该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
计算机英语考试卷
一.翻译
1.缩写: (每小题2分,共10分)
例:NT :New Technology 软件新技术
(1).CPU :_____________________ _______________________
(2).FEP :_____________________ _______________________
(3).GUI :_____________________ _______________________
(4).DP :_____________________ _______________________
(5).RISC :_____________________ _______________________
2.术语翻译:(每小题2分,共20分)
Host :____________________
Circuit breaker :____________________
Primary storage :____________________
Surge protractor :____________________
Computer virus : ____________________
副本 :____________________
磁盘驱动器 :____________________
视频显示器 :____________________
差分机 :____________________
纸带阅读机 :____________________
3. 翻译句子:(每小题3分,共15分)
(1)The parts of the CPU are usually connected by an electronic component referred to as a bus , which acts as an electronic highway between them.
(2)As one computer generation has evolved to the next ,the size of the computer has become smaller ,while its speed and capacity have increased tremendously.
(3)Each layer of programs performs specialized functions for your computer system, and all are examples of the kinds of software that can run on your computer.
(4)If your computer does not have the memory to meet the needs of your active program, the OS/2 operating system transfers the least-used information from memory onto the hard disk to make more memory available.
(5) Using a hard disc ,your computer can save and retrieve information much faster than with a diskette drive.
二.完型填空: (每空2分,共30分)
dial-back punch password guard oftentimes
identification security access preauthorize external
internal firewall buffer evaluate unauthorized
Security experts are constantly devising ways to protect computer systems from access by unauthorized persons. Sometimes ___1____ is a matter of putting ___2____on company computer rooms and checking the _____3____of everyone admitted. ____4____it is a matter of being careful about assigning passwords to people and of changing them when people leave a compony.____5____are secret words or numbers that must be keyed into a computer system to gain ____6____.In some ____7____computer systems, the user telephones the computer, ____8____in the correct password, and hangs up. The computer then calls back at a certain _____9_____ number.
Most major corporations today use special hardware and software called ____10____ to control access to their ____11____ computer networks. These firewalls act as a security ___12____between the corporation’s private network and all ____13____ network, including the internet. All electronic communications coming into and leaving the corporation must be ____14____ by the firewall. Security is maintained by denying access to ___15_____ communications.
三.作文(200字左右)(25分)