关键词不能为空

当前您在: 主页 > 英语 >

兔脑计算机专业英语多选题

作者:高考题库网
来源:https://www.bjmy2z.cn/gaokao
2021-01-21 23:14
tags:

村庄-

2021年1月21日发(作者:government是什么意思)
1.A user interface we said here is __ABC________

A.

a text-based user interface or GUI

B.

an interface between a computer and its peripheral device

C.

an interaction between an operating system and a user

D.

an interaction between an application program and a user

2.

___
A
___

provides transparent transfer of data between end users, providing reliable
data transfer services to the upper layers.

A.

The Transport Layer B. Session Layer C. Network Layer
E.

Application Layer E. Presentation Layer

3.

Many viruses do harmful things such as (ABCD ).

A.

deleting files B. slowing your PC down

B.

simulating typos D. changing random data on your disk

4.

We can classify programming languages under two types:(AB ) languages and ( )languages.

A.

high-level B. low-level C. advanced-level D. basic-level

5.

With
an
Internet
connection
you
can
get
some
of
the
basic
services
available
are

___ABCD_______

A.

E-mail B. Telnet C. FTP D. Usenet news

6.

A general purpose computer has four main sections: ( ABCE).


A.

the control unit B. the memory C. the input and output devices

D. the cpu E. the arithmetic and logic unit (ALU),

7.

Windows 2000 has the key technologies, they are (ABCD ).

A.

security B. active directory C. flat directory D. enterprise management

8.

The register file is___ACD_______

A.

addressed by much shorter addresses B. physically large

ally small D. one the same chip as the CPU

9.

A stack protocol can be used for (A ).

A.

removing the latest element ins( )erted B. removing the earliest element ins( )erted

C. subroutine calls D. operation of arithmetic expressions

10.

The end equipment in a communication system includes (ABCD ).

A.

printers B. computers C. CRTs D. keyboards

11.

Microsoft Office Professional 2000 include____ABCD______.

A.

Excel 2000 B. PowerPoint 2000 C. Word 2000 D. Outlook 2000

12.

A general purpose computer has four main sections:
______
ABCE
______

A.

the input and output devices B. the memory C. the arithmetic and logic unit (ALU),

D. the cpu E. the control unit

13.

The two most common types of scanners are (BC ) and ( )


A. hand-held scanners B. flatbed scanners C. auto scanners D. handler scanners

14.

Some viruses use (CD ) and ( ) techniques to hide their existence.

A.

quickly spread B. replace a part of system software C. stealth D. polymorphic

15.

The Windows 2000 product line includes____ABCD______.

A.

Windows 2000 Datacenter Server B. Windows 2000 Professional

C. Windows 2000 Server D. Windows 2000 Advanced Server

16.

Similar to viruses, you can also find malicious code in (ABC ).

A.

Trojan Horses B. logic bombs C. worms D. Microsoft Word Documents

17.

Viruses all have two phases to their e

ecution, the ( ) and the ( BD).

A.

crea

e phase B. attack phase C. del( )ete phase D. infection phase

18.

Active Directory can help you (ACD ).

A.

get off the limits of down level networks B. deliver complete enterprise security by itself

C. build a complex international network D. manage every resource with a single logon

19.

High- level languages are commonly classified as (ACDE ).

A.

object-oriented B. automatic C. functional D. logic languages E. procedure-oriented

20.

(CD )is a type of e

ecutable file .

A.

TXT file B. JPG file C. EXE file D. COM file

21.

( ABCD) maybe a certain cause that some viruses infect upon.

A.

an external event on your PC B. a day C. a counter within the virus D. a time


22.

(BC )is a type of e

ecutable file .


A.

TXT file B. EXE file C. COM file D. JPG file

23.

The web browsers which is normal used, such as(ABCE ).

A.

Firefox B. Internet Explorer C. Opra D. ICQ E. Apple Safari

24.

Newer ideas in computing such as(ABDE ) have radically altered the traditional concepts that
once determined program form and function

A.

artificial intelligence B. distributed computing C. software engineering

D. parallel computing E. data mining

25.

Microsoft Windows currently supports
__
AC
___

and
_____
file systems

A.

NTFS B. OCFS C. FAT D. ext2 E. NILFS

26.

Modem is ____ACD______.

A.

a modulator/demodulator B. a data set C. a demodulator D. a modulator

27.

The equipment
_
AB
_____
.

A.

transfers the number of bits in serial form

B.

manipulates digital information internally in word units
C.

transfers the number of bits in parallel

D. manipulates digital information internally in serial form

28.

Electronic
commerce
that
is
conducted
between
businesses
is
referred
to
as
business-to- business or


D

A. C2C B. C2B C. e-commerce D. B2B

29.

The World Wide Web also subsumes previous Internet information systems such as (AC ).

A.

Gopher B. Ftp C. FTP D. Telnet

30.

relies on the services of .NET data are

ABCD
A.

Connection B. Data Adapter C. DataReader D. Command

31.

The
development
process
in
the
software
life
cycle
involves
four
phases:
analysis,
design,
implementation, and
___
ACDE
_____
.
A.

analysis B. audit C. implementation D. design E. testing

32.

The end equipment in a communication system includes
__
ABCD
____
.

A.

printers B. CRTs C. computers D. keyboards

33.

In electronic commerce ,information search and discovery services include (ABCDE ).

A.

search engines B. information filters C. software agents D. directories E. electronic catalogs

34.

GIS work with two fundamentally different types of geographic are the (BD ).

A.

geography model B. vector model C. mathematic model D. raster model E. data model

35.

The two most common types of scanners are
____
AC
___

and
_____


A.

flatbed scanners B. hand-held scanners C. auto scanners D. handler scanners

36.

Windows 2000 has the key technologies, they are ( ABCD).
A.

active directory B. flat directory C. enterprise management D. security

37.

Computer
software,
or
just
software
is
a
general
term
used
to
describe
a
collection
of
computer
programs,
procedures
and
documentation
that
perform
some
tasks
on
a
computer
term includes:


ABC
A.

Firmware
which
is
software
programmed
resident
to
electrically
programmable
memory
devices on board mainboards or other types of integrated hardware carriers.

B.

Application software such as word processors which perform productive tasks for users.

C.

Middleware which controls and co- ordinates distributed systems.

38.

Software engineering is related to the disciplines of
___
ADE
_____

A.

project management B. natural language

C. netural network D. systems engineering E. computer science

39.

What make it is difficult to agree on how to count viruses? ABCD
A.

some viruses can crea

e different versions when they infect other programs

B.

just a trivial change may crea

e a new virus

C.

some viruses can use polymorphic technique

D.

new virus arise from an existing virus

40.

A virus is a program that reproduces its own code by (ABC ).

A.

ins
_
erting into the middle of a file B. simply placing a pointer

C. adding to the end of a file D. replacing another program

41.

Input devices include: ____ABCD______.

A.

the keyboard B. microphone C. touch screen D. the mouse

42.

Viruses all have two phases to their e

ecution, the ( ) and the ( AD).

A.

attack phase B. crea

e phase C. del
_
ete phase D. infection phase

43.

The equipment (BC ).

A.

manipulates digital information internally in serial form

B.

manipulates digital information internally in word units
C.

transfers the number of bits in serial form

D.

transfers the number of bits in parallel

44.

Office automation is___CD_______.

A.

. the computer B. communications technology

C. the application of computer D. used to improve the productivity of people

45.

The types (classes, structs, enums, and so on) associated with each .NET data provider are
located in their own namespaces are:
ABCDE
A.

ent. Contains the SQL Server .NET Data Provider types.

B.

. Contains the ODBC .NET Data Provider types.

C.

. Contains provider-independent types such as the DataSet and DataTable.

D.

Client. Contains the Oracle .NET Data Provider
E.

. Contains the OLE DB .NET Data Provider types.

46.

C++ is __ACD________.
A.

extended from C B. a superset of C C. object-oriented D. procedure-oriented
47.

Some viruses, with no attack phase, often damage the programs or disks they infect because
they (AD ).

A.

have bugs in them B. show messages on your screen

C. steal storage D. contain poor quality code

48.

Windows 2000 is ( A).

A.

an inventive technology B. used for building a scalable network

B.

the same as Windows NT D. new lease of Windows

49.

Some common applications related to electronic commerce are the following:

A.

Teleconferencing B. Online banking C. Email D. Instant messaging

E. Enterprise content management F. Newsgroups G. Shopping cart software

50.

A program is a sequence of ( ) that can be e

ecuted by a can either be built
into the hardware or exist independently in the form of (BC ).

A.

hardware B. software C. instructions D. data

51.

Electronic payments include
___
ABCD
______
.

A.

credit card payments B. electronic checks C. digital currencies D. cash payment

52.

The web browsers which is normal used, such as
____
ABCD
_____
.
A.

Opra B. Internet Explorer C. Firefox D. Apple Safari E. ICQ

53.

Computer programs fall into two major classes:
__
AC
____

and
____
.

A.

application programs B. application suite C. operating systems D. database application

54.

Database connection ( B) allows an application to reuse an existing connection from a pool
instead of repeatedly establishing a new connection with the database.

A.

pond B. pooling C. link D. connection

55.

The
development
process
in
the
software
life
cycle
involves
four
phases:
analysis,
design,
implementation, and (ABCE ).

A.

implementation B. design C. analysis D. audit E. testing

56.

Hypermedia include ( ABCDEF)

A.

video clips B. images C. text D. flash E. vidoe F. sounds

57.

An asleep state is_____ABD_____

A.

used to lessen wear-and tear on the computer B. used for saving energy

C. indicated by the indicator light putting out D. a low power standby mode

58.

Electronic payments include (ABCD ).

A.

digital currencies B. electronic checks C. credit card payments D. cash payment

村庄-


村庄-


村庄-


村庄-


村庄-


村庄-


村庄-


村庄-



本文更新与2021-01-21 23:14,由作者提供,不代表本网站立场,转载请注明出处:https://www.bjmy2z.cn/gaokao/546690.html

计算机专业英语多选题的相关文章

  • 余华爱情经典语录,余华爱情句子

    余华的经典语录——余华《第七天》40、我不怕死,一点都不怕,只怕再也不能看见你——余华《第七天》4可是我再也没遇到一个像福贵这样令我难忘的人了,对自己的经历如此清楚,

    语文
  • 心情低落的图片压抑,心情低落的图片发朋友圈

    心情压抑的图片(心太累没人理解的说说带图片)1、有时候很想找个人倾诉一下,却又不知从何说起,最终是什么也不说,只想快点睡过去,告诉自己,明天就好了。有时候,突然会觉得

    语文
  • 经典古训100句图片大全,古训名言警句

    古代经典励志名言100句译:好的药物味苦但对治病有利;忠言劝诫的话听起来不顺耳却对人的行为有利。3良言一句三冬暖,恶语伤人六月寒。喷泉的高度不会超过它的源头;一个人的事

    语文
  • 关于青春奋斗的名人名言鲁迅,关于青年奋斗的名言鲁迅

    鲁迅名言名句大全励志1、世上本没有路,走的人多了自然便成了路。下面是我整理的鲁迅先生的名言名句大全,希望对你有所帮助!当生存时,还是将遭践踏,将遭删刈,直至于死亡而

    语文
  • 三国群英单机版手游礼包码,三国群英手机单机版攻略

    三国群英传7五神兽洞有什么用那是多一个武将技能。青龙飞升召唤出东方的守护兽,神兽之一的青龙。玄武怒流召唤出北方的守护兽,神兽之一的玄武。白虎傲啸召唤出西方的守护兽,

    语文
  • 不收费的情感挽回专家电话,情感挽回免费咨询

    免费的情感挽回机构(揭秘情感挽回机构骗局)1、牛牛(化名)向上海市公安局金山分局报案,称自己为了挽回与女友的感情,被一家名为“实花教育咨询”的情感咨询机构诈骗4万余元。

    语文