我们系有个计算机中心英语,吉大自考计算机专业英语(一)

计算机专业英语(一)14日14:30-17:00共11页(内部资料严禁外泄)

第一部分

I.Multiple choices

1. Which of the following feature of a word processor becomes more useful with the growth of the amount of text? ( A )

A. wording searching

B. grammar checking

C. word counting

D. spell checking

2. Which of the following feature of a word processor can show underline, bold, italic, font and other typing styles on the screen? (B)

A. WYSIWGY

B. WYSIWYG

C. WSYIWYG

D. WYSWIYG

3. Which of the following does NOT belong to hidden characters or commands?(A)

A. retrieval

B. spaces

C. returns

D. paragraph endings

4. Before typing in any data, a user needs to C .

A. edit the cell B .save the cell

C. select the cell

D. change the cell

5. Each cell of a worksheet can hold____A___.

A. one piece of data

B. two pieces of data

C. three pieces of data

D. four pieces of data

6. Where is the Entry Bar of a worksheet?(A)

A. below the icons of the worksheet

B. above the icons of the worksheet

C. at the left of the icons of the worksheet

D. at the right of the icons of the worksheet

7. All functions in spreadsheets start with ____B____.

A. a dollar sign

B. an equal sign

C. question mark

D. star

8. Which of the following can NOT be created by spreadsheets?(B)

A. bar chart

B. start chart

C. three-dimensional chart

D. pie chart

9. Which of the following message can be sent by E-mail without an attachment? (A)

A. text message

B. graphical message

C. audio message

D. video message

10. Which of the following can be applied for an E-mail message without an attachment? (D)

A. bold

B. underline

C. italics

D. none

11. Which of the following does NOT belong to one of the E-mail advantages? (D)

A. instantaneousness

B. efficiency

C. group sending feature

D. none

12. A private network-based E-mail system is not for ___B_____.

A. corporate users

B. home users

C. school users

D. hospital users

13. An E-mail server can be considered as a ____C_____.

A. powerful operating system

B. high-duty database system

C. high-configuration computer

D. practical Internet application

14. Which of the following is called a searching engine?(B)

A. Web server

B. Web browser

C. Web site

D. Web address

15. Which of the following is NOT an Internet application?(C)

A. IRC

B. audio chatting

C. file compiling

D. video chatting 16. To start an online chatting, a user needs to know____D____.

A. the software name of an IRC client

B. the Web service provider of an IRC client

C. the program name of an IRC client

D. the Web address of an IRC client

17. Once a user starts an IRC client, the server on the IRC service provider side will provide the user a____A____.

A. channel

B. server

C. hardware

D. program

18. What does the WWW stand for?

(A)

A. World Wide Web

B. World Wide Work

C. World Wide Watch

D. World Wide Wave

19. Which of the following is the primary function of the WWW? (A)

A. accessing resources

B. sending and receiving E-mails

C. IRC

D. Video conferencing

20. Which of the following is NOT

supported by the WWW? (D)

A. Gopher

B. FTP

C.

Usenet D. File compiling

21. To accommodate a binary number,

which of the following of a computer

doesn't have more digits than those for

decimal numbers do? (D)

A register B. bus C.

port D. keyboard

22. Which of the following unit

provides signals to start the operations

in the ALU, the memory and the

input/output unit? (D)

A. logical unit

B. arithmetic unit

C. input/output unit

D. control

unit

23. What does IC stand for? (B)

A. Intelligent Card

B. Intelligent

Circuit C. Integrated Card D.

Integrated Circuit

24. How many the most influential

components does a computer system

configuration include?(B)

A. 3

B. 4

C. 5

D. 6

25. Which of the following does NOT

belong to one of the most influential

components of a computer system

configuration? (B)

A. the memory

B. the

operating system

C. the input/output devices

D. the storage devices

26. Which of the following memory

will lose the data stored in it when the

power is gone or a malfunction occurs?

(C)

A. the ROM

B. the virtual

memory C. the RAM

D. the buffer

27. The permanently useful data is

stored in which of the following(A)

memory?

A. the ROM

B. the virtual

memory C. the RAM D.

the buffer

28. Which of the following does NOT

belong to a computer hardcopy output?

(D)

A. a graph

B. a photo

C. a text files

D. voice

29. Which of the following does NOT

belong to a computer hardcopy output

device? (B)

A. a plotter

B. a monitor

C. an ink-jet printer

D. a laser

printer

30. Which of the following belongs to

an impact computer hardcopy output

device? (A)

A. a plotter

B. an ink-jet

printer C. a laser printer D.

monitor

31. Which of the following is the

major advantage of a DVD-ROM over

a CD-ROM? (D)

A. portability

B. price

C. material

D. capacity

32. Which of the following is the

major advantage of a CD-R or a

CD-RW over a CD-ROM or a

DVD-ROM? (D)

A. speed

B. price

C. material

D. writing data

33. Which of the following is the

major advantage of a U-disk over a

hard disk? (C)

A. speed

B. price

C.

easy to carry D. writing

data

34. Which of the following is NOT

one of the most commonly used

software-relevant terminologies? (A)

A. data

B. program

C. operating system

D.

application software

35. Which of the following is the most

fundamental concept of computer

software? (B)

A. operating system

B.

program C. application software

D. system software

36. What is a computer program? (D)

A. a set of operations and tasks

B. a set of operations and data

C. a set of tasks and data

D. a set of instructions

37. Which of the following does NOT

belong to computer system software?

(C)

A. operating system

B. system utility

C. word processing program

D. language compiler

38. Which function of a word

processor can ensure typing

correctness?(C)

A. hidden commands

B.

typeface C. spell checking

D. space

39. What do users need to do with the

spell-checked files to ensure their

correctness?(B)

A. proof check

B. proofread

C. through check

D. double-check

40. Which of the following is NOT

one of a word processor's

functions?(C)

A. spell-checking typed text

B. grammar checking typed text

C. compiling typed text

D. counting typed text

41. Which of the following is NOT

one of the most commonly used

software-relevant terminologies? (A)

A. data

B. program

C.

operating system D. application

software

42. A computer processes __________

into____B___.

A. information/data

B.

data/information C. facts/data D.

information/facts

43. Data flow into the computer as

D .

A. output

B. a program

C. a

process D. input

44. Information flows from a

computer as ____A_____.

A. output

B. memory

C.

a program D. input

45. The ___B_____distinguishes a

computer from a calculator.

A. processor

B. stored program

C. memory

D. output

46. Data and program instructions are

stored in ___D_____ .

A. the processor

B. an output

device C. the stored program D.

memory

47. The computer component that

actually manipulates the data

is__C___.

A. main memory

B. an input

device C. the processor

D. an output device

48. The physical components of a

computer are collectively

called__D___.

A. peripherals

B. software

C. boards

D. hardware

49. Programs are known collectively

as____B_____.

A . secondary storage

B .

software C . stored programs

D . hardware

50. A physical switch is

B ; its setting is .

A. software/hardware

B.

hardware/software C. hardware/data

D. data/information

51. A ____B_____ holds enough bits

to store a single character.

A. word

B. byte

C. bit

D. chip

52. A __________is a group of

____C_____

A. bit/bytes

B. byte/words

C. word/bytes

D. character/bytes

53. The " digit-times-place-value "rule

work, with but not with__A__.

A. numbers/ characters

B.

bits/bytes C. bytes/words D.

characters/numbers

54. A location in memory is accessed

by its____A_____.

A. address

B. value

C. content

D. register

55. When memory is

C .its contents are not

changed.

A. written

B. accessed

C. read

D. it's always changed

56. The programmer can read and

write B .

A. ROM

B. RAM

C. words

D. bytes

57. What type of memory can only be

read? (B)

A. registers

B. ROM

C. RAM

D. words

58. The processor fetches and

executes____C____.

A. clock pulses

B. data

C. instructions

D. information

59. The part of an instruction that tells

the processor what to do is the

___D__.

A. operand

B. pulse

C .statement D. operation code

60. The processor's, components are

synchronized by___D____.

A. instructions

B. data

C.

information D. clock pulses

61. Which processor component

executes instructions? (C)

A. instruction register

B.

instruction control unit

C. arithmetic and logic unit

D. main

memory

62. The basic input device on a small

computer is a ___C____ .

A. display screen

B.

printer C. keyboard D.

card reader

63. The basic output device on a small

computer is a____B___ .

A. keyboard

B. display

screen C. diskette

D. plotter

64. A D generates hard-

copy output.

A. display unit

B. screen

C. monitor

D. printer

65. A display screen is divided into a

grid of ____C____.

A. bytes

B. bits

C. pixels

D. words

66. External devices are linked to a

small computer system through__B__.

A. channels

B. control

units C. plugs

D. interfaces

67.The D translates

between the computer's internal codes

and a peripheral device's external

codes.

A. processor

B. interface

C. memory

D. register

68. A A terminal

communicates with a distant computer

over data transmission lines.

A. remote

B.

display C. printing

D. local

69. The interference that distorts

electronic signals transmitted over a

distance is called__C____.

A. static

B.

interference C. noise

D. a spike

70. A network can be

worldwide.

A. Wide area

B. Metropolitan

area C. Local area D.

Campus area

71. B networks

usually span tens of kilometers.

A. Wide area

B. Metropolitan

area C. Local area D.

Ethernet

72. The Open Systems Interconnection

(OSI)reference model is based on a

proposal developed by____D_____.

A. ANSI

B. IEEE

C. IAB

D. ISO

73. B is concerned

with controlling the operation of the

subnet.

A. The transport layer

B. The

network layer C. The application

layer D. The data link layer

74. A is concerned

with transmitting raw bits over a

communication channel.

A. The physical layer

B. The

presentation layer C. The network

layer D. The data link layer

75. The main task of D

is to transform a raw transmission

facility into a line that appears free of

undetected transmission errors to the

network layer.

A. The physical layer

B. The

session layer C. The network layer

D. The data link layer

76. B allows users

on different machines to establish

sessions between them.

A. The physical layer

B. The

session layer C. The network layer

D. The data link layer

77. The ____D_____ serves as a

hardware/software interface.

A. system

B. Application

program C control unit D.

operating system

78. The source of a computer’s logic

is _____B_____.

A. hardware

B. software

C.

data D. the user

79. A disk drive is limited to a

few___C____.

A. tasks

B. program

functions C. primitive operations

D. I/O operations

80. Programmers write

___B_____code.

A. object

B. source

C.

machine-level D. load module

II.Cloze

Passage 1:

A database system gives us a way of

1(B) together specific pieces or

lists of 2(B) that are relevant to

us in our jobs or our lives. It also

provides a way to 3(D) and

maintain that information in a central

place. The first commercial computers

were really 4(B) more than

dedicated database machine used to

gather, sort and report on census

information. To this day, one of the

most common reasons for purchasing

a computer is to 5(C) a database

system.

供选择的答案:

1: (A)gather (B) gathering

(C)get (D)getting

2: (A) data (B) information

(C) mail (D) message

3: (A)build (B) copy

(C)remember (D) store

4: (A) anything (B) nothing

(C) something (D)thing

5: (A)find (B) load

(C)run (D) install

Passage II.

Toolboxes and menus in many

application programs were 6(B)

for working with the mouse. The

mouse controls a pointer on the screen.

You move the pointer by 7(B) the

mouse over a flat surface in the

direction you want the pointer to move.

If you run out of 8(C) to move

the mouse, lift it up and put it down

again. The pointer moves only when

the mouse is 9(D) the flat

surface. Moving the mouse pointer

across the screen does not affect the

document, the pointer simply 10(B)

a location on the screen. When you

press the mouse button, something

happens at the location of the pointer.

供选择的答案:

6:(A)assigned (B)designed

(C)desired (D)expressed

7:(A)putting (B)sliding

(C)serving (D) taking

8: (A) board (B)place

(C)room (D) table

9:(A)getting (B)going

(C)teaching (D) touching

10: (A)constructs (B)indicates

(C)instructs (D) processes

Passage III

The boot is to 11(B) automatic

routine that clears the memory, loads

the operating system, and prepares the

computer for 12(C) Included in

the computer's read-only memory

(ROM is the power-on-self-test, which

13(A) when the power is switched

on (a cold hoot.

After a system 14(B) or

lockup occurs, you usually must boot

the computer again, or reboot, by

15(A) the Reset button or Ctrl + Alt

+ Del (a warm boot).

11: (A)clear (B) initiate (C)

insert (D) push

12: (A) create (B)handle

(C)use (D)route

13:(A)executes (B)exits (C)

loads (D)reads

14: (A) communicate (B) crash

(C) create (D)handle

15: (A) pressing (B)pulling (C)

seeing (D)writing

PassageVI:

Perhaps you have been asking the

questions: Is everyone moving to

16(C) ? If I don't step to the 17(A)

user interface, will I be left all along at

the cold 18(A) command line?

Don't throw away your

19(D) . No one is 20(C) DOS's

death knell yet. DOS and its

applications people have using for

years are not going to stop working

overnight.

供选择的答案:

16: (A) DOS (B) UNIX (C)

Windows (D) Windows NT

17: (A) graphical (B) software (C)

command line (D) Windows NT

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值