国开电大《计算机专业英语》形考任务1-4答案

此内容查看价格为8金币,请先
新注册用户随机送2-10金币,如有问题,请联系微信客服解决!

When a _________ is used, all the devices in the network are connected to a single cable.
network
bus network
star network
ring network
_________ is a storage location inside the processor.
Memory
A register
Control
ALUControl
A general purpose computer has four main sections: .
the control unit
the CPU
the memory
the arithmetic and logic unit (ALU)
the input and output devices
_________ refers to the number of individual dots of color, known as pixels, contained on a display.
Scan Style
Dot Pitch
Refresh Rate
Resolution
Application software (also called end-user program) is designed to perform a specific function directly for the user.


Many viruses do harmful things such as .
slowing your PC down
deleting files
simulating types
changing random data on your disk
The end equipment in a communication system includes .
CRTs
computers
keyboards
printers
Microsoft Word XP is a member of Microsoft office 2000 .


Word doesn’t have the feature to accessing to World Wide Web.


_________ uses commands that are easier for programmers to understand than are machine language commands.
Assembly language
High-level language
C++ language
C language
Windows 2000 has the key technologies, they are .
security
enterprise management
active directory
flat directory
As soon as you turn the computer off, the contents of RAM will disappear.


Two common applications of LANs are _________ resource sharing and information resource sharing.
hardware
computer
software
network
With an Internet connection you can get some of the basic services available are .
E-mail
Usenet news
FTP
Telnet
A processor is composed of two functional units, they are _________.
a control unit and an arithmetic/logic unit
some registers an arithmetic/logic unit
a control unit and some registers
an arithmetic/logic unit and a storage unit
C might best be ____ as a ‘medium-level language’.
programmed
developed
decoded
described
Many companies use _________ to train their employees.
technology
animation
entertainment
multimedia applications
We can classify programming languages under two types: languages and languages.
high-level
advanced-level
basic-level
low-level
Client/server database system is no longer in use now.


Every transaction in electronic commerce includes information flow, commercial flow, _______ and material flow.
file flow
currency flow
merchandise flow
data flow
Microsoft Office Professional 2000 include .
PowerPoint 2000
Excel 2000
Word 2000
Outlook 2000
Multimedia will become increasingly______throughout every aspect of our lives.
precise
pervasive
pass
permit
Maintenance of programs is not as important as the development.


E-commerce does business through _________.
face-to-face meeting
wire-photo
Internet and EDI
computer
Most operating system have a standard set of _________ to handle the processing of all input and output instructions.
spreadsheet
I/O operation
data table
control instructions
Flat-file style of database is suitable for large amounts of data.


A general purpose computer has four main sections: .
the CPU
the memory
the arithmetic and logic unit (ALU)
the input and output devices
the control unit
The _______serves as an interface between hardware and software.
application program
operating system
system
control unit
WinZip, WinRAR and Microsoft’s Internet Explorer are all data compression software.


The register file is .
addressed by much shorter addresses
one the same chip as the CPU
physically small
physically large
To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.
Layout
Programs
Control Panel
View
Without systems software, application software in a computer is useless.


A user interface we said here is .
an interface between a computer and its peripheral device
an interaction between an operating system and a user
an interaction between an application program and a user
a text-based user interface or GUI
A periodic refresh is needed to restore the information for the ______.
EPROM
0EEPROM
DRAM
SRAM
Microsoft Word can help you design and manipulate spreadsheet electronically.


SQL Server can allow many users to visit the database at the same time.


Menu bar displays the names of the application and document.


Windows XP is Microsoft’s most advanced desktop operating system.


____ refers to the parts of the computer that you can see and touch.
Software
Hardware
Instruction
Hardship
Software can be divided into two general classes: system software and application software.


With Internet Explorer and an Internet connection, you can search for and view information on the ________.
Programs
Phone Dialer
World Wide Web
Active Desktop
The display screen is the most common ____ device used to show you what the computer is doing.
electronic
output
input
printing
The raw data are stored on the disk using the_________.
DBMS
DBA
file system
data dictionary
High-level language is popular, because it is directly executable in computer without compiling.


The most important program on any computer is ____.
software
Operating System
Virus
Office 2000
形二
Unlike memory, this type of storage holds data and programs even after electrical power to the computer system has been turned off.
primary
ROM
RAM
secondary
White box testing requires the tester to have knowledge of the internal structure.


Hackers sometimes can disguise themselves as internal users and attack your system undetected.


The windows that are displayed when you start VB are known as the Visual Basic Integrated Development Environment (IDE).


RAM is a type of .
computer
network
secondary storage
memory
The type of file created by word processors to save, for example, memos, term papers, and letters.
worksheet
document
database
presentation
The smallest type of microcomputer .
tablet PC
handheld
midrange
netbook
which is the type of electronic commerce in the following choice .
P2P
C2C
B2B
B2C
Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.
media center
midrange
netbook
mainframe
New antivirus software is always more effective in defending virus attack.


The network that connects computers all over the world.
CERN
Internet
LAN
Web
A type of search engine that submits requests to other search engines, organizes their responses, eliminates duplicate responses, orders hits, and then provides an edited list.
directory search
metasearch engine
ISP
specialized search engine
Software engineering covers not only the technical aspects of building software systems, but also management issues.


E-mail that does not require an e-mail program installed on a user’s computer is known as :
Webmail
podcast
utility
blog
A multimedia system allows end users to share, communicate and process a variety of forms of information in an integrated manner.


OOD is the stage of creation and OOP is an implementation stage.


A browser is an example of a .
specialized program
basic application
utility program
system application
The two most common types of scanners are and .
hand-held scanners
auto scanners
handler scanners
flatbed scanners
Client-based e-mail accounts require this special program to be installed on your computer.
Java
e-mail client
hyperlink
utility
Data warehouse is a single source of information to understand different subjects.


The keyboard, mouse, monitor, and system unit are .
output devices
hardware
storage devices
software
A very well-known microblog.
Wikipedia
Myspace
LinkedIn
Twitter
The change in connectivity that uses the Internet and the Web to shift many computer activities from a user’s computer to computers on the Internet.
high definition
network
USB
cloud computing
Similar to viruses, you can also find malicious code in .
Microsoft Word Documents
Trojan Horses
worms
logic bombs
Programs that coordinate computer resources, provide an interface, and run applications are known as .
operating systems
storage systems
utility programs
application programs
There are various languages for humans, whereas(然而)there is only one programming language for computer.


is a type of executable file .
COM file
TXT file
JPG file
EXE file
High-level languages are commonly classified as .
procedure-oriented
functional
logic languages
object-oriented
automatic
maybe a certain cause that some viruses infect upon.
an external event on your PC
a time
a day
a counter within the virus
Newer ideas in computing such as have radically altered the traditional concepts that once determined program form and function.
parallel computing
artificial intelligence
data mining
distributed computing
software engineering
This is the Internet’s equivalent to traditional cash.
digital cash
Internet dollars
i-cash
e-commerce
A WAN is a network that connects LANs and nodes across a wide geographical area.


The chief responsibility of TCP/IP is to ensure reliable point-to-point connectivity.


The main focus of MIS is the management function of an organization.


Viruses all have two phases to their execution, the and the .
delete phase
infection phase
create phase
attack phase
These programs continually look for new information and update search services’ database programs.
spiders
wikis
filters
IM
Some viruses use and techniques to hide their existence.
polymorphic
stealth
quickly spread
replace a part of system software
The rules for exchanging data between computers.
Web
protocols
DSL
WWW
The largest network in the world is .
USB
Facebook
Web
Internet
Using file transfer utility software, you can copy files to your computer from specially configured servers on the Internet. This is called
uploading
downloading
blogging
filtering
Compared with simple non-EDI-based purchase, EDI purchase is faster, cheaper and convenient.


Communities of individuals who share a common interest typically create Facebook .
pages
groups
clients
profiles
WWW provides access to a variety of Internet resources from different interfaces.


Data warehouse only contains current information.


The web browsers which is normal used, such as .
ICQ
Google Chrome
Internet Explorer
Firefox
形三
he development process in the software life cycle involves four phases .
audit
implementation
analysis
testing
design
Programs for Web site design and HTML coding are called Web page editors or .
apps
VR programs
B.HTML editors
Web editors
With Internet Explorer and an Internet connection, you can search for and view information on the _________.
Active Desktop
Phone Dialer
Programs
World Wide Web
ADO.NET relies on the services of .NET data providers. There are .
Data Reader
Data Adapter
Connection
Command
A virus is a program that reproduces its own code by .
simply placing a pointer
replacing another program
inserting into the middle of a file
adding to the end of a file
The network architecture is a layer-based.


Input devices include: .
microphone
touch screen
the mouse
the keyboard
One of the functions of an operating system is memory management.


Many companies use _________ to train their employees.
multimedia applications
entertainment
animation
technology
The World Wide Web also subsumes previous Internet information systems such as .
Gopher
FMP
Telnet
FTP
A widely used interactive animation application from Adobe.
WYSIWYG
Fuzzy
Flash
ACTION
These specialized graphics programs combine text and graphics to create publications of professional quality.
image editors
image galleries
illustration programs
desktop publishing programs
GIS work with two fundamentally different types of geographic models. They are the .
vector model
mathematic model
raster model E. data model
geography model
Operating systems are unique to their manufacturers.


When a _________ is used, all the devices in the network are connected to a single cable.
bus network
network
ring network
star network
Videodisc and laser technology provide the ability to_________.
create some education files
cost more
store large amounts of data
enhance other forms of education
An essential multimedia feature that allows user participation.
Flash
interactivity
immersion
raster
Data communications equipment (DCE) accepts the serial data stream from the DTE.


Many operating systems have similar characteristics.


Error recovery does not belong to operating system.


A type of artificial intelligence that uses a database to provide assistance to users.
acoustics
expert systems
virtual reality
robotics
Special programs used to create multimedia presentations.
image editors
multimedia authoring programs
desktop publishing programs
Flash editors
Two common applications of LANs are _________ resource sharing and information resource sharing.
computer
software
hardware
network
Graphics programs used to create and edit vector images.
illustration programs
desktop publishing programs
image galleries
image editors
In the e-mail a user needs a message transfer agent.


Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system. The term includes: .
devices on board mainboards or other types of integrated hardware carriers.
Middleware which controls and co-ordinates distributed systems.
Firmware which is software programmed resident to electrically programmable memory
Application software such as word processors which perform productive tasks for users.
Office 2000 is an incredible set of business tools.


All virus scanners can kill most known viruses.


This area of artificial intelligence is also known as expert systems.
knowledge-based systems
virtual reality
robotics
acoustics
A processor can do everything without a program to provide control.


In electronic commerce information search and discovery services include .
information filters
search engines
software agents
directories
electronic catalogs
Only a few bugs can trouble a program.


The two most common types of scanners are and .
flatbed scanners
hand-held scanners
handler scanners
auto scanners
The heart of any computer system is the central processing unit (CPU).


Microsoft Word 2000 allows you to create many types of personal and business communications.


_________ refers to the process of a two dimensional picture by a digital computer.
Pattern recognition
Image compression
Digital image processing
Image data file format
“Multimedia” means that _________
it can rotate a three-dimensional model.
it can play music.
it can show a graph.
it can do all above at the same time.
Another name for the database used in expert systems that contains specific facts and rules.
rule base
expert table
access table
knowledge base
_______ uses commands that are easier for programmers to understand than are machine language commands.
C++ language
language
High-level language
Assembly language
Modem is .
a modulator
a data set
a modulator/demodulator
a demodulator
Also known as drawing programs.
desktop publishing programs
image galleries
image editors
illustration programs
The _____ serves as an interface between hardware and software.
operating system
control unit
application program
system
Most operating system have a standard set of _________ to handle the processing of all input and output instructions.
operation
data table
spreadsheet
control instructions
Multimedia is just two media: sound and pictures.


Programs were thought of as a series of procedures.


形四
In a spreadsheet, the intersection of a row and column creates a .
formula
cell
function
label
A computer’s operational software defines the schedule of jobs awaiting execution.


A utility program that makes copies of files to be used in case the originals are lost or damaged.
Compactor
Disk Cleanup
Disk Defragmenter
Backup and Restore
Programs that create text-based documents.
DBMS
word processors
spreadsheets
suites
Office automation is .
communications technology
the computer
used to improve the productivity of people
the application of computer
The primary disadvantage of this type of package is that the capabilities of each function are not as extensive as in individual programs.
integrated
utility
office
software
A collection of related data that is the electronic equivalent of a file cabinet.
database
table
document
cell
Multiprogramming allows time sharing.


A type of suite stored at a server on the Internet and available anywhere through Internet access.
integrated
office
utility
cloud
A database tool that will quickly rearrange a table’s records according to a selected field.
sort
filter
spreadsheet
word processor
Programs that combine a variety of visual objects to create attractive, visually interesting presentations.
DBMS
spreadsheet
word processor
presentation graphics
CD-ROM is rewritable.


This type of software works with end users, application software, and computer hardware to handle the majority of technical details.
system
application
purpose
utility
Coding in computer security makes data be unintelligible to the outside observer.


We can use multimedia in Education, Edutainment and so on.


The TCP/IP Internet protocol suite is formed from five standards.


Viruses can cause programs crashing but can’t cause entire hard disk deleting.


Windows makes it easy to update drivers with Windows .
Backup
Restore
Driver
Update
Computer programs fall into two major classes: .
operating systems
application suite
application programs
database application
The development process in the software life cycle involves four phases: analysis, design, implementation, and .
audit
analysis
implementation
testing
design
The dataflow diagram is a graphical chart that depicts the flow of data among internal process, external entities, and data stores.


The ability to switch between different applications stored in memory is called .
operational interference
diversion
multitasking
programming
A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space, and improves system performance .
Compactor
Backup and Restore
Disk Cleanup
Disk Defragmenter
Before you turn the power on with a new computer, you should make sure .
the computer is already out of the box
appropriate software have been installed
the computer system has been set up
appropriate cables are correctly connected
Electronic payments include .
digital currencies
electronic checks
cash payment
credit card payments
What type of software works with users, application software, and computer hardware to handle the majority of technical details?
application
desktop
Linux
system
Some viruses, with no attack phase, often damage the programs or disks they infect because they .
steal storage
show messages on your screen
contain poor quality code
have bugs in them
A rectangular area that can contain a document, program, or message.
dialog box
form
frame
window
The operating system based on Linux, designed for Netbook computers, and focused on Internet connectivity through cloud computing .
Mac
Windows
Unix
Chrome
C++ is .
object-oriented
procedure-oriented
a superset of C
extended from C
The mobile operating system developed by Apple and originally called iPhone OS .
IOS
Android
BlackBerry OS
Mac OS
The equipment .
transfers the number of bits in serial form
transfers the number of bits in parallel
manipulates digital information internally in word units
manipulates digital information internally in serial form
Graphic representations for a program, type of file, or function .
image
software
app
icon
Programs that organize, analyze, and graph numeric data such as budgets and financial reports.
suites
DBMS
spreadsheets
word processors
A successful test is to exhibit the absence of errors in the programs being tested.


An asleep state is .
used for saving energy
a low power standby mode
indicated by the indicator light putting out
used to lessen wear-and tear on the computer
When you send an e-mail you should provide the sender’s e-mail address.


In a computer system, these records that are logically contiguous in one applications must be physically stored together.


A database is a collection of logically related data elements that are structured in various ways to meet the multiple processing and retrieval needs of organizations and individuals.


Hypermedia include .
video clips
sounds
text
flash
images
F.
video
A centralized database system can be highly responsive to differences in data gathering, storage, and access.


ISDN does not include that element that provides one kind of service.


Your computer uses two types of memory: primary memory and secondary memory.


This operating system feature is controlled by a mouse and changes shape depending on its current function.
pointer
menu
dialog box
mouse
The programs that convert programming instructions written by programmers into a language that computers understand and process are language
converters
linguists
translators
.managers

社交账号快速登录

微信扫一扫关注
微信扫一扫关注
如已关注,请在公众号内回复“登录”二字获取验证码