专业英语试题2009A

更新时间:2024-06-02 21:40:01 阅读量: 综合文库 文档下载

说明:文章内容仅供预览,部分内容可能不全。下载后的文档,内容与下面显示的完全一致。下载之前请确认下面内容是否您想要的,是否完整无缺。

班级: 姓名密 : 学 号 :封 试 题 共线 页 加白纸一张 alfsixslwo

GDOU-B-11-302

广东海洋大学 2009—— 2010学年第 一 学期

《 计算机专业英语 》课程试题

□ 考试 √ A卷 √ 闭卷 课程号: √ 考查 □ B卷 □ 开卷 题 号 一 二 三 四 五 六 七 八 九 十 总分 阅卷教师 各题分数 30 40 30 100 实得分数

Ⅰ. Vocabulary(词汇)(30分)

(一) Translate the following words and expressions into Chinese(写出下列词组的汉语。)(共10分,每题1分)

1.central processing unit(CPU) 2.operating system

3.electronic spreadsheet 4.management information system 5.electronic commerce 6.database 7.software piracy 8.data mining 9.network security

10.object-oriented programming

(二) Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。) (共10分,每题1分)

1.随机存储器 2.城域网 3.开放式系统互连 4.数字化视频光盘 5.通用串行总线 6.企业资源计划 7.集成开发环境 8.结构化查询语言

第 1 页 共 8 页

9.传输控制协议/网际协议 10.不间断电源

(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。)(10分,每空1分)

1. dumb terminal 2. topology 3. resolution 4. black-box testing 5. multimedia

6. PDA 7. field 8. pseudocode

9. antivirus software 10.encapsulation

1. 6. 2. 7.

a. 封装 b. 哑终端 c. 拓扑结构 d. 伪代码 e. 分辨率 f. 杀毒软件 g. 黑盒测试 h. 多媒体 i. 个人数字助理 j. 字段

3. 8.

4. 9.

5. 10.

Ⅱ. Comprehension(阅读理解)

(一)Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。)(10分, 每空2分)

high-level language assembly language written machine language notation A programming language, designed to facilitate the communication between human

(

第 2 页 共 8 页

and computers, is a ________________ for describing computation in readable form. There are 3 levels of programming languages, they are________________ , which can be run directly by computer; ________________ and _____________. There are different high-level programming languages. Fortunately, most of them have many kinds of construct in common and vary only in the way that these must be ________________ . Therefore, first thing to be decided about a task is to choose which programming language is best suited for the job.

Passage A

The central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, while its speed and capacity have increased tremendously. Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap.

The CPU comprises the control unit and the arithmetic / logic unit (ALU). The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices.

The ALU performs all the arithmetic and logical (comparison) functions — that is, it adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.

(二)Tell whether the following statements are true(T) or false(F) according to the

第 3 页 共 8 页

passage A.(根据上文的内容判断下列句子的正误)(10分,每题2分)

1. With the development of computer, the physical size of the CPU has often become

bigger and bigger. ( ) 2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control

unit of the CPU. ( )

3. The CPU comprises the control unit and memory. ( ) 4. The control unit performs all the arithmetic and logical (comparison) functions ( )

5. The central processing unit (CPU) is the heart of the computer systems. ( )

Passage B

A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.

Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common virus types:

Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.

Trojan Horses - This is a program that doesn't replicate when entering a system but can be effectively used to open 'back doors.' Trojan Horses allow hackers to take control over a particular system or to steal very important data.

Worm - this type of virus is able to spread itself automatically over the network from

第 4 页 共 8 页

one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc.

Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.

(三) choose the best answer according to the passage B. (根据上文的内容选择正确的答案。(10分,每题2分)

1.A computer virus is a computer program that is created to make and spread of itself.

A.programs B.virus C. copies D.files 2.Worm spread itself except by .

A.network B.E-mail C.program D.hardware 3.Antivirus program can scan and virus. A.clean B.produce C.replicate D.make 4.Trojan Horses .

A.quickly replicate itself and gradually attache to files, programs or the hard drive. B.infect the computer without even having to click open email attachment or any program.

C.allow hackers to take control over a particular system or to steal very important data. D.avoid the virus to attack computer.

5.According to BusinessWeek, the attacks reported in the first half of 2003 nearly match previous year's total number .

A. 86,404 B. 76,404 C.56,354 D.34,876

Passage C

The Internet, then known as ARPANET, was brought online in 1969, which initially

第 5 页 共 8 页

connected four major computers at universities in the southwestern US . The early Internet was used by computer experts , engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personal computers in those days, and anyone who used it, whether a computer professional or an engineer or scientist or librarian, had to learn to use a very complex system.

The Internet matured in the 1970's as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today' s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources.

In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network.

Since the Internet was initially funded by the government, it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 1990's, when independent commercial networks began to grow.

(四) Choose the best answer according to Passage C.( 根据上文的内容选择正确的答案。10分,每题2分)

1. How many computers were connected to the initial Internet in 1969 ? A. Ten B. Four C. Twenty D. Three

2. Only could use the early Internet.

A. computer experts, engineers, scientists, and librarians B. any experts, engineers, scientists, and librarians

第 6 页 共 8 页

C. computer experts, engineers, scientists, and students D. experts, engineers, and scientists in universities in US

3. The Internet became a lot easier for non-technical people to learn and use because of the common . A. commands B. protocols C. topologies D. architecture

4. The first really friendly interface to the Internet appeared with the introduction of a system for files and information access.

A. computer B. operating C. menu D. application

5. Which statement is not true according to Passage C?

A. Many more people in universities began to use the Internet in the 1970s, but it wasn't as user-friendly as today's standards.

B. The restrictions to commercial uses changed as the independent commercial networks were not funded by the government.

C. Commercial uses were allowed for the early Internet if they directly served the goals of research and education.

D. The early Internet was logged in from home or office personal computers.

Ⅲ.Translation.翻译(30分)

(一) Translate the following sentences into Chinese.(将下列句子翻译成汉语。)(共20分,每题5分)

1.SQL Server is designed to allow thousands of users to access the database at the same time and is a true client/server database system.

第 7 页 共 8 页

2.An application software is any program designed to perform a specific function directly for the user or, in some cases, for another application program.

3.A small network may only connect two computers inside a home to share a single printer and Internet connection.

4.There is free firewall software available that can run on your computer and provide a good level of protection to your network.

(二) Translate the following paragraph into Chinese.(将下段文章翻译成汉语。)(共10分)

A high-level language is an artificial language with which we can write various instructions. This is possible not because computer processors are now so technologically advanced that they can ?understand? these languages. You should translate from programming languages into machine language which can be understood by the computer processors. Compilers can accomplish this task. This does mean that a high-level language program is not directly executable: it must be compiled to produce processor program, which is executable.

第 8 页 共 8 页

本文来源:https://www.bwwdw.com/article/e6q6.html

Top