关键词不能为空

当前您在: 主页 > 英语 >

兔脑计算机专业英语多选题

作者:高考题库网
来源:https://www.bjmy2z.cn/gaokao
2021-01-21 23:14
tags:

村庄-

2021年1月21日发(作者:government是什么意思)
1.A user interface we said here is __ABC________

A.

a text-based user interface or GUI

B.

an interface between a computer and its peripheral device

C.

an interaction between an operating system and a user

D.

an interaction between an application program and a user

2.

___
A
___

provides transparent transfer of data between end users, providing reliable
data transfer services to the upper layers.

A.

The Transport Layer B. Session Layer C. Network Layer
E.

Application Layer E. Presentation Layer

3.

Many viruses do harmful things such as (ABCD ).

A.

deleting files B. slowing your PC down

B.

simulating typos D. changing random data on your disk

4.

We can classify programming languages under two types:(AB ) languages and ( )languages.

A.

high-level B. low-level C. advanced-level D. basic-level

5.

With
an
Internet
connection
you
can
get
some
of
the
basic
services
available
are

___ABCD_______

A.

E-mail B. Telnet C. FTP D. Usenet news

6.

A general purpose computer has four main sections: ( ABCE).


A.

the control unit B. the memory C. the input and output devices

D. the cpu E. the arithmetic and logic unit (ALU),

7.

Windows 2000 has the key technologies, they are (ABCD ).

A.

security B. active directory C. flat directory D. enterprise management

8.

The register file is___ACD_______

A.

addressed by much shorter addresses B. physically large

ally small D. one the same chip as the CPU

9.

A stack protocol can be used for (A ).

A.

removing the latest element ins( )erted B. removing the earliest element ins( )erted

C. subroutine calls D. operation of arithmetic expressions

10.

The end equipment in a communication system includes (ABCD ).

A.

printers B. computers C. CRTs D. keyboards

11.

Microsoft Office Professional 2000 include____ABCD______.

A.

Excel 2000 B. PowerPoint 2000 C. Word 2000 D. Outlook 2000

12.

A general purpose computer has four main sections:
______
ABCE
______

A.

the input and output devices B. the memory C. the arithmetic and logic unit (ALU),

D. the cpu E. the control unit

13.

The two most common types of scanners are (BC ) and ( )


A. hand-held scanners B. flatbed scanners C. auto scanners D. handler scanners

14.

Some viruses use (CD ) and ( ) techniques to hide their existence.

A.

quickly spread B. replace a part of system software C. stealth D. polymorphic

15.

The Windows 2000 product line includes____ABCD______.

A.

Windows 2000 Datacenter Server B. Windows 2000 Professional

C. Windows 2000 Server D. Windows 2000 Advanced Server

16.

Similar to viruses, you can also find malicious code in (ABC ).

A.

Trojan Horses B. logic bombs C. worms D. Microsoft Word Documents

17.

Viruses all have two phases to their e

ecution, the ( ) and the ( BD).

A.

crea

e phase B. attack phase C. del( )ete phase D. infection phase

18.

Active Directory can help you (ACD ).

A.

get off the limits of down level networks B. deliver complete enterprise security by itself

C. build a complex international network D. manage every resource with a single logon

19.

High- level languages are commonly classified as (ACDE ).

A.

object-oriented B. automatic C. functional D. logic languages E. procedure-oriented

20.

(CD )is a type of e

ecutable file .

A.

TXT file B. JPG file C. EXE file D. COM file

21.

( ABCD) maybe a certain cause that some viruses infect upon.

A.

an external event on your PC B. a day C. a counter within the virus D. a time


22.

(BC )is a type of e

ecutable file .


A.

TXT file B. EXE file C. COM file D. JPG file

23.

The web browsers which is normal used, such as(ABCE ).

A.

Firefox B. Internet Explorer C. Opra D. ICQ E. Apple Safari

24.

Newer ideas in computing such as(ABDE ) have radically altered the traditional concepts that
once determined program form and function

A.

artificial intelligence B. distributed computing C. software engineering

D. parallel computing E. data mining

25.

Microsoft Windows currently supports
__
AC
___

and
_____
file systems

A.

NTFS B. OCFS C. FAT D. ext2 E. NILFS

26.

Modem is ____ACD______.

A.

a modulator/demodulator B. a data set C. a demodulator D. a modulator

27.

The equipment
_
AB
_____
.

A.

transfers the number of bits in serial form

B.

manipulates digital information internally in word units
C.

transfers the number of bits in parallel

D. manipulates digital information internally in serial form

28.

Electronic
commerce
that
is
conducted
between
businesses
is
referred
to
as
business-to- business or


D

A. C2C B. C2B C. e-commerce D. B2B

29.

The World Wide Web also subsumes previous Internet information systems such as (AC ).

A.

Gopher B. Ftp C. FTP D. Telnet

30.

relies on the services of .NET data are

ABCD
A.

Connection B. Data Adapter C. DataReader D. Command

31.

The
development
process
in
the
software
life
cycle
involves
four
phases:
analysis,
design,
implementation, and
___
ACDE
_____
.
A.

analysis B. audit C. implementation D. design E. testing

32.

The end equipment in a communication system includes
__
ABCD
____
.

A.

printers B. CRTs C. computers D. keyboards

33.

In electronic commerce ,information search and discovery services include (ABCDE ).

A.

search engines B. information filters C. software agents D. directories E. electronic catalogs

34.

GIS work with two fundamentally different types of geographic are the (BD ).

A.

geography model B. vector model C. mathematic model D. raster model E. data model

35.

The two most common types of scanners are
____
AC
___

and
_____


A.

flatbed scanners B. hand-held scanners C. auto scanners D. handler scanners

36.

Windows 2000 has the key technologies, they are ( ABCD).
A.

active directory B. flat directory C. enterprise management D. security

37.

Computer
software,
or
just
software
is
a
general
term
used
to
describe
a
collection
of
computer
programs,
procedures
and
documentation
that
perform
some
tasks
on
a
computer
term includes:


ABC
A.

Firmware
which
is
software
programmed
resident
to
electrically
programmable
memory
devices on board mainboards or other types of integrated hardware carriers.

B.

Application software such as word processors which perform productive tasks for users.

C.

Middleware which controls and co- ordinates distributed systems.

38.

Software engineering is related to the disciplines of
___
ADE
_____

A.

project management B. natural language

C. netural network D. systems engineering E. computer science

39.

What make it is difficult to agree on how to count viruses? ABCD
A.

some viruses can crea

e different versions when they infect other programs

B.

just a trivial change may crea

e a new virus

C.

some viruses can use polymorphic technique

D.

new virus arise from an existing virus

40.

A virus is a program that reproduces its own code by (ABC ).

A.

ins
_
erting into the middle of a file B. simply placing a pointer

C. adding to the end of a file D. replacing another program

41.

Input devices include: ____ABCD______.

A.

the keyboard B. microphone C. touch screen D. the mouse

42.

Viruses all have two phases to their e

ecution, the ( ) and the ( AD).

A.

attack phase B. crea

e phase C. del
_
ete phase D. infection phase

43.

The equipment (BC ).

A.

manipulates digital information internally in serial form

B.

manipulates digital information internally in word units
C.

transfers the number of bits in serial form

D.

transfers the number of bits in parallel

44.

Office automation is___CD_______.

A.

. the computer B. communications technology

C. the application of computer D. used to improve the productivity of people

45.

The types (classes, structs, enums, and so on) associated with each .NET data provider are
located in their own namespaces are:
ABCDE
A.

ent. Contains the SQL Server .NET Data Provider types.

B.

. Contains the ODBC .NET Data Provider types.

C.

. Contains provider-independent types such as the DataSet and DataTable.

D.

Client. Contains the Oracle .NET Data Provider
E.

. Contains the OLE DB .NET Data Provider types.

46.

C++ is __ACD________.
A.

extended from C B. a superset of C C. object-oriented D. procedure-oriented
47.

Some viruses, with no attack phase, often damage the programs or disks they infect because
they (AD ).

A.

have bugs in them B. show messages on your screen

C. steal storage D. contain poor quality code

48.

Windows 2000 is ( A).

A.

an inventive technology B. used for building a scalable network

B.

the same as Windows NT D. new lease of Windows

49.

Some common applications related to electronic commerce are the following:

A.

Teleconferencing B. Online banking C. Email D. Instant messaging

E. Enterprise content management F. Newsgroups G. Shopping cart software

50.

A program is a sequence of ( ) that can be e

ecuted by a can either be built
into the hardware or exist independently in the form of (BC ).

A.

hardware B. software C. instructions D. data

51.

Electronic payments include
___
ABCD
______
.

A.

credit card payments B. electronic checks C. digital currencies D. cash payment

52.

The web browsers which is normal used, such as
____
ABCD
_____
.
A.

Opra B. Internet Explorer C. Firefox D. Apple Safari E. ICQ

53.

Computer programs fall into two major classes:
__
AC
____

and
____
.

A.

application programs B. application suite C. operating systems D. database application

54.

Database connection ( B) allows an application to reuse an existing connection from a pool
instead of repeatedly establishing a new connection with the database.

A.

pond B. pooling C. link D. connection

55.

The
development
process
in
the
software
life
cycle
involves
four
phases:
analysis,
design,
implementation, and (ABCE ).

A.

implementation B. design C. analysis D. audit E. testing

56.

Hypermedia include ( ABCDEF)

A.

video clips B. images C. text D. flash E. vidoe F. sounds

57.

An asleep state is_____ABD_____

A.

used to lessen wear-and tear on the computer B. used for saving energy

C. indicated by the indicator light putting out D. a low power standby mode

58.

Electronic payments include (ABCD ).

A.

digital currencies B. electronic checks C. credit card payments D. cash payment

村庄-


村庄-


村庄-


村庄-


村庄-


村庄-


村庄-


村庄-



本文更新与2021-01-21 23:14,由作者提供,不代表本网站立场,转载请注明出处:https://www.bjmy2z.cn/gaokao/546690.html

计算机专业英语多选题的相关文章

  • 爱心与尊严的高中作文题库

    1.关于爱心和尊严的作文八百字 我们不必怀疑富翁的捐助,毕竟普施爱心,善莫大焉,它是一 种美;我们也不必指责苛求受捐者的冷漠的拒绝,因为人总是有尊 严的,这也是一种美。

    小学作文
  • 爱心与尊严高中作文题库

    1.关于爱心和尊严的作文八百字 我们不必怀疑富翁的捐助,毕竟普施爱心,善莫大焉,它是一 种美;我们也不必指责苛求受捐者的冷漠的拒绝,因为人总是有尊 严的,这也是一种美。

    小学作文
  • 爱心与尊重的作文题库

    1.作文关爱与尊重议论文 如果说没有爱就没有教育的话,那么离开了尊重同样也谈不上教育。 因为每一位孩子都渴望得到他人的尊重,尤其是教师的尊重。可是在现实生活中,不时会有

    小学作文
  • 爱心责任100字作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文
  • 爱心责任心的作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文
  • 爱心责任作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文