数模论坛

 找回密码
 注-册-帐-号
搜索
热搜: 活动 交友 discuz
查看: 10905|回复: 9

计算机英语试题集锦!(原文版)

[复制链接]
发表于 2004-5-8 16:48:44 | 显示全部楼层 |阅读模式
<b>1-1. Fill in the blanks with appropriate word or terminology found behind this exercise:</b>
<><FONT size=2>   1. A ____ is a fast and accurate symbol manipulating system.</FONT>
<><FONT size=2>   2. A system can accept, store, and process data and output results under the direction ____ of a stored of instructions.</FONT>
<><FONT size=2>    3. The keyboard of a workstation connected online to a computer is an example of ____.</FONT>
<P><FONT size=2>    4. The input/output and secondary storage units are sometimes called ____ devices.</FONT>
<P><FONT size=2>    5. Larger and faster printers, many online workstations, and magnetic ____ drives are commonly found in larger systems.</FONT>
<P><FONT size=2>    6. Some input devices require data to be ____ on an input medium such as a magnetizable material.</FONT>
<P><FONT size=2>    7. Output devices take out results from the CPU in machine ____ form</FONT>
<P><FONT size=2>    8. The heart of a computer system is ____</FONT>
<P><FONT size=2>    9. Key elements of a computer system include ____,input,processing and output </FONT>
<P><FONT size=2>    devices</FONT>
<P><FONT size=2>    10. The popular output devices used for personal computer are ____</FONT>
<BLOCKQUOTE>
<P>a<FONT size=2>. recorded                                b. a direct input device</FONT></P>
<P><FONT size=2>c. display screen and desktop printers     d. computer</FONT></P>
<P><FONT size=2>e. coded                                   f. tape</FONT></P>
<P><FONT size=2>g. CPU                                     h. peripheral</FONT></P>
<P><FONT size=2>i. memory                                  j. program</FONT></P></BLOCKQUOTE>
<P><FONT size=2><B>    1-2. True or false:</B></FONT>
<P><FONT size=2>    1. ____ The possible symbols in the binary numbering system are 0 to 9.</FONT>
<P><FONT size=2>    2. ____ The decimal value of 16 is represented in 4 bit BCD as 00010101. </FONT>
<P><FONT size=2>    3. ____ Alphanumeric versions of BCD commonly use 7, or 8 bits to represent characters.</FONT>
<P><FONT size=2>    4. ____ A 6 bit alphanumeric code can represent 128 different characters.</FONT>
<P><FONT size=2>    5. ____ There are four 8 bit codes in current use.</FONT>
<P><FONT size=2>    6. ____ Each 8 bit unit used to code data is called a byte.</FONT>
<P><FONT size=2>    7. ____ Eight bit codes are limited to representing 128different characters.</FONT>
<P><FONT size=2>    8. ____ An extra check (or parity) bit is often added to each 7, or 8 bit character represented in storage so that it will be possible to detect coding errors that may occur</FONT>
<P><FONT size=2>    9. ____ The digitals that can be found in the binary numbering system are only 0s and 1s </FONT>
<P><FONT size=2>    10. ____ Using BCD we can convert the entire decimal value into a pure binary form.</FONT>
<P><FONT size=2>    <B>1-3. Match the following terms to the appropriate definition:</B></FONT>
<BLOCKQUOTE>
<P><FONT size=2>1. ____ Processor                       2. ____ Instruction set</FONT></P>
<P><FONT size=2>3. ____ Clock                           4. ____ Machine language</FONT></P>
<P><FONT size=2>5. ____ Operation                       6. ____ Operand</FONT></P>
<P><FONT size=2>7. ____ Megahertz (MHz)                 8. ____ Control unit</FONT></P>
<P><FONT size=2>9. ____ Arithmetic Logic Unit (ALU)     10. ____ Register</FONT></P>
<P><FONT size=2>11. ____ Word size</FONT></P></BLOCKQUOTE>
<P><FONT size=2>    a. The part of an instruction that specifies the function that is to be performed.</FONT>
<P><FONT size=2>    b. The binary language in which a computer's instruction set is written.</FONT>
<P><FONT size=2>    c. A timer in a processor that releases precisely timed signals that provide a pulse for the processor's work.</FONT>
<P><FONT size=2>    d. A functional unit that interprets and carries out instructions.</FONT>
<P><FONT size=2>    e. A unique set of operations that comes with every processor.</FONT>
<P><FONT size=2>    f. The part of an instruction that tells where data that are operated on are located.</FONT>
<P><FONT size=2>    g. Million cycles per second.</FONT>
<P><FONT size=2>    h. The function unit that is responsible for supervising the operation of the entire computer system.</FONT>
<P><FONT size=2>    i. A function unit that provides the computer with logical and computational capability.</FONT>
<P><FONT size=2>    j. The term used to describe the size of operand registers and buses.</FONT>
<P><FONT size=2>    k. A storage location inside the processor.</FONT>
<P><FONT size=2>    <B>1-4. Fill in the blanks from using the words or terminology behind this exercise:</B></FONT>
<P><FONT size=2>    1. A series of different storage elements are found in most computer systems. These different elements are called the storage ____ </FONT>
<P><FONT size=2>    2. Data retained in a DASD are ____ to the CPU. </FONT>
<P><FONT size=2>    3. The ____ storage of a computer system includes all the online DASDs and all the offline sequential access storage media that hold data in a computer readable form. </FONT>
<P><FONT size=2>    4. A special high-speed memory found in the CPU is a ____. </FONT>
<P><FONT size=2>    5. A microcomputer has a built-in ROM chip, it is called ____ sometimes. </FONT>
<P><FONT size=2>    6. Items stored in RAM can be accessed in ____. </FONT>
<P><FONT size=2>    7. Magnetic disk has two types, they are ____. </FONT>
<P><FONT size=2>    8. The original name of CD-ROM is ____. </FONT>
<P><FONT size=2>    9. Tape drive moves the tape past a ____ head. </FONT>
<P><FONT size=2>    10. The locations of RAM are maintained by ____. </FONT>
<BLOCKQUOTE>
<P><FONT size=2>a. cache          b. hard disks and floppy disks</FONT>
<P><FONT size=2>c. read/write     d. hierarchy</FONT>
<P><FONT size=2>e. ROM BIOS       f. the control unit</FONT>
<P><FONT size=2>g. secondary      h. Compact Disk-ROM</FONT>
<P><FONT size=2>i. any order      j. online </FONT> </P></BLOCKQUOTE>
<P><FONT size=2>    <B>1-5. Math the following terms to the appropriate definition:</B></FONT>
<P><FONT size=2>    1. ____ interactive inputs </FONT>
<P><FONT size=2>    2. ____ nonimpact printers </FONT>
<P><FONT size=2>    3. ____ source data automation </FONT>
<P><FONT size=2>    4. ____ display outputs </FONT>
<P><FONT size=2>    5. ____ sensor input </FONT>
<P><FONT size=2>    6. ____ impact printer </FONT>
<P><FONT size=2>    7. ____ liquid-crystal display(LCD) </FONT>
<P><FONT size=2>    8. ____ digitizer </FONT>
<P><FONT size=2>    9. ____ speech-recongnition devices </FONT>
<P><FONT size=2>    10. ____ optical scanner </FONT>
<P><FONT size=2>    a. CRT is basically a television tube adapted to present text, data, or images generated by computers.</FONT>
<P><FONT size=2>    b. A number of methods have been developed to increase speed, accuracy, and reliability of input.</FONT>
<P><FONT size=2>    c. Screen-dependent inputs</FONT>
<P><FONT size=2>    d. A device reads printed material so that it can be put in computer-readable form</FONT>
<P><FONT size=2>    e. Dot-matrix printer</FONT>
<P><FONT size=2>    f. A device accepts voice information through a microphone</FONT>
<P><FONT size=2>    g. Ink-jet printer and laser printer</FONT>
<P><FONT size=2>    h. Home computer links to thermometer, light detector and motion detector</FONT>
<P><FONT size=2>    i. A tool of technical applications especially used for engineering </FONT>
<P><FONT size=2>    j. A common electronic imaging technique used in flat-panel displays</FONT> </P>
 楼主| 发表于 2004-5-8 16:50:29 | 显示全部楼层
<b><FONT size=2>2-1. Multiple choices</FONT></b> <><FONT size=2>    1. The building blocks of higher level abstractions are implemented by using ____</FONT> <BLOCKQUOTE><><FONT size=2>a. records                     b. arrays</FONT> <><FONT size=2>c. linked structures           d. pointer</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2 The attributes of the stack are ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. FIFO                        b. LIFO</FONT> <P><FONT size=2>c. queue                       d. built into their circuitry</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3 FIFO protocol has many applications, including ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. I/O requests                b. handheld calculators</FONT> <P><FONT size=2>c. HPIFO                       d. job requests</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4 Queues that occur everyday life can be seen ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. in an emergency room of a hospital</FONT> <P><FONT size=2>b. in certain societies lacking equality</FONT> <P><FONT size=2>c. as people waiting for service at a bank</FONT> <P><FONT size=2>d. as automobiles waiting for a traffic light</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5 A stack protocol can be used for ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. subroutine calls</FONT> <P><FONT size=2>b. operation of arithmetic expressions</FONT> <P><FONT size=2>c. removing the latest element inserted</FONT> <P><FONT size=2>d. removing the earliest element inserted</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6 The operations of a structured data type might act on ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a stack</FONT> <P><FONT size=2>b. the values of the data type</FONT> <P><FONT size=2>c. component elements of the data structure</FONT> <P><FONT size=2>d. a queue</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>2-2. True or false</B></FONT> <P><FONT size=2>    1. ____ Operating systems are not unique to their manufacturers</FONT> <P><FONT size=2>    2. ____ When you purchase a new computer, an operating software suitable to the hardware must be bought</FONT> <P><FONT size=2>    3. ____ The series of jobs awaiting execution is called a queue</FONT> <P><FONT size=2>    4. ____ A program can use a device if that hardware is unavailable</FONT> <P><FONT size=2>    5. ____ Operating system sets up a directory of programs undergoing execution and the devices</FONT> <P><FONT size=2>    6. ____ IOCS simplifies the ways of I/O operations</FONT> <P><FONT size=2>    7. ____ In order to create the job queue the operating system must control I/O operation</FONT> <P><FONT size=2>    8. ____ Error recovery does not belong to operating system</FONT> <P><FONT size=2>    9. ____ One of the five functions of an operating system is memory management</FONT> <P><FONT size=2>    10. ____ Many operating systems have similar characteristics</FONT> <P><FONT size=2>    <B>2-3. Fill in the blanks with appropriate words or phrases found behind this exercise.</B></FONT> <P><FONT size=2>    1. A file is an abstract ____ and a sequence of ____.</FONT> <P><FONT size=2>    2. An application program can support the ____.</FONT> <P><FONT size=2>    3. The major task of an operating system is to ____ the logical file concept onto physical storage devices.</FONT> <P><FONT size=2>    4. ____ are commonly used for backup or archival storage.</FONT> <P><FONT size=2>    5. A file system keeps a ____.</FONT> <P><FONT size=2>    6. We create ____ to organize the files.</FONT> <P><FONT size=2>    7. A two-level directory solves the ____ problems.</FONT> <P><FONT size=2>    8. A tree-structured directory is derived from a ____ directory.</FONT> <P><FONT size=2>    9. ____ can share subdirectories and files.</FONT> <P><FONT size=2>    10. A general graph structure sometimes requires ____.</FONT> <P><FONT size=2>    11. Files can be allocated space on the disk in three ways: ____</FONT> <P><FONT size=2>    12. We can control the access to files by using the following methods: ____.</FONT> <P><FONT size=2>    13. File protection can be provided by ____.</FONT> <P><FONT size=2>    14. The lower levels of the file systems deal with the ____ of storage devices.</FONT> <P><FONT size=2>    15. Indexed file may require substantial ____ for its index block.</FONT> <BLOCKQUOTE><P><FONT size=2>a. read, write, execute, append, list directory      b. volume table</FONT> <P><FONT size=2>c. overhead                                          d. data type, logical records</FONT> <P><FONT size=2>e. Acyclic graph directory                           f. physical properties</FONT> <P><FONT size=2>g. record types                                      h. garbage collection</FONT> <P><FONT size=2>i. Tapes                                             j. contiguous, linked, indexed</FONT> <P><FONT size=2>k. map                                               l. naming</FONT> <P><FONT size=2>m. passwords, access lists                           n. two-level</FONT> <P><FONT size=2>o. directories</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>2-4. Multiple choices</B></FONT> <P><FONT size=2>    1. The Windows 2000 product line includes ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. Windows 2000 Professional            c. Windows 2000 Advanced Server</FONT> <P><FONT size=2>b. Windows 2000 Server                  d. Windows 2000 Datacenter Server</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Windows 2000 Server can support ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. two-way SMP                          c. eight-way SMP</FONT> <P><FONT size=2>b. four-way SMP                         d. sixteen-way SMP</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. Windows 2000 has the key technologies, they are ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. active directory                     c. flat directory</FONT> <P><FONT size=2>b. security                             d. enterprise management</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. Active Directory can help you ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. deliver complete enterprise security by itself</FONT> <P><FONT size=2>b. build a complex international network</FONT> <P><FONT size=2>c. manage every resource with a single logon</FONT> <P><FONT size=2>d. get off the limits of down level networks</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. Active Directory supports ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. granular access control             c. delegation of administrative task</FONT> <P><FONT size=2>b. encapsulation                       d. inheritance</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. Windows 2000 is ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. new lease of Windows                c. the same as Windows NT</FONT> <P><FONT size=2>b. an inventive technology             d. used for building a scalable network</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>2-5. Fill in the blanks with appropriate words or phrases.</B></FONT> <P><FONT size=2>    1. Linux is a ____ of the UNIX operating system.</FONT> <P><FONT size=2>    2. Linux is very ____</FONT> <P><FONT size=2>    3. Linux is a ____ operating system.</FONT> <P><FONT size=2>    4. ____ of Linux is freely available.</FONT> <P><FONT size=2>    5. We can find LDP information on the ____.</FONT> <P><FONT size=2>    6. Porting applications between Linux and UNIX systems is a ____.</FONT> <P><FONT size=2>    7. We could be intimidated by the ____ complexity of UNIX and Linux.</FONT> <P><FONT size=2>    8. The most important advantage of using Linux is to work with a ____.</FONT> <P><FONT size=2>    9. Linux is a ____ system.</FONT> <P><FONT size=2>    10. UNIX is one of the most popular operating systems due to its large support ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. multitasking                   b. size and apparent</FONT> <P><FONT size=2>c. Internet                       d. clone</FONT> <P><FONT size=2>e. base and distribution          f. portable and flexible</FONT> <P><FONT size=2>g. real kernel                    h. snap</FONT> <P><FONT size=2>i. source code                    j. free</FONT> </P></BLOCKQUOTE>
 楼主| 发表于 2004-5-8 16:50:58 | 显示全部楼层
<b><FONT size=2>3-1. Match the following terms to the appropriate definition</FONT></b> <><FONT size=2>    1.____ machine language</FONT> <><FONT size=2>    2.____ higher-level language</FONT> <><FONT size=2>    3.____ compiler</FONT> <P><FONT size=2>    4.____ interpreter</FONT> <P><FONT size=2>    5.____ assembler</FONT> <P><FONT size=2>    6.____ linker</FONT> <P><FONT size=2>    7.____ user-friendly interfaces</FONT> <P><FONT size=2>    8.____ computers</FONT> <BLOCKQUOTE><P><FONT size=2>a.A software translates instructions directly into actions</FONT> <P><FONT size=2>b.It maps machine instructions to human-readable and manageable mnemonics</FONT> <P><FONT size=2>c.Today's programs use the interfaces</FONT> <P><FONT size=2>d. A language that was represented by long strings of ones and zeroes</FONT> <P><FONT size=2>e. Tools used for solving business problems</FONT> <P><FONT size=2>f. A language that lets people work with something approximating words and sentences</FONT> <P><FONT size=2>g. A software that produces a program that is very fast each time it is runs</FONT> <P><FONT size=2>h. It turns the object file into an executable program</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>3-2. Multiple choice</B></FONT> <P><FONT size=2>    1. A chart that outlines the main segment of a program is called ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. macro chart                c. main control chart</FONT> <P><FONT size=2>b. micro chart                d. modular chart</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Symbols used in program flowcharts include ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. processing                 c. loop</FONT> <P><FONT size=2>b. terminal                   d. decision</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. Processing operations include ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. the end of a program       c. movement operations</FONT> <P><FONT size=2>b. arithmetic operations      d. logic operations</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. The following symbols are the terminal symbols ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. HALT                       c. STOP</FONT> <P><FONT size=2>b. START                      d. connector</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. The decision symbol has ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. two entrances              c. two exit paths</FONT> <P><FONT size=2>b. one entrance               d. one exit path</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. The connector symbol is used to ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. avoid confusion            c. reduce understanding</FONT> <P><FONT size=2>b. a long flow line           d. increase understanding</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. There are ____ types of programming control structures in a flowchart</FONT> <BLOCKQUOTE><P><FONT size=2>a. two                        c. four</FONT> <P><FONT size=2>b. three                      d. five</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. The selection structure is usually ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. cooperated with a connector </FONT> <P><FONT size=2>b. cooperated with a decision </FONT> <P><FONT size=2>c. . used for terminating an operation</FONT> <P><FONT size=2>d. used for selecting the appropriate operations</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. If a program should be executed repeatedly ____ structure has to be used</FONT> <BLOCKQUOTE><P><FONT size=2>a. loop                      c. DOUNTIL</FONT> <P><FONT size=2>b. DOWHILE loop              d. selection</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10. I/O symbol ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. is like as processing symbol         c. has a flow line</FONT> <P><FONT size=2>b. is not like as processing symbol     d. has two flow lines</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>3-3. True or false</B></FONT> <P><FONT size=2>    1. ____ Programs were thought of as a series of procedures</FONT> <P><FONT size=2>    2. ____ Divide and conquer are the principles of structured programming</FONT> <P><FONT size=2>    3. ____ Structured programming is suitable especially for simple problems</FONT> <P><FONT size=2>    4. ____ We can think the employee records be as data</FONT> <P><FONT size=2>    5. ____ Programmers are often required to solve old problems with old method</FONT> <P><FONT size=2>    6. ____ "Reinventing the wheel" is the same as reusability</FONT> <P><FONT size=2>    7. ____ When an engineer needs a new transistor, she should invent one</FONT> <P><FONT size=2>    8. ____ We usually use menus, buttons and windows in personal computers</FONT> <P><FONT size=2>    9. ____ When a button is pressed ,we say that an event is happens</FONT> <P><FONT size=2>    10. ____ Modern event-driven programs are required to process programs step-by-step through a series of screens</FONT> <P><FONT size=2>    11. ____ The essence of object-oriented programming is thought of the data and the procedures as a single object</FONT> <P><FONT size=2>    12. ____ In a structured programming any complex task would be broken down into a set of smaller component tasks</FONT> <P><FONT size=2>    <B>3-4. Fill in the blanks with appropriate words or phrases.</B></FONT> <P><FONT size=2>    1. The "Visual" part in Virtual Basic means the way used to create ____.</FONT> <P><FONT size=2>    2. The "Basic" part in Virtual Basic means the ____ programming language.</FONT> <P><FONT size=2>    3. Using Visual Basic, you can simply add ____ into place on screen.</FONT> <P><FONT size=2>    4. The ____ of Virtual Basic are related directly to the Windows GUI.</FONT> <P><FONT size=2>    5. We can find some Virtual Basic languages in ____.</FONT> <P><FONT size=2>    6. ____ is a subset of the Virtual Basic.</FONT> <P><FONT size=2>    7. Virtual Basic has a ____ ability to create database.</FONT> <P><FONT size=2>    8. With ____ technologies you can use some applications, such as MS Word and Excel.</FONT> <P><FONT size=2>    9. Using ____ you can freely distribute your applications in the true.exe file format.</FONT> <P><FONT size=2>    10. The Visual Basic learning edition allows you to easily create applications for MS Windows and ____.</FONT> <P><FONT size=2>    11. ____ includes all the features of the Learning edition, plus other functions.</FONT> <P><FONT size=2>    12. ____ includes all the features of the Professional edition, plus other functions.</FONT> <BLOCKQUOTE><P><FONT size=2>a. Active             b. The Enterprise edition         c. MS Excel, MS Access</FONT> <P><FONT size=2>d. GUI                e. The Professional edition       f. statements, functions, and keywords</FONT> <P><FONT size=2>g. BASIC              h. Windows NT                     i. Visual Basic Virtual Machine</FONT> <P><FONT size=2>j. data access        k. VB Script                      l. pre-built objects</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>3-5. Multiple choices</B></FONT> <P><FONT size=2>    1. C++ include the following pillars: ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. encapsulation                        c. inheritance</FONT> <P><FONT size=2>b. data hiding                          d. polymorphism</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Encapsulation is ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. derived from data hiding             c. used to accomplish data hiding</FONT> <P><FONT size=2>b. a self-contained unit                d. supported by C++</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. Classes in C++ ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. are user-defined types</FONT> <P><FONT size=2>b. can be used to support the properties of encapsulation and data hiding</FONT> <P><FONT size=2>c. act as a fully encapsulated entity</FONT> <P><FONT size=2>d. like a new car started from scratch</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. A new type ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. is a subclass</FONT> <P><FONT size=2>b. can be derived from an existing type</FONT> <P><FONT size=2>c. can't be called a derived type</FONT> <P><FONT size=2>d. inherits all features of existing type and has additional features</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. Polymorphism in C++ ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. means the same name taking many forms                c. has function polymorphism </FONT> <P><FONT size=2>b. supports different objects do "the right thing"      d. class polymorphism</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. C++ is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. object-oriented                        c. extended from C</FONT> <P><FONT size=2>b. procedure-oriented                     d. a superset of C</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. We prefer the following functions, they are ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. object-oriented analysis               c. object-oriented programming</FONT> <P><FONT size=2>b. object-oriented design                 d. procedure-oriented function</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. The actual inner workings of the class ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. should not be hidden                   c. like a "black box"</FONT> <P><FONT size=2>b. should be hidden                       d. don't like a "black box"</FONT> </P></BLOCKQUOTE><P><FONT size=2>   <B> 3-6. True or false</B></FONT> <P><FONT size=2>    1. ____ All of us expect the programs robust, bug-free.</FONT> <P><FONT size=2>    2. ____ Only a few bugs can trouble a program.</FONT> <P><FONT size=2>    3. ____ The biggest expense in programming efforts is testing and fixing.</FONT> <P><FONT size=2>    4. ____ The revolution of the software industry is producing good, solid, bulletproof programs at low cost and on time.</FONT> <P><FONT size=2>    5. ____ The earlier in the development process you find a problem, the more it costs to fix it.</FONT> <P><FONT size=2>    6. ____ The most common bugs are poor logic and syntactic error.</FONT> <P><FONT size=2>    7. ____ Those bugs that are flaky and only crash once in a while are most difficult to fix.</FONT> <P><FONT size=2>    8. ____ An exception bug can be caused by programmer's mistake in syntax.</FONT> <P><FONT size=2>    9. ____ We can eliminate exceptional circumstances.</FONT> <P><FONT size=2>    10. ____ With high-powered debuggers you should put your program into the debugger.</FONT> <P><FONT size=2>    11. ____ Using debugger you can see each instruction as it executes.</FONT> <P><FONT size=2>    12. ____ Using debugger you cannot examine your variables.</FONT> <P><FONT size=2>    13. ____ More powerful debuggers can help you examine the current state of each variable.</FONT> <P><FONT size=2>    14. ____ There are several types of control in a debugger.</FONT> <P><FONT size=2>    15. ____ Runtime bugs are easy to find.</FONT> <P><FONT size=2>    16. ____ A powerful debugger can find nearly all of bugs.</FONT> </P>
 楼主| 发表于 2004-5-8 16:54:04 | 显示全部楼层
<b><FONT size=2>4-1. Multiple choice</FONT></b> <><FONT size=2>    1. A data base is ____</FONT> <BLOCKQUOTE><><FONT size=2>a. a collection of logically related data elements</FONT> <><FONT size=2>b. used to meet the multiple processing and retrieval needs</FONT> <P><FONT size=2>c. used for organizations</FONT> <P><FONT size=2>d. not used for individuals</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. A DBMS can be used to ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. create data base records</FONT> <P><FONT size=2>b. process data elements</FONT> <P><FONT size=2>c. maintain data base records</FONT> <P><FONT size=2>d. present data elements</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. An MIS ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. has only a few ways to define</FONT> <P><FONT size=2>b. has many ways to define</FONT> <P><FONT size=2>c. has only a model</FONT> <P><FONT size=2>d. has many models</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. An MIS can be ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. defined as a network of computer-based data processing procedures</FONT> <P><FONT size=2>b. developed in an organization</FONT> <P><FONT size=2>c. integrated with manual</FONT> <P><FONT size=2>d. used to support decision making</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. The horizontal management structure of an MIS include ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. marketing                             c. middle management</FONT> <P><FONT size=2>b. operating management                  d. strategic management</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. The specialities and functions of an organization include ____ </FONT> <BLOCKQUOTE><P><FONT size=2>a. manufacturing                         c. research</FONT> <P><FONT size=2>b. finance                               d. tactical management</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. There are ____ in the simplest data bases</FONT> <BLOCKQUOTE><P><FONT size=2>a. complex data relationships            c. linkages</FONT> <P><FONT size=2>b. simple data relationships             d. data elements</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. The users of the data base are ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. .various OS programs                  c. managers</FONT> <P><FONT size=2>b. students                              d. programmers</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. In a file-oriented system, users ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. transfer their needs to a programmer</FONT> <P><FONT size=2>b. don't transfer their needs to a programmer</FONT> <P><FONT size=2>c. have much faster communication path than DBMS offered </FONT> <P><FONT size=2>d. have much slower communication path than DBMS offered</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10. An organization's model of an MIS ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. is different from another           c. varies in scope and breadth</FONT> <P><FONT size=2>b. is the same as another              d. does not vary in scope and breadth</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>4-2. Fill in the blanks with appropriate words or phrases</B></FONT> <P><FONT size=2>    1. In earlier data base products a data base was usually just a ____</FONT> <P><FONT size=2>    2. A data base in which data is organized into a table is referred as a ____</FONT> <P><FONT size=2>    3. A single table of data should be formed by ____</FONT> <P><FONT size=2>    4. ____ is used to speed data access</FONT> <P><FONT size=2>    5. ____ contains the database's structure and security</FONT> <P><FONT size=2>    6. A relational database consists of different types of ____</FONT> <P><FONT size=2>    7. ____ are called columns</FONT> <P><FONT size=2>    8. ____ can be chosen from character, numeric, date or other</FONT> <P><FONT size=2>    9. In the SQL code ____ is like a macro</FONT> <P><FONT size=2>    10. We should use the ____ when data is added, edited, or deleted from the database</FONT> <P><FONT size=2>    11. We use the ____ to conform the data being entered to standards</FONT> <P><FONT size=2>    12. ____ enforce uniqueness among rows</FONT> <P><FONT size=2>    13. ____ references another table's primary key</FONT> <P><FONT size=2>    14. ____ is a data-integrity enforcement mechanism</FONT> <P><FONT size=2>    15. ____ is basically a query stored in the database</FONT> <BLOCKQUOTE><P><FONT size=2>a. triggers                       b. SQL server</FONT> <P><FONT size=2>c. view                           d. file</FONT> <P><FONT size=2>e. foreign key                    f. index</FONT> <P><FONT size=2>g. constraint                     h. relational database</FONT> <P><FONT size=2>i. primary key                    j. column, and rows</FONT> <P><FONT size=2>k. rules                          l. stored procedure</FONT> <P><FONT size=2>m. fields                         n. objects </FONT> <P><FONT size=2>o. data types</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>4-3. Multiple choice and find the corresponding relationships</B></FONT> <P><FONT size=2>    1. SQL is invented ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. by Microsoft                     c. in 1980s</FONT> <P><FONT size=2>b. by IBM                           d. in 1970s</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Microsoft coded a SQL server that ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. is called T-SQL                  c. is made by Sybase</FONT> <P><FONT size=2>b. is called Transact-SQL           d. is made initially with Sybase</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. SQL server 6.5 is implemented on ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. Windows NT server                c. Windows NT workstation</FONT> <P><FONT size=2>b. Windows 95                       d. Windows 98</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. Find the corresponding relationships between date and event</FONT> <BLOCKQUOTE><P><FONT size=2>(1) 1983         (a) First shipment of ODBC product</FONT> <P><FONT size=2>(2) 1986         (b) IBM announces DB/2</FONT> <P><FONT size=2>(3) 1987         (c) ISO SQL1 standard ratified </FONT> <P><FONT size=2>(4) 1992         (d) ANSI SQL1 standard ratified</FONT> <P><FONT size=2>(5) 1993         (e) Commercial shipment of parallel database server technology</FONT> <P><FONT size=2>(6) 1994         (f) Microsoft SQL Server7 provides enterprise- level database support for NT</FONT> <P><FONT size=2>(7) 1997         (g) ANSI SQL2 standard ratified</FONT> <P><FONT size=2>(8) 1998         (h) Major DBMS vendors announce Java integration strategies</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>4-4. True or false </B></FONT> <P><FONT size=2>    1. ____ Access1.0 allows the maximum database size to 1Gbyte</FONT> <P><FONT size=2>    2. ____ We can use Access1.0 on the Windows3 platform</FONT> <P><FONT size=2>    3. ____ The greatest leap from Access1.1 to 2.0 came for developer community</FONT> <P><FONT size=2>    4. ____ Access1.1 can change control and form properties at run time</FONT> <P><FONT size=2>    5. ____ We can get data in and out of form simple by Access1.1</FONT> <P><FONT size=2>    6. ____ Access2.0 can access to most form and report properties at run time</FONT> <P><FONT size=2>    7. ____ Access2.0 supports for 32-bit OLE custom controls</FONT> <P><FONT size=2>    8. ____ DAO is a consistent object model</FONT> <P><FONT size=2>    9. ____ VBA integrated development environment was received extra attention</FONT> <P><FONT size=2>    10. ____ In Access95 both Access and Jet engines right now are 16-bit</FONT> <P><FONT size=2>    11. ____ Access95 can't support form class modules and named parameters</FONT> <P><FONT size=2>    12. ____ Access97 has Internet/intranet features</FONT> <P><FONT size=2>    13. ____ Access97 has also been improved in stability and performance</FONT> <P><FONT size=2>    14. ____ Access2.0 has new lightweight image control</FONT> <P><FONT size=2>    15. ____ Access97 gets better than Access95</FONT> </P>
 楼主| 发表于 2004-5-8 16:54:27 | 显示全部楼层
<FONT size=2> <B>5-1. Multiple choices</B></FONT> <><FONT size=2>    1. Office automation is ____</FONT> <BLOCKQUOTE><><FONT size=2>a. the application of computer       c. communications technology</FONT> <><FONT size=2>b. the computer                      d. used to improve the productivity of people</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Office automation was the interactive system of word and text processing in the ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. mid-1950s                         c. mid-1970s</FONT> <P><FONT size=2>b. mid-1960s                         d. 1980s</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3.The major functional components of an office automation system include ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. text processing                   c. information storage and retrieval</FONT> <P><FONT size=2>b. electronic mail                   d. Task management</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. The hardware of an office automation includes ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. printer                           c. Windows 2000</FONT> <P><FONT size=2>b. video display                     d. Input devices</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. Office automation system is useful especially for ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. physical workers                  c. managers</FONT> <P><FONT size=2>b. clerical office workers           d. professional workers</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. Electronic mail permits an user ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. to compose a message              c. to transmit a message</FONT> <P><FONT size=2>b. to receive a message              d. To view a Web page</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. Electronic mails have protocols that are ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. non-standard                      c. like post office's specification</FONT> <P><FONT size=2>b. standard                          d. Used to define recipient</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. The software of an office automation includes ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. word processing                   c. database management system</FONT> <P><FONT size=2>b. two-way cable TV                  d. on -line database services</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. We hope the office automation as ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a whole integrated system         c. with minimum human intervention</FONT> <P><FONT size=2>b. with maximum technical assistant  d. a manual system</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10. An integrated office automation can be ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a networked system</FONT> <P><FONT size=2>b. a system that an office worker can easily access</FONT> <P><FONT size=2>c. a single computer</FONT> <P><FONT size=2>d. used to change the way people work in an office</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>5-2. Fill in the blanks with appropriate words or phrases</B></FONT> <P><FONT size=2>    1. Microsoft Office 2000 is an office ____</FONT> <P><FONT size=2>    2. Microsoft Office 2000 has five types of ____</FONT> <P><FONT size=2>    3. Microsoft Of fice2000 Premium Edition includes ____</FONT> <P><FONT size=2>    4. Clip art gallery contained in CD-ROM of the Microsoft Office 2000 is used to ____</FONT> <P><FONT size=2>    5. Microsoft Clipart ____is on the Microsoft Web site</FONT> <P><FONT size=2>    6. In the Microsoft Office 2000 you work with____</FONT> <P><FONT size=2>    7. Microsoft Office applications are ____</FONT> <P><FONT size=2>    8. Microsoft Office 2000 has the power of ____</FONT> <P><FONT size=2>    9. Using Microsoft Office 2000 we can structure a intranet as a ____to view documents</FONT> <P><FONT size=2>    10. We can place the files on the ____ using Microsoft Office 2000 applications</FONT> <BLOCKQUOTE><P><FONT size=2>a. edition                b. central location             c. self-repairing</FONT> <P><FONT size=2>d. suit                   e. Web server                   f. 9</FONT> <P><FONT size=2>g. Internet               h. enhance the appearance of a document</FONT> <P><FONT size=2>i. menus and toolbars     j. Gallery Live</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>5-3. Multiple choices</B></FONT> <P><FONT size=2>    1. Using Microsoft Word 2000 we can create ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. personal communications                c. speadsheet</FONT> <P><FONT size=2>b. business documents                     d. academic reports</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. The software packages used for proofreading documents for errors include ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. Excel 2000                             c. Grammar</FONT> <P><FONT size=2>b. AutoCorrect                            d. Spelling</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. The Collect and Paste can be used ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. to cut or copy e-mails                 c. within a single Office </FONT></P></BLOCKQUOTE>
 楼主| 发表于 2004-5-8 16:54:58 | 显示全部楼层
<b><FONT size=2>6-1. Multiple choice</FONT></b> <><FONT size=2>    1. Types of media include ____.</FONT> <BLOCKQUOTE><><FONT size=2>a.</FONT> <FONT size=2>text                               c. animation</FONT> <><FONT size=2>b.</FONT> <FONT size=2>full-motion video                  d. audio</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Text can be ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>a computerized form of a book      c. a audio</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>accessed by user immediately       d. the basis for word processing programs</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. There are many types of expressing text: ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>with video                         c. using different colors</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>using different fonts              d. using different formats</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. The best way to describe the beat of a heart is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>text                               c. sound</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>picture                            d. photograph</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. Red book audio is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>an international standard          c. a specification referred to customer audio CD-ROM</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>known as IEC 908                   d. on CD-ROM</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. Microsoft wave file ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>can't be played on PCs    c. can provide some information about resolution and playback rate</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>can be played on PCs      d. contains the actual digital data</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. MIDI specification ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>can store musical notes            c. is a digitized form of the sound</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>cannot store musical notes         d. is not a digitized form of the sound</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. Static graphics include ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>movies c. pictures</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>animators d. photographs</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. The best way to describe the concept of golfing is use of ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>a single photograph                c. text</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>animation                          d. audio</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10. Advanced development of full-motion video is limited by ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>methods of data compression        c. resolution of video</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>hard disk space                    d. size of video film</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>6-2. True or false.</B></FONT> <P><FONT size=2>    1. ____ We need to add audio sound, images, animation and full-motion video to every application.</FONT> <P><FONT size=2>    2. ____ We can use multimedia in CBT, Education, Edutainment and so on.</FONT> <P><FONT size=2>    3. ____ A multimedia program can simulate the emergencies.</FONT> <P><FONT size=2>    4. ____ Many schools have multimedia educational system.</FONT> <P><FONT size=2>    5. ____ Mixing education with entertainment is to make learning fun.</FONT> <P><FONT size=2>    6. ____ It is right to have a little fun.</FONT> <P><FONT size=2>    7. ____ We are not overwhelmed with so much information of multimedia.</FONT> <P><FONT size=2>    8. ____ We can make business presentations more better and more effective through multimedia.</FONT> <P><FONT size=2>    9. ____ It is invaluable to train people to play the piano with multimedia.</FONT> <P><FONT size=2>    10. ____ If you want to get involved in the multimedia industry, you'd better to offer a multimedia resume.</FONT> <P><FONT size=2>    <B>6-3. Fill in the blanks with appropriate words or phrases.</B></FONT> <P><FONT size=2>    1. The characteristics of a sound include ____ of the waves.</FONT> <P><FONT size=2>    2. ____ is used to convert the sound waves into an electromagnetic waveform.</FONT> <P><FONT size=2>    3. ____ is continuously varies.</FONT> <P><FONT size=2>    4. A microcomputer is a ____.</FONT> <P><FONT size=2>    5. The simplest use of a computer in an audio system is ____.</FONT> <P><FONT size=2>    6. ____ is a process by which the analog sound waves can be converted into digital data.</FONT> <P><FONT size=2>    7. ____ are the two factors that reproduce the original analog waveform.</FONT> <P><FONT size=2>    8. The sampling rate is expressed in ____.</FONT> <P><FONT size=2>    9. The sample size describes ____ of each sample.</FONT> <P><FONT size=2>    10. Because many sampled values actually fall between two numbers, so it may introduce a ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>digital recording                    b. quantization error </FONT> <P><FONT size=2>c. amplitude, frequency and shape</FONT>      <FONT size=2>d.</FONT> <FONT size=2>The sampling rate and sample size</FONT> <P><FONT size=2>e. the numeric accuracy                 f. Microphone</FONT>                  <FONT size=2>g. KHz</FONT> <P><FONT size=2>h. Sound wave                           i. Sampling                       j. digital device</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>6-4. Fill in the blanks with appropriate words or phrases.</B></FONT> <P><FONT size=2>    1. We can use the ____ video standard to define the format of the video data.</FONT> <P><FONT size=2>    2. ____ are used to define images.</FONT> <P><FONT size=2>    3. ____ is used in computer environments.</FONT> <P><FONT size=2>    4. ____ is used in TV world.</FONT> <P><FONT size=2>    5. RGB stands for ____ components.</FONT> <P><FONT size=2>    6. Y component means ____.</FONT> <P><FONT size=2>    7. U and V components mean ____.</FONT> <P><FONT size=2>    8. One of several options regarding the digital video is ____.</FONT> <P><FONT size=2>    9. There are two major TV standard: ____.</FONT> <P><FONT size=2>    10. In the RGB color spaces, ____ on the screen has a corresponding RGB value.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>color spaces     b. each pixel           c. the intensity</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>MPEG-2           e. the chrominance      f. the horizontal and vertical resolutions</FONT> <P><FONT size=2>g. RGB              h. NTSC and PAL         i. red, green, and blue</FONT> <P><FONT size=2>j. YUV</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>6-5. Multiple choice</B></FONT> <P><FONT size=2>    1. Features of Authorware5.2 include ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>Macromedia Flash 5 Support          c. Data Tracking Improvements</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>Assessment Knowledge Objects        d. Windows Controls</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Using the Enhanced Calculation Editor we can ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>track data to learning MIS          c. have syntax formatting</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>have syntax highlighting            d. have other useful features</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. The standard Windows controls include ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>radio buttons                       c. combo boxes</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>hot spot                            d. list boxes</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. The standard assessment interactions include ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>single answer                       c. hot object</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>short answer                        d. true-false</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. Authorware's data tracking can be used to ____</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>support run-time API                c. support JavaScript URLs</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>track data to learning MIS          d. communicate with learning MIS</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. To find out the new contents of Authorware5.2 we click ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>start feature tour                  c. Web Learning Studio</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>feature tour                        d. Macromedia</FONT> </P></BLOCKQUOTE>
 楼主| 发表于 2004-5-8 16:55:30 | 显示全部楼层
<b><FONT size=2>7-1. Multiple choices</FONT></b> <><FONT size=2>    1. A computer graphics system includes the following components: ____.</FONT> <BLOCKQUOTE><><FONT size=2>a. processor                                   c. I/o devices</FONT> <><FONT size=2>b.</FONT> <FONT size=2>frame buffer                                d. pixel element</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. The following equipments can be used to configure a graphics system: ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. IC chip                                     c. PC</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>sophisticated image-generation system       d. workstation</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. A standard computer has ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. memory                                      c. processor</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>frame buffer                                d. input device</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. The frame buffer is ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. a part of memory                            c. a part of disk</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>used for storing pixels                     d. featured by depth</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. A 16-bit-deep frame buffer allows ____ colors.</FONT> <BLOCKQUOTE><P><FONT size=2>a. 256                                         c. 16384</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>4096                                        d. 65536</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. A typical CRT consists of ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. electron gun                                c. x/y deflects</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>focus                                       d. phosphor coating screen</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. A typical CRT will emit light for ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. a few seconds                               c. a few milliseconds</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a few microseconds                          d. a short time</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. Refresh of CRT ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. is used for a steady image                  c. is used to avoid flicker</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>must have a sufficiently high rate</FONT> <P><FONT size=2>d. is a process in which the electron beam retraces the same path</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. The pointing devices in the graphics systems are ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. printer                                     c. data tablet</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>joystick                                    d. light-pen</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10. The most common input devices in the graphics systems are ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. keyboard                                    c. CRT</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>mouse                                       d. microphone</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>7-2. Match the following terms to the appropriate definition.</B></FONT> <P><FONT size=2>    1. ____ graphical displays.</FONT> <P><FONT size=2>    2. ____ interactive computer graphics.</FONT> <P><FONT size=2>    3. ____ computer-aided design(CAD).</FONT> <P><FONT size=2>    4. ____ wire frame.</FONT> <P><FONT size=2>    5. ____ flight simulator.</FONT> <P><FONT size=2>    6. ____ computer-generated images.</FONT> <P><FONT size=2>    7. ____ presentation graphics.</FONT> <P><FONT size=2>    8. ____ typical examples of presentation graphics.</FONT> <P><FONT size=2>    9. ____ Painter and SuperPaint.</FONT> <P><FONT size=2>    10. ____ animation packages.</FONT> <BLOCKQUOTE><P><FONT size=2>a. An artist's paintbrush programs</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>They are almost indistinguishable from real-world images</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>The displays that can be used to everywhere</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>A form that shows the overall shape and internal features of objects</FONT> <P><FONT size=2>e.</FONT> <FONT size=2>Bar charts, line graphs, surface graphs, pie charts</FONT> <P><FONT size=2>f.</FONT> <FONT size=2>The design methods particularly used for engineering and architectural system</FONT> <P><FONT size=2>g. The software packages providing facilities for designing</FONT> <P><FONT size=2>h. The graphics that produce illustrations for reports</FONT> <P><FONT size=2>i. A standard method for training pilots</FONT> <P><FONT size=2>j. A practical tool in engineering and science</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>7-3. True or false</B></FONT> <P><FONT size=2>    1. ____ We call image synthesis computer graphics.</FONT> <P><FONT size=2>    2. ____ Computer graphics takes a two-dimensional model and calculates a three-dimensional projection.</FONT> <P><FONT size=2>    3. ____ Image processing is used to produce another image.</FONT> <P><FONT size=2>    4. ____ In image processing the source image must be a image file.</FONT> <P><FONT size=2>    5. ____ Image analysis is a part of image processing.</FONT> <P><FONT size=2>    6. ____ Computer vision is the extraction of information from an image.</FONT> <P><FONT size=2>    7. ____ The source image in computer vision is a three-dimensional projection of a real scene.</FONT> <P><FONT size=2>    8. ____ A TV camera gathers information from a 3D scene as a 2D projection.</FONT> <P><FONT size=2>    9. ____ We use the rendering to make the objects look solid and real.</FONT> <P><FONT size=2>    10. ____ The most significant feature in image processing is the emergence of new algorithms.</FONT> <P><FONT size=2>    11. ____ Image-based rendering is a 3D algorithm of computer graphics.</FONT> <P><FONT size=2>    12. ____ Lacking workable solutions make advances of computer vision very difficult.</FONT> <P><FONT size=2>    <B>7-4. Fill in the blanks with appropriate words or phrases.</B></FONT> <P><FONT size=2>    1. A digital image consists of a set of numeric values representing ____.</FONT> <P><FONT size=2>    2. The data often contains information from several ____.</FONT> <P><FONT size=2>    3. In order to analyze and manipulate the image information, we need ____.</FONT> <P><FONT size=2>    4. Techniques of computer image processing include ____.</FONT> <P><FONT size=2>    5. We can use ____ numeric value to represent 3 types of pixel brightness levels.</FONT> <P><FONT size=2>    6. In Fig.7-8 ____ performs the A/D conversion.</FONT> <P><FONT size=2>    7. We can use both of ____ formats to represent the graphics.</FONT> <P><FONT size=2>    8. In vector graphics the lines should be defined by ____.</FONT> <P><FONT size=2>    9. Raster graphics images are a collection of ____.</FONT> <P><FONT size=2>    10. Concept of digital image data is based on ____ of discrete and independent dots.</FONT> <BLOCKQUOTE><P><FONT size=2>a. the sensor</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>pixels</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>image compressing, enhancing its qualities, geometrically transforming, pattern detecting and so on</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>image brightness</FONT> <P><FONT size=2>e.</FONT> <FONT size=2>a pattern</FONT> <P><FONT size=2>f.</FONT> <FONT size=2>spectral channels</FONT> <P><FONT size=2>g. two-bit</FONT> <P><FONT size=2>h. vector and raster</FONT> <P><FONT size=2>i. digitally encoded image data</FONT> <P><FONT size=2>j. position, length and direction</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>7-5. Multiple choices</B></FONT> <P><FONT size=2>    1. Image data occupies ____ memory space.</FONT> <BLOCKQUOTE><P><FONT size=2>a. very large                       c. not very large</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>very small                       d. considerable</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Data compression methods can be used to ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. increase the storage space necessary for preserving image data</FONT> <P><FONT size=2>b. reduce the storage space necessary for preserving image data</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>increase the storage space necessary for storing other data</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>reduce the storage space necessary for storing other data</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. The data compressed by loss less algorithm can be restored ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. exactly to its original values</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>to its original values with some loss of accuracy</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>to its original values without some loss of accuracy</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>to another values</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. Comparing with loss less compression, lossy techniques are ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. less efficient                   c. more accurate</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>more efficient                   d. less accurate</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. The results of a loosy algorithm are suitable to ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. as input for other operations</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>showing the results of an analytical operation</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>showing the results of a data processing operation</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>as not input for other operations</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. If we hope a compressed image be indistinguishable from the original, a ____ compressive format might be used</FONT> <BLOCKQUOTE><P><FONT size=2>a. 4-bit per pixel                 c. 1-bit per pixel</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>0.25-bit per pixel              d. more than 4-bit per pixel</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. Using JPEG standard, we can ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. select a number of facilities</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>take loss less compression</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>take lossy compression</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>take some operating modes suitable to the user's application</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. The modes of operation included in JPEG are the following ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. sequential coding               c. hierarchical coding</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>progressive coding              d. interframe coding</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. JPEG is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a compression standard of moving image</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a still image compression standard</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>concerned with still continue-tone gray-scale images</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>distinguishable from the routine application of a single classical data compression</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10. JPEG compression steps shown in Fig.7-9 are ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. two steps                      c. four steps</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>three steps                    d. five steps</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>7-6. True or false</B></FONT> <P><FONT size=2>    1. ____ MPEG is a single standard</FONT> <P><FONT size=2>    2. ____ MPEG contains a series of standards</FONT> <P><FONT size=2>    3. ____ Among the four MPEG standards MPEG-2 is the most widely used one</FONT> <P><FONT size=2>    4. ____ A still picture has spatial and temporal domain variations</FONT> <P><FONT size=2>    5. ____ When a sequence of image is captured and processed, temporal variance occurs</FONT> <P><FONT size=2>    6. ____ When a single frame is scanned, spatial variations occur</FONT> <P><FONT size=2>    7. ____ Intraframe compression relates to the removal of temporal redundancies</FONT> <P><FONT size=2>    8. ____ Interframe compression relates to the removal of spatial redundancies</FONT> <P><FONT size=2>    9. ____ The spatial compression in the MPEG is similar to the JPEG standard</FONT> <P><FONT size=2>    10. ____ The M-JPEG uses the only spatial compression</FONT> <P><FONT size=2>    11. ____ The M-JPEG uses the common elements between consecutive frames</FONT> <P><FONT size=2>    12. ____ The M-JPEG has the high compression ratio</FONT> <P><FONT size=2>    13. ____ The MPEG compression not only removes spatial redundancies but also removes temporal redundancies</FONT> <P><FONT size=2>    14. ____ Interframe encoding is to save the entire image data</FONT> <P><FONT size=2>    15. ____ A reference frame used for coding and decoding the other frames</FONT> <P><FONT size=2>    16. ____ Interframe coding has two techniques of forward and bi-directional predictions</FONT> <P><FONT size=2>    <B>7-7. Multiple choices</B></FONT> <P><FONT size=2>    1. With Adobe Photoshop we can ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. retouch photo                  c. paint color picture</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>edit image                     d. design picture</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Adobe Photoshop is suitable for ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a child                        c. a photographer</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a graphics producer            d. a graphic designer</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. Adobe Photoshop6.0 can be used to ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. edit vector shapes</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>create text</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>incorporate resolution-dependent graphics and type into pixel-based images</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>achieve a paralleled range of design effects</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. We can use the following tools to create vector-based shapes: ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. polygon                        c. ellipse</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>line                           d. rounded rectangle</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. New formatting controls within Photoshop6.0 can help you ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. corporate with video           c. produce the new type-warping</FONT> <P><FONT size=2>b. twist type                     d. produce best-looking text</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. Advanced PDF output options include ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. saving transparency             c. saving vector objects</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>saving layer style              d. slice tool</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. An intuitive layer effects interface is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a forced item</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a selection of effect options</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>a new support for saving your layer effect design</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>used for defining the effects in a layer style</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. Using the new slice tool and slice select tool, you can ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. slice Web graphics               c. generate an HTML table</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>create user-defined slices       d. modify many attributes of Photoshop slices</FONT> </P></BLOCKQUOTE>
 楼主| 发表于 2004-5-8 16:55:52 | 显示全部楼层
<b><FONT size=2>8-1. Multiple choices</FONT></b> <><FONT size=2>    1. The end equipment in a communication system includes ____</FONT> <BLOCKQUOTE><><FONT size=2>a. computers                             c. CRTs</FONT> <><FONT size=2>b.</FONT> <FONT size=2>printers                              d. keyboards</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. The equipment ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. manipulates digital information internally in serial form</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>manipulates digital information internally in word units</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>transfers the number of bits in parallel</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>transfers the number of bits in serial form</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. Data terminal equipment(DTE) is used to ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. perform parallel-to-serial conversion for transmission</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>perform parallel-to-serial conversion for reception</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>perform serial-to-parallel conversion for transmission</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>perform serial-to-parallel conversion for reception</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. Front-end processor(FEP) is a ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. line control unit without associated software</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>station controller</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>LCU with associated software</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>Telco</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. DCE is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. abbreviation of Data communication equipment</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>abbreviation of Data circuit-terminating equipment</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>used to accept the serial data stream from DTE</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>used to accept the analog signal</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. Modem is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a modulator                         c. a modulator/demodulator</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a demodulator                       d. a data set</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. The modem can be considered ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a form of digital-to-analog converter at the receive end</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a form of digital-to-analog converter at the transmit end</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>a form of analog-to-digital converter at the receive end</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>a form of analog-to-digital converter at the transmit end</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. The most common mode of modulation by modems is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. ASK c. FSK</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>PSK d. QAM</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. To transmit digital data we can use ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. Digital T-carrier                      c. microwave</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>satellite                              d. telephone line without modems</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10. RS-232 standard ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. is an interface standard between the DTE and computer</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>uses a 25-pin cable</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>uses specified signal levels</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>will be replaced by an updated standard</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>8-2. Match the following terms to the appropriate definition</B></FONT> <P><FONT size=2>    1. The purpose of computer network is ____</FONT> <P><FONT size=2>    2. Network architecture is called as ____</FONT> <P><FONT size=2>    3. There are two important network architectures ____</FONT> <P><FONT size=2>    4. OSI reference model is proposed by ____</FONT> <P><FONT size=2>    5. OSI deals with connecting</FONT> <P><FONT size=2>    6. TCP/IP reference model has two parts ____</FONT> <P><FONT size=2>    7. Two end-to-end protocols in the transport layer are ____</FONT> <P><FONT size=2>    8. UDP is a ____</FONT> <P><FONT size=2>    9. TCP is ____</FONT> <P><FONT size=2>    10. The job of the network layer is to deliver ____</FONT> <P><FONT size=2>    11. On top of the transport layer is the ____</FONT> <P><FONT size=2>    12. The application layer contains all the higher-level protocols, such as ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. connectionless protocol</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>open system</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>application layer</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>FTP, SMTP and so on</FONT> <P><FONT size=2>e.</FONT> <FONT size=2>Data communication and resource sharing</FONT> <P><FONT size=2>f. Connection-oriented protocol</FONT> <P><FONT size=2>g. The OSI reference model and the TCP/IP reference model</FONT> <P><FONT size=2>h. TCP and IP</FONT> <P><FONT size=2>i. a set of layers and protocols</FONT> <P><FONT size=2>j. TCP and UDP</FONT> <P><FONT size=2>k. IP packets</FONT> <P><FONT size=2>l. ISO</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>8-3. True or false</B></FONT> <P><FONT size=2>    1. ____ A wide area network (WAN) spans a small geographical area</FONT> <P><FONT size=2>    2. ____ We usually call the computers in a WAN hosts or end systems</FONT> <P><FONT size=2>    3. ____ The job of the communication subnet is to carry messages from host to host</FONT> <P><FONT size=2>    4. ____ Separating the subnet from the hosts simplifies the design of network</FONT> <P><FONT size=2>    5. ____ Telephone network is a packet switching network</FONT> <P><FONT size=2>    6. ____ The network complied with X.25 standard is a circuit switched network</FONT> <P><FONT size=2>    7. ____ We can use the public switched telephone network to transmit voice and data</FONT> <P><FONT size=2>    8. ____ Using the dedicated network, we need a inter-switch</FONT> <P><FONT size=2>    9. ____ Advantage of private network is its short response time</FONT> <P><FONT size=2>    10. ____ Structuring a packet network, we should use a equipment that assembles and disassembles packets</FONT> <P><FONT size=2>    <B>8-4. Multiple choices</B></FONT> <P><FONT size=2>    1. Local Area Network(LAN) is structured within</FONT> <BLOCKQUOTE><P><FONT size=2>a. a single building                          c. a country</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a localized group of buildings             d. a campus</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. Comparing with WAN, LAN can provide ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. lower data transmission rates              c. the same transmission rates</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>higher data transmission rates             d. very high transmission rates</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. There are several topologies in LAN, they are ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. star                                       c. ring</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>bus                                        d. mesh</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. Hub topology is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a ring                                     c. the most widespread topology for LANs</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a variation of the bus                     d. called hub/tree topology sometimes</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5.The transmission media used to build a LAN may be ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. twisted pair                               c. coaxial cable</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>microwave                                  d. optical fiber</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6.Technique of control token can be used to the ____ networks</FONT> <BLOCKQUOTE><P><FONT size=2>a. bus                                        c. ring</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>hub                                        d. tree</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. A collision should be happened, when ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. a station is listening while other stations are waiting</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a station is sending while another is receiving</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>no stations attempt to access the network</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>two stations try to send a message at exactly the same time</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. A station in control token network wants to access the network, it may ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. possess the token</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>release the token</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>pass the token to another station after transmitting a data frame</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>take the token</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. The bodies to make network standards include ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. ISO                                         c. IEEE</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>EIA                                         d. NBS</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10 Methods of medium access control can be ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. DQDB                                        c. token</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>CSMA/CD                                     d. others</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>8-5. Fill in the blanks with appropriate words or phrases</B></FONT> <P><FONT size=2>    1. Windows NT supports variety of networking media, such as ____</FONT> <P><FONT size=2>    2 A Windows NT workstation can access remotely Windows NT server by ____</FONT> <P><FONT size=2>    3. NDIS is used to access ____ by the upper layers</FONT> <P><FONT size=2>    4. Windows NT supports most industry standard protocols, such as ____</FONT> <P><FONT size=2>    5. Windows NT has built-in drives, they are ____</FONT> <P><FONT size=2>    6. We can access the network resources in Windows NT environments by a set of ____</FONT> <P><FONT size=2>    7. To tight control over user access, we might use ____</FONT> <P><FONT size=2>    8. A ____ i ____ validates each user's logon and access rights to all resources in the domain</FONT> <P><FONT size=2>    9. In some network systems an user has an ____ for each server</FONT> <P><FONT size=2>    10. There are four security features: ____</FONT> <BLOCKQUOTE><P><FONT size=2>a. domain</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>the redirector and the file server</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>secure logon, discretionary access control, auditing, and memory protection</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>Ethernet, Token, and FDDI</FONT> <P><FONT size=2>e.</FONT> <FONT size=2>APIs</FONT> <P><FONT size=2>f. MAC drivers</FONT> <P><FONT size=2>g. Account</FONT> <P><FONT size=2>h. RAS</FONT> <P><FONT size=2>i. domain controller</FONT> <P><FONT size=2>j. NetBEUI, TCP/IP, AppleTalk and so on</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>8-6. True or false</B></FONT> <P><FONT size=2>    1. ____ ISDN provides universal end-to-end connectivity over digital lines</FONT> <P><FONT size=2>    2. ____ We can send data, voice, image and fax via ISDN</FONT> <P><FONT size=2>    3. ____ ISDN system for home user includes three parts</FONT> <P><FONT size=2>    4. ____ From the customer's point of view, the ISDN network boundary is the T point</FONT> <P><FONT size=2>    5. ____ The main device in the ISDN carrier's office is the ISDN exchange</FONT> <P><FONT size=2>    6. ____ There are three types of services in the ISDN</FONT> <P><FONT size=2>    7. ____ Bearer services provide the means to change or process the contents of the data</FONT> <P><FONT size=2>    8. ____ bearer services can be supported by circuit-switched, packet-switched, frame-relay, or cell-relay networks</FONT> <P><FONT size=2>    9. ____ Teleservices rely on the facilities of the bearer services</FONT> <P><FONT size=2>    10. ____ Teleservices provide the means to transfer information</FONT> <P><FONT size=2>    11. ____ Reverse charging, call-waiting and message handling are the supplementary services</FONT> <P><FONT size=2>    12. ____ ISDN provides three services to users</FONT> </P>
 楼主| 发表于 2004-5-8 16:56:20 | 显示全部楼层
<b><FONT size=2>9-1. Multiple choices</FONT></b> <><FONT size=2>    1. An internet is ____</FONT> <BLOCKQUOTE><><FONT size=2>a.</FONT> <FONT size=2>an internetwork</FONT> <><FONT size=2>b.</FONT> <FONT size=2>a computer network in which many kinds of computers can be connected.</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>not same as the Internet</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>same as the Internet</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. The Internet is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>as a common internet                    c. constrained by a set of IP suite</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>a specific kind of internet             d. defined as the network of networks</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. A variety of computers can be connected to the Internet, they are ____</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>minicomputers                           c. supercomputers</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>microcomputers                          d. sophisticated mainframes</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. We can ____ through the Internet</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>get free software                       c. take long distance collaborations</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>send e-mail                             d. retrieve files</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. Applications in the Internet can be found everywhere: ____</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>in libraries                            c. at home</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>in conference rooms                     d. at the moon</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. With the Internet we can create a truly global village, this is ____</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>people don't live in the same place     c. people distribute throughout the world</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>people live in the same place           d. people share the same interests</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>9-2. Fill in the blanks with appropriate words or phrases.</B></FONT> <P><FONT size=2>    1. The World Wide Web uses ____.</FONT> <P><FONT size=2>    2. Each client computer in the WWW uses ____.</FONT> <P><FONT size=2>    3. Each server in the WWW needs ____.</FONT> <P><FONT size=2>    4. The abbreviation of the Internet Uniform Resource Locator is ____.</FONT> <P><FONT size=2>    5. The URL specifies the ____ of the Web server, the directory and name of the specific page wanted.</FONT> <P><FONT size=2>    6. The Web browser and Web server must use the same standard ____ in order to perform the Web functions.</FONT> <P><FONT size=2>    7. When a Web browser accesses a Web server, an HTTP ____ is required.</FONT> <P><FONT size=2>    8. When a Web server answers the request of a Web browser an HTTP ____ is required.</FONT> <P><FONT size=2>    9. HTML stands for ____.</FONT> <P><FONT size=2>    10. A Web browser introduced by Microsoft is ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>an application layer software package called a Web server</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>request</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>Internet Explorer</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>the client/server mode</FONT> <P><FONT size=2>e. protocol</FONT> <P><FONT size=2>f. an application layer software package called a Web browser</FONT> <P><FONT size=2>g. Hyper Text Markup Language</FONT> <P><FONT size=2>h. Internet address</FONT> <P><FONT size=2>i. response</FONT> <P><FONT size=2>j. URL</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>9-3. True or false</B></FONT> <P><FONT size=2>    1. ____ E-mail is one of the latest applications on the Internet.</FONT> <P><FONT size=2>    2. ____ With e-mail we can send messages to all users on a distribution list.</FONT> <P><FONT size=2>    3. ____ Most of e-mail software enable users to send text messages with attach files.</FONT> <P><FONT size=2>    4. ____ In the e-mail a user needs a message transfer agent.</FONT> <P><FONT size=2>    5. ____ The message itself sent by user is called the body.</FONT> <P><FONT size=2>    6. ____ User reads his or her e-mail message with the user agent.</FONT> <P><FONT size=2>    7. ____ Every user in the e-mail system has a mailbox on the client computer.</FONT> <P><FONT size=2>    8. ____ SMTP can be used to transfer non-text files.</FONT> <P><FONT size=2>    9. ____ When you send an e-mail you should provide the sender's e-mail address.</FONT> <P><FONT size=2>    10. ____ The SMTP standard defines how user agents operate.</FONT> <P><FONT size=2>    11. ____ The POP defines how messages to and from mail transfer agents are formatted.</FONT> <P><FONT size=2>    12. ____ Many organizations provide e-mail directories on their Web sites.</FONT> <P><FONT size=2>    <B>9-4. Fill in the blanks with appropriate words or phrases.</B></FONT> <P><FONT size=2>    1. FTP requires an application layer software on ____.</FONT> <P><FONT size=2>    2. FTP requires a ____ application software on a server.</FONT> <P><FONT size=2>    3. There are two types of FTP sites: ____.</FONT> <P><FONT size=2>    4. To access a closed FTP site, a user must have ____.</FONT> <P><FONT size=2>    5. Accessing a FTP site, we should provide an ____.</FONT> <P><FONT size=2>    6. We can login to an anonymous FTP site using the account name of ____.</FONT> <P><FONT size=2>    7. Telnet enables users on one computer to log into ____ on the Internet.</FONT> <P><FONT size=2>    8. Before you login to the server, you must ____ from the client to the server.</FONT> <P><FONT size=2>    9. To access a host computer you must know the account name and password of ____.</FONT> <P><FONT size=2>    10. To guarantee the security of a Telnet site, we can permit remote logins only from ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>FTP server                                  b. make the connection</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>a specific set of Internet addresses        d. anonymous</FONT> <P><FONT size=2>e. another computer                            f. the client computer</FONT> <P><FONT size=2>g. account name with a secret password         h. an authorized user</FONT> <P><FONT size=2>i. permission                                  j. closed and anonymous</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>9-5. Multiple choices</B></FONT> <P><FONT size=2>    1. To grasp the readers your Web page should be ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>simple                                 c. text-based</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>interesting                            d. clear</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. The three "C"s used to design the good Web pages are ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>control                                c. clarity</FONT> <P><FONT size=2>b. color                                  d. content</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. To make your page clear you should ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>put not too much text                  c. use the links if you have a lot of text</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>put too much text                      d. use the hyperlinks</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. A very large picture could be ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>time-consuming to transfer</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>annoying to wait for loading</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>a problem to the users with slow-speed access to the Internet</FONT> <P><FONT size=2>d.</FONT> <FONT size=2>time-saving to load</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. You can control ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>the Window background color              c. the color of your graphic images</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>the colors of links                      d. the color of the icons</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. It is useful for designing your home page ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a.</FONT> <FONT size=2>to put much text                         c. to use HTML's built-in separators</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>to use blank space liberally             d. to put a logo on the top of the page</FONT> </P></BLOCKQUOTE>
 楼主| 发表于 2004-5-8 16:57:07 | 显示全部楼层
<b><FONT size=2>10-1. Multiple choices</FONT></b> <><FONT size=2>    1. The major assets of computer system are ____.</FONT> <BLOCKQUOTE><><FONT size=2>a. hardware                                    c. vulnerability</FONT> <><FONT size=2>b.</FONT> <FONT size=2>software                                    d. data</FONT> </P></BLOCKQUOTE><P><FONT size=2>    2. The threats ____ to the security of a computing system are:</FONT> <BLOCKQUOTE><P><FONT size=2>a. interruption                                c. modification</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>interception                                d. fabrication</FONT> </P></BLOCKQUOTE><P><FONT size=2>    3. The cases to interrupt the computer system are such as ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. intercepting data files                     c. erasing the programs</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>destructing hardware devices                d. interrupting a program being executed</FONT> </P></BLOCKQUOTE><P><FONT size=2>    4. The following actions are belong to the interceptions ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. illicit copying of program                  c. modifying data</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>illegal copying of data                     d. wiretapping to obtain data</FONT> </P></BLOCKQUOTE><P><FONT size=2>    5. The modifications include ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. modifying the values in a data base         c. modifying the hardware</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>altering a program                          d. erasing data file</FONT> </P></BLOCKQUOTE><P><FONT size=2>    6. The fabrications can include ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. a subtle change of a program                c. adding records to an existing data base</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>adding spurious transaction to a network    d. fabricating counterfeit objects</FONT> </P></BLOCKQUOTE><P><FONT size=2>    7. The goal of computer security in to preserve ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. secrecy                                     c. integrity</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>high speed                                  d. availability</FONT> </P></BLOCKQUOTE><P><FONT size=2>    8. Host security means ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. fault of a host                             c. loss the data stored in the host</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>fault of a server in a network              d. paralysis of system</FONT> </P></BLOCKQUOTE><P><FONT size=2>    9. The items included in the identification are ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. password                                    c. digital signature</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>encryption                                  d. finger-print scanning</FONT> </P></BLOCKQUOTE><P><FONT size=2>    10. In an encrypting system the data ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. will be coded                               c. cannot be read</FONT> <P><FONT size=2>b.</FONT> <FONT size=2>is unintelligible                           d. cannot be changed</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>10-2. Fill in the blanks with appropriate terms or phrases.</B></FONT> <P><FONT size=2>    1. The purpose of a network firewall is to protect the systems connected to the network from ____.</FONT> <P><FONT size=2>    2. An intruder may break into a host on the network, this action is called ____.</FONT> <P><FONT size=2>    3. An attempt to fill available disk space or load the network links can cause ____.</FONT> <P><FONT size=2>    4. A firewall can ____ out inherently insecure network services.</FONT> <P><FONT size=2>    5. A firewall gateway is used to separate the internal network from ____.</FONT> <P><FONT size=2>    6. There are three basic techniques used for firewall ____.</FONT> <P><FONT size=2>    7. A system that identified by the firewall administrator as a critical strong point in the network security is ____.</FONT> <P><FONT size=2>    8. A firewall implemented by a screening router and bastion host is called ____.</FONT> <P><FONT size=2>    9. A system that places on both the private network and the Internet and blocks TCP/IP forwarding is ____.</FONT> <P><FONT size=2>    10. An isolated subnet that is situated between the Internet and the private network is ____.</FONT> <BLOCKQUOTE><P><FONT size=2>a. filtering                                                     b. dual-homed gateway</FONT> <P><FONT size=2>c.</FONT> <FONT size=2>packet filtering, circuit gateway and application gateway     d. various threats</FONT> <P><FONT size=2>e.</FONT> <FONT size=2>bastion host                                                  f. unauthorized access</FONT> <P><FONT size=2>g. screened subnet                                               h. external networks</FONT> <P><FONT size=2>i. screened-host gateway                                         j. denial of service</FONT> </P></BLOCKQUOTE><P><FONT size=2>    <B>10-3. True or false</B></FONT> <P><FONT size=2>    1. ____ Viruses can cause programs crashing or entire hard disk deleting.</FONT> <P><FONT size=2>    2. ____ Some one died as the result of a computer virus.</FONT> <P><FONT size=2>    3. ____ Only a few virus scanners can eradicate most known viruses.</FONT> <P><FONT size=2>    4. ____ Before performing any actions you'd better treat all files and programs with virus check software.</FONT> <P><FONT size=2>    5. ____ CIH virus works under Windows NT system.</FONT> <P><FONT size=2>    6. ____ CIHI.2 activates on the 26th of April</FONT> <P><FONT size=2>    7. ____ An infected computer may lose its data</FONT> <P><FONT size=2>    8. ____ When the BIOS works right you can't get "boot error" message</FONT> <P><FONT size=2>    9. ____ For a quick and easy check on if you're infected by CIH, use free F-CIH tool</FONT> <P><FONT size=2>    10. ____ In reality the viruses and their destructive capabilities have been grossly exaggerated by people</FONT> </P>
您需要登录后才可以回帖 登录 | 注-册-帐-号

本版积分规则

小黑屋|手机版|Archiver|数学建模网 ( 湘ICP备11011602号 )

GMT+8, 2024-4-19 23:07 , Processed in 0.068990 second(s), 18 queries .

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表