2024年1月19日发(作者:)

人卫英语线上考试题

一、单项选择题(15道小题,共15分)

1.A ()is used to comunicate with another computer over

telephone lines. (1分)

A. keyboard

C. mouse

D. printer

2、( )that ,1 could do it much better. (1分)

I do

I were do

C. Were I to do .

I do

3. how to translate the word “中央处理器”(1分)

A. central processing unit

B. central progress unit

C. central process unit

D. ^A

4、A ( ) is a device that enables the computer to handle

sounds. (1 分)

k

B. video card

C. sound card

D. monitor

5. Anti-Virus protects your computer from viruses by ()

your computer s memory and disk devices. (1 分)

A. deleting

B. changing .

C. scanning

D. replacing

6. In the system development process, modularity is a very

well-established principle used in the ( ) phase. (1分)

A. design

B. analysis

C. ipleaentatioe

D. testing

7. what does ”neural network" mean? (1分)

A.精神网

B.自然网络

C. 神经网络

D.社会网络

8、The attributes of the stack are ( ). (1 分)

A. FIFO

B. LIFO

C. queue

D. built into their cireuitry

9. Whereas a repeater operates only in the physitcal layer

of the 05I nodel, a bridge operates in both the physical layer

and the ( ) layer of the 051 model. (1 分)

A. Transport Layer

B. Network Layer

C. data-link

D. Physical Layer

10, The distinetion betveen the two terms gateway and ( )

is disappearing. They are now used interchangeably. (1 分)

A. hu^B

B. router :

C. satich

D. gatevay

11. Chemical energy. ( ) from fuel or other natters, can

be transformed into heat energy. (1 分)

A. no matter hov

B. whether

C. if or not

D. not considered that

12. Windowrs gives you more control over the ( ) you work.

(1 分)

A. operation

B. way

C. energy

D. power

13、These days it is not uncomon for one to s0e people using

( ) everywhere even on airplanes. (1分)

B. desktops

C. minicomputers

D. microcomputers

14. The abbreviation USB stands for Universal ( ) Bus. (1

分)

A. Serial

tial

C. Symetric

D. Syntactic

15、It looks as though there ( ) some problems with my

computer. Because it is so slov, (1 分)

A. was

B. were

c. has been

D. had been

二、多项选择题(15道小题, 共45分)

1、High-level languages are comoly classified as ( )。 (3

分)

A. procedure-oriented

B. funct ional

C. logie languages

D. object-oriented

E. utomte

2、Active Diroctory supports (). (3分)

A. delegat ion of administrative task

B. granular access control

C

C. encopsulation

D. inheritance

3. You want to ( ) maybe wake甲a virus that has residented

in memory. (3 分)

A. copy a file

B. access a diskette

C. execute a progran

D. delete a file

4、Active Directory can help you ( ). (3 分)

A. deliver complete enterprise scurity by itself

B. build a coplex international netork

C. manage every resource with a single logon

D. get off the limits of dovn level networks

5. Viruses can delay their attack for ( ). (3分)

A. days

B. weeks

D. years

6. GIS mork with two fundumentally different types of

geographic models. They are the (). (3分)

A. Vector model

B. geography model

C. data model

atic model

E. raster model

7. The equipment ( ). (3 分)

A. sunipulates digital informatiomn interally in serial r

B. mnipulates digital infornation internally in word

unlorm

C. transfers the mumber of bits in parallel

D. transfers the mumber of bits in serial for

8、Windors 2000 has the key technologies, they are ( ). (3

分)

A. flat directory

B. security .

C. active directory .

D. enterprise management

9. According to the text, the author mentions three of the

most comonly used types of printer. They are ( ). (3 分)

printer

B. dot . matris printers;

C. array printer

D. inkjet printers

E. belt printer

10、The Application layer in TCP/IP Model is correspond to

() in0SI Model (3分)

A. Application Layer

B. Presentation Layer

n Layer

D. Transport Layer

E. Network Layer

11. Information Systems has a number of different areas of

work: (3 分)

1. Infornation Systens Strategy

B. Information Systens Management

c. Informat ion Systems Development

D. Infornation Systems Implement

2.()provides transparent trunsfer of data between end

users, providing reliable data trunsfer services to the upper

layers. (3 分)

A. The Transport Layer

B. Session Layer

C. Presentot ion Layer

D. Application Layer

第4页/共6页

E. Network Layer

13. shich is the threat to computer security in the

folloring choices ? (3分)

A. Coputer Crininals

B. Computer Crime

uake

D. Hhuman Errors

14. A stack protocol can be used for ( )。 (3分)

A. subroutine calls

B. operation of arithmetie expressions

C. removing the latest element inserted

D. reoving the earliest element ins erted

15、Queues that oceur everyday life can be scen ( ). (3 分)

A. in an emergoney room of a hospital

B. in certain societies lacking equality

C. as people waiting for service at a bank

D. as automobiles waiting for a traffie light

三论述题(2道小题,共40分)

1.写一篇短文介绍计算机语言的发展历史和特点。要求简单介绍机器语言、汇编语言、高级语言的简单发展历程和各自的特点

2.请谈谈你对现在互联网应用的一些认识