计算机英语选择题..pdf

上传人:tbuqq 文档编号:5357523 上传时间:2020-04-23 格式:PDF 页数:32 大小:155.58KB
返回 下载 相关 举报
计算机英语选择题..pdf_第1页
第1页 / 共32页
计算机英语选择题..pdf_第2页
第2页 / 共32页
计算机英语选择题..pdf_第3页
第3页 / 共32页
计算机英语选择题..pdf_第4页
第4页 / 共32页
计算机英语选择题..pdf_第5页
第5页 / 共32页
点击查看更多>>
资源描述

《计算机英语选择题..pdf》由会员分享,可在线阅读,更多相关《计算机英语选择题..pdf(32页珍藏版)》请在三一文库上搜索。

1、(1 A large main memory can be used for storing a,b,c . a. data b. operating system c. applications d. interface (2 Early computer solved c,d problems. a. control b. business applications c. engineering d. mathematical (3 The system manager used by a fast processor can a,b,c . a. reset a system b. mo

2、nitor processors core temperature c. monito r processors supply voltages d. connect a network (4 We can say a bus is simply a,c,d . a. a group of wires b. a wire c. a 8-bit bus d. a 16-bit bus (5 A computer system user generally more cares for b,c,d . a. physical size of the computer b. storage size

3、 c. speed of computation d. efficiency of the computer (6 According to the physical size of computers we can classify the computers into a,b,c,d . a. microcomputer b. minicomputer c. mainframe d. supercomputer (7 The basic hardware components of any computer include a,b,c,d . a. CPU b. main memory c

4、. input devices d. output devices (8 The following devices are belong to the mass storages a,b,d . a. DVD b. CD-ROM c. mouse d. disk (1 Cache is a,c,d . a. fast b. slow c. relatively small d. high cost (2 Information stored in semiconductor RAM is b,c . a. permanent b. nonpermanent c. volatile d. no

5、n volatile (3 We use paged virtual memory to a,b,c,d . a. extend the size of memory b. increase bandwidth of the disk c. reduce latency of the disk d. store large program and data set (4We read data on the disk by a,d . (5 The three desiderata of memory system are b,c . a.independent b. exclusive c.

6、closely approximated today d. Less approximated tomorrow (6 The processor performance would be high as we reference instructions and data from b,d . a. hard disk b. cache c. floppy disk d. memory (7 Page frame is used in a . a. real memory b. virtual memory c. disk d. cache (8 In order to increase o

7、ur computers performance we need to a,b,c , a. have a L2 cache b. buy a L2 cache c. have a much larger main memory d. buy a L1 cache (1 RISC is b,c,d . a. abbreviation of complex instruction set computer b. abbreviation of reduced instruction set computer c. guided to be built from studying the exec

8、ution behavior of high-level language programs d. used for many computer manufacturers nowadays (2 To enhance performance of a computer system we should a,b,d . a. improve the pattern of referencing operand b. optimize the simple movement of data c. use IF and LOOP instructions as many as possible d

9、. optimize the basic sequence control mechanism (5 Register storage has b,d . a. a large capacity b. a small capacity c. the slower speed d. the faster speed (6 Instruction format in RISC has a,c,d . a. one kind b. many kinds c. a few kinds d. one or a few kinds (7 CISC machine instructions compared

10、 with RISC machine are a,d . a. more complicated b. more simple c. more faster to be executed d. more slower to be executed (8 Functions of the compiler used in RISC are b,c,d . a. to compile a high level language program b. to optimize register usage c. to maximize register usage d. to allocate reg

11、isters to those variables that will be used the most in a given time period (9 One machine cycle in RISC has c . a. two machine instructions b. three machine instructions c. one machine instruction d. four machine instructions (10 The register file is a,c,d . a. physically small b. physically large

12、c. one the same chip as the CPU d. addressed by much shorter addresses Operating systems and middleware b,c,d a. have less in common b. both can support other software c. have much in common d. both can support application programs 2. An operating system provides the services in its API by a,c,d a.

13、using the features of the hardware b. offering database accessibility c. using disk drives ability d. offering fixed-length blocks of data 4. Middleware lies in b,c,d a. the top of the layering vertical stack b. the middle of the layering vertical stack c. the top of an operating system d. the middl

14、e of interactions between different application programs 5. The following products of software are belong to middleware a,b,c a. IBM s Web Sphere MQ b. Java 2 Platform c. J2EE d. Oracle 6. A mechanism for translating Internet hostnames into IP addresses is a,c,d a. typically outside of operating sys

15、tem kernel b. typically inside of operating system kernel c. equipped into the general-purpose operating system d. as a middleware by authors definition 7. With middleware we can b,c,d a. run programs on a centralized computer system only b. keep computations largely isolated from undesirable intera

16、ctions c. run programs on different computer system d. allow computations to communicate with one another 8. Middleware has mechanisms to support controlled interaction through a,b,c,d a. communication b. naming c. persistent storage d. coordination 1. Before you turn the power on with a new compute

17、r, you should make sure a,b,c,d . a. the computer is already out of the box b. appropriate cables are correctly connected c. the computer system has been set up d. appropriate software have been installed 2. An asleep state is a,c,d . a. a low power standby mode b. indicated by the indicator light p

18、utting out c. used for saving energy d. used to lessen wear-and tear on the computer 4. During the boot procedure we can see a,b,c on the screen. a. amount of memory b. the number of attached devices c. the operating system being used d. beeps and whirling noises 5. A user interface we said here is

19、a,b,d . a. an interaction between an operating system and a user b. an interaction between an application program and a user c. an interface between a computer and its peripheral device d. a text-based user interface or GUI 6. Today Microsofts ope rating system Windows has a variety of versions, the

20、y are a,b,c,d . a. Windows 2007 b. Windows 2003 c. Windows XP d. Windows vista 7. The Windows desktop contains common elements, such as . a. desktop icons b. taskbar c. Start button d. task button 9. With the window of the GUI we can use . a. menus b. dialog boxes c. icons d. documents 10. Main menu

21、 category in some Microsoft programs . a. is a menu bar at the top of many windows b. can display a pull-down menus c. can t display a drop-down menus d. can display personalized menus 1. Upgrading a computer system means . a. buying new hardware b. buying new software c. extending the life of your

22、current system d. keeping your computer in present situation 2. To formulate an upgrade strategy, you should consider . a. the PC adheres to a well-supported standard b. you anticipate all your future needs c. there is room for additional expansion cards d. there is room for memory 3. Some common ha

23、rdware upgrades nclude . a. adding more RAM b. installing ADSL c. adding an image scanner d. installing a color printer 4. The ways to seriously upgrade an Intel 80486- based PC include . a. installing the most modern software b. replacing the motherboard c. replacing other items inside the system u

24、nit d. just purchasing a new PC 5. Relationship between version and release in a software is . a. version has major number b. release has minor number c. version typically increase its number in increments of 1 d. release typically increase its number in increments of 0.1 or 0.01 6. Compatible mode

25、of the software products can be categorized into . a. upward b. downward c. cross d. above all 1. A Wide Area Network can a. cover a wide geographical area b. link two or more LANs c. link two LANs only d. be created by individual users 2. According to the flow of information on a transmission facil

26、ity we can categorize WAN into network. a. circuit switched b. packet switched c. local area d. Lease d. line 3. In packet switched networks data send in. . a. byte b. pieces c. frame d. packet 4. The most important items contained in a packet should be. a. data to be transmitted b. header of the pa

27、cket c. tail of the packet d. date 5. The popular approaches we used in the packet switched network are . a. circuit switching b. datagram c. virtual circuit d. real circuit 6. In the datagram mode when datagrams arrive at their destination, the datagrams . a. may be out of order b. must be in order

28、 c. should be reordered d. may lose 7. In the virtual circuit mode all packets sent by a user at a time belong to . a. a message b. a session c. different messages d. different sessions 8. Main characteristics of the leased line networks are . a. the line is private for the user b. the user has hims

29、elf inter-exchange c. very short response time d. the user computer is always physically connected to the line 8. Main characteristics of the leased line networks are . a. the line is private for the user b. the user has himself inter-exchange c. very short response time d. the user computer is alwa

30、ys physically connected to the line 9. A typical frame relay network has . a. seven components b. five components c. six components d. five major physical components and one “virtual“ components 10. Router has the following name . a. ARPANET b. IMP (Interface Message Processor c. gateway d. IS (Inte

31、rmediate System 11. In Fig.4-6 a router creates a logical path between networks, these networks include . a. FDDI b. Token Bus c. Token Ring d. Ethernet 12. Encapsulation is used here for data delivering on . a. the circuit switching b. the physical path c. the analog circuit d. the logical path 1.

32、Connecting to the Internet usually includes the following decisions type of . a. device b. connection c. user d. Internet service provider 2. Which device can be used to access the Internet ? . a. PC b. DVD c. notebook computer d. Internet appliance 3. Following device belongs to the one of dial-up

33、connection . a.HFC b. modem c. dedicate line deviced d. ADSL 4. Using a PC we can retrieve much contents from the Web, they are . a. Web pages b. multimedia contents c. video clips d. music files 5. Mobile Web is used for usually. a. notebook computers b. mobile phones c. handheld computers d. pager

34、s 6. When we use a dial-up connection to access the Internet, we need . a. a TV cable b. a regular telephone line c. a modem d. a temporary IP address 7. ADSL works at a rate of . a. asymmetric transmission b. symmetric transmission c. asymmetric transmission with 9Mb/s downstream d. asymmetric tran

35、smission with 16K-64Kb/s upstream 8. We can find the following facilities in an HFC system . a. optical fiber b. coaxial cable c. cable modem d. head end 9. With the dedicated connection to connect the Internet we should . a. use dial-up connection b. keep a continual connection c. use a static IP a

36、ddress d. keep a temporary connection 10. If some one wants to use mobile wireless connection, he or her should have . a. mobile device b. a fixed radio connection c. Web-enable cell phone d. a mobile transceiver (1 The true goal of ERP is . a. to integrate all departments b. to integrate all functi

37、ons c. to work across a company d. d.to work on a single computer system (2 To do ERP right the ways should change. a. people do their jobs b. you do business with ERP c. you do business without ERP d. people do their jobs with ERP (3 ERP can serve the needs of people in . a. finance b. human resour

38、ces c. warehouse d. all above (4 Real transformational ERP efforts usually run . a. five years b. three years c. two years d. one year (5 A business process should include . a. order fulfillment b. shipping goods c. billing for the order d. understanding the customers credit rating (6 Companies that

39、 measure their products by flow rather than individual units are companies. a. utility b. oil c. chemical d. mechanical parts (7 With ERP, the customer service representatives . a. are just typists b. are no longer just typists c. should be business people d. should not be business people (8 With th

40、e manufacturing companies can save time, increase productivity and reduce headcount. a. standardizing manufacturing processes b. using a single, integrated computer system c. using ERP d. in-basket mode 1. Internet telephony system are systems. a. synchronous distributed b. asynchronous distributed

41、c. so called as IP telephony d. synchronous centralized 2. The operating platforms that are currently supported by the various Internet telephony system include . a. QoS b. UNIX c. Windows d. Mac 3. With an Internet telephone system developed by using Java applet users should . a. have a standard we

42、b browser with Java support b. install the telephony system every time they want to talk c. worry about the underlying workings of a telephony system d. have a network connection 4. The following components are the basic ones of an Internet telephony system . a. host computer b. modem c. local area

43、network d. router 5. The communication process that the callers telephony system handled includes . a. acquiring the real-time voice data b. digitizing the analogue signals c. compressing the digitized data d. decrypting the digitized data 6. The communication process that the recipients telephony s

44、ystem handled includes . a. encrypting the digitized data b. receiving incoming data c. decompressing incoming data d. playing back on the audio output device 7. The major problems encountered in the current Internet telephone are . a. the working model of the best-effort Internet b. transmitting de

45、lay c. transmitting delay jitters d. packet loss 8. We can find the following voice recovery methods . a. silence substitution b. waveform substitution c. sample interpolation d. embedded speech coding 9. When we make a distance telephony call such as from Beijing to Guangzhou with Internet telephon

46、y system, we should pay communication fees that include . a. transcontinental telephone calls b. local telephone calls c. ISP s fees d. nominal standard Internet connectivity charges 10. The current Internet telephony systems . a. are launched as stand-alone applications b. must be downloaded prior

47、to operation c. must purchase a new version of the software of the system for upgrading d. must be installed prior to operation 1. The Web took a bold step forward, it . a. was spurred by little-known technologies b. was spurred by well-known technologies c. shattered the traditional usage model of

48、the Web d. kept the traditional usage model of the Web 2. In order to develop a new web application model we should use some technologies, such as . a. traditional web browsers b. JavaScript remoting c. web remote procedure calls d. dynamic updating 3. Using Ajax we can . a. perform the web interact

49、ion b. transmit only a small amount of information to and from the server c. give the user the most responsive experience possible d. substitute the traditional web application model 4. In the traditional web application model the browser . a. has an Ajax engine b. is responsible for initiating requests to the Web server c. is responsible for processing requests from the Web server d. sends a HTML request to the Web server 5. Ajax engine is . a. a JavaScript object b. a JavaScript function c. responsible for linking to another resource d. responsible for executing the request from

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1