浙大研究生 2015-2016学年《计算机理论》期末考试英文版

合集下载

2015年研究生考试英语一试题(word版)及答案

2015年研究生考试英语一试题(word版)及答案

2015年研究生考试英语一试题(word版)2015年全国硕士研究生入学考试英语(课程)一试题Section I Use of EnglishDirections:Read the following text. Choose the best word(s) for each numbered blank and mark A, B, C or D on ANSWER SHEET 1. (10 points)We have more genes in common with people we pick to be our friends than with strangers.Though not biologically related, friends are as "related" as fourth cousins, sharing about 1% of genes. That is 1 a study publishedfrom the University of California and Yale University in theProceedings of the National Academy of Sciences, has 2 .The study is a genome-wide analysis conducted 3 1932 unique subjects which 4pairs of unrelated friends and unrelated strangers. The same people were used in both 5.While 1% may seem 6 , it is not so to a geneticist. As co-author of the study James Fowler, professor of medical genetics at UC San Diego says, "Most people do not even 7their fourth cousins but somehow manage to select as friends the people who 8 our kin."The team 9 developed a "friendship score" which can predict who will be your friend based on their genes.Directions:Read the following four texts. Answer the questions below each text by choosing A, B, C or D. Mark your answers on ANSWER SHEET 1. (40 points)Text1King JuanCarlos of Spain once insited” kings don’t abdicate, they die in their sleep.” But embarrassing scandals and the popularity of the republican left in the recenet Euro-elections have forced him to eat his words and stand down. So does the Spanish crisis suggestthat monarchy is seeing its last days? Does that mean the writing is on the wall for all European royals, withtheir magnificent uniforms andmajestic lifestyles?The Spanish case provides arguments both for and against monarchy. When public opinion is particularly polarized, as it was following the end of the Franco regime, monarchs can rise above” mere”politics and “embody” a spirit of national unity.Itis this apparenttranscendence of politics that explains monarchs continuing popularity as heads of state. And so, the Middle East excepted, Europe is the mostmonarch- infested region in the world, with 10 kingdoms (not counting Vatican City and Andorra).But unlike their absolutist counterpartsin the Gulf and Asia, most royal families have survived because they allow voters to avoid the difficult searchfor anon-controversial but respected public figure.Even so, kings and queens undoubtedly have a downside. Symbolic of national unity as they claim to be, their very history-and sometimes the way they behave today-embodies outdated and indefensible privileges and inequalities. At a time when Thomas Piketty and other economists are warming of rising inequality and the increasing power of inherited wealth,it is bizarre that wealthy aristocratic families should still be the symbolic heart of modern democratic states.The most successful monarchies strive to abandon or hide their old aristocratic ways. Princes and princesses have day-jobs and ride bicycles, not horses(or helicopters). Even so, these are wealthy families who party with the international 1%, and media intrusiveness makes it increasingly difficult to maintain the right image.While Europe’s monarchies will no doubt be smart enough to survive for some time to come, it is the British royals who have most to fear from the Spanish example.It is only the Queen who has preserved the monarchy’s reputation with her rather ordinary (if well-heeled) granny style.The danger will come with Charles. Who has both an expensive taste of lifestyle and a pretty hierarchical view of theworld. He has failed to understand that monarchies have largely survived because they provide a service- asnon-controversial and non-political heads of state. Charles ought to know that as English history shows, it is kings, not republicans, who are the monarchy’s worst enemies.21.According to the first two paragraphs, King Juan Carlos of Spain[A] used to enjoy high public support[B] was unpopular among European royals[C] eased his relationship with his rivals[D] ended his reign in embarrassment22.Monarchs are kept as heads of state in Europe mostly[A] owing to their undoubted and respectable status[B] to achieve a balance between tradition and reality[C] to give voters more public figures to look up to[D] due to their everlasting political embodiment23.Which of the following is shown to be odd, according to Paragraph 4?[A] Aristocrats’ excessive reliance on inherited wealth[B] The role of the nobility in modern democracies[C] The simple lifestyle of the aristocratic families[D] The nobility’s adherence to their privileges24. The British royals ”have most of fear” because Charles[A] takes a tough line on political issues[B] fails to change his lifestyle as advised[C] takes republicans as his potential allies[D] fails to adapt himself to his future role25.Which of the following is the best title of the text?[A] Carlos, Glory and Disgrace Combined[B] Charles, Anxious to Succeed to the Throne[C] Carlos, a Lesson for All European Monarchs[D] Charles, Slow to React to the Coming Threats.Text2JUST HOW much does the Constitution protect your digital data? The Supreme Court is only just coming to grips with that question. On Tuesday,it will consider whether police can search the contents of a mobile phonewithout a warrant if the phone is on or around a person during an arrest.California has asked the justices to refrain from a sweeping ruling, particularly one that upsets the old assumption that authorities may search through the effects of suspects at the time of their arrest. Even if the justices are tempted, the state argues, it is hard for judges to assess the implications of new and rapidly changing technologies.The court would be recklessly modest if it followed California’s advice. Enough of the implications are discernable, even obvious, that the justices can and should provide updated guidelines to police, lawyers and defendants.They should start by discarding California’s lame argument that exploring the contents of a smartphone — a vast storehouse of digital information — is similar to, say, rifling through a suspect’s purse. The court has ruled that police don’t violate the Fourth Amendment when they sift through the wallet or pocketbook of an arrestee without a warrant.But exploring one’s smartphone is more like entering his or her home.A smartphone may contain an arrestee’s reading history, financial history, medical history and comprehensive records of recent correspondence. The development of “cloud computing,” meanwhile, means that police officers could conceivably access even more information with a few swipes on a touchscreen.Americans should take steps to protect their digital privacy. But keeping sensitive information on these devices is increasingly a requirement of normal life. Citizens still have a right to expect private documents to remain private and protected by the Constitution’s prohibition on unreasonable searches.As so often is the case, stating that principle doesn’t ease the challenge of line-drawing. In many cases, it would not be overly onerous for authorities to obtain a warrant to search through phone contents. They could still trump Fourth Amendment protections when facing severe, exigent circumstances, such as the threat of immediate harm, and they could take reasonable measures to ensure that phone data are not erased or altered while a warrant is pending. The court, though, may want to allow room for police to cite situations where they are entitled to more leeway.But the justices should not swallow California’s argument whole. New, disruptive technology sometimes demands novel applications of the Constitution’s protections. Orin Kerr, a law professor who blogs on The Post’s Volokh Conspiracy,comparesthe explosion and accessibility of digital information in the 21st century with the establishment of automobile use as a virtual necessity of life in the 20th: The justices had to specify novel rules for the new personal domain of the passenger car then; they must sort out how the Fourth Amendment applies to digital information now.26. The Supreme court, will work out whether, during an arrest, it is legitimate to[A] search for suspects’ mobile phones without a warrant.[B] check suspects’ phone contents without being authorized.[C] prevent suspects from deleting their phone contents.[D] prohibit suspects from using their mobile phones.27. The author’s attitude toward California’s argument is one of[A] tolerance.[B] indifference.[C] disapproval.[D] cautiousness.28. The author believes that exploring one’s phone content is comparable to[A] getting into one’s residence.[B] handing one’s historical records.[C] scanning one’s correspondences.[D] going through one’s wallet.29. In Paragraph 5 and 6, the author shows his concern that[A] principles are hard to be clearly expressed.[B] the court is giving police less room for action.[C] phones are used to store sensitive information.[D] citizens’ privacy is not effective protected.30.Orin Kerr’s comparison is quoted to indicate that(A)the Constitution should be implemented flexibly.(B)New technology requires reinterpretation of the Constitution.(C)California’s argument violates principles of the Constitution.(D)Principles of the Constitution should never be altered.Text3The journal Science is adding an extra round of statistical checks to its peer-review process, editor-in-chief Marcia McNutt announced today. The policy follows similar efforts from other journals, after widespread concern that basic mistakes in data analysis are contributing to the irreproducibility of many published research findings.“Readers must have confidence in the conclusions published in our journal,” writes McNutt in an editorial. Working with the American Statistical Association, the journal has appointed seven experts to a statistics board of reviewing editors (SBoRE). Manuscript will be flaggedup for additional scrutiny by the journal’s internal editors, or by its existing Board of Reviewing Editors or by outside peer reviewers. The SBoRE panel will then find external statisticians to review these manuscripts.Asked whether any particular papers had impelled the change, McNutt said: “The creation of the ‘statistics board’ was motivated by concerns broadly with the application of statistics and data analysis in scientific research and is part of Science’s overall drive to increase reproducibility in the research we publish.”Giovanni Parmigiani, a biostatistician at the Harvard School of Public Health, a member of the SBoRE group, says he expects the board to “play primarily an advisory role.” He agreed to join because he “found the foresight behind the establishment of the SBoRE to be novel, unique and likely to have a lasting impact. This impact will not only be through the publications in Science itself, but hopefully through a larger group of publishing places that may want to model their approach after Science.”31.According to Nancy Koehn,office language has become[A]more emotional[B]more object[C]less energetic[D]less stratcgic32.”Team”oriented corporate vocabulary is closely related to[A]historical incidents[B]gender difference[C]sport culture[D]athletic executives33.Khurana believes that the importation of terminology to[A]revive historical terms[B]promote company image[C]foster corporate cooperation[D]strengthen cmployee loyalty34.It can bo inferred that Lean In .[A]voices for working women[B]appeals to passionate workholics[C]triggers debates among mommies[D]parises motivated employees35.Which of the following statements is true about office speak?[A]Managers admire it avoid it[B] Linguists believe it to be nonsense[C]Companies find it to be fundamental[D]Regular people mock it but accept itText4Two years ago, Rupert Murdoch’s daughter, Elisabeth, spoke of the “unsettling dearth of integrity across so many of our institutions”. Integrity had collapsed, she argued, because of a collective acceptance that the only “sorting mechanism” in society should be profit and the market. But “it’s us, human beings, we the people who create the society we want, not profit”.Driving her point home, she continued: “It’s increasingly apparent that the absence of purpose, of a moral language within government, media or business could become one of the most dangerous goals for capitalism and freedom.” This same absence of moral purpose was wounding companies such as News International, she thought, making it more likely that it would lose its way as it had with widespread illegal telephone hacking.As the hacking trial concludes—finding guilty one ex-editor of the News of the World, Andy Coulson, for conspiring to hack phones, and finding his predecessor, Rebekah Brooks, innocent of the same charge—the wider issue of dearth of integrity still stands. Journalists are known to have hacked the phones of up to 5,500 people. This is hacking on an industrial scale, as was acknowledged by Glenn Mulcaire, the man hired by the News of the World in 2001 to be the point person for phone hacking. Others await trial. This saga still unfolds.In many respects, the dearth of moral purpose frames not only the fact of such widespread phone hacking but the terms on which the trial took place. One of the astonishing revelations was how little Rebekah Brooks knew of what went on in her newsroom, how little she thought to ask andthe fact that she never inquired how the stories arrived. The core of her successful defence was that she knew nothing.In today’s world, it has become normal that well-paid executives should not be accountable for what happens in the organisations that they run. Perhaps we should not be so surprised. For a generation, the collective doctrine has been that the sorting mechanism of society should be profit. The words that have mattered are efficiency, flexibility, shareholder value, business-friendly, wealth generation, sales, impact and, in newspapers, circulation. Words degraded to the margin have been justice, fairness, tolerance, proportionality and accountability.The purpose of editing the News of the World was not to promote reader understanding, to be fair in what was written or to betray any common humanity. It was to ruin lives in the quest for circulation and impact. Ms Brooks may or may not have had suspicions about how her journalists got their stories, but she asked no questions, gave no instructions—nor received traceable, recorded answers.36. Accordign to the first two paragraphs, Elisabeth was upset by(A) the consequences of the current sorting mechanism.(B) companies’ financial loss due to immoral practices(C) governmental ineffectiveness on moral issues.(D) the wide misuse of integrity among institutions.37. It can be inferred from Paragraph 3 that(A) Glenn Mulcaire may deny phone hacking as a crime.(B) more journalists may be found guilty of phone hacking.(C) Andy Coulson should be held innocent of the charge.(D) phone hacking will be accepted on certain occasions.38. The author believes that Rebekah Brooks’s defence(A) revealed a cunning personality.(B) centered on trivial issues.(C) was hardly convincing.(D) was part of a conspiracy.39. The author holds that the current collective doctrine shows(A) generally distorted values.(B) unfair wealth distribution.(C) a marginalized lifestyle.(D) a rigid moral code.40 Which of the following is suggested in the last paragraph?(A) The quality of writings is of primary importance.(B) Common humanity is central to news reporting.(C) Moral awareness matters in editing a newspaper.(D) Journalists need stricter industrial regulations.Part BHow does your reading proceed? Clearly you try to comprehend, in the sense of identifying meanings for individual words and working out relationships between them, drawing on your implicit knowledge of English grammar. (41)_____________________________________You begin to infer a context for the text, for instance by making decisions about what kind of speech event is involved: who is making the utterance, to whom, when and where.The ways of reading indicated here are without doubt kinds of comprehension. But they show comprehension to consist not just of passive assimilation but of active engagement in inference and problem-solving. You infer information you feel the writer has invited you to grasp by presenting you with specific evidence and clues;(42)_________________________________Conceived in this way, comprehension will not follow exactly the same track for each reader. What is in question is not the retrieval of an absolute, fixed or ‘true’ meaning that can be read off and checked for accuracy, or some timeless relation of the text to the world.(43)_________________________________________Such background material inevitably reflects who we are.(44)____________________________ This doesn’t, however, make interpretation merely relative or even pointless. Precisely because readers from different historical periods. Place and social experiences produce different but overlapping readings of the same words on the page —including for texts that engage with fundamental human concerns—debates about texts can play an important in the social discussion of beliefs and values.How we read a given text also depends to some extent on our particular interest in reading it. (45)_________________________________________Such dimensions of reading suggest — as other introduced later in the book will also do — that we bring an implicit(often unacknowledged)agenda to any act of reading. It doesn’t then necessarily follow that one kind of reading is fuller, more advanced and more worthwhile than another. Ideally, different kinds of reading inform each other, and act as useful reference points for and counterbalances to one another. Together, they make up the reading component of your overall literacy, or relationship to your surrounding textual environment.A. Are we studying that text and trying to respond in a way that fulfils the requirement of a give course? Reading it simply for pleasure? Skimming it for information? Ways of reading on a train or in bed are likely to differ considerably from reading in a seminar room.B. Factors such as the place and period in which we are reading, our gender, ethnicity, age and social class will encourage us towards certain interpretations but at the same time obscure or even close off others.C. If you are unfamiliar with words or idioms, you guess at their meaning, using clues presented in the context. On the ash emption that they will become relevant later, you make a mental note of discourse entities as well as possible links between them.D. In effect, you try to reconstruct the likely meaning or effects that any given sentence, image or reference might have had: These might be the ones author intended.E. You make further inferences, for instance, about how the text may be significant to you, or about its validity — inferences that from the basis of personal response for which the author will inevitably be far less responsible.F. In plays, novels and narrative poems, characters speak as constructs created the author, not necessarily as mouthpieces for the author’s own thoughts.G. Rather, we ascribe meanings to texts on the basis of interaction between what we might call textual and contextual material: between kinds of organization or pattering we perceive in a text’s formal structures (so especially its language structures) and various kinds of background, social knowledge, belief and attitude that we bring to the text.Part CDirections:Read the following text carefully and then translate the underlined segments into Chinese. Your translation should be written neatly on the ANSWER SHEET. (10 pionts)Within the span of a hundred years, in the seventeenth and early eighteenth centuries, a tide if emigration- one of the great folk wanderings of history- swept from Europe to America. (46) This movement, driven by powerful and diverse motivations, built a nation out of a wilderness and, by its nature, shaped the character and destiny of an uncharted continent.(47) The United States is the product of two principal forces- the immigration of European people with their varied ideas, customs, andnational characteristics and the impact of a new country which modified these traits. Of necessity, colonial America was a projection of Europe. Across the Atlantic came successive groups of Englishmen, Frenchmen, Germans, Scots, Irishmen, Dutchmen, Swedes, and many others who attempt to transplant their habits and traditions to new world. (48) But the force of geographic conditions peculiar to America, the interplay of the varied national groups upon once another, and the sheer difficulty of maintaining old-world ways in a raw, new continent caused significant changes. These changes were gradual and at first scarcely visible. But the result was a new social pattern which, although it resembled European society in many ways, has a character that was distinctly American.(49) The first shiploads of immigrants bound for the territory which is now the United States crossed the Atlantic more than a hundred years after the 15th-and- 16th century explorations of North America. In the meantime, thriving Spanish colonies had been established in Mexico, the West Indies, and South America. These travelers to North America came in small, unmercifully overcrowded craft. During their six-to twelve-week voyage, they survived on barely enough food allotted to them. Many of the ships were lost in storms, many passengers died of disease, and infants rarely survived the journey. Sometimes storms blew the vessels far off their course, and often calm brought unbearably long delay.To the anxious travelers the sight of the American shore brought almost inexpressible relief. Said one recorder of events, “ The air at twelve leagues’ distance smelt as sweet as a new-blown garden.” The colonists’ first glimpse of the new land was a sight of dense woods. (50) The virgin forest with its richness and variety of trees was a real treasure-house which extended from Maine all the way down to Georgia. Here was abundant fuel and lumber……Section III WritingPart A51.Directions:You are going to host a club reading session. Write an email of about 100 words recommending a book to the club members.You should state reasons for you recommendation.You should write neatly on the ANSWER SHEET.Do not sign your own name at the end of the letter. Use “Li Ming”instead.Do not write the address.(10 points)Part B52.Directions:Write an essay of 160-200 words based on the following picture. In your essay, you should(1) Describe the picture briefly,(2) Interpret its intended meaning, and(3) Give your comments.You should write neatly on the ANSWER SHEET.(20 point)2015考研英语(一)参考答案(完整版)I cloze1、What2、Concluded3、On4、Compared5、Samples6、Insignificant7、Know8、Resemble9、Also10、Perhaps11、To12、Drive13、Ratherthan14、Benefits15、Faster16、understand17、Contributory18、Tendency19、Ethnic20、seeII Reading comprehensionPart A21.D ended his reign in embarrassment.22. C owing to the undoubted and respectable status23. A the role of the nobility in modern democracy24. B fails to change his lifestyle as advised.25. D Carlos, a lesson for all Monarchies26. C check suspect's phone contents without being authorized.27.A disapproval28.A getting into one's residence29. C citizens' privacy is not effectively protected30.B new technology requires reinterpretation of the constitution31.B journals are strengthening their statistical checks32.B marked33. D set an example for other journals34. C has room for further improvement35.A science joins Push to screen statistics in papers36. D the consequences of the current sorting mechanism37. A more journalists may be found guilty of phone hacking38. C was hardly convincing39. B generally distorted values40. D moral awareness matters in editing a newspaperPart B41.Cifyouareunfamiliar...42.Eyoumakefurtherinferences...43.D Rather ,we ascribe meanings to...44.Bfactorssuchas...45.Aarewestudyingthat ...Part C46)在多种强大的动机驱动下,这次运动在一片荒野上建起了一个国家,其本身塑造了一个未知大陆的性格和命运。

英文版计算机试题及答案

英文版计算机试题及答案

英文版计算机试题及答案Section 1: Multiple Choice Questions (MCQs)1. Which of the following is NOT a programming language?a) Javab) HTMLc) Pythond) SQLAnswer: b) HTML2. What does CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Program UnitAnswer: a) Central Processing Unit3. Which of the following is NOT an input device?a) Keyboardb) Mousec) Printerd) ScannerAnswer: c) Printer4. What does RAM stand for?a) Read-Only Memoryb) Random Access Memoryc) Recordable Audio Mediad) Runtime Activity MonitorAnswer: b) Random Access Memory5. Which of the following is NOT a type of computer network?a) LAN (Local Area Network)b) WAN (Wide Area Network)c) MAN (Metropolitan Area Network)d) CAN (Campus Area Network)Answer: d) CAN (Campus Area Network)Section 2: Short Answer Questions1. Define the term "algorithm."Answer: An algorithm is a step-by-step procedure or set of rules for solving a specific problem or completing a specific task.2. What is object-oriented programming (OOP)?Answer: Object-oriented programming is a programming paradigm that organizes code into objects, which are instances of classes. It emphasizes the concept of objects and their interactions to solve complex problems.3. Explain the difference between static and dynamic memory allocation.Answer: Static memory allocation is performed at compile-time, where memory is allocated for variables and objects before the program execution starts. Dynamic memory allocation, on the other hand, is performed at runtime using functions like malloc() or new(). It allows for the allocation and deallocation of memory during program execution.4. What is the purpose of an operating system?Answer: The operating system is responsible for managing computer hardware and software resources, providing an interface between the user and the computer, and ensuring that various programs and applications can run smoothly. It also provides file management, process management, and memory management.5. Name three programming paradigms.Answer: Three programming paradigms are procedural programming, object-oriented programming, and functional programming.Section 3: Coding Questions1. Write a Java program to find the factorial of a given number.```javaimport java.util.Scanner;public class Factorial {public static void main(String[] args) {Scanner input = new Scanner(System.in);System.out.print("Enter a number: ");int number = input.nextInt();int factorial = 1;for (int i = 1; i <= number; i++) {factorial *= i;}System.out.println("The factorial of " + number + " is " + factorial); }}```2. Write a Python program to check if a number is prime or not.```pythondef is_prime(number):if number < 2:return Falsefor i in range(2, int(number/2)+1):if number % i == 0:return Falsereturn Truenumber = int(input("Enter a number: "))if is_prime(number):print(number, "is prime.")else:print(number, "is not prime.")```3. Write a C program to reverse a given string. ```c#include <stdio.h>#include <string.h>void reverse_string(char* str) {int length = strlen(str);for (int i = 0; i < length/2; i++) {char temp = str[i];str[i] = str[length - i - 1];str[length - i - 1] = temp;}}int main() {char str[100];printf("Enter a string: ");gets(str);reverse_string(str);printf("Reversed string: %s", str);return 0;}```Note: The code provided above is just examples for the coding questions. Please ensure to compile and test the programs before using them in production.Conclusion:In this article, we discussed multiple-choice questions, short answer questions, and coding questions related to computer science and programming. These questions cover various aspects of computer knowledge and can be used for self-assessment or preparation for exams or interviews.。

浙大研究生 2017-2018学年《计算机理论》期末考试英文版及答案

浙大研究生 2017-2018学年《计算机理论》期末考试英文版及答案

浙江大学2017-2018学年秋冬学期《计算理论》课程期末考试试卷课程号:21120520开课学院:计算机学院考试试卷: A卷 B卷考试形式: 闭卷 开卷,允许带入场考试日期:2018年1月24日,考试时间:120分钟诚信考试,沉着应考,杜绝违纪考生姓名学号所属院系题序123456总分得分评卷人Zhejiang UniversityTheory of Computation,Fall-Winter2017Final Exam1.(24pts)Determine whether the following statements are true or false.Ifit is truefill a T otherwise a F in the bracket before the statement.(a)()Let A,B be two languages.If both A and A∪B are regular,then B isdefinitely regular.(b)()If A is regular and B is non-regular,then A◦B must be non-regular.(c)()Language{xcy|x,y∈{a,b}∗,|x|≤|y|≤3|x|}is context-free.(d)()Every regular language can be generated by a context-free grammar.(e)()If A is recursive and B⊆A,then B is recursive as well.(f)()Recursively enumerable languages are always infinite.(g)()There’s a functionφsuch thatφcan be computed by some Turing ma-chines,yetφis not a primitive recursive function.(h)()Let A and B be recursively enumerable languages and A∩B=∅.If A∪Bis also recursively enumerable,then both A and B is decidable.(i)()The language{“M”“w”|TM M accepts w in less than2018steps}isrecursive.(j)()The language{“M”|TM M accepts exactly2018strings}is recursively enumerable but not recursive.(k)()Let H e={“M”|TM M halts on e}.If H e≤L,then L is recursive enumerable but not recursive.(l)()A language L is recursive if and only if it is Turing-enumerable.2.(18pts)On FA and Regular LanguagesSay whether each of the following languages is regular or not regular?Prove your answers,where{a,b}+={a,b}∗◦{a,b}.(a)L1={wtw|w,t∈{a,b}+}(b)L2={wtw|w,t∈{a,b}∗}3.(20pts)On PDA and Context-Free LanguagesLet L3={ww R ca m b n|w∈{a,b}∗,m,n∈N,m=n}.(a)Construct a context-free grammar that generates the language L3.(b)Construct a pushdown automata that accepts L3.Solution:(a)(b)The PDA M=(K,Σ,Γ,∆,s,F)is defined below:(q,σ,β)(p,γ)K=Σ={a,b,c}Γ=s=F=4.(10pts)On Turing MachineDesign a single tape Turing machine M that decides the language L4L4={uvcww R|u,v,w∈{a,b}∗,|u|=2|v|}When describing the Turing machines above,you can use the elementary Turing machines described in textbook.Always assume that your Turing machine starts from the configuration◃⊔x,where x is the input string.5.(10pts)On Primitive Recursive Function→N,and k∈N,k≥2 Show the following functionφk:N×N×···×Nk{n1,n2,···,n k}φk(n1,n2,···,n k)=maxkis primitive recursive.6.(18pts)On UndecidabilityClassify whether each of the following languages are recursive,recursively enumerable but not recursive,or non-recursively enumerable.Prove your answers,but you may not simply appeal to Rice’s theorem.(a)L5={“M”|M is a TM,and L(M)is uncountable}(b)L6={“M”|TM M accepts at least two strings of different lengths}Enjoy Your Spring Festival!。

《计算机专业英语》期末考试试卷(2015上)

《计算机专业英语》期末考试试卷(2015上)

2015年上学期《计算机专业英语》期末考试试卷班级_______ 学号________ 姓名________ 计分_______I. Match the phrases with their Chinese correctly.(3’×6=18’)A.产品发布B.需求阶段C.缺陷报告D.测试计划E.测试设计F.测试执行1.____ product release2._____ bugs reporting3.____test execution4.____ test design5.____ test plan6.____ requirements stageII. Reading comprehension.项目工作计划A project work plan is the schedule of tasks, durations, and dates to accomplish a project.A high level work plan shows the standard deliverables for the process, and detailed project plan shows the project-specific tasks.A project work plan provides a plan of what has to be done, how the work will be organized and who will do it. The following steps will provide you with information to be used in developing a good work plan:List the project objectives and chosen strategies.List the tasks you need to do for those objectives and strategies to be used.Put the tasks in the order that they should occur.Estimate times and dates to create a schedule.Estimate the resources needed for your activities ( including time, money, skills, people, equipment, facilities,information,etc.)Assign responsibilities to people for various activities.A. Reorder the letters.(3’×4=12’)Letters Wordslish comp ac aiver able del djec ob tive oponsi res bility rB. List the steps to get the information for a good work plan.(5’×6=30’)①②③④⑤⑥III.Translation.(5’×4=20’)① Thanks for your help, I can’t tell you how much I appreciate it.② If there are no further questions, then I guess everything is clear.③ List the project objectives and chosen strategies.④ Estimate times and dates to create a schedule.①②③④IV. Cloze.(2’×10=20’)Tina Lin was not like many of her clas smates. She didn’t listen to popular music. She didn’t watch many movies, and she wasn’t interested in nice clothes.When she got 1 with her friends at a party, Tina found her friends preferred rock and pop music. When Tina 2 if they would like to try classical music, they all looked at her strangely.“ 3 music is for old people,” one of her friends said.Tina was 4 that something was wrong with her. She decided to 5 her father. As she entered his study, he could feel something was wrong.“Dad, am I strange?” she asked her 6 .“Of course not,” he answered, “Why do you ask that?”“Because I don’t 7 the same things as my classmates. They want to listen to pop music. I like classical music.”“I think I understand. Never mind, T ina. 8 all right to be your own person. You don’t have to copy what other people do. Everybody 9 different tastes (品味). Some of them are popular, 10 others aren’t.”After Tina spoke with her father, she felt better about herself. She realized that being different made her special. It was an important lesson for her to learn.( ) 1. A. up B. angry C. together( ) 2. A. asked B. found C. noticed( ) 3. A. Pop B. Rock C. Classical( ) 4. A. proud B. worried C. glad( ) 5. A. talk to B. look for C. write to( ) 6. A. friend B. father C. classmate( ) 7. A. have B. know C. like( ) 8. A. It’s B. That’s C. You’re( ) 9. A. have B. has C. had( ) 10. A. but B. so C. for。

计算机英语试题及答案

计算机英语试题及答案

计算机英语试题及答案一、选择题(每题2分,共20分)1. The basic unit of data in a computer is:A. ByteB. BitC. KilobyteD. Megabyte答案:B2. Which of the following is not a function of an operating system?A. Memory managementB. Process managementC. Hardware managementD. Web browsing答案:D3. The term "CPU" stands for:A. Central Processing UnitB. Computer Personal UnitC. Computer Programming UnitD. Cybernetic Processing Unit答案:A4. In computer networking, "LAN" refers to:A. Local Area NetworkB. Long-Distance Area NetworkC. Local Access NetworkD. Long-Access Network答案:A5. What is the role of a "router" in a computer network?A. To connect different networksB. To store dataC. To print documentsD. To control access to the internet答案:A6. The process of converting programs into machine language is known as:A. InterpretationB. CompilationC. DebuggingD. Encryption答案:B7. Which of the following is a type of programming language?A. HTMLB. JPEGC. MP3D. DOCX答案:A8. What does "GUI" stand for in computing?A. Graphical User InterfaceB. General User InterfaceC. Graphical User InformationD. Global User Interface答案:A9. A "firewall" is a security device designed to:A. Prevent unauthorized access to a networkB. Control the temperature in a computer roomC. Store firewalls for later useD. Monitor the flow of data in a network答案:A10. The acronym "URL" stands for:A. Uniform Resource LocatorB. Unique Resource LocatorC. Universal Resource LocatorD. User Resource Locator答案:A二、填空题(每题2分,共20分)11. The binary system uses only two digits: 0 and ______.答案:112. A gigabyte is larger than a megabyte, with 1 gigabyte equal to 1,024 megabytes.13. The most common type of connection between a computer and the internet is through a(n) ______.答案:modem14. In programming, a ______ is a sequence of instructions that a computer can execute.答案:program15. A ______ is a type of software that allows users to browse the internet.答案:web browser16. The ______ is the primary component of a computer that performs most of the processing.答案:CPU17. Data encryption is a method of converting data into a code to ______ unauthorized access.答案:prevent18. A ______ is a set of rules governing the structure of data and the way it is transmitted.答案:protocol19. The ______ is a type of software that provides a graphical interface for interacting with the computer.答案:operating system20. A ______ is a hardware device that connects multiple computers together in a network.答案:switch三、简答题(每题10分,共20分)21. Explain the difference between a compiler and aninterpreter in programming.答案:A compiler is a software tool that translates the entire source code of a program into machine language before execution. It processes the code as a whole and produces an executable file that can be run independently of the compiler. On the other hand, an interpreter translates and executes the source code line by line or block by block, without creatinga separate executable file. Interpreters run the codedirectly and are typically used for scripting languages.22. Describe the function of a database management system (DBMS).答案:A database management system (DBMS) is a software system that allows users to create, modify, and manage databases. It provides a way to store, organize, and retrieve data efficiently. The main functions of a DBMS includecreating the structure of a database, entering and retrieving data, maintaining data integrity, and controlling access tothe data. It also supports advanced operations such as querying, indexing, and transaction management.四、翻译题(每题15分,共30分)23. 将以下句子从英文翻译成中文:"The Internet of Things (IoT) is a network of physical objects embedded with electronics, software, sensors, andnetwork connectivity which enables these objects to collect and exchange data."答案:物联网(。

2016年浙江大学研究生入学考试计算机学科专业基础考试大纲

2016年浙江大学研究生入学考试计算机学科专业基础考试大纲

2016年浙江大学研究生入学考试计算机学科专业基础考试大纲2016年浙江大学研究生入学考试《计算机学科专业基础》(878)考试大纲Ⅰ考查目标《计算机专业基础》(878)综合考试涵盖程序设计、数据结构、操作系统和计算机网络等学科专业基础课程。

要求考生比较系统地掌握上述专业基础课程的基本概念、基本原理和基本方法,能够综合运用所学的基本原理和基本方法分析、判断和解决有关理论问题和实际问题。

Ⅱ考试形式和试卷结构一、试卷满分及考试时间本试卷满分为150分,考试时间为180分钟二、答题方式答题方式为闭卷、笔试三、试卷内容结构程序设计基础(C)30分数据结构50分操作系统40分计算机网络30分四、试卷题型结构单项选择题70分(35小题,每小题2分)综合应用题80分Ⅲ考查范围程序设计基础(C)【考查目标】1.理解C程序设计语言结构,掌握数据表示和输入输出的基本方法,掌握流程控制、函数设计与调用方法;2.理解模块化程序设计方法,掌握基本的C语言程序设计过程和技巧;3.掌握初步的算法设计及数据组织方法,具备基本的问题分析和利用C语言进行求解问题的能力。

一、数据表达与组织(一)常量,变量,运算与表达式(二)一维和二维数组,字符数组和字符串(三)指针与数组,结构与数组(四)指针与结构,单向链表二、语句及流程控制(一)复合语句(二)分支控制(if、switch)(三)循环控制(for、while、do—while)三、程序结构和函数(一)C程序结构(二)函数的定义、参数传递和调用(三)函数的递归调用(四)变量的存储类别、作用域,全局变量和局部变量四、输入/输出和文件(一)标准输入和输出(二)文本文件与二进制文件(三)文件打开、关闭、读写和定位五、编译预处理和命令行参数(一)宏定义和宏函数(二)命令行参数和使用六、基本算法设计与程序实现(一)简单排序算法(插入、选择、冒泡)、二分查找(二)链表、文件中查找(三)级数求和、进制转换数据结构【考查目标】1.掌握数据结构的基本概念、基本原理和基本方法;2.掌握数据的逻辑结构、存储结构及基本操作的实现,能够对算法进行基本的时间复杂度与空间复杂度的分析;3.能应用数据结构基本原理和方法进行问题的分析与求解,具备采用C或C++语言设计与实现算法的能力。

《计算机英语》期末考试及答案

《计算机英语》期末考试及答案

《计算机英语》B卷本卷满分100分,90分钟完卷。

得分:一、选出下列单词所缺字母组合(共10小题,每小题2分,共20分)。

1.Parti__lar (特别的)A. ceB. cuC.coD. cr2.Determ___(决定)A. ineB. ingC. innD. ino3.Previ___ly (先前地,以前地)A.ocsB. onsC. ousD.obs4.Functionali__(功能)A.tiB. tyC. ttD. to5.Distri__tion (发行版,发布)A.biB. buC. beD. bo6.Catego___ (种类)A.ryB.riC.rtD.ty7.Sophisti__tion (复杂)A.coB.ceC.ca8.Capa__ty (容量,能力)A.ceB.coC.ciD.cr9.Private__ (私下地,私密地)A.lyB.liC.tyD.il10.Dere__lation (违反规定)A.gaB.goC.ggD.gu二、单项选择题(共10小题,每小题2分,共20分)。

11. I can ____ basketball.A. playedB. playsC. playingD. play12. ---Happy birthday to you.---______________A.The same to youB.good luckC. Not at allD.Thank you.13. Happy life rely on_____ hard.A. workB. workingC. worksD. to work14. She is a ____ girl.A. beautyB. beautiesC. beautifulD. beautifully15.---What`s wrong with you?---____________A. I don`t knowB. I feel terribleC. Don`t worryD. Thanks16. ---How about having bread for lunch?---_____________A.Yes,it isB. That`s greatC .I am fine D.Fine,thanks.and you?17. He expresses an interest ___ reading.A. inB. onC. atD.to18.She _______ English for seven years.A. studyB. studiesC. studiedD. has studied19. ---You are Jack, right?---___________.A. Yes,it isB. yes,I amC. Yes,I wasD.Yes,I do20. She goes to the library ______.A. readB. to readC. readingD. reads三、阅读理解(共5题,每小题4分,共20分)。

计算机专业英语试题及答案(A)-2

计算机专业英语试题及答案(A)-2

学院2007-2008学年度第一学期期末考核试卷考核课程:《计算机专业英语》考试类型: 理论考试方式: 闭卷笔试学生所在院系:计科系年级:20所级试卷:A姓名:班级:学号:题号一二三四五六总分一、Give out the full names for the following abbreviations(写出下阅卷人列缩写词的全称)(15%)ROM _____________________________________________________________CPU _______________________________________________________________BIOS ______________________________________________________________IT ________________________________________________________________WWW _______________________________________________________________HTML ______________________________________________________________PCI _______________________________________________________________HR ________________________________________________________________GUI _______________________________________________________________MHz _______________________________________________________________得分阅卷人二、Match the following words and expressions in the left columnwith those similar in meaning in the rightcolumn(将左列的词汇与右列相应的汉语匹配)(10%)1.memory unit2.intelligence3.semiconductor memon r4.data definition language5.mechanism6.machine languagemunication a.半导体存储器b.机制c.存储单元d.数据定义语言e.通信f.机器语言g・智能四、For each of the following blanks, four choices are given. Choose the most appropriate one (从下面给出的四个选项中选择最恰当的答 案)(30%)1. The basic units of a computer system are as follows:A. CPU, memory and diskB. CPU, input and output unitC. CPU, memory and I/O systemD. CPU, memory and ALU2. Today, can give you a music synthesizei; a fax machine, a CD-ROM drive, ect.A. input devicesB. expansion cardsC. output deviceD. joystick*3. The control unit fetches from memory and decodes them.-------------------------------- VA. dataB. informationC. resultsD. instructions*4. When power is removed, information in the semiconductor memory is A. reliable B. lost C. manipulatedD- remain1. ( ) 6. ( )2. ( ) 7. ( )3. ( ) 8. ( )4. ( ) 9. ( )5.( ) 10.( )8. distance education 9. pattern recognitionlO.enterprise resource planning h.远程教育 i.企业资源计划 J-模式识别得分阅卷人三、 T ranslate the following phrases into English (将下列短语翻译成板逻码菜技 统术器助形系算机帮图得分阅卷人英语)(10%)*5. Please find the Item that is not belong to the DBA )A. storage structure and access method definitionB. schema definitionC. integrity constrain specificationD. DDL6.is designed to manage large bodies of information.A. a file systemB. a transactionC. a database systemD. a database language7. A characteristic of operating system is•A. resource managementB. memory managementC. error recoveryD. all the above8.Assembly-language instructions are a series of•A. Os and IsB. abstract codesC. machine codesD. words9.program also has potential benefits in parallel processing.A. MachineB. AssemblyC. Object-orientedD.Process-oriented10.An advantage of a ring network is that it needs less•A. computerB. networkC. cableD. information11.An ISP supplies a that you can dial from your computer to logon the internet server.A. public keyB. private keyC. service numberD. help file12.To open Internet Explorer, Just click Start, point to, and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13.Electronic bulletin boards are communication platforms.A. one-to-manyB. one-to-oneC. many-to-manyD. all above14.Followings are some image data file formats, which is wrong?A.*. TIFB. *. DOCC. *. BMPD.*. GIFC.it can rotate a three-dimensional modeLD.it can do all above at the same time.15.By adding to your programs, you can make computers moreinteresting and much more fun for the user.五.To Identify the following to be True or False according to computer knowledge(根据计算机知识判别是非题)(10%)1. Registers in the control unit are used to keep track of the overall status of the program.()2. The basic resources of a computer system are software and data. (3. The chipset consists of two parts: North Bridge and South Bridge.()4. The *.BMP file can only be used in the IBM system. ( )5. ROM does not have the inputs and writing controls. ( )6. “ADD AX, BX” is a instruction of machine language.() 7. A data definition language can be used to define a database schema.( ) 8. People can only use the ISP to connect Internet. ( ) 9. We can use E-mail only as a one-to-one platform. ( ) 10. Hypermedia is the same as multimediae( ) 六.Reading comprehension(阅读理解)(25%)(一)Fill in the blanks with suitable words or expressions from thelist given below, and change the form where necessary (从下面所列词语中选择合适的 词语,以其适当的形式填空)(10%)high-level language assembly language written machine language notationA programming language, designed to facilitate the communication between human and computers, is a for describing computationin readable form. There are 3 levels of programming languages, they are , which can be run directly by computer; and • There are different high-level programming languages. Fortunately, most of them have many kinds of construct in common and varv onlv in the wav that these must be • Therefore^ first thing to be decided about a task is to choose which programming language is best suited for the job. Passage AThe central processing unit (CUP) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible forA. multimedia C. musicB.text D. picturedirecting most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller9 which its speed and capacity have increased tremendously. Indeed, these changes have resulted in mlcro-Computers that are small enough to fit on your desk and your lap.The CPU comprise the control unit and the arithmetic/Iogic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/Iogic unit, as well as the control signals between the CPU and input/output devices.The ALU perforins all the arithmetic and logical(comparison) functions—that is, it adds, subtracts, multiplies, divides, and does comparison. These comparisons9 which are basically “less than”,“greater than”, and “equal to”, can be combined into several common expres sions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.(二)Tell whether the following statements are true(T) or false(F) according to the passage A(根据上文的内容判断下列句子的正误)(15%)1.With the development of computer, the physical size of the CPU has often become bigger and bigger ( )2.The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input/output devices are controlled by the control unit of the CPU. ( )3.The CPU comprises the control unit and memory. ( )4.The control unit performs all the arithmetic and logical functions.( )5.The central processing unit (CPU) is the heart of the computer systems. ( )【第页共页】学院2007-2008学年度第一学期期末考核试卷参考答案及评分标准考核课程:计算机英语考试类型:理论 考试方式:闭卷笔试学生所在院系:计科系 年 级: 2016 试卷:A 执笔人: ______________要求:明确标注每小题或每步骤得分点一• Give out the full names for the following abbreviations (写出下列缩写词 的全称)(15%)(本题共15分,每小题1.5分)ROM: Read Only Memory CPU: Central Processing Unit BIOS: Basic Inpiit/Output Unit IT: Information Technology WWW: World Wide WebHTML: Hypertext Markup Language PCI: Peripheral Component Interconnect HR: Human ResourceGUI: Graphical User Interface MHz: Megahertz二.Match the following words and expressions in the left column with those similar inmeaning in the right column (将左列的词汇与右列相应的汉语匹配) (10%)(本题共10分,每小题1分)1. ( C ) 6. ( f) 2. ( g ) 7. ( e ) 3. ( a ) 8. ( h ) 4. ( d ) 9. ( J ) 5.(b) 10. (• 1 )三. Translate the following phrases into English(将下列短语翻译成英语)(10% )(本题共10分,每小题2分)1.the system board2.Arithmetic logical operations3.machine code4.Help menu5.graphics technology四.For each of the following blanks, four choices are given. Choose the most appropriate one(从下面给出的四个选项中选择最恰当的答案)(30%)(本题共30分,每小题2分)1. C 2,B 3.D 4.B 5.D 6 C 7. A 8. B 9. C 10. C IL C 12. A 13. A 14. B 15. A五.To identify the following to be True or False according to computer knowledge(根M计算机知识判别是非题)(10%)(本题共10分,每小题1分)1. ( T )2. ( F)3. (T)4. ( F )5. (T )6. ( F )7. (T )8. ( F )9. ( F )10.( F )六.Reading comprehensk)n(阅读理解)(25%)(一)Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下面所列词语中选择合适的词语,以其适当的形式填空)(10%)(本题共10分,每空2分)notation machine language assembly language high-level language written(3空和4空答案可互换)(二)Tell whether the following statements are true(T) or false(F) according to thepassage A(根据上文的内容判断下列句子的正误)(15%)(本题共15分,每小题3分)l.(F) 2. (T ) 3. ( F ) 4.(F) 5. ( T )1、_b ___ refers to the parts of the computer that you can see and touch.A. SoftwareB. HardwareC. HardshipD. Instruction 2、primary memory which is stored on chips located_a_。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

浙江大学2015-2016学年秋冬学期
研究生《计算理论》课程期终考试试卷
考试形式:闭卷,考试时间:2016年1月15日,所需时间:120分钟
学号:姓名:专业:任课教师:金小刚题序1234567总分
得分
评卷人
Zhejiang University
Theory of Computation,Fall-Winter2015
Final Exam
1.(20%)Determine whether the following statements are true or false.If
it is true write a⃝otherwise a×in the bracket before the statement.
(a)()Let L be any regular language.Then the number of equivalence classes
respect to language L(i.e.x≈L y,if for all z∈Σ∗,xz∈L iffyz∈L)isfinite.
(b)()The language{a n b n w|w∈{a,b}∗,n∈N,and|w|=2n}is context-free.
(c)()The language{“M”“w”|M accepts w in less than2016steps}is not
recursive.
(d)()The language{“M”|M is a TM and L(M)is Context-free but L(M)is
not regular}is not recursive.
(e)()The language{“M1”“M2”|M1and M2are TMs,and M1halts on e but
M2doesn’t halt on e}is recursively enumerable,but not recursive.
(f)()The set of all primitive recursive functions is a proper subset of the set of
allµ-recursive functions.
(g)()Let A and B be two disjoint recursively enumerable languages.If A∪B
is also be recursively enumerable,then it is possible that neither A nor B is
decidable.
(h)()Let H10={“M”|M is a TM and10∈L(M)}andτ1andτ2are recursive
functions.If H10≤τ1L and H10≤τ2L,then L is recursive enumerable but not
recursive.
(i)()Suppose SAT≤P L and L∈P.Then P=NP.
(j)()Let H={“M”“w”|TM M halts on input string w},then H is NP-complete.
2.(18%)On F A and Regular Languages
Say whether each of the following languages is regular or not regular?Prove your answers.
(a)L1={w|w∈{0,1}∗and w has an equal number of0s and1s}.
(b)L2={w|w∈{0,1}∗and w has an equal number of01s and10s}.
3.(20%)On PDA and Context-Free Languages
Let L3={wca m b n|w∈{a,b}∗,where w=w R,and m,n∈N,n≤m≤2n}.
(a)Give a context-free grammar for the language L3.
(b)Design a PDA M=(K,Σ,Γ,∆,s,F)accepting the language L3.
Solution:(a)
(b)The PDA M=(K,Σ,Γ,∆,s,F)is defined below:
(q,σ,β)(p,γ)
K={}
Σ={a,b,c}
Γ={}
s=
F={}
4.(18%)On Undecidability
Classify whether each of the following languages are recursive,recursively enumerable but-not-recursive,or non-recursively-enumerable.Prove your answers,but you may not simply appeal to Rice’s theorem.
(a)L4={“M”|M is a Turing Machine,and|L(M)|>2}.
(b)L5={“M”|M is a Turing Machine,and|L(M)|≤2}.
5.(15%)On P and NP Problems
In an undirected graph G=(V,E),a Sovereign set is a vertex subset S⊆V such every edge in E has at most one endpoint in S.Let Sovereign Set={(G,k):
G is an undirected graph that contains a sovereign set of at least k vertices}.
(a)Give the definition of the class P and NP.
(b)Show that Sovereign Set is a NP problem.
(c)Prove that Sovereign Set is NP-complete.You may reduce from Clique
problem.
6.(9%)On Computability and Computational Complexity
(a)Draw a diagram illustrating the relations between P,NP,recursive,recursively
enumerable(r.e.),co-r.e.on the hypothesis that P=NP,where co-r.e.is the set of languages that its complement is recursively enumerable;
(b)Try to mark the languages H,H,H1and H1in the given diagram in part(a),
where H={“M”“w”|Turing Machine M halts on w}and H1={“M”|Turing Machine M halts on“M”},respectively.
Enjoy your Spring Festival!。

相关文档
最新文档