計算機英語選擇題_第1頁
計算機英語選擇題_第2頁
計算機英語選擇題_第3頁
計算機英語選擇題_第4頁
計算機英語選擇題_第5頁
已閱讀5頁,還剩27頁未讀 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

1、(1 A large main memory can be used forstoring a,b,c .a. datab. operating systemc. applicationsd. interface(2 Early computer solved c,d problems.a. controlb. business applicationsc. engineeringd. mathematical(3 The system manager used by a fast processor cana,b,c .a. reset a systemb. monitor processo

2、rs core temperaturec. monito r processors supply voltagesd. connect a network(4 We can say a bus is simply a,c,d .a. a group of wiresb. a wirec. a 8-bit busd. a 16-bit bus(5 A computer system user generally more cares for b,c,d .a. physical size of the computerb. storage sizec. speed of computationd

3、. efficiency of the computer(6 According to the physical size of computers we can classify thecomputers into a,b,c,d .a. microcomputerb. minicomputerc. mainframed. supercomputer(7 The basic hardware components of any computerinclude a,b,c,d .a. CPUb. main memoryc. input devicesd. output devices(8 Th

4、e following devices are belong to the mass storages a,b,d .a. DVDb. CD-ROMc. moused. disk(1 Cache is a,c,d .a. fastb. slowc. relatively smalld. high cost(2 Information stored in semiconductor RAMis b,c .a. permanentb. nonpermanentc. volatiled. non volatile(3 We use paged virtual memory to a,b,c,d.a.

5、 extend the size of memoryb. increase bandwidth of the diskc. reduce latency of the diskd. store large program and data set(4We read data on the disk by a,d .(5 The three desiderata of memory system are b,c .a.independentb. exclusivec.closely approximated todayd. Less approximated tomorrow(6 The pro

6、cessor performance would be high as wereference instructions and data from b,d.a. hard diskb. cachec. floppy diskd. memory(7 Page frame is used in a .a. real memoryb. virtual memoryc. diskd. cache(8 In order to increase our computers performancewe need to a,b,c ,a. have a L2 cacheb. buy a L2 cachec.

7、 have a much larger main memoryd. buy a L1 cache(1 RISC is b,c,d .a. abbreviation of complex instruction set computerb. abbreviation of reduced instruction set computerc. guided to be built from studying the executionbehavior of high-level language programsd. used for many computer manufacturersnowa

8、days(2 To enhance performance of a computer system weshould a,b,d .a. improve the pattern of referencing operandb. optimize the simple movement of datac. use IF and LOOP instructions as many aspossibled. optimize the basic sequence control mechanism(5 Register storage has b,d .a. a large capacityb.

9、a small capacityc. the slower speedd. the faster speed(6 Instruction format in RISC has a,c,d .a. one kindb. many kindsc. a few kindsd. one or a few kinds(7 CISC machine instructions compared with RISCmachine are a,d .a. more complicatedb. more simplec. more faster to be executedd. more slower to be

10、 executed(8 Functions of the compiler used in RISCare b,c,d .a. to compile a high level language programb. to optimize register usagec. to maximize register usaged. to allocate registers to those variables that willbeused the most in a given time period(9 One machine cycle in RISC has c .a. two mach

11、ine instructionsb. three machineinstructionsc. one machine instructiond. four machineinstructions(10 The register file is a,c,d .a. physically smallb. physically largec. one the same chip as the CPUd. addressed by much shorter addressesOperating systems and middleware b,c,da. have less in commonb. b

12、oth can support other softwarec. have much in commond. both can support application programs2. An operating system provides the services in itsAPI by a,c,da. using the features of the hardwareb. offering database accessibilityc. using disk drives abilityd. offering fixed-length blocks of data4. Midd

13、leware lies in b,c,da. the top of the layering vertical stackb. the middle of the layering vertical stackc. the top of an operating systemd. the middle of interactions between differentapplication programs5. The following products of software are belong tomiddleware a,b,ca. IBMs Web Sphere MQb. Java

14、 2 Platformc. J2EEd. Oracle6. A mechanism for translating Internet hostnamesinto IP addresses is a,c,da. typically outside of operating system kernelb. typically inside of operating system kernelc. equipped into the general-purpose operatingsystemd. as a middleware by authors definition7. With middl

15、eware we can b,c,da. run programs on a centralized computersystem onlyb. keep computations largely isolated fromundesirable interactionsc. run programs on different computer systemd. allow computations to communicate with oneanother8. Middleware has mechanisms to supportcontrolled interaction throug

16、h a,b,c,da. communicationb. namingc. persistent storaged. coordination1. Before you turn the power on with a newcomputer, you should make sure a,b,c,d.a. the computer is already out of the boxb. appropriate cables are correctly connectedc. the computer system has been set upd. appropriate software h

17、ave been installed2. An asleep state is a,c,d .a. a low power standby modeb. indicated by the indicator light putting outc. used for saving energyd. used to lessen wear-and tear on the computer4. During the boot procedure we can see a,b,conthe screen.a. amount of memoryb. the number of attached devi

18、cesc. the operating system being usedd. beeps and whirling noises5. A user interface we said here is a,b,d .a. an interaction between an operating system anda userb. an interaction between an applicationprogram and a userc. an interface between a computer and itsperipheral deviced. a text-based user

19、 interface or GUI6. Today Microsofts ope rating system Windows hasa variety of versions, they are a,b,c,d.a. Windows 2007b. Windows 2003c. Windows XPd. Windows vista7. The Windows desktop contains common elements,such as .a. desktop iconsb. taskbarc. Start buttond. task button9. With the window of t

20、he GUI we can use.a. menusb. dialog boxesc. iconsd. documents10. Main menu category in some Microsoftprograms .a. is a menu bar at the top of many windowsb. can display a pull-down menusc. cant display a drop-down menusd. can display personalized menus1. Upgrading a computer system means .a. buying

21、new hardwareb. buying new softwarec. extending the life of your current systemd. keeping your computer in present situation2. To formulate an upgrade strategy, you shouldconsider .a. the PC adheres to a well-supported standardb. you anticipate all your future needsc. there is room for additional exp

22、ansion cardsd. there is room for memory3. Some common hardware upgrades nclude.a. adding more RAMb. installingADSLc. adding an image scannerd. installing a color printer4. The ways to seriously upgrade an Intel 80486-based PC include .a. installing the most modern softwareb. replacing the motherboar

23、dc. replacing other items inside the system unitd. just purchasing a new PC5. Relationship between version and release in asoftware is .a. version has major numberb. release has minor numberc. version typically increase its number inincrements of 1d. release typically increase its number inincrement

24、s of 0.1 or 0.016. Compatible mode of the software products canbe categorized into .a. upwardb. downwardc. crossd. aboveall1. A Wide Area Network can.a. cover a wide geographical areab. link two or more LANsc. link two LANs onlyd. be created by individual users2. According to the flow of information

25、 on atransmission facility we can categorize WANinto network.a. circuit switchedb. packet switchedc. local aread. Lease d. line3. In packet switched networks data send in.a. byteb. piecesc. framed. packet4. The most important items contained in a packetshould be.a. data to be transmittedb. header of

26、 the packetc. tail of the packetd. date5. The popular approaches we used in the packetswitched network are .a. circuit switchingb. datagramc. virtual circuitd. real circuit6. In the datagram mode when datagrams arrive attheir destination, the datagrams .a. may be out of orderb. must be in orderc. sh

27、ould be reorderedd. may lose7. In the virtual circuit mode all packets sent by auser at a time belong to .a. a messageb. a sessionc. different messagesd. different sessions8. Main characteristics of the leased line networksare .a. the line is private for the userb. the user has himself inter-exchang

28、ec. very short response timed. the user computer is always physicallyconnected to the line8. Main characteristics of the leased line networksare .a. the line is private for the userb. the user has himself inter-exchangec. very short response timed. the user computer is always physicallyconnected to

29、the line9. A typical frame relay network has .a. seven componentsb. five componentsc. six componentsd. five major physical components and one"virtual" components10. Router has the following name .a. ARPANETb. IMP (Interface Message Processorc. gatewayd. IS (Intermediate System11. In Fig.4-

30、6 a router creates a logical pathbetween networks, these networksinclude .a. FDDIb. Token Busc. Token Ringd. Ethernet12. Encapsulation is used here for data deliveringon .a. the circuit switchingb. the physical pathc. the analog circuitd. the logical path1. Connecting to the Internet usually include

31、s thefollowing decisions type of .a. deviceb. connectionc. userd. Internet serviceprovider2. Which device can be used to access theInternet ? .a. PCb.DVDc. notebook computerd. Internetappliance3. Following device belongs to the one of dial-upconnection .a.HFCb. modemc. dedicate line devicedd. ADSL4.

32、 Using a PC we can retrieve much contents fromthe Web, they are .a. Web pagesb. multimedia contentsc. video clipsd. music files5. Mobile Web is used for usually.a. notebook computersb. mobile phonesc. handheld computersd. pagers6. When we use a dial-up connection to access theInternet, we need .a. a

33、 TV cableb. a regulartelephone linec. a modemd. a temporary IPaddress7. ADSL works at a rate of .a. asymmetric transmissionb. symmetric transmissionc. asymmetric transmission with 9Mb/sdownstreamd. asymmetric transmission with 16K-64Kb/supstream8. We can find the following facilities in an HFCsystem

34、 .a. optical fiberb. coaxial cablec. cable modemd. head end9. With the dedicated connection to connect theInternet we should .a. use dial-up connectionb. keep a continual connectionc. use a static IP addressd. keep a temporary connection10. If some one wants to use mobile wirelessconnection, he or h

35、er should have.a. mobile deviceb. a fixed radioconnectionc. Web-enable cell phoned. a mobile transceiver(1 The true goal of ERP is .a. to integrate all departmentsb. to integrate all functionsc. to work across a companyd.d.to work on a single computer system(2 To do ERP right the ways shouldchange.a

36、. people do their jobsb. you do business with ERPc. you do business without ERPd. people do their jobs with ERP(3 ERP can serve the needs of people in.a. financeb. human resourcesc. warehoused. all above(4 Real transformational ERP efforts usuallyrun .a. five yearsb. three yearsc. two yearsd. one ye

37、ar(5 A business process should include .a. order fulfillmentb. shipping goodsc. billing for the orderd. understanding the customers credit rating(6 Companies that measure their products by flowrather than individual units arecompanies.a. utilityb. oilc. chemicald. mechanicalparts(7 With ERP, the cus

38、tomer servicerepresentatives .a. are just typistsb. are no longer just typistsc. should be business peopled. should not be business people(8 With the manufacturing companiescansave time, increase productivity and reduceheadcount.a. standardizing manufacturing processesb. using a single, integrated c

39、omputer systemc. using ERPd. in-basket mode1. Internet telephony system aresystems.a. synchronous distributedb. asynchronous distributedc. so called as IP telephonyd. synchronous centralized2. The operating platforms that are currentlysupported by the various Internet telephonysystem include .a. QoS

40、b. UNIXc. Windowsd. Mac3. With an Internet telephone system developed byusing Java applet users should .a. have a standard web browser with Java supportb. install the telephony system every time theywant to talkc. worry about the underlying workings of atelephony systemd. have a network connection4.

41、 The following components are the basic ones ofan Internet telephony system .a. host computerb. modemc. local area networkd. router5. The communication process that the callerstelephony system handled includes .a. acquiring the real-time voice datab. digitizing the analogue signalsc. compressing the

42、 digitized datad. decrypting the digitized data6. The communication process that the recipientstelephony system handled includes .a. encrypting the digitized datab. receiving incoming datac. decompressing incoming datad. playing back on the audio output device7. The major problems encountered in the

43、 currentInternet telephone are .a. the working model of the best-effort Internetb. transmitting delayc. transmitting delay jittersd. packet loss8. We can find the following voice recoverymethods .a. silence substitutionb. waveform substitutionc. sample interpolationd. embedded speech coding9. When w

44、e make a distance telephony call suchas from Beijing to Guangzhou with Internettelephony system, we should paycommunication fees that include .a. transcontinental telephone callsb. local telephone callsc. ISPs feesd. nominal standard Internet connectivitycharges10. The current Internet telephony sys

45、tems .a. are launched as stand-alone applicationsb. must be downloaded prior to operationc. must purchase a new version of thesoftware of the system for upgradingd. must be installed prior to operation1. The Web took a bold step forward, it .a. was spurred by little-known technologiesb. was spurred by well-known technologiesc. shattered the traditional usage model ofthe Webd. kept the traditional usage model of theWeb2. In order to devel

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論