计算机网络英语期末复习试题及答案
计算机英语考试题目及答案

计算机英语考试题目及答案一、选择题1. What does HTML stand for?a) Hyper Text Markup Languageb) High Technology Multimedia Languagec) Home Tool Management Languaged) Human Token Marker Language答案:a) Hyper Text Markup Language2. Which of the following is not a programming language?a) Javab) Pythonc) HTMLd) C++答案:c) HTML3. What is the purpose of CSS?a) To add interactivity to web pagesb) To structure the content of web pagesc) To define the layout and style of web pagesd) To create dynamic web pages答案:c) To define the layout and style of web pages4. What is the function of a router in a computer network?a) To connect computers to the internetb) To store and manage data on a networkc) To protect the network from security threatsd) To direct network traffic between devices答案:d) To direct network traffic between devices5. Which of the following is a commonly used database management system?a) Microsoft Wordb) Adobe Photoshopc) MySQLd) Windows Media Player答案:c) MySQL二、填空题1. The process of converting source code into machine code is called ________.答案:compilation2. The most widely used programming language for web development is ________.答案:JavaScript3. TCP/IP stands for ________.答案:Transmission Control Protocol/Internet Protocol4. The physical components of a computer are referred to as ________.答案:hardware5. SQL stands for ________.答案:Structured Query Language三、简答题1. What are the advantages of using cloud computing?答案:Cloud computing offers several advantages, including:- Cost savings: Companies can reduce their infrastructure costs by using cloud services instead of maintaining their own hardware.- Scalability: Cloud services can easily scale up or down based on demand, allowing businesses to only pay for what they need.- Flexibility: Users can access cloud services from anywhere with an internet connection, enabling remote work and collaboration.- Disaster recovery: Cloud providers often have backup systems in place, ensuring data can be recovered in case of a disaster.- Automatic updates: Cloud services are typically updated regularly by the provider, ensuring users have access to the latest features and security patches.2. Explain the difference between HTTP and HTTPS.答案:HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting data over the internet. It is not secure, meaning that the data being transmitted can be intercepted and read by anyone. HTTPS (Hypertext Transfer Protocol Secure), on the other hand, is a secure version of HTTP. It uses encryption to ensure that data is encrypted before transmission, making it much more difficult for hackers to intercept and read. HTTPS is commonly used for secure online transactions, such as submitting credit card information or personal details.四、编程题请编写一个Python程序,实现计算圆的面积和周长的功能。
计算机网络英文版习题答案

P63 #5 Consider sending a packet of F bits over a path of Q links. Each link transmits at R bps. The network is lightly loaded so that there are no queuing delays. Propagation delay is negligible.a.Suppose the network is a packet-switched virtual-circuit network. Denote the VC setup time by t s seconds. Suppose the sending layers add a total of h bits of header to the packet. How long does it take to send the file from source to destination?t s+[(F+h)/R]Qb.Suppose the network is a packet-switched datagram network and a connectionless service is used. Now suppose each packet has 2h bits of header. How long does it take to send the packet?[(F+2h)/R]Qc.Finally, suppose that the network is a circuit-switched network. Further suppose that the transmission rate of the circuit between source and destination is R bps. Assuming ts setup time and h bits of header appended to the packet, how long does it take to send the packet?t s+(F+h)/RP64 #6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters and suppose that the propagation speed along the link is s meters/sec. Host A sends a packet of size L bits to host B.[a] Express the propagation delay, d prop, in terms of m and s.[b] Determine the transmission time of the packet, d trans, in terms of L and R.[c] Ignoring processing and queueing delays, obtain an expression for the end-to-end delay.[d] Suppose Host A begins to transmit the packets at time t=0. At time t=d trans, where is the last bit of the packet?[e] Suppose d prop is greater than d trans. At time t=d trans, where is the first bit of the packet?[f] Suppose d prop is less than d trans. At time t=d trans, where is the first bit of the packet?[g] Suppose s=2.5 x 108, L=100 bits and R=28kbps. Find the distance m so that d prop = d trans.[a] d prop = m/s[b] d trans = L/R[c] end-to-end delay = d prop + d trans=m/s+L/R[d] The beginning position of the link.[e] On the channel between A and B.[f] On the host B.[g] m/s = L/R = > m = sL/R = > m = 892.86 kmP65 #10 Consider the queueing delay in a router buffer. Suppose that all packets are L bits, the transmission rate is R bps, and that N packets simultaneously arrive at the buffer every LN/R seconds. Find the average queueing delay of a packet (in terms of L, R and N). (Hint: The queueing delay for the first packet is zero; for the second packet L/R; for the third packet 2L/R. The Nth packet has already been transmitted when the second batch of packets arrives.)As the Nth packet has already been transmitted when the next batch of packets arrive, we only need to consider the delay for a single batch of packets.Average delay = Total delay / Number of packetsDelay for 1st packet = 0Delay for 2nd packet = L/RDelay for 3rd packet = 2L/R......Delay for Nth packet = (N-1)L/RTotal delay for N packets = (0 + 1 + 2 ... +(N-1) ) * (L/R)Using the formulas for sum of integer series, this can be written as: Total delay for N packets = (N-1) * (N/2) * (L/R)Therefore, average delay for N packets = ((N-1) * L) / 2RP170 #12 What is the difference between persistent HTTP with pipelining and persistent HTTP without pipelinning? Which of the two is used by HTTP/1.1?For the persistent connection without pipelining, the client issues a new request only when the previous has been received. In this case, the client experiences one RTT in order to request and receive each of the referenced objects.For the persistent connection with pipelining, the client issues a request as soon as it encounters a reference. It is possible for only RTT to be expended for all the referenced objects.P170 #14 Telnet into a Web server and send a multiline request message. Include in the request message theIf-modified-since: header line to force a response message with the 304 Not Modified status code.GET/somedir/exp.html HTTP/1.1Host: Connection: closeUser-agent: Mozilla/4.0If-Modified-Since: Thu, 30 May 2007 12:00:00 GMTAccept-language: frP172 #6 Suppose within your web browser you click on a link to obtain a web page. The IP address for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT (Round Trip Time) of RTT1, ... RTTn. Further suppose that the web page associated with the link contains exactly one object, consisting of a small amount of HTTP text. Let RTT0 denote the RTT between the local host and the remote server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object? (Hint: read pages 90 .. 93)Time to visit DNS servers and get IP address = RTT1 + RTT2 + ... + RTTnTime to establish TCP connection (SYN and SYNACK) = RTT0Time to send HTTP request and receive reply = RTT0Total time = 2 * RTT0 + (RTT1 + RTT2 + ... + RTTn)P171 #16 Suppose Alice with a Web-based e-mail account (such as Yahoo! Mail or Hotmail) sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.The series of application-layer protocols: HTTP、SMTP、POP3Suppose that you send an e-mail message whose only data is a Microsoft Excel attachment. What might the header lines (including MIME lines) look like?From:***********To:***********Subject: helloMIME-Version: 1.0Content-Transfer-Encoding: base64Content-Type: Application/MS-ExcelP286 #5 Suppose host A sends two TCP segments back to back to host B over a TCP connection. The first segment has sequence number 90: the second has sequence number 110.a.How much data is in the first segment?a.20 bytesb.Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgement that host B sends to host A, what will be the acknowledgement number?b.ACK90P291 #27 Consider the following plot of TCP window size as a function of time. (reproduced below for you) Assuming TCP Reno is the protocol experiencing the behavior shown above, answer the following questions. In all cases, you should provide a short discussion justifying your answer.a. Identify the intervals of time when TCP slow start is operating.b. Identify the intervals of time when TCP congestion avoidance is operating.c. After the 16th transmission round, is segment loss detected by a tripleduplicate ACK or by a timeout?d. After the 22nd transmission round, is segment loss detected by a triple duplicate ACK or by a timeout?e. What is the initial value of Threshold at the first transmission round?f. What is the value of Threshold at the 18th transmission round?g. What is the value of Threshold at the 24th transmission round?h. During what transmission round is the 70th segment sent?i. Assuming a packet loss is detected after the 26th round by the receipt of a triple duplicate ACK, what will be the values of the congestion-window size and of Threshold?Solution:a.1-6, 23-26b.6-16, 17-22c.a triple duplicate ACKd.timeoute.32f.21g.13h.7i.4, 4P293 #34 Consider sending an object of size O = 100 Kbytes from server to client. Let S = 536 bytes and RTT = 100 msec. suppose the transport protocol uses static windows with window size W. (See Section 3.7.2)a.For a transmission rate of 28 kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency.b.Repeat (a) for 100 kbps.tency=28.8s W=2tency=8.2s W=4P405 #8 Consider a datagram network using 8-bit host addresses. Suppose a router uses longest prefix matching and has t he following forwarding table:-----------------------------------------------------Prefix Match Interface-----------------------------------------------------00 001 110 211 3-----------------------------------------------------For each of the four interfaces, give the associated range of destination host addresses and the number of addresses in the range.6P407 #15 Consider sending a 3000-byte datagram into a link that has a MTU of 500 bytes. Suppose the original datagram is stamped with the identification number 422. How many fragments are generated? What are their characteristics?there are「2980/480」=7 fragments be generatedP408 #22 Consider the network shown in Problem 21 (reproduced below). Using Dijkstra’s algorithm, and showing your work using a table similar to Table 4.3, do the following:a. Compute the shortest path from s to all network nodesSteps D(t),P(t) D(u),P(u)D(v),P(v)D(w),P(w)D(x),P(x)D(y),P(y)D(z),P(z)0 1,s 4,s ∞∞∞∞∞1 3.t 10,t ∞∞5,t 3,t2 4,u 6,u ∞5,t 3,t3 4,u 6,u ∞5,t4 5,v 7,v 5,v5 6,w 5,v6 6,wPlease fill in the following tables using DV algorithm:For the node Z in the graph shown in the 22nd topic (P408), please fill in the following routing table in the router z about the initial distance-vector Destination node Next hop Current shortest distancevalue-DzS —∞T T 2U —∞V —∞W —∞X —∞Y Y 14Z Z 0following rout-ing table in the node z to update this routing tableDestination node Currentdistance-DyDestination node Current distance-DtS 5 S 1 T 4 T 0 U 2 U 2P493 #7 How big is the MAC address space?The IPv4 address space?The IPv6 address space?MAC address: 6 bytes, MAC address space 2^48IPV4 address: 4 bytes, IPV4 address space 2^32IPV6 address: 16 bytes, IPV6 address space 2^128P494 #4 Consider the 4-bit generator, G, shown in Figure 5.8, and suppose the D has the value 10101010. What is the value of R?G=1001, D=10101010, R=101。
计算机专业英语期末复习题及参考答案

一单选题 (共10题,总分值30分 )1. hacker (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙2. functional testing (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙3. relational database (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙4. firewall (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙5. software testing (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙6. audi (3 分)B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙7. application software (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙8. machine language (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库J. 防火墙9. memory (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙10. structured programming (3 分)A. 音频B. 应用软件C. 机器语言D. 软件测试E. 结构化程序设计F. 内存G. 功能测试H. 关系数据库I. 黑客J. 防火墙二填空题 (共1题,总分值5分 )11. Microsoft Word XP is the current Window versionof Word, and documents created in Word XP can beeasily _________________________________Excel, Power Point and Access files. In the interface of Word, the_________________________________displays the name of the current application and name of the current document;the_________________________________lists the names of the menus available;the_________________________________gives the user quick access to frequently used editingfunctions; the_________________________________enables theuser to change left and right margin.toolbarrulertitle barmenu barincorporate into (5 分)三翻译题 (共10题,总分值50分 )12. hard disk (5 分)13. 集成开发环境(5 分)14. 通用串行总线(5 分)15. network security (5 分)16. software maintenance (5 分)17. electronic commerce (5 分)18. 广域网(5 分)19. 结构化查询语言(5 分)20. management information system (5 分)21. 面向对象编程(5 分)四阅读理解 (共1题,总分值15分 )22. The Internet, then known as ARPANET, wasbrought online in 1969, which initiallyconnected four major computers at universitiesin the southwestern US . The early Internet wasused by computer experts , engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personalcomputers in those days, and anyone who used it, whether a computer professional or an engineeror scientist or librarian, had to learn to use a very complex system.The Internet matured in the 1970's as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today' s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources.In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network.Since the Internet was initially funded by the government, it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 1990's, when independent commercial networks began to grow.(四) Choose the best answer according to Passage C.(根据上文的内容选择正确的答案。
计算机网络英文复习题

计算机络英文复习题-CAL-FENGHAL-(YICAI)-Company One 1.英译汉(10分)TCP(Transmission Control Protocol) IP (Internet Protocol)RFC(Requests for comments)SMTP(Simple Mail Transfer Protocol) Congestion-control Flow controlUDP (User Datagram Protocol)川八数据报协议FTP(File Transfer Protocol) 文件传输协议HTTP( Hyper-Text Transfer Protocol) 超文本传输协议TDM 时分复用 FDM频分复用ISP(Internet Service Provider) DSL(Digital Subscriber Line) DNS(Domain Name System) ARQ(Automatic Repeat Request)ICMP(Internet Control MessageProtocol) 网间控制报文协议AS(Autonomous Systems) RIP(Routing Information Protocol)\ OSPF(Open Shortest Path First) BGP (Border Gateway Protocol) 边界网关协议HFC光纤同轴电缆混合网22. CRC(Cyclic Redundancy Check) 循环冗余检验23. CSMA/CD 带冲突检测的载波侦听多路存取24. ARP 地址解析协议 25. RARP 反向地址解析协议 26.DHCP动态主机配置协议循环时间互联网工程任务组 统一资源定位 应用程序编程接口 多用途互联网邮件扩展32. MTU(P328)最大传输单元二、单项选择题(每小题1分,共30分)1. DSL divides the communication link between the home and the ISP into three nonoverlapping frequency bands, a upstream channel is in _A ______ ・A)50 kHz to 1 MHz band B) 1 MHz to 2MHz band C)4 kHz to 50kHz bandD)Oto 4kHz band2. As a data packet moves from the upper to the lower layers, headers are A .A) Added; B) subtracted; C) rearranged; D) modified1. 2. 3. 4. 5. 6.7. 8. 9. 10. 11. 12.13. 14. 15. 16. 17.18.传输控制协议 互联网协议 请求评议简单邮件传输协议 拥塞控制 流控制互联网服务提供商 数字用户线路 域名系统自动重发请求 自制系统路由信息协议 开放最短路径优先27. RTT 28. IETF(P5) 29. URL(P88) 30. API 31. MIME3.What is the main function of the network layer DA) node-to-node delivery; B) process-to-process message deliveryC) synchronization; D) updating and maintenance of routing tables4.Which of the following is the default mask for the address 168.0.46.201A) 255.0.0.0; B) 255.255.0.0; C) 255.255.255.0; D) 255.255.255.2555. A router reads the __ address on a packet to determine the next hop. AA) IP ; B) MAC; C) source; D)ARP6 . Which device can't isolates the departmental collision domains. AA) Hub; B) switch; C) router; D) A and B7.Input port of a router don't pei-fonn ______ D ______ f imctions.A) the physical layer functions B) the data link layer functionsC) lookup and forwarding function D) network management8.HTTP has a mechanism that allows a cache to verify that its objects are up to date・ The mechanism is DA) persistent connections B) cookies C) Web Caching D) conditional GET9. A protocol layer can be implemented in ______ D ______ ・A) software B) hardware C) a combination of the software and hardware D) All of the above10.A protocol has three important factors, they are_A ___________ ・A) syntax, semantics, order B) syntax, semantics, layerC) syntax, semantics, packet D) syntax , layer, packet11.There are two broad classes of packet-switched networks: datagram networks andvirtual-circuit networks. The virtual-circuit networks forward packets in their switches use D .A) MAC addresses B) IP addressesC) e-mail addresses D) virtual-circuit numbers12.TCP service model doesn't provide _______ D _________ service・A) reliable transport service B) flow control serviceC) congestion-control service D) guarantee a minimum transmission rate service ・ually elastic applications don^t include ________ B ________ ・A) Electronic mail B) Internet telephonyC) file transfer D) Web transfer14.A user who uses a user agent on his local PC receives his mail sited in a mailserver by using _B ______ protocol.A)SMTP B) POP3C)SNMP D) FTP15.Considering sliding-window protocol, if the size of the transmitted window is N and the size of the receiving window is l,the protocol isA) stop-and-wait protocol B) Go-Back-N protocolC) selective Repeat protocol D) alternating-bit protocol16.which IP address is effective ______ B ________ ・A) 202,131,45,61 B) 126.0.0.1C) 192.268.0.2 D) 290.25」35」217.if IP address is 202.130.191.33, subnet mask is 255.255.255.0,then subnet prefixis_D _______A) 202.130.0.0 B) 202.0.0.0C) 202.130.191.33 D)202.130.191.018.The command Ping s implemented with _B ___________ messagesA) DNS B) ICMPC) IGMP D) RIP19.Which layer-function is mostly implemented in an adapter _A __________________A) physical layer and link layer B) network layer and transport layerC)physical layer and network layer D) transport layer and application layer20.If a user brings his computer from Chengdu to Peking, and accesses Internet again.Now, _B __________ of his computer needs to be changed・A) MAC address B) IP addressC) e-mail address D) user address1._____________________________________ ・traceroute is implemented with _B_______________________________________________________ messages.A) DNS B) ICMPC) ARP D) RIP2. A router reads the A address on a packet to determine the next hop・A. IP ;B. MAC;C. source;D.ARP3.There are two broad classes of packet-switched networks: datagram networksand virtual-circuit networks. The virtual-circuit networks forward packets in their switchesuse _____________________ D ____ ・A) MAC addresses B) IP addressesC) e-mail addresses D) virtual-circuit numbers4.About subnet, which underlying description isif t right ____________A)device interfaces with same subnet part of IP addressB)can" physically reach each other without intervening a router.C)all of the devices on a given subnet having the same subnet address・D) A portion of an interface's IP addi'ess must be detennined by the subnet to which it is connected・5.if IP address is 102.100.100.32, subnet mask is 255.255.240.0,then subnetprefix is ___ A ____A) 102」00.96.0 B) 102.100.0.0C) 102.100.48.0 D) 102.100.112.06 If a user brings his computer from chengdu to beijing, and accesses Internetagain・ Now, ____ B_ of his computer needs to be changed・A) MAC address B) IP addressC) e-mail address D) user address7.Input port of a router don^ pei'fonii ________ D ____ functions.A) the physical layer functions B) the data link layer functionsC) lookup and forwarding function D) network management8.switching fabric is at the heart of a router, switching can be accomplished in a number of ways,donit include^ D _A)Switching via memory B)Switching via crossbarC)Switching via a bus D) Switching via buffer9.if a host wants to emit a datagram to all hosts on the same subnet, then the datagram'sdestination IP address is __________________ B_A)255.255.255.0 B) 255.255.255.255C)255.255.255.254 D) 127.0.0.1lO.The advantage of Circuit switching does not include ________________ ・A) small transmission delay B)small Processing costC) high link utilization D)no limited to format of message1 ・a n ARP query sent to _A_A) local network B) all over the Internet.2..packet-switching technologies that use virtual circuits include_B___________ :A) X.25, ATM, IP B) X.25, ATM, frame relay.C) IPX, IP, ATM D) IPX, IP, TCP3・ In Internet, _ D _ protocol is used to report error and provide the information for un-normal cases・A) IP B) TCP C)UDP D) ICMP1 ・A is a Circuit-switched network・A. TDMB. Datagram networkC. InternetD. virtualcircuit network2.The store-and-forward delay is __ D_______A. processing delayB. queuing delay C・ propagation delay D.transmission delay3・ Which is not the function of connection-oriented service DA. flow controlB. congestion control C・ error correction D.reliable data transfer4. The IP protocol lies in CA. application layerB. transport layerC. network layerD. link layer5. Which of the following is the PDU for application layer _B ________A. datagram;B. message; C・ frame; D・ segment6.bandwidth is described in _B_A) Bytes per second B) Bits per secondC) megabits per millisecond D) centimeters7. A user who uses a user agent on his local PC receives his mail sited in a mail server by using _A_ protocol.A)SMTP B) POP3C)SNMP D) FTP8・ As a data packet moves from the lower to the upper layers, headers arc B ,A)Addcd; B. subtracted: C. rearranged; D. modified三. 填空题(每空1分,共22分(注意:所有填空题不能写中文,否则中文答 案对的情况下扣0.5分)1 ・ link-layer address is variously called a LAN address, a MAC address, or a physical address,2 In 什le layered architecture of computer networking, n layer is the user of n-1 layer and the service provider of n+1 layer ・ A) n B) n+3 C) n+1 D) n-1MechanismUseChecksum Used to detect bit errors in a transmitted packet. Sequence number Used for sequential numbering of packets of dataflowing from sender to receiver ・ Acknowledgmen t (或 ACK) Used by the receiver to tell the sender that a packet orset of packets has been received correctly ・ Countdown timer Used to timeout/retransmit a packet, possibly because the packet (or its ACK)was lost ・ Window,pipelinl ing The sender may be restricted to sending only packetswith sequence numbers that fall within a given range ・1. please fill in the types of delay in a router.四. 判断题(每小题1分,共10分)1 ・ J The sernces of TCP's reliable data transfer founded on the seivices of the unreliable datatransfer.2. J Any protocol that performs handshaking between the communication entitiesbefore transferring data is a conncction-oricntcd sen-ice ・3. x HOL blocking occur in output ports of router ・4. J Socket is globally unique ・5. J SMTP require multimedia data to be ASCII encoded before transfer.6. xThe transmission delay is a function of the distance between the two routers ・7. xIP address is associated with the host or router. SO one device only have one IPaddress ・8. J In packet-switched nehvorks, a session's messages use the resources on demand, and Internet makes its best effort to deliver packets in a timely manner.② nodelProcessionPropagation©queueingrouterTransmission9.x UDP is a kind of unreliable transmission layer protocol, so there is not any checksum field in UDP datagram header・10.J Forwarding tabic is configured by both Intra and Inter-AS routing algorithmIP is a kind of reliable transmission protocol. F8.Forwarding table is configured by both Intra and Inter-AS routing algorithm・T9.Distance vector routing protocol use Isa to advertise the network which router knows.F10.RIP and OS PF are Intra-AS routing protocols T11 ・ Packet switching is suitable for real-time services, and offers better sharing of bandwidththan circuit switching F五、计算题(28 poin⑸1 ・Consider the following net\vork. With the indicated link costs, use Dijkstnf s shortest-path algorithm to compute the shortest path from X to all network nodes・2 Given: an organization has been assigned the network number 198」.1.0/24 and it needs todefine six subnets・ The largest subnet is required to support 25 hosts. Please:• Defining the subnet mask; (2 分)27bits or 255.255.255.224•Defining each of the subnet numbers; which are starting from 0# (4 分)198.1.1.0/27198.1.1.32/27 198.1.1.64/27 198.1.1.96/27 198.1.1.128/27 198.1.1.160/27 198.1.1.192/27 19& 1.1.224/27•Defining the subnet 2¥s broadcast address.(2 分)198.1 ・ 1.95/27•Defining host addresses scope for subnet 2#. (2 分)198.1 ・ 1.65/27— 198.1.1.94/273.Consider sending a 3,000-byte datagram into a link that has an MTU of1500bytes.Suppose the original datagram is stamped with the identification number 422 ・Assuming a 20-byte IP header^How many fragments are generated What are their characteristics (10 分)。
计算机专业英语期末必考题及答案总结

switchSwitches (Switch) is an identification based on the MAC ( network card hardware address) , complete the package forwarding packets functional network equipmentA router is a device that forwards data packets between computer networks, creating an overlay internetwork. 路由器(Router)是连接因特网中各局域网、广域网的设备,它会根据信道的情况自动选择和设定路由,以最佳路径,按前后顺序发送信号的设备路由器是为信息流或数据分组选择路由的设备。
Router is a routing device to select the flow of information or data packetRouter (Router) is connected to the Internet , LAN, WAN equipment ,it will automatically select the channel and routing settings , the best path , according to the equipment before and after the order to send signals区别Switch refers to any network -level data relay equipment (although multi-finger bridge ) , while the router is more focused on the network layerThe first switch is a data link layer in the OSI / RM open architecture , which is the second layer , while the router is a beginning design work at the network layer of the OSI modelThe switch is a physical address or MAC address to determine the destination address of the forwarding data . While the router is to use the IP address)to determine the data forwarding address交换机是一个物理地址或MAC地址来确定转发数据的目的地址。
计算机英语期末考试试题及答案

计算机英语期末考试试题及答案一、选择题1. 在计算机网络中,IP地址用于标识网络上的的哪个设备?A. 路由器B. 交换机C. 服务器D. 主机答案:D2. 在计算机安全中,以下哪项属于恶意软件?A. 防火墙B. 杀毒软件C. 木马病毒D. 数据备份答案:C3. 在计算机术语中,RAM代表什么?A. 随机读取存储器B. 只读存储器C. 可擦除可编程读取存储器D. 磁盘存储器答案:A4. 在计算机网络中,HTTP协议是用于实现什么功能的?A. 网络连接B. 文件传输C. 数据加密D. 网络浏览答案:D5. 下列哪个不属于常见的文件压缩格式?A. .zipB. .rarC. .isoD. .txt答案:D二、填空题1. 在计算机程序中,循环结构可以用来多次执行特定的代码段,常见的循环结构包括_______和_______。
答案:for、while2. 在计算机图像处理中,________是指将一幅图像分割成若干个连续的小区域,并对每个小区域进行处理。
答案:图像分割三、判断题1. 计算机网络是指将多台计算机通过通信设备连接起来,实现信息共享和资源共享。
答案:正确2. 在计算机程序中,注释是用来向其他程序员解释代码功能的。
答案:正确四、简答题请简述计算机网络的优点和缺点。
优点:1. 资源共享:计算机网络可以实现多台计算机之间的文件共享、打印共享等,提高资源利用率;2. 信息交流:计算机网络可以快速传输信息,实现实时通信,方便人们之间的交流;3. 远程访问:计算机网络可以远程访问其他计算机,方便远程办公和学习。
缺点:1. 安全性问题:计算机网络容易受到黑客攻击和恶意软件感染,存在一定的安全隐患;2. 依赖性:对于依赖网络的应用和服务而言,一旦网络故障,将会导致服务中断,影响工作和生活;3. 隐私问题:在计算机网络中,个人信息和隐私面临泄露的风险,需要加强数据保护和隐私保护措施。
答案仅供参考,具体答案可能根据题目要求有所变化。
计算机专业英语期末复习题(精选)

计算机专业英语期末复习题I. Decide if the following statements are true (T) or false (F)1. Few makers have incorporated a USB hub into their products.2. The Internet began to boom in 1990.3. Encryption means adding a password to the access of a computer.4. The aim of compression formats is to reduce file size.5. WWW provides access to a variety of internet resources fromdifferent interfaces.6. All commercial operating systems can be modified by everyone.7. HTML is a language used to write documents for the8. Computers have greatly reduced the amount of paper in offices.9. Other electronic devices like TV can also trol your PC.10. Everyone can make suggestions to improve the Linux operatingsystem.11. You could edit a video like a document file with cutting and pastingon cheap editing computers five years ago.12. By the hyperlink, the user is nected to the document specified bythe link.参考答案:1 F2 F3 T4 T 5F6 F7 T8 T9 T 10T11 F 12 TII. Give the Corresponding Translation.1. recovery2. server3. ROM4. machine language5. operating system6. interface7. software 8. RAM9. process 10. network11. memory 12. USB13. database 14. debug15. cache 16. CPU1. 多媒体2. 音频3. 键盘4. 激活5. 内存6. 浏览器7. 服务器 8. 输出9. 黑客 10. 病毒11. 显示器 12. 对象参考答案:1. 恢复2. 服务器3. 只读存储器(只读内存)4. 机器语言5. 操作系统6. 接口、界面7. 软件8. 随机存取存储器9. 过程10. 络11. 内存12. 通用串行总线13. 数据库 14. 调试15. 高速缓冲存储器16. 中央处理器1. multimedia2. audio3. keyboard4. activate5. memory6. browser7. server 8. output9. hacker 10. virus11. monitor 12. objectIII. T ranslate the Following Sentences into Chinese 12%1.Microsoft’s Windows 2000 is a powerful yet flexible operating systemdesigned for large applications in networked environments.2.A computer virus is a computer program that is created to make andspread copies of itself.3.Spreadsheet applications are computer programs that let you createand manipulate spreadsheets.4.An optical mouse doesn’t have a ball on the bottom and can usually beused without a mouse pad.5.A small network may only nect two computers inside a home to sharea single printer and Internet nection.6.The older DOS operating systems and some versions of Unix andLinux use a command interface, though graphical versions of Unix and Linux are now available.参考答案:1.windows 2000是一种为络环境下大型程序而设计的强大而灵活的操作系统。
计算机网络双语试题及答案

计算机网络双语试题及答案一、选择题(共20题,每题2分,共40分)1. 当使用HTTP协议进行通信时,下列哪个是无连接的协议?A. TCPB. IPC. UDPD. FTP2. 在计算机网络中,IP地址的作用是什么?A. 标识主机在网络中的唯一地址B. 实现数据的可靠传输C. 进行主机之间的通信D. 提供远程访问服务3. 下列哪个不属于网络拓扑结构的类型?A. 总线型拓扑B. 环形拓扑C. 星型拓扑D. 布线型拓扑4. 在TCP/IP协议中,下列哪个协议用于将IP地址转换为物理地址?B. DHCPC. FTPD. ICMP5. 在计算机网络中,HTTP和HTTPS协议之间的区别是?A. HTTP使用明文传输,HTTPS使用加密传输B. HTTP使用UDP传输,HTTPS使用TCP传输C. HTTP使用IP地址,HTTPS使用域名D. HTTP使用GET请求,HTTPS使用POST请求6. 某计算机的IP地址是192.168.0.1,子网掩码是255.255.255.0,那么该计算机所在的网络号是?A. 192.168.0B. 192.168.0.1C. 192.168.0.255D. 192.168.0.07. 在计算机网络中,下列哪个协议用于将域名解析为IP地址?A. DNSB. FTPC. DHCP8. 在TCP/IP协议中,下列哪个协议用于控制数据传输的可靠性?A. ICMPB. UDPC. FTPD. TCP9. 在计算机网络中,什么是反向代理服务器(Reverse Proxy Server)?A. 将外部网络请求转发给内部服务器的服务器B. 将内部网络请求转发给外部服务器的服务器C. 将HTTP请求转发给HTTPS服务器的服务器D. 将HTTPS请求转发给HTTP服务器的服务器10. 在计算机网络中,下列哪个协议用于电子邮件的发送和接收?A. SMTPB. POP3C. HTTPD. FTP11. 在计算机网络中,下列哪个协议用于文件传输?B. SMTPC. UDPD. TCP12. 以下哪个不是IPv6地址的特点?A. 128位长度B. 冒号分隔的十六进制C. 有固定的网络号和主机号D. 全球唯一的地址13. 在计算机网络中,下列哪个技术不属于无线局域网技术?A. Wi-FiB. BluetoothC. NFCD. 4G14. 在网络中,下列哪个设备用于将不同网段的数据转发到目的主机?A. 集线器B. 路由器D. 网关15. 下列哪个网络拓扑结构具有较高的可容错性和可拓展性?A. 星型拓扑B. 总线型拓扑C. 环形拓扑D. 树型拓扑16. 在计算机网络中,下列哪个协议用于互联网上的主机进行网络配置?A. DHCPB. DNSC. HTTPD. FTP17. 在TCP/IP协议中,下列哪个协议用于检测并纠正数据传输中的错误?A. TCPB. ARPC. ICMPD. UDP18. 下列哪个是网络安全的常见攻击方式之一?A. DDoS攻击B. 数据库攻击C. 剪贴板攻击D. 社会工程学攻击19. 下列哪个不是局域网(LAN)的特点?A. 覆盖范围较小B. 速度较快C. 价格较高D. 结构较简单20. 在计算机网络中,下列哪个协议用于向局域网中的所有主机广播消息?A. UDPB. TCPC. DHCPD. ICMP二、问答题(共5题,每题10分,共50分)1. 请简要介绍HTTP协议的工作原理。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
《计算机网络英语》期末复习试题及答案一选择题1.A ( ) protocol is used to move a datagram over an individual link.A application-layerB transport-layerC network-layerD link-layer2.The units of data exchanged by a link-layer protocol are called ( ).A datagramsB framesC segmentsD messages3.Which of the following protocols is not a link-layer protocol? ( )A EthernetB PPPC HDLCD IP4.In the following four descriptions, which one is not correct? ( )A link-layer protocol has the node-to-node job of moving network-layer datagrams over a single link in the path.B The services provided by the link-layer protocols may be different.C A datagram must be handled by the same link-layer protocols on the different links in the path.D The actions taken by a link-layer protocol when sending and receiving frames include error detection, flow control and random access.5.Which of the following services can not offered by a link-layer protocol? ( )A congestion controlB Link AccessC Error controlD Framing6.( ) protocol serves to coordinate the frame transmissions of the many nodes when multiple nodes share a single broadcast link.A ARPB MACC ICMPD DNS7.In the following four descriptions about the adapter, which one is not correct? ( )A The adapter is also called as NIC.B The adapter is a semi-autonomous unit.C The main components of an adapter are bus interface and the link interface.D The adapter can provide all the link-layer services.8.Consider CRC error checking approach, the four bit generator G is 1011, and suppose that the data D is 10101010, then the value of R is( ).A 010B 100C 011D 1109.In the following four descriptions about random access protocol, which one is not correct? ( )A In slotted ALOHA, nodes can transmit at random time.B In pure ALOHA, if a frame experiences a collision, the node will immediately retransmit it with probability p.C The maximum efficiency of a slotted ALOHA is higher than a pure ALOHA.D In CSMA/CD, one node listens to the channel before transmitting.10.In the following descriptions about MAC address, which one is not correct? ( )A The MAC address is the address of one node’s adapter.B No two adapters have the same MAC address.C The MAC address doesn’t change no matter where the adapter goes.D MAC address has a hierarchical structure.11.The ARP protocol can translate ( ) into ( ). ( )A host name, IP addressB host name, MAC addressC IP address, MAC addressD broadcast address, IP address12.The value of Preamble field in Ethernet frame structure is ( )A 10101010 10101010……10101010 11111111B 10101011 10101011……10101011 10101011C 10101010 10101010……10101010 10101011D 10101010 10101010……10101010 1010101013.There are four steps in DHCP, the DHCP server can complete ( ).A DHCP server discoveryB DHCP server offersC DHCP requestD DHCP response14.In CSMA/CD, the adapter waits some time and then returns to sensing the channel. In the following four times, which one is impossible? ( )A 0 bit timesB 512 bit timesC 1024 bit timesD 1028 bit times15.The most common Ethernet technologies are 10BaseT and 100BaseT. “10” and “100”indicate( ).A the maximum length between two adaptersB the minimum length between two adaptersC the transmission rate of the channelD the transmission rate of the node16.The principal components of PPP include but not( ).A framingB physical-control protocolC link-layer protocolD network-layer protocol17.In the following four options, which service can not be provided by switch? ( )A filteringB self-learningC forwardingD optimal routing18.In the following four services, which one was be required in PPP? ( )A packet framingB error detectionC error correctionD multiple types of link19.The ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces is( ).A filteringB forwardingC self-learningD optimal routing20.In ( ) transmission(s), the nodes at both ends of a link may transmit packets at the same time.A full-duplexB half-duplexC single-duplexD both full-duplex and half-duplex21.Consider the data D is 01110010001, if use even parity checking approach, the parity bit is( ①), if use odd parity checking approach, the parity bit is( ②). ( )A ①0 ②1B ①0 ②0C ①1 ②1D ①1 ②022.In the following four descriptions about parity checks, which one is correct? ( )A Single-bit parity can detect all errors.B Single-bit parity can correct one errors.C Two-dimensional parity not only can detect a single bit error, but also can correct that error.D Two-dimensional parity not only can detect any combination of two errors, but also can correct them.23.MAC address is ( ) bits long.A 32B 48C 128D 6424.Wireless LAN using protocol ( ).A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.1125.The following protocols are belonging to multiple access protocols except for ( ).A channel partitioning protocolsB routing protocolsC random access protocolsD taking-turns protocols26.Which of the following is not belonging to channel partitioning protocols? ( )A CSMAB FDMC CDMAD TDM27.In the following four descriptions about CSMA/CD, which one is not correct? ( )A A node listens to the channel before transmitting.B If someone else begins talking at the same time, stop talking.C A transmitting node listens to the channel while it is transmitting.D With CSMA/CD, the collisions can be avoided completely.28.( ) provides a mechanism for nodes to translate IP addresses to link-layer address.A IPB ARPC RARPD DNS29.A MAC address is a ( )address.A physical-layerB application-layerC link-layerD network-layer30.Which of the following is correct? ( )A No two adapters have the same MAC address.B MAC broadcast address is FF-FF-FF-FF-FF-FF.C A portable computer with an Ethernet card always has the same MAC address, no matter where the computer goes.D All of the above31.In the following four descriptions, which one is not correct? ( )A ARP resolves an IP address to a MAC address.B DNS resolves hostnames to IP addresses.C DNS resolves hostnames for hosts anywhere in the Internet.D ARP resolves IP addresses for nodes anywhere in the Internet.32.In the LAN, ( )protocol dynamically assign IP addresses to hosts.A DNSB ARPC DHCPD IP33.DHCP protocol is a four-step process: ①DHCP request. ②DHCP ACK. ③DHCP server discovery. ④DHCP server offer(s). The correct sequence is ( )A ①②③④B ③②①④C ③④①②D ①④③②34.In the Ethernet frame structure, the CRC field is ( )bytes.A 2B 4C 8D 3235.In the Ethernet frame structure, the Data field carries the ( ).A IP datagramB segmentC frameD message36.In the following four descriptions, which one is not correct? ( )A Ethernet uses baseband transmission.B All of the Ethernet technologies provide connection-oriented reliable service to the network layer.C The Ethernet 10Base2 technology uses a thin coaxial cable for the bus.D The Ethernet 10BaseT technology uses a star topology.37.Ethernet’s multiple access protocol is ( ).A CDMAB CSMA/CDC slotted ALOHAD token-passing protocol38.In the following four descriptions about CSMA/CD, which one is not correct? ( )A An adapter may begin to transmit at any time.B An adapter never transmits a frame when it senses that some other adapter is transmitting.C A transmitting adapter aborts its transmission as soon as it detects that another adapter is also transmitting.D An adapter retransmits when it detects a collision.39.Which of the following descriptions about CSMA/CD is correct? ( )A No slots are used.B It uses carrier sensing.C It uses collision detection.D All of the above.40.The Ethernet 10BaseT technology uses( )as its physical media.A fiber opticsB twisted-pair copper wireC coaxial cableD satellite radio channel41.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( )meters.A 100B 200C 500D 1042.A ( )is a physical-layer device that acts on individual bits rather than on frames.A switchB hubC routerD gateway43.A hub is a ( )device that acts on individual bits rather than on frames.A physical-layerB link-layerC network-layerD ransport-layer44.A switch is a( )device that acts on frame.A physical-layerB link-layerC network-layerD transport-layer45.In the following four descriptions, which one is not correct? ( )A Switches can interconnect different LAN technologies.B Hubs can interconnect different LAN technologies.C There is no limit to how large a LAN can be when switches are used to interconnect LAN segments.D There is restriction on the maximum allowable number of nodes in a collision domain when hubs are used to interconnect LAN segments.46.The ability to determine whether a frame should be forwarded to some interface or should just be dropped is ( ).A filteringB forwardingC self-learningD optimal routing47.Which of the following devices is not a plug and play device? ( )A hubB routerC switchD repeater48.Which of the following devices is not cut-through device? ( )A hubB routerC switchD repeater49.In the following four descriptions, which one is not correct? ( )A Switches do not offer any protection against broadcast storms.B Routers provide firewall protection against layer-2 broadcast storms.C Both switches and routers are plug and play devices.D A router is a layer-3 packet switch, a switch is a layer-2 packet switch.50.Which device has the same collision domain? ( )A HubB SwitchC RouterD Bridge51.IEEE802.2 protocol belong to ( )layerA networkB MACC LLCD physical52.IEEE802.11 protocol defines ( )rules.A Ethernet BusB wireless WANC wireless LAND Token Bus53.In data link-layer, which protocol is used to share bandwidth? ( )A SMTPB ICMPC ARPD CSMA/CD54.When two or more nodes on the LAN segments transmit at the same time, there will be a collision and all of the transmitting nodes well enter exponential back-off, that is all of the LAN segments belong to the same( ).A collision domainB switchC bridgeD hub55.( )allows different nodes to transmit simultaneously and yet have their respective receivers correctly receive a sender’s encoded data bits.A CDMAB CSMAC CSMA/CDD CSMA/CA56.Because there are both network-layer addresses (for example, Internet IP addresses) and link-layer addresses (that is, LAN addresses), there is a need to translate between them. Forthe Internet, this is the job of ( ).A RIPB OSPFC ARPD IP57.PPP defines a special control escape byte, ( ). If the flag sequence, 01111110 appears anywhere in the frame, except in the flag field, PPP precedes that instance of the flag pattern with the control escape byte.A 01111110B 01111101C 10011001D 1011111058.The device ( ) can isolate collision domains for each of the LAN segment.A modemB switchC hubD NIC59.In the following four descriptions about PPP, which one is not correct? ( )A PPP is required to detect and correct errors.B PPP is not required to deliver frames to the link receiver in the same order in which they were sent by the link sender.C PPP need only operate over links that have a single sender and a single receiver.D PPP is not required to provide flow control.60.In the PPP data frame, the( ) field tells the PPP receivers the upper-layer protocol to which the received encapsulated data belongs.A flagB controlC protocolD checksum61.PPP’s link-control protocols (LCP) accomplish ( ).A initializing the PPP linkB maintaining the PPP linkC taking down the PPP linkD all of the above62.The PPP link always begins in the ( ) state and ends in the ( ) state. ( )A open, terminatingB open, deadC dead, deadD dead, terminating63.For( ) links that have a single sender at one end of the link and a single receiver at the other end of the link.A point-to-pointB broadcastC multicastD all of the above64.With ( )transmission, the nodes at both ends of a link may transmit packets at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous65.With ( ) transmission, a node can not both transmit and receive at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous66.Which of the following functions can’t be implemented in the NIC? ( )A encapsulation and decapsulationB error detectionC multiple access protocolD routing67.Which of the following four descriptions is wrong? ( )A The bus interface of an adapter is responsible for communication with the adapter’s parent node.B The link interface of an adapter is responsible for implementing the link-layer protocol.C The bus interface may provide error detection, random access functions.D The main components of an adapter are the bus interface and the link interface. 68.For odd parity schemes, which of the following is correct? ( )A 011010001B 111000110C 110101110D 00011011069.( )divides time into time frames and further divides each time frame into N time slots.A FDMB TMDC CDMAD CSMA70.With CDMA, each node is assigned a different ( )A codeB time slotC frequencyD link71.Which of the following four descriptions about random access protocol is not correct? ( )A A transmission node transmits at the full rate of the channelB When a collision happens, each node involved in the collision retransmits at once.C Both slotted ALOHA and CSMA/CD are random access protocols.D With random access protocol, there may be empty slots.72.PPP defines a special control escape byte 01111101. If the data is b1b201111110b3b4b5, the value is( )after byte stuffing.A b1b20111110101111110b3b4b5B b1b20111111001111101b3b4b5C b5b4b30111111001111101b2b1D b5b4b30111110101111110b2b173.MAC address is in ( ) of the computer.A RAMB NICC hard diskD cache74.Which of the following is wrong? ( )A ARP table is configured by a system administratorB ARP table is built automaticallyC ARP table is dynamicD ARP table maps IP addresses to MAC addresses75.NIC works in ( )layer.A physicalB linkC networkD transport76.In LAN, if UTP is used, the common connector is( ).A AUIB BNCC RJ-45D NNI77.The modem’s function(s) is(are) ( ).A translates digital signal into analog signalB translates analog signal into digital signalC both translates analog signal into digital signal and translates digital signal into analog signalD translates one kind of digital signal into another digital signal78.( )defines Token-Ring protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.279.( )defines Token-Bus protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.280.( ) defines CSMA/CD protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.281.The computer network that concentrated in a geographical area, such as in a building or on a university campus, is ( )A a LANB a MANC a WAND the Internet82.The MAC address is ( ) bits long.A 32B 48C 128D 25683.Which of the following four descriptions about MAC addresses is wrong? ( )A a MAC address is burned into the adapter’s ROMB No two adapters have the same addressC An adapter’s MAC address is dynamicD A MAC address is a link-layer address84.Which of the following four descriptions about DHCP is correct? ( )A DHCP is C/S architectureB DHCP uses TCP as its underlying transport protocolC The IP address offered by a DHCP server is valid foreverD The DHCP server will offer the same IP address to a host when the host requests an IP address85.The ( )field permits Ethernet to multiplex network-layer protocols.A preambleB typeC CRCD destination MAC address86.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( ) meters.A 50B 100C 200D 50087.An entry in the switch table contains the following information excepts for ( )A the MAC address of a nodeB the switch interface that leads towards the nodeC the time at which the entry for the node was placed in the tableD the IP address of a node二、阅读理解The central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, while its speed and capacity have increased tremendously. Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap.The CPU comprises the control unit and the arithmetic / logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices. The ALU performs all the arithmetic and logical (comparison) functions — that is, it adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.Tell whether the following statements are true(T) or false(F) according to the passage A.(根据上文的内容判断下列句子的正误)1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control unit of the CPU. ( )3. The CPU comprises the control unit and memory. ( )4. The control unit performs all the arithmetic and logical (comparison) functions5. The central processing unit (CPU) is the heart of the computer systems. ( )三、翻译下面的文章。