ImageVerifierCode 换一换
格式:DOC , 页数:7 ,大小:65.54KB ,
资源ID:3928957      下载积分:6 金币
验证码下载
登录下载
邮箱/手机:
验证码: 获取验证码
温馨提示:
支付成功后,系统会自动生成账号(用户名为邮箱或者手机号,密码是验证码),方便下次登录下载和查询订单;
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/3928957.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  
声明  |  会员权益     获赠5币     写作写作

1、填表:    下载求助     留言反馈    退款申请
2、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
3、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
4、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
5、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前自行私信或留言给上传者【精***】。
6、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
7、本文档遇到问题,请及时私信或留言给本站上传会员【精***】,需本站解决可联系【 微信客服】、【 QQ客服】,若有其他问题请点击或扫码反馈【 服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【 版权申诉】”(推荐),意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:4008-655-100;投诉/维权电话:4009-655-100。

注意事项

本文(计算机专业英语试题及答案.doc)为本站上传会员【精***】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4008-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

计算机专业英语试题及答案.doc

1、计算机专业英语试题。 Vocabulary(词汇)(30分)(一)Translate the following words and expressions into Chinese(写出下列词组的汉语。)(共10分,每题1分)1 operating system2 requirements analysis 3 network security 4 data structure 5 decision support system 6 relational database 7 software crisis 8 computer virus9 email attachment10centra

2、l processing unit ( CPU ) (二)Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。) (共10分,每题1分)1数据库管理系统 2传输控制协议3多文档界面 4面向对象编程 5只读存储器 6数字视频光盘 7计算机辅助设计 8结构化查询语言 9通用串行总线 10企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meanin

3、g in the right column.(将左列的词汇与右列相应的汉语匹配.)(10分,每空1分)1. multimediaa.字处理器2. software life cycleb.交换机3. structured programmingc。多媒体4。 functional testingd。局域网5. word processore.结构化程序设计6。 code windows f.软件生命周期7. firewall g。功能测试8。 LANh.代码窗口9. hackeri。黑客10。 switchj.防火墙1 6. 2 7 3 8. 4 9. 5 10。 ( )。 Comprehen

4、sion(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary。 (从下面方框中选择合适的词或表达,以其适当的形式填空。)(10分, 每空2分)requirements maintain disciplined coding modify Software Engineering, which means the application of engineering to software, is a

5、 method to develop, operate and _ software。 That is, the development of software is on a systematic, _, quantitive basis. Before starting the development of software, you have to systematically approach the problem。 You have to understand the _ (what the software is supposed to do), carry out the de

6、sign, do the _, carry out a rigorous testing and if the software is as per the requirements, release the software to the customer. Subsequently, if the customer wants some changes-refinements or enhancements then the software has to be _.Passage AThe central processing unit (CPU) is the heart of the

7、 computer systems。 Among other things, its configuration determines whether a computer is fast or slow in relation to other computers。 The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided。 As one co

8、mputer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, while its speed and capacity have increased tremendously. Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap。The CPU comprises the co

9、ntrol unit and the arithmetic / logic unit (ALU)。 The control unit is responsible for directing and coordinating most of the computer systems activities。 It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU

10、 and input/output devices。The ALU performs all the arithmetic and logical (comparison) functions - that is, it adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressio

11、ns, such as “greater than or equal to”。 The objective of most instructions that use comparisons is to determine which instruction should be executed next。 (二)Tell whether the following statements are true(T) or false(F) according to the passage A.(根据上文的内容判断下列句子的正误)(10分,每题2分)1. With the development o

12、f computer, the physical size of the CPU has often become bigger and bigger. ( )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control unit of the CPU。 ( )3. The CPU comprises the con

13、trol unit and memory。 ( )4. The control unit performs all the arithmetic and logical (comparison) functions5. The central processing unit (CPU) is the heart of the computer systems. ( )Passage BIn order to solve a computational problem, its solution must be specified in terms of a sequence of comput

14、ational steps, each of which may be performed by a human or a digital computer 。 If you want to solve the computational problem with a computer, you should learn how to program。 The task of developing programs for the solution of computational problems is referred to as programming。 Computer program

15、ming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise 。 So programming is breaking a task down into small steps.Programming is sometimes contra

16、sted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines of program text a

17、re referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others. Whats actually involved in programming - the actual process of writing programs? Heres a qu

18、ick overview of the process: Write a program。 Compile the program。 Run the program。 Debug the program。 Repeat the whole process until the program is finished. (三)、choose the best answer according to the passage B。(根据上文的内容选择正确的答案.(10分,每题2分)1If you want to solve the computational problem with a comput

19、er, you should learn how to 。A。 calculate B. program C。 add D。 subtract2. Computer programming is the process of planning and creating a sequence of for a computer to follow. A。 steps B. process C. lines D。 graphics3. The term coder is used to describe 。A. machine B. computer C。 keyboard D. person4.

20、 In order to solve a computational problem, you can let a person or a to do it。A. machine B。 computer C. keyboard D. mouse5. Which of the following is not the stages of programming?A。 Write a program.B。 Debug the program.C. Print the program.D。 Compile the program。Passage C A computer virus is a com

21、puter program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous。 Virus attacks are growing rapidly these days。 According to BusinessWeek, the 76,404 attacks report

22、ed in the first half of 2003 nearly match previous years total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems。 Lets first examine some common virus types: Basic Virus a piece of softwar

23、e code that is developed to attack computers and network systems via email or Internet connections。 It quickly replicates itself and gradually attaches to files, programs or the hard drive。Trojan Horses - This is a program that doesnt replicate when entering a system but can be effectively used to o

24、pen back doors。 Trojan Horses allow hackers to take control over a particular system or to steal very important data.Worm this type of virus is able to spread itself automatically over the network from one computer to the next。 During a worm attack, users computers get infected without even having t

25、o click open email attachment or any program, etc。Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program。 In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a tradeoff between user-fr

26、iendliness and security. In specific cases it may require line-byline inspection, code retooling and even systems automation to defend the installed programs。(四)、choose the best answer according to the passage B。(根据上文的内容选择正确的答案。10分,每题2分)1A computer virus is a computer program that is created to make

27、 and spread of itself。Aprograms Bvirus C copies Dfiles2Worm spread itself except by . Anetwork BEmail Cprogram Dhardware3Antivirus program can scan and virus。 Aclean Bproduce Creplicate Dmake 4Trojan Horses 。Aquickly replicate itself and gradually attache to files, programs or the hard drive。Binfect

28、 the computer without even having to click open email attachment or any program.Callow hackers to take control over a particular system or to steal very important data。Davoid the virus to attack computer.5According to BusinessWeek, the attacks reported in the first half of 2003 nearly match previous

29、 years total number 。 A 86,404 B 76,404 C56,354 D34,876.Translation。翻译(30分)(一) Translate the following sentences into Chinese.(将下列句子翻译成汉语。)(共20分,每题5分)1. For developing a software product, the development process is divided into 5 stages: Requirements Analysis Specification, Design, Coding, Testing,

30、and Maintenance。2。 Functional testing tests whether the output is the expected result with the valid input.3。 EDI refers to the electronic exchange of business information between two companies using a specific and structured format over private networks.4Some applications, such as Word, allow for s

31、everal windows in a special mode called MDI in which you can open multiple documents within the same application。(二) Translate the following paragraph into Chinese。(将下段文章翻译成汉语。)(共10分)A high-level language is an artificial language with which we can write various instructions. This is possible not be

32、cause computer processors are now so technologically advanced that they can understand these languages. You should translate from programming languages into machine language which can be understood by the computer processors。 Compilers can accomplish this task。 This does mean that a high-level langu

33、age program is not directly executable: it must be compiled to produce processor program, which is executable。计算机专业英语试题2答案. Vocabulary(词汇)(30分)(一)Translate the following words and expressions into Chinese(写出下列词组的汉语。)( 共10分,每题1分)1. 操作系统2. 需求分析3. 网络安全4. 数据结构5. 决策支持系统6. 关系数据库7. 软件危机8. 计算机病毒9. 邮件附件10 中央

34、处理器(单元) (二)Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。) (共10分,每题1分)1DBMS 2TCP 3MDI 4OOP 5ROM 6VCD 7CAD 8SQL 9USB 10B2B(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。)(10分,每空1分)1 c

35、 6。 h 2 f 7 j 3 e 8。 d 4 g 9。 i 5 a 10. b ( ). Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary。 (从下面方框中选择合适的词或表达,以其适当的形式填空.)(10分, 每空2分)maintain disciplined requirements coding modified(二)Tell whether the follo

36、wing statements are true(T) or false(F) according to the passage A。(根据上文的内容判断下列句子的正误)(10分,每题2分)1F 2T 3F 4T 5F (三)、choose the best answer according to the passage B。(根据上文的内容选择正确的答案.(10分,每题2分)1B 2A 3D 4B 5C(四) Choose the best answer according to Passage C.( 根据上文的内容选择正确的答案.10分,每题2分)1C 2. D 3。 A 4。 C 5.

37、 B.Translation.翻译(30分)(一) Translate the following sentences into Chinese.(将下列句子翻译成汉语。)(共20分,每题5分)1。开发一个软件产品,开发过程分为五个步骤:需求分析和说明,设计,写代码,测试和维护。2.功能测试检验的是用有效的输入是否能够得到所期望的输出。+3。 EDI指的是两个公司之间通过私有网络使用特定、结构化的格式电子交换商业信息。4一些应用软件,例如Word,允许几个窗口同时在一个叫做MDI的模式下存在,你能够在一个软件中打开多个文档.(二) Translate the following paragraph into Chinese.(将下段文章翻译成汉语。)(共10分)高级语言是一种人造语言,使用它我们可以写不同的指令。这成为可能不是因为计算机处理器如今是如此的技术先进以至于它们可以理解这些语言。你需要将这些语言翻译成计算机处理器能够理解的机器语言。编译器能够完成这项工作。这就意味着高级语言程序不是直接可执行的:它必须被编译生成处理器程序,这些程序是可执行的7

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        获赠5币

©2010-2024 宁波自信网络信息技术有限公司  版权所有

客服电话:4008-655-100  投诉/维权电话:4009-655-100

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :gzh.png    weibo.png    LOFTER.png 

客服