当前位置:文档之家› 计算机专业英语期末测试卷

计算机专业英语期末测试卷

计算机专业英语试题命题人:王晓萍姓名:__________ 班级:___________ 分数:__________________ 一、英汉互译并写出缩写的全称(20分)1.Tree structure__结构树_________ 2.Supervisor password____超级密码_________3.PC _________计算机________________10.计算机程序___computer program_________________11.软件测试______softwaretesting_______________12. 子文件夹________________ 13. 主菜单_________main menu_________14. 微处理器________________15. 升级软件________________16. 副作用__________________17. 搜索引擎________________18. 备份____________________19. 足够内存_________memory_______20. 域名___________dns_________二、判断题(对的填T, 错的填F)(5分)2 病毒通常会具有副作用()3 反病毒软件只可以扫描病毒()三、选择题(25分其中英语的每题2分)6. The basic units of a computer system are as follows: _________A. CPU, memory and diskB. CPU, input and output unitC. CPU, memory and I/O systemD. CPU, memory and ALU7. Today, ______can give you a video camera, a fax machine, a CD-ROM drive, ect.A. input devicesB. expansion cardsC. output deviceD. joystick8. When power is removed, information in the semiconductor memory is ________ .A. reliableB. lostC. manipulatedD. remain9. _________ is designed to manage large bodies of information.A. a file systemB. a transactionC. a database systemD. a database language10. A characteristic of operating system is _________ .A. resource managementB. memory managementC. error recoveryD. all the above11. An ISP supplies a _________ that you can dial from your computer to log on the internet server.A. public keyB. private keyC. service numberD. help file12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. Followings are some image data file formats, which is wrong? _______A.*.TIFB. *.DOCC. *.BMPD. *.GIF14. By adding _________ to your programs, you can make computers more interesting and much more fun for the user.A. multimediaB. textC. musicD. picture15. Followings are all software, which is not the antivirus software?A Kaspersky Antivirus B. Jiangming softwareC. Rising softwareD. Spyware四、将左列的词汇与右列相应的汉语匹配。

(10分,每空1分)1. multimedia a.2. software life cycle b. 交换机 switch3. structured programming 结构化程序c. 多媒体multimedia设计4. function al testing 功能测试 d. 局域网5. word processor 字处理器 e.6. code windows代码窗口 f. 软件生命周期software lifecircle7. firewall g. function testing8. LAN h.9. hacker i. 黑客hacker10. switch j. 防火墙firewall五、阅读理解(30分)Passage A Tell whether the following statements are true(T) or false(F) according to the passageThe central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, while its speed and capacity have increased tremendously. Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap.The CPU comprises the control unit and the arithmetic / logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices.The ALU performs all the arithmetic and logical (comparison) functions — that is, it adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.1.With the development of computer, the physical size of the CPU has often become bigger andbigger. ( )2.The movement of electronic signals between main memory and the ALU as well as thecontrol signal between the CPU and input /output devices are controlled by the control unit of the CPU. ( )3.The CPU comprises the control unit and memory. ( )4.The control unit performs all the arithmetic and logical (comparison) functions5. The central processing unit (CPU) is the heart of the computer systems. ( )Passage BTips for Computer MaintenanceDo you know how to take care of your computer? Pay attention to the following computer maintenance tips before you get yourself into trouble.●Never, never, turn your computer off with the power switch until Windows has shut down.●Backup, backup, backup.●Run Scandisk at least once a month and anti-virus software every day.●Do keep at least 100 MB of your C: drive free for Windows to use..●If you do not have enough free space you will choke Windows and it will start dumping datato your hard drive, or it will just get really, really, slow.●Do not let a lot of programs load up when you start your computer. They use valuablememory and Windows Resources.●If you have a high speed Internet connection, you need a firewall program.A firewall program keeps those who want to get into your computer from gaining access to your system.6. You can’t turn off the power when ________________________.A. the disk isn’t runningB. the disk light is blinking.C. you leave the office7. If the computer is shut down suddenly, what may not happen?A. Data will be lost.B. Windows files will be missingC. Keyboard doesn’t work8. For Windows, at least how much free space should be left on system drive C?A. 100 MBB. 100 KBC. 200 KB9. If your computer doesn’t have enough memory, what should you do?A. Close some programsB. Install some softwareC. Run anti-virus software10. Your computer is connected to the Internet all day. What software should you install to keep it safe?A. A Firewall softwareB. A spywareC. A QQ chatting softwarePassage CA computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number. As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types: Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.Trojan Horses -This is a program that doesn't replicate when entering a system but can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.11.A computer virus is a computer program that is created to make and spread of itself. A.programs B.virus C. copies D.files12.Worm spread itself except by .A.network B.E-mail C.program D.hardware13.Antivirus program can scan and virus.A.clean B.produce C.replicate D.make1 4.Trojan Horses .A.quickly replicate itself and gradually attache to files, programs or the hard drive. B.infect the computer without even having to click open email attachment or any program. C.allow hackers to take control over a particular system or to steal very important data. D.avoid the virus to attack computer.15.According to BusinessWeek, the attacks reported in the first half of 2003 nearly match previous year's total number.A. 86,404 B. 76,404 C.56,354 D.34,876Ⅲ.Translation.翻译(30分)(一)将下列句子翻译成汉语。

相关主题