.The graphics card is mainly responsible for ______.A.processing dataB.displaying imagesC.storing filesD.typing words答案:B。
计算机英语试题及答案

计算机英语试题及答案一、选择题(每题2分,共20分)1. What does the term "CPU" stand for?A. Central Processing UnitB. Central Power UnitC. Customer Personal UnitD. Control Power Unit答案:A2. The term "RAM" refers to:A. Random Access MethodB. Random Access MemoryC. Remote Access ModuleD. Real-time Application Module答案:B3. Which of the following is a type of computer virus?A. TrojanB. TractorC. TrackerD. Tracker答案:A4. The acronym "GUI" stands for:A. Graphical User InterfaceB. General User InterfaceC. Graphical Unified InterfaceD. Global User Interface答案:A5. What is the purpose of an "API" in computer programming?A. Application Programming InterfaceB. Advanced Programming InterfaceC. Automated Programming InterfaceD. Advanced Programming Indicator答案:A6. The term "LAN" is short for:A. Local Area NetworkB. Long Area NetworkC. Limited Area NetworkD. Large Area Network答案:A7. Which of the following is a common file extension for a text document?A. .txtB. .jpgC. .exeD. .mp3答案:A8. The process of finding and removing errors in a computer program is called:A. DebuggingB. BuggingC. LoggingD. Tagging答案:A9. What does "FTP" stand for?A. File Transfer ProtocolB. Fast Transfer ProtocolC. Full-Time ProtocolD. Future Technology Protocol答案:A10. The term "URL" stands for:A. Uniform Resource LocatorB. Unique Resource LocatorC. Universal Resource LocatorD. User Resource Locator答案:A二、填空题(每空1分,共10分)11. The basic unit of data in a computer is the _______.答案:bit12. A computer's _______ is the primary component that controls and processes data.答案:CPU13. The _______ is a type of software that protects a computer from malicious software.答案:antivirus14. A _______ is a location on a network where files can be stored and accessed.答案:server15. The process of converting data into a code to protect its confidentiality is known as _______.答案:encryption16. A _______ is a set of data that describes the characteristics of a file or set of files.答案:metadata17. The _______ is the process of recovering data after a system failure.答案:backup18. The term _______ refers to the use of a computer to create visual content, such as images and videos.答案:graphics19. A _______ is a program that controls the way a computer system operates.答案:operating system20. The _______ is the process of connecting two or morenetworks to enable communication between them.答案:networking三、简答题(每题5分,共20分)21. Explain the difference between a "bit" and a "byte".答案:A bit is the smallest unit of data in computing, representing a single binary digit (0 or 1). A byte is a group of eight bits, which is used to represent a character or a string of data.22. What is the role of a "firewall" in a computer system?答案:A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the Internet.23. Describe the purpose of a "router" in a computer network.答案:A router is a networking device that forwards data packets between computer networks. It uses routing tables to determine the best path for data to travel, allowing multiple devices to communicate with each other across different networks.24. What is "cloud computing" and how does it benefit users?答案:Cloud computing is the delivery of computing services, including storage, processing power, and software, over the internet. It benefits users by providing scalable resources, reducing the need for on-premises infrastructure, and allowing for remote access to applications and data.四、翻译题(每题5分,共20分)25. Translate the following sentence into English: "操作系统是管理计算机硬件和软件资源的程序。
计算机专业英语考试试题及答案

计算机专业英语考试试题及答案一、选择题1. Which of the following is NOT a programming language?A. JavaB. PythonC. HTMLD. CSS2. What does the acronym "SQL" stand for?A. Structured Query LanguageB. Simple Query LanguageC. Script Query LanguageD. Secure Query Language3. Which protocol is commonly used for sending and receiving emails?A. FTPB. HTTPC. SMTPD. TCP4. What does the term "CPU" refer to?A. Central Processing UnitB. Computer Processing UnitC. Central Program UnitD. Computer Program Unit5. Which of the following is NOT a type of network topology?A. StarB. RingC. MeshD. Scroll二、填空题1. HTML stands for Hypertext Markup Language, which is used for ____________.2. The process of converting source code into machine code is called ____________.3. IP address stands for ____________.4. The act of copying files from a remote server to a local computer is known as ____________.5. The programming language developed by Apple Inc. for iOS and macOS is ____________.三、简答题1. What is the difference between a compiler and an interpreter? Provide examples of programming languages that use each of these methods.2. Explain the concept of object-oriented programming (OOP) and provide an example of a programming language that utilizes this paradigm.3. Describe the client-server model and provide an example of a commonly used protocol within this model.四、论述题Discuss the impact of artificial intelligence (AI) on various industries. Provide examples of how AI is being used in fields such as healthcare, finance, and transportation. Analyze the potential benefits and challenges of implementing AI in these industries.答案:一、选择题1. C. HTML2. A. Structured Query Language3. C. SMTP4. A. Central Processing Unit5. D. Scroll二、填空题1. creating and structuring the content of a webpage2. compilation3. Internet Protocol4. downloading5. Swift三、简答题1. A compiler translates the entire source code into machine code before the program is executed. Examples of languages that use compilers are C, C++, and Java. On the other hand, an interpreter translates and executes the source code line by line. Python and Ruby are examples of languages that use interpreters.2. Object-oriented programming (OOP) is a programming paradigm that organizes data and functions into reusable objects. It focuses on the concept of classes and objects, allowing for code reuse and encapsulation. An example of a programming language that uses OOP is Java, where objects are instances of classes and can interact with each other through methods and attributes.3. The client-server model is a distributed computing architecture wherea server provides services or resources to multiple clients. The clients request and receive these resources through the network. An example of a commonly used protocol within this model is the Hypertext Transfer Protocol (HTTP), which is used for communication between web browsers (clients) and web servers.四、论述题Artificial intelligence (AI) has had a significant impact on various industries. In healthcare, AI is being used for diagnoses and treatments, analyzing medical images, and personalized medicine. For example, AI-powered algorithms can help detect diseases like cancer at an early stage, leading to better treatment outcomes. In finance, AI is utilized for fraud detection, algorithmic trading, and customer service. AI algorithms can analyze large amounts of financial data to identify patterns and make accurate predictions. In transportation, AI is being employed for autonomous vehicles, traffic management, and logistics optimization. Self-driving cars, for instance, use AI algorithms to navigate and make decisions on the road.The implementation of AI in these industries brings about many benefits, such as increased efficiency, improved accuracy, and cost savings. AI systems can process and analyze vast amounts of data much faster than humans, leading to faster and more accurate results. However, there are also challenges to consider. Privacy and security concerns arise as AI systems handle sensitive information. There is also the worry of job displacement, as AI automation may replace certain human tasks. Additionally, ethical considerations need to be addressed, such as bias in algorithms and the potential for AI to be used for malicious purposes.Overall, the impact of AI on various industries is undeniable. It has the potential to revolutionize healthcare, finance, transportation, and many other sectors. However, careful implementation and regulation are necessary to ensure its responsible and beneficial use.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
(1) A large main memory can be used forstoring a,b,c .a. datab. operating systemc. applicationsd. interface(2) Early computer solved c,d problems.a. controlb. business applicationsc. engineeringd. mathematical(3) The system manager used by a fast processor cana,b,c .a. reset a systemb. monitor processor’s core temperaturec. monito r processor’s supply voltagesd. connect a network(4) We can say a bus is simply a,c,d .a. a group of wiresb. a wirec. a 8-bit busd. a 16-bit bus(5) A computer system user generally more cares for b,c,d .a. physical size of the computerb. storage sizec. speed of computationd. efficiency of the computer(6) According to the physical size of computers we can classify thecomputers into a,b,c,d .a. microcomputerb. minicomputerc. mainframed. supercomputer(7) The basic hardware components of any computerinclude a,b,c,d .a. CPUb. main memoryc. input devicesd. output devices(8) The following devices are belong to the mass storages a,b,d .a. DVDb. CD-ROMc. moused. disk(1) Cache is a,c,d .a. fastb. slowc. relatively smalld. high cost(2) Information stored in semiconductor RAMis b,c .a. permanentb. nonpermanentc. volatiled. non volatile(3) We use paged virtual memory to a,b,c,d.a. extend the size of memoryb. increase bandwidth of the diskc. reduce latency of the diskd. store large program and data set(4)We read data on the disk by a,d .(5) The three desiderata of memory system are b,c .a.independentb. exclusivec.closely approximated todayd. Less approximated tomorrow(6) The processor performance would be high as wereference instructions and data from b,d.a. hard diskb. cachec. floppy diskd. memory(7) Page frame is used in a .a. real memoryb. virtual memoryc. diskd. cache(8) In order to increase our computer’s performancewe need to a,b,c ,a. have a L2 cacheb. buy a L2 cachec. have a much larger main memoryd. buy a L1 cache(1) RISC is b,c,d .a. abbreviation of complex instruction set computerb. abbreviation of reduced instruction set computerc. guided to be built from studying the executionbehavior of high-level language programsd. used for many computer manufacturersnowadays(2) To enhance performance of a computer system weshould a,b,d .a. improve the pattern of referencing operandb. optimize the simple movement of datac. use IF and LOOP instructions as many aspossibled. optimize the basic sequence control mechanism(5) Register storage has b,d .a. a large capacityb. a small capacityc. the slower speedd. the faster speed(6) Instruction format in RISC has a,c,d .a. one kindb. many kindsc. a few kindsd. one or a few kinds(7) CISC machine instructions compared with RISCmachine are a,d .a. more complicatedb. more simplec. more faster to be executedd. more slower to be executed(8) Functions of the compiler used in RISCare b,c,d .a. to compile a high level language programb. to optimize register usagec. to maximize register usaged. to allocate registers to those variables that willbeused the most in a given time period(9) One machine cycle in RISC has c .a. two machine instructionsb. three machineinstructionsc. one machine instructiond. four machineinstructions(10) The register file is a,c,d .a. physically smallb. physically largec. one the same chip as the CPUd. addressed by much shorter addressesOperating systems and middleware b,c,da. have less in commonb. both can support other softwarec. have much in commond. both can support application programs2. An operating system provides the services in itsAPI by a,c,da. using the features of the hardwareb. offering database accessibilityc. using disk drive’s abilityd. offering fixed-length blocks of data4. Middleware lies in b,c,da. the top of the layering vertical stackb. the middle of the layering vertical stackc. the top of an operating systemd. the middle of interactions between differentapplication programs5. The following products of software are belong tomiddleware a,b,ca. IBM’s Web Sphere MQb. Java 2 Platformc. J2EEd. Oracle6. A mechanism for translating Internet hostnamesinto IP addresses is a,c,da. typically outside of operating system kernelb. typically inside of operating system kernelc. equipped into the general-purpose operatingsystemd. as a middleware by author’s definition7. With middleware we can b,c,da. run programs on a centralized computersystem onlyb. keep computations largely isolated fromundesirable interactionsc. run programs on different computer systemd. allow computations to communicate with oneanother8. Middleware has mechanisms to supportcontrolled interaction through a,b,c,da. communicationb. namingc. persistent storaged. coordination1. Before you turn the power on with a newcomputer, you should make sure a,b,c,d.a. the computer is already out of the boxb. appropriate cables are correctly connectedc. the computer system has been set upd. appropriate software have been installed2. An asleep state is a,c,d .a. a low power standby modeb. indicated by the indicator light putting outc. used for saving energyd. used to lessen wear-and tear on the computer4. During the boot procedure we can see a,b,conthe screen.a. amount of memoryb. the number of attached devicesc. the operating system being usedd. beeps and whirling noises5. A user interface we said here is a,b,d .a. an interaction between an operating system anda userb. an interaction between an applicationprogram and a userc. an interface between a computer and itsperipheral deviced. a text-based user interface or GUI6. Today Microsoft’s ope rating system Windows hasa variety of versions, they are a,b,c,d.a. Windows 2007b. Windows 2003c. Windows XPd. Windows vista7. The Windows desktop contains common elements,such as .a. desktop iconsb. taskbarc. Start buttond. task button9. With the window of the GUI we can use.a. menusb. dialog boxesc. iconsd. documents10. Main menu category in some Microsoftprograms .a. is a menu bar at the top of many windowsb. can display a pull-down menusc. can’t display a drop-down menusd. can display personalized menus1. Upgrading a computer system means .a. buying new hardwareb. buying new softwarec. extending the life of your current systemd. keeping your computer in present situation2. To formulate an upgrade strategy, you shouldconsider .a. the PC adheres to a well-supported standardb. you anticipate all your future needsc. there is room for additional expansion cardsd. there is room for memory3. Some common hardware upgrades nclude.a. adding more RAMb. installingADSLc. adding an image scannerd. installing a color printer4. The ways to seriously upgrade an Intel 80486-based PC include .a. installing the most modern softwareb. replacing the motherboardc. replacing other items inside the system unitd. just purchasing a new PC5. Relationship between version and release in asoftware is .a. version has major numberb. release has minor numberc. version typically increase its number inincrements of 1d. release typically increase its number inincrements of 0.1 or 0.016. Compatible mode of the software products canbe categorized into .a. upwardb. downwardc. crossd. aboveall1. A Wide Area Network can..a. cover a wide geographical areab. link two or more LANsc. link two LANs onlyd. be created by individual users2. According to the flow of information on atransmission facility we can categorize WANinto network.a. circuit switchedb. packet switchedc. local aread. Lease d. line3. In packet switched networks data send in..a. byteb. piecesc. framed. packet4. The most important items contained in a packetshould be.a. data to be transmittedb. header of the packetc. tail of the packetd. date5. The popular approaches we used in the packetswitched network are .a. circuit switchingb. datagramc. virtual circuitd. real circuit6. In the datagram mode when datagrams arrive attheir destination, the datagrams .a. may be out of orderb. must be in orderc. should be reorderedd. may lose7. In the virtual circuit mode all packets sent by auser at a time belong to .a. a messageb. a sessionc. different messagesd. different sessions8. Main characteristics of the leased line networksare .a. the line is private for the userb. the user has himself inter-exchangec. very short response timed. the user computer is always physicallyconnected to the line8. Main characteristics of the leased line networksare .a. the line is private for the userb. the user has himself inter-exchangec. very short response timed. the user computer is always physicallyconnected to the line9. A typical frame relay network has .a. seven componentsb. five componentsc. six componentsd. five major physical components and one"virtual" components10. Router has the following name .a. ARPANETb. IMP (Interface Message Processor)c. gatewayd. IS (Intermediate System)11. In Fig.4-6 a router creates a logical pathbetween networks, these networksinclude .a. FDDIb. Token Busc. Token Ringd. Ethernet12. Encapsulation is used here for data deliveringon .a. the circuit switchingb. the physical pathc. the analog circuitd. the logical path1. Connecting to the Internet usually includes thefollowing decisions type of .a. deviceb. connectionc. userd. Internet serviceprovider2. Which device can be used to access theInternet ? .a. PCb.DVDc. notebook computerd. Internetappliance3. Following device belongs to the one of dial-upconnection .a.HFCb. modemc. dedicate line devicedd. ADSL4. Using a PC we can retrieve much contents fromthe Web, they are .a. Web pagesb. multimedia contentsc. video clipsd. music files5. Mobile Web is used for usually.a. notebook computersb. mobile phonesc. handheld computersd. pagers6. When we use a dial-up connection to access theInternet, we need .a. a TV cableb. a regulartelephone linec. a modemd. a temporary IPaddress7. ADSL works at a rate of .a. asymmetric transmissionb. symmetric transmissionc. asymmetric transmission with 9Mb/sdownstreamd. asymmetric transmission with 16K-64Kb/supstream8. We can find the following facilities in an HFCsystem .a. optical fiberb. coaxial cablec. cable modemd. head end9. With the dedicated connection to connect theInternet we should .a. use dial-up connectionb. keep a continual connectionc. use a static IP addressd. keep a temporary connection10. If some one wants to use mobile wirelessconnection, he or her should have.a. mobile deviceb. a fixed radioconnectionc. Web-enable cell phoned. a mobile transceiver(1) The true goal of ERP is .a. to integrate all departmentsb. to integrate all functionsc. to work across a companyd.d.to work on a single computer system(2) To do ERP right the ways shouldchange.a. people do their jobsb. you do business with ERPc. you do business without ERPd. people do their jobs with ERP(3) ERP can serve the needs of people in.a. financeb. human resourcesc. warehoused. all above(4) Real transformational ERP efforts usuallyrun .a. five yearsb. three yearsc. two yearsd. one year(5) A business process should include .a. order fulfillmentb. shipping goodsc. billing for the orderd. understanding the customer’s credit rating(6) Companies that measure their products by flowrather than individual units arecompanies.a. utilityb. oilc. chemicald. mechanicalparts(7) With ERP, the customer servicerepresentatives .a. are just typistsb. are no longer just typistsc. should be business peopled. should not be business people(8) With the manufacturing companiescansave time, increase productivity and reduceheadcount.a. standardizing manufacturing processesb. using a single, integrated computer systemc. using ERPd. in-basket mode1. Internet telephony system aresystems.a. synchronous distributedb. asynchronous distributedc. so called as IP telephonyd. synchronous centralized2. The operating platforms that are currentlysupported by the various Internet telephonysystem include .a. QoSb. UNIXc. Windowsd. Mac3. With an Internet telephone system developed byusing Java applet users should .a. have a standard web browser with Java supportb. install the telephony system every time theywant to talkc. worry about the underlying workings of atelephony systemd. have a network connection4. The following components are the basic ones ofan Internet telephony system .a. host computerb. modemc. local area networkd. router5. The communication process that the caller’stelephony system handled includes .a. acquiring the real-time voice datab. digitizing the analogue signalsc. compressing the digitized datad. decrypting the digitized data6. The communication process that the recipient’stelephony system handled includes .a. encrypting the digitized datab. receiving incoming datac. decompressing incoming datad. playing back on the audio output device7. The major problems encountered in the currentInternet telephone are .a. the working model of the best-effort Internetb. transmitting delayc. transmitting delay jittersd. packet loss8. We can find the following voice recoverymethods .a. silence substitutionb. waveform substitutionc. sample interpolationd. embedded speech coding9. When we make a distance telephony call suchas from Beijing to Guangzhou with Internettelephony system, we should paycommunication fees that include .a. transcontinental telephone callsb. local telephone callsc. ISP’s feesd. nominal standard Internet connectivitycharges10. The current Internet telephony systems .a. are launched as stand-alone applicationsb. must be downloaded prior to operationc. must purchase a new version of thesoftware of the system for upgradingd. must be installed prior to operation1. The Web took a bold step forward, it .a. was spurred by little-known technologiesb. was spurred by well-known technologiesc. shattered the traditional usage model ofthe Webd. kept the traditional usage model of theWeb2. In order to develop a new web applicationmodel we should use some technologies,such as .a. traditional web browsersb. JavaScript remotingc. web remote procedure callsd. dynamic updating3. Using Ajax we can .a. perform the web interactionb. transmit only a small amount of informationto and from the serverc. give the user the most responsiveexperience possibled. substitute the traditional web applicationmodel4. In the traditional web application model thebrowser .a. has an Ajax engineb. is responsible for initiating requests to theWeb serverc. is responsible for processing requests fromthe Web serverd. sends a HTML request to the Web server5. Ajax engine is .a. a JavaScript objectb. a JavaScript functionc. responsible for linking to another resourced. responsible for executing the request fromthe Web server6. The traditional Web server would serveup .a. JavaScriptb. CSSc. HTMLd. images7. After receiving a server response the Ajaxengine .a. goes into actionb. provides a link to another Web pagec. often parses the datad. makes several changes to the user interface8. To make an Ajax solution we must use thefollowing technologies: .a.CSSb. HTML/XHTMLc. DOMd. JavaScript9. With Ajax engine we can .a. transfer less information than thetraditional Web application modelb. update user interface more fasterc. work more quicklyd. transfer more information than thetraditional web application model10. The data that the Ajax engine can useshould be .a. plain textb. understood by the Ajax enginec. XMLd. any other data format。