计算机的专业英语选择

上传人:痛*** 文档编号:100353324 上传时间:2022-06-02 格式:DOC 页数:17 大小:416.50KB
返回 下载 相关 举报
计算机的专业英语选择_第1页
第1页 / 共17页
计算机的专业英语选择_第2页
第2页 / 共17页
计算机的专业英语选择_第3页
第3页 / 共17页
点击查看更多>>
资源描述
wordMultiple 11. The keyboard, mouse, monitor, and system unit are:hardwareoutput devicesstorage devicessoftware2. Programs that coordinate puter resources, provide an interface, and run applications are known as:application programsoperating systemsstorage systemsutility programs3. A browser is an example of a:basic applicationspecialized programsystem applicationutility program4. Although not as powerful as a superputer, this type of puter is capable of great processing speeds and data storage.mainframemedia centermidrangenetbook5. The smallest type of microputer:netbookhandheldmidrangetablet PC6. RAM is a type of:putermemorynetworksecondary storage7. Unlike memory, this type of storage holds data and programs even after electrical power to the puter system has been turned off.primaryRAMROMsecondary8. The type of file created by word processors to save, for example, memos, term papers, and letters.databasedocumentpresentationworksheet9. The change in connectivity that uses the Internet and the Web to shift many puter activities from a users puter to puters on the Internet.cloud putinghigh definitionnetworkUSB10. The largest network in the world is the:FacbeookInternetWebUSBMultiple 21. The network that connects puters all over the world.CERNInternetLANWeb2. The rules for exchanging data between puters.DSLprotocolsWeb3. Client-based accounts require this special program to be installed on your puter. clienthyperlinkJavautility4. munities of individuals who share a mon interest typically create :clientsgroupspagesprofiles5. that does not require an program installed on a users puter is known as:blogpodcastWebmailutility6. A very well-known microblog.LinkedInMySpaceTwitterWikipedia7. These programs continually look for new information and update search services database programs.filtersIMspiderswikis8. A type of search engine that submits requests to other search engines, organizes their responses, eliminates duplicate responses, orders hits, and then provides an edited list.directory searchISPmetasearch enginespecialized search engine9. This is the Internets equivalent to traditional cash.digital cashe-merceicashInternet dollars10. Using file transfer utility software, you can copy files to your puter from specially configured servers on the Internet. This is called:downloadingfilteringblogginguploadingMultiple 31. This type of software works with end users, application software, and puter hardware to handle the majority of technical details.applicationgeneral purposesystemutility2. A rectangular area that can contain a document, program, or message.dialog boxformframewindow3. Programs that create text-based documents.DBMSsuitesspreadsheetsword processors4. Programs that organize, analyze, and graph numeric data such as budgets and financial reports.DBMSsuitesspreadsheetsword processors5. In a spreadsheet, the intersection of a row and column creates a:cellformulafunctionlabel6. A collection of related data that is the electronic equivalent of a file cabinet.celldatabasedocumenttable7. A database tool that will quickly rearrange a tables records according to a selected field.filtersortspreadsheetword processor8. Programs that bine a variety of visual objects to create attractive, visually interesting presentations.DBMSpresentation graphicsspreadsheetword processor9. The primary disadvantage of this type of package is that the capabilities of each function are not as extensive as in individual programs.integratedofficesoftwareutility10. A type of suite stored at a server on the Internet and available anywhere through Internet access.cloudintegratedofficeutilityMultiple 41. These specialized graphics programs bine text and graphics to create publications of professional quality.desktop publishing programsimage editorsimage galleriesillustration programs2. Also known as drawing programs.desktop publishing programsimage editorsimage galleriesillustration programs3. Graphics programs used to create and edit vector images.desktop publishing programsimage editorsimage galleriesillustration programs4. An essential multimedia feature that allows user participation.Flashinteractivityimmersionraster5. Special programs used to create multimedia presentations.desktop publishing programsFlash editorsimage editorsmultimedia authoring programs6. A widely used interactive animation application from Adobe.ACTIONFlashFuzzyWYSIWYG7. Programs for Web site design and HTML coding are called Web page editors orappsHTML editorsVR programsWeb editors8. This area of artificial intelligence is also known as expert systems.acousticsknowledge-based systemsroboticsvirtual reality9. A type of artificial intelligence that uses a database to provide assistance to users.acousticsexpert systemsroboticsvirtual reality10. Another name for the database used in expert systems that contains specific facts and rules.access tableexpert tableknowledge baserule baseMultiple 51. What type of software works with users, application software, and puter hardware to handle the majority of technical details?dapplicationdesktopLinuxsystem2. The programs that convert programming instructions written by programmers into a language that puters understand and process are language:converterslinguistsmanagerstranslators3. The ability to switch between different applications stored in memory is called:diversionmultitaskingoperational interferenceprogramming4. Graphic representations for a program, type of file, or function:appiconimagesoftware5. This operating system feature is controlled by a mouse and changes shape depending on its current function.dialog boxmenumousepointer6. The operating system based on Linux, designed for Netbook puters, and focused on Internet connectivity through cloud puting:ChromeMacUnixWindows7. The mobile operating system developed by Apple and originally called iPhone OS:AndroidBlackBerry OSIOSMac OS8. A utility program that makes copies of files to be used in case the originals are lost or damaged:Backup and RestoreDisk CleanupDisk Defragmenterpactor9. A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space, and improves system performance:Backup and RestoreDisk CleanupDisk Defragmenterpactor10. Windows makes it easy to update drivers with Windows:BackupRestoreDriverUpdateMultiple 61. This container houses most of the electrical ponents for a puter system.carrier packagesystem boardsystem unitTV tuner2. Similar to notebooks, this system unit specializes in on-the-go Web browsing and access.chassisdesktopmedia centernetbook3. puters can only recognize this type of electronic signal.analogbusdigitalmaximum4. The main or motherboard is also known as the:puterboard processormobile systemsystem board5. How many bytes can a 32-bit-word puter access at one time?148166. In a microputer system, the central processing unit is contained on a single:buschipmoduleRAM7. This type of memory divides large programs into parts and stores the parts on a secondary storage device.directexpandedrandom-accessvirtual8. Also known as NIC, this adapter card is used to connect a puter to a:AIAexpansiongraphicsnetwork9. This provides a pathway to connect parts of the CPU to each other.busPlug and Playwiredwireless10. Older ports that have largely been replaced by faster, more flexible ports are called:busesexpandablelegacyrenderedMultiple 71. Most keyboards use an arrangement of keys known as:AlphaDaisyOptiKeyQWERTY2. The device that controls a pointer displayed on the monitor.cordmouseprinterscanner3. Also known as a roller ball, this device controls the pointer by rotating a ball with your thumb.trackballjoystickcordless mousestylus4. The type of screen that can be touched with more than one finger and supports zooming in and out by pinching and stretching your fingers.digitaldynamicmultitouchOLED5. Flatbed and document are types of:headsetsHDTVsmonitorsscanners6. Device used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips.MICRFDIRUPC7. The most widely used audio-input device.mouseVRmicrophoneTFT8. The monitor feature that specifies how often a displayed image is updated.aspect ratiodot pitchrefresh rateresolution rate9. Handheld, book-sized devices that display text and graphics.e-book readersHDTVlaserswhiteboards10. This technology allows television stations to broadcast their programming directly to smartphones, puters, and digital media players.CRTHDTVLEDMobile DTVMultiple 81. RAM is sometimes referred to as:primary storageratio active memoryread only memorysecondary storage2. The actual physical material that holds the data and programs.primary storagemediadiskaccess3. Measures how tightly these charges can be packed next to one another on the disk.densitycylinderstrackssectors4. When a read/write head makes contact with the hard disks surface, it causes a head:crashlandpitscratch5. This hard-disk performance enhancement anticipates data needs.disk cachingfile pressionfile depressionRAID6. This type of storage uses pits and lands to represent 1s and 0s.cloudhard diskopticalsolid state7. DVD stands for:digital versatile discdigital video datadynamic versatile discdynamic video disc8. USB drives are also known as:flash drivesoptical drivesportsuniversal state bus9. An organizational strategy to promote efficient and safe use of data across the networks.cloud dynamicdata mission statemententerprise storage systemRAID10. A mass storage device that provides access to data archived on tapes.file systemNASRAID systemtape libraryMultiple 91. The concept related to using puter networks to link people and resources.connectivityGPSTCP/IPWi-Fi2. A high-frequency transmission cable that delivers television signals as well as connects puters in a network.coaxialhi def3-Dtwisted pair3. A short-range radio munication standard that transmits data over short distances of up to approximately 30 feet.BluetoothbroadbandDSLTCP/IP4. The speed with which a modem transmits data is called its:digital velocitydynamic ratemodular ratingtransfer rate5. The bandwidth typically used for DSL, cable, and satellite connections to the Internet.basebandbroadbandmedium bandvoiceband6. Every puter on the Internet has a unique numeric address called a(n):IP addressDNSbroadcastpacket7. Sometimes referred to as a LAN adapter, these expansion cards connect a puter to a network.PCMCIANICserverVPN8. A device that allows one LAN to be linked to other LANs or to larger networks.IDSnetwork gatewayPANswitch9. Typically using Wi-Fi technology, these wireless access points are typically available from public places such as coffee shops, libraries, bookstores, colleges, and universities.hotspotsextranetsPANsLANs10. Star, tree, and mesh are three types of network:topologiesprotocolsstrategiesdevicesMultiple 101. The three primary privacy issues are accuracy, property, and:accessethicsownershipsecurity2. To easily get names, addresses, and other details about a person using only his or her telephone number, government authorities and others use a(n):adware cookiekeystroke loggerreverse directoryworm3. Browsers store the locations of sites visited in a:historymenutool barfirewall4. The browser mode that eliminates history files and blocks most cookies.detectinsertprivacysleep5. The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:access approvalfirewallonline identityphish6. puter criminals who specialize in stealing, trading, and using stolen credit cards over the Internet are known as:carderscard scammerscyber tradersidentity thieves7. Programs that e into a puter system disguised as something else are called:Trojan horsesvirusesWeb bugszombies8. The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:cyber-bullyingonline harassmentsocial media discriminationunethical munication9. Special hardware and software used to control access to a corporations private network is known as a(n):antivirus programmunication gatefirewallspyware removal program10. To prevent copyright violations, corporations often use:ACTDRMVPNWPAMultiple 111. Which of the basic organizational functions records all financial activity from billing customers to paying employees?accountingmarketingproductionresearch2. What managerial level has information flow that is vertical, horizontal, and external?topsupervisorymiddleforeman3. Which puter-based information system uses data from TPS and analytical tools to support middle managers?ESSMISDSSTPS4. Accounts payable refers to money the pany owes its suppliers for materials and services it has:createdexportedinventoriedreceived5. What accounting activity keeps track of all summaries of all transactions?balance sheetgeneral ledgerine statementinventory control6. What accounting statement lists the overall financial condition of an organization?balance sheetgeneral ledgerine statementinventory control7. What type of report is produced at regular intervals?demandexceptioninventoryperiodic8. A DSS consists of four parts: user, system software, decision models, and:application softwaredataoperating systemspreadsheets9. What type of worker is involved with the distribution, munication, and creation of information?executiveforemaninformationknowledge10. What type of program is designed to schedule, plan, and control project resources?auditingdtpproject managersschedulersMultiple 121. Facts or observations about people, places, things, and events are:dataoccurrencesrecordstables2. The most basic logical data element such as a single letter, number, or special character is known as a:characterelementphraserecord3. Each record in a database has at least one distinctive field, called the:key fieldstructuretypeview4. One element of database security is to provide only authorized users with:classesnodespasswordsrelations5. The bridge between the logical and physical views of the data is provided by:DBMSrecordsSQLtables6. Highly trained puter specialists who interact with the data administration subsystem are known as:DBMSdata modelersdatabase administratorsrelational specialists7. In a network database, each child node may have more than one parent node; this is known as a:hierarchymany-to-many relationshipparent relationshiprelational relationship8. Connections between parent nodes and child nodes are provided by:charactersDBAobjectspointers9. Two of the most significant advantages of multidimensional databases over relational databases are processing speed and:conceptualizationcontrolformatobjectification10. Object-oriented databases organize data by classes, attributes, methods, and:objectsrelationsspacetimeMultiple 131. An information system is a collection of hardware, software, people, procedures, and:dataDBMSspecialistssystem analysts2. What is the first phase in the systems life cycle?needs analysispreliminary investigationsystems analysissystems design3. Which phase in the systems life cycle involves installing the new system and training people?preliminary investigationsystems analysissystem designsystems implementation4. This phase in the systems life cycle is concerned about determining system requirements not in design.preliminary investigationsystems analysissystem designsystems implementation5. Which systems analysis tool shows the relationship between input and output documents?checklistdata flowdecision tablegrid chart6. These tools relieve the systems analysts of many repetitive tasks, develop clear documentation, and, for larger projects, coordinate team member activities.automated systems life cycleCASEdata flow analyzersflow charts7. Which systems life cycle phase is concerned with economic, technical, and operational feasibility?preliminary investigationsystems analysissystems designsystems implementation8. What type of feasibility evaluates whether the people within the organization will embrace or resist a new system?behavioraleconomicoperationaltechinical9. Which approach to conversion begins by trying out a new system in only one part of an organization?directpilotparallelphased10. An alternative to the systems life cycle approach using powerful development software, small specialized teams, and highly trained personnel.AADCASEprototypingRADMultiple 141. A program is a list of instructions for the puter to follow to process:datadirect logichardwaresoftware2. The major processing steps identified in a top-down program design are called:assemblyinstructionsmoduleslogic3. The programming logic structure in which one program statement follows another.concatenationlooprepetitionselection4. One of the best ways to code effective programs is to use the three basic logic structures to create:content-markup programsmodular languagespseudocodestructured programs5. Which step in the six-step programming procedure involves desk checking and searching for syntax and logic errors?program designprogram documentationprogram maintenanceprogram test6. Which step in the six-step programming procedure is the final step?program designprogram documentationprogram testprogram maintenance7. Unlike traditional systems development, this software development approach focuses less on the procedures and more on defining the relationships between previously defined procedures.2GLcontext-markupmoduleobject-oriented8. Natural languages are considered to be a:high-level languagelow-level languagemid-level languageprocedural language9. A piler converts the programmers procedural language program, called the source code, into a machine language code, called the:interpreter codeobject codestructured codetop-down code10. The 4GL languages that enable nonprogrammers to use certain easily understood mands to search and generate reports from a database.queryapplication generatorC11COBOLMultiple 151. People who react to technology by thinking puters are magic boxes capable of solving all kinds of problems that puters really cant handle are:cynicsfrustratednaveproactive2. The type of person that looks at technology in a positive realistic way is:cynicalproactivenavefrustrated3. Books, journals, and trade associations are the best sources to help you:develop personal contactsdevelop specialtieslook for innovative opportunitiesmaintain your puter petency4. If your career is in marketing, it makes sense to develop a specialty in:databasedesktop publishingprogrammingsystems analysis and design5. What puter professional repairs and installs puter ponents and systems?puter techniciandata entry workerdesktop publishersoftware engineer6. What puter professional designs, tests, and researches encryption procedures?cryptographernetwork administratorprogrammersoftware engineer7. What puter professional uses database management software to determine the most efficient ways to organize and access data?cryptographerdatabase administratorprogrammersoftware engineer8. What puter professional oversees the work of programmers, puter specialists, systems analysts, and other puter professionals?information systems managernetwork managersoftware engineertechnical writer9. What puter professional creates, tests, and troubleshoots puter programs?network managerprogrammersoftware engineertechnical writer10. What puter professional plans and designs info
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 图纸专区 > 成人自考


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!