英文计算机导论试题
计算机英语考试题目及答案

计算机英语考试题目及答案一、选择题1. What does HTML stand for?a) Hyper Text Markup Languageb) High Technology Multimedia Languagec) Home Tool Management Languaged) Human Token Marker Language答案:a) Hyper Text Markup Language2. Which of the following is not a programming language?a) Javab) Pythonc) HTMLd) C++答案:c) HTML3. What is the purpose of CSS?a) To add interactivity to web pagesb) To structure the content of web pagesc) To define the layout and style of web pagesd) To create dynamic web pages答案:c) To define the layout and style of web pages4. What is the function of a router in a computer network?a) To connect computers to the internetb) To store and manage data on a networkc) To protect the network from security threatsd) To direct network traffic between devices答案:d) To direct network traffic between devices5. Which of the following is a commonly used database management system?a) Microsoft Wordb) Adobe Photoshopc) MySQLd) Windows Media Player答案:c) MySQL二、填空题1. The process of converting source code into machine code is called ________.答案:compilation2. The most widely used programming language for web development is ________.答案:JavaScript3. TCP/IP stands for ________.答案:Transmission Control Protocol/Internet Protocol4. The physical components of a computer are referred to as ________.答案:hardware5. SQL stands for ________.答案:Structured Query Language三、简答题1. What are the advantages of using cloud computing?答案:Cloud computing offers several advantages, including:- Cost savings: Companies can reduce their infrastructure costs by using cloud services instead of maintaining their own hardware.- Scalability: Cloud services can easily scale up or down based on demand, allowing businesses to only pay for what they need.- Flexibility: Users can access cloud services from anywhere with an internet connection, enabling remote work and collaboration.- Disaster recovery: Cloud providers often have backup systems in place, ensuring data can be recovered in case of a disaster.- Automatic updates: Cloud services are typically updated regularly by the provider, ensuring users have access to the latest features and security patches.2. Explain the difference between HTTP and HTTPS.答案:HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is not secure, meaning that the data being transmitted can be intercepted and read by anyone. HTTPS (Hypertext Transfer Protocol Secure), on the other hand, is a secure version of HTTP. It uses encryption to ensure that data is encrypted before transmission, making it much more difficult for hackers to intercept and read. HTTPS is commonly used for secure online transactions, such as submitting credit card information or personal details.四、编程题请编写一个Python程序,实现计算圆的面积和周长的功能。
英文版计算机试题及答案

英文版计算机试题及答案Section 1: Multiple Choice Questions (MCQs)1. Which of the following is NOT a programming language?a) Javab) HTMLc) Pythond) SQLAnswer: b) HTML2. What does CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Program UnitAnswer: a) Central Processing Unit3. Which of the following is NOT an input device?a) Keyboardb) Mousec) Printerd) ScannerAnswer: c) Printer4. What does RAM stand for?a) Read-Only Memoryb) Random Access Memoryc) Recordable Audio Mediad) Runtime Activity MonitorAnswer: b) Random Access Memory5. Which of the following is NOT a type of computer network?a) LAN (Local Area Network)b) WAN (Wide Area Network)c) MAN (Metropolitan Area Network)d) CAN (Campus Area Network)Answer: d) CAN (Campus Area Network)Section 2: Short Answer Questions1. Define the term "algorithm."Answer: An algorithm is a step-by-step procedure or set of rules for solving a specific problem or completing a specific task.2. What is object-oriented programming (OOP)?Answer: Object-oriented programming is a programming paradigm that organizes code into objects, which are instances of classes. It emphasizes the concept of objects and their interactions to solve complex problems.3. Explain the difference between static and dynamic memory allocation.Answer: Static memory allocation is performed at compile-time, where memory is allocated for variables and objects before the program execution starts. Dynamic memory allocation, on the other hand, is performed at runtime using functions like malloc() or new(). It allows for the allocation and deallocation of memory during program execution.4. What is the purpose of an operating system?Answer: The operating system is responsible for managing computer hardware and software resources, providing an interface between the user and the computer, and ensuring that various programs and applications can run smoothly. It also provides file management, process management, and memory management.5. Name three programming paradigms.Answer: Three programming paradigms are procedural programming, object-oriented programming, and functional programming.Section 3: Coding Questions1. Write a Java program to find the factorial of a given number.```javaimport java.util.Scanner;public class Factorial {public static void main(String[] args) {Scanner input = new Scanner(System.in);System.out.print("Enter a number: ");int number = input.nextInt();int factorial = 1;for (int i = 1; i <= number; i++) {factorial *= i;}System.out.println("The factorial of " + number + " is " + factorial); }}```2. Write a Python program to check if a number is prime or not.```pythondef is_prime(number):if number < 2:return Falsefor i in range(2, int(number/2)+1):if number % i == 0:return Falsereturn Truenumber = int(input("Enter a number: "))if is_prime(number):print(number, "is prime.")else:print(number, "is not prime.")```3. Write a C program to reverse a given string. ```c#include <stdio.h>#include <string.h>void reverse_string(char* str) {int length = strlen(str);for (int i = 0; i < length/2; i++) {char temp = str[i];str[i] = str[length - i - 1];str[length - i - 1] = temp;}}int main() {char str[100];printf("Enter a string: ");gets(str);reverse_string(str);printf("Reversed string: %s", str);return 0;}```Note: The code provided above is just examples for the coding questions. Please ensure to compile and test the programs before using them in production.Conclusion:In this article, we discussed multiple-choice questions, short answer questions, and coding questions related to computer science and programming. These questions cover various aspects of computer knowledge and can be used for self-assessment or preparation for exams or interviews.。
计算机导论二版课后标准答案(含简称集锦)

计算机导论期末复习试题【英文简称】1.PC:个人计算机Personal Computer2.CPU:中央处理器Central Processing Unit3.RAM:随机存储器Random Access Memory4.LAN:网卡(网卡正式用语应为Network Card)5.MODEM:数据卡或调制解调器Modem6.HUB:集线器7.SWITCH:交换机8.USB:通用串行总线Universal Serial Bus9.IDE:电子集成驱动器Integrated Drive Electronics10.SATA:串行高级技术附件Serial Advanced Technology Attachment 11.SCSI:指SCSI接口规格Small Computer System12.AGP:PC图形系统接口Accelerated Graphics Port13.PCI:外围装置连接端口Peripheral Component Interconnect14.BIOS:基本输入/输出系统Basic Input Output System15.CMOS:互补金属氧化物半导体Complementary Metal Oxide Semiconductor 16.OS:操作系统Operating System17.DOS:磁盘操作系统Disk Operating System18.bit:位(0与1这两种电路状态),计算机数据最基本的单位19.Byte:字节20.RISC :精简指令集系统;21.ALU:算术逻辑单元;22.URL:统一资源定位器23.DBMS:数据库管理系统;24.HTML:超文本标记语言;25.SQL:结构化查询语言;26.MPU:微处理器;27.FTP:文件传输协议28.MIS:管理信息系统;29.TCP:传输控制协议30.CAD:计算机辅助设计31.SMTP :简单邮件传输协议32.DBMS:数据库管理系统33.TCP/IP:传输控制协议/网际协议34.URL:统一资源定位器35.CAM:计算机辅助制造36.POP3:邮局协议37.Intranet :企业内部网38.CPU:中央处理单元39.HTTP:超文本传输协议40.RAM:随机存储器41.DOS:磁盘操作系统42.ASCII :美国信息交换标准码43.DBMS:数据库管理系统44.TCP/IP:传输控制协议/网际协议45.URL:统一资源定位器46.CAI:计算机辅助教学47.Internet :国际互联网48.ROM:只读存储器49.FTP:文件传输协议50.DBS:数据库系统51.LAN:局域网52.MAN:城域网53.WAN:广域网54.DDR:双通道动态随机存储器Double Data Rate55.CIMS:计算机集成制造系统Computer-Integrated Manufacturing System 56.ERP:企业资源计划57.DNS:域名服务器Domain Name System58.GUI:图形用户界面Graphics User Interface59.PnP:即插即用Plug and Play60.RAID:廉价冗余磁盘阵列Redundant Arrays of Inexpensive Disks 61.WWW:万维网World Wide Web62.XML:可扩充标记语言eXtensible Markup Language63.MIP:每秒百万条指令Million Instructions Per Second64.CAE:计算机辅助工程Computer Aided Engineering65.CASE:计算机辅助软件工程Computer Aided Software Engineering 66.DHTML:动态HTML ,Dynamic HTML67.DIY:自己动手作Do It Yourself68.DRAM:动态随机存取存储器Dynamic Random Access Memory。
计算机导论单选题

hardStudent: ___________________________________________________________________________29. Mark works in the marketing division of a company that manufactures microprocessors for computers. The head of his division has asked him to send him an e-mail with predictions for the following year company sales. What type of software is he most likely to use?A. DatabaseB. WorksheetC. PresentationD. Document30. Which program, among the following, allows a user to eliminate unwanted file fragments and maximize on optimizing computer operations?A. System softwareB. Operating systemC. Application softwareD. Utilities31. Which among the following can be classified as being both Internet services and browser-related programs?A. Consumer-to-consumer e-commerceB. Domain namesC. Search enginesD. Web utilities32. The extensions .gov, .edu, .mil, and, .net are calledA. top-level domains.B. e-mail targets.C. domain extensions.D. mail to addresses.33. Wendy is looking for some information on the Internet. She types on the browser. Once the browser is connected, a document file is sent back to Wendy's computer. What does this document contain?A. Location or address of the resourcesB. Domain codeC. Hypertext Markup LanguageD. Web page34. John Kerry would like to get in touch with his ex-girlfriend's friend and ask her out on a date. He knows that they both keep in touch via the Internet. Which is the most suitable option for John?A. To join B. To join C. To join D. To join 35. Which of the following search types would be best suited for finding out who was touring drummer for Marty Robbins in 1965?A. Directory searchB. Keyword searchC. In-site searchD. Reference search36. Creating a bar graph using data selected from a spread sheet is an example of a(n)A. analytical graph.B. graphics software.C. pie chart.D. spreadsheet.37. While working on a document the verbal command "copy" is given and the selected text gets copied. This means that the application supportsA. input keys.B. internal inputs.C. speech recognition.D. commands.38. OLE stands forA. Online Link Embedding.B. Object Link Export.C. Object Linking and Embedding.D. Online Link Emulation.39. When additional information requested appears in the form of visual presentations of what the final result would be, then this list is referred to asA. buttons.B. galleries.C. ribbons.D. contextual tabs.40. Although basic application software programs may include multimedia features, the user interaction in them is very limited becauseA. they are accessed in a linear fashion.B. users don't know about them.C. they are not compatible with the program.D. they cannot be accessed by the users directly.41. One difference between desktop publishing and word processing isA. that desktop publishing allows you to create documents that have professional quality layout and type styles.B. that the first uses graphics, while the second uses text.C. that word processing allows the user to add graphics to a document, while desktop publishing doesn't.D. that word processors work at the command line, while desktop processors work with graphics.42. Vector images areA. composed of pixels.B. composed of thousands of dots.C. slightly more difficult to manipulate than other images.D. composed of objects such as lines, rectangles, and ovals.43. Morphing is aA. way of linking related information.B. way of editing audio.C. sound effect.D. visual effect.44. Ralph travels extensively, and uses a PDA to access his official e-mails when he is not at the office. He also has a desktop at his workplace, which downloads a copy of these e-mails for his records. Identify the categories of operating systems in this example.A. Network and embeddedB. Embedded and stand-aloneC. Stand-alone and networkD. Network, embedded, and stand-alone45. This open source software is free and available from many sources.A. WindowsB. MacintoshC. LinuxD. NetWare46. The next version of Mac OS, which is scheduled to be introduced in late 2006, and allows appropriately equipped Apple computers to use both Mac OS and Windows XP is called:A. TigerB. SpotlightC. DashboardD. Leopard47. Goback Personal Edition is a part ofA. McAfee Office.B. Norton SystemWorks.C. V Communications SystemSuite.D. Visual Studio.48. Which of the following is helpful in enhancing graphics performance, 3-D animations and transferring video data?A. AGPB. ISAC. Graphic coprocessorsD. FireWire buses49. When you reboot your system, the computer takes instructions to start from theA. DRAM.B. SDRAM.C. DDR.D. ROM.50. Precisely timed electrical beats or impulses that indicate the speed of processing or power of a computer system are calledA. the clock speed.B. the beat.C. the pulse.D. the system speed.51. All of the following are commonly used units of measurement to describe memory capacity, except:A. Megabyte (MB).B. Gigabyte (GB).C. Terabyte (TB).D. Nanobyte (NB).52. An automatic identification system used to track objects, people or animals is called a(n)A. image processor.B. smart card.C. RFID tag.D. NIC.53. On the motherboard, the connection points for chips are referred to asA. slots.B. sockets.C. ports.D. lines.54. In case there is a space constraint, the best type of monitor to be used is a:A. flat-panel monitor.B. CRT monitor.C. projector monitor.D. e-book monitor.55. Two categories of laser printers areA. thermal, and personal.B. personal, and shared.C. ink-jet, and high-definition.D. active-matrix, and passive matrix.56. OMR, OCR, and MICR are all types ofA. Radio Frequency Card Readers (RFID).B. magnetic card readers.C. bar code readers.D. character and mark recognition devices.57. Which of the following types of character recognition systems is used for standardized testing like the Graduate Record Examination (GREs)?A. UPCB. MICRC. OMRD. OCR58. What kind of a specialized device or monitor technology is especially useful for graphic artists?A. Flat-panel monitorB. CRT monitorC. High-definition television (HDTV)D. e-books59. DVD-RAMA. is a new type of primary memory.B. is a type of WORM.C. is rewriteable.D. can only store up to 100 MB of data.60. Which of the following statements on hard-disk packs is incorrect?A. Their capacity far exceeds the other types of hard disks.B. They have multiple recording platters aligned one above the other.C. All the access arms of the hard-disk pack move in and out together.D. Both the read/write heads are activated at a given moment.61. These discs have a capacity of 25 to 50 gigabytes.A. HD DVDB. CDC. DVDD. Blu-Ray62. Optical discsA. can hold over 100 gigabytes of data.B. use magnetic charges to represent 1s and 0s.C. typically use a single track that spirals toward the center of the disk.D. are used to distribute large software application packages.63. All of the following are true of DVD-ROM drives exceptA. they are also known as erasable optical discs.B. they can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres.C. they are also known as DVD players.D. DVD-ROM stands for "digital versatile disc–read only memory".64. Hard disks store and organize files using all the following, exceptA. tracks.B. sectors.C. cylinders.D. paths.65. The hard disk's disk surface is scratched and some or all of the data is destroyed when there is aA. head crash.B. cylinder crash.C. track crash.D. sector crash.sdg Key29. (p. 14) Mark works in the marketing division of a company that manufactures microprocessors for computers. The head of his division has asked him to send him an e-mail with predictions for the following year company sales. What type of software is he most likely to use?a. DatabaseB. Worksheetc. Presentationd. DocumentWorksheets are used to analyze things like budgets and to predict sales.Difficulty: HardOLeary - 001 Chapter... #2230. (p. 8) Which program, among the following, allows a user to eliminate unwanted file fragments and maximize on optimizing computer operations?a. System softwareb. Operating systemc. Application softwareD. UtilitiesUtilities (service programs) perform specific tasks related to managing computer resources.Difficulty: HardOLeary - 001 Chapter... #831. (p. 46) Which among the following can be classified as being both Internet services and browser-related programs?a. Consumer-to-consumer e-commerceb. Domain namesc. Search enginesD. Web utilitiesWeb utilities are specialized utility programs that make using the Internet and the Web easier and safer.Difficulty: HardOLeary - 002 Chapter... #2332. (p. 32) The extensions .gov, .edu, .mil, and, .net are calledA. top-level domains.b. e-mail targets.c. domain extensions.d. mail to addresses.Top-level domains (TLD) such as .gov, .edu, .mil, and, .net are used to identify the type of organization.Difficulty: HardOLeary - 002 Chapter... #1033. (p. 32) Wendy is looking for some information on the Internet. She types on the browser. Once the browser is connected, a document file is sent back to Wendy's computer. What does this document contain?a. Location or address of the resourcesb. Domain codeC. Hypertext Markup Languaged. Web pageOnce the browser has connected to the Web site, a document file is sent back to the person's computer which contains Hypertext Markup Language (HTML).Difficulty: HardOLeary - 002 Chapter... #1334. (p. 36) John Kerry would like to get in touch with his ex-girlfriend's friend and ask her out on a date. He knows that they both keep in touch via the Internet. Which is the most suitable option for John?a. To join b. To join C. To join Friend-of-a-friend sites (for instance, ) are designed to bring together two people who do not know one another but share a common friend.Difficulty: HardOLeary - 002 Chapter... #1835. (p. 40) Which of the following search types would be best suited for finding out who was touring drummer for Marty Robbins in 1965?a. Directory searchB. Keyword searchc. In-site searchd. Reference searchIn a keyword search, you enter a keyword or phrase (like "Marty Robbins" drummer 1965) reflecting the information you want.Difficulty: HardOLeary - 002 Chapter... #1936. (p. 72) Creating a bar graph using data selected from a spread sheet is an example of a(n)A. analytical graph.b. graphics software.c. pie chart.d. spreadsheet.Analytical graphs or charts are visual representations of data in a worksheet.Difficulty: HardOLeary - 003 Chapter... #1637. (p. 65) While working on a document the verbal command "copy" is given and the selected text gets copied. This means that the application supportsa. input keys.b. internal inputs.C. speech recognition.d. commands.Speech recognition is the ability to accept voice input to select menu options and dictate text.Difficulty: HardOLeary - 003 Chapter... #738. (p. 87) OLE stands fora. Online Link Embedding.b. Object Link Export.C. Object Linking and Embedding.d. Online Link Emulation.OLE is an acronym for Object Linking and Embedding.Difficulty: HardOLeary - 003 Chapter... #2539. (p. 65) When additional information requested appears in the form of visual presentations of what the final result would be, then this list is referred to asa. buttons.B. galleries.c. ribbons.d. contextual tabs.Galleries simplify the process of making a selection from a list of alternatives by replacing many dialog boxes with visual presentations of potential results.Difficulty: HardOLeary - 003 Chapter... #640. (p. 104) Although basic application software programs may include multimedia features, the user interaction in them is very limited becauseA. they are accessed in a linear fashion.b. users don't know about them.c. they are not compatible with the program.d. they cannot be accessed by the users directly.Although basic applications include multimedia features, they create documents that are generally accessed in a linear fashion and provide very limited user interaction.Difficulty: HardOLeary - 004 Chapter... #1341. (p. 98-99) One difference between desktop publishing and word processing isA. that desktop publishing allows you to create documents that have professional quality layout and type styles.b. that the first uses graphics, while the second uses text.c. that word processing allows the user to add graphics to a document, while desktop publishing doesn't.d. that word processors work at the command line, while desktop processors work with graphics.Desktop publishing allows you to mix text and graphics to create publications of professional quality.Difficulty: HardOLeary - 004 Chapter... #242. (p. 100) Vector images area. composed of pixels.b. composed of thousands of dots.c. slightly more difficult to manipulate than other images.D. composed of objects such as lines, rectangles, and ovals.Vector images use geometric shapes or objects.Difficulty: HardOLeary - 004 Chapter... #943. (p. 108) Morphing is aa. way of linking related information.b. way of editing audio.c. sound effect.D. visual effect.Morphing is a special effect in which one image seems to melt into another.Difficulty: HardOLeary - 004 Chapter... #1844. (p. 130) Ralph travels extensively, and uses a PDA to access his official e-mails when he is not at the office. He also has a desktop at his workplace, which downloads a copy of these e-mails for his records. Identify the categories of operating systems in this example.a. Network and embeddedB. Embedded and stand-aloned. Network, embedded, and stand-aloneEmbedded operating systems are used for handheld computers and smaller devices like PDAs. Stand-alone operating systems, also called desktop operating systems, control a single desktop or notebook computer.Difficulty: HardOLeary - 005 Chapter... #845. (p. 133) This open source software is free and available from many sources.a. Windowsb. MacintoshC. Linuxd. NetWareLinus Torvalds allowed free distribution of the operating system code and encouraged others to modify and further develop the code.Difficulty: HardOLeary - 005 Chapter... #1446. (p. 133) The next version of Mac OS, which is scheduled to be introduced in late 2006, and allows appropriately equipped Apple computers to use both Mac OS and Windows XP is called:a. Tigerb. Spotlightc. DashboardD. LeopardThe next version of Mac OS, Leopard, is scheduled to be introduced in late 2006. It includes Boot Camp, which allows appropriately equipped Apple computers to use both Mac OS and Windows XP.Difficulty: HardOLeary - 005 Chapter... #1847. (p. 138) Goback Personal Edition is a part ofa. McAfee Office.B. Norton SystemWorks.d. Visual Studio.Goback Personal Edition is a part of Norton SystemWorks.Difficulty: HardOLeary - 005 Chapter... #2448. (p. 170) Which of the following is helpful in enhancing graphics performance, 3-D animations and transferring video data?A. AGPb. ISAc. Graphic coprocessorsd. FireWire busesAccelerated graphics port (AGP) is helpful in enhancing graphics performance, 3-D animations and transferring video data.Difficulty: HardOLeary - 006 Chapter... #2349. (p. 164) When you reboot your system, the computer takes instructions to start from thea. DRAM.b. SDRAM.c. DDR.D. ROM.ROM chips typically contain special instructions for detailed computer operations.Difficulty: HardOLeary - 006 Chapter... #2150. (p. 165) Precisely timed electrical beats or impulses that indicate the speed of processing or power of a computer system are calledA. the clock speed.c. the pulse.d. the system speed.The system clock is located on a small specialized chip that produces precisely timed electrical beats or impulses. The clock speed for powerful microcomputers is measured in gigahertz (GHz) or billions of beats per second.Difficulty: HardOLeary - 006 Chapter... #2251. (p. 164) All of the following are commonly used units of measurement to describe memory capacity, except:a. Megabyte (MB).b. Gigabyte (GB).c. Terabyte (TB).D. Nanobyte (NB).There are three commonly used units of measurement to describe memory capacity, Megabyte (MB), Gigabyte (GB), and Terabyte (TB).Difficulty: HardOLeary - 006 Chapter... #2052. (p. 163) An automatic identification system used to track objects, people or animals is called a(n)a. image processor.b. smart card.C. RFID tag.Specialty processors called RFID tags are information chips that are embedded in merchandise to track their locations.Difficulty: HardOLeary - 006 Chapter... #1653. (p. 160) On the motherboard, the connection points for chips are referred to asa. slots.B. sockets.d. lines.Sockets provide the connection point on the motherboard for chips.Difficulty: HardOLeary - 006 Chapter... #554. (p. 199) In case there is a space constraint, the best type of monitor to be used is a:A. flat-panel monitor.c. projector monitor.d. e-book monitor.Because CRTs are too bulky to be transported easily, portable monitors, known as flat-panel monitors, were developed.Difficulty: HardOLeary - 007 Chapter... #1755. (p. 202) Two categories of laser printers area. thermal, and personal.B. personal, and shared.c. ink-jet, and high-definition.d. active-matrix, and passive matrix.Personal laser printers typically do not support color, are less expensive, and are used by many single users. Shared laser printers typically support color, are more expensive, and are used (shared) by a group of users.Difficulty: HardOLeary - 007 Chapter... #2356. (p. 194) OMR, OCR, and MICR are all types ofa. Radio Frequency Card Readers (RFID).b. magnetic card readers.c. bar code readers.D. character and mark recognition devices.These are all character and mark recognition devices, which are scanners that are able to recognize special characters and marks.Difficulty: HardOLeary - 007 Chapter... #1357. (p. 194) Which of the following types of character recognition systems is used for standardized testing like the Graduate Record Examination (GREs)?a. UPCb. MICRC. OMRd. OCROMR is used to score multiple-choice tests such as the GRE.Difficulty: HardOLeary - 007 Chapter... #1258. (p. 200) What kind of a specialized device or monitor technology is especially useful for graphic artists?a. Flat-panel monitorb. CRT monitorC. High-definition television (HDTV)The video and still images in a high-definition television (HDTV) can then be digitized, edited, and stored on disk for later use. This technology is very useful to graphic artists, designers, and publishers.Difficulty: HardOLeary - 007 Chapter... #2159. (p. 227) DVD-RAMa. is a new type of primary memory.b. is a type of WORM.C. is rewriteable.d. can only store up to 100 MB of data.DVD-RAM is rewriteable.Difficulty: HardOLeary - 008 Chapter... #2060. (p. 224) Which of the following statements on hard-disk packs is incorrect?a. Their capacity far exceeds the other types of hard disks.b. They have multiple recording platters aligned one above the other.c. All the access arms of the hard-disk pack move in and out together.D. Both the read/write heads are activated at a given moment.Only one of the read/write heads is activated at a given moment.Difficulty: HardOLeary - 008 Chapter... #1361. (p. 228) These discs have a capacity of 25 to 50 gigabytes.a. HD DVDb. CDc. DVDD. Blu-RayBlu-Ray is a very different format than either the DVD or the HD DVD format and has a capacity of 25 to 50 gigabytes.Difficulty: HardOLeary - 008 Chapter... #2162. (p. 226) Optical discsa. can hold over 100 gigabytes of data.b. use magnetic charges to represent 1s and 0s.C. typically use a single track that spirals toward the center of the disk.d. are used to distribute large software application packages.Unlike the concentric tracks and wedge-shaped sectors used for floppy and hard disks, however, optical discs typically use a single track that spirals toward the center of the disk.Difficulty: HardOLeary - 008 Chapter... #1763. (p. 227) All of the following are true of DVD-ROM drives exceptA. they are also known as erasable optical discs.b. they can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres.c. they are also known as DVD players.d. DVD-ROM stands for "digital versatile disc–read only memory".Rewriteable—CD-RW stands for compact disc rewritable, also known as erasable optical discs.Difficulty: HardOLeary - 008 Chapter... #1964. (p. 222) Hard disks store and organize files using all the following, excepta. tracks.b. sectors.c. cylinders.D. paths.Hard disks store and organize files using tracks, sectors, and cylinders.Difficulty: HardOLeary - 008 Chapter... #965. (p. 222) The hard disk's disk surface is scratched and some or all of the data is destroyed when there is aA. head crash.b. cylinder crash.c. track crash.d. sector crash.A head crash occurs when a read/write head makes contact with the hard disk's surface or with particles on its surface, and some or all of the data is destroyed.Difficulty: HardOLeary - 008 Chapter... #10。
大学英语计算机试题及答案

大学英语计算机试题及答案1. Multiple Choice Questions1. What is the purpose of a compiler?a) to convert high-level programming code into machine codeb) to debug and fix errors in a programc) to manage memory allocation in a programd) to handle user input and outputAnswer: a) to convert high-level programming code into machine code2. Which of the following is an object-oriented programming language?a) Cb) Javac) Assemblyd) FortranAnswer: b) Java3. What is the function of an operating system?a) to compile and execute programsb) to provide an interface for users to interact with the computerc) to manage hardware resources and schedule tasksd) to store and retrieve data from a databaseAnswer: c) to manage hardware resources and schedule tasks4. What does HTML stand for?a) Hyper Text Markup Languageb) High-level Machine Languagec) Home Tool for Management and Learningd) Human Translated Multimedia LanguageAnswer: a) Hyper Text Markup Language5. Which of the following is a database management system?a) Microsoft Excelb) Adobe Photoshopc) Oracle Databased) NotepadAnswer: c) Oracle Database2. Fill in the Blanks1. The process of finding and fixing errors in a program is called ______.Answer: debugging2. The ______ is responsible for controlling and coordinating the activities of all hardware and software components in a computer system.Answer: operating system3. In object-oriented programming, a ______ is a blueprint for creating objects.Answer: class4. HTTP stands for ______.Answer: Hypertext Transfer Protocol5. SQL stands for ______.Answer: Structured Query Language3. Short Answer Questions1. Explain the difference between compiler and interpreter.Answer: A compiler translates the entire program into machine code before execution, whereas an interpreter translates and executes the program line by line.2. What is an algorithm?Answer: An algorithm is a step-by-step procedure or a set of rules for solving a specific problem or completing a specific task.3. Name two types of computer memory.Answer: RAM (Random Access Memory) and ROM (Read-Only Memory).4. What is a network protocol?Answer: A network protocol is a set of rules and conventions that govern the communication between devices on a network.5. Explain the concept of recursion in programming.Answer: Recursion is the process of a function calling itself, either directly or indirectly. It allows for solving complex problems by breaking them down into smaller, more manageable parts.4. Essay Questions1. Discuss the impact of artificial intelligence on society.Answer: Artificial intelligence has the potential to revolutionize various aspects of society, including healthcare, transportation, and employment. It can improve diagnosis and treatment in medicine, enable self-driving cars, and automate repetitive tasks. However, concerns about job displacement and ethical implications of AI must also be considered.2. Describe the major components of a computer system and their functions.Answer: A computer system consists of the central processing unit (CPU) which performs calculations and executes instructions, memory for temporary data storage, input devices for receiving user input, output devices for displaying or presenting information, and storage devices for long-term data retention.3. Compare and contrast object-oriented programming and procedural programming.Answer: Object-oriented programming (OOP) focuses on objects that contain both data and behavior, allowing for modular and reusable code. Procedural programming, on the other hand, uses procedures or functions toperform tasks. OOP promotes code organization, while procedural programming is more procedural and linear in nature.4. Discuss the advantages and disadvantages of cloud computing.Answer: Benefits of cloud computing include scalability, cost-effectiveness, and easy accessibility to data and services. However, concerns such as data security, dependency on internet connectivity, and potential vendor lock-in should be considered.5. Explain the concept of cybersecurity and its importance.Answer: Cybersecurity refers to the practice of protecting computer systems and networks from unauthorized access, damage, or theft of data. It is of paramount importance in today's digital age to safeguard personal information, prevent cybercrimes, and maintain the integrity of critical infrastructure.Note: The above article provides an example of how a 5000-10000 word essay on "University English Computer Exam Questions and Answers" can be structured and written. The exact content and length may vary depending on the specific questions and answers provided.。
计算机英语试题及答案

计算机英语试题及答案一、选择题(每题2分,共20分)1. The basic unit of data in a computer is:A. ByteB. BitC. KilobyteD. Megabyte答案:B2. Which of the following is not a function of an operating system?A. Memory managementB. Process managementC. Hardware managementD. Web browsing答案:D3. The term "CPU" stands for:A. Central Processing UnitB. Computer Personal UnitC. Computer Programming UnitD. Cybernetic Processing Unit答案:A4. In computer networking, "LAN" refers to:A. Local Area NetworkB. Long-Distance Area NetworkC. Local Access NetworkD. Long-Access Network答案:A5. What is the role of a "router" in a computer network?A. To connect different networksB. To store dataC. To print documentsD. To control access to the internet答案:A6. The process of converting programs into machine language is known as:A. InterpretationB. CompilationC. DebuggingD. Encryption答案:B7. Which of the following is a type of programming language?A. HTMLB. JPEGC. MP3D. DOCX答案:A8. What does "GUI" stand for in computing?A. Graphical User InterfaceB. General User InterfaceC. Graphical User InformationD. Global User Interface答案:A9. A "firewall" is a security device designed to:A. Prevent unauthorized access to a networkB. Control the temperature in a computer roomC. Store firewalls for later useD. Monitor the flow of data in a network答案:A10. The acronym "URL" stands for:A. Uniform Resource LocatorB. Unique Resource LocatorC. Universal Resource LocatorD. User Resource Locator答案:A二、填空题(每题2分,共20分)11. The binary system uses only two digits: 0 and ______.答案:112. A gigabyte is larger than a megabyte, with 1 gigabyte equal to 1,024 megabytes.13. The most common type of connection between a computer and the internet is through a(n) ______.答案:modem14. In programming, a ______ is a sequence of instructions that a computer can execute.答案:program15. A ______ is a type of software that allows users to browse the internet.答案:web browser16. The ______ is the primary component of a computer that performs most of the processing.答案:CPU17. Data encryption is a method of converting data into a code to ______ unauthorized access.答案:prevent18. A ______ is a set of rules governing the structure of data and the way it is transmitted.答案:protocol19. The ______ is a type of software that provides a graphical interface for interacting with the computer.答案:operating system20. A ______ is a hardware device that connects multiple computers together in a network.答案:switch三、简答题(每题10分,共20分)21. Explain the difference between a compiler and aninterpreter in programming.答案:A compiler is a software tool that translates the entire source code of a program into machine language before execution. It processes the code as a whole and produces an executable file that can be run independently of the compiler. On the other hand, an interpreter translates and executes the source code line by line or block by block, without creatinga separate executable file. Interpreters run the codedirectly and are typically used for scripting languages.22. Describe the function of a database management system (DBMS).答案:A database management system (DBMS) is a software system that allows users to create, modify, and manage databases. It provides a way to store, organize, and retrieve data efficiently. The main functions of a DBMS includecreating the structure of a database, entering and retrieving data, maintaining data integrity, and controlling access tothe data. It also supports advanced operations such as querying, indexing, and transaction management.四、翻译题(每题15分,共30分)23. 将以下句子从英文翻译成中文:"The Internet of Things (IoT) is a network of physical objects embedded with electronics, software, sensors, andnetwork connectivity which enables these objects to collect and exchange data."答案:物联网(。
(完整word版)计算机专业英语试题

计算机专业英语试题I.V ocabulary(词汇)(30分)(一)Translate the following words and expressions into Chinese.(写出下列词组的汉语。
共10分,每题1分)1.Operating system____________2.white bOx testing__________3.hard disk_________4.management information system_______________5.electronic commerce___________________6.relational database__________________7.software engineering___________________8.software maintenance__________________9.menu bar______________10. network security___________________(二)Fill in the blank swith the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
共10分,每题1分)1.只读存储器__________ 2.广域网___________3.传输控制协议___________ 4,文件传送[输]协议__________5.通用串行总线__________ 6.面向对象编程____________7.集成开发环境___________ 8.结构化查询语言___________9.数据库管理系统___________ 10.开放系统互连______(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
(完整word)计算机专业英语试题及答案,推荐文档

计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hacker i. 黑客 10. switch j.防火墙1. 6. 2. 7. 3. 8. 4. 9. 5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
2009-2010学年第1学期2009 级《计算机导论》考试试题A卷考试时间:2009年月班级学号姓名✧请将答案写在答题纸上,写明题号,不必抄题,字迹工整、清晰;✧请在答题纸和试题纸上都写上你的班级,学号和姓名,交卷时请将试题纸、答题纸和草纸一并交上来。
I、Choice Questions(20 questions, 1 score for each question)1. Every computer today is based on the _____ model.a. von Neumannb. Microsoftc. Inteld. input/output2. The CPU includes a small number of storage buffers that hold data temporarily, called ________.a. cacheb. registersc. memoryd. disk drives3. To store a byte, you need ______ electronic switches.a. 1b. 4c. 8d. 164. According to the von Neumann model, _________ are stored in memory.a. datab. programsc. algorithmd. a and b5. Computer scientists have defined three constructs for a structures program or algorithm, assertingthat a program must be made of a combination of them. Which of the following is NOT among them?a. Decisionb. Sequencec. Flowchartingd. Repetition5.6. The output data depend on the combination of the ________ and the program.a. memory sizeb. input datac. processor modeld. processor speed7. In ______ number representation, there are two representations for 0a. sign-and-magnitude .b. one’s complementc. two’s complementd. a and b8. The uniform representation for storing data is called ________.a. textb. a bit patternc. a switchd. ISO9. To unset (force to 0) all the bits of a bit pattern, make a mask of all 0s and then ______the bitpattern and the mask.a. ORb. NOTc. XORd. AND10. A bit pattern of three bits can take on how many different states?a. sixteenb. eightc. fourd. three11. A program is a set of ________ written in a(n) ________ language.a. directions, humanb. mathematical operations, mathematicalc. codes, binaryd. instructions, computera. controlb. addressc. datad. all of the above13. A router operates at ______ layer of the OSI model.a. all layersb. the first four layersc. the first three layersd. application14. The ______ scheduler creates a process from a job and changes a process back to a job.a. processb. queuec. jobd. virtual15. For ______ sort, n-1 passes and tow loops are needed to sort the data..a. selectionb. insertionc. bubbled. all of the above16. An operating system program called the ______ gets the program into memory.a. translatorb. loaderc. downloadd. processor17. When you try to store a number that is not within the range defined by the allocation, what happens?a. The system automatically allocates more space.b. The processor halts.c. Nothing; the processor just drops the extra bitsd. Y ou get an overflow error.18. In a linked list, each element contains ______.a. a link and a recordb. data and a recordc. data and a linkd. all of the above19. A process in the running state goes to ready state when _______.a. get access to CPUb. Time slot exhaustedc. I/O requestedd. it finishes running20. The bit pattern 11000111 _________ to flip the leftmost bits.a. XOR 11111000b. OR 11111000c. NOTd. AND 11111000II、Questions( 6 questions, 5 scores for each question)1. What’s the definition of an operating system?2. What are the subsystems of the von Neumann computer model?3. Name four types of network connecting devices.4. Define the three constructs used in structured programming.5. Name the layers of the OSI model?6. What’s the formal definition of an algorithm?III、Calculation( 5 subjects, 5 scores for each subject)1. Change the following 8-bit two’s complement numbers to decimal.(1). 1000000 (2). 01100100 (3). 11001000 (4). 11000011 (5).110101012. Change the following decimal numbers to 8-bit two’s complement integers, and then convert the result to hexadecimal.(1). -48 (2). 25 (3). -127 (4). 98 (5). -553. Using an 8-bit allocation, first convert each of the following numbers to two’s complement, do the operation, and then convert the result to hexadecimal.(1) 35+63 (2) 35-63 (3) -35 +63 (4) -35-63 (5) 63-14. Show the result of the following operations, and then convert the result to hexadecimal.(1) NOT 129 (2) 15 AND 10 (3) x55 OR xAA(4) 100 AND 255(5) (xFF XOR xBB) AND (xFF OR xBB)5. Change the +12.625 decimal numbers to binary numbers, and show it in 32-bit IEEE format, and then convert the result to hexadecimal.IV. Analyzing and Design (5 subjects, 5 scores for each subject)1. Using the bubble sort algorithm, manually sort the following list and show your work in each pass:12, 6, 78, 31, 50, 46, 99, 2, 20, 442. A list contains the following elements. Using the binary search algorithm, trace the steps followed to find 66. At each step, show the values of first,last and mid.2, 5, 18, 28, 30, 40, 66, 1003 Write an algorithm in pseudocode to find the smallest of a set of 10000 numbers (the biggest data is 255 among the numbers).4. Write a recursive algorithm to find the combination of n objects taken k at a time using following definition.C(n,k)=1 , if k=0 or n=kC(n,k)=C(n-1,k)+(n-1,k-1) , if n>k>05. Imaging a power plant that pumps water to a city using eight pumps(P8, P7, P6, P5, P4, P3, P2, and P1). The states of the pumps (on or off) can be represented by 8-bit pattern. For example, the pattern 10001111 shows that pumps 1 to 4(from right), and 8 are on (running) while pumps 5, 6, and 7 are off (shut down). How can you shut down all pumps, after two minutes, let the pump P2 and P5 running, and after one hour, shut down the P2 pump and turn on the P6 pump simultaneously, and remain the P5 running too?。