admin管理员组文章数量:1567570
2024年1月4日发(作者:)
CHAPTER 1
A common term that describes the combination of traditional computer and communication
technologies is
b. information technology
Procedures are typically documented in manuals written by
b. computer specialists
Which of the following is an example of connectivity?
a. Internet
Windows XP, windows Vista, and Macintosh OS X are all examples of
b. browsers
Because of their size and cost, these computers are relatively rare.
d. supercomputers
The system component that controls and manipulates data in order to produce information is
called the
d. microprocessor
A system component that translates data and programs that humans can understand into a form
that the computer can process is called a(n)
c. output device
A CD is an example of a(n)
c. optical disc
If you want to communicate a message or persuade other people, you would typically use this
type of software.
d. presentation
Many experts are predicting that this revolution is expected to dramatically affect the way we
communicate and use computer technology.
d. wireless
CHAPTER 2
The Internet was launched in 1969 when the United States funded a project that developed a
national computer network called
d. ARPANET
__ is the most popular Internet activity.
a. communication
A(n) __ program provides access to Web resources.
c. ISP
Rules for exchanging data between computers are called
c. protocols
The last part of the domain name following the dot (.) is the top __ domain.
a. level
__ are widely used to add interest and activity to a Web site by presenting animation, displaying
graphics, providing interactive games, and more.
a. Applets
Unwanted and unsolicited e-mails are called __.
a. spam
Programs that automatically submit your search request to several search engines simultaneously
are called __.
a. metasearch engines
__ cash is the Internet’s equivalent to traditional cash.
d. Digital
These programs allow parents as well as organizations to block out selected sites and set time
limits on Internet access.
b. filters
CHAPTER 3
This type of software works with end users , application software, and computer hardware t
handle the majority of technical details.
d. system software
__ are narrowly focused on specific disciplines and occupations.
c. Specialized applications
The primary purpose of this type of software is to create text-based document.
b. word processing
Organizations create newsletters, manuals, and contracts are all examples of
d. documents
Numbers and formulas entered in a cell are called
a. numeric entries
The acronym DBMS stands for what?
b. database management system
Database __ are primarily used to enter new records and to make changes to exciting records.
c. queries
A file that includes predefined settings that can be used to create many common types of
presentations is called a
c. template
A(n) __ is a single program that provides the functionality of a word processor, spreadsheet,
database manager, and more.
b. integrated package
CHAPTER 4
Graphic programs widely used in the graphic arts profession include __.
a. desktop publishing programs, image editors, and illustration programs
Image editors are used for creating and editing __.
a. bitmap imagine
Programs used to create or modify vector images are called __.
a. illustration programs
Pages in a multimedia presentation typically provide __ or connections to related information.
b. links
When determining the overall objective of a multimedia project, the resources required, and the
people who will work on the project, you are in __ step.
a. planning
Many individuals create their own personal sites called Web logs, or
b. blogs
A special effect in which one image seems to melt into another is referred to as
c. morphing
Users can interact in a fully immersed 3-D environment using __.
b. virtual reality
Fuzzy logic is
a. used to respond to questions in a humanlike way
Robots used in automobile plants would be classified as
b. industrial robots
CHAPTER 5
Software that allows your computer to interact with the user, applications, and hardware is called
c. system software
In order for a computer to understand a program, it must be converted into machine language by
a(n) __.
d. language translator
“GUI” stands for
c. graphical user interface
To connect several computer together, one generally needs to be running a(n) __ operating
system.
a. network
__ is the most widely used operating system.
a. Windows
This operating system is most popular with graphic designers and those who work in multimedia
c. Mac OS
This operating system was originally designed to run on minicomputers used in a network
environment.
b. UNIX
These programs guard your computer against malicious programs that may invade your computer
system.
b. antivirus program
A concentric ring on a hard disk is referred to as a
a. track
Every time the computer system is started ,the operating system loads these into memory.
c. device drivers
CHAPTER 6
The container that house most of the electronic components that make up a computer system
is known as the
d. system unit
The smallest unit in a digital system is a
b. bit
The communication medium for the entire computer system is the
c. motherboard
These provide expansion capability for a computer system.
b. slots
The __tells the rest of the computer how to carry out a program’s instructions.
b. control unit
A 32-bit word computer can access __ bytes at a time.
a. 4
These chips are specifically designed to handle the processing requirements ralated to display
and manipulating 3-D image.
a. graphics coprocessors
This type of memory improves processing by acting as a temporary high-speed holding area
between the memory and the CPU.
c. cache memory
__ is a set of hardware and software standards.
b. Plug and Play
__ ports connect special types of music instruments to sound cards
d. MIDI
CHAPTER 7
Hardware used to translate words, sounds, images, and actions that people understand into a
form that the system unit can process is known as
a. input devices
This type of keyboard provides the greatest amount of flexibility and convenience by eliminating
cables connected to the system unit.
b. wireless keyboard
The mouse __ usually appears in the shape of an arrow.
a. pointer
This type of pointing device is located in the middle of the keyboard.
b. pointing stick
This type of pointing device has crisscrossed invisible beams of infrared light that are protected
with a clear plastic outer layer.
d. touch screen
A universal product code is read by what type of scanner?
a. bar code
__ input devices convert sounds into a form that can be processed by the system unit
d. Audio
The most important characteristic of a monitor is its
c. clarity
Which of the following printer types requires special paper?
d. thermal
__ is a specialized input and output device for receiving and sending voice communication.
b. Internet telephone
CHAPTER 8
Primary storage is referred to as __storage.
a. volatile
The amount of time required by a storage device to retrieve data and programs is its
a. access speed
How tightly the bits can be packed next to one another on a disk is referred to an
c. density
Thick, rigid metal platters that are capable of storing and retrieving information at a high rate of
speed are known as
a. hard disks
The data on an optical disc is represented by flat areas called __ on the disc surface.
c. lands
A CD-RAM disc
a. cannot be erased and rewritten
DVD stands for
c. digital versatile disc
This type of storage device has no moving parts.
d. solid state
Tape is described as using this type of access
d. sequential
Specialized high-capacity secondary storage device designed to meet organizational demands for
data.
c. mass storage
CHAPTER 9
Connectivity is a concept related to
c. using computer networks to link people and resources
The transmission medium that carries the message is referred to as the
b. communication channel
Bluetooth is a type of radio wave information transmission system that is good for about
a. 30 feet
Special high-speed lines used by large corporations to support digital communications are known
as
d. T1, T2, T3 and T4 lines
The rules for exchanging data between computers are called
c. protocols
Two or more computer connected so that they can communicate with each other and share
information are called a
d. network
A device, connected to a network, that shared resources with other nodes is called a
b. server
The arrangement of the computers in a network is called the
b. topology
A way of coordinating the sharing of information and resources is called a network __ .
b. strategy
A(n) __ protects an organization’s network from outside attack.
d. firewall
CHAPTER 10
The standards of moral conduct that control how computers are used are called
a. ethics
The ethical issue that involves who is able to read and use data is
a. access
Two types of cookies are __.
d. ad network and traditional
People who gain unauthorized access to computers for the fun of it, but do not intentionally do
damage, are__
b. hackers
A program that migrates through networks and operating systems by attaching itself to different
programs and databases is a __.
a. virus
An attempt to slow down or stop a computer system or network by flooding the system with
requests for information is called a
c. denial-of-service attack
Secret words or numbers used to gain access to a computer system are called
d. passwords
One of the more common type of technological failures is when your computer experiences too
much electricity. This is known as__
c. a voltage surge
__ is the study of human factors relating to things people use
b. ergonomics
The computer industry response to the Energy Star program is the
d. Green PC
版权声明:本文标题:计算机专业英语(2008影印版)课后习题单选题题目及答案 内容由热心网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:https://www.elefans.com/xitong/1704341565a85882.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论