为了正常的体验网站,请在浏览器设置里面开启Javascript功能!
首页 > 计算机水平考试-程序员分类模拟题计算机专业英语

计算机水平考试-程序员分类模拟题计算机专业英语

2018-12-12 40页 doc 95KB 43阅读

用户头像

is_562397

暂无简介

举报
计算机水平考试-程序员分类模拟题计算机专业英语计算机水平考试-程序员分类模拟题计算机专业英语 程序员分类模拟题计算机专业英语 单选题 1、A ______ is a functional unit that interprets and carries out instructions. A(memory B(processor C(storage D(network 2、A ______ consists of the symbols, characters, and usage roles that permit people to communicate ...
计算机水平考试-程序员分类模拟题计算机专业英语
计算机水平考试-程序员分类模拟题计算机专业英语 程序员分类模拟题计算机专业英语 单选题 1、A ______ is a functional unit that interprets and carries out instructions. A(memory B(processor C(storage D(network 2、A ______ consists of the symbols, characters, and usage roles that permit people to communicate with computer. A(programming language B(network C(keyboard D(display 3、______ software, also called end-user program, includes database programs, word processors, spreadsheets etc. A(Application B(System C(Compiler D(Utility 4、In ______, the only element that can be deleted or removed is the one that was inserted most recently. A(a line B(a queue C(an array D(a stack 5、Most ______ measures involve data encryption and password. A(security B(hardware C(display D(program 6、One use of networks is to let several computers share ______ such as file systems, printers, and tape drives. A(CPU B(memory C(resources D(data 7 system designed to 8 an organization's network against 7(A firewall is a threats. 7、(1) A(operating B(programming C(security D(service 8、(2) A(prevent B(protect C(develop D(exploit 9、The ______ has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries. A(application B(information system C(network D(operating system 10、______ is the address of a variable or a variable in which the address of another variable is stored. A(Director B(Pointersystem C(Array D(Record 11、C++ is used with proper ______ design techniques. A(object-oriented B(object-based C(face to object D(face to target 12、______ is a contiguous, numbered set of variables of a given base type, which can be used and passed to functions as a unit. A(Record B(Array C(File D(Parameter 13、______ is not a programming language. A(COBOL B(Java C(UML D(Basic 14、______ is nonprogram text embedded in aprogram to explain its form and function to human readers. A(Command B(Compile C(Comment D(Statement 15、When the result of an operation becomes larger than the limits of the representation, occurs. A(overdose B(overflow C(overdraft D(overexposure 16、Insufficient ______ can cause a processor to work at 50% or even more below its performance potential. A(mouse B(I/O C(document D(memory 17、The ______ in e-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America. A(illness B(virus C(weakness D(attachment 18、One of the basic rules of computer security is to change your ______ regularly. A(name B(computer C(device D(password 19、One of the greatest features of a home ______ is the ability to share one Internet connection simultaneously over two or more computers. A(computer B(device C(network D(work The usual address for a Web site is the ______ page address,although you 20、 can enter the address of any page and have that page sent to you. A(home B(main C(host D(house 21、______ means "Any HTML document on an HTTP Server". A(Web Server B(Web page C(Web Browser D(Web site 22、The term "______ program" means a program written in high-level language. A(compiler B(executable C(source D(object 23、Very long, complex expressions in program are difficult to write correctly and difficult to ______. A(defend B(detect C(default D(debug 24、In C language, functions are important because they provide a way to ______ code so that a large complex program can be written by combining many smaller parts. A(modify B(modularize C(block D(board 25、The standard ______ in C language contain many useful functions for input and output, string handling, mathematical computations, and system programming tasks. A(database B(files C(libraries D(subroutine 26、In ______ programming, the user determines the sequence of instructions to be executed, not the programmer. A(top-down B(structure C(data-driven D(event-driven 27、______ is a clickable string or graphic that points to another Web page or document. A(Link B(Anchor C(Browser D(Hyperlink 28、One solution to major security problems is ______, which are frequently installed to fix known security holes. A(patches B(compensations C(complements D(additions 29、A programmer must know about a function's ______ to call it correctly. A(location B(algorithm C(Interface D(statements 30、On a ______ memory system, the logical memory space available to the program is totally independent of the physical memory space. A(cache B(virtual C(RAM D(ROM 31、______ is a channel's capacity which directly reflects the data transfer rate of the channe1. A(The volume B(The bandwidth C(The noise D(The delay 32、______ is a device which enables digital microcomputers to communicate across analog telephone lines. A(The repeater B(The modem C(The hub D(The printer Communicating via E-mail is by far the most common Internet activity. You 32( can 33 with anyone in the world who has an Internet address or E-mail 34 with a system connection to the Internet. All you need is 35 the Internet and an E-mail program Two of the most widely used E-mail programs are Microsoft's 36 and Netscape's Navigator. A typical E-mail message has three basic 37 :header, message, and signature. 33、(1) A(connect B(exchange C(communicate D(game 34、(2) A(account B(No( C(user D(administrator 35、(3) A(attach with B(grasp C(possess D(access to 36、(4) A(Yahoo B(Explorer C(Foxmail D(Outlook Express 37、(5) A(packets B(elements C(frames D(cells 33(The major problem with E-mail is that it is 38 easy to use that people can become 39 with messages. 40 they can possibly answer in a day. In addition, mail boxes require some management to 41 messages or archive those that might be required later. Senders don't always know about your E-mail backlog and often send 42 messages. 38、(1) A(too B(so C(very D(much 39、(2) A(full B(lost C(inundated D(filled 40、(3) A(more than B(than C(that D(which 41、(4) A(manage B(save C(backup D(dispose of 42、(5) A(too many B(redundant C(long D(trivial 43、______:An error can be caused by attempting to divide by 0. A(Interrupt B(Default C(Underflow D(Overflow 35(Applications put computers to pratical business 44 , but below the 45 it's the heart of an operating system—the kernel that provides the technical wizardry to juggle multiple program, connect to networks and store 46 . A traditional kernal provides all the functions for applications. The kemal 47 memory, I/O devices and parcels out processor time. The kernel also supports security and fault 48 , which is the ablity to recover automatically when parts of the system fail. 44、(1) A(used B(use C(apply D(applied 45、(2) A(earth B(bottom C(table D(surface 46、(3) A(graphics B(data C(text D(image 47、(4) A(manages B(manage C(managed D(managing 48、(5) A(error B(question C(tolerance D(problem 36(By using MP3, a 600M-byte music CD can be 49 to 50M bytes or less. It can be streamed (downloaded in chunks) so that you can begin listening to the opening bars while the 50 of the life arrives in the background. And, most important, MP3 music files retain good listening 51 that 52 compression schemes lacked. That 53 of features makes accessing and distributing music on the Web practical for the first time. 49、(1) A. pressed B. compressed C. compress D. press 50、(2) A. past B. next C. rest D. host 51、(3) A. amount B. mass C. quantity D. quality 52、(4) A. earlier B. front C. later D. backward 53、(5) A. addition B. combination C. difference D. condition 37(Because Web servers are platform and application 54 , they can send or request data from legacy or external applications including databases. All replies, once convened into 55 mark-up language, can then be transmitted to a 56 . Used in this way, Intranets can 57 lower desktop support costs, easy 58 all, ease of use. links with legacy applications and databases and, 54、(1) A(coupled B(dependent C(independent D(related 55、(2) A(ciphertext B(hypenext C(plaintext D(supertext 56、(3) A(browser B(repeater C(router D(server 57、(4) A(off B(offer C(office D(officer 58、(5) A(abort B(about C(above D(around 38(Software quality assurance is now an 59 sub-discipline of software engineering. As Buckly and Oston point out, 60 software quality assurance is likely to lead to an ultimate 61 of software costs. However, the major hurdle in the path of software management in this area is the lack of 62 software standards. The development of accepted and generally applicable standards should be one of the principal goals of 63 in software engineering. 59、(1) A(emerging B(emergent C(engaging D(evolve 60、(2) A(effective B(effortless C(light D(week 61、(3) A(balance B(growth C(production D(reduction 62、(4) A(usable B(usage C(useless D(useness 63、(5) A(management B(planning C(production D(research 39(An instruction is made up of operations that 64 the function to be performed and operands that represent the data to be operated on. For example, if an instruction is to perform the operation of 65 two numbers,it must know 66 the two numbers are. The processor's job is to. 67 instructions and operands from memory and to perform each operation. Having done that, it signals memory to send it 68 instruction. 64、(1) A(skip B(smile C(smoke D(specify 65、(2) A(add B(added C(adding D(addition 66、(3) A(when B(where C(which D(who 67、(4) A(get B(make C(push D(put 68、(5) A(ant B(last C(next D(second 40(Software design is a 69 process(It requires a certain 70 of flair on the part of the designer. Design can not be learned from a book. It must be practiced and learnt by experience and study of existing systems. A well 71 software system is straight forward to implement and maintain, easily 72 and reliable. Badly 71 software systems, although they may work, are 74 to be expensive to maintain, difficult to test and unreliable. 69、(1) A(create B(created C(creating D(creative 70、(2) A(amount B(amounted C(mount D(mounted 71、(3) A(design B(designed C(designing D(designs 72、(4) A(understand B(understands C(understanding D(understood 73、(5) A(like B(likely C(unlike D(unlikely 74、______ is a sequence of letters and digits, the first character must be a letter. A(An identifier B(A string C(An array D(program 75、The error messages given by a C compiler show the message text, the most common cause of the error, and a suggestion for ______ the error. A(updating B(fixing C(changing D(Editing 43(The following suggestions increase "Programs" 76 and make them easier 77 : to 1(Use a standard indention technique, blank lines, form feeds, and spaces. 2(Insert plenty of comments into your code( 76、(1) A(reliability B(security C(readability D(usability 77、(2) A(execute B(interrupt C(compile D(maintain 78、A ______ is a feature of the system or a description of something the system is capable of doing in order to fulfill the system's purpose. A(plan B(requirement C(document D(design 79、______ is a set of specifications and software that allow small programs or software components to work together. A(ActiveX B(XML C(HTML D(DBMS 80、100BASE-TX makes use of two pairs of twisted pair cable, one pair used for transmission and the other for ______. A(reception B(detection C(relation D(connection 81、A typical peripheral device has ______ which the processor uses to select the device's internal registers. A(data B(a control C(a signal D(an address 82、A ______ computer is a personal computer whose hardware is capable of using any or all of the following media in a program, text, graphics, video and animation. A(database B(multimedia C(network D(mainframes 83、The ______ controls the cursor or pointer on the screen and allows the user to access commands by pointing and clicking. A(graphics B(printer C(program D(mouse 84、A ______ copies a photograph, drawing or page of text into the computer. A(scanner B(printer C(display D(keyboard 85、______ is permanently stored in the computer and provides a link between the hardware and other programs that run on the PC. A(Interface B(Operating system C(Internet D(Applicaion software 86、______ is not a linear structure. A(Graph B(Queue C(Stack D(I-dimension array 87、______ is the sending and receiving of the messages by computer. It is a fast, low-cost way of communicating worldwide. A(LAN B(Post office C(E-Mail D(I-dimension array 88、The ______ is a collection of computers connected together by phone lines allows for the global sharing of information. A(interface B(Internet C(LAN D(WWW 89、______ are web sites that search the web for occurrences of a specified word or phrase. A(Search engines B(WWW C(Internet D(Java 90、Files can be lost or destroyed accidentally(Keep ______ copies of all data on removable storage media. A(backup B(back C(black D(backdown 91、In ______ programming, the user determines the sequence of instructions to be executed, not programmer. A(top-down B(structure C(data-driven D(event-driven 92、______ is a device that converts images to digital format. A(Copier B(Printer C(Scanner D(Display 93、In C language, a ______ is a series of characters enclosed in double quotes. A(matrix B(string C(program D(stream 94、______ are those programs that help find the information you are trying to locate on the WWW. A(Windows B(Search Engines C(Web Sites D(WebPages 95、In C language, ______ are used to create variables and are grouped at the top of a program block. A(declarations B(dimensions C(comments D(descriptions 96、An ______ statement can perform a calculation and store the result in a variable so that it can be used later. A(executable B(input C(output D(assignment 97、Each program module is compiled separately and the resulting ______ files are linked to make an executable application. A(assembler B(source C(library D(object 98、A Web ______ is one of many software applications that function as the interface between a user and the Internet. A(display B(browser C(window D(view 99、A query is used to search through the database to locate a particular record or records, which conform to specified ______. A(criteria B(standards C(methods D(conditions 100、The ______ in E-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America. A(illness B(virus C(weakness D(attachment 101、______: The process of identifying and correcting errors in a program. A(Debug B(Bug C(Fault D(Default 102、______: A collection of related information, organized for easy retrieval. A(Data B(Database C(Buffer D(Stack 103、______: A location where data can be temporarily stored. A(Area B(Disk C(Buffer D(File 104、______: A graphical bar with buttons that perform some of the most common commands. A(Title bar B(Tool bar C(Status bar D(Scroll bar 105、Every valid character in a computer that uses even ______ must always have an even number of 1 bits. A(parity B(check C(test D(compare 106、The maxmum number of data that can be expressed by 8 bits is ______. A(64 B(128 C(255 D(256 107、Integration ______ is the process of verifying that the components of a system work together as described in the program design an system design specification. A(trying B(checking C(testing D(coding 108、GIF files are limited to a maxmum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in ______. A(an image B(a file C(a window D(a page 109、Computer ______ is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing. A(storage B(device C(network D(processor 76( 110 is a channel's capacity which directly reflects the data transfer rate of the channe1. 111 functions in a NetWare network which is used to define addressing schemes. 112 is a network layer device that supports multiple LAN interfaces and segments LANs into smaller collision and broadcast domains. 113 is the popular LAN developed under the direction of the IEEE802.3. 114 is a device which enables digital microcomputers to communicate across analog telephone lines. 110、(1) A(The volume B(The bandwidth C(The noise D(The delay 111、(2) A(NetBEUI B(IP C(IPX D(NCP 112、(3) A(The repeater B(The hub C(The bridge D(The router 113、(4) A(Token Ring B(Token Bus C(Ethernet D(FDDI 114、(5) A(The repeater B(The modem C(The hub D(The printer 115、______ is the conscious effort to make all jobs similar, routine, and interchangeable. A(WWW B(Informatization C(Computerization D(Standardization 116、A sequence of any number of characters enclosed in the double queotes“”is called a character ______. A(array B(group C(set D(string 117、In C launguage, when an array name is passed to a function, what is passed is the ______ of the beginning of the array. A(data B(value C(location D(element 118、In C language, the result of the logical ______ operator is 1 if the value of its operand is 0, 0 if the value of its operand is non-zero. A(AND B(NOT C(OR D(EOR 119、The ______ is a temporary storage area that you can use to copy or move selected text or object among application. A(cache B(pool C(buffer D(clipboard 82(The 120 program means a program written in a high-level language. It is generally translated to an 121 program, which is in a form directly understandably by the computer. The translation is usually done by a program called 122 . 120、(1) A(assemble B(web C(C D(source 121、(2) A(object B(basic C(C D(assemble 122、(3) A(compiler B(assembler C(compile D(transfer 123、______ processing offers many ways to edit text and establish document formats(you can easily insert, delete, change, move and copy words or blocks of text. A(Data B(Database C(Word D(File 124、"crolling" is a technique most commonly associated with ______. A(disk B(display C(printer D(memory 125、Which one of these statements about connecting to the Internet is true?______ A(The Internet can only be used to link computers with same operating system B(The Internet can be used to connect computers with different ISP C(You must have a modem to connect to the Internet D(You must have a telephone line to connect to the Internet 126、In C language, one method of communicating data between functions is by ______. A(arguments B(variables C(messages D(constants 87(In C program, all variables must be 127 before use, usually at the beginning of the function before any 128 statements. 127、(1) A(stated B(instructed C(illustrated D(declared 128、(2) A(operative B(active C(executable D(processing 129、When a string constant is written in C program, the compiler creates ______ of characters containing the characters of the string, and terminating it with "\0". A(a group B(an array C(a set D(a series 130、In C language, the increment and decrement ______ can only be applied to variables, so an expression like x=(i+j)++is illegal. A(operation B(operate C(operator D(operand 131、In C program, it is convenient to use a ______ to exit from a loop. A(end B(break C(stop D(quit 132、The line of computing jobs waiting to be run on a computer system might be a ______. The jobs are serviced in the order of their arrival, that is, the first in is the first out. A(queue B(stack C(array D(record 133、The ______ is a collection of modules serving as interface between hardware and software to provide a software platform. A(computer B(processor C(application software D(operating system 134、C++ fully supports ______ programming. A(visual B(object-oriented C(logic D(natural language 135、The Internet is an open system, and most information is available to everyone(It is very important to add ______ to existing system for protecting the secret information. A(Web pages B(modem C(security D(network 136、A ______ system placed between the company network and the outside world may limit outside access to the internal network. A(firewall B(modem C(gateway D(key 97(Because Web servers are platform and application 137 , they can send or request data from legacy or external applications including databases. All replies, once converted into 138 mark-up language, can then be transmitted to a 139 . Used in this way, Intranets can 140 lower desktop support costs, easy links with legacy applications and databases and, 141 all, ease of use. 137、(1) A(coupled B(dependent C(independent D(related 138、(2) A(ciphertext B(hypertext C(plaintext D(supertext 139、(3) A(browser B(repeater C(router D(server 140、(4) A(off B(offer C(office D(officer 141、(5) A(abort B(about C(above D(around 98(By using MP3, a 600M-byte music CD can be 142 to 50M bytes or less. It can be streamed (downloaded in chunks) so that you can begin listening to the opening bars while the 143 of the file arrives in the background. And, most important, MP3 music files retain good listening 144 that 145 compression schemes lacked. That 146 of features makes accessing and distributing music on the Web practical for the first time. 142、(1) A(pressed B(compressed C(compress D(press 143、(2) A(past B(next C(rest D(host 144、(3) A(amount B(mass C(quantity D(quality 145、(4) A(earlier B(front C(later D(backward 146、(5) A(addition B(combination C(difference D(condition 99(An antivirus program 147 a virus by searching code recognized as that of one of the thousands of viruses known to afflict computer systems. An antivirus Program also can be used to create a checksum for 148 files on your disk, save the checksums in a special file, and then use the checksums to 149 whether files have been modified perhaps by a new virus. Special terminate and stay resident (TSR) programs can check for unusual 150 to access vital disk areas and system f11es, and check files you copy into memory to be sure they are not 151 . 147、(1) A(declares B(deducts C(defeats D(detects 148、(2) A(valuable B(variable C(V01uble D(vulnerable 149、(3) A(calculate B(determine C(run D(write 150、(4) A(attempts B(objects C(programs D(routines 151、(5) A(copied B(effected C(infected D(injected 100(Software products may be 152 into four basic types: application programs, programming language processors, operating systems, and system utilities. Application programs are programs that 153 useful tasks such as solving statistical problems, or keeping your company's books. Programming language processors are programs that 154 the use if a computer language in a computer system. They are tools for the development of application programs. Operation systems are programs that 155 the system resources and enable you to run application programs. System utilities are special programs that 156 the usefulness of or add capabilities to a computer. 152、(1) A(manage B(perform C(support D(reduce E(divided F(enhance G(implemented H(introduce I(ranked J(run 153、(2) A(manage B(perform C(support D(reduce E(divided F(enhance G(implemented H(introduce I(ranked J(run 154、(3) A(manage B(perform C(support D(reduce E(divided F(enhance G(implemented H(introduce I(ranked J(run 155、(4) A(manage B(perform C(support D(reduce E(divided F(enhance G(implemented H(introduce I(ranked J(run 156、(5) A(manage B(perform C(support D(reduce E(divided F(enhance G(implemented H(introduce I(ranked J(run 答案: 单选题 1、C [解析] 译文的含义是:( )是解释和执行指令的功能部件。 A、B、C、D各选项的意思分别是:内存、处理器、存储器、网络。 2、A [解析] 译文的含义是:( )由符号、字符和使用规则构成,使人们可以与计算机进行通信。 A、B、C、D各选项的意思分别是:编程语言、网络、键盘、显示器。 3、A [解析] 译文的含义是:( )软件,也叫做最终用户程序,包括数据库程序、字处理程序、电子格 等等。 A、B、C、D各选项的意思分别是:应用程序、系统、编译器、实用程序。 4、D [解析] 译文的含义是:在( )中,唯一可以删除的元素是最近插入的元素。 A、B、C、D各选项的意思分别是:队伍、队列、数组、堆栈。 5、A [解析] 译文的含义是:多数( )措施都包括加密和密码。 A、B、C、D各选项的意思分别是:安全、硬件、显示、程序。 6、C [解析] 译文的含义是:网络的作用之一是,让多台计算机共享诸如文件系统、打印机和磁带机等 ( )。 A、B、C、D各选项的意思分别是:中央处理器、内存、资源、数据。7、C 8、B [解析] 译文的含义是:防火墙是一个((1))系统,用来((2))一个组织的网络不受到威胁。第1题A、 B、C、D各选项意思依次为:操作、编程、安全、服务。只有选项C符合题意。 第2题A、B、C、D各选项意思依次为:防止、保护、发展、开发。只有选项B符合题意。 9、D [解析] 译文的含义是:( )有几个主要部件,包括系统内核、存储管理系统、文件系统管理器、设备驱动器和系统库。 A、B、C、D各选项的意思依次为:应用软件、信息系统、网络、操作系统,所以本题应该选择D。 10、B [解析] 译文的含义是:( )是一个变量的地址或存储了其他变量地址的变量。 A、B、C、D各选项的意思分别是:控制器、指针、数组、记录。很明显,题目描述的是指针,所以应该选择B。 11、A [解析] 译文的含义是:C++用于适当的( )技术中。 A、B、C、D各选项的意思分别是:面向对象的、基于对象的、朝向对象的、朝向目标的。 这里值得注意的是,虽然face to object也有“面向对象”的意思,但在计算机编程中的“面向对象”的专有词是Object Oriented,简称OO。所以,本题应该选择 A。 12、B [解析] 译文的含义是:( )是给定了基类型的连续编号的变量集合,它能够作为参数传递给函数使用。 A、B、C、D各选项的意思分别是:记录、数组、文件、参数。所以,根据题目的描述,应该选择数组。 13、C [解析] 译文的含义是:( )不是一种编程语言。 COBOL、Java和Basic都是编程语言,所以本题应该选择C。 14、C [解析] 译文的含义是:( )是非程序文本,嵌入在程序中是为了向程序的阅读者解释程序的窗体和函数。 A、B、C、D各选项意思分别为:命令、编译、注释、声明。根据题意,本题应该选择C。 15、B [解析] 译文的含义是:当一个操作的结果超过了表示范围时,就发生了( )。 各选项意思分别为:服药过量、溢出、透支、曝光过度。根据题意,本题应该选择B。 16、D [解析] 译文的含义是:( )不足会使处理器的性能潜力只能发挥一半甚至更低。 A、B、C、D各选项的意思分别是:鼠标、输入输出、文档、内存。只有内存符合题意,所以本题应该选择D。 17、B [解析] 译文的含义是:电子邮件中的( )已感染了全球几乎每台计算机,在北美造成了多达10亿美元的损失。 A、B、C、D各选项的意思分别是:疾病、病毒、缺陷、附件。只有病毒符合题意,所以本题应该选择B。 18、D [解析] 译文的含义是:计算机安全性的基本规则之一是定期改变您的( )。 A、B、C、D各选项的意思分别是:名字、计算机、设备、密码。所以本题应该选择D。 19、C [解析] 译文的含义是:家庭( )的最大特点是多台计算机能同时共享一个因特网接口。 A、B、C、D各选项的意思分别是:计算机、设备、网络、工作(所以本题应该选择C。 20、A [解析] 译文的含义是:网址一般就是( )页地址,尽管你可以进入任何网页地址并且使该页发送给你。这里指的应该是主页,而主页在英文中的翻译是homepage。所以,本题应该选择A。 21、B [解析] 译文的含义是:Web页面( )表示“HTTP服务器上的任意HTML文档”。 A、B、C、D各选项的意思分别是:Web服务、Web页面、Web浏览器、Web站点。在HTTP服务器上的每个HTML文档都是一个Web页面。所以,本题应该选择B。 22、C [解析] 译文的含义是: ( )程序表示用高级语言书写的程序。 A、B、C、D各选项的意思分别是:编译、可执行、源、目标。所以,本题应该选择C。 23、D [解析] 译文的含义是:长而复杂的表达式很难正确书写且不易于( )。 A、B、C、D各选项的意思分别是:保护、发现、默认、调试。只有选项D合适。 24、B [解析] 译文的含义是:在C语言中,函数是很重要的,它具有把代码( )的功能,因此,一个大而复杂的程序能够由多个小程序组合而成。 很显然,这里应该填的是“模块化”,英文应写为modularize,故本题应该选择B。 25、C [解析] 译文的含义是:在C语言中,标准( )函数包括许多用于输入、输出、字符串处理、数学计算、系统调用的函数。在C语言中,包含这些函数的是标准库函数,故本题应该选择C。 26、D [解析] 译文的含义是:在( )的程序中,由用户而不是程序员决定将被执行的指令的序列。由用户来决定将被执行的指令,这种程序是由事件驱动的,所以,本题应该选择D。 27、D [解析] 译文的含义是:( )是指可连接到另一个Web页面或文档的可点击的字符串或图片。各选项的意思分别是:链接、锚记、浏览器、超链接。所以本题应该选择 D。 28、A [解析] 译文的含义是:( )是解决主要安全问题的一种方法,它通常被安装来解决已知的安全漏洞。 A、B、C、D各选项的意思分别是:补丁、补偿物、补充、插件。所以本题应该选择A。 D 29、 [解析] 译文的含义是:程序员需要知道函数的( )才能正确调用该函数。 A、B、C、D各选项的意思分别是:位置、算法、接口、声明。要正确地调用一个函数,必须知道它的声明,故本题应该选择D。 30、B [解析] 译文的含义是:在( )存储系统中,程序的逻辑存储空间完全独立于物理的存储空间。 A、B、C、D各选项的意思分别是:缓冲、虚拟、随机存取存储器、只读存储器。只有在虚拟存储系统中,逻辑存储空间可完全独立于物理存储空间,故本题应该选择B。 31、B [解析] 译文的含义是:( )能直接反映传输系统的容量。 A、B、C、D各选项的含义是卷、带宽、噪声、延迟。选项B正确。 32、B [解析] 译文的含义是:( )能使数字计算机通过模拟电话线进行通信。 A、B、C、D各选项的含义是中继器、调制解调器、集线器、打印机。选项B正确。33、C 34、A 35、D 36、D 37、B [解析] 译文的含义是:通过电子邮件(E-mail)交流已成为网络上最普遍的网络活动。我们可以和任何一个有网络地址或((2))的人在网上进行((1)),只需要接入网络和((3))一个电子邮件程序。当前应用最广泛的电子邮件程序是微软的Outlook Express((4))和网景的Navigator。一个典型的电子邮件信息包括三部分(5):标题、内容和签名。38、B 39、C 40、A 41、D 42、B [解析] 译文的含义是:电子邮件主要的问题是((1))容易使用,以致人们被信息((1)),这些信息((3))人们能在当天回复的量。此外,信箱需要进行一些管理,((4))无用信息或归档那些迟一些时候才需要的信息。发信人不是总知道你的邮件积压并经常发送(5)信息。 43、D [解析] 译文的含义是:( ):尝试除以0时可能引发的错误。 A、B、C、D各个选项的含义是中断、默认、下溢、溢出。选项D正确。44、B 45、D 46、B 47、A 48、C [解析] 译文的含义是:应用程序使计算机能够完成实际的业务((1)),但是,((2)),它是操作系统的核心。操作系统是内核,在技术上巧妙地处理多个程序,连接到网络,以及存储((3))。传统的内核((4))应用程序的所有功能。内核管理内存、I/O设备以及分配处理器时间。 内核还支持安全性以及((5)),在系统部分失效时,它能够自动恢复。 对于第1个空,显然,应当填写一个名词,所以排除选项A和选项D,use、apply都有应用的意思,但是,apply是动词。所以只有选项B符合题意。 对于第2个空,surface是表面的意思,below the surface是“本质上、实际上”的意思。 对于第3个空,选项A、B、C、D的含义分别是图形、数据、文本、图像。图形、文本和图像都属于数据,数据涵盖意义比较广泛,B为所选。 对于第4个空,从语法上来看,选项A是正确的。 对于第5个空,选项A、B、C、D的含义分别是错误、问题、容忍、问题。fault tolerance是容错的意思,C为所选。其他各项,如果选择的话,与fault意思重复了,这样就可以简单被排除掉。49、B 50、C 51、D 52、A 53、B [解析] 译文的含义是:使用MP3,600MB的音乐CD可以((1))为50MB或更小。它可以流式传输(分块下载),使人们可以边在后台下载((2)),边听音乐。此外,更重要的是,在((4))缺少压缩方案时,MP3音乐文件还可以保持良好的音乐((3))。这些特征((5))起来,使得在Web上第一时间访问和分发音乐更为实际。54、C 55、B 56、A 57、B 58、C [解析] 译文的含义是:因为Web服务器是(1)平台和应用的,所以,它们可以向遗留应用以及外部应用发送数据,或者从中请求数据。所有应答,一旦转换为(2)标记语言,那么,随后就可以传输到(3)。通过这种方式使用,因特网可以(4)更低的桌面支持成本,与遗留应用和数据库的链接更为容易,而且,(5),易于使用。 注意,above all有“尤其是”、“更重要的是”的含义。59、A 60、A 61、D 62、A 63、D [解析] 译文的含义是:现在,软件质量保证是软件工程的((1))学科。Buckly和Oston指出,((2))软件质量保证,可能会导致软件成本的((3))。然而,在此领域中,软件管理的主要负担是,缺少((4))软件标准。在软件工程中,制定可接受的以及适用的标准,应当是软件工程((5))的根本目标之一。64、D 65、D 66、B 67、A 68、C [解析] 译文的含义是:指令由操作构成,那些操作((1))要执行的函数,以及表达要操作数据的操作数。例如,如果一条指令执行两个数字的((2))操作,那么,它必须要知道,这两个数据在((3))。处理器的工作是,从内存中((4))指令和操作数,并执行每个操作。完成之后,它给内存发送信号,让它执行((5))指令。69、D 70、A 71、B 72、D 73、B [解析] 译文的含义是:软件设计是((1))的过程。它需要设计者具有((2))鉴别能力。设计不能仅仅来源于书本。它必须考虑到人们的经验和教训,并对现有系统进行研究。((3))良好的软件系统其实现与维护都简单直接,易于((4)),而且具有可靠性。设计拙劣的软件系统,尽管其可以工作,但((5))维护昂贵,难于测试,而且不可靠。 74、A [解析] 译文的含义是:( )是字母和数字的组合,首字符必须是字母。 选项A、B、C、D的含义分别是标识符、字符串、数组、程序。 75、B [解析] 译文的含义是:通过C编译器给出的错误消息说明了消息文本、最常见的错误原因,以及( )错误的建议。 选项A、B、C、D的含义分别是更新、修正、更改、编辑。选项B符合题意,为所选。76、C 77、D [解析] 译文的含义是:下面的建议可以提高程序的((1)),并使它们易于((2))。 1(使用标准缩进技术、空行、换页以及空格。2(在代码中插入足够的注释信息。本题的答案,需要通过后续建议内容来填写。两条建议都是提高代码可读性的手段,所以应当选择可读性,而改进可读性,也就使得程序易于维护。 对于第1空,选项A、B、C、D的含义分别是可靠性、安全性、可读性、可用性。选项C符合题意,为所选。 对于第2空,选项A、B、C、D的含义分别是执行,中断、编译、维护。选项D 符合题意,为所选。注意,调整代码缩进等方式,对代码的执行、中断、编译都没有影响。 78、B [解析] 译文的含义是:( )是一种系统特征,或者是为了完成系统任务系统能做什么的描述。 选项A、B、C、D的含义分别是计划、需求、文档、设计。选项B符合题意,为所选。 79、A [解析] 译文的含义是:( )是一组和软件的集合,使得小程序或软件组件可以协同工作。 选项B的含义是扩展标记语言,选项C的含义是超文本标记语言,选项D的含义是数据库管理系统。只有选项A符合题意。 80、A [解析] 译文的含义是:100BASE-TX利用两对双绞线电缆,一对用于传输,另一对用于 ( )。 选项A、B、C、D的含义分别是接收、检测、相关、连接。选项A符合题意,为所选。 81、D [解析] 译文的含义是:典型的外设都具有一个( ),处理器利用它来选择设备寄存器。 选项A、B、C、D的含义分别是数据、控制、信号、地址。选项D符合题意,为所选。 82、B [解析] 译文的含义是:( )计算机是个人计算机,其硬件能够在程序中使用以下任何媒体:文本、图形、视频和动画。 选项A、B、C、D的含义分别是数据库、多媒体、网络、大型机。选项B符合题意,为所选。 83、D [解析] 译文的含义是:( )控制屏幕上的光标或指针,使得用户可通过指向和单击来访问命令。 选项A、B、C、D的含义分别是图形、打印机、程序、鼠标。选项D符合题意,为所选。 84、A [解析] 译文的含义是:( )可以复制相片、图画或文本页到计算机中。 选项A、B、C、D的含义分别是扫描仪、打印机、显示器、键盘。选项A符合题意,为所选。 85、B [解析] 译文的含义是:( )永久存储在计算机中,在硬件和PC机上运行的其他程序之间,提供联系。 选项A、B、C、D的含义分别是接口、操作系统、因特网、应用软件。选项B符合题意,为所选。 86、A [解析] 译文的含义是:( )不是线性结构。 选项A、B、C、D的含义分别是图、队列、栈、I维数组。选项A符合题意,为所选。 87、C [解析] 译文的含义是:( )通过计算机收发消息,它是快速的、低成本的与世界通信的方式。 选项A、B、C、D的含义分别是局域网、邮局、电子邮件、I维数组。选项C符合题意,为所选。 88、B [解析] 译文的含义是:( )是通过电话线互联的计算机的集合,使得全球信息共享成为可能。 选项A、B、C、D的含义分别是接口、因特网、局域网、WWW。选项B符合题意,为所选。 89、A [解析] 译文的含义是:( )是通过指定的词或短语来搜索Web上信息的网站。 选项A、B、C、D的含义分别是搜索引擎、WWW、因特网、Java。选项A符合题意,为所选。 90、A [解析] 译文的含义是:文件可能会偶然丢失或被破坏,要保持在可移动的存储介质上保持所有数据的( )副本。 选项A、B、C、D的含义分别是备份、背面、黑色、让步。选项A符合题意,为所选。 91、D [解析] 译文的含义是:在( )编程中,用户决定了指令的执行顺序而不是由程序员决定。 选项A、B、C、D的含义分别是自顶向下、结构、数据驱动,事件驱动。选项D符合题意,为所选。 92、C [解析] 译文的含义是:( )是将图像转换为数字格式的设备。 选项A、B、C、D的含义分别是复印机、打印机、扫描仪,显示器。选项C符合题意,为所选。 93、B [解析] 译文的含义是:在C语言中,( )是双引号括起来的一系列字符。 选项A、B、C、D的含义分别是矩阵、字符串、程序、流。选项B符合题意,为所选。 94、B [解析] 译文的含义是:( )是程序,帮助人们在WWW上找到信息。 选项A、B、C、D的含义分别是Windows (一种操作系统)、搜索引擎、网站、网页。选项B符合题意,为所选。 95、A [解析] 译文的含义是:在C语言中,( )用于创建变量,而且在程序块顶端分组。 选项A、B、C、D的含义分别是声明、维、注释、描述。选项A符合题意,为所选。 96、D [解析] 译文的含义是:( )语句可以执行计算,并将结果存储在变量中,以便以后使用。 选项A、B、C、D的含义分别是可执行、输入、输出、赋值。选项D符合题意,为所选。 97、D [解析] 译文的含义是:每个程序模块都单独编译,结果( )标文件链接起来,生成可执行应用程序。 选项A、B、C、D的含义分别是汇编器、源程序、库、目标。选项D符合题意,为所选。 98、B [解析] 译文的含义是:Web( )是诸多软件应用之一,其作用是作为用户与因特网之间的接口。 选项A、B、C、D的含义分别是显示器、浏览器、窗口、视图。选项B符合题意,为所选。 99、A [解析] 译文的含义是:查询用来搜索数据库,查找符合指定( )的特定的一个或几个记录。 选项A、B、C、D的含义分别是条件、标准、方法、条件。选项A符合题意,为所选。 100、B [解析] 译文的含义是:电子邮件消息中的( )已经感染了全世界的几乎每一台计算机,在北美,所造成的损失达10亿美元。 选项A、B、C、D的含义分别是疾病、病毒、弱点、附件。选项B符合题意,为所选。 101、A [解析] 译文的含义是:( ):确定和修正程序错误的过程。 选项A、B、C、D的含义分别是调试、错误、缺陷、默认。选项A符合题意,为所选。 102、B [解析] 译文的含义是:( ):相关信息的集合,其组织便于进行检索。 选项A、B、C、D的含义分别是数据、数据库、缓冲区、堆栈。选项B符合题意,为所选。 103、C [解析] 译文的含义是:( ):可以临时存储数据的位置。 选项A、B、C、D的含义分别是区域、磁盘、缓冲区、文件。选项C符合题意,为所选。 104、B [解析] 译文的含义是:( ):一种图形条,上面有按钮,可执行一些最常见的命令。 选项A、B、C、D的含义分别是标题栏、工具栏、状态栏、滚动条。选项B符合题意,为所选。 105、A [解析] 译文的含义是:在计算机中,采用( )的每个有效字符一定含有偶数个1。 选项A、B、C、D的含义分别是奇偶性、检查、测试、比较。选项A符合题意,为所选。 106、C [解析] 译文的含义是:用8位可以表示的最大数据是( )。 107、C [解析] 译文的含义是:集成( )是这样的过程,它验证系统各个组成部分是否可以按照程序设计和系统设计规范的描述一起工作。 选项A、B、C、D的含义分别是尝试、检查、测试、编码。选项C符合题意,为所选。 108、A [解析] 译文的含义是:GIF文件规定,每个像素最多8位,这就意味着,GIF( )的颜色不能超过256种。 选项A、B、C、D的含义分别是图像、文件、窗口、页面。选项A符合题意,为所选。 109、C [解析] 译文的含义是:计算机( )是由两个或两个以上的计算单元构成的复合体,其目的在于数据通信和资源共享。 选项A、B、C、D的含义分别是存储、设备、网络、处理器。选项C符合题意,为所选。110、B 111、C 112、D 113、C 114、B [解析] 译文的含义是:((1))指的是能直接反映传输系统的容量,选项B正确。((2))定义NetWare网络上所使用的寻址方案(addressing schemes),选项C正确。((3))是一种连接多种网络接口和网段,缩小广播域(broadcast domains)和冲突域 (collision domains)的网络设备,选项D正确。 ((4))是应用最为广泛的局域网,符合IEEE 802.3系列标准规范,选项C正确。((5)),调制解调器(modem)能使数字计算机通过模拟电话线进行通信,选项B正确。 115、D [解析] 译文的含义是:( )就是不断努力使所有工作都类似、常规化而且可交换。 116、D [解析] 译文的含义是:双引号“”中括起来的若干字符序列叫做( )。选项A、B、C、 D的含义分别是数组、组、集合、字符串,选项D为正确答案。 117、C [解析] 译文的含义是:在C语言中,当数组名传递给函数时,传递的是数组的起始( )。 选项A、B、C、D的含义分别是数据、数值、位置、元素,选项C为正确答案。 118、B [解析] 译文的含义是:在C语言中,如果操作数的值为0,则逻辑运算( )的结果为 1,如果操作数的值非0,则逻辑运算NOT的结果为0。选项B为正确答案。 119、D [解析] 译文的含义是:( )是临时存储区,可用来在应用程序之间复制或移动所选的文本或对象。 选项A、B、C、D的含义分别是高速缓存、池、缓冲区、剪贴板,选项D为正确答案。120、D 121、A 122、A [解析] 译文的含义是:(1)就是使用高级语言编写的程序。通常情况下,它要转换为(2)程序,也就是计算机可以直接理解的程序。这种转换通常使用(3)来完成。 对于第1空,选项A、B、C、D的含义分别是汇编、Web、C、源,选项D为正确答案。 对于第2空,选项A、B、C、D的含义分别是目标、基本、C、汇编,选项A为正确答案。 对于第3空,选项A、B、C、D的含义分别是编译器、汇编器、编译、转换,选项A为正确答案。 123、C [解析] 译文的含义是:( )处理提供了多种方式编辑文本,以及建立文档格式。可以很容易地插入、删除、更改、移动和复制文字或文本块。选项A、B、C、D的含义分别是数据、数据库、文字和文件, 选项C为正确答案。 124、B [解析] 译文的含义是:“滚动”是与( )密切相关的一种技术。 选项A、B、C、D的含义分别是磁盘、显示器、打印机和内存,选项B为正确答案。 125、B [解析] 译文的含义是:下面有关因特网连接的叙述,哪个是正确的? 选项A的含义是:因特网只能连接具有相同操作系统的计算机。这是错误的说法,因为因特网上连接的计算机,有许多种操作系统。 选项B的含义是:因特网可以连接使用不同ISP的计算机。这是正确的。本题正确答案为选项B。 选项C的含义是:连接到因特网必须有调制解调器。这是错误的。因为因特网接入方式通常有专线连接、局域网连接、无线连接和电话拨号连接4种。 D的含义是:连接到因特网必须有电话线。这是错误的。理由同上。 126、A [解析] 译文的含义是:在C语言中,函数之间的一种通信方式是使用( )。选项A,选项D的含义分别是:参数、变量、消息和常量。127、D 128、C [解析] 译文的含义是:在C程序中,所有变量都必须在使用之前进行((1)),通常是在任何((2))语句之前的函数开始位置。 129、B [解析] 译文的含义是:在使用C语言编写的字符串常量时,编译器会创建字符( ),该数组中包含字符串字符,并使用\0来终止。选项A,D的含义分别是一组、一个数组、一个集合、一个系列。 130、A [解析] 译文的含义是:在C语言中,增量和减量( )只能应用于变量,所以,x=(i+j)++这样的表达式是不合法的。选项A,D的含义分别是操作(名词)、操作(动词)、操作符、操作数。 131、B [解析] 译文的含义是:在C语言中,使用( )从循环中退出是很方便的。 132、A [解析] 译文的含义是:在计算机系统中,等待运行的计算队伍可以排成( ),按照到达的先后顺序进行处理,也就是先进先出。选项A,D的含义分别是队列、堆栈、数组和记录。 133、D [解析] 译文的含义是:( )是模块的集合,作为硬件和软件之间的接口,提供一个软件平台。选项A,D的含义分别是计算机、处理器、应用软件和操作系统。 134、B [解析] 译文的含义是:C++完全支持( )编程。选项A,选项D的含义分别是可视化、面向对象,逻辑和自然语言。 135、C [解析] 译文的含义是:因特网是开放式系统,多数信息对每个人都可用。为了保护秘密信息,对现有的系统增加( )是非常重要的。选项A,D的含义分别是网页、调制解调器、安全性和网络。 136、A [解析] 译文的含义是:( )系统在公司网络和外部世界之间,可以限制外界访问内部网络。选项A,D的含义分别是防火墙、调制解调器、网关和密钥。137、C 138、B 139、A 140、B 141、C [解析] 译文的含义是:因为Web服务器((1))平台和应用,它们可以从包括数据库在内的旧式或外部应用发送或请求数据。所有的返回结果,一旦转换为((2))标记语言,那么,就能随后传送给((3))。利用这种方式,内部网可以((4))更低的桌面支持成本,与旧式应用和数据库轻松连接,而且,((5)),易于使用。142、B 143、C 144、D 145、A 146、B [解析] 译文的含义是:利用MP3技术,600MB的音乐CD可以((1))50MB甚至更少。它可以流式传输 (分块下载),这样,在听到开始部分音乐的同时,文件的((2))在后台继续传输。而且,更为重要的是,尽管其(4)压缩方案有些欠缺,但它的((3))良好。这些特点((5)),使得在网页上访问和发布音乐第一次得以实现。147、D 148、D 149、B 150、A 151、C [解析] 译文的含义是:通过搜索数千种已知的会破坏计算机的病毒代码,反病毒程序((1))病毒。反病毒程序还为磁盘上((2))文件建立检验和,在特殊的文件中保存它们,然后,使用检验和来((3)),文件是否被新病毒所修改。TSR程序可以检查访问重要的磁盘区域以及系统文件的异常((4)),而且,检查复制到内存的文件,以确保它们没有被((5))。152、E 153、B 154、C 155、A 156、F [解析] 译文的含义是:软件产品可以((1))4种基本类型:应用程序、语言处理程序、操作系统和系统实用程序。 应用程序用来((2))有用的任务,比如解决统计问题,或者管理公司账目。 语言处理程序((3))计算机语言在计算机系统中的使用。它们是开发应用程序 的工具。 操作系统的作用是((4))系统资源,使得用户可以运行应用程序。 系统实用程序是特殊的程序,它们((5))计算机的使用性,或者说,提高了计算机的应用能力。
/
本文档为【计算机水平考试-程序员分类模拟题计算机专业英语】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。 本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。 网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。

历史搜索

    清空历史搜索