大连理工大学13春《专业英语(计算机英语)》在线测试
大工13春《专业英语(计算机英语)》在线测试3
试卷总分:100
判断题
单选题
一、判断题(共 10 道试题,共 20 分。)
V
1. FTP is the messages, usually text, send from one person to another via the Internet.( )
A. 错误
B. 正确
满分:2 分
2. A file is a collection of relation fields.( )
A. 错误
B. 正确
满分:2 分
3. The Internet is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.( )
A. 错误
B. 正确
满分:2 分
4. www.asp.com is an E-mail address.( )
A. 错误
B. 正确
满分:2 分
5. The standard protocol used for sending Internet e-mail is called SMTP. It works in conjunction with POP servers.( )
A. 错误
B. 正确
满分:2 分
6. Microsoft Access is a database management system from Microsoft, packaged with Microsoft Office.( )
A. 错误
B. 正确
满分:2 分
7. To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.( )
A. 错误
B. 正确
满分:2 分
8. Program flowchart is an outline of the logic of the program you will write.( )
A. 错误
B. 正确
满分:2 分
9. Java is a compiled object-oriented programming language used to write applets.( )
A. 错误
B. 正确
满分:2 分
10. To protect data, you need to implement a data backup and recovery plan.( )
A. 错误
B. 正确
满分:2 分
大工13春《专业英语(计算机英语)》在线测试3
试卷总分:100
判断题
单选题
二、单选题(共 20 道试题,共 80 分。)
V
1. ( ) shorts for Audio-Video Interleaved. It is a video file format supported by Windows and some other software. It can handle the synchronous problem between audio and video information by using the video lossy compressing technology.
A. AVI
B. DAT
C. BMP
D. GIF
满分:4 分
2. ( ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4 分
3. ( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:4 分
4. ( ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4 分
5. ( ) is a person who is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed.
A. Database Management Administrator
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:4 分
6. ( )(MIS) are designed to take the relatively raw data available through a TPS and convert them into a summarized and aggregated form for managers, usually in a report format.
A. Decision Support Systems
B. Expert Systems
C. Management Information Systems
D. Data Mining
满分:4 分
7. ( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:4 分
8. ( ) is a computer technology that creates three dimensional real illusion in an artificial world.
A. Vector image
B. Bitmap
C. JPEG
D. Virtual Reality
此题选: D 满分:4 分
9. ( ), the process of compressing a file such that some data is lost after the file is compressed and decompressed.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4 分
10. A ( ) is a line rented from a telephone company for the exclusive use of a customer to access Internet.
A. leased line
B. online payment
C. credit card
D. ISP
满分:4 分
11. ( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.
A. MIDI
B. WAV
C. RA
D. Audio
满分:4 分
12. ( ), executable code that, when run by someone, infects other executable code in a computer.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4 分
13. Which one is a word processing and text editing tool?( )
A. Photoshop
B. Word
C. Extreme 3D
D. Premiere
满分:4 分
14. ( ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4 分
15. An ( ) is a company that provides access to the Internet.
A. TCP/IP
B. APRANET
C. FTP
D. ISP
此题选: D 满分:4 分
16. ( ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.
A. MP3
B. MP4
C. JPEG
D. AVI
满分:4 分
17. ( ), in networking, to establish the validity of a user or an object.
A. Authenticate
B. Decrypt
C. Encryption
D. Firewall
满分:4 分
18. ( ) will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.
A. Animation
B. WAV
C. Multimedia
D. none of the above
满分:4 分
19. ( ) stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
A. Relational Database
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:4 分
20. ( ), technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4 分
试卷总分:100
判断题
单选题
一、判断题(共 10 道试题,共 20 分。)
V
1. FTP is the messages, usually text, send from one person to another via the Internet.( )
A. 错误
B. 正确
满分:2 分
2. A file is a collection of relation fields.( )
A. 错误
B. 正确
满分:2 分
3. The Internet is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.( )
A. 错误
B. 正确
满分:2 分
4. www.asp.com is an E-mail address.( )
A. 错误
B. 正确
满分:2 分
5. The standard protocol used for sending Internet e-mail is called SMTP. It works in conjunction with POP servers.( )
A. 错误
B. 正确
满分:2 分
6. Microsoft Access is a database management system from Microsoft, packaged with Microsoft Office.( )
A. 错误
B. 正确
满分:2 分
7. To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.( )
A. 错误
B. 正确
满分:2 分
8. Program flowchart is an outline of the logic of the program you will write.( )
A. 错误
B. 正确
满分:2 分
9. Java is a compiled object-oriented programming language used to write applets.( )
A. 错误
B. 正确
满分:2 分
10. To protect data, you need to implement a data backup and recovery plan.( )
A. 错误
B. 正确
满分:2 分
大工13春《专业英语(计算机英语)》在线测试3
试卷总分:100
判断题
单选题
二、单选题(共 20 道试题,共 80 分。)
V
1. ( ) shorts for Audio-Video Interleaved. It is a video file format supported by Windows and some other software. It can handle the synchronous problem between audio and video information by using the video lossy compressing technology.
A. AVI
B. DAT
C. BMP
D. GIF
满分:4 分
2. ( ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4 分
3. ( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:4 分
4. ( ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4 分
5. ( ) is a person who is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed.
A. Database Management Administrator
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:4 分
6. ( )(MIS) are designed to take the relatively raw data available through a TPS and convert them into a summarized and aggregated form for managers, usually in a report format.
A. Decision Support Systems
B. Expert Systems
C. Management Information Systems
D. Data Mining
满分:4 分
7. ( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
满分:4 分
8. ( ) is a computer technology that creates three dimensional real illusion in an artificial world.
A. Vector image
B. Bitmap
C. JPEG
D. Virtual Reality
此题选: D 满分:4 分
9. ( ), the process of compressing a file such that some data is lost after the file is compressed and decompressed.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4 分
10. A ( ) is a line rented from a telephone company for the exclusive use of a customer to access Internet.
A. leased line
B. online payment
C. credit card
D. ISP
满分:4 分
11. ( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.
A. MIDI
B. WAV
C. RA
D. Audio
满分:4 分
12. ( ), executable code that, when run by someone, infects other executable code in a computer.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4 分
13. Which one is a word processing and text editing tool?( )
A. Photoshop
B. Word
C. Extreme 3D
D. Premiere
满分:4 分
14. ( ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4 分
15. An ( ) is a company that provides access to the Internet.
A. TCP/IP
B. APRANET
C. FTP
D. ISP
此题选: D 满分:4 分
16. ( ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.
A. MP3
B. MP4
C. JPEG
D. AVI
满分:4 分
17. ( ), in networking, to establish the validity of a user or an object.
A. Authenticate
B. Decrypt
C. Encryption
D. Firewall
满分:4 分
18. ( ) will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.
A. Animation
B. WAV
C. Multimedia
D. none of the above
满分:4 分
19. ( ) stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
A. Relational Database
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
满分:4 分
20. ( ), technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4 分
版权声明
声明:有的资源均来自网络转载,版权归原作者所有,如有侵犯到您的权益
请联系本站我们将配合处理!