自考计算机专业英语(一)选择 填空
发布日期:2015-09-25 点击次数:3086
内容提要:
作者:吉大自考网 www.jdzkw.com.cn
关键词:吉大自考 计算机应用软件
报名方式:13620791345 许老师 0431-85690458
计算机应用软件(本科) 专业代码:080762 主考学校:吉林大学
计算机专业英语(一)(07757) 选择 填空
单选题
1. How many basic units do today's digital computers consist of?
A. 4 B .5 C. 6 D. 7
2. Which of the following doesn't belong to the basic unit of a digital computer?
A. memory B. operating system C. ALU D. CPU
3. Which of the following reads the data and the computing instructions into the computer and prints out the results?
A. operating system B .Special software C. memory D. input/output unit
4. What two parts does the CPU of a computer include?
A. the ALU and system clock B. the ALU and the controller
C. the ALU and memory D. the ALU and the input/out devices
5. What are the two major gauges used to access the performance of a CPU?
A. the word length and the memory B. the width of the bus and the memory
C. the word length and the system clock D. the width of the bus and the word length
6. Which of the following doesn't belong to the internal memory of a computer?
A. the virtual memory B. the hard disk C. the buffer D. the ROM
7. The quality of the computer display depends on which of the following?
A. the resolution of a CRT B. the price of a CRT C. the material of a CRT D. the size of a CRT
8. LCD is based on which of the following?
A. CRT B. CPU C. TFT D. monitor
9. Which of the following is NOT the advantage of a LCD?
A. space-sensitiveness B .weight C. fewer rays D. price
10. Which of the following does NOT belong to computer softcopy output?
A. audio B. video C. data on paper D. data on a CRT
11. Which of the following is NOT one of the most commonly used storage devices?
A. a U-disk B. a hard disk C. a floppy disk D. a disk drive
12. Which of the following prevents floppies from getting hot?
A. capacity and price B. price and material C. capacity and speed D. speed and material
13. Which of the following is NOT one of the advantages of a hard disk?
A. speed B. portability C. material D. capacity
14. Which of the following does NOT belong to a hard disk drive?
A. internal disk drive B. external disk drive C. removable disk drive D. CD drive
15. Which of the following does NOT belong to application software?
A. word processor B. electronic spreadsheet C. graphic program D. Backup program
16. Where is the application software stored on?
A. RAM B. hard disk C. ROM D. buffer
17. Which of the following is the most important type of system software?
A. system utility B. language compiler C. anti-virus program D. operating system
18. Where is the operating system loaded when a computer is powered on?
A. buffer B. RAM C. ROM D. hard disk
19. Which of the following feature of a word processor allows users to locate a particular word or phrase?
A. word searching B. grammar checking C. word counting D. spell checking
20. Which of the following is NOT the real strength of a word processor?
A. storing data B. changing data C. retrieving data D. compiling data
21. Which of the following feature of a word processor becomes more useful with the growth of the amount of text?
A. wording searching B. grammar checking C. word counting D. spell checking
22. Which of the following feature of a word processor can show underline, bold, italic, font and other typing styles on the screen?
A. WYSIWGY B. WYSIWYG C. WSYIWYG D. WYSWIYG
23. Which of the following does NOT belong to hidden characters or commands?
A. retrieval B. spaces C. returns D. paragraph endings
24. Before typing in any data, a user needs to .
A. edit the cell B .save the cell C. select the cell D. change the cell
25. Each cell of a worksheet can hold_______.
A. one piece of data B. two pieces of data C. three pieces of data D. four pieces of data
26. Where is the Entry Bar of a worksheet?
A. below the icons of the worksheet B. above the icons of the worksheet
C. at the left of the icons of the worksheet D. at the right of the icons of the worksheet
27. All functions in spreadsheets start with ________.
A. a dollar sign B. an equal sign C. question mark D. star
28. Which of the following can NOT be created by spreadsheets?
A. bar chart B. start chart C. three-dimensional chart D. pie chart
29. Which of the following message can be sent by E-mail without an attachment?
A. text message B. graphical message C. audio message D. video message
30. Which of the following can be applied for an E-mail message without an attachment?
A. bold B. underline C. italics D. none
31. Which of the following does NOT belong to one of the E-mail advantages?
A. instantaneousness B. efficiency C. group sending feature D. none
32. A private network-based E-mail system is not for ________.
A. corporate users B. home users C. school users D. hospital users
33. An E-mail server can be considered as a _________.
A. powerful operating system B. high-duty database system
C. high-configuration computer D. practical Internet application
34. Which of the following is called a searching engine?
A. Web server B. Web browser C. Web site D. Web address
35. Which of the following is NOT an Internet application?
A. IRC B. audio chatting C. file compiling D. video chatting
36. To start an online chatting, a user needs to know________.
A. the software name of an IRC client B. the Web service provider of an IRC client
C. the program name of an IRC client D. the Web address of an IRC client
37. Once a user starts an IRC client, the server on the IRC service provider side will provide the user a________.
A. channel B. server C. hardware D. program
38. What does the WWW stand for?
A. World Wide Web B. World Wide Work C. World Wide Watch D. World Wide Wave
39. Which of the following is the primary function of the WWW?
A. accessing resources B. sending and receiving E-mails
C. IRC D. Video conferencing
40. Which of the following is NOT supported by the WWW?
A. Gopher B. FTP C. Usenet D. File compiling
41. To accommodate a binary number, which of the following of a computer doesn't have more digits than those for decimal numbers do?
A register B. bus C. port D. keyboard
42. Which of the following unit provides signals to start the operations in the ALU, the memory and the input/output unit?
A. logical unit B. arithmetic unit C. input/output unit D. control unit
43. What does IC stand for?
A. Intelligent Card B. Intelligent Circuit C. Integrated Card D. Integrated Circuit
44. How many the most influential components does a computer system configuration include?
A. 3 B. 4 C. 5 D. 6
45. Which of the following does NOT belong to one of the most influential components of a computer system configuration?
A. the memory B. the operating system
C. the input/output devices D. the storage devices
46. Which of the following memory will lose the data stored in it when the power is gone or a malfunction occurs?
A. the ROM B. the virtual memory
C. the RAM D. the buffer
47. The permanently useful data is stored in which of the following
memory?
A. the ROM B. the virtual memory C. the RAM D. the buffer
48. Which of the following does NOT belong to a computer hardcopy output?
A. a graph B. a photo C. a text files D. voice
49. Which of the following does NOT belong to a computer hardcopy output device?
A. a plotter B. a monitor C. an ink-jet printer D. a laser printer
50. Which of the following belongs to an impact computer hardcopy output device?
A. a plotter B. an ink-jet printer C. a laser printer D. monitor
51. Which of the following is the major advantage of a DVD-ROM over a CD-ROM?
A. portability B. price C. material D. capacity
52. Which of the following is the major advantage of a CD-R or a CD-RW over a CD-ROM or a DVD-ROM?
A. speed B. price C. material D. writing data
53. Which of the following is the major advantage of a U-disk over a hard disk?
A. speed B. price C. easy to carry D. writing data
54. Which of the following is NOT one of the most commonly used software-relevant terminologies?
A. data B. program C. operating system D. application software
55. Which of the following is the most fundamental concept of computer software?
A. operating system B. program C. application software D. system software
56. What is a computer program?
A. a set of operations and tasks B. a set of operations and data
C. a set of tasks and data D. a set of instructions
57. Which of the following does NOT belong to computer system software?
A. operating system B. system utility
C. word processing program D. language compiler
58. Which function of a word processor can ensure typing correctness?
A. hidden commands B. typeface C. spell checking D. space
59. What do users need to do with the spell-checked files to ensure their correctness?
A. proof check B. proofread C. through check D. double-check
60. Which of the following is NOT one of a word processor's functions?
A. spell-checking typed text B. grammar checking typed text
C. compiling typed text D. counting typed text
61. Which function of a word processor gives users another chance to consider what they have written?
A. spell-checking B. word counting C. grammar checking D. word locating
62. What can users do with vertical and horizontal rolling strips?
A. view a spreadsheet B. change a spreadsheet
C. edit a spreadsheet D. store a spreadsheet
63. Where are the vertical and horizontal rolling strips?
A. left and bottom of a worksheet B. left and top of a worksheet
C. right and bottom of a worksheet D. right and top of a worksheet
64. What does a worksheet mean?
A. a working area framed by vertical and horizontal rolling strips B. an EXCEL program
C. EXCEL software D. a working area framed by letters and numbers
65. The intersection of each row and column in a worksheet is called_____.
A. corner B. working area C. working element D. cell
66. Which of the following does a user need to get first before he/she can start exchanging messages?
A. an E-mail account B. Internet access C. Web server D. Web site
67. Who is responsible for setting up E-mail accounts?
A. office admin B. network admin C. office manager D. network manager
68. Where do Internet users get their E-mail accounts?
A. network manager B. network supervisor C. ISP D. E-mail server
69. Normally, how long does a user need to wait until his/her E-mail account is ready if he/she applies for it from an ISP ?
A. no time B. one hour C. one day D. one week
70. Which of the following is for modem Internet connection?
A. 56K B. 128K C. 1.54M D. 45M
71. Which of the following is for home Internet connections?
A. modem and ADSL B. T1 and modem C. T1 and ADSL D. T1 and T3
72. Which of the following is primarily for enterprise Internet connections?
A. modem and ADSL B. T1 and modem C. T1 and ADSL D. T1 and T3
73. Which of the following allows the TCP/IP to work with user's modem or ADSL adapter?
A. PPP drive B. PPP server C. PPP driver D. PPP operating system
74. The WWW is based on which of the following standards?
A. computer-computer model B. client-server model
C. computer-network model D. user-computer model
75. What does the HTML stand for?
A. Hypertext Making Language B. Hypertext Making Links
C. Hypertext Markup Language D. Hypertext Markup Links
76. Which of the following allows users to jump from one document to another?
A. HTTP B. WWW C. HTML D. Web server
77. Which of the following is responsible for how to extract the documents from Web servers?
A. HTTP B. WWW C. HTML D. Web server
78. Which of the following is NOT one of the advantages of a hard disk?
A. speed B. portability C. material D. capacity
79. Which of the following stores the intermediate results of computation?
A. register B. memory C. bus D. input/output unit
80. Which of the following is the smallest unit in a binary system?
A. bit B. byte C. word D. 0
81. Which of the following is needed to store 1 or 0 ?
A. “write" current B. "write" voltage C. “write" control unit D. "write" register
82. Which of the following memory is the most powerful one?
A. None B. ROM C. PROM D. EPROM
83. When a CPU needs the data to operate, it goes where first?
A. the buffer B. the RAM C. the ROM D. the virtual memory
84. Which of the following is an extension of the RAM?
A. the buffer B. the RAM C. the ROM D. the virtual memory
85. Which of the following is NOT a computer input\output device?
A. keyboard B. scanner C. printer D. CPU
86. Which of the following is NOT available in the current marker?
A. 101-key keyboard B. 104-key keyboard C. 107-key keyboard D. ll0-key keyboard
87. Which of the following cannot be scanned by a scanner?
A. a disk B. a file C. a graph D. a photo
88. Which of the following is NOT one of the advantages of optical disks over removable disks?
A. A removable disk is inconvenient to remove from a computer.
B. A removable disk is inconvenient to attach to a computer.
C. The data stored on a removable disk can be damaged when
it is transported through metal detectors.
D. The spinning speed of a removable disk is slow.
89. Which of the following is the most commonly used optical disk?
A. DVD-ROM B. CD-ROM C. CD-R D. C D-RW
90. When memory is .its contents are changed.
A. written B. accessed C. read D. it's always changed
91. Which of the following does NOT belong to a computer hardcopy output?
A. a graph B. a photo C. a text file D. voice
92. Which of the following does NOT belong to a computer hardcopy output device?
A. a plotter B. a monitor C. an ink-jet printer D. a laser printer
93. How many the most influential components does a computer system configuration include?
A. 3 B. 4 C. 5 D. 6
94. Which of the following is the major advantage of a U-disk over an optical disk?
A. material B. price C. easy to carry D. easy to read and write data
95. Which of the following does NOT belong to system utility?
A. Backup program B. Disk Cleanup program C. operating system D. anti-virus program
96. System software functions as an interface medium between_______.
A. hardware and application software B. hardware and system utilities
C. software and operating system D. hardware and operating system
97. Which of the following does NOT belong to typefaces or format characteristics?
A. margins B. indent C. double-space D. space
98. How many rows and columns are there in a single spreadsheet?
A. 65533 and 253 B. 65534 and 254 C. 65535 arid 255 D. 65536 and 256
99. Which of the following must be unique for E-mail applications?
A. password B. ISP's name C. E-mail server's name D. user name
100. A protocol is a set of _________.
A. drives B. servers C. drivers D. regulations
101. A Web browser is a piece of ___________.
A. data B. software C. driver D. regulations
102. Which of the following is responsible for presenting the accessed documents to the users?
A. Web browser B. Web server C. Web site D. Web address
103. What does HTTP stand for?
A. Hypertext Translation Protocol B. Hypertext Transfer Protocol
C. Hypertext Transportation Protocol D. Hypertext Transmission Protocol
104. Which of the following allows Web servers and browsers to extract hypermedia documents?
A. HTML B. WWW C. HTTP D. Internet
105. Each cell of a worksheet can hold _________.
A. one piece of data B. two pieces of data C. three pieces of data D. four pieces of data
106. All functions in spreadsheets start with ___________.
A. a dollar sign B. an equal sign C. question mark D. star
107. An E-mail server can be considered as a__________ .
A. powerful operating system B. high-duty database system
C. high-configuration computer D. practical Internet application
108. Who is responsible for setting up E-mail accounts?
A. office admin B. network admin C. office manager D. network manager
109. Where do Internet users get their E-mail accounts?
A. network manager B. network supervisor C. ISP D. E-mail server
110. Normally, how long does a user need to wait until his/her E-mail account is ready if he/she applies for it from an ISP ?
A. no time B. one hour C. one day D. one week
111. Which of the following is NOT one of the most commonly used software-relevant terminologies?
A. data B. program C. operating system D. application software
112. A computer processes __________ into_______.
A. information/data B. data/information C. facts/data D. information/facts
113. Data flow into the computer as .
A. output B. a program C. a process D. input
114. Information flows from a computer as _________.
A. output B. memory C. a program D. input
115. The ________distinguishes a computer from a calculator.
A. processor B. stored program C. memory D. output
116. Data and program instructions are stored in ________ .
A. the processor B. an output device C. the stored program D. memory
117. The computer component that actually manipulates the data is_____.
A. main memory B. an input device C. the processor D. an output device
118. The physical components of a computer are collectively called_____.
A. peripherals B. software C. boards D. hardware
119. Programs are known collectively as_________.
A . secondary storage B . software C . stored programs D . hardware
120. A physical switch is ; its setting is .
A. software/hardware B. hardware/software C. hardware/data D. data/information
121. A _________ holds enough bits to store a single character.
A. word B. byte C. bit D. chip
122. A __________is a group of _________
A. bit/bytes B. byte/words C. word/bytes D. character/bytes
123. The " digit-times-place-value "rule work, with but not with____.
A. numbers/ characters B. bits/bytes C. bytes/words D. characters/numbers
124. A location in memory is accessed by its_________.
A. address B. value C. content D. register
125. When memory is .its contents are not changed.
A. written B. accessed C. read D. it's always changed
126. The programmer can read and write .
A. ROM B. RAM C. words D. bytes
127. What type of memory can only be read?
A. registers B. ROM C. RAM D. words
128. The processor fetches and executes________.
A. clock pulses B. data C. instructions D. information
129. The part of an instruction that tells the processor what to do is the _____.
A. operand B. pulse C .statement D. operation code
130. The processor's, components are synchronized by_______.
A. instructions B. data C. information D. clock pulses
131. Which processor component executes instructions?
A. instruction register B. instruction control unit
C. arithmetic and logic unit D. main memory
132. The basic input device on a small computer is a _______ .
A. display screen B. printer C. keyboard D. card reader
133. The basic output device on a small computer is a_______ .
A. keyboard B. display screen C. diskette D. plotter
134. A generates hard- copy output.
A. display unit B. screen C. monitor D. printer
135. A display screen is divided into a grid of ________.
A. bytes B. bits C. pixels D. words
136. External devices are linked to a small computer system through____.
A. channels B. control units C. plugs D. interfaces
137. The translates between the computer's internal codes and a peripheral device's external codes.
A. processor B. interface
C. memory D. register
138. A terminal communicates with a distant computer over data transmission lines.
A. remote B. display C. printing D. local
139. The interference that distorts electronic signals transmitted over a distance is called______.
A. static B. interference C. noise D. a spike
140. network can be worldwide.
A. Wide area B. Metropolitan area C. Local area D. Campus area
141. networks usually span tens of kilometers.
A. Wide area B. Metropolitan area C. Local area D. Ethernet
142. The Open Systems Interconnection (OSI)reference model is based on a proposal developed by_________.
A. ANSI B. IEEE C. IAB D. ISO
143. is concerned with controlling the operation of the subnet.
A. The transport layer B. The network layer C. The application layer D. The data link layer
144. is concerned with transmitting raw bits over a communication channel.
A. The physical layer B. The presentation layer C. The network layer D. The data link layer
145. The main task of is to transform a raw transmission facility into a line that appears free of undetected transmission errors to the network layer.
A. The physical layer B. The session layer C. The network layer D. The data link layer
146. allows users on different machines to establish sessions between them.
A. The physical layer B. The session layer C. The network layer D. The data link layer
147. The _________ serves as a hardware/software interface.
A. system B. Application program C control unit D. operating system
148. The source of a computer’s logic is __________.
A. hardware B. software C. data D. the user
149. A disk drive is limited to a few_______.
A. tasks B. program functions C. primitive operations D. I/O operations
150. Programmers write ________code.
A. object B. source C.
machine-level D. load module
填空题:
1.. Thread is sometimes called lightweight process.
2.A collection that stores objects of the same data type is referred to as a homogeneous collection.
3.A virus scanner is a program that is designed to check an entire computer system for known viruses or suspicious activity.
4、 A stack is a list of items that are accessible at only one end of the list.
5、 Electronic Business is the integration of IT and particularly the Internet into business processes to change organizations and create new ones.
3. Cache memory is employed by computer designers to increase the computer6system throughput .
7.The operating system acts as the manager of system resources and allocates them to specific programs and users as necessary for their tasks.
8、 Hubs can be categorized as either CSMA/CD or full-duplex repeaters.
9、 Frequency division multiplexing (FDM) is the technical term applied to a network system that uses multiple carrier frequencies to allow independent signals to travel through a medium.
10、The Unified Modeling Language(UML) is a graphical language for visualizing , specifying , constructing , and documenting the artifacts of a software-intensive system.
11、 Data query uses a set of commands to explore the database contents and allows the user to convert the raw data into useful information.
9. Another important object-oriented concept that relates to the class hierarchy is that common messages can be sent to the parent class objects and all derived subclass objects. In formal terms, this is called polymorphism .
10.An entity is an object , which can be uniquely distinguished from other objects.
6.Remote teleworkers also have the option to have an ISDN line installed to their home or office , linking them to the corporate Intranet via a local internet service provider(ISP) .
11. In predicate calculus , each predicate is given a name , which is followed by the list of arguments.
12. Virtual functions utilize a table for address information.
13.The MAC sublayer defines the Carrier Sense Multiple Access with Collision Detection protocol , which made Ethernet famous.
14.Pages are viewed with a browser .
15. An expert system’s knowledge is obtained from expert sources and coded in a form suitable for the system to use in its inference or reasoning processes.
16. Windows managers manage the devices used to exchange information between applications and users.
17. Methods are similar to the functions of procedure-oriented programming.
The C++ class actually serves as a template or pattern for creating objects.
18. The private section of a class limits the availability of data or methods to the class itself.
19. Flash memory is intermediate between EPROM and EEPROM in bith cost and functionality.
20. Inheritance in object-oriented programming allows a class to inherit properties from a class of objects.
21.The Entity-Relationship model( E-R model ) is based on a perception of a real world which consists of objects called entities and relationships among these objects.
22.Linux is an operating system , which acts as a communication service between the hardware and the software of a computer system.
23. Spooling provides a pool of jobs which have been read and waiting to be run.
24. Data management uses a set of commands to enter , correct , delete , and update data within the database tables.
25. The pattern of the oscillation is called a waveform .
26. Moore observed that the number of transistors that could be put on a single chip was doubling every year and 27. To reduce design complexity , most networks are organized as a series of layer( levels ) , each one built upon the one below it.
28.correctly predicted that this pace would continue into the near future.
29 Thread is sometimes called lightweight process.
30.A collection that stores objects of the same data type is referred to as a homogeneous collection.
31.A virus scanner is a program that is designed to check an entire computer system for known viruses or suspicious activity.
32.A stack is a list of items that are accessible at only one end of the list.
33. Electronic Business is the integration of IT and particularly the Internet into business processes to change organizations and create new ones.
34.Cache memory is employed by computer designers to increase the computer system throughput .
35.The operating system acts as the manager of system resources and allocates them to specific programs and users as necessary for their tasks.
36. Hubs can be categorized as either CSMA/CD or full-duplex repeaters.
37. Frequency division multiplexing ( FDM ) is the technical term applied to a network system that uses multiple carrier frequencies to allow independent signals to travel through a medium.
38The Unified Modeling Language( UML) is a graphical language for visualizing , specifying , constructing , and documenting the artifacts of a software-intensive system.
39、 Data query uses a set of commands to explore the database contents and allows the user to convert the raw data into useful information.
40、 Another important object-oriented concept that relates to the class hierarchy is that common messages can be sent to the parent class objects and all derived subclass objects. In formal terms, this is called polymorphism .
41、An entity is an object , which can be uniquely distinguished from other objects.
42、Remote teleworkers also have the option to have an ISDN line installed to their home or office , linking them to the corporate Intranet via a local internet service provider(ISP) .
43 、In predicate calculus , each predicate is given a name , which is followed by the list of arguments.
44 、Virtual functions utilize a table for address information.
45、The MAC sublayer defines the Carrier Sense Multiple Access with Collision Detection protocol , which made Ethernet famous.
46、Pages are viewed with a browser .
47、An expert system’s knowledge is obtained from expert sources and coded in a form suitable for the system to use in its inference or reasoning processes.
48、 Windows managers manage the devices used to exchange information between applications and users.
49、 Methods are similar to the functions of procedure-oriented programming.
50、The C++ class actually serves as a template or pattern for creating objects.
51、The private section of a class limits the availability of data or methods to the class itself.
52. Flash memory is intermediate between EPROM and EEPROM in bith cost and functionality.
53. Inheritance in object-oriented programming allows a class to inherit properties from a class of objects.
54.The Entity-Relationship model(E-R model) is based on a perception of a real world which consists of objects called entities and relationships among these objects.
55.Linux is an operating system , which acts as a communication service between the hardware and the software of a computer system.
56. Spooling provides a pool of jobs which have been read and waiting to be run.
57. Data management uses a set of commands to enter , correct , delete , and update data within the database tables.
58.The pattern of the oscillation is called a waveform .
59. Moore observed that the number of transistors that could be put on a single chip was doubling every year and 27. To reduce design complexity , most networks are organized as a series of layer( levels) , each one built upon the one below it.
60..correctly predicted that this pace would continue into the near future.
上一条:吉大自考 计算机专业英语(一) 阅读理解
下一条:吉大自考本计算机专业英语(一)名词解释