我们系有个计算机中心英语,吉大自考计算机专业英语(一)
计算机专业英语(一)14日14:30-17:00共11页(内部资料严禁外泄)
第一部分
I.Multiple choices
1. Which of the following feature of a word processor becomes more useful with the growth of the amount of text? ( A )
A. wording searching
B. grammar checking
C. word counting
D. spell checking
2. Which of the following feature of a word processor can show underline, bold, italic, font and other typing styles on the screen? (B)
A. WYSIWGY
B. WYSIWYG
C. WSYIWYG
D. WYSWIYG
3. Which of the following does NOT belong to hidden characters or commands?(A)
A. retrieval
B. spaces
C. returns
D. paragraph endings
4. Before typing in any data, a user needs to C .
A. edit the cell B .save the cell
C. select the cell
D. change the cell
5. Each cell of a worksheet can hold____A___.
A. one piece of data
B. two pieces of data
C. three pieces of data
D. four pieces of data
6. Where is the Entry Bar of a worksheet?(A)
A. below the icons of the worksheet
B. above the icons of the worksheet
C. at the left of the icons of the worksheet
D. at the right of the icons of the worksheet
7. All functions in spreadsheets start with ____B____.
A. a dollar sign
B. an equal sign
C. question mark
D. star
8. Which of the following can NOT be created by spreadsheets?(B)
A. bar chart
B. start chart
C. three-dimensional chart
D. pie chart
9. Which of the following message can be sent by E-mail without an attachment? (A)
A. text message
B. graphical message
C. audio message
D. video message
10. Which of the following can be applied for an E-mail message without an attachment? (D)
A. bold
B. underline
C. italics
D. none
11. Which of the following does NOT belong to one of the E-mail advantages? (D)
A. instantaneousness
B. efficiency
C. group sending feature
D. none
12. A private network-based E-mail system is not for ___B_____.
A. corporate users
B. home users
C. school users
D. hospital users
13. An E-mail server can be considered as a ____C_____.
A. powerful operating system
B. high-duty database system
C. high-configuration computer
D. practical Internet application
14. Which of the following is called a searching engine?(B)
A. Web server
B. Web browser
C. Web site
D. Web address
15. Which of the following is NOT an Internet application?(C)
A. IRC
B. audio chatting
C. file compiling
D. video chatting 16. To start an online chatting, a user needs to know____D____.
A. the software name of an IRC client
B. the Web service provider of an IRC client
C. the program name of an IRC client
D. the Web address of an IRC client
17. Once a user starts an IRC client, the server on the IRC service provider side will provide the user a____A____.
A. channel
B. server
C. hardware
D. program
18. What does the WWW stand for?
(A)
A. World Wide Web
B. World Wide Work
C. World Wide Watch
D. World Wide Wave
19. Which of the following is the primary function of the WWW? (A)
A. accessing resources
B. sending and receiving E-mails
C. IRC
D. Video conferencing
20. Which of the following is NOT
supported by the WWW? (D)
A. Gopher
B. FTP
C.
Usenet D. File compiling
21. To accommodate a binary number,
which of the following of a computer
doesn't have more digits than those for
decimal numbers do? (D)
A register B. bus C.
port D. keyboard
22. Which of the following unit
provides signals to start the operations
in the ALU, the memory and the
input/output unit? (D)
A. logical unit
B. arithmetic unit
C. input/output unit
D. control
unit
23. What does IC stand for? (B)
A. Intelligent Card
B. Intelligent
Circuit C. Integrated Card D.
Integrated Circuit
24. How many the most influential
components does a computer system
configuration include?(B)
A. 3
B. 4
C. 5
D. 6
25. Which of the following does NOT
belong to one of the most influential
components of a computer system
configuration? (B)
A. the memory
B. the
operating system
C. the input/output devices
D. the storage devices
26. Which of the following memory
will lose the data stored in it when the
power is gone or a malfunction occurs?
(C)
A. the ROM
B. the virtual
memory C. the RAM
D. the buffer
27. The permanently useful data is
stored in which of the following(A)
memory?
A. the ROM
B. the virtual
memory C. the RAM D.
the buffer
28. Which of the following does NOT
belong to a computer hardcopy output?
(D)
A. a graph
B. a photo
C. a text files
D. voice
29. Which of the following does NOT
belong to a computer hardcopy output
device? (B)
A. a plotter
B. a monitor
C. an ink-jet printer
D. a laser
printer
30. Which of the following belongs to
an impact computer hardcopy output
device? (A)
A. a plotter
B. an ink-jet
printer C. a laser printer D.
monitor
31. Which of the following is the
major advantage of a DVD-ROM over
a CD-ROM? (D)
A. portability
B. price
C. material
D. capacity
32. Which of the following is the
major advantage of a CD-R or a
CD-RW over a CD-ROM or a
DVD-ROM? (D)
A. speed
B. price
C. material
D. writing data
33. Which of the following is the
major advantage of a U-disk over a
hard disk? (C)
A. speed
B. price
C.
easy to carry D. writing
data
34. Which of the following is NOT
one of the most commonly used
software-relevant terminologies? (A)
A. data
B. program
C. operating system
D.
application software
35. Which of the following is the most
fundamental concept of computer
software? (B)
A. operating system
B.
program C. application software
D. system software
36. What is a computer program? (D)
A. a set of operations and tasks
B. a set of operations and data
C. a set of tasks and data
D. a set of instructions
37. Which of the following does NOT
belong to computer system software?
(C)
A. operating system
B. system utility
C. word processing program
D. language compiler
38. Which function of a word
processor can ensure typing
correctness?(C)
A. hidden commands
B.
typeface C. spell checking
D. space
39. What do users need to do with the
spell-checked files to ensure their
correctness?(B)
A. proof check
B. proofread
C. through check
D. double-check
40. Which of the following is NOT
one of a word processor's
functions?(C)
A. spell-checking typed text
B. grammar checking typed text
C. compiling typed text
D. counting typed text
41. Which of the following is NOT
one of the most commonly used
software-relevant terminologies? (A)
A. data
B. program
C.
operating system D. application
software
42. A computer processes __________
into____B___.
A. information/data
B.
data/information C. facts/data D.
information/facts
43. Data flow into the computer as
D .
A. output
B. a program
C. a
process D. input
44. Information flows from a
computer as ____A_____.
A. output
B. memory
C.
a program D. input
45. The ___B_____distinguishes a
computer from a calculator.
A. processor
B. stored program
C. memory
D. output
46. Data and program instructions are
stored in ___D_____ .
A. the processor
B. an output
device C. the stored program D.
memory
47. The computer component that
actually manipulates the data
is__C___.
A. main memory
B. an input
device C. the processor
D. an output device
48. The physical components of a
computer are collectively
called__D___.
A. peripherals
B. software
C. boards
D. hardware
49. Programs are known collectively
as____B_____.
A . secondary storage
B .
software C . stored programs
D . hardware
50. A physical switch is
B ; its setting is .
A. software/hardware
B.
hardware/software C. hardware/data
D. data/information
51. A ____B_____ holds enough bits
to store a single character.
A. word
B. byte
C. bit
D. chip
52. A __________is a group of
____C_____
A. bit/bytes
B. byte/words
C. word/bytes
D. character/bytes
53. The " digit-times-place-value "rule
work, with but not with__A__.
A. numbers/ characters
B.
bits/bytes C. bytes/words D.
characters/numbers
54. A location in memory is accessed
by its____A_____.
A. address
B. value
C. content
D. register
55. When memory is
C .its contents are not
changed.
A. written
B. accessed
C. read
D. it's always changed
56. The programmer can read and
write B .
A. ROM
B. RAM
C. words
D. bytes
57. What type of memory can only be
read? (B)
A. registers
B. ROM
C. RAM
D. words
58. The processor fetches and
executes____C____.
A. clock pulses
B. data
C. instructions
D. information
59. The part of an instruction that tells
the processor what to do is the
___D__.
A. operand
B. pulse
C .statement D. operation code
60. The processor's, components are
synchronized by___D____.
A. instructions
B. data
C.
information D. clock pulses
61. Which processor component
executes instructions? (C)
A. instruction register
B.
instruction control unit
C. arithmetic and logic unit
D. main
memory
62. The basic input device on a small
computer is a ___C____ .
A. display screen
B.
printer C. keyboard D.
card reader
63. The basic output device on a small
computer is a____B___ .
A. keyboard
B. display
screen C. diskette
D. plotter
64. A D generates hard-
copy output.
A. display unit
B. screen
C. monitor
D. printer
65. A display screen is divided into a
grid of ____C____.
A. bytes
B. bits
C. pixels
D. words
66. External devices are linked to a
small computer system through__B__.
A. channels
B. control
units C. plugs
D. interfaces
67.The D translates
between the computer's internal codes
and a peripheral device's external
codes.
A. processor
B. interface
C. memory
D. register
68. A A terminal
communicates with a distant computer
over data transmission lines.
A. remote
B.
display C. printing
D. local
69. The interference that distorts
electronic signals transmitted over a
distance is called__C____.
A. static
B.
interference C. noise
D. a spike
70. A network can be
worldwide.
A. Wide area
B. Metropolitan
area C. Local area D.
Campus area
71. B networks
usually span tens of kilometers.
A. Wide area
B. Metropolitan
area C. Local area D.
Ethernet
72. The Open Systems Interconnection
(OSI)reference model is based on a
proposal developed by____D_____.
A. ANSI
B. IEEE
C. IAB
D. ISO
73. B is concerned
with controlling the operation of the
subnet.
A. The transport layer
B. The
network layer C. The application
layer D. The data link layer
74. A is concerned
with transmitting raw bits over a
communication channel.
A. The physical layer
B. The
presentation layer C. The network
layer D. The data link layer
75. The main task of D
is to transform a raw transmission
facility into a line that appears free of
undetected transmission errors to the
network layer.
A. The physical layer
B. The
session layer C. The network layer
D. The data link layer
76. B allows users
on different machines to establish
sessions between them.
A. The physical layer
B. The
session layer C. The network layer
D. The data link layer
77. The ____D_____ serves as a
hardware/software interface.
A. system
B. Application
program C control unit D.
operating system
78. The source of a computer’s logic
is _____B_____.
A. hardware
B. software
C.
data D. the user
79. A disk drive is limited to a
few___C____.
A. tasks
B. program
functions C. primitive operations
D. I/O operations
80. Programmers write
___B_____code.
A. object
B. source
C.
machine-level D. load module
II.Cloze
Passage 1:
A database system gives us a way of
1(B) together specific pieces or
lists of 2(B) that are relevant to
us in our jobs or our lives. It also
provides a way to 3(D) and
maintain that information in a central
place. The first commercial computers
were really 4(B) more than
dedicated database machine used to
gather, sort and report on census
information. To this day, one of the
most common reasons for purchasing
a computer is to 5(C) a database
system.
供选择的答案:
1: (A)gather (B) gathering
(C)get (D)getting
2: (A) data (B) information
(C) mail (D) message
3: (A)build (B) copy
(C)remember (D) store
4: (A) anything (B) nothing
(C) something (D)thing
5: (A)find (B) load
(C)run (D) install
Passage II.
Toolboxes and menus in many
application programs were 6(B)
for working with the mouse. The
mouse controls a pointer on the screen.
You move the pointer by 7(B) the
mouse over a flat surface in the
direction you want the pointer to move.
If you run out of 8(C) to move
the mouse, lift it up and put it down
again. The pointer moves only when
the mouse is 9(D) the flat
surface. Moving the mouse pointer
across the screen does not affect the
document, the pointer simply 10(B)
a location on the screen. When you
press the mouse button, something
happens at the location of the pointer.
供选择的答案:
6:(A)assigned (B)designed
(C)desired (D)expressed
7:(A)putting (B)sliding
(C)serving (D) taking
8: (A) board (B)place
(C)room (D) table
9:(A)getting (B)going
(C)teaching (D) touching
10: (A)constructs (B)indicates
(C)instructs (D) processes
Passage III
The boot is to 11(B) automatic
routine that clears the memory, loads
the operating system, and prepares the
computer for 12(C) Included in
the computer's read-only memory
(ROM is the power-on-self-test, which
13(A) when the power is switched
on (a cold hoot.
After a system 14(B) or
lockup occurs, you usually must boot
the computer again, or reboot, by
15(A) the Reset button or Ctrl + Alt
+ Del (a warm boot).
11: (A)clear (B) initiate (C)
insert (D) push
12: (A) create (B)handle
(C)use (D)route
13:(A)executes (B)exits (C)
loads (D)reads
14: (A) communicate (B) crash
(C) create (D)handle
15: (A) pressing (B)pulling (C)
seeing (D)writing
PassageVI:
Perhaps you have been asking the
questions: Is everyone moving to
16(C) ? If I don't step to the 17(A)
user interface, will I be left all along at
the cold 18(A) command line?
Don't throw away your
19(D) . No one is 20(C) DOS's
death knell yet. DOS and its
applications people have using for
years are not going to stop working
overnight.
供选择的答案:
16: (A) DOS (B) UNIX (C)
Windows (D) Windows NT
17: (A) graphical (B) software (C)
command line (D) Windows NT