计算机科学导论(全英版)课后问答

合集下载

计算机科学与导论课后习题答案 第2章 计算机基础知识(答案)

计算机科学与导论课后习题答案  第2章 计算机基础知识(答案)
2.什么是定点数,它分为哪些种类?
答:所谓定点数,就是指计算机在运算过程中,数据中小数点的位置固定不变。其中小数点的位置是由计算机设计者在机器的结构中指定一个不变的位置,而不一定都必须具有小数点的指示装置。定点数一般有小数和整数两种表示形式。定点小数是把小数点固定在数据数值部分的左边,符号位的右边;定点整数则把小数点固定在数据数值部分的右:计算机获取声音信息的过程即是声音信号数字化的处理过程。经过数字化处理后的数字声音信息才能被计算机所识别和处理。声音被计算机处理的过程主要经过音频信号的采样、量化和编码几个过程。
4.简要叙述多媒体技术的含义。
答:多媒体技术是指利用计算机技术把文本、图形、图像、音频和视频等多种媒体信息综合一体化,使之建立逻辑连接,集成为一个具有交互性的系统,并能对多种媒体信息进行获取、压缩编码、编辑、加工处理、存储和展示。简言之,多媒体技术即为把文、音、图、像与计算机结合在一起的技术。多媒体技术是集计算机技术、文字处理技术、音频技术、视频技术、图像压缩技术、通信技术等多种技术的综合体。
三. 讨论题
1. 为什么计算机使用二进制,而不使用人们生活中的十进制来表示数据信息。
答案略。
2. 多媒体计算机给人们的生活带来了哪些好处?请举出几个例子。
答案略。

5.多媒体计算机的关键技术有哪些?
答:多媒体计算机技术是一门多学科的综合技术。多媒体涉及的技术范围很广,技术很新、研究内容很深,是多种学科的和多种技术交叉的领域。它涉及的关键技术有:多媒体指令集、多媒体数据的表示技术、大容量的存储技术、音频/视频处理技术、多媒体计算机显示技术、光盘与光盘驱动器技术及其它技术等。
第2章 计算机基础知识
习题(答案)
一. 选择题

计算机导论课后习题答案(00002)

计算机导论课后习题答案(00002)

计算机导论课后习题答案计算机科学导论第七章1应用程序和操作系统的不同点是什么?操作系统是一个程序,有利于应用程序的执行。

2操作系统的组成是什么?内存管理器,进程管理器,设备管理器,文件管理器。

3单道程序和多道程序之间有何区别?单道程序,只有一个程序在内存中。

多道程序,多个程序同时在内存中,但是计算机的资源只分配给正在运行的程序。

4分页调度和分区调度有什么区别?分区调度把内存分为若干个区,把程序整个的放入区中。

分页调度提高了分区调度的效率,在分页调度下,内存被分为大小相等的若干部分,程序也被分为大小相等的部分。

分区调度需要把程序装载到连续的内存上。

分页调度可以吧把程序装载到不连续的内存当中。

5为什么请求分页调度比常规页面调度具有更高的效率?在常规的分页调度中,整个程序必须同时在内存中,以便为程序执行。

但是在请求分页调度中,有部分页面的程序可以在内存中。

这意味着,在请求分页调度中,在给定的时间中,更多的程序可以使用计算机的资源。

6程序和作业之间有何联系?作业和进程之间有何联系?程序和进程之间有何联系?从一个程序被选中执行,到其运行结束并再次成为一个程序的这段过程中,该程序称为作业。

7程序驻留在哪里?作业驻留在哪里?进程驻留在哪里?程序和作业驻留在磁盘上,进程驻留在内存中。

8作业调度器和进程调度器有什么区别?作业调度器负责从作业中创建一个进程和终止一个进程。

进程调度器将一个进程从一个状态转入另一个状态。

9为什么操作系统需要队列?一个操作系统需要使用队列,因为在同一时间可以有许多作业和进程同时活跃。

为了共享所有的资源,队列是必要的,以确保作业和进程都得到他们需要的资源。

31一个计算机装有一个单道程序的操作系统。

如果内存容量为64MB,操作系统需要4MB的内存,那么该计算机执行一个程序可用的最大内存为多少?64-4=60MB33 70/(70+10)=87.5%34一个多道程序的操作系统用一个适当的分配计划把60MB内存分为10MB,12MB,18MB,20MB。

计算机导论--常见问题与回答

计算机导论--常见问题与回答

“计算机导论”常见问题与解答说明:在计算机导论的教学中,学生经常会问一些问题,课程组把比较常见的问题总结出来,并进行了简要的出回答,如下。

1、学习“计算机导论”的目的是什么?答:通过学习“计算机导论”课程,可以达到如下目的:了解计算机的发展简史,激发学习兴趣;掌握计算机的基本知识,建立专业知识体系框架;熟练掌握常用的计算机软件的使用,提高操作技能;了解计算机科学技术的最新发展,促进研究性学习;掌握计算机学科的思维方法,培养综合素质与创新能力。

这对于计算机专业学生四年的知识学习、能力提高、素质培养和日后的学术研究、技术开发、经营管理等工作具有十分重要的基础性和引导性作用。

由于“计算机导论”是学生进入大学后的第一门专业课程,该门课程不仅是让学生了解一些计算机专业的基本知识,还要对学生在学习方法、思维方式上进行引导,使学生尽快适应大学的学习方式,培养计算思维。

2、如何能够学好“计算机导论”?答:“计算机导论”课程的特点是:内容多、课时少、理论与实践并重,实际上后续的大多数专业课程也具有类似的特点。

需要学生做到四个认真:认真听讲、认真读书、认真思考、认真实践。

特别要注意认真读书和认真思考,这是大学生课后自主学习的主要方式,也是高中学习阶段比较欠缺的地方。

有些内容光靠听老师课堂上的讲授是不够的,必须要认真读书(甚至要多读几本书)、认真思考,才能真正理解所学内容,也才能真正变成自己的知识。

在高中阶段,所有的学习时间都由学校和老师安排,学生几乎没有自由支配的时间。

进入大学,自由支配的时间多了。

作为大学生,一定要充分利用自由时间,安排好自己的自主学习,要多看书、多思考、多实践。

3、“计算机导论”和后续专业课程有什么关系?答:从学知识角度看,“计算机导论”是后续主要专业课程内容的一个绪论,一个总体的概括性介绍。

其主要作用主要有两个:一是为后续专业课程的学习做一个知识上的铺垫,降低学习专业课程时的难度,使专业课程的学习效果更好。

《计算机科学导论》(第三版-)弗罗赞(翻译)

《计算机科学导论》(第三版-)弗罗赞(翻译)

Chapter 1 练习复习题1. 定义一个基于图灵模型的计算机。

答:Turing proposed that all kinds of computation could be performed by a special kind of a machine. He based the model on the actions that people perform when involved in computation. He abstracted these actions into a model for a computational machine that has really changed the world. 图灵模型假设各种各样的运算都能够通过一种特殊的机器来完成,图灵机的模型是基于各种运算过程的。

图灵模型把运算的过程从计算机器中分离开来,这确实改变了整个世界。

2. 定义一个基于冯•诺伊曼模型的计算机。

答:The von Neumann Model defines the components of a computer, which are memory, the arithmetic logic unit (ALU), the control unit and the input/output subsystems.冯•诺伊曼模型定义了计算机的组成,它包括存储器、算术逻辑单元、控制单元和输入/ 输出系统。

3. 在基于图灵模型的计算机中,程序的作用是什么?答:Based on the Turing model a program is a set of instruction that tells the computer what to do.基于图灵模型的计算机中程序是一系列的指令,这些指令告诉计算机怎样进行运算。

4. 在基于冯•诺伊曼模型的计算机中,程序的作用是什么?答:The von Neumann model states that the program must be stored in the memory. The memory of modern computers hosts both programs and their corresponding data. 冯•诺伊曼模型的计算机中,程序必须被保存在存储器中,存储程序模型的计算机包括了程序以及程序处理的数据。

《计算机科学导论》课后练习(翻译)

《计算机科学导论》课后练习(翻译)

《计算机科学导论》课后练习(翻译)Chapter 1 练习复习题1.定义⼀个基于图灵模型的计算机。

答:Turing proposed that all kinds of computation could be performed by a special kind of a machine. He based the model on the actions that people perform when involved in computation. He abstracted these actions into a model for a computational machine that has really changed the world.图灵模型假设各种各样的运算都能够通过⼀种特殊的机器来完成,图灵机的模型是基于各种运算过程的。

图灵模型把运算的过程从计算机器中分离开来,这确实改变了整个世界。

2.定义⼀个基于冯·诺伊曼模型的计算机。

答:The von Neumann Model defines the components of a computer, which are memory, the arithmetic logic unit (ALU), the control unit and the input/output subsystems.冯·诺伊曼模型定义了计算机的组成,它包括存储器、算术逻辑单元、控制单元和输⼊/输出系统。

3.在基于图灵模型的计算机中,程序的作⽤是什么?答:Based on the Turing model a program is a set of instruction that tells the computer what to do.基于图灵模型的计算机中程序是⼀系列的指令,这些指令告诉计算机怎样进⾏运算。

4.在基于冯·诺伊曼模型的计算机中,程序的作⽤是什么?答:The von Neumann model states that the program must be stored in the memory. The memory of modern computers hosts both programs and their corresponding data. 冯·诺伊曼模型的计算机中,程序必须被保存在存储器中,存储程序模型的计算机包括了程序以及程序处理的数据。

计算机科学导论课后习题答案-第四章

计算机科学导论课后习题答案-第四章

数据运算After reading this chapter, the reader should be able to:三类主要运算位的逻辑运算移位运算(逻辑移位和算术移位)补码形式数据的运算浮点格式数据的运算数据运算的类型●算术运算●移位运算●逻辑运算4.1LOGICALOPERATIONS逻辑运算非与或异或一元和二元运算位层次上的逻辑运算模式层次上的逻辑运算N位N位Example请给出10011000的非运算结果。

SolutionTarget 1 0 0 1 1 0 0 0NOT------------------Result 0 1 1 0 0 1 1 1AND operator与运算Example请给出10011000和00110101与运算的结果。

SolutionTarget 1 0 0 1 1 0 0 0AND0 0 1 1 0 1 0 1------------------Result 0 0 0 1 0 0 0 0OR operator或运算Example请给出10011000 和00110101的或运算结果。

SolutionTarget 1 0 0 1 1 0 0 0OR0 0 1 1 0 1 0 1------------------Result 1 0 1 1 1 1 0 1XOR operator异或运算符Example请给出10011000 和00110101的异或运算结果SolutionTarget 1 0 0 1 1 0 0 0XOR0 0 1 1 0 1 0 1------------------Result 1 0 1 0 1 1 0 1应用:修改位模式(1/2)(1)求反:用NOT运算,例如原码、补码、反码之间的互相转换时;(2)使指定的位复位(置0):用AND运算,例如与设定的数据(掩码)做与运算,可以使另一个数据的指定位复位,其它位保持不变;(3)给指定位置位(置1):用OR运算,例如与掩码做或运算,可以使另一个数据的指定位置1,其它位保持不变;应用:修改位模式(2/2)(4)使指定的位反转(变为相反的值):用XOR运算,例如与掩码做异或运算,可以使另一个数据的指定位求反,其它位保持不变;利用掩码复位的示例Example设想一个电厂使用8台水泵给一城市供水。

计算机导论双语试题及答案

计算机导论双语试题及答案

计算机导论双语试题及答案(题目)(正文)Part I(选择题)请在每道题后方括号内写出你认为正确的选项。

1. 计算机科学的定义是什么?A. 研究计算机硬件的科学。

B. 研究计算机软件的科学。

C. 研究计算机及其应用的科学。

[C]2. 计算机硬件主要包括以下哪些组成部分?A. CPU和内存。

B. 操作系统和应用软件。

C. 输入设备和输出设备。

[C]3. 下列哪个是计算机二进制系统中使用的数字?A. 十进制。

B. 二进制。

[B]C. 八进制。

4. 哪种编程语言是计算机与人类交互的桥梁?A. 机器语言。

B. 汇编语言。

C. 高级语言。

[C]5. 下列哪种计算机网络覆盖范围最广?A. 局域网。

B. 城域网。

C. 互联网。

[C]Part II(问答题)请用英文回答以下问题。

1. What is the difference between hardware and software?Hardware refers to the physical components of a computer system, such as the CPU and memory, while software refers to the programs and data used by the computer.2. What is the binary system in computing?The binary system is a number system that uses only two digits, 0 and 1, to represent all numeric values and data in a computer.3. What is the role of an operating system in a computer?The operating system acts as an intermediary between the user and the computer hardware, managing the resources and providing a user-friendly interface for interacting with the computer.4. What is the significance of computer networks?Computer networks allow computers to communicate and share resources, enabling the exchange of information and facilitating collaboration on a global scale.5. What is programming language?A programming language is a set of instructions and rules used to write computer programs, allowing humans to communicate their instructions to the computer.Part III(编程题)请用您熟悉的编程语言完成以下任务。

《计算机科学导论》第五章课后作业解答(个人版)

《计算机科学导论》第五章课后作业解答(个人版)

《计算机科学导论》第五章课后作业解答(个⼈版)1.计算机由哪三个⼦系统组成?CPU、主存和输⼊/输出⼦系统。

2.CPU由哪⼏个部分组成?算术逻辑单元(ALU),控制单元和⼀系列寄存器。

3.ALU的功能是什么?算术逻辑单元负责算术、移位和逻辑运算。

4.控制单元的功能是什么?控制单元控制各个⼦系统的操作。

5.主存的功能是什么?存储数据和程序指令。

6.定义RAM、ROM、SRAM、DRAM、PROM、EPROM和EEPROM。

存储器的类型主要有两种:RAM和ROM。

RAM:随机存取存储器是计算机中主存的主要部分。

可以使⽤存储单元地址来随机存取⼀个数据项,⽽不需要存取位于它前⾯的所有数据项。

⽤户可对其读写,且具有易失性。

ROM:和RAM⼀样,可能随机存取。

该存储器的内容是由制造商写进去的。

⽤户只能读不能写,具有⾮易失性。

SRAM:静态RAM通过使⽤传统的触发器门电路来保存数据,存取速度⾼,但价格昂贵。

DRAM:动态RAM通过使⽤电容器来保存数据,存取速度稍慢,但价格便宜。

PROM:可编程只读存储器在计算机发货时是空⽩的,⽤户可借⽤⼀些特殊的设备将程序存储在上⾯,之后就⽆法再次重写了。

EPROM:可擦除的可编程只读存储器,⽤户需要⽤⼀种可以发出紫外光的特殊仪器对其重写,在重写之前还得拆下来再重新安装。

EEPROM:电可擦除的可编程只读存储器,重写时⽤电⼦脉冲即可,⽆需从计算机上下来。

7.⾼速缓冲存储器的作⽤是什么?提⾼CPU存取内存中数据的速度。

8.描述⼀下磁盘的物理组成?磁盘由⼀张张磁⽚叠加⽽成。

这些磁⽚由薄磁膜封装起来。

信息通过盘上每⼀个磁⽚的读/写磁头读写磁介质表⾯来进⾏读取和存储。

9.磁盘和磁带表⾯是怎样组织的?磁盘的盘⾯被划分成磁道,每个磁道⼜分成若⼲个扇区,磁道间通过磁道内部间隔隔开,扇区之间通过扇区内部间隔隔开。

磁带在宽度上可分为9个磁道,磁道上的每个点可分别存储1位的信息,同时垂直切⾯的9个点可以存储8位的信息,另外的1位⽤于错误检测。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

CHAPTER11.Explain the five parts of an information system .What part do people play inthis system?An information system has five parts: people, procedures, software, hardware and data.People: Are end users who use computer to make themselves more productive.Procedures: Specify rules or guidelines for computer operations.Software: Provides step-by-step instructions for computer hardware.Hardware: Processes the data to create information.Data: Consist of unprocessed facts including text, numbers, image and sounds.People are the most important part of any information system.2.What is system software? What kinds of programs are included in systemsoftware?System software helps the computer manage its own internal resources. It includes three kinds of programs: operating systems, utilities and device drivers programs.3.Define and compare basic and specialized application software. Describe somedifferent types of basic application software. Describe some types of specialized applications.Basic applications are the kinds of programs to be considered computer competent.Specialized applications are more narrowly focused on specific disciplines and occupations.Basic applications have some types, such as browser, word processor, spreadsheet ,and so on.Also specialized applications have many types, some of the best known are graphics, audio and video, multimedia, Web authoring ,and artificial intelligence programs.4.Describe the different types of computer. What is the most common type? Whatare the types of microcomputers?There are four types of computers: supercomputers, mainframe computers, minicomputers, and microcomputers.Supercomputers are the most powerful type of computer.Mainframe computers occupy specially wired, air-conditioned rooms, they are capable of great processing speeds and data storage.Minicomputers are refrigerator sized machines.Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of computer.Microcomputers are the most common type of computers.There are four types of microcomputers: Desktop computers, Notebook computers, Handheld computers and PDA.5.What is connectivity? How are the wireless revolution and connectivityrelated? What is a computer network? What is the Internet? What is the Web?Connectivity is the capability of you microcomputer to share the information with other computers.Wireless revolution dramatically affect connectivity.A computer network is a communications system connecting two or more computers.Internet is the largest network in the world.The Web provides a multimedia interface to the numerous resources available on the Internet.CHAPTER21.Discuss the uses of the Internet. Which activities have you participated in?Which one do you think is the most popular?The most common uses of the Internet are the following: communicating, shopping, searching, entertainment, education, and so on. I have participated in almost all of them. I think communicating is the most popular.2.Explain the differences between the two most common types of providers.The two most common types of providers are National and wireless.National service providers provide access through standard telephone connections.Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.3.What are the basic elements of an message?A typical message has three basic elements: header, message and signature.4.What is social networking ? Describe the three types if social networkingsites.Social networking is the grouping of individuals into specific groups. Thereare three basic categories of social networking sites: reuniting, friend-of-a-friend and common interestReuniting sites are designed to connect people who have known one another but have lost touch.Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.Common interest sites bring together individuals that share common interests or hobbies.5.Describe the different types of search engines. Given an example of the typeof search each engine is best for.There are three types of search engines: crawler-based search engines, metasearch engines and specialized search enginesCrawler-based search engines, such as Google, create their listings automatically.Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates, orders the hits, and then provides the edited list to you .one of the best known is Dogpile.Specialized search engines focus on subject-specific Web sites. such as Environment.CHAPTER31.Explain the difference between general-purpose and special-purposeapplications.General-purpose application are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems and presentation graphics.Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.2.Discuss the common features of most software programs. Describe the newinterface to what-if analysis?Most applications use a GUI, use windows to display information, and have menus to present commands.3.What is the difference between a function and a formula? How is a formularelated to what-if analysis?A formula is an instruction to calculate or process. Functions are prewrittenformulas. A formula related to what-if analysis is called recalculation.4.What are presentation graphics programs? How are they used?Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentation. People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional.5.What is the difference between an integrated package and a software suite?What are the advantages and disadvantages od each?An integrated package is a single program that provides the functionality ofa word processor, spreadsheet, database manager, and more. The primarydisadvantage of an integrated package is that the capabilities of each function are not as extensive as in the individual programs. The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundledtogether and sold as a group. It is significantly less expensive to buy a suite of applications than to buy each application separatelyCHAPTER41.Describe graphics , including desktop publishers, image editors, illustrationprograms, image galleries, and graphics suites.Graphics are widely used to analyze data and to create professional-looking presentations; Desktop publishers focus on page design and layout and provide greater flexibility; Image editors are programs for creating and editing bitmap images; Illustration programs are used to create and to edit vector images; Image galleries are libraries of electronic images. These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;Graphics suites are some companies combining their separate graphics programs in groups.2.Discuss audio and video editing software.Audio editing software allows you to create and edit audio clips, most software allow you to add audio effects to your tracks. Video editingsoftware allows you to reorganize, add effects, and more to your digital video footage.3.What is multimedia? How are multimedia presentations developed?Multimedia is the integration of all sorts of media into one presentation.The creation of interactive multimedia presentations follows several steps: Plan, Design, Create and Support.4.Describe Web authoring , including Web site design and Web authoring programs.Creating a site is called Web authoring. A web site design is an interactive multimedia form of communication, designing a web site begins with determining the site’s overall content, the overall site design is commonly represented in a graphical map. More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.5.Discuss three areas of artificial intelligence.The three areas of artificial intelligence are virtual reality, knowledge-based systems and robotics. Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer. Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users. Robotics is the field of study concerned with developing and using robots.CHAPTER51.Describe system software. What are the four types of system programs?System software works with end users, application software, and computer hardware to handle the majority of technical details. It consists of four types of programs: operating systems, utilities, device drivers and language translators.2.What are the basic functions of every operating system? What are the threebasic operating system categories?The basic functions of every operating system are : managing computer resources, providing a user interface, and running applications. The three basic operating system categories are: embedded, network and stand-alone.3.Explain the differences and similarities between Windows, Mac OS, and Linux.Windows is by far the most popular microcomputer operating system today. It comes in a variety of different versions and is designed to run with Intel and Intel-compatible microprocessors. Mac OS is not nearly as widely used as the Windows operating system. It is a powerful, easy-to-use operating system that is popular with professional graphic designs, desktop publishers, and many home users. While Windows, the Mac OS are proprietary operating systems, Linux is not. It is open source software free and available from many sources, including the Web.4.Discuss utilities. What are the five most essential utilities? What is autilities suite?Utilities are specialized programs designed to make computing easier. The five most essential utilities are: troubleshooting or diagnostic programs, antivirus programs, uninstall programs, backup programs and file compression programs. Utility suites combine several programs into one package.5.Explain the role of device drivers. Discuss the Add Printer Wizard andWindows Update.A device driver works with the operating system to allow communication betweenthe device and the rest of the computer system. Each time the computer system is started, the operating system loads all of the device drivers into memory.Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used.Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver. Windows uses Windows Update to make reinstalling or updating device drivers easily.CHAPTER61.Describe the four basic types of system units.There are four basic types of system units: Desktop system units, Notebook system units, Tablet PC system units, and Handheld computer system units.Desktop system units typically contain the system’s electronic components and selected secondary storage devices.Notebook system units are portable and much smaller. They contain the electronic components, selected secondary storage devices, and input device.Tablet PC system units are highly portable devices that support the use of a stylus or pen to input commands and data.Handheld computer system units are the smallest and are designed to fit into the palm of one hand.2.Describe the two basic components of the CPU.The two basic components are: the control unit and the arithmetic-logic unit.Control unit tells the rest of the computer system how to carry out a program’s instructions.Arithmetic-logic unit performs two types of operations---arithmetic and logical.3.What are the differences and similarities between the three types of memory?There are three types of memory chips: RAM, ROM, and CMOS.RAM chips hold the program and data that the CPU is presently processing, everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.CMOS chip provides flexibility and expandability for a computer system. It contains essential information that is required every time the computer system is turned on. It is powered by a battery and does not lose its contents when the power is turned. Its contents can be changed to reflect changes in the computer system.4.Identify five expansion cards and describe the function of each.Five expansion cards are: graphics cards, sound cards, modem cards, NIC and TV tuner cards.Graphics cards connect the system board to the computer’s monitor, they convert the internal electronic signals to video signals so they can be displayed on the monitor.Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer. They also convert internal electronic signals to audio signals.Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.NIC are used to connect a computer to one or more other computers.TV tuner cards can changes the TV signal into one that can be displayed on you monitor.5.Identify and describe four standard ports and two specialized ports.Four standard ports are: serial ports, parallel ports, universal serial bus ports and FireWire ports.Serial ports are often used to connect a mouse, keyboard, modem, and many other devices to the system unit.Parallel ports are used to connect external devices that need to send or receive a lot of data over a short distance.USB ports are gradually replacing serial and parallel ports.FireWire ports provide connections to specialized FireWire devices.CHAPTER71.Define input and output devices.Input is any data or instructions that are used by a computer. Input devices are hardware used to translate what people understand into a form that computers can process.2.Describe the three categories of output devices.①There are a widely of different pointing devices including the mouse,joystick, touch screen, light pen, and stylus.A mouse controls a pointer that is displayed on the monitor.A joystick is the most popular input device for computer games. You controlgame actions by varying the pressure, speed, and direction of the joystick.A touch screen is a particular kind of monitor with a clear plastic outerlayer.A light pen is a light-sensitive pen-like device.A stylus acts with the computer through handwriting recognition software.②There are three types of scanning devices: optical scanners, card readers,bar code readers, and character and mark recognition devices.An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.Card readers interpret encoded information.Bar code readers are either handheld wand readers or platform scanners.Character and mark recognition devices are scanners that are able to recognize special characters and marks.③Image capturing devices include digital cameras and digital video cameras.Digital cameras capture still images. Digital video cameras capture motion.④Audio input can take many forms including the human voice and music.Voice recognition systems accept voice commands to control computer operations and to create document.MIDI is a standard for connecting musical instruments to the system unit.3.Describe the three categories if output devices.The most widely used output devices are monitors, printers and audio output.Monitors present visual images of text and graphics.Printers translate information that has been processed by the system unit and present the information on paper.Audio output devices translate audio information from the computer into sounds that people can understand.4. Define output an output devices.Output is processed data or information. Output devices are hardware used to translate information that has been processed by the system unit into a form that humans can understands.5. What are combination input and output devices? Describe four such devices.Devices combine features of input devices such as scanners with features of output devices like printers are called combination input and output devices.Combination devices include fax machines, multifunction devices, Internet telephones, and terminals.A fax machine is a standard tool in nearly every office.Multifunction devices combine the capabilities of a scanner, printer, fax, and copying machine.Internet telephones are specialized input and output devices for receiving and sending voice communication.Terminals are input and output device that connect you to a mainframe or other type of computer.CHAPTER81.Discuss the traditional and high-capacity floppy disksThe traditional floppy disk is the 1.44MB 3-inch disk. They have a thin exterior jacket made of hard plastic to protect the flexible disk inside.The high capacity floppy disks are 3 inches in diameter. They are able to store more information, are thicker, and require special disk drives.2.What are the three types of hard disks? Describe three ways to improve harddisk performance.There are three types of hard disks: Internal hard disk, hard-disk cartridge, and hard-disk pack.Three ways to improve the performance of hard disks are disk caching, redundant arrays of inexpensive disks, and file compression/decompression.Disk caching improves hard-disk performance by anticipating data needs.Redundant arrays of inexpensive disks improve performance by expending external storage, improving access speed, and providing reliable storage.File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.3.What are the two most common optical disc formats? What is hi def ? Describethe basic types for each format.The two most common optical disc formats are CD and DVD. Hi def is the next generation of optical discs.①There are four basic types of CDs: read only, write once, rewritable, andPicture and Photo CDs.Read only CDs cannot be written on or erased by the users, they are used to distribute large databases, references, and large software application packages.Write once CDs can be written to once, they are used to archive data and to record music download from the Internet.Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.②There are three types of DVDs: read only, write once, and rewriteable.Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.Rewriteable DVDs are competing rewriteable formats.4.Discuss solid-state storage, Internet hard drives, and magnetic tape. Whatare the advantages and disadvantages of each?Solid-state storage does not have moving parts. Internet drives use the Internet to store data and information. Magnetic tape provides sequential access for backup.Solid-state storage is more expensive than the others, it is more reliable and requires less power.Internet drives are low cost and the flexibility to access information from any location using the Internet. Access speed is slower.Magnetic tapes provide slower sequential access. It is an effective and commonly used tool for backing up data.5. Discuss mass storage, enterprise storage system, and mass storage devices.Mass storage refers to the storage of large amounts of data in a persisting and machine-readable fashion. Enterprise storage systems are the computer storage systems designed for large-scale, high-technology environments of the modern enterprises.Mass storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tape drives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory.CHAPTER91.Define and discuss connectivity, the wireless revolution, and communications.①Connectivity is a concept related to using computer networks to link peopleand resources.②The single most dramatic change in connectivity and communications in thepast five years has been the widespread use of mobile or wireless telephones.This wireless technology allows individuals to stay connected with one another from almost anywhere at any time, the revolution is just beginning.③Communication systems transmit data from one location to another. Everycommunication system has four basic elements: sending and receiving devices, communication channel, connection devices, and data transmission specifications.2.Identify and describe the various physical and wireless communications.①Physical connections use a solid medium to connect sending and receivingdevices.These connections include telephone lines, coaxial cable, and fiber-optic cables.Telephone lines consist of twisted pair cable, they have been the standard transmission medium for years for both voice and data.Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core.Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.②Wireless connections use the air to connect sending and receiving devices.Primary technologies used for wireless connections are infrared, broadcast radio, microwave, and satellite.Infrared uses infrared light waves to communicate over short distances.Broadcast radio communication uses special sending and receiving towers called transceivers.Microwave communication uses high-frequency radio waves.Satellite communication uses satellites orbiting about 22000 miles above the earth as microwave relay stations.3.Identify the standard Internet protocol and discuss its essential features.The standard protocol for the Internet is TCP/IP. The essential features of this protocol involve: identifying sending and receiving devices and reformatting information for transmission across the Internet.Identification: Every computer on the Internet has a unique number address called an IP address, the Internet uses IP addresses to deliver and to locate Web sites.Reformatting: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the massage is sent, it is reformatted or broken down into small parts called packets, at the receiving end, the packets are reassembled into the correct order.4.Define and discuss the four principal network topologies.The four principal network topologies are star, bus, ring, and hierarchical.In a star network, a number of small computers or peripheral devices are linked to a central unit, all communications pass through this central unit.In a bus network, each device in the network handles its own communication control.In a ring network, each device is connected to two other devices, forming a ring.The hierarchical network consists of several computers linked to a central host computer, other computers are also hosts to other, smaller computers or to peripheral devices.5.Define and discuss the three most common network strategies.The most common network strategies are terminal, client/server, and peer-to-peer systems.①In a terminal network system, processing power is centralized in one largecomputer. For the end user it is lack of control and flexibility.②Client/server network system use one computer to coordinate and supplyservices to other nodes on the network. One advantage of the client/sever network strategy is the ability to handle very large networks efficiently.Another advantage is the ability of powerful network management software to monitor and control network activities. The major disadvantages are the cost of installation and maintenance.③In a peer-to-peer network system, nodes have equal authority and can actas both clients and servers. The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.CHAPTER101.Discuss the impact of large database , private networks, the Internet, andthe Web on privacy.Large databases raise some serious concerns on privacy: identity theft and mistaken identity.The impact of private networks on privacy has the two parts: The first instance, of firms eavesdropping on employees, has inspired attempts at federal legislation. The second instance, in which online information services screen and reject messages, is a common activity with most commercial services.The internet brings illusion of anonymity, the web creates a history file, your web activity is monitored is by cookies. To respond to these privacy concerns, a code of fair information practice has been established.2.Discuss the carious kinds of computer criminals.Computer criminals are of five types:Employees: The largest category of computer criminals consists of those with the easiest access to computers-namely, employees.Outside users: Some suppliers or clients may have access to a company’s computer system.Hackers and crackers: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes.Organized crime: Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do, but for illegal purpose.Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.3. What are the principal measures used to protect computer security? What isencryption? How is it used by corporations and individuals?Some of the principal measures to protect computer security are encryption, restricting access, anticipating disasters, and backing up data.Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals are alsousing encryption programs to safeguard their private communications.4.What is ergonomics? How does computer use impact mental health? Physicalhealth?Ergonomics is defined as the study of human factors related to things people use.The physical health matters related to computers that have received the most attention recently are the following: eyestrain and headache, back and neck pain, and repetitive strain injury. Computer technology creates some irritants that may be counter productive: noise, and electronic monitoring.5.Describe the basic elements of the Green PC and what you can do to protectthe environment.The basic elements of the Green PC are: System unit, display, and manufacturing.As a computer user, you can do to help protect the environment are the following:conserve, recycle, and educate.。

相关文档
最新文档