2008计算机科学导论试题(A卷)
(整理)级导论期末试题a及答案.

22.计算机网络最突出的优点是()。
(A)精度高(B)内存容量大(C)运算速度快(D)共享资源
23.电子邮件是()。
(A)网络信息检索服务
(B)通过Web网页发布的公告信息
(C)通过网络实时交互的信息传递方式
(D)一种利用网络交换信息的非交互式服务
(A)4 (B) 8
(C) 7 (D) 1
35.下列叙述中正确的是()。
(A)正数二进制原码的补码是原码本身
(B)所有十进制数都能准确地转换为有限位二进制小数
(C)用计算机做科学计算是绝对精确的
(D)存储器具有记忆能力,其中的任何信息都不会丢失
二、判断题:(每小题1分,共25分)
1.万维网的网址以http为前导,表示遵从超文本传输协议。
4.电子计算机之所以能够快速,自动,准确地按照人们意图进行工作,其最主要的原因是( ).
(A)存储程序(B)采用逻辑器件
(C)总线结构(D)识别控制代码
5.计算机唯一能够直接识别和处理的语言()。
(A)机器语言(B)汇编语言
(C)高级语言(D)第四代语言
6.CPU中指向下一条将要执行的指令地址的部件叫作( )
画出下列算法的流程图:
1.从键盘输入20个整数,统计其中正数、负数和零的个数。
2.从键盘输入一个正整数,判断该数是否为质数。
2010级计算机科学导论期末考试答案
一、单选题:(每小题1分,共35分)
1. B 2. D 3. C 4. A 5. A
6. A 7. C 8. A 9. C 10. D
11. C 12. C 13. B 14. D 15. D
15.Internet的域名地址中,教育机构表示为.edu。
计算机上学期期末考试《计算机科学导论》试题及答案

计算机学院第1学期期末考试《计算机科学导论》试题(闭卷B卷)(请将答案写在答题纸上,否则无效)一、单项选择题(共30小题,每小题1分,共30分)1、删除或隐藏了复杂的()、只保留实现目标所必须的信息,称作抽象。
A.形式B.细节C.关系D.内容2、计算机能够运行不同的软件,主要是因为有()。
A.运算器B.控制器C.存储器D.输入/输出设备3、计算机中表示有符号数的最常用编码是()。
A.二进制补码B.十六进制C.行程长度编码D.赫夫曼编码4、计算机中使用浮点数的主要目的是为了表示()。
A.汉字B.小数C.模拟数据D.机器语言5、以下()文件是存储数码照片的首选格式。
A.JPEG B.GIF C.PSD D.WMV6、仅计算两个1位二进制数的和,而不考虑进位输入的电路称作()。
A.半加器B.全加器C.加法器D.算术逻辑部件7、计算机CPU的指令寄存器IR中存放的内容来自()。
A.内存B.程序计数器C.内部寄存器D.输入/输出部件8、计算机能够执行的程序为()。
A.伪代码B.高级语言源程序C.汇编语言源程序 D.机器语言代码9、自顶向下的分析与设计过程中,被“抽象”的对象是()。
A.任务B.对象C.问题D.工具10、把数据和动作集中在一起,使数据和动作的逻辑属性与它们的实现细节分离,称作()。
A.数据抽象B.过程抽象C.控制抽象D.封装11、16位的Pep/7机寻址方式说明符使用2位编码,则该计算机最多有()种寻址方式。
A.2 B.22=4 C.16×2=32 D.7×2=1412、Java语言是()范型的高级程序设计语言。
A.函数B.命令C.逻辑程序设计D.面向对象13、使用命令式高级语言编写的非图形用户界面(GUI)应用程序,最自然的是()结构。
A.选择B.循环C.顺序D.异步处理14、具有先进先出性质的结构称作()。
A.列表B.队列C.栈D.树15、在某图书馆的借还书处,新还的书摞在最上面,放回时也从最上面取走。
2008计算机科学概论试卷

,考试作弊将带来严重后果!华南理工大学期末考试2008级《计算机科学概论》试卷1. 考前请将密封线内各项信息填写清楚;所有答案直接答在试卷上;.考试形式:闭卷;选择题(共20分,每题1分)1. 现代计算机是基于 ( B)模型。
A) Ron Newman B) von NeumannC) Pascal D) Charles Babbage2. 能将程序设计任务从计算机操作任务中分离出来的是(C )。
A) 数据处理器 B)算法C)操作系统 D)高级程序设计语言3. 10位的位模式可表示( D )个不同符号。
A) 128 B) 256 C) 512 D)10244. ( C)是16位编码,可表示除英语外的其他语言符号。
A)ASCII B)扩展ASCII C)Unicode D)EBCDIC5. 5在Excess_128中表示为()。
A)00000101 B)10000100C)10000101 D)10000001以下三种表示法中不能处理负数的是( D ).A) 符号加绝对值表示法B) 二进制反码表示法C) 二进制补码表示法D) 无符号整数表示法经常用于存储小数的指数值.A) Excess-X B) 无符号整数C) 二进制反码D) 二进制补码尾数是以( C )形式存储在计算机中的.A) 以无符号整数B) 以二进制反码C) 以二进制补码D) 以符号加绝对值对于8位分配单元,用二进制补码能表示的最小十进制数是( C ).A) -8 B) -127 C) -128 D) -25610. 如果存储器地址空间是16MB,字长为8位,那么存储一个字需要( D )位.A)24 B) 8 C) 16 D) 3211. 计算机中运行程序的三个步骤依次是:( D ).A) 取指令、执行、译码 B) 译码、执行、取指令C)译码、取指令、执行 D)取指令、译码、执行12. 目前IP地址的长度是(A)位。
A)32 B) 4 C) 16 D) 813.在8位存储单元中,能存储-128的是(D )。
2008年上海市高等学校计算机等级考试(A卷-H卷)---基础题汇总[推荐]
![2008年上海市高等学校计算机等级考试(A卷-H卷)---基础题汇总[推荐]](https://img.taocdn.com/s3/m/f36e80082e60ddccda38376baf1ffc4ffe47e23a.png)
2008年上海市高等学校计算机等级考试(A卷-H卷)---基础题汇总[推荐]第一篇:2008年上海市高等学校计算机等级考试(A卷-H卷)---基础题汇总[推荐]A套单选题1、在Word编辑中,标尺的基本功能之一是进行________操作。
A:分栏B:段落缩进*C:建立表格D:嵌入图片2、以下叙述中,不属于多媒体声卡的功能是_________。
A:解压缩波形音频文件B:合成并编辑波形音频文件* C:压缩波形音频文件D:录制波形音频文件3、Windows中的MediaPlayer8.0媒体播放器不支持_________格式的多媒体文件。
A:AVIB:MPEGC:MP3D:MOV*4、在使用Photoshop进行图像处理时,使用“编辑”菜单中的命令,不可以进行________操作。
A:填色B:剪切C:描边D:素描*5、在Excel中,要删除选定单元格中的批注,可以________。
A:用“编辑”菜单中的“清除”子菜单中的“内容”命令B:用“编辑”菜单中的“删除”命令C:用“编辑”菜单中的“清除”子菜单中的“批注”命令* D:按DEL键6、下列属于视频制作的常用软件的是____________。
A:Word 2000B:PhotoShop C:Ulead Video Edit*D:Ulead Audio Edit7、一般来说,在计算机存储体系结构中,下列存储器中存储容量最大的是________。
A:内存储器B:CacheC:U盘D:硬盘*8、关于对等网,下列说法中不正确的是_________。
A:网上任意节点可以作为工作站,以分享其它服务器的资源B:网上任意节点计算机可以作为网络服务器,为其它计算机提供资源 C:对等网上各台计算机无主从之分D:当网上一台计算机有故障时,全部网络瘫痪*9、下列四项描述中,属于RAM特点的是________。
A:速度慢B:信息永久保存 C:只能进行读操作D:可以进行读和写*10、按USB2.0标准,USB的传输速率可以达到________Mbps。
2008级吉林大学软件学院-计算机导论试题A卷

2008级吉林大学软件学院-计算机导论试题A卷2007-2008学年第1学期2008级《计算机导论》考试试题A卷考试时间:2008年12月28班级学号姓名请将答案写在答题纸上,写明题号,不必抄题,字迹工整、清晰;请在答题纸和试题纸上都写上你的班级,学号和姓名,交卷时请将试题纸、答题纸和草纸一并交上来。
Ⅰ.Choice Questions(30 questions, 1 score for each question)1. The step by step solution that expresses the logical solution to a particular problem of interest is called a(n) ________.A. programB. answerC. algorithmD. process2. The ASCII character set includes ________ characters.A. 4,294967296B. 256C. 65536D. 1273. The most common way to represent signed integers today is ________.A. two’s complementB. one’s complementC. sign-and magnitudeD. unsigned integers4.What is -31 in Excess_127 notation? ________A. 01100001B. 01100000C. 10011111D. 111000015.To subtract two binary numbers, take the ________ of the second number, and then add.A. inverseB. one's complementC. two's complementD. square root6. Every computer today is based on the ________ model..A. IntelB. MicrosoftC. von NeumannD. input/output7. The place where programs and data are stored during processing is ________..A. displayB. hard diskC. floppy diskD. memory8. A computer stores data as a ________ pattern.A. binaryB. hexadecimalC. unaryD. numeric9. An 8-bit pattern can represent up to ________ symbols.A. 128B. 256C. 16D. 810. A byte consists of ______ bits.A. 2B. 4C. 8D. 111. If the memory address space is 32MB and the word size is 8 bits, then ______bits are needed to access each word.A.25B. 16C. 8D. 3212. The three steps in the running of a program on a computer are performed ______in this specific order.a. fetch, execute, and decodeb. fetch, decode, and executec. decode, fetch, and executed. decode, execute, and fetch13.A ______is a device that can route a packet based on its network layer address.A. bridgeB. repeaterC. routerD. all of the above14.In the ______method to synchronize the operation of the CPU with the I/O device, the I/O device informs the CPU when it is ready for data transfer.A. programmed I/OB. DMAC. isolated I/OD. interrupt-driven I/O15. A(n) ________ search is used if the list being searched is not ordered.A. heapB. binaryC. 8. selectionD. sequential16. Using the XOR (exclusive OR) operator, if more than one input is 1, the output is ________.A. 0B. 1C. indeterminateD. equal to the number of inputs that are 117.If you make a mask of all 0s and then AND the bit pattern and the mask, you will _______.A. set all the bits of the patternB. unset all the bits of the patternC. randomize the bits of the patternD. complement the bits of the pattern18. The ______ is a computer subsystem that performs operations on data.A. memoryB. I/O hardwareC. CPUD. RAM19.Memory addresses are defined using ________.A. signed binary integersB. two's complement representationC. floating point numbersD. unsigned binary integers20. The ________ moves a process from one state to another.A. control unitB. job schedulerC. system administratorD. process scheduler21.The idea of a sorting algorithm is to ________.A. determine if a particular item is present or notB. arrange data according to their valueC. compute the sum of all the items in an arrayD. output the items in an array22. A binary search starts the process ________ of a list.A. at the beginningB. at a random locationC. in the middleD. at the end23. What needs to be added to the simple black box model of a data processing device to make it more applicable to a computer?A. BIOSB. Power supplyC. Operating systemD. Program24. A program is comprised of a finite number of ________.A. instructionsB. memory cellsC. i/o devicesD. hard drives25.A(n) ________ operates ate the first three layers of the OSI model.A. hubB. repeaterC. routerD. bridge26. Machine language is ________.A. written in LinuxB. the only language understood by a computerC. the same as assembly languageD. variant of BASIC27.Recursion is a process by which an algorithm calls ________.A. a sorting algorithmB. a search algorithmC. itselfD. a subalgorithm28. The transport layer protocol of TCP/IP is called _______.A. TCPB. UDPC. IPD. a and b29. ______ is a program that facilitates the execution of other programs.A. An operating systemB. A queueC. An application programD. Hardware30. A process in the ready state goes to the running state when _________.A. it finishes runningB. it enters memoryC. it gets access to the CPUD. it requests I/OⅡ.Questions( 5 questions,4 scores for each question)1. What‘s the function of the ALU?/doc/6f3549947.html, the layers of the OSI model..3. What is the formal definition of an algorithm?4. What are the components of an operating system?5. What are the subsystems of the von Neumann computer model?Ⅲ.Calculation( 5 subjects, 6 scores for each subject)1. Change the following 8-bit two’s complement numbers to decimal.(1). 11111111 (2). 01100011 (3). 10000000 (4). 11001110 (5).11010000 (6)000100112.Change the following decimal numbers to 8-bit two’s complement integers.(1). 142 (2). -13 (3). -128 (4). 100 (5). -56 (6) -13. Using an 8-bit allocation, first convert each of the following numbers to two’s complement, do the operation, and then convert the result to decimal.(1) 18+22 (2) 18-22 (3) -18 +22 (4) -18-22 (5) 22-1 (6)-128-14. Show the result of the following operations in hexadecimal format.(1) NOT x55 (2) x AA AND x55 (3) x99 OR x66 (4) 100 AND 255(5) xFF XOR x33 (6) x40 OR (x8F AND xF7)5.Change the -7.125 decimal numbers to binary numbers, and show in 32-bit IEEE format, then changed to hexadecimal.Ⅳ. Analyzing and Design (4 subjects, 5 scores for each subject)1. An imaginary computer has eight data registers Rx(R0 toR7), 16M words in memory, the address can address words in the 16M words memory, and have 32 different instructions (ADD, SUB, etc.). A typical instruction of the computer uses the following format: SUB address, Rx(1) What is the minimum size of an instruction in bits?(2) If the instruction is in the minimum size and the computer uses the same size of word for data and instructions, what is the size of the data bus?(3) What is the size of the program counter?(4) What is the size of the address bus?(5) What is the minimum size of the control bus?2. Imaging a power plant that pumps water to a city using eight pumps. The states of the pumps (on oroff) can be represented by 8-bit pattern. For example, the pattern 10001111 shows that pumps 1 to 4(from right), and 8 are on(running) while pumps 5, 6, and 7 are off(shut down). How can you shut down all pumps, after a while, and then let the pump 5 ,7 running?3. Using the Insertion sort algorithm, manually sort the following list and show your work in each pass:12, 5, 23, 31, 40, 56, 78, 9, 2, 11, 984. A list contains the following elements. Using the binary search algorithm, trace the steps followed to find 58. At each step, show the values of first, last, and mid.5,12, 16, 26, 33, 51, 58, 80。
2008计算机科学导论试题(A卷)

西南大学课程考核命题教师:教研室或系负责人:主管院长:年月日《计算机科学导论》课程试题【A】卷c) the domain named) the protocol5. Service programs are another name for .a) operating systemb) utilitiesc) language translatorse) device drivers6. Browsers, word processors, and spreadsheets are applications.a) special-purposeb) artificial intelligencec) general-purposed) multimedia7. Web are computers that store and share documents.a) agentsb) browsersc) serversd) search engines8. In commerce, individuals typically sell to other individuals without ever meetingface-to-face.a) C2Cb) B2Cc) B2Bd ) C2I9. ______ is a set of standard on the Internet allowing you to transfer files.a) Plug and playb) Unicodec) FTPd) ISA10. A database field that uniquely identifies each record is called the .a) ID numberb) primary keyc) legendd) explanation field11. Applets are typically written in a programming language called .a) XMLb) Pascalc) Javad) Basic12. The equipment that processes data in order to create information is called______.a) program西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————b) compilerc) hardwared) software13. Which one of the following OS is open source software free and available from many sources, including the web?a) Linuxb) Windows CEc) Mac OSd) Unix14. In a network, the server will use______ operating system.a) networkb) stand-alonec) embeddedd) client15. Raster images are also known asa) bitmap imagesb) clip art imagesc) vector imagesd) multimedia images16. When you copy a paragraph from Word to a PowerPoint presentation, the Word document is the .a) hyperlinkb) OLE filec) source filed) destination file17. Many expert system use , which allows users to respond to questions in a human way.a) packetsb) fuzzy logicc) story boardsd) vector images18. allows you to reorganize, add effects, and more to your digital video footage.a) Audio editing software《计算机科学导论》课程试题【A】卷b) Browsersc) Video editing softwared) Paint program19. To remove unneeded programs and related files from a hard disk, you would use a .a) backup programb) antivirus programc) file compressed programd) uninstall program20. Norton System Works is a .a) Web serviceb) utility suitec) troubleshooting programd) none of the above21. are the most widely used handheld computers.a) RAMsb) Notebooksc) PDAsd) CPUs22. ROM is also known as .a) slotsb) adapterc) semiconductord) firmware23. _______ is a standard that allows musical instruments to connect to the system unit.a) Instructionb) MIDIc) OMRd) Input devices24. When a program makes a true or false decision, it is an example of a(n) ____ logic structure.a) what-ifb) do untilc) do while西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————d) if-then-else25. Desktop operating systems are also called .a) network operating systemsb) embedded operating systemsc) stand-alone operating systemsd) client operating systems26. Languages that can run on more than one kind of computer are called .a) Machine languagesb) Assembly languagesc) Portable languagesd) Query languages27. The best way to code effective programs is to write .a) top-down programsb) loop structured programsc) structured programsd) selection structured programs28. Most presentation graphics programs provide a(n) that steps you through the process of creating a presentation.a) dialog boxb) toolbarc) icond) wizard29. The most widely used Web protocol is .a) http://b) URLc) HTMLd) ISP30. are criminals that specialize in stealing, trading, and using credit cards over the Internet.a) Clientsb) Agentsc) Cardersd) Servers二、Fill In The Blanks With The Given Terms(20 Points)《计算机科学导论》课程试题【A】卷a.downloadingb.protocolc.bus widthd.mousee.utilityf.systemg.morphingh.multimediai.uninstallj.writing k.artificial intelligence l.resolutionm.plug and playn.hard copyo.audiop.slotsq.integrated packager.sectorss.microsecondt.programming language1. A(n) is a single program that provides the functionality of a word processor, spreadsheet, database managers, and more.2. is the integration of all sorts of media into one presentation.3. is the process of receiving a file from another computer.4. ___ _ software runs in the background and helps the computer manage its own internal resources.5. To safely remove a program from your computer, it is best to use a(n) ____ program.6. A(n) ___ __ is a unit of time representing one millionth of a second.7. Speakers and headphones are both classified as output devices.8. …. can control pointer and change its shape depending on its current function.9. Each track is divided into wedge-shaped sections called _________.10. _______ is a special effect in which one image seems to melt into another.11.provide a connection point for specialized cards or circuit boards.12. The number of bits that can travel simultaneously down a bus is known as the .13. is a set of hardware and software standards developed by Intel, Microsoft, and others.14. ___ ___ is expressed as a matrix of these dots and pixels.15. Printer output is often called .16. is the process of saving information to secondary storage devices.17. A(n) uses a collection of symbols, words, and phrases that instruct a computer to perform specific operations.18. _ ____ programs are designed to make computing use easier.19. attempts to develop computer systems that can mimic or simulate human senses, thought processes, and actions.20. _ (s) are rules for exchanging data between computers. .三、True/False(20 Points)1. The most common input devices are the keyboard and the mouse. ( )2. Image editor is used to editing vector images. ( )3. Data are unprocessed facts. ( )西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————4. A typical e-mail message has three basic elements: header, message, and attachments. ( )5. A formula is an instruction to calculate or process. ( )6. The content of Flash RAM can be lost when the power of the computer is off. ( )7. Special programs called agents, spiders, or bots continually look for new information and update the search services’ databases. ( )8. You can share data by copying and pasting, or by using object linking and embedding. ( )9. A master slide is a special slide that does not appear in a presentation but controls all the format and placement of all slides in a presentation. ( )10. Productivity suites, also known as home suites, contain professional grade application programs. ( )11. Virtual reality modeling language is used to create real-time animated 3-D scenes. ( )12. Mac OS is not nearly as widely as the windows operating system. ( )13. A dumb terminal can process data independently. ( )14. Monitor output is described as hard copy. ( )15. Debugging is a programmer’s word for testing and then eliminating errors. ( )16. EBCDIC is the most widely used binary code for microcomputer. ( )17. A file that is 1600 KB will fit on a traditional floppy disk. ( )18. The best way to write good programs is to create unstructured programs. ( )19. A word is the number of bits that can be accessed at one time by the CPU. ( )20. Writing the program is called coding. ( )四、Translate the Following Key Terms into Chinese(10 Points)1. USB2. web-based application software3. Virtual reality4. Cache memory5. GUI6. Electronic commerce7. Drop-down menu8. DBMS9. Expert system10. C2C11. ISP12. URL13. OOP14. Object linking and embedding(OLE)15. Desktop publishing programs16. Dpi17. HDTV18. Network terminal19. Domain name20. system bus五、Complete the following conversions between different numbering systems.(6 Points)《计算机科学导论》课程试题【A】卷1.()2=( )10=( )8= ( )162. (87.125)10=( )2 =( )8= ( )16六、Fill in the Blanks (5 Points)1. An information system has five parts: people, ,software, hardware, and data.2. Operating systems are programs that coordinate computer resources, provide an interface between user and the computer, and run .3. Web are virtual stores for B2C electronic commerce. .4. .are programs that provide access to Web resources.5. In a worksheet, a . is a series of continuous cells.七、Translate the Following Paragraph into Chinese(9 Points)(1)E- commerce (3 Points)Technology creates products that operate faster, are priced cheaper, are often of better quality, or are wholly new. Indeed, new products can be individually tailored to a particular customer’s needs. For example, financial services companies such as Merrill Lynch(美林)have taken advantage of technology to launch cash management accounts. These accounts combine information on a person’s checking, savings, credit card, and securities accounts into a single monthly statement. It automatically sets aside “idle” funds into interest-bearing money market funds. Customers can access their accounts on the Web and get a complete picture of their financial condition at any time. However, even if they don’t pay much attention to their statements, their surplus funds are invested automatically.(2)Information flow(3 Points)In large and medium-sized organizations, computerized information systems don’t just keep track of transactions and day-to-day business operations. They also support the flow of information within the organization. This information flows both vertically and horizontally. In order to understand this, we need to understand how an organization is structured. One way to examine an organization’s structure is to view it from a functional perspective. That is, you can study the different basic functional areas in organizations and the different types of people within these functional areas. . .(3)Network(3 Points)Connectivity is a concept related to using computer networks to link people and resources. For example, connectivity means that you can connect your microcomputer by telephone or other telecommunications links to other computers and information sources almost anywhere. With this connection, you are linked to the world of larger computers and the Internet. This includes minicomputers and mainframes and their extensive information resources. Thus, becoming computer competent becomes a matter of knowing not only about connectivity through networks to microcomputers, but also about西南大学课程考核(试题【A】卷)larger computer systems and their information resources. ——————————————密————————————封————————————线——————————————《计算机科学导论》课程试题【A】卷专业:_________________学号:____________________姓名:___________Answer Sheet (A)1 point per1. ()2=( )10=( )8=( )162. (127.625)10=( )2 =( )8=( )16六. Fill in the blank(5 Points)西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————七. Translate the following paragraphs into Chinese(9 Points)《计算机科学导论》课程试题【A】卷西南大学课程考核(试题【A】卷) ——————————————密————————————封————————————线——————————————。
计算机科学系《计算机科学导论》复习题2

计算机科学系《计算机科学导论》复习题2一、选择题1、在计算机科学中,以下哪个选项代表了信息的最大单位?A.字节B.位C.字D.字符串答案:A.字节。
在计算机科学中,信息的最大单位是字节(Byte),它代表了计算机存储空间的基本单位。
一个字节由8个位(bit)组成,可以存储一个字节的数据。
2、计算机程序是由什么组成的?A.命令和数据B.变量和函数C.输入和输出D.算法和数据结构答案:D.算法和数据结构。
计算机程序是由算法和数据结构组成的。
算法是程序的逻辑执行流程,而数据结构是程序中数据的组织方式。
3、在计算机科学中,以下哪个选项代表了程序的最高级别语言?A.机器语言B.低级语言C.中间语言D.高级语言答案:D.高级语言。
高级语言是程序的最高级别语言,它使用简单的命令和语法来表示复杂的逻辑操作。
机器语言和低级语言都是更接近于硬件的语言,而中间语言则是一种过渡语言,用于连接高级语言和机器语言之间的转换。
4、在计算机科学中,以下哪个选项代表了程序的执行方式?A.串行执行B.并行执行C.分布式执行D.递归执行答案:A.串行执行。
程序的执行方式主要有串行执行和并行执行两种。
串行执行是指程序按照指令的顺序逐条执行,而并行执行则是指程序在多个处理器或计算机上同时执行。
分布式执行则是指程序在多个计算机上协同执行。
递归执行则是指程序调用自身的方式。
5、在计算机科学中,以下哪个选项代表了程序的调试技术?A.语法分析B.语义分析C.调试器D.编译器答案:C.调试器。
调试器是一种用于程序调试的工具,它可以帮助程序员检查程序的执行过程,找到并修复错误。
语法分析器和编译器是用于程序编译的工具,而语义分析则是对程序进行语义理解的过程。
计算机科学系《计算机科学导论》复习题3一、选择题1、在计算机科学中,以下哪个选项代表了信息的最高形式?A.数字B.文本C.图像D.声音答案:A.数字。
在计算机科学中,数字是信息的最高形式,因为它可以表示文本、图像、声音等其他形式的信息。
08级考卷a答案(10年)

08级考卷A答案(10年)一、选择题(每题1分,共5分)A. 数据传输B. 文件管理C. 资源共享D. 信息处理2. 在操作系统中,下列关于进程和线程的描述,错误的是?()A. 进程是系统进行资源分配和调度的一个独立单位B. 线程是进程的执行单元,一个进程可以有多个线程C. 进程和线程都可以并发执行D. 线程之间不共享资源A. 栈B. 队列C. 二叉树D. 线性表4. 在数据库系统中,下列关于事务的描述,正确的是?()A. 事务是一个操作序列,可以包含多个SQL语句B. 事务具有原子性、一致性、隔离性和持久性C. 事务只能对数据库进行查询操作D. 事务可以同时操作多个数据库A. 冒泡排序B. 快速排序C. 堆排序D. 深度优先搜索二、判断题(每题1分,共5分)1. 计算机网络的目的是实现数据传输和资源共享。
()2. 在操作系统中,进程和线程是完全相同的概念。
()3. 数据结构中的栈是一种先进先出的数据结构。
()4. 数据库管理系统(DBMS)可以对数据进行增、删、改、查操作。
()5. 算法的复杂度只与问题的规模有关,与算法本身无关。
()三、填空题(每题1分,共5分)1. 计算机网络由通信子网和______组成。
2. 操作系统的主要任务是管理计算机的硬件、软件和______。
3. 数据结构分为逻辑结构、存储结构和______。
4. 关系型数据库中,二维表被称为______。
5. 算法的复杂度包括时间复杂度和______。
四、简答题(每题2分,共10分)1. 简述计算机网络的基本功能。
2. 请解释进程和线程的区别。
3. 什么是栈?栈的特点是什么?4. 简述数据库的三级模式结构。
5. 请列举三种常见的排序算法。
五、应用题(每题2分,共10分)1. 设有一个线性表(1,2,3,4,5),请用冒泡排序算法对其进行排序。
2. 请用自然语言描述快速排序的基本思想。
3. 设有一个二叉树,请写出先序遍历、中序遍历和后序遍历的算法。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
西南大学课程考核《计算机科学导论》课程试题【A】卷c) the domain named) the protocol5. Service programs are another name for .a) operating systemb) utilitiesc) language translatorse) device drivers6. Browsers, word processors, and spreadsheets are applications.a) special-purposeb) artificial intelligencec) general-purposed) multimedia7. Web are computers that store and share documents.a) agentsb) browsersc) serversd) search engines8. In commerce, individuals typically sell to other individuals without ever meetingface-to-face.a) C2Cb) B2Cc) B2Bd ) C2I9. ______ is a set of standard on the Internet allowing you to transfer files.a) Plug and playb) Unicodec) FTPd) ISA10. A database field that uniquely identifies each record is called the .a) ID numberb) primary keyc) legendd) explanation field11. Applets are typically written in a programming language called .a) XMLb) Pascalc) Javad) Basic12. The equipment that processes data in order to create information is called______.西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————a) programb) compilerc) hardwared) software13. Which one of the following OS is open source software free and available from many sources, including the web?a) Linuxb) Windows CEc) Mac OSd) Unix14. In a network, the server will use______ operating system.a) networkb) stand-alonec) embeddedd) client15. Raster images are also known asa) bitmap imagesb) clip art imagesc) vector imagesd) multimedia images16. When you copy a paragraph from Word to a PowerPoint presentation, the Word document is the .a) hyperlinkb) OLE filec) source filed) destination file17. Many expert system use , which allows users to respond to questions in a human way.a) packetsb) fuzzy logicc) story boardsd) vector images18. allows you to reorganize, add effects, and more to your digital video footage.《计算机科学导论》课程试题【A】卷a) Audio editing softwareb) Browsersc) Video editing softwared) Paint program19. To remove unneeded programs and related files from a hard disk, you would use a .a) backup programb) antivirus programc) file compressed programd) uninstall program20. Norton System Works is a .a) Web serviceb) utility suitec) troubleshooting programd) none of the above21. are the most widely used handheld computers.a) RAMsb) Notebooksc) PDAsd) CPUs22. ROM is also known as .a) slotsb) adapterc) semiconductord) firmware23. _______ is a standard that allows musical instruments to connect to the system unit.a) Instructionb) MIDIc) OMRd) Input devices24. When a program makes a true or false decision, it is an example of a(n) ____ logic structure.a) what-ifb) do until西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————c) do whiled) if-then-else25. Desktop operating systems are also called .a) network operating systemsb) embedded operating systemsc) stand-alone operating systemsd) client operating systems26. Languages that can run on more than one kind of computer are called .a) Machine languagesb) Assembly languagesc) Portable languagesd) Query languages27. The best way to code effective programs is to write .a) top-down programsb) loop structured programsc) structured programsd) selection structured programs28. Most presentation graphics programs provide a(n) that steps you through the process of creating a presentation.a) dialog boxb) toolbarc) icond) wizard29. The most widely used Web protocol is .a) http://b) URLc) HTMLd) ISP30. are criminals that specialize in stealing, trading, and using credit cards over the Internet.a) Clientsb) Agentsc) Cardersd) Servers二、Fill In The Blanks With The Given Terms(20 Points)《计算机科学导论》课程试题【A】卷a.downloadingb.protocolc.bus widthd.mousee.utilityf.systemg.morphingh.multimediai.uninstallj.writing k.artificial intelligence l.resolutionm.plug and playn.hard copyo.audiop.slotsq.integrated packager.sectorss.microsecondt.programming language1. A(n) is a single program that provides the functionality of a word processor, spreadsheet, database managers, and more.2. is the integration of all sorts of media into one presentation.3. is the process of receiving a file from another computer.4. ___ _ software runs in the background and helps the computer manage its own internal resources.5. To safely remove a program from your computer, it is best to use a(n) ____ program.6. A(n) ___ __ is a unit of time representing one millionth of a second.7. Speakers and headphones are both classified as output devices.8. …. can control pointer and change its shape depending on its current function.9. Each track is divided into wedge-shaped sections called _________.10. _______ is a special effect in which one image seems to melt into another.11.provide a connection point for specialized cards or circuit boards.12. The number of bits that can travel simultaneously down a bus is known as the .13. is a set of hardware and software standards developed by Intel, Microsoft, and others.14. ___ ___ is expressed as a matrix of these dots and pixels.15. Printer output is often called .16. is the process of saving information to secondary storage devices.17. A(n) uses a collection of symbols, words, and phrases that instruct a computer to perform specific operations.18. _ ____ programs are designed to make computing use easier.19. attempts to develop computer systems that can mimic or simulate human senses, thought processes, and actions.20. _ (s) are rules for exchanging data between computers. .三、True/False(20 Points)1. The most common input devices are the keyboard and the mouse. ( )2. Image editor is used to editing vector images. ( )西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————3. Data are unprocessed facts. ( )4. A typical e-mail message has three basic elements: header, message, and attachments. ( )5. A formula is an instruction to calculate or process. ( )6. The content of Flash RAM can be lost when the power of the computer is off. ( )7. Special programs called agents, spiders, or bots continually look for new information and update the search services’ databases. ( )8. You can share data by copying and pasting, or by using object linking and embedding. ( )9. A master slide is a special slide that does not appear in a presentation but controls all the format and placement of all slides in a presentation. ( )10. Productivity suites, also known as home suites, contain professional grade application programs. ( )11. Virtual reality modeling language is used to create real-time animated 3-D scenes. ( )12. Mac OS is not nearly as widely as the windows operating system. ( )13. A dumb terminal can process data independently. ( )14. Monitor output is described as hard copy. ( )15. Debugging is a programmer’s word for testing and then eliminating errors. ( )16. EBCDIC is the most widely used binary code for microcomputer. ( )17. A file that is 1600 KB will fit on a traditional floppy disk. ( )18. The best way to write good programs is to create unstructured programs. ( )19. A word is the number of bits that can be accessed at one time by the CPU. ( )20. Writing the program is called coding. ( )四、Translate the Following Key Terms into Chinese(10 Points)1. USB2. web-based application software3. Virtual reality4. Cache memory5. GUI6. Electronic commerce7. Drop-down menu8. DBMS9. Expert system10. C2C11. ISP12. URL13. OOP14. Object linking and embedding(OLE)15. Desktop publishing programs16. Dpi17. HDTV18. Network terminal19. Domain name20. system bus《计算机科学导论》课程试题【A】卷五、Complete the following conversions between different numbering systems.(6 Points)1.(10101001011)2=( )10=( )8= ( )162. (87.125)10=( )2 =( )8= ( )16六、Fill in the Blanks (5 Points)1. An information system has five parts: people, ,software, hardware, and data.2. Operating systems are programs that coordinate computer resources, provide an interface between user and the computer, and run .3. Web are virtual stores for B2C electronic commerce. .4. .are programs that provide access to Web resources.5. In a worksheet, a . is a series of continuous cells.七、Translate the Following Paragraph into Chinese(9 Points)(1)E- commerce (3 Points)Technology creates products that operate faster, are priced cheaper, are often of better quality, or are wholly new. Indeed, new products can be individually tailored to a particular customer’s needs. For example, financial services companies such as Merrill Lynch(美林)have taken advantage of technologyto launch cash management accounts. These accounts combine information on a person’s checking, savings, credit card, and securities accounts into a single monthly statement. It automatically sets aside “idle” funds into interest-bearing money market funds. Customers can access their accounts on the Web and get a complete picture of their financial condition at any time. However, even if they don’t pay much attention to their statements, their surplus funds are invested automatically.(2)Information flow(3 Points)In large and medium-sized organizations, computerized information systems don’t just keep track of transactions and day-to-day business operations. They also support the flow of information within the organization. This information flows both vertically and horizontally. In order to understand this, we needto understand how an organization is structured. One way to examine an organization’s structure is to viewit from a functional perspective. That is, you can study the different basic functional areas in organizations and the different types of people within these functional areas. . .(3)Network(3 Points)Connectivity is a concept related to using computer networks to link people and resources. For example, connectivity means that you can connect your microcomputer by telephone or other telecommunications links to other computers and information sources almost anywhere. With this connection, you are linked to the world of larger computers and the Internet. This includes minicomputers西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————and mainframes and their extensive information resources. Thus, becoming computer competent becomes a matter of knowing not only about connectivity through networks to microcomputers, but also about larger computer systems and their information resources.《计算机科学导论》课程试题【A】卷专业:_________________学号:____________________姓名:___________Answer Sheet (A)1 point per1. (11001011101)2=( )10=( )8=( )162. (127.625)10=( )2 =( )8=( )16六. Fill in the blank(5 Points)西南大学课程考核(试题【A】卷)——————————————密————————————封————————————线——————————————七. Translate the following paragraphs into Chinese(9 Points)《计算机科学导论》课程试题【A】卷西南大学课程考核(试题【A】卷) ——————————————密————————————封————————————线——————————————。