計(jì)算機(jī)文化復(fù)習(xí)知識(shí)點(diǎn)_第1頁
計(jì)算機(jī)文化復(fù)習(xí)知識(shí)點(diǎn)_第2頁
計(jì)算機(jī)文化復(fù)習(xí)知識(shí)點(diǎn)_第3頁
計(jì)算機(jī)文化復(fù)習(xí)知識(shí)點(diǎn)_第4頁
計(jì)算機(jī)文化復(fù)習(xí)知識(shí)點(diǎn)_第5頁
已閱讀5頁,還剩3頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、Introduction to Computers(ALL)True/FalseIndicate whether the sentence or statement is true or false.1.The price of a microcomputer typically starts at several hundred thousand dollars and can easily exceed $1 million._2.The system unit is the case that holds the main circuit boards, microprocessor,

2、power supply, and hard drive._3.A national ISP is probably better than a local ISP for people who travel frequently._4.Every Web page has a unique address called a URL (Uniform Resource Locator)._5.Web-based e-mail gives you the option of downloading your mail or leaving it on the server._6.You can

3、usually identify the microprocessor when looking inside a computer, as it is the only chip on the motherboard._7.Cache size is not of particular significance to consumers because it is not configurable._8.A trackball looks like the tip of an eraser embedded in the keyboard of a notebook computer._9.

4、User-executable program files have .exe filename extensions._10.Instructions written in machine language must be translated into a high-level language before a computer can use them._11.The Windows operating system gets its name from the rectangular work areas that appear on the screen-based desktop

5、._12.If a file has the right extension for a particular application program, you will see it in the list of files that you can open with that software._13.An operating system maintains a list of files called a table for each storage disk, tape, CD, or DVD._14.Today, just about every computer uses on

6、e or more microprocessors as its CPU._ 15.A tablet computer is similar in size to a notebook computer, but features a touch-sensitive screen that can be used for input instead of a keyboard._16.A handheld computer, with add-ons, is powerful enough to handle all of the tasks performed by a desktop co

7、mputer._17.Inexpensive add-ons to handheld computers make it possible to send and receive e-mail._ 18.Application software is a set of computer programs that helps a person carry out a task._ 19.Communication between all of the different devices on the Internet is made possible by HTTP (Hypertext Tr

8、ansfer Protocol), a standard set of protocols for electronically addressing and transmitting data._20.A password is a series of characters that verifies the user ID and is similar to a PIN._ 21.The computers and software that store and distribute Web pages are called Web clients._22.Any file that tr

9、avels with an e-mail message is called an e-mail MIME._23.Most personal computers use Unicode, although Extended ASCII code is becoming increasingly popular._24.The prefix tera- means trillion._25.Most of the processors in today's Macs use RISC technology._26.Intel is continually upgrading its l

10、ine of Pentium processors._27.An optical disk, such as a CD, is not susceptible to humidity, fingerprints, dust, magnets, or spilled soft drinks, and its useful life is estimated at more than 200 years._28.A trackball looks like the tip of an eraser embedded in the keyboard of a notebook computer._2

11、9.On most monitors, the viewable image does not stretch to the edge of the screen._30.Few of today's desktop operating systems provide multitasking capabilities._31.You should try to avoid storing your data files in subdirectories and should instead store them in the root directory of your hard

12、disk._32.The Save option on the File menu saves the latest version of a file under its current name and at its current location._33.In Windows Explorer, a device icon can be opened by clicking directly on the icon, rather than on the plus sign._34.The File Allocation Table keeps track of a list of c

13、lusters and which are empty and which hold data._35.When a file is deleted, the clusters that contained the file are rewritten._36.Virus trigger events are often keyed to a specific date._37.Denial of Service attacks occur when useless network traffic overwhelms the networks processing capability an

14、d essentially brings all communications to a halt._38.Bogus virus e-mail messages usually contain a long list of people in the To: and Cc: boxes._39.A boot disk is a floppy disk or CD that contains the operating system files needed to start your computer without accessing the hard disk._40.Unlike fi

15、ber-optic cables, twisted pair and coaxial cables do not conduct or transmit electrical signals._41.Fiber-optic cable is a bundle of extremely thin tubes of glass._42.A parcel switching network divides messages into small parcels and handles them on a “first come, first served” basis._43.Most data c

16、ommunications systems implement synchronous protocol._44.An example of a Network Service Provider (NSP) is AOL._45.IP breaks a message or file into packets._46.IE and Firefox updates only cost $10 a year._47.The current trend is to use the term "PDF" to refer to any helper application or p

17、lug-in that helps a browser display a particular file format._48.A text editor is similar to word processing software._49.Java applets are sometimes blocked by network firewalls._50.Java applets are not allowed to open, modify, delete, or create files on your computer._51.JavaScript must be compiled

18、 into bytecode, but Java applets do not need to be compiled._52.ActiveX is supported by Netscape, Linux, and Mac OS, but not Microsoft Internet Explorer._53.You can use a scanner to convert a printed image into a bitmap graphic._54.A card reader acts just like an external disk drive by treating your

19、 memory cards like floppy disks._55.It is easier to edit an object in a vector graphic than an object in a bitmap._56.On Web pages, vector graphics appear with the same consistent quality on all computer screens._57.Video is easier to edit if you divide it into several files, each containing a one-t

20、o-two minute segment of footage._58.Some PDAs and smartphones can be configured to play digital videos, including movie trailers, TV shows, and even feature-length movies._59.Because of its cost, a workstation is often dedicated to design tasks, and is not used for typical microcomputer applications

21、._60.A WAN provides connectivity within a limited geographical area, usually spread over several buildings._61.The coaxial cable that provides you with more than 100 channels of cable TV has a lower bandwidth than your home telephone line._62.The Domain Name System is a database stored on the main I

22、nternet computer._63.HTML tags work in pairs._64.The current trend is to use the term "PDF" to refer to any helper application or plug-in that helps a browser display a particular file format._65.In an HTTP communication, your browser opens a socket, connects to a similar open socket at th

23、e Web server, and issues a command, such as "send me an HTML document."_66.If you turn off cookies, you probably wont be able to make online purchases._67.Cookies use your name for identification purposes._68.Frames have fallen out of favor-probably because some Web designers littered Web

24、pages with frames that remained on the screen even after visitors linked to other sites._69.The photos that you take with a digital camera are stored in the camera's memory modules until you transfer them to your computer._70.Bitmaps resize better than vector graphics._71.Bitmaps generally requi

25、re less storage space than vector images.Modified True/FalseIndicate whether the sentence or statement is true or false. If false, change the identified word or phrase to make the sentence or statement true._1.The ALU uses registers to hold data that is being processed. _2.A(n) laser printer has a n

26、ozzle-like print head that sprays ink onto paper to form characters and graphics. _3.The self-installing executable file automatically unzips itself and starts the setup program. _4.A software license is a legal contract that defines the ways in which you may use a computer program. _5.A filename ex

27、tension is usually related to the file schema. _6.A virus verification is usually a section of the virus program that outlines a unique series of instructions. _7.The Registry is an important group of files used by the Windows operating system to store configuration information about all of the devi

28、ces and software installed on a computer system. _8.A local area network that uses TCP/IP is called a(n) intranet. _9.Downstream transmission refers to the data that you send. _10.A Web page can be stored as a file called a(n) ISP document. _11.Java is a high-level programming language developed by

29、Sun Microsystems that has become a popular programming tool for Web-based projects. _12.Small Java applications are call Java controls. _13.When you save a file, you must provide it with a valid filename that adheres to specific rules, referred to as file-naming rubrics. _14.Some operating systems c

30、ontain a list of extended words that are used as commands or special identifiers. _15.A file specification is also sometimes known as a(n) route. _16.Gradients can be used to create shading and three-dimensional effects. _17.Like vector graphics, 3-D graphics are stored as a set of instructions. _18

31、.A CD rapper grabs tracks from an audio CD and stores them in Wave format. _Multiple ChoiceIdentify the letter of the choice that best completes the statement or answers the question._1.A _ computer is similar in size to a notebook computer, but features a touch-sensitive screen that can be used for

32、 input.a.PDAb.tabletc.desktopd.microcomputer_2.A(n) _ is typically used as an electronic appointment book, address book, calculator, and notepad.a.ADP (Automatic Data Processor)b.PAD (Personal Assistant Device)c.PDA (Personal Digital Assistant)d.DPA (Digital Processor Automaton)_3.The term _ device

33、designates equipment that might be added to a computer system to enhance its functionality.a.digitalb.systemc.diskd.peripheral_4.Most Web pages contain _ to related documents and media files.a.iconsb.keysc.linksd.passages_5.A group of Web pages is usually referred to as a Web _.a.book.b.pamphlet.c.p

34、lace.d.site._6._ is similar to POP but it gives you the option of downloading your mail or leaving it on the server.a.SMTP (Simple Mail Transfer Protocol)b.IMAP (Internet Messaging Access Protocol)c.PIN (Private Identification Number)d.URL (Uniform Resource Locator)_7.The microprocessor's _ unit

35、 fetches each egratedc.circuitd.control_8._ is a temporary holding area for data, application program instructions, and the operating system.a.ROMb.CMOSc.Disk storaged.RAM_9.Unlike disk storage, most RAM is _.egratedc.non-volatiled.volatile_10.If a program

36、 exceeds the allocated space in RAM, the operating system uses an area of the hard disk called _ memory to store parts of a program or data file until they are egrated_11._ alignment refers to the horizontal position of text.a.Documentb.Characterc.Paragraphd

37、.Leading_12.A _ is a number that you want to use in a calculation.a.labelb.valuec.referenced.cell_13.A _ is any text that is used to describe data.a.labelb.captionc.rosterd.key_14.A _ holds one item of data relevant to a record.a.fieldb.recordc.structured.table_15.Database software is also referred

38、to as _.a.DBMSb.structured softwarec.rolodexd.archival_16.A single database _ is similar to a Rolodex or an index card.a.fieldb.recordc.tabled.None of the above_17.On a PC, the root directory is typically identified by the device letter followed by a(n) _.a.forward slashb.ampersandc.colond.backslash

39、_18._, such as MCI, Sprint, or AT&T, supply ISPs with access to high-speed transmission lines that form the backbone of the Internet.a.DNSs (Domain Name Servers)b.E-mail Serversc.NSPs (Network Service Providers)d.Web Servers_19.An Internet utility called _ sends a signal to a specific Internet a

40、ddress and waits for a reply.a.Tracerouteb.PING (Packet Internet Groper)c.ICMP (Internet Control Message Protocol)d.PANG (Packet Acoustic Networking)_20.Many Internet connection methods provide faster _(the data you receive) transmission rates than _ (the data that you send) rates.a.downstream,upstr

41、eamb.upstream,downstreamc.outer bank,inner bankd.inner bank, outer bank_21.The Web is based on the concept of _, a collection of documents that can be related by links.a.hypertextb.cookiesc.portsd.tags_22.Your browser displays an error message when a Web server sends a _ status code to indicate that

42、 the requested resource does not exist.a.200b.404c.500d.303_23.A _ signal represents the absence of color.a.0b.1c.56d.255_24.Scanners and digital cameras commonly store bitmaps in _ format because it supports True Color and can be easily converted into other graphics file formats.a.BMPb.TIFFc.PCXd.G

43、IF_25.One of the big disadvantages of _ is that it is not suitable for vocals.a.MIDIb.RealAudioc.AIFd.MP3Short Answer1.What is the single most important characteristic that distinguishes a computer from other simpler and less versatile devices, such as calculators and hand-held electronic dictionari

44、es?2.What is the difference between downloading and uploading?3.What is a search engine?4.How can you protect the data on a floppy disk?5.What is document production software?6.What is a copyright?7.What is the difference between the Save and Save As options?8.Briefly describe a peer-to-peer network.9.When XML is described as being "extensible." What does this mean?10.What are the most popular scripting languages? Name two other alter

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論