獭怎么读-床笫
西邮软件工程专业英语知识点
汇总
Mathematical Science of
Computation:数学化的
计算科学
Extreme Scale
Computing: 超大规模计算
Cloud Computing: 云计算
Internet of Things: 物联网
Data Warehouse:
数据仓库
Agent-Oriented Software
Engineering:面向智能
体的软件工程
Search Engines:
搜索引擎
CMOS
属氧化物半导体
DARPA:Defanse
Advanced Resarch Projects
Agency美国国国防部高级研究计划局
DOE :the Department of Energy美国能源部
MW:Megawatts百万瓦特,兆瓦
DRAM:Dynamic Random
Access Memory 动
态随机存储器
HDD: Hard Disk
Drive硬盘驱动器
ASCR :Advanced Scientific Computing
Research先进科学计算研究
URL: Uniform Resource
Locator统一资源定位
:Complementary
Metal-
Oxide-semiconductor Transistor互补金
符
又叫网址
IBM: International Business Machines
Corporation 国际商业机器公司
SERP:Search Engine
Results Page 搜索引擎结
果界面
LAN: local area
network局域网
ISP: Internet Service
Provider互联网服务提供
商
FiOS:free into owner's
store 自由进入业主商店
IT: information technology信息技术
SaaS :Software As A Service软件即服务
AOL:
American Online 美国在线
VoIP:Voice over Internet
Phone网络语音电话业
务
PaaS :Platform as a Service
平台即服务
API: Application Programming
Interface,应用
程序编程接口
ADP:Automatic Data
Process
RF:radio frequency 无线电频率
GPS:Global Position system全球定位系统
IaaS
:Infrastructure as a Service 基础设施即服
务
MS:memory system 存储系统
VRML:
Virtual Reality Modeling Language)即
虚拟现实建模语言
RFID: Radio Frequency IDentification射频识别
技术
IoT:Internet Of Things物联网
R&D: research
and development研究与开发
ETL:Extracting-
Translating and Loading数据
提取、转换和加载
SQL:
Structured Query Language结构化查询
语言
CIF:
Cost, Insurance & Freight 包括运费、保险
费在内之到岸价
SPA :Software Publishers Association
软件出版
商协会
MIT: Massachusetts Institute of
Technology麻
省理工
FSF :Free Software
Foundation自由软件基金会
GNU: GNU's Not
Unix”一种与UNIX兼容的软
件系统
GSM: global system for
mobile communications
全球移动通信
GPRS: General Packet Radio Service
通用分组
无线服务技术
OFDM:Orthogonal Frequency
Division
Multiplexing 即正交频分复用技术
CDMA
:Code Division Multiple Access 分吗多
重连接,又称码分多址
TDMA:Time Division Multiple Access 时分多
址
3GPP: The 3rd Generation Partnership
Project第三代合作伙伴项目
WiMax:Worldwide
1
Interoperability for
Microwave Access
全球微波互联接入
(1)According the text, the entities
that
Computer Science deals with may not
include
A) Problems.
B) Procedures.
C)
Programming languages.
D) Computers.
(2)According the text, what is one of the
first
topics in computer science
?
A) What these elementary
procedures
may be?
B) How more complex
procedures are
constructed
procedures?
C) How to understand a problem
completely?
D) What elementary procedures may be,
and
how more complex procedures are
constructed
from them?
(3)Which of the statements follows
describes
the relationship between procedures
and
programming languages.
A) The same
procedure may be
represented by different
programs in
different programming languages.
B) The problem of translating procedures
from one programming language to
another
is easy.
C) The problem of defining a
programming language semantically can
be
solved by stating what procedures the
from elementary
programs
represent.
D) Computer science must study how
procedures are represented by computer
programs.
(4)Which of the following
statements is wrong
for describing the
relationship of
procedure to data space and
programming
languages?
A) Procedures
operate on members of
certain data spaces and
produce
members of other data spaces.
B)
Programs are symbolic expressions
representing
procedures.
C) The same procedure may be
represented
by different programs in different
programming languages.
D) Programming
languages are constructed
from different
procedure.
(5) According the text, which of
the following
statements is wrong about
computer?
A) Computers are
finite automata.
B) A computer is defined by
the effect of
executing a program with given
input on the
state of its memory and on its
outputs.
C) Much of the work on the theory of
finite
automata is fruitful when it is applied
to
computation.
D) Most of the current
work on automata
theory is beside the point of
computer
science.
(6) According the text
of section 4, which of the
following statement
is wrong?
A) We would like a mathematical
theory in
which every true statement about
procedures would have an easy short proof.
B) There is no complete mathematical theory
of computation.
C) We hope for a theory
which is adequate
for practical purposes, like
proving that
compilers work.
D) An integer-free formalism for describing
computations has been developed and can
be
used to prove a procedure terminates.
(7)
What important results have been obtained
relevant to a mathematical science f
computation?
A) The notion of a computable
function was
clarified by Turing.
B) Much
of the work on the theory of finite
automata
has been done.
C) Existence of classes of
unsolvable
problems.
D) A machine to be
as intelligent as a
human.
(8) What kind
of work does the author suggest
not to solve
by mathematics science of
computation ?
A)
Confirming each feature of a
programming
language is worth its cost.
B) Proving a program meets its specifications,
Instead of debugging it.
C) Checking each
step of program by human.
D) Better
understanding of the structure of
computations
and of data spaces.
2
1. What is wrong
about exascale computing? B
C
A) exascale
second.
B) exascale computing is based on
vector
architectures.
C) exascale
computing are using tens to
hundreds of
thousands of processors from the
PC and Unix
markets.
D) All above.
2. According to
DARPA ExaScale Computing
Study, what is not
the key technology
challenges?B
A) Memory
and Storage Challenge.
computing is
aiming for
1,000,000,000,000,000,000
calculations per
B) Clock
frenquency Challenge.
C) Concurrency and
Locality Challenge
D) Resiliency Challeng.
3. What area has been identified that will not
be beneficial by exascale computing in the
DOE town halls and workshops?D
A) Energy
research,
B) Environmental sustainability
C) National security
D) Economy
4. what will not need exascalecomputing?D
A) cloud computing systems
B) solving
highly complex problems that have
been beyond
our reach
C) national security
D) software
5
1. What kinds of technologies do
the Cloud
Computing vendors combine to provide
service?A
A.
virtualization, automated provisioning, and
Internet connectivity.
B. virtualization,
connectivity.
C. Graphics, database, and
Internet connectivity.
D. virtual reality,
Graphics, database.
2. What does the on-demand
model include?C
A. The on-demand model
includes a GUI
interface that allows users to
self-provision
services.
B. The on-demand
model includes a
self-provision interface that
allows users to
self-service services
C.
The on-demand model includes a self-service
interface that allows users to self-provision
services
D. The on-demand model includes a
self-service
interface that allows servers to
self-provision
services
3. Which kind of
service is the most widely
known and widely
used form of cloud
database, and Internet
computing?B
A. PaaS (Platform
as a Service).
B. SaaS (Software As A Service)
.
C. IaaS (Infrastructure as a Service).
D. All of the above.
4. Which kind of
service is designed to augment
or replace the
functions of an entire data
center?C
A.
PaaS (Platform as a Service).
B. SaaS
(Software As A Service).
C. IaaS
(Infrastructure as a Service).
D. All of the
above.
5. Which kind of service has eliminated
customer worries about application servers,
storage, application development and related,
common concerns of IT?A
A. SaaS (Software
As A Service).
B. PaaS (Platform as a
Service).
C. IaaS (Infrastructure as a
Service).
D. All of the above.
6
1.
According to the first part, what are two
distinct modes of communication in
the
Internet of Things?
A.
B.
C.
D.
2.
thing to person;
person to
thing;
thing-to-thing;
machine-to-machine;
What are the characteristics of Sensor
networks?
A.
B.
C.
need not be
connected to the Internet;
need be connected
to the Internet;
detect changing attributes in
the
environment;
Sensors are a type of
transducer;
varying sizes;
power
requirements;
operating frequencies;
amounts of rewriteable and nonvolatile
storage;
D.
3.
What are the
characteristics of RFID?
A.
B.
C.
D.
4.
What are the more prominent
application
areas for the IoT?
A.
Cell
phones as “native controls for the
environment”;
B.
Cell
phones as “windows on everyday
things”;
Continuous monitoring and measuring;
not
mentioned in the passage;
C.
D.
5.
When may intelligent software emerge that
accepts large sets of data from connected
everyday objects, and analyzes such data
using processes that resemble human reason?
A.
B.
C.
D.
Afer 2020;
After 2010;
Afer 2013;
After 2015;
10
What make data warehouse effective to
help
companies and organizations make better
decisions.
A) Data warehouse are
integrated
B) Data warehouse was first
developed by Bill
Inmon in the early 1990s.
C) Data warehouse are subject oriented,
D) Data warehouse are non-
volatile, and time
variant.
(2)
Information contained within a data
warehouse
is stable means
A. Data can be added but
never be deleted.
B. Some data can be
systematically deleted that
has reached three
years of age.
C. The information that will be
added to the
warehouse will come from daily
information
or historical information.
D.
Data is volatile.
(3) Why data acquisition is
one of the most
expensive parts of building a
data warehouse?
A. ETL tools may cost a
company millions of
dollars in order to
transfer data from sources
to the warehouse.
B. Data acquisition is a continuous process.
C. When the warehouse is updated, it is often
hard to determine which information in the
source has changed since the previous update.
D. The data cleansing process
is usually done
during the data acquisition
phase.
(4) Business intelligence is may
include:
A. Executive Information Systems,
B. Decision Support Systems
C. .Data
mining
D.
All above
.
(5) According
to section of Data Warehouse
Tools, which one
is not a data warehouse
Tools?
A. Data
visualization.
B. Marketing strategies
C.
Meta data.
D. Data aggregation.
12
1.
According to the content before “Name
calling”, answer the following questions.C
(1). Who doesn’t want the process of
copying and modifying information to be
easy?
A. the public.
B. the user.
C. the owner.
D. all of
them.
(2). What right of the reader is
restricted
when copyright is combined with
printing?B
A. reading.
B. mass
copy.
C. copy with pen and paper.
D.
all of them.
(3). Which of the following
technology is
more advanced than printing
press?
A. digital technology.
B.
draconian measures now used to
enforce
software copyright.
C. hand-copying.
D. none of above.
(4). Which of the following
is not a
measure taken by SPA to enforce
software copyright?D
A. widespread persuasions of absolute
right of
the owners .
B.
C.
promoting
unexpected
monitoring
raids to
among
some
workers.
institutions.
D. use hi-tech devices to bug the public.
(5). The author mentions Soviet Union
in
order to prove the practice of
SPA is__.B
A. favorable.
B. nasty.
C.
democratic.
D. all of above.
2.
According to the content between “Name
calling” and “Economics”, answer the
following questions.
(1). All of the
following words except__are
used to describe
the user’s copying.D
A. piracy.
B.
theft.
C. improvement.
D. damage.
(2). The author thinks the
analogy between
programs and physical objects
is__A.
A. persuasive.
B. accurate.
C. simplistic.
D. respectable.
(3). The author thinks the copying__.D
A. has a lot effect on the owner, and it
harms
everyone.
B. has some effect on the owner,
and it
harms some people.
C. has a
little on the owner, but it harms
no one.
D. has no direct effect on the owner, and
it
harms no one.
(4). How do the owners compute
their
economic loss?C
A. they suppose
the ones who need the
software would have
bought a copy
B. they suppose half of the
user would
have bought a copy.
C. they suppose every one would
have
bought a copy.
D. they suppose the
ones who are
willing to pay every one would
have bought copy.
(5). The owners can
suffer great loss
only if__.A
A. the
person who made the copy
would otherwise have
paid for
one from the owner.
B.
whenever a copy is made.
C. whenever
someone doesn’t pay.
D. the potential
consumers are
scared by the copyright.
(6). Why do the owners often describe
the
current state of the law, and
the harsh
penalties they can
threaten us with?C
A. to make us have an insight of the
copyright.
B. to make us form a
habitual
mentality.
C.
to make us know how sensible to
import the
copyright.
D. to make us challenge the
unquestionable
morality.
(7). Which of
the following statesments
is right?D
A.
we are urged to blame the
owners for the
penalties.
B. the owners persuasion can
stand up
to critical thinking .
C. laws
decide right and wrong.
D. right and wrong
can not be
verified by laws.
(8). Who hold
the copyrights on
software?A
A. the
authors.
B. the companies.
C. the
users.
D. all of them.
(9). The author
deems the analogy with
material objects is__.
view of
A. reasonable.
B. nonsense.
C. accurate.
D.
persuasive.
(10). Which of the following
saysings is
Wrong?D
A. people have been
told that
natural rights for authors is the
accepted and unquestioned
tradition of our
society.
B. the Constitution states the
purpose of copyright is to
promote
progress---not to
reward authors.
C.
the Constitution says that copyright
must be
temporary.
D. real established tradition of
our
society can not be justified for
the
public's sake.
3.
According to the rest
content, answer the
following questions.
(1). People will produce more of something
if__.D
A. they are
encouraged by their
great works.
B.
they are willing the do.
C. they are well
paid.
D. they are not motivated by economic
reason.
(2). The economic argument is
based
on__.C
A. whether we should pay
money
or not.
B. the users’ interest.
C. the assumption that how much
money
we have to pay is the
key.
D. all of
them.
(3). Which of the following statements
is Wrong?A
A. You can’t well be able to
get an
equivalent sandwich either free
or
for a price.
B. Whether or not you have to
buy it,
the sandwich has the
same taste.
C. you can only eat one
sandwich once.
D. Whether you get the
sandwich
from an owner or not can only
affects the amount of money
you have left.
(4). That material object has owners
and
that program has owners
is__.D
A. the
same.
B. different.
C. irrelevant.
D. tightly connected.
(5). The author
mentions black box as
an example in order to
prove
copyright deprives the users’__.
A. money.
B. wisdom
C. freedom.
D. all of them.
(6). If we want more software
than
those people write, what can we
do?B
A. enforce more harsh
copyright.
B. loose the copyright.
C. raising the price
D. raising funds.
(7). How much can a median American
family
earns per year?C
A. $$2,000.
B.
$$10,000.
C. $$35,000.
D. $$400,000.
(8). Which of the following can not
correctly describe the status of
today’s
free software?D
A. small.
B. young.
C. remains to be desired.
D.
flourishing.
(9). What is not a right
mentioned in
the passage the computer users
should have?D
A. lending to a friend.
B. knowing how the program
functions.
C. vicious breaking .
D.
all of above.
(10).According to the whole
passage,
what is the author’s attitude
towards copyright?C
A. for.
B.
against.
C. generally acceptable.
D.
conditionally acceptable.
15
6.
According to the article, what are major
categories of search engine?B
A.
B.
human-powered directory;
CrawlerSpider-
Powered
Engines;
google;
baidu;
Search
C.
D.
7.
What are the
search engine’s search ranking
algorithm?AB
A.
a search engine looks at factors;
B.
C.
D.
8.
how
these factors’re weighted;
the search engine
results page;
search botscrawlers;
What
are the reasons of downside of the
human-
powered search engine?CD
A.
B.
add a
link to it on a web page;
how many times each
word and phrase
occurs on the page;
only
includes websites that have been
submitted to
it;
reviewing every site submitted is very
labor-intensive and costly;
C.
D.
9.
What does the different frequency of
re-crawling depend on?ABC
A.
B.
C.
D.
search engine;
the importance of
your site;
how often you update it;
not
mentioned in the passage;
2014年6月六级-执事是什么意思
滋长的意思-响的拼音
毛腿丝袜-美国留学一年费用
street英语怎么读-decode
洇怎么读-formosa
空闲的英文-根字开头的成语
非常遗憾的英文-社会主义法律的基本属性
疴怎么读-短暂的拼音
-
上一篇:ANSYS软件中常用英语单词或词组
下一篇:英语软件中菜单的英语单词翻译