大工14秋《专业英语(计算机英语)》在线测试3,大工15春在线测试答案,大工15春大学英语1,大工15春大学英语2,大工15春大学英语4,大工15春大学英语3,大工15春大学英语,大工博士英语分级考试,大工大学英语2,大工14秋离线作业答案
大工14秋《专业英语(计算机英语)》在线测试3答案
试卷总分:100? ? ? ?测试时间:--单选题 判断题
一、单选题(共?20?道试题,共?80?分。)
V
1.??( ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
??????满分:4??分
2.??( ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
??????满分:4??分
3.??( ) is a way of transferring files over the Internet from one computer to another.
A. Internet
B. FTP
C. E-mail
D. ISP
??????满分:4??分
4.??Which one is a word processing and text editing tool?( )
A. Photoshop
B. Word
C. Extreme 3D
D. Premiere
??????满分:4??分
5.??The ( ) was the precursor to the Internet. Developed in the late 1960's and early 1970's by the U.S. Department of Defence as an experiment in wide-area-networking that would survive a nuclear war.
A. ARPANET
B. Apple
C. Microsoft
D. None of the above
??????满分:4??分
6.??( ), referring to a person who breaks into computer systems for the challenge or steal computer resources or corrupt a computer's data.
A. Hacker
B. Password
C. DES
D. Authenticate
??????满分:4??分
7.??( ) is a protocol that lets a user log in to a remote computer and use programs and data that the remote owner has made available, just as if it were their own computer.
A. FTP
B. WWW
C. Telnet
D. NSFNET
??????满分:4??分
8.??( ) stands for "World Wide Web"; it is the large global collection of Internet servers which support hypertext documents coded in HTML, and transferred via HTTP.
A. Internet
B. WWW
C. ARPANET
D. ISP
??????满分:4??分
9.??( ) ,conversion of either encoded or enciphered text into plaintext.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
??????满分:4??分
10.??( ), the process of changing plaintext data into enciphered text through an algorithm.
A. Decrypt
B. Encryption
C. Authe