您好,欢迎来到华佗健康网。
搜索
您的当前位置:首页计算机专业英语2模拟试题2及答案

计算机专业英语2模拟试题2及答案

来源:华佗健康网
计算机专业英语模拟2

Ⅰ. Vocabulary(词汇,30分)

(一).Translate the following words and expressions into Chinese.(写出下列词组的汉语,共10分,每题1分)

1. central processing unit(CPU) 处理器

1. 2. operating system 操作系统

2. 3. electronic spreadsheet 电子表格 4. management information system 管理信息系统

5. electronic commerce 电子商务 6. database 数据库

7. software engineering 软件工程 8. software crisis 软件危机 9. network security 网络安全 10. computer virus 计算机病毒

(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写,共10分,每题1分)

1.随机存储器 RAM 2.局域网 LAN 3.计算机辅助设计 CAD 4.数字视频光盘 DVD

5.通用串行总线 USB 6.面向对象编程 OOP 7.集成开发环境 IDE 8.结构化查询语言 SQL

9.多文档界面 MDI 10.企业之间的电子商务交易方式 B2B

(三).Match the following words and expressions in the left column withthose similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配,共10分,每空1分)1. output ba.视频

2. high-level language c3. project window e4. black-box testing g5. multimedia h6. WWW i7. field j8. application software d9. system software f10.vidio a

b.c.d.e.f.g.h.i.j.

输出.高级语言应用软件工程窗口系统软件黑盒测试多媒体万维网字段

Ⅱ. Comprehension(阅读理解,40分)( )

(一)Fill in the blanks with suitable words or expressions from the listgiven below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空,共10分, 每空2分)

high-level language assembly language written

machine language notation

A programming language, designed to facilitate the communication betweenhuman and computers, is a _ notation _ for describing computation in readable form. There are 3 levels of programming languages, they are_

machine language _ , which can be run directly by computer; ___ assemblylanguage __ and _ high-level language _. There are different high-levelprogramming languages. Fortunately, most of them have many kinds ofconstruct in common and vary only in the way that these must be _ written __ . Therefore, first thing to be decided about a task is to choose whichprogramming language is best suited for the job.

Passage A

The central processing unit (CPU) is the heart of the computer systems.Among other things, its configuration determines whether a computer is fastor slow in relation to other computers. The CPU is the most complex

computer system component, responsible for directing most of the computersystem activities based on the instructions provided. As one computergeneration has evolved to the next, the physical size of the CPU has oftenbecome smaller and smaller, while its speed and capacity have increasedtremendously. Indeed, these changes have resulted in microcomputers thatare small enough to fit on your desk or your lap.

The CPU comprises the control unit and the arithmetic / logic unit (ALU).The control unit is responsible for directing and coordinating most of thecomputer systems activities. It determines the movement of electronic signalsbetween main memory and the arithmetic/logic unit, as well as the controlsignals between the CPU and input/output devices.

The ALU performs all the arithmetic and logical (comparison) functions —that is, it adds, subtracts, multiplies, divides, and does comparisons. Thesecomparisons, which are basically “less than”, “greater than”, and “equal to”,can be combined into several common expressions, such as “greater than orequal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.

(二)Tell whether the following statements are true(T) or false(F)

according to the passage A.(根据上文的内容判断下列句子的正误,共10分,每题2分)

1. With the development of computer, the physical size of the CPU has oftenbecome bigger and bigger. ( F )

2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control unit of the CPU. ( T )

3. The CPU comprises the control unit and memory. ( F )

4. The control unit performs all the arithmetic and logical (comparison)functions . ( F )

5. The central processing unit (CPU) is the heart of the computer systems. ( T )

Passage B

A computer virus is a computer program that is created to make and spreadcopies of itself. The program may however also be designed to have othereffects on the systems it infects, ranging from the annoying to the disastrous.Virus attacks are growing rapidly these days. According to BusinessWeek,the 76,404 attacks reported in the first half of 2003 nearly match previousyear's total number . As new antivirus tools are more powerful than before,the virus writers are getting a lot smarter with newer and creative ways toattack network systems. Let's first examine some common virus types:

Basic Virus - a piece of software code that is developed to attack computersand network systems via email or Internet connections. It quickly replicatesitself and gradually attaches to files, programs or the hard drive.

Trojan Horses - This is a program that doesn't replicate when entering asystem but can be effectively used to open 'back doors.' Trojan Horses allowhackers to take control over a particular system or to steal very importantdata.

Worm - this type of virus is able to spread itself automatically over thenetwork from one computer to the next. During a worm attack, users'

computers get infected without even having to click open email attachment orany program, etc.

Since it is very difficult to avoid the virus, your best defense is a powerfulantivirus program. In order to fight with such viruses, the software vendors

should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may requireline-by-line inspection, code retooling and even systems automation todefend the installed programs.

(三)choose the best answer according to the passage B.(根据上文的内容选择正确的答案,共10分,每题2分)

1.A computer virus is a computer program that is created to make andspread C of itself.A.programs B.virus C. copies D.files

2.Worm spread itself except by D . A.network B.E-mail C.program D.hardware3.Antivirus program can scan and A virus. A.clean B.produce C.replicate D.make4.Trojan Horses C .A.quickly replicate itself and gradually attach to files, programs or the harddrive.

B.infect the computer without even having to click open email attachmentor any program.

C.allow hackers to take control over a particular system or to steal veryimportant data.

D.avoid the virus to attack computer.

5.According to Business Week, the B attacks reported in the firsthalf of 2003 nearly match previous year's total number .

A. 86,404 B. 76,404 C.56,3 D.34,876

Passage C

The Internet, then known as ARPANET, was brought online in 1969, whichinitially connected four major computers at universities in the southwestern

US . The early Internet was used by computer experts , engineers, scientists,and librarians. There was nothing friendly about it. There were no home oroffice personal computers in those days, and anyone who used it, whether acomputer professional or an engineer or scientist or librarian, had to learn touse a very complex system.

The Internet matured in the 1970's as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today' s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources.

In 1991, the first really friendly interface to the Internet was developed at theUniversity of Minnesota. The University wanted to develop a simple menusystem to access files and information on campus through their localnetwork.

Since the Internet was initially funded by the government, it was originallylimited to research, education, and government uses. Commercial uses wereprohibited unless they directly served the goals of research and education.This policy continued until the early 1990's, when independent commercialnetworks began to grow.

(四)Choose the best answer according to Passage C.( 根据上文的内容选择正确的答案,共10分,每题2分)

1. How many computers were connected to the initial Internet in 1969 ? BA. Ten B. Four C. Twenty D. Three

2. Only A could use the early Internet. A. computer experts, engineers, scientists, and librarians

B. any experts, engineers, scientists, and librarians C. computer experts, engineers, scientists, and students D. experts, engineers, and scientists in universities in US

3. The Internet became a lot easier for non-technical people to learn and usebecause of the common B . A. commands B. protocols C. topologies D. architecture4. The first really friendly interface to the Internet appeared with the

introduction of a C system for files and information access. A. computer B. operating C. menu D. application5. Which statement is not true according to Passage C? D

A. Many more people in universities began to use the Internet in the 1970s, but it wasn't as user-friendly as today's standards.

B. The restrictions to commercial uses changed as the independentcommercial networks were not funded by the government.

C. Commercial uses were allowed for the early Internet if they directly servedthe goals of research and education.

D. The early Internet was logged in from home or office personal computers.

Ⅲ.Translation(翻译,30分)

(一) Translate the following sentences into Chinese.(将下列句子翻译成汉语,每题5分)

1. SQL Server is designed to allow thousands of users to access the databaseat the same time and is a true client/server database system.

1. SQL服务器用于允许成前上万的用户同时访问数据库,是一个真正的客户端/服务器端的数据库系统。

2. An application software is any program designed to perform a specific

function directly for the user or, in some cases, for another applicationprogram.

2.应用软件是直接为用户设计的具有专门功能的软件,或在某些情况下,为另一种应用程序设计的软件。

3. A small network may only connect two computers inside a home to sharea single printer and Internet connection

3.一个小型的网络可能是连结一个家庭中的两个计算机,共同分享一个打印机和Internet连结。

4. There is free firewall software available that can run on your computerand provide a good level of protection to your network.

4.有一些免费的防火墙软件能在你的计算机上运行,并且给你的网络提供很好的保护。

(二) Translate the following paragraph into Chinese.(将下段文章翻译成汉语,共10分)

A high-level language is an artificial language with which we can writevarious instructions. This is possible not because computer processors arenow so technologically advanced that they can ‘understand’ these languages.You should translate from programming languages into machine languagewhich can be understood by the computer processors. Compilers can

accomplish this task. This does mean that a high-level language program isnot directly executable: it must be compiled to produce processor program,which is executable.

高级语言是一种人造语言,使用它我们可以写不同的指令。这成为可能不是因为计算机处理器技术先进到它们可以理解这些语言。你需要将这些语言翻译成计算机处理器能够理解的机器语言。编译器能够完成这项工作。这就意味着高级语言程序不是直接可执行的:它必须被编译生成处理器程序,这些程序是可执行的。

因篇幅问题不能全部显示,请点此查看更多更全内容

Copyright © 2019- huatuo0.com 版权所有 湘ICP备2023021991号-1

违法及侵权请联系:TEL:199 1889 7713 E-MAIL:2724546146@qq.com

本站由北京市万商天勤律师事务所王兴未律师提供法律服务