为了正常的体验网站,请在浏览器设置里面开启Javascript功能!

计算机专业英语多选题

2019-06-16 40页 doc 83KB 111阅读

用户头像

is_751406

暂无简介

举报
计算机专业英语多选题1.A user interface we said here is __ABC________ A.a text-based user interface or GUI B.an interface between a computer and its peripheral device C.an interaction between an operating system and a user D.an interaction between an application program and a user ...
计算机专业英语多选题
1.A user interface we said here is __ABC________ A.a text-based user interface or GUI B.an interface between a computer and its peripheral device C.an interaction between an operating system and a user D.an interaction between an application program and a user 2.___A___provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. A.The Transport Layer B. Session Layer C. Network Layer E.Application Layer E. Presentation Layer 3.Many viruses do harmful things such as (ABCD ). A.deleting files B. slowing your PC down B.simulating typos D. changing random data on your disk 4.We can classify programming languages under two types:(AB ) languages and ( )languages. A.high-level B. low-level C. advanced-level D. basic-level 5.With an Internet connection you can get some of the basic services available are: ___ABCD_______ A.E-mail B. Telnet C. FTP D. Usenet news 6. A general purpose computer has four main sections: ( ABCE). A.the control unit B. the memory C. the input and output devices D. the cpu E. the arithmetic and logic unit (ALU), 7.Windows 2000 has the key technologies, they are (ABCD ). A.security B. active directory C. flat directory D. enterprise management 8.The register file is___ACD_______ A.addressed by much shorter addresses B. physically large C.physically small D. one the same chip as the CPU 9. A stack protocol can be used for (A ). A.removing the latest element ins( )erted B. removing the earliest element ins( )erted C. subroutine calls D. operation of arithmetic expressions 10.The end equipment in a communication system includes (ABCD ). A.printers B. computers C. CRTs D. keyboards 11.Microsoft Office Professional 2000 include____ABCD______. A.Excel 2000 B. PowerPoint 2000 C. Word 2000 D. Outlook 2000 12. A general purpose computer has four main sections: ______ABCE______ A.the input and output devices B. the memory C. the arithmetic and logic unit (ALU), D. the cpu E. the control unit 13.The two most common types of scanners are (BC ) and ( ) A. hand-held scanners B. flatbed scanners C. auto scanners D. handler scanners 14.Some viruses use (CD ) and ( ) techniques to hide their existence. A.quickly spread B. replace a part of system software C. stealth D. polymorphic 15.The Windows 2000 product line includes____ABCD______. A.Windows 2000 Datacenter Server B. Windows 2000 Professional C. Windows 2000 Server D. Windows 2000 Advanced Server 16.Similar to viruses, you can also find malicious code in (ABC ). A.Trojan Horses B. logic bombs C. worms D. Microsoft Word Documents 17.Viruses all have two phases to their e x ecution, the ( ) and the ( BD). A.crea t e phase B. attack phase C. del( )ete phase D. infection phase 18.Active Directory can help you (ACD ). A.get off the limits of down level networks B. deliver complete enterprise security by itself C. build a complex international network D. manage every resource with a single logon 19.High-level languages are commonly classified as (ACDE ). A.object-oriented B. automatic C. functional D. logic languages E. procedure-oriented 20.(CD )is a type of e x ecutable file . A.TXT file B. JPG file C. EXE file D. COM file 21.( ABCD) maybe a certain cause that some viruses infect upon. A.an external event on your PC B. a day C. a counter within the virus D. a time 22.(BC )is a type of e x ecutable file . A.TXT file B. EXE file C. COM file D. JPG file 23.The web browsers which is normal used, such as(ABCE ). A.Firefox B. Internet Explorer C. Opra D. ICQ E. Apple Safari 24.Newer ideas in computing such as(ABDE ) have radically altered the traditional concepts that once determined program form and function A.artificial intelligence B. distributed computing C. software engineering D. parallel computing E. data mining 25.Microsoft Windows currently supports __AC___and _____file systems A.NTFS B. OCFS C. FAT D. ext2 E. NILFS 26.Modem is ____ACD______. A.a modulator/demodulator B. a data set C. a demodulator D. a modulator 27.The equipment _AB_____. A.transfers the number of bits in serial form B.manipulates digital information internally in word units C.transfers the number of bits in parallel D. manipulates digital information internally in serial form 28.Electronic commerce that is conducted between businesses is referred to as business-to-business or D A. C2C B. C2B C. e-commerce D. B2B 29.The World Wide Web also subsumes previous Internet information systems such as (AC ). A.Gopher B. Ftp C. FTP D. Telnet 30.ADO.NET relies on the services of .NET data providers.There are ABCD A.Connection B. Data Adapter C. DataReader D. Command 31.The development process in the software life cycle involves four phases: analysis, design, implementation, and ___ACDE_____. A.analysis B. audit C. implementation D. design E. testing 32.The end equipment in a communication system includes __ABCD____. A.printers B. CRTs C. computers D. keyboards 33.In electronic commerce ,information search and discovery services include (ABCDE ). A.search engines B. information filters C. software agents D. directories E. electronic catalogs 34.GIS work with two fundamentally different types of geographic models.They are the (BD ). A.geography model B. vector model C. mathematic model D. raster model E. data model 35.The two most common types of scanners are ____AC___and _____ A.flatbed scanners B. hand-held scanners C. auto scanners D. handler scanners 36.Windows 2000 has the key technologies, they are ( ABCD). A.active directory B. flat directory C. enterprise management D. security 37.Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes: ABC A.Firmware which is software programmed resident to electrically programmable memory devices on board mainboards or other types of integrated hardware carriers. B.Application software such as word processors which perform productive tasks for users. C.Middleware which controls and co-ordinates distributed systems. 38.Software engineering is related to the disciplines of ___ADE_____ A.project management B. natural language C. netural network D. systems engineering E. computer science 39.What make it is difficult to agree on how to count viruses? ABCD A.some viruses can crea t e different versions when they infect other programs B.just a trivial change may crea t e a new virus C.some viruses can use polymorphic technique D.new virus arise from an existing virus 40. A virus is a program that reproduces its own code by (ABC ). A.ins_erting into the middle of a file B. simply placing a pointer C. adding to the end of a file D. replacing another program 41.Input devices include: ____ABCD______. A.the keyboard B. microphone C. touch screen D. the mouse 42.Viruses all have two phases to their e x ecution, the ( ) and the ( AD). A.attack phase B. crea t e phase C. del_ete phase D. infection phase 43.The equipment (BC ). A.manipulates digital information internally in serial form B.manipulates digital information internally in word units C.transfers the number of bits in serial form D.transfers the number of bits in parallel 44.Office automation is___CD_______. A.. the computer B. communications technology C. the application of computer D. used to improve the productivity of people 45.The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are: ABCDE A.System.Data.SqlClient. Contains the SQL Server .NET Data Provider types. B.System.Data.Odbc. Contains the ODBC .NET Data Provider types. C.System.Data. Contains provider-independent types such as the DataSet and DataTable. D.System.Data.OracleClient. Contains the Oracle .NET Data Provider E.System.Data.OleDb. Contains the OLE DB .NET Data Provider types. 46.C++ is __ACD________. A.extended from C B. a superset of C C. object-oriented D. procedure-oriented 47.Some viruses, with no attack phase, often damage the programs or disks they infect because they (AD ). A.have bugs in them B. show messages on your screen C. steal storage D. contain poor quality code 48.Windows 2000 is ( A). A.an inventive technology B. used for building a scalable network B.the same as Windows NT D. new lease of Windows 49.Some common applications related to electronic commerce are the following: A.Teleconferencing B. Online banking C. Email D. Instant messaging E. Enterprise content management F. Newsgroups G. Shopping cart software 50. A program is a sequence of ( ) that can be e x ecuted by a computer.It can either be built into the hardware or exist independently in the form of (BC ). A.hardware B. software C. instructions D. data 51.Electronic payments include ___ABCD______. A.credit card payments B. electronic checks C. digital currencies D. cash payment 52.The web browsers which is normal used, such as____ABCD_____. A.Opra B. Internet Explorer C. Firefox D. Apple Safari E. ICQ 53.Computer programs fall into two major classes: __AC____and ____. A.application programs B. application suite C. operating systems D. database application 54.Database connection ( B) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database. A.pond B. pooling C. link D. connection 55.The development process in the software life cycle involves four phases: analysis, design, implementation, and (ABCE ). A.implementation B. design C. analysis D. audit E. testing 56.Hypermedia include ( ABCDEF) A.video clips B. images C. text D. flash E. vidoe F. sounds 57.An asleep state is_____ABD_____ A.used to lessen wear-and tear on the computer B. used for saving energy C. indicated by the indicator light putting out D. a low power standby mode 58.Electronic payments include (ABCD ). A.digital currencies B. electronic checks C. credit card payments D. cash payment 59.You want to (BCD ) maybe wake up a virus that has residented in memory. A.del( )ete a file B. access a diskette C. e x ecute a program D. copy a file 60.Before you turn the power on with a new computer, you should make sure_____ABCD_____ A.the computer system has been set up B. the computer is already out of the box B.appropriate software have been installed D. appropriate cables are correctly connected 61.Security is usually enforced through ___ABE________. A.access control B. encryption C. data retrieving D. data storing E. auditing 62.Computer programming is the process of ABCD__the source code of computer programs. A. testing B. maintaining C. debugging D. writing 63.Queues that occur everyday life can be seen ( ABCD). A.as automobiles waiting for a traffic light B. as people waiting for service at a bank C. in certain societies lacking equality D. in an emergency room of a hospital 64.Static graphics include____AB______. A.animators B. photographs C. movies D. pictures 66.which is the threat to computer security in the following choices ? ABCD A. Computer Criminals B. Human Errors C. Computer Crime D. earthquake 65.The attributes of the stack are______A____. A.queue B. FIFO C. built into their circuitry D. LIFO 66.If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission. BD A.play music B. stealing storage C. del( )ete files D. pilfer CPU cycles 67.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are _______ABDE___________. A.minicomputers B. mainframes C. note book D. workstation E. microcomputers F. lenovo 68.The Application layer in TCP/IP Model is correspond to (ABD ) in OSI Model A.Presentation Layer B. Session Layer C. Transport Layer D. Application Layer E. Network Layer 69. A computer system user generally more cares for___ABD_______ A.speed of computation B. storage size C. physical size of the computer D. efficiency of the computer 71.Cache is____ABC______ A. slow B. high cost C. fast D. relatively small 72.We can say a bus is simply_____ABC_____ . A. a wire B. a 16-bit bus C. a group of wires D. a 8-bit bus 73.Viruses can delay their attack for (ABCD ). A.years B. months C. weeks D. days 74.In order to increase our computer’s performance we need to____BCD______ A.buy a L1 cache B. have a much larger main memory C. have a L2 cache D. buy a L2 cache 75.The software that controls the interaction between the input and output hardware is called BIOS,which stands of __A________ A.Basic Input Output System B. Classic Input Output System B.Advanced Input Output System D. Junior Input Output System 76.To enhance performance of a computer system we should____ACD______ A.improve the pattern of referencing operand B. optimize the simple movement of data C. optimize the basic sequence control mechanism D. use IF and LOOP instructions as many as possible 77.Their company used international lawyers to prosecute a crime ring involving software __ __A____in Thailand. A.piracy B. copying C. duplication D. cloning 78.The software that controls the interaction between the input and output hardware is called BIOS,which stands of (B) A.Advanced Input Output System B. Basic Input Output System C. Classic Input Output System D. Junior Input Output System 79.Some viruses use ( AC) and ( ) techniques to hide their existence. A.stealth B. quickly spread C. polymorphic D. replace a part of system software 80.Middleware lies in______ACD____ A.the middle of interactions between different application programs B.the top of the layering vertical stack C.the top of an operating system D.the middle of the layering vertical stack 81.Software includes ( ACDE) etc A.video games B. all kinds of files C. programs D. websites E. mobile application 82.The major functional components of an office automation system include: ___ABCD__ A.electronic mail B. personal assistance features C. information storage and retrieval D. text processing 83.The Internet carries various information resources and services, such as (ACDEF ) and the inter-linked hypertext documents A.online chat B. talking C. electronic mail D. file transfer E. online gaming F. file sharing 84. A processor is composed of:____ABCD______. A.an arithmetic B. a control unit C. Registers D. logic unit 85.Functions of the compiler used in RISC are ___ABC_______ A.to optimize register usage B.to maximize register usage C.to allocate registers to those variables that will be used the most in a given time period D.to compile a high level language program 86. A digital computer is generally made up of five dstinct elements: a central processing unit,(ABCD). A.a bus B. input devices C. memeory storage devices D. output devices E. crt screen 87.There are AB (CD)_between the DTEs. A.digital-to-analog converter B. the modem C. communications equipment D. will be replaced by an upd_ated standard 88.What make it is difficult to agree on how to count viruses? ABCD A.just a trivial change may crea t e a new virus B.some viruses can use polymorphic technique C.some viruses can crea t e different versions when they infect other programs D.new virus arise from an existing virus 89.which aspect have to be considered in the design of a piece of software. ABCDEFG A.Fault-tolerance B. Extensibility C. Modularity D. Compatibility E.Marketability F. Packaging G. Maintainability 90.Active Directory can help you (ACD ). A.build a complex international network B. deliver complete enterprise security by itself C.manage every resource with a single logon D. get off the limits of down level networks 91.Early computer solved_____CD_____ problems. A.control B. engineering C. mathematical D. business applications 92.The tools which Programming software usually provides include: ABCDE A.debuggers B. text editors C. linkers D. compilers E. interpreters 93.DTE is ( AB). A.data terminal equipment B.the last piece of equipment that belonged to the subscriber in a data link system C.satellite D. Digital T-carrier 94.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are ( BDEF). A.note book B. microcomputers C. lenovo D. minicomputers E. workstation F. mainframes 95.which is the type of electronic commerce in the following choice AC A.B2B B. C2C C. B2C 96.The operations of a structured data type might act on (ABCD ). A.a stack B. the values of the data type C. component elements of the data structure D. a queue 97.Types of media include__ACD________. A.text B. animation C. audio D. full-motion video 98. A virus is a program that reproduces its own code by (ABC ). A.simply placing a pointer B. adding to the end of a file C. ins( )erting into the middle of a file D. replacing another program 99.According to the text,the author mentions three of the most commonly used types of printer.They are (BDE ). A.belt printer B. dot-matrix printers; C. array printer D. laser printer E. inkjet printers 100.The end equipment in a communication system includes ___ABD_______ A.keyboards B. DCE C. CRTs D. computers 101.Software includes _____ACDE________etc A.programs B. all kinds of files C. video games D. websites E. mobile application 102.With .NET, Microsoft is opening up a channel both to ( ) in other programming languages and to non-.NET ( BC). (developers; components) A.coder B. developers C. components D. architecture 103.Common contemporary operating systems include (ABCD ). A.Linux B. Microsoft Windows C. Solaris D. Mac OS 104.A mechanism for translating Internet hostnames into IP addresses is___BCD_______ A.equipped into the general-purpose operating system B.typically inside of operating system kernel C.as a middleware by author’s definition D.typically outside of operating system kernel 105.RISC is____ABC______ A.used for many computer manufacturers nowadays B.guided to be built from studying the execution behavior of high-level language programs C.abbreviation of reduced instruction set computer D.abbreviation of complex instruction set computer 106.With .NET, Microsoft is opening up a channel both to _BC_______in other programming languages and to non-.NET ________. (developers; components) A.coder B. components C. developers D. architecture 107.The tools which Programming software usually provides include: ABCDE A.compilers B. interpreters C. text editors D. linkers E. debuggers 108.The following products of software are belong to middleware____BCD______ A.Oracle B. IBM’s Web Sphere MQ C. Java 2 Platform D. J2EE 109.The system manager used by a fast processor can____BCD______ A.connect a network B. monitor processor’s core temperature C. monitor processor’s supply voltages D. reset a system 110.Queues that occur everyday life can be seen (ABCD ). A.as automobiles waiting for a traffic light B. as people waiting for service at a bank C. in an emergency room of a hospital D. in certain societies lacking equality 111.C++ include the following pillars: ____ABCD______. A.data hiding B. polymorphism C. encapsulation D. inheritance 112.Windows 2000 is____ACD______ A.new lease of Windows B. an inventive technology C. the same as Windows NT D. used for building a scalable network 113.We use paged virtual memory to___ABCD_______ A.extend the size of memory B. reduce latency of the disk C. store large program and data set D. increase bandwidth of the disk 114.According to the physical size of computers we can classify the __ABCD____ computers into A. supercomputer B. minicomputer C. microcomputer D. mainframe 115.Some common applications related to electronic commerce are the following: ABCDEFG A.Email B. Teleconferencing C. Instant messaging D. Shopping cart software E.Newsgroups F. Enterprise content management G. Online banking 116.One machine cycle in RISC has _B_________ A.two machine instructions B. one machine instruction C. four machine instructions D. three machine instructions 117.The function of computer hardware is typically divided into three main categories.They are ____ADE_____. A.input B. motherboard C. cpu D. storage E. output 118.Active Directory supports ( ABCD). A.granular access control B. inheritance C. encapsulation D. delegation of administrative task 119.The core of SQL is formed by a command language that allows the (ACDE ) and performing management and administrative functions. A.deletion of data B. process of data C. updating of data D. retrieval of data E. ins( )ertion of data 120.Some commentators say the outcome of the information revolution is likely to be as profound as the shift in (ABCD ) A.industrial B. agricultural C. Service Industry D. handicraft industry
/
本文档为【计算机专业英语多选题】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。 本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。 网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。

历史搜索

    清空历史搜索