自考题库
首页
所有科目
自考历年真题
考试分类
关于本站
游客
账号设置
退出登录
注册
登录
出自:郑州工业应用技术学院计算机专业英语
_______ program also has potential benefits in parallel processing. A.Machine B.Assembly C.Object-oriented D.Process-oriented
( ) ________ allows an Internet user to connect to a distant computer and use that computer as if he or she were using it directly. A.WWW B.FTP C.E-mail D.Telnet
( ) Most major corporations today use special hardware and software called _______to control access to their internal computer networks. A.virus checkers B.firewalls C.gateways D.detection programs
( )_________ occupations now take the biggest share of employment in many industrial societies such as the United States and the United Kingdom. A.mechanical engineering B.information-based C.electrical engineering D.biological engineering
( ) Unauthorized copying—a form of theft—of programs for personal gain is called ___________. A.unauthorized access B.damage C.attack D.software piracy
The basic units of a computer system are as follows: _________ A.CPU, memory and disk B.CPU, input and output unit C.CPU, memory and I/O system D.CPU, memory and ALU
Today, _________ can give you a music synthesizer, a fax machine, a CD-ROM drive, ect. A.input devices B.expansion cards C.output device D.joystick
The control unit fetches _________ from memory and decodes them. A.data B.information C.results D.instructions
When power is removed, information in the semiconductor memory is ________ . A.reliable B.lost C.manipulated D.remain
Please find the item that is not belong to the DBA _________ . ( ) A.storage structure and access method definition B.schema definition C.integrity constrain specification D.DDL
________ is designed to manage large bodies of information. A.a file system B.a transaction C.a database system D.a database langua
A characteristic of operating system is _________ . A.resource management B.memory management C.error recovery D.all the above
Assembly-language instructions are a series of _________ . A.0s and 1s B.abstract codes C.machine codes D.words
( ) The term _______is used to describe an interlinked system of documents in which a user may jump from one document to another. A.hypertext B.hypermedia C.hyperlink D.HTTP
An advantage of a ring network is that it needs less _________ . A.computer B.network C.cable D.information
An ISP supplies a _________ that you can dial from your computer to log on the internet server. A.public key B.private key C.service number D.help file
To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer. A.Programs B.View C.Layout D.Control Panel
Electronic bulletin boards are _________ communication platforms. A.one-to-many B.one-to-one C.many-to-many
Followings are some image data file formats, which is wrong? _______ A.*.TIF B.*.DOCBMP C.*.BMP D.*.GIF
By adding _________ to your programs, you can make computers more interesting and much more fun for the user. A.multimedia B.text C.music D.picture
“Multimedia” means that _________ . A.it can show a graph. B.it can do all above at the same time. C.it can play music D.it can rotate a three-dimensional model
____ is an architectural framework. A.Dns B.http C.ftp D.www
There are __ separate products that form the Windows 2000。 A. only one B.four C. two D.three
The purpose of the A is to provide fully integrated analog services to users. A.ISDN B.HTTP C.WWW D.FTP
Most operating system have a standard set of _________ to handle the processing of all inputtanddoutputtinstructions. A.control instructions B.spreadsheet C. I/O operation D.data table
“Multimedia” means that _________ . A.it can play musi B.it can show a graph. C.it can rotate a three-dimensional model. D.it can do all above at the same time.
A processor is composed of two functional units, they are _________. A.an arithmetic/logic unit and a storage unit B. a control unit and some registers C.a control unit and an arithmetic/logic unit D.some registers an arithmetic/logic unit
________ is a storage location inside the processor. A. A register B. ALU C. Control D. Memory
A periodic refresh is needed to restore the information for the _________ . A.SRAM B. DRAM C.EPROM D. EEPROM
The raw data are stored on the disk using the _________ . A.data dictionary B. file system C.BMS D.DBA
The _______ serves as an interface between hardware and software. A.system B. application program C.operating system D.control unit
Most operating system have a standard set of _________ to handle the processing of all input and output instructions. A.spreadsheet B.control instructions C. I/O operation D. data table
_________ uses commands that are easier for programmers to understand than are machine language commands. A.Assembly language B.High-level language C.C language D. C++ language
When a _________ is used, all the devices in the network are connected to a single cable. A.bus network B.ring network C.star network D. network
Two common applications of LANs are _________ resource sharing and information resource sharing. A. software B. computer C.network D.hardware
With Internet Explorer and an Internet connection, you can search for and view information on the _________ . A.Active Desktop B. Programs C.Phone Dialer D. World Wide Web
Videodisc and laser technology provide the ability to_________ A.cost more B. create some education files C. enhance other forms of education D. store large amounts of data
_________ refers to the process of a two dimensional picture by a digital computer . A.Pattern recognition B. Image compression C.Digital image processing D.Image data file format
Most system boards have two kinds of power connectors: _________ . A. AT and ISA styles B. ATX and ISA styles C.AT and EISA styles D.AT and ATX styles
Many companies use _________ to train their employees. A.technology B.entertainment C.multimedia applications D.animation
( ) The Internet is based on the concept of a (an) _____ relationship between computers. A.browser/server B.client/customer C.entity/relationship D.client/server
( ) A user typically connects to the Internet in one of two ways: dedicated access and _____ access. A.broadcasting B.point-to-point C.dial-up D.Internet
( ) are Internet addresses used by Web browsers to locate Internet resources. A.HTTP B.URLs C.DNS D.HTML
( ) The amount of data that a computer network can transmit is called ______ of the network and is usually measured in kilobits per second or megabits per secon A.baud rate B.frequency C.bit rate D.bandwidth
( ) An information revolution is now occurring from two interrelated aspects: social and development. A.economical B.technological C.4GLs D.OOP languages
( ) The largest category of computer criminals is . A.hackers B.programmers C.employees D.employers
( ) People who gain unauthorized access to a computer system for malicious purposes are called A.crackers B.hackers C.programmers D.operators
( ) All data transmitted over the Internet _______ small units of information called packets. A.is used for B.is added by C.is divided by D.is divided into
( ) A (an) _______ is a destructive program which fills a computer system with self-replicating information, clogging(堵塞) the system so that its operations are slowed or stoppe A.worm B.time bomb C.Trojan horse D.logic bomb
( ) There will be‖________,‖ so you won’t have to wait for your PC to come to life. A.fast-on B.quick-on C.instant-on D.add-on
首页
<上一页
1
2
3
下一页>
尾页