收藏 分销(赏)

computer-concepts-课后填空.docx

上传人:仙人****88 文档编号:12026139 上传时间:2025-08-29 格式:DOCX 页数:6 大小:24.21KB 下载积分:10 金币
下载 相关 举报
computer-concepts-课后填空.docx_第1页
第1页 / 共6页
computer-concepts-课后填空.docx_第2页
第2页 / 共6页


点击查看更多>>
资源描述
1. Computer ownership increased at a gradual pace from the late 1970s until the mid-1990s, and then it suddenly accelerated after the opened for commercial use. 2. Online social , such as MySpace and Frendster , added a virtual dimension to the way people interact. 3. is a term that refers to objects and entities that exist largely within computer network. 4. is the process of converting text, number, sound, animation, photos, and video into data that can be processed by digital devices. 5. is a process by which several technologies with distinct functionalities evolve to form a single product. 1. A computer accepts input, processes data, stores data, and produces accotding to a series of instructions. 2. The term microprocessor is a synonym for the term microcomputer. True or false? 3. The program concept enables computers to be multipurpose devices. 4. A(n) specializes in compute-intensive problems. 5. A(n) is a special-purpose microprocessor that is built into the machine it controls 1. Most computers are devices that work with discrete numbers, such as 1s and 0s. 2. The number system represents numeric data as a series of 0s and 1s. 3. A computer uses codes to represent the numerals in your Social Security number and street address. Whereas it uses numbers for numeric data such as your age. 4. A(n) is approximately one billion bytes. 5. A(n) circuit contains microscopic elements, such as wires, transistors, and capacitors, that ate packed onto a very small square of semiconducting material. 1. The human-readable version of a program, created in a high-level language by a programmer is called code. 2. A compiler converts all the statements in a program in a single batch, and the sesulting collection of instructions is called code. 3. In a machine code instruction such as 00000100 00000001 the left-most number is the op code and the remaining numbers are . 4. The ALU in your computer’s microprocessor performs and logical operations. 5. The microprocessor’s unit fetches each instruction. 1. A(n) protocol is any method that confirms a person’s identitu using something the person knows, something the person possesses, or something the person is. 2. Two-factor authentication methods. Which verify identity using two elements of confirmation such as an ATM card and PIN , are typically more secure than single0factor authentication. 3. A(n) is software that secretly records a user’s keystrokes and sends the information to a hacker. 4. Tiered passwords have the advantage of reducing the number of passwords you have to remember, however, their disadvantage is that a hacker who discovers one of your passwords will be able to use it to access many of your accounts. True or false? 5. A(n) manager is utility software that generates secure passwords and stores them along with user ISs and their corresponding sites. 1. Popular devices include printers, digital cameras. Scanners, joysticks, and speakers. 2. The first popular personal computers were models, and this style remains popular for offices, schools, and homes. 3. Portable computers are classified as notebooks, , and ultra-mobiles. 4. Key components of a(n) PC include a remote control device, TV tuner , and Viiv technology/ 5. To assess whether two computers are , you have to consider if they run the same software and use the same peripheral devices. 1. A microprocessor’s speed is provided in a specification such as 3.6GHz. 2. Some chipmakers use a number, such as 560. To differentiate microprocessors. 3. A front side is circuitry that transport data to and from the processor at speeds ranging from 200MHz to 1250MHz. 4. A dual processor allows a computer to execute multiple instructions at the same time to achieve parallel processing. 5. RAM is , which means that it cannot hold data when the computer power is off. 6. A computer does not usually run out of RAM because it can use an area of the hard disk called memory. 7. The instructions for loading the operating system into RAM when a computer is first turned on are stored in .Hint: Use the abbreviation. 1. time is the average time it takes a computer to locate data on a storage medium and read it. 2. A disk drive is a(n) access device, whereas a tape drive is a(n) access device. 3. Higher disk provides increased storage capacity. 4. A magnetic storage device uses a read-write to magnetize particles that represent data. 5. Hard disks are susceptible to head , so it is important to make backup copies. 6. Data on an optical storage medium, such as a DVD, is stored as pits and 7. CD-RW technology allows you to write data on a disk, and then change that data. True or false? 8. A USB flash drive uses solid technology to store data and programs. 1. Computer devices include mice, trackpads, trackballs, and joysticks. 2. In the context of computer displays , rate refers to the speed at which the screen image is repainted. 3. The number of dots that form an image on a monitor or printer is referred to as . 4. A printer with printing capability can print on both sides of the paper. 5. AGP, PCI, and ISA are types of expansion . 6. A(n) port provides one of the fastest, simplest ways to connect peripherals. 1. The Kensington Security is an industry standard security mechanism that’s factory-installed on many personal computers. 2. A power is a sudden increase or spike in electrical energy. Affecting the current that flows to electrical outlets. 3. Most UPSs have two types of sockets: one type offers backup plus surge protection, and the other offers only surge protection. 4. Many seasoned users have encountered the blue screen of that suddenly replaces the usual graphical screen display with an enigmatic error message written in white text against a bright blue background. 5. Mode is a stripped down version of Windows, designed for troubleshooting. 1. The two main software categories are software and application software. 2. Software can be defined as any type of application software that has the potential to help people do their work more efficiently. 3. A type of application software that is called is designed to help several people collaborate on a single project using local networks or internet connections. 4. A type of system software referred to as software is designed to help you monitor and configure settings for your computer system equipment, the operating system, or application software. 5. A device is software usually run in the background without opening a window and is designed to help a peripheral device establish communication with a computer. 1. various kinds of production software provide tools for creating and formatting printed and Web-based materials . 2. a spelling checker will find an error in “The sailor tied a complex not.” True or false? 3. software provides a sort of blank canvas on which you can create numeric models by simply painting values, labels, and formulas. 4. software stores data as a series of records and allows you to establish series of records and allows you to establish relationships between different types of records. 5. CD software transfers files from an audio CD to your computer’s hard disk. 6. Authoring software allows you to add Hollywood-style menus to digital videos. 1. One advantage of a software is that each application tends to have a similar user interface and it is usually easy to transport data from one application to another. 2. System specify the operating system and minimum hardware capacities required for software to work correctly. 3. If the opening screen of a software application contains no copyright notice, it is not protected by copyright law. True or false? 4. Domain software is not copyrighted, making it available for use without restriction, except that you cannot apply for a copyright on it. 5. A -use license is priced per copy and allows a specific number of copies to be used ai the same time. 6. Source software is distributed with its source code so that it can be legally modified and redistributed. 1. At least one of the files included in a software package is an file designed to be started by users. 2. A application is software that is designed to reside on a computer’s hard disk. 3. Usually all the files for downloaded software are zipped to consolidate them into one large file. True or false? 4. software is designed to run from removable storage, such as a CD or USB flash drive. 5. A software is a small section of program code that replaces part of the software you currently have installed. 1. The term threat describes malware that combines more than one type of malicious program. 2. A key characteristic of is their ability to lurk in a computer for days or months, quietly replicating themselves. 3. Unlike a , a Trojan is not designed to spread itself to other computers. 4. The term refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer. 5. When antivirus software finds a virus signature, it typically the file by encrypting it and moving it to an isolated folder. 1. An operating system manages a computer’s , such as RAM, storage, and peripherals. 2. To run more than one program at a time, the operating system must allocate a specific area of for each program. 3. The core part of an operating system is called its . 4. A(n) program stored in ROM tells the hard disk to load the operating system into RAM. 5. A user encompasses the hardware and software that helps people and computers communicate with each other. 1. The Windows operating system was designed to run on Motorola and IBM processors. True or false? 2. A(n) -compatible operating system should run application software designed for the operating system’s prior generations. 3. A(n) boot computer could boot into Windows, and then reboot into Mac OS. 4. A computer configured with the correct set of machines could run Windows in a window on the Mac desktop. 5. A resource is a companion file created by Mac OS to store information about the file and its data. 6. is an open source operating system that can run on the desktop, but tends to used for server applications instead. 7. Windows Mobile, Palm, and Symbian are examples of operating systems used for handheld devices. True or false? 1. Windows file-naming are different than for Linux 2. When using windows, you cannot use a reserved word, such as Aux, as a file name. True or false? 3. On a computer running windows, the hard disk letter is usually designated as . 4. The root directory of a disk can be divided into smaller lists called ,that are depicted as folders. 5. A file’s location is defined by a file path, which includes the drive letter, one or more , file name, and extension. 6. A file’s can be important information when you are planning to transmit it to another computer over a network. 7. A file is a section of data at the beginning of a file that contains information about the file type. 8. The file format for Microsoft Word is DOC. 1. The option on an application’s File menu allows you to save the latest version of a file under its current name and at its current location. 2. A storage , such as a filing cabinet or tree, helps you visualize and mentally organize your computer files. 3. Windows is utility software provided by the operating system and designed to help you organize and manipulate files. 4. A hard disk stores data in concentric , which are divided into wedge-shaped . 5. File software overwrites deleted files with random 1s and 0s. 1. When backing up selected files, rather than making a full backup, you should make a copy of the Windows and keep it updated every time you install new hardware or software. 2. The backup process is simplified if you store all your important data files in a single . 3. One of the best devices for home backup is a(n) hard disk drive. 4. A(n) backup copies only those files that have changed since your last backup session. 5. A(n) CD helps restore a computer system by loading hardware drivers and user settings as well as the operating system.
展开阅读全文

开通  VIP会员、SVIP会员  优惠大
下载10份以上建议开通VIP会员
下载20份以上建议开通SVIP会员


开通VIP      成为共赢上传

当前位置:首页 > 包罗万象 > 大杂烩

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2026 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服