当前位置:文档之家› 计算机专业英语2模拟试题2及答案

计算机专业英语2模拟试题2及答案

计算机专业英语模拟2Ⅰ. Vocabulary(词汇,30分)(一).Translate the following words and expressions into Chinese.(写出下列词组的汉语,共10分,每题1分)1. central processing unit(CPU)中央处理器1. 2. operating system 操作系统2. 3. electronic spreadsheet 电子表格4. management information system 管理信息系统5. electronic commerce 电子商务6. database 数据库7. software engineering 软件工程8. software crisis 软件危机9. network security 网络安全10. computer virus 计算机病毒(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写,共10分,每题1分)1.随机存储器RAM 2.局域网LAN3.计算机辅助设计CAD 4.数字视频光盘DVD5.通用串行总线USB 6.面向对象编程OOP7.集成开发环境IDE 8.结构化查询语言SQL9.多文档界面MDI 10.企业之间的电子商务交易方式B2B (三).Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配,共10分,每空1分)1. output b a. 视频2. high-level language c b. 输出.3. project window e c. 高级语言4. black-box testing g d. 应用软件5. multimedia h e. 工程窗口6. WWW i f. 系统软件7.field j g. 黑盒测试8. application software d h. 多媒体9. system software f i. 万维网10.vidio a j. 字段Ⅱ. Comprehension(阅读理解,40分)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式( )填空,共10分, 每空2分)A programming language, designed to facilitate the communication between human and computers, is a _ notation _ for describing computation in readable form. There are 3 levels of programming languages, they are_ machine language _ , which can be run directly by computer; ___ assembly language __ and _ high-level language _. There are different high-level programming languages. Fortunately, most of them have many kinds of construct in common and vary only in the way that these must be _ written __ . Therefore, first thing to be decided about a task is to choose which programming language is best suited for the job.Passage AThe central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, while its speed and capacity have increased tremendously. Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap.The CPU comprises the control unit and the arithmetic / logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices. The ALU performs all the arithmetic and logical (comparison) functions — that is, it adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.(二)Tell whether the following statements are true(T) or false(F) according to the passage A.(根据上文的内容判断下列句子的正误,共10分,每题2分)1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( F )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control unit of the CPU. ( T )3. The CPU comprises the control unit and memory. ( F )4. The control unit performs all the arithmetic and logical (comparison) functions . ( F )5. The central processing unit (CPU) is the heart of the computer systems. ( T )Passage BA computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.Trojan Horses - This is a program that doesn't replicate when entering a system but can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.(三)choose the best answer according to the passage B.(根据上文的内容选择正确的答案,共10分,每题2分)1.A computer virus is a computer program that is created to make and spread C of itself. A.programs B.virus C. copies D.files2.Worm spread itself except by D .A.network B.E-mail C.program D.hardware3.Antivirus program can scan and A virus.A.clean B.produce C.replicate D.make4.Trojan Horses C .A.quickly replicate itself and gradually attach to files, programs or the hard drive.B.infect the computer without even having to click open email attachment or any program. C.allow hackers to take control over a particular system or to steal very important data. D.avoid the virus to attack computer.5.According to Business Week, the B attacks reported in the first half of 2003 nearly match previous year's total number .A. 86,404 B. 76,404 C.56,354 D.34,876Passage CThe Internet, then known as ARPANET, was brought online in 1969, which initially connected four major computers at universities in the southwestern US . The early Internet was used by computer experts , engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personal computers in those days, and anyone who used it, whether a computer professional or an engineer or scientist or librarian, had to learn to use a very complex system.The Internet matured in the 1970's as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today' s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources.In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network.Since the Internet was initially funded by the government, it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 1990's, when independent commercial networks began to grow.(四)Choose the best answer according to Passage C.(根据上文的内容选择正确的答案,共10分,每题2分)1. How many computers were connected to the initial Internet in 1969 ? BA. TenB. FourC. TwentyD. Three2. Only A could use the early Internet.A. computer experts, engineers, scientists, and librariansB. any experts, engineers, scientists, and librariansC. computer experts, engineers, scientists, and studentsD. experts, engineers, and scientists in universities in US3. The Internet became a lot easier for non-technical people to learn and use because of the common B .A. commandsB. protocolsC. topologiesD. architecture4. The first really friendly interface to the Internet appeared with the introduction of a Csystem for files and information access.A. computerB. operatingC. menuD. application5. Which statement is not true according to Passage C? DA. Many more people in universities began to use the Internet in the 1970s, but it wasn't as user-friendly as today's standards.B. The restrictions to commercial uses changed as the independent commercial networks were not funded by the government.C. Commercial uses were allowed for the early Internet if they directly served the goals of research and education.D. The early Internet was logged in from home or office personal computers.Ⅲ.Translation(翻译,30分)(一) Translate the following sentences into Chinese.(将下列句子翻译成汉语,每题5分)1. SQL Server is designed to allow thousands of users to access the database at the same time and is a true client/server database system.1. SQL服务器用于允许成前上万的用户同时访问数据库,是一个真正的客户端/服务器端的数据库系统。

相关主题