《计算机专业英语》

题目:Programs were thought of as a series of procedures.

题目:In the e-mail a user needs a message transfer agent.

题目:Operating system sets up a directory of programs undergoing execution and the devices.

题目:The development of videodisc is useful for distance education

题目:The Memory addresses are expressed as binary numbers

题目:Programs were thought of as a series of procedures

题目:FTP is a distributed bulletin board which offers a combination news and discussion service on thousands of topics.

题目:The OSI model is a foundation for all comparing protocols.

题目:The motherboard is sometimes alternatively known as the main-board, system -board, the logic board and backplane

题目:Computer is able to do different kinds of tasks.

题目:The TCP/IP Internet protocol suite is formed from three standards.

题目:Designers of online shops should consider the effects of information load.

题目:Enforcing security is one of the major tasks of the DBA.

题目:Because the Internet is made up of many diverse computers, so together they work like one world-wide computer system.

题目:Floppy disks are the smallest type of storage, holding only 2.44MB.

题目:One of the five functions of an operating system is memory management.

题目:A program can use a device if that hardware is unavailable.

题目:The network architecture is a layer-based

题目:Within software engineering, programming  is regarded as one phase in a software development process.

题目:If a person read a hypermedia document about mobile phones, then he might sel_ect a video show of a phone, but not hear the ring of it.

题目:A LAN is generally limited to the size of a department or an organization and often consists of 2 to 100 devices.

题目:One of the functions of an operating system is memory management

题目:A DVD holds even less information than a CD.

题目:A painter emulates the visual characteristics of traditional media

题目:Data communications equipment (DCE) accepts the serial data stream from the DTE

题目:The dataflow diagram is a graphical chart that depicts the flow of data among internal process, external entities, and data stores

题目:Operating systems are unique to their manufacturers

题目:In the future, computers are capable of original thoughts.

题目:Painter was acquired by Corel Corporation and was replaced by “Procreate”

题目:A high-level language can be designed to only process scientific calculation

题目:A successful test is to exhibit the absence of errors in the programs being   tested

题目:When you send an e-mail you should provide the sender's e-mail address

题目:Many operating systems have similar characteristics

题目:Error recovery does not belong to operating system.

题目:Corel Painter offers both conventional and unconventional materials and tools for artists

题目:ENIAC I was made with the technology of vacuum tube

题目:All of these databases can not take advantage of indexing to increase their speed.

题目:Error recovery does not belong to operating system

题目:The Internet is a computer network which allows computers with distinctive software and hardware to communicate.

题目:Only a few bugs can trouble a program

题目:Operating systems are unique to their manufacturers.

题目:Your computer uses two types of memory: primary memory and secondary memory

题目:Multiprogramming allows time sharing

题目:In modern computer it is increasingly common to integrate some peripherals into the motherboard itself

题目:In a computer system, these records that are logically contiguous in one           applications must be physically stored together

题目:The OSI model was not created by the ISO.

题目:The relational database terms “tuple” is equivalent to “column” in SQL

题目:A processor can do everything without a program to provide control

题目:Computer security is a branch of technology known as information security as applied to computers.

题目:A microcomputer, also called personal computer, is a computer designed for an individual.

题目:With high-powered debuggers you should put your source code into the debugger.

题目:The network architecture is a layer-based.

题目:Coding in computer security makes data be unintelligible to the outside   observer

题目:There are three general types of compression

题目:DBMS are categorized according to the database model that they support.

题目:Computers can be classified into microcomputer, mainframe and supercomputer by its program.

题目:A table is organized  into rows and columns in a relational database

题目:In its more general usage, a personal computer is a computer designed for using by one person at a time.

题目:Design of a network and its logical structure should comply with a set of design principles.

题目:By combining many functions on one PCB, highly-integrated motherboards are more complex and more expensive

题目:It was estimated that at this rapid growth everyone in the world would have an e-mail address in the near future.

题目:When you purchase a new computer, an operating software suitable to the hardware must be bought.

题目:A LAN (Local area data networks) is a group of computers and the network devices connected together usually within the different buildings.

题目:Apple produced the first computer with a GUI

题目:The World Wide Web ties the information together into a big collection of interactive multimedia resources.

题目:Online shopping is the process consumers go through to purchase products or services over the Internet.

题目:An index is one way of providing quicker access to data

题目:A centralized database system can be highly responsive to differences in data gathering, storage, and access

题目:Michelangelo is a file sector.

题目:IBM was the first company who initiated the computer business

题目:Prior to the high level programming language,”assembly” or binary is difficult to write and understand for the majority

题目:The revolution of the software industry is producing good, solid, bulletproof programs at low cost and on time.

题目:The four topologies in common use are star, router, ring and hub.

题目:Using debugger you can see each instruction as it executes.

题目:For information about using Internet Explorer, click the Help menu in Internet Explorer

题目:CD-ROM is rewritable

题目:Multimedia is just two media: sound and pictures

题目:The earlier in the development process you find a problem, the more it costs to fix

题目:TCP means it is on the network layer and IP means it is on the transport layer separately.

题目:The computer can do nothing without a program.

题目:CDs usually store about 650GB.

题目:A system board is a heart of a computer

题目:A database is a collection of logically related data elements that are structured in various ways to meet the multiple processing and retrieval needs of organizations and individuals

题目:Requirements analysis is not critical to the success of a development project

题目:Secondary memory holds all of the essential memory that tells your computer how to be a computer.

题目:A computer’s operational software defines the schedule of jobs awaiting       execution

题目:Software engineers develop software tools and collections of tools called programming environments to improve the development process.

题目:Using debugger you cannot examine your variables.

题目:One of the functions of an operating system is memory management.

题目:Corel Painter Sketch Pad is the newest product with more drawing tools

题目:Runtime bugs are easy to find.

题目:We can use multimedia in Education, Entertainment and so on

题目:Information can be input only by people.

题目:Three techniques have been adopted for use of the medium access control in the LANs.

题目:A motherboard provides physical sockets and slots as some peripheral interfaces

题目:Any computer which is connected to the Internet can communicate with any other Internet computer thanks to the rules of IP.

题目:The term “relational database” often refers to “relational database management system” for short

题目:Operating systems are not unique to their manufacturers.

题目:A processor can do everything without a program to provide control.

题目:Multimedia is not only a product, but also a technology

题目:The World Wide Web is an architectural framework.

题目:Viruses can cause programs crashing but can’t cause entire hard disk deleting

题目:In the e-mail a user needs a message transfer agent

题目:All virus scanners can kill most known viruses

题目:BIOS is stored in non-volatile memory chips

题目:The heart of any computer system is the central processing unit (CPU)

题目:The author thinks that understanding how an attacker approaches your computer system can help you protect it

题目:Previously the Web provides a wealth of additional capabilities.

题目:Office 2000 is an incredible set of business tools

题目:ISDN does not include that element that provides one kind of service

题目:A computer is a multi-functional electronic data processing machine and is made up of electronic components.

题目:Computer virus is remote from us.

题目:Workstation is a multi-user computer capable of supporting many hundreds or thousands of users simultaneously.

题目:In a relational database, all data are stored and accessed via relations

题目:The OSI model is a network architecture.

题目:Without an operating system, we could not execute a user program

题目:The surfing is you can sel_ect paths to browse online resource.

题目:Graphics tablet enables users to reproduce the effect of physical painting

题目:A powerful debugger can find nearly all of bugs.

题目:According to computers’ power and size, we have desktop, laptop and handheld PCs.

题目:All of us expect the programs robust, bug-free.

题目:LAN may be used to interconnect computer-based equipment distributed around a factory or hospital complex.

题目:With LANs, the limited physical separation of the subscriber DTEs allows simpler topologies to be used.

题目:Computer virus may affect the your phisical  health .

题目:a relational database is just only a collection of relations.

题目:There are no differences between the information processor and human (人类的) nervous system.

题目:Database security denotes the system, processes, and procedures that protect a database software from unintended activity.

题目:Before 1936,all devices which had the computing power had to rely on other electronics

题目:Metadata means data about data

题目:Online content providers make money in two ways:advertisements and selling.

题目:In general, shopping has always catered to middle class and upper class women.

题目:Office 2000 is an incredible set of business tools.

题目:In Web pages, you can search database of mailing lists, but you can see pictures of your favorite band and their concert schedule.

题目:Control token is the only way of controlling access to a shared transmission medium.

题目:Electronic money is also called digital  cash  or electronic  token

题目:A computer database relies upon DBMS to organize the storage of data.

题目:Microsoft Word 2000 allows you to create many types of personal and business  communications

题目:The TCP/IP Internet protocol suite is formed from five standards

题目:Computers cannot work without the instructions sets.

题目:The aspect of that,New capabilities can be added to the software without major changes to the underlying architecture is called Extensibility .

题目:Hypertext extends the concept of hypermedia to other forms of information.

题目:Most wide area networks, such as the PSTN, not use a mesh (sometimes referred to as a network) topology.

题目:A register is a storage location inside the processor

题目:The most common bugs are poor logic and syntactic error.

题目:Which of the following components can be used to attach peripheral devices to the motherboard as plug-in cards or via cables? __________

题目:Expansion Card Slots  (扩展插槽)

题目:Which of the following is RIGHT about the current trends in software engineering? __________

题目:The raw data are stored on the disk using the _________ .

题目:Confidentiality of the message is not enough in a secure communication; ________ is also needed. The receiver needs to be sure of the sender’s identity.

题目:Which of the following is NOT attached to the motherboard via edge connectors and cables in a typical desktop computer? __________

题目:Peripheral devices(外部设备)

题目:When power is removed, information in the semiconductor memory is _________

题目:if we want to retrieve data from the database with SQL,we should use the comand of

题目:J2EE is a single-language platform; calls from/to objects in other languages are possible through ________, but this kind of support is not a ubiquitous part of the platform.

题目:Which of the following is WRONG about Web 2.0? __________

题目:The _________ hidden in the infected system does not break out immediately;  instead, it needs certain time or some condition before it breaks out.

题目:I didnˊt hear the phone last night, I (    )   asleep.

题目:Which one is not a computer languages?

题目:A ____ is used to communicate with another computer over telephone lines.

题目:The _______ serves as an interface between hardware and software.

题目:Chemical energy, (    ) from fuel or other matters, can be transformed into heat energy.

题目:What does Tim Berners-Lee's description about Web 2.0 mean? __________

题目:Why does the author give the example of Bliss? __________

题目:A(n) ________ is usually a computer installed with the necessary software and allows two networks, each with a completely different set of protocols, to communicate.

题目:Windows gives you more control over the ________ you work.

题目:Whereas the decimal system is based on 10, the (    ) system is based on 2. There are only two digits in the latter system, 0 and 1.

题目:Every transaction in electronic commerce includes information flow, commercial flow, _______ and material flow.

题目:One of the differences between C# and Java is that Java runs on any platform with a Java Virtual ______________ while C# only runs in Windows for the foreseeable future.

题目:In the system development process, the code is written in the ________ phase.

题目:In the following descriptions, which is RIGHT about the functions of CPU socket? _______

题目:Visual Basic has  _______versions.

题目:After I finished the last paragraph, I moved the ________ back to the third paragraph and del_eted

题目:J2EE is a single-language platform; calls from/to objects in other languages are possible through (    ), but this kind of support is not a ubiquitous part of the platform.

题目:what does " neural network "  mean?

题目:In the system development process, modularity is a very well-established principle used in the (    ) phase.

题目:The larger the system of the computer, the greater its (    ).

题目:What does the phrase “frame-based” mean appearing at the beginning of the article? __________

题目:primary memory which is stored on chips located ________.

题目:___ is a fast and powerful operating system, based on the UNIX O.S.

题目:ADO.NET is the (    ) model for .NET-based applications. (data access)

题目:Many viruses go resident in the memory like a (      ).

题目:The control unit fetches _________ from memory and decodes them.

题目:Which of the following is WRONG about the terminology used in software engineering? __________

题目:Whereas a repeater operates only in the physical layer of the OSI model, a bridge operates in both the physical layer and the ________ layer of the OSI model.

题目:Windows gives you more control over the (    ) you work.

题目:Small as it is, a personal computer can perform the same program instructions as (    ).

题目:Which of the following items need not have unique values in the referencing  relation?  __________

题目:A periodic refresh is needed to restore the information for the _________ .

题目:With Windows, you can run several powerful applications at once and switch quickly (       ) them.

题目:He doesn’t mind  (       )  her birthday party.

题目:The history of programming languages can be traced back almost to the invention of the (    )computer in th 1940s.

题目:Which of the following items should be used for collecting and customizing common operations? __________

题目:When most people think of opening a Web business,the first thing that springs to mind is selling products or ____________online.

题目:Some restaurants have provided touch ________ computers to enable their customers to order food via the computer without having to tell someone.

题目:Which one is not a computer languages? ____

题目:Which of the following descriptions is WRONG according to this article? __________

题目:The attributes of the stack are (       ).

题目:In the system development process, the system analyst defines the user, needs, requirements and methods in the (    ) phase.

题目:primary memory which is stored on chips located (    ).

题目:It looks as though there (    ) some problems with my computer. Because it is so slow.

题目:Data (    ) can reduce the amount of data sent or stored by partially eliminating inherent redundancy.

题目:(    ) refers to the parts of the computer that you can see and touch.

题目:The most commonly used tool in the design phase is the ________.

题目:__________is a network protocol used to transfer data from one computer to another through a network such as the Internet.

题目:Which of the following descriptions in WRONG about the uses of Wi-Fi? __________

题目:The display screen is the most common ____ device used to show you what the computer is doing.

题目:Anti-Virus protects your computer from viruses by  ________  your computerˊs memory and disk devices.

题目:Videodisc and laser technology provide the ability to_________

题目:A(n) ______ is a sequence of code in a program executed repeatedly,either fro a fixed number of times or until a certain condition is met.

题目:Two common applications of LANs are _________ resource sharing and information resource sharing.

题目:(    ) is built around hypertext and hypermedia.

题目:The infamous “Michelangelo” ________ strikes thousands of computers every year on March 6th.

题目:Which of the following is not the stages of programming?

题目:Hardware components are used for the purpose of (    ).

题目:Anti-Virus protects your computer from viruses by ____ your computer's memory and disk devices

题目:In SQL,(    )causes an object (a table, for example) to be created within the database.

题目:Whereas the decimal system is based on 10, the ________ system is based on 2. There are only two digits in the latter system, 0 and 1.

题目:A mouse is a small device that a computer user pushes across a desk surface in order to point to a place on a _________ and to select one or more action to take from that position.

题目:An advantage of a ring network is that it needs less _________ .

题目:Which of the following description is WRONG about Wi-Fi? __________

题目:Which of the following events did happen latest in the development of Painter? _______

题目:A(n) ________ is a connecting device that only regenerates the signal.

题目:Multimedia will become increasingly ____ throughout every aspect of our lives.

题目:Confidentiality of the message is not enough in a secure communication; (    ) is also needed. The receiver needs to be sure of the sender’s identity.

题目:Antivirus program can scan and virus.

题目:Among the following products, which appeared the earliest during the computer software development history? __________

题目:In the following devices, which is NOT included in the list of the core components of modern computers __________

题目:Transistor  (晶体管)

题目:A computer virus is a computer program that is created to make and spread of itself.

题目:In order to solve a computational problem, you can let a person or a_________  to do it.

题目:E-commerce do business through _________.

题目:(       )that ,I could do it much better.

题目:A ______ is a device that enables the computer to handle sounds.

题目:Communication through the Internet, the____  performs the reverse function.

题目:A station controller (STACO)

题目:Data communications equipment (DCE)

题目:The largest and fastest computers are (    ).

题目:A ________ copy is a copy of a current file made in order to protect against loss or damage.

题目:A machine language is a(n) (    ) language in binary code that the computer can understand and execute directly.

题目:__________, such as the SQL Server and Oracle providers, typically offer performance improvements due, in part, to the fact that there is one less layer of abstraction.

题目:The most important program on any computer is________.

题目:____ refers to the parts of the computer that you can see and touch.

题目:A virus is a _________ .

题目:The infamous “Michelangelo” (    ) strikes thousands of computers every year on March 6th.

题目:A (    ) copy is a copy of a current file made in order to protect against loss or damage.

题目:Visual Basic has  (    )versions.

题目:The OSI model has ____ layers.

题目:C might best be ____ as a 'medium-level language'.

题目:The RGB value is composed of ____ components.

题目:Windows gives you more control over the ____ you work.

题目:________ printers are being phased out and replaced by printers that can produce clean type.

题目:A companyˊs ability to deploy and support customer-oriented (    ) systems will be of vital importance to its prosperity.

题目:Which of the following emerged first in the history of software engineering? __________

题目:Anti-Virus protects your computer from viruses by  (    )  your computerˊs memory and disk devices.

题目:The data, when they are not encrypted, are called ________.

题目:All computers can perform basic machine operations under the control of (    ).

题目:In the case of a(n) _________, a  program is translated into executable form and executed one statment at a time rather than being translated completely before execution.

题目:if we want to retrieve data from the database with SQL,we should use the comand of (   )

题目:Which of the following has been outdated among wired LAN technology? __________

题目:The history of programming languages can be traced back almost to the invention of the _________computer in th 1940s.

题目:how to translate the word "中央处理器"

题目:According to BusinessWeek, the attacks reported in the first half of 2003 nearly match previous year's total number .

题目:A virus is a (    ) .

题目:Which of the following is NOT an effective countermeasure to viruses. __________

题目:One of the differences between C# and Java is that Java runs on any platform with a Java Virtual (    ) while C# only runs in Windows for the foreseeable future.

题目:He was glad to find the fire(        )  brightly.

题目:ADO.NET is the ________ model for .NET-based applications. (data access)

题目:A(n) (    ) is a connecting device that only regenerates the signal.

题目:_________ uses commands that are easier for programmers to understand than machine language commands.

题目:For some time, we’ve been experiencing some ________ in this particular program. It cannot run in a normal way.

题目:Now, about (    ) different viruses account for all the viruses that actually spread in the wild.

题目:The abbreviation HTTP stands for Hypertext (    ) Protocol.

题目:High-level languages must first be translated into a(n) __________ language before they can be understood and processed by a computer

题目:You can come with me to the museum this afternoon (    ) you don’t mind walking for half an hour.

题目:A machine language is a(n) _______ language in binary code that the computer can understand and execute directly.

题目:To access a page on the WWW, one needs a (    ) that usually consists of three parts: a controller, a method, and an interpreter.

题目:According to Intel,there are _____________stages in the evlolution of e_Business.

题目:Which of the following RDBMS is not open source according to this article? __________

题目:Assembly-language instructions are a series of _________.

题目:(    ) is an architectural framework.

题目:A hardware or software malfunction can cause a system to ________.

题目:“Multimedia” means that _________  .

题目:He insisted on leaving early (    ) I told him not to.

题目:_____ is an architectural framework.

题目:These days it is not uncommon for one to see people using (    ) everywhere--even on airplanes.

题目:Data ________ can reduce the amount of data sent or stored by partially eliminating inherent redundancy.

题目:Which of the following items is NOT the traditional tools for artists in Painter? __________

题目:Most system boards have two kinds of power connectors: _________ .

题目:In the system development process, the system analyst defines the user, needs, requirements and methods in the ________ phase.

题目:Each_________ is a unit of both atomicity and consistency.

题目:With Internet Explorer and an Internet connection, you can search for and view information on the _________ .

题目:The basic units of a computer system are as follows:  _________

题目:The purpose of the   A  is to provide fully integrated analog services to users.

题目:The distinction between the two terms gateway and (    ) is disappearing. They are now used interchangeably.

题目:A characteristic of operating system is _________.

题目:According to Intel,there are (    )stages in the evlolution of e(    )Business.

题目:(    )is a network protocol used to transfer data from one computer to another through a network such as the Internet.

题目:Trojan Horses .

题目:In the system development process, the code is written in the (    ) phase.

题目:There are ____ separate products that form the Windows 2000。

题目:A (    ) is a device that enables the computer to handle sounds.

题目:The girl I saw(    )brown hair and blue eyes.

题目:Which of the following is RIGHT about the infection strategies of viruses? __________

题目:____________, such as those supplied for OLE DB and ODBC, allow you to use data libraries designed for earlier data access technologies.

题目:When a _________ is used, all the devices in the network are connected to a single cable.

题目:Whereas a repeater operates only in the physical layer of the OSI model, a bridge operates in both the physical layer and the (    ) layer of the OSI model.

题目:(            )as a significant majority of market share in the desktop

题目:If you want to solve the computational problem with a computer, you should learn how to _________

题目:The prisoners’ request  (   )  more and better food is now  consideration.

题目:Computer programming is the process of planning and creating a sequence of _________ for a computer to follow.

题目:A virus is a _____.

题目:A companyˊs ability to deploy and support customer-oriented ___________ systems will be of vital importance to its prosperity.

题目:We’ll go to Paris for our holiday,   (       )  it isn’t too expensive.

题目:In 2000, the number of viruses topped (    ).

题目:Many companies use _________ to train their employees.

题目:To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.

题目:Which of the following items is not included in the “three companion  application ” in Painter Series? __________

题目:Which of the following facts is(are) mentioned about the usage on Web 2.0 in this article? __________

题目:_____ is built around hypertext and hypermedia.

题目:A processor is composed of two functional units, they are _________.

题目:The term coder is used to describe _________

题目:The purpose of the ____  is to provide fully integrated analog services to users.

题目:A(n) ________ translates all the source code of a program written in a high-level language into object code prior to the execution of th program.

题目:To access a page on the WWW, one needs a ________ that usually consists of three parts: a controller, a method, and an interpreter.

题目:_________ is a storage location inside the processor.

题目:The most important program on any computer is ____.

题目:________ refers to the parts of the computer that you can see and touch.

题目:A __________is used to communicate with another computer over telephone lines.

题目:The data, when they are not encrypted, are called (    ).

题目:Just a minute, I’m waiting for the computer to (    ) up. It won’t take long to start it.

题目:Software engineering is some certain _______.

题目:For some time, we’ve been experiencing some (    ) in this particular program. It cannot run in a normal way.

题目:primary memory which is stored on chips located ____.

题目:In SQL,______causes an object (a table, for example) to be created within the database.

题目:In the system development process, (    ) and pseudocode are tools used by programmers in the implementation phase.

题目:Please find the item that is not belong to the DBA _________.

题目:The abbreviation USB stands for Universal ________ Bus.

题目:Which of the following type of wireless devices has the highest power consumption? __________

题目:________ refers to the process of a two dimensional picture by a digital computer .

题目:These days it is not uncommon for one to see people using ________ everywhere--even on airplanes.

题目:A hardware or software malfunction can cause a system to (    ).

题目:The OSI model has _____ layers.

题目:Which of the following is WRONG about the comparison between the early version and the current version of Ethernet? __________

题目:The abbreviation USB stands for Universal (    ) Bus.

题目:The Whale will create (    ) different versions of itself when it infects files.

题目:what does " neural network "  mean?

题目:Most operating system have a standard set of _________ to handle the processing of all input and output instructions.

题目:After I finished the last paragraph, I moved the (    ) back to the third paragraph and deleted

题目:Worm spread itself except by .

题目:An ISP supplies a _________ that you can dial from your computer to log on the internet server.

题目:The OSI model has (    ) layers.

题目:Though  (        )   by what he said ,she didnˊt believe in him.

题目:In the system development process, modularity is a very well-established principle used in the ________ phase.

题目:(    )is a word processing tool that helps you to create quality documents.

题目:A Web site is often more effective as a(n) _______ tool than a selling tool.

题目:The distinction between the two terms gateway and ________ is disappearing. They are now used interchangeably.

题目:____is a word processing tool that helps you to create quality documents.

题目:Some restaurants have provided touch (    ) computers to enable their customers to order food via the computer without having to tell someone.

题目:A (    )is used to communicate with another computer over telephone lines.

题目:In the system development process, ________ and pseudocode are tools used by programmers in the implementation phase.

题目:The abbreviation HTTP stands for Hypertext ________ Protocol.

题目:The ____ turns the object file into an executable program.

题目:A (    ) is a set of rules that controls the interaction of different devices in a network or internetwork.

题目:A ________ is a set of rules that controls the interaction of different devices in a network or internetwork.

题目:The most commonly used tool in the design phase is the (    ).

题目:A ____ is a device that enables the computer to handle sounds.

题目:A(n) (    ) is usually a computer installed with the necessary software and allows two networks, each with a completely different set of protocols, to communicate.

题目:Only when you have told him  (       )  take this book out of the library.

题目:The most important program on any computer is(    ).

题目:Just a minute, I’m waiting for the computer to ________ up. It won’t take long to start it.

题目:____ is a word processing tool that helps you to create quality documents.

题目:What make it is difficult to agree on how to count viruses?

题目:The World Wide Web also subsumes previous Internet information systems such as (   ).

题目:The function of computer hardware is typically divided into three main categories.They are(       ).

题目:A large main memory can be used for __________storing

题目:Modem is __________.

题目:Operating systems and middleware__________

题目:There are a number of processes, activities and practices that are unique to maintainers, for example:

题目:Service Level Agreements (SLAs) and specialized (domain-specific) maintenance contracts negotiated by maintainers

题目:(    )is a type of executable file .

题目:The tools which Programming software usually provides include:

题目:Database connection ________ allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.

题目:According to the text,the author mentions three of the most commonly used types of printer.They are (       ).

题目:Hypermedia include (            )

题目:Viruses can delay their attack for (    ).

题目:Some commentators say the outcome of the information revolution is likely to be as profound as the shift in ___________

题目:Windows 2000 is (    ).

题目:A stack protocol can be used for (    ).

题目:removing the earliest element ins(       )erted

题目:removing the latest element ins(       )erted

题目:According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are (       ).

题目:(    ) maybe a certain cause that some viruses infect upon.

题目:Today Microsoft’s operating system Windows has a variety of versions, they are__________

题目:We can define a computer as a device that (       )

题目:Electronic commerce that is conducted between businesses and consumers, on the other hand, is referred to as

题目:The function of computer hardware is typically divided into three main categories.They are________________.

题目:GIS work with two fundamentally different types of geographic models.They are the ______________.

题目:The operations of a structured data type might act on (     ).

题目:In electronic commerce ,information search and discovery services include _____________.

题目:The two most common types of scanners are (       ) and (       )

题目:Before you turn the power on with a new computer, you should make sure__________

题目:Many viruses do harmful things such as (    ).

题目:Software engineering is related to the disciplines of _____________________.

题目:According to the physical size of computers we can classify the __________       computers into

题目:The equipment ______.

题目:Windows 2000 has the key technologies, they are (     ).

题目:The software that controls the interaction between the input and output hardware is called BIOS,which stands of (       )

题目:ADO.NET relies on the services of .NET data providers.There are

题目:The Application layer in TCP/IP Model  is correspond to _______________ in OSI Model

题目:Some common applications related to electronic commerce are the following:

题目:The Internet is__________.

题目:With .NET, Microsoft is opening up a channel both to (       ) in other programming languages and to non-.NET (       ). (developers; components)

题目:Viruses all have two phases to their execution, the (   ) and the (    ).

题目:Office automation is__________.

题目:In order to increase our computer’s performance we need to__________

题目:If a virus simply reproduce and have no cause for an attack phase, but it will still (     ) without your permission.

题目:An asleep state is__________

题目:Computer programs fall into two major classes: ______ and ______.

题目:Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes:

题目:Some viruses use (    ) and (    ) techniques to hide their existence.

题目:A digital computer is generally made up of five dstinct elements: a central processing unit,().

题目:The register file is__________

题目:The core of SQL is formed by a command language that allows the (       )  and performing management and administrative functions.

题目:ins(       )ertion of data

题目:Instruction format in RISC has__________

题目:Computer programming  is the process of _______________ the source code of computer programs.

题目:Many viruses do harmful things such as ______________.

题目:Information Systems has a number of different areas of work:

题目:A working GIS contains five key componets.They are (       ).

题目:Viruses can delay their attack for__________.

题目:which aspect have to be  considered in the design of a piece of software.

题目:The web browsers which is normal used, such as________________.

题目:Software engineering is related to the disciplines of (       ).

题目:The end equipment in a communication system includes __________

题目:The World Wide Web is a huge set of (       ), linked by hyperlinks and URLs.

题目:The end equipment in a communication system includes ______.

题目:Active Directory supports ( ).

题目:Some viruses, with no attack phase, often damage the programs or disks they infect because they (     ).

题目:One of trends in computer development is _________,the effort to compress more circuit elements into smaller and smaller ______space

题目:The major functional components of an office automation system include: __________.

题目:DTE is (       ).

题目:Input devices include: __________.

题目:Middleware lies in__________

题目:A general purpose computer has four main sections: (       ).

题目:the arithmetic and logic unit (ALU),

题目:(       ) provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.

题目:The following devices are belong to the mass storages__________

题目:Security is usually enforced through (       ).

题目:Functions of the compiler used in RISC are __________

题目:Computer programs fall into two major classes: (       ) and (       ).

题目:Electronic commerce may be defined as the entire set of processes that suport (       )activities on a(n) (       ) and involve information analysis.

题目:Queues that occur everyday life can be seen (     ).

题目:An operating system provides the services in its API by  __________

题目:Newer ideas in computing such as(       ) have radically altered the traditional concepts that once determined program form and function

题目:Active Directory can help you (    ).

题目:Common contemporary operating systems include (       ).

题目:A program is a sequence of (       ) that can be executed by a computer.It can either be built into the hardware or exist independently in the form of (       ).

题目:del(       )ete phase

题目:CISC machine instructions compared with RISC machine are__________

题目:Early computer solved__________ problems.

题目:According to the text,the author mentions three of the most commonly used types of printer.They are ____________________.

题目:Computer programming  is the process of (       ) the source code of computer programs.

题目:Software includes _____________ etc

题目:Their company used international lawyers to prosecute a crime ring involving software (       ) in Thailand.

题目:which is the type of electronic commerce in the following choice

题目:C++ is __________.

题目:The Application layer in TCP/IP Model  is correspond to (       ) in OSI Model

题目:C++ include the following pillars: __________.

题目:A program is a sequence of ________ that can be executed by a computer.It can either be built into the hardware or exist independently in the form of ________.

题目:Information stored in semiconductor RAM is__________

题目:Microsoft Windows currently supports _______ and _______file systems

题目:There are three types of application programs to translate source code into object code.They are (       )

题目:We use paged virtual memory to__________

题目:Electronic commerce may be defined as the entire set of processes that suport _____________activities on a(n) ________ and involve information analysis.

题目:A virus is a program that reproduces its own code by (     ).

题目:The web browsers which is normal used, such as(       ).

题目:One machine cycle in RISC has __________

题目:Microsoft Office Professional 2000 include__________.

题目:With .NET, Microsoft is opening up a channel both to ________ in other programming languages and to non-.NET ________. (developers; components)

题目:The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are:

题目:The Internet carries various information resources and services, such as ______________________________ and the inter-linked hypertext documents

题目:High-level languages are commonly classified as ________________________.

题目:We can say a bus is simply__________         .

题目:There are three types of application programs to translate source code into object code.They are __________

题目:which is the threat to computer security in the following choices ?

题目:Windows 2000 is__________

题目:The development process in the software life cycle involves four phases: analysis, design, implementation, and ________.

题目:A mechanism for translating Internet hostnames into IP addresses is__________

题目:GIS work with two fundamentally different types of geographic models.They are the (       ).

题目:The Windows 2000 product line includes__________.

题目:Microsoft Windows currently supports (       ) and (       )file systems

题目:Electronic commerce that is conducted between businesses is referred to as business-to-business or

题目:A computer system user generally more cares for__________

题目:Types of media include__________.

题目:The processor performance would be high as we      reference instructions and data from__________

题目:The two most common types of scanners are _______ and _____

题目:According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are __________________.

题目:In electronic commerce ,information search and discovery services include (       ).

题目:High-level languages are commonly classified as (       ).

题目:Middleware has mechanisms to support controlled interaction through__________

题目:The equipment (       ).

题目:Newer ideas in computing such as______ have radically altered the traditional concepts that once determined program form and function

题目:We can classify programming languages under two types:______________ languages and ____________languages.

题目:Electronic payments include ___________________.

题目:A general purpose computer has four main sections: _____________________________________________________.

题目:Applications in the Internet can be found everywhere: __________

题目:A user interface we said here is __________

题目:With middleware we can__________

题目:There are AB(       ) between the DTEs.

题目:will be replaced by an upd(       )ated standard

题目:Windows 2000’s advantages are lies in the sections that follow: __________

题目:You want to (     ) maybe wake up a virus that has residented in memory.

题目:del(       )ete a file

题目:DTE is ______.

题目:The system manager used by a fast processor can__________

题目:The software that controls the interaction between the input and output hardware is called BIOS,which stands of __________

题目:To enhance performance of a computer system we should__________

题目:del(       )ete files

题目:Cache is__________

题目:The Windows 2000 product line includes (    ).

题目:The core of SQL is formed by a command language that allows the ________  and performing management and administrative functions.

题目:Their company used international lawyers to prosecute a crime ring involving software ________ in Thailand.

题目:The end equipment in a communication system includes (       ).

题目:Similar to viruses, you can also find malicious code in (    ).

题目:We can define a computer as a device that ______________________

题目:Electronic payments include (       ).

题目:__________ provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.

题目:Security is usually enforced through __________________.

题目:The following products of software are belong to middleware__________

题目:Software includes (       ) etc

题目:Common contemporary operating systems include __________________________.

题目:Static graphics include__________.

题目:The three desiderata of memory system are__________

题目:With an Internet connection you can get some of the basic services available are:__________

题目:Some commentators say the outcome of the information revolution is likely to be as profound as the shift in (       )

题目:During the boot procedure we can see on the screen. __________

题目:The attributes of the stack are__________.

题目:A processor is composed of:__________.

题目:One of trends in computer development is (       ),the effort to compress more circuit elements into smaller and smaller (       )space

题目:The Internet carries various information resources and services, such as (       ) and the inter-linked hypertext documents

题目:The basic hardware components of any computer include__________

题目:The World Wide Web is a huge set of ________, linked by hyperlinks and URLs.

题目:RISC is__________

题目:ins(       )erting into the middle of a file

题目:Database connection (       ) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.

题目:A working GIS contains five key componets.They are ___________________.

题目:The development process in the software life cycle involves four phases: analysis, design, implementation, and (       ).

题目:There are AB_ between the DTEs.

题目:We can classify programming languages under two types:(       ) languages and (       )languages.
 

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值