2024年1月19日发(作者:)
人卫英语线上考试题
一、单项选择题(15道小题,共15分)
1.A ()is used to comunicate with another computer over
telephone lines. (1分)
A. keyboard
C. mouse
D. printer
2、( )that ,1 could do it much better. (1分)
I do
I were do
C. Were I to do .
I do
3. how to translate the word “中央处理器”(1分)
A. central processing unit
B. central progress unit
C. central process unit
D. ^A
4、A ( ) is a device that enables the computer to handle
sounds. (1 分)
k
B. video card
C. sound card
D. monitor
5. Anti-Virus protects your computer from viruses by ()
your computer s memory and disk devices. (1 分)
A. deleting
B. changing .
C. scanning
D. replacing
6. In the system development process, modularity is a very
well-established principle used in the ( ) phase. (1分)
A. design
B. analysis
C. ipleaentatioe
D. testing
7. what does ”neural network" mean? (1分)
A.精神网
B.自然网络
C. 神经网络
D.社会网络
8、The attributes of the stack are ( ). (1 分)
A. FIFO
B. LIFO
C. queue
D. built into their cireuitry
9. Whereas a repeater operates only in the physitcal layer
of the 05I nodel, a bridge operates in both the physical layer
and the ( ) layer of the 051 model. (1 分)
A. Transport Layer
B. Network Layer
C. data-link
D. Physical Layer
10, The distinetion betveen the two terms gateway and ( )
is disappearing. They are now used interchangeably. (1 分)
A. hu^B
B. router :
C. satich
D. gatevay
11. Chemical energy. ( ) from fuel or other natters, can
be transformed into heat energy. (1 分)
A. no matter hov
B. whether
C. if or not
D. not considered that
12. Windowrs gives you more control over the ( ) you work.
(1 分)
A. operation
B. way
C. energy
D. power
13、These days it is not uncomon for one to s0e people using
( ) everywhere even on airplanes. (1分)
B. desktops
C. minicomputers
D. microcomputers
14. The abbreviation USB stands for Universal ( ) Bus. (1
分)
A. Serial
tial
C. Symetric
D. Syntactic
15、It looks as though there ( ) some problems with my
computer. Because it is so slov, (1 分)
A. was
B. were
c. has been
D. had been
二、多项选择题(15道小题, 共45分)
1、High-level languages are comoly classified as ( )。 (3
分)
A. procedure-oriented
B. funct ional
C. logie languages
D. object-oriented
E. utomte
2、Active Diroctory supports (). (3分)
A. delegat ion of administrative task
B. granular access control
C
C. encopsulation
D. inheritance
3. You want to ( ) maybe wake甲a virus that has residented
in memory. (3 分)
A. copy a file
B. access a diskette
C. execute a progran
D. delete a file
4、Active Directory can help you ( ). (3 分)
A. deliver complete enterprise scurity by itself
B. build a coplex international netork
C. manage every resource with a single logon
D. get off the limits of dovn level networks
5. Viruses can delay their attack for ( ). (3分)
A. days
B. weeks
D. years
6. GIS mork with two fundumentally different types of
geographic models. They are the (). (3分)
A. Vector model
B. geography model
C. data model
atic model
E. raster model
7. The equipment ( ). (3 分)
A. sunipulates digital informatiomn interally in serial r
B. mnipulates digital infornation internally in word
unlorm
C. transfers the mumber of bits in parallel
D. transfers the mumber of bits in serial for
8、Windors 2000 has the key technologies, they are ( ). (3
分)
A. flat directory
B. security .
C. active directory .
D. enterprise management
9. According to the text, the author mentions three of the
most comonly used types of printer. They are ( ). (3 分)
printer
B. dot . matris printers;
C. array printer
D. inkjet printers
E. belt printer
10、The Application layer in TCP/IP Model is correspond to
() in0SI Model (3分)
A. Application Layer
B. Presentation Layer
n Layer
D. Transport Layer
E. Network Layer
11. Information Systems has a number of different areas of
work: (3 分)
1. Infornation Systens Strategy
B. Information Systens Management
c. Informat ion Systems Development
D. Infornation Systems Implement
2.()provides transparent trunsfer of data between end
users, providing reliable data trunsfer services to the upper
layers. (3 分)
A. The Transport Layer
B. Session Layer
C. Presentot ion Layer
D. Application Layer
第4页/共6页
E. Network Layer
13. shich is the threat to computer security in the
folloring choices ? (3分)
A. Coputer Crininals
B. Computer Crime
uake
D. Hhuman Errors
14. A stack protocol can be used for ( )。 (3分)
A. subroutine calls
B. operation of arithmetie expressions
C. removing the latest element inserted
D. reoving the earliest element ins erted
15、Queues that oceur everyday life can be scen ( ). (3 分)
A. in an emergoney room of a hospital
B. in certain societies lacking equality
C. as people waiting for service at a bank
D. as automobiles waiting for a traffie light
三论述题(2道小题,共40分)
1.写一篇短文介绍计算机语言的发展历史和特点。要求简单介绍机器语言、汇编语言、高级语言的简单发展历程和各自的特点
2.请谈谈你对现在互联网应用的一些认识


发布评论