计算机类专业英语(2)

翻译

( 1 )instruction  register    指令寄存器

( 2 )程序计数器    program counter

( 3 )storage device volume   存储设备容量

( 4 )软件中断 software interrupt

( 5 )standard keyboard 标准键盘

( 6 )numeric keypad 数字键盘

( 7 )context switching 上下文转接,任务切换

( 8 )资源分配 resource allocation

( 9 )stack and queue 栈和队列

( 10 )数据类型 data type

( 11 )抽象数据类型 abstract data type

( 12 )高级语言 high-level language

( 13 )面向对象编程 object-oriented programming

( 14 )Management information system    管理信息系统

( 15 )关系结构  relational structure

( 16 )决策支持系统 decision support system

( 17 )数据仓库 data warehouse

( 18 )海量存储技术 mass storage technology

( 19 )数据挖掘 data mining

( 20 )云计算 cloud computing

( 21 )私有云 private cloud

( 22 )公有云 public cloud

( 23 )移动电话 mobile phone

( 24 )局域网 local area network

( 25 )物理拓扑 physical topology

( 26 )访问控制 access control

( 27 )攻击预防 attack prevent

( 28 )随机数据流 random data stream

( 29 )access point cell 接入点单元

( 30 )无线技术 wireless technology

( 31 )bank account 银行账户

( 32 )信用卡 credit card

( 33 )电子支付系统 electronic data interchange

( 34 )web navigation 网站导航

( 35 )导航系统 navigation system

( 36 )Mobile commerce 移动商务

( 37 )content provider 内容提供商

( 38 )移动商务 mobile commerce

( 39 )数字签名 digital signature

( 40 )订单处理系统 order processing system

( 41 )库存状态 inventory status

( 42 )voice recognition andsynthesis 语音识别和合成

( 43 )办公自动化 office automation

( 44 )字处理程序 Word processing program

( 45 )电子表格程序 spreadsheet program

( 46 )distance education 远程教育

( 47 )电子通信 electronic communication

( 48 )cognitive science 认知科学

( 49 )语音识别 speech recognition

( 50 )人工智能 artificial intelligence

选择

( 1 ) The CPU can also retrieve information from memory and can store the results      of manipulations back into the    B    for later reference.

A.ALU

B.memory unit

C.register

D.I/O device

( 2 )    C     is the functional unit that provides the computer with logical and computational capabilities.

A.The control unit

B.Memory

C.The Arithmetic / Logic Unit

D.Register

( 3 )   D     is used to keep track of which instruction fetch so that it will fetch the next instruction in sequence.

A.Register

B.Controller

C.Storage unit

D.Program counter

( 4 ) The clock rate set by the system clock determines the      A      at which the computer can execute an instruction.

A.speed

B.amount

C.complexity

D.number

( 5 ) The     A      are usually located at the top of the keyboard and they are used to give the computer commands.

A.function keys

B.arrow keys

C.numeric keys

D.special-purpose keys

( 6 ) The    A     is the measure of how much space there is between a display's pixels.

A.dot pitch

B.scan style

C.solution

D.refresh rate

( 7 ) The     B     is the number of times that the image on the display is drawn each second.

A.rate

B.refresh rate

C.solution

D.pixel

( 9 ) To facilitate execution of I/O operations, most    A     have a standard set of control instructions to handle the processing of all input and output instructions.

A.operating systems

B.software

C.system data

D.I/O system

( 10 ) When operating systems are coded in a   D    , this even permits code sharing across operating systems.

A.natural language

B.machine level language

C.low level language

D.high level language

( 11 ) Data structures organize data in ways that make    C   more efficient.

A.data

B.instruction

C.algorithms

D.memory

( 12 ) An executable program is a sequence of extremely simple    C     known as machine code.

A. commands

B.information

C.instructions

D.high-level code

( 13 ) The     B     receives the request, and checks it for syntax errors.

A.MIS                                                                                                                                                 

B.DBMS

C.database

D.administrator

( 14 ) The    C      must retrieve each of the required physical records and construct the logical view of the data requested by the user.                                                                                                   

A.data processor

B.database

C.DBMS

D.MIS

( 15 ) Big data analysis requires a cloud-based solution—a networked approach capable of keeping up with the accelerating volume and speed of    A     .           

A.data transmission

B.information

C.data

D.data storage

The name cloud computing was inspired by the cloud symbol that is often used to represent the Internet in flow charts and diagrams.

( 16 ) Computers that are part of a     D    can share data, messages, graphics, printers, fax,mchines, modems, CD-ROMs, hard disks, and other data storage equipment.

A.system

B.unit y

C.structure

D.network

( 17 )   C    is responsible for programming and maintaining a large multi-relational database in a networked environment.

A. Administrator

B.Data processor

C.Database administrator

D. Programmer

( 18 ) Cryptanalysis is the science of breaking the cipher, i.e., discovering the substance of the message behind its    B    .                      

A.cover

B.disguise

C.truth

D.reality

( 19 ) Active attacks include altering     A    ,masquerading as some else,denial of service, and planting viruses.

A.message contents

B.data

C.statements

D.commands

( 20 ) Users piggybacking on your      A      might use up your bandwidth and slow your connection.

A.Internet connection

B.password

C.usename

D.network

( 21 ) The characteristics of electronic commerce that distinguish it from    A     are the means used for conveying information and the methods used for processing it.

A.traditional commerce

B.modern commerce

C.newer commerce

D.computer-based commerce

( 22 )   B     plays a major role in shaping our experiences on the web.

A.Page layout

B.Web navigation

C.Program

D.Database

( 23 ) On the web, the duration of time spent on a page is typically measured in  C .  

A.minutes

B.hours

C.seconds

D.milliseconds

Mobile commerce is an effective and convenient way to deliver electronic commerce to consumers from anywhere and at anytime.

( 24 ) Consumers need to feel    C     that they will not be charged for services they have not used.

A.afraid

B.comfortless

C.comfortable

D.sorry

( 25 )There are a number of different dimensions to   B    each corresponding to a

different class of threat or vulnerability.

A.network

B.network security

C.electronic commerce

D.mobile commerce

( 26 )  A    is the set of activities necessary to make the correct goods ready for shipment to the customer—right up to the point where warehousing assembles the order.

A.Order processing

B.Reports processing

C.Outputs processing

D.Information processing

Office Automation (OA) is the application of computer and communications technology to improve the productivity of clerical and managerial office workers.

Graphics—Information that may be in the form of numbers and words, then keyed into a computer and displayed on a screen in a graph, chart, table, or other visual  form that makes it easier to understand.

omputer-based approaches to education can enhance almost all other forms of distance education.

( 27 ) The ability for    A     to conduct research without leaving their homes is changing the way that educational institutions structure research.

A.students

B.programmers

C.users

D.manager

( 28 ) The difference between robots and machinery is the presence of     A    .                 

A.autonomy, flexibility and precision

B.autonomy

C.flexibility

D.precision

( 29 ) With computers becoming more and more powerful, interfacing home robots with your computer will become a reality, and    D      will disappear.

A.homework

B.task

C.work

D.housework

判断

( 1 )As computer network facilitates information exchange in a speedy and expensive  way.(F)

( 2 )Electronic payments offer a more costly and more efficient alternative.(F)

( 3 )Credit cards are the preferred method of payment among traditional consumers.(F)

( 4 )Smart cards containing an IC are sometimes called Integrated Circuit Cards.(T)

( 5 )Internet now penetrates into almost every corner of the world.(T)

( 6 )In electronic commerce, users of different types and on different tiers can realize  different targets in trade.(T)

( 7 )Showing the position of a page withi a site by highlighting its category in the navigation helps orient visitors to their location.(T)

( 8 ) Before beginning to design web navigation, you should take time to investigate how people look for information.(T)

( 9 )A common tactic in navigation design is to cluster options, grouping like items together to provide layers of focus.(T)

( 10 )When navigating your site, visitors should not be informed about what's going  on. (F)

( 11 ) Navigation should be "visible” to the user.(F)

( 12 )Links are text or graphics in one page that connect to another page or a different location within a single page.(T)

 

 

  • 翻译

1. machine instructions机器指令

2.instruction register指令寄存器

3.程序计数器program counter

4.storage device volume存储设备容量

5.软件中断software interrupt

6.standard keyboard标准键盘

7. numeric keypad数字键盘

8.function keys功能键

9. context switching上下文转接,任务切换

10.应用程序application program

11.资源分配 resource allocation

12. stack and queue栈和队列

13.数据类型data type

14.抽象数据类型abstract data type

15.高级语言high-level languag

16.面向对象编程object-oriented programming

17.Management information system 管理信息系统

18.关系结构 relational structure 

19.决策支持系统decision support system

20.数据仓库data warehouse

21.操作数据operation data

22.海量存储技术mass storage technology

23.数据挖掘data mining

25.云计算cloud computing

26.私有云private cloud

27.公有云public cloud

28.移动电话mobile phone

29.大数据big data

30.网络管理员network administrator

31.局域网local area network

32.物理拓扑physical topology

33.访问控制access control

34.攻击预防attack prevention

35.随机数据流random data stream

36.access point cell接入点单元

37.无线技术wireless technology

38.信用卡credit card

39.电子支付系统electronic payment system

40.web navigation网站导航

41.导航系统navigation system

42.content provider内容提供商

43.移动商务mobile commerce

44.电子钱包electronic wallet

45.订单处理系统order processing system

46.库存状态 inventory status

47. voice recognition and synthesis语音识别和合成

48.办公自动化 office automation

49.字处理程序word processing program

50电子表格程序spreadsheet program

51. distance education远程教育

52.点对点 peer-to-peer

53.cognitive science认知科学

54.语音识别speech recognition

55.人工智能artificial intelligence

56.virtual memory  虚拟内存

57.souce code   源代码

58.内核  kernel                            

59.同步的    synchronous

60.非同步的  asynchronous                 

61.命令行    command line

62.graphical tools  图形工具 

63.汇编器    Assembler            

64.grammatical rule   语法规则 

65.抽象代码   abstract codes        

66.user-defined type   用户自定义类型  

67.context-free   无关的                    

68.binary tree  二叉树

69.algorithmic abstraction  抽象算法          

70.顺序存储结构  Sequential storage structure

71.链式存储结构  Chain storage structure

72.概念模式  Conceptual schema                       

73.syntax error  语法错误

74.数据处理语言   DPL(Data processing language)                       75.user-request   用户请求

76.决策支持系统         Decision support system

77.事物级系统           Object level system

78.marketing strategy     营销策略              

79.决策树  decision tree   

80.数据挖掘  data mining             

81.risk management  风险管理

82.海量存储技术  Mass storage systems

83.计算      cloud computing         

84.私有云  Private Cloud

85.virtual server instance   虚拟服务器实例    

86.公有云  Public Cloud

87.shared service  共享服务

88.frequency transmission 无线电频率传输   

89.无线技术 Wireless technology

90.infra-red device   红外线装置         

91.电磁波 electromagnetic wave 

92.恶意程序   Malicious Procedures  

93.sensitive information  敏感信息

94.接入点    Access Point       

95.路由器    Router

96.service violation  服务违规

97..移动商务   移动商务                 

98.智能卡    smart card         

99.mobile station    移动基站              

100.mobile marking  移动营销

101.ILIS    集成物流信息系统      

102.库存状态  inventory status

103.数字签名   digital signature

104.static allocation  静态分配

105.dynamic allocation 动态分配

106.preemption先占

107.scheduling安排

107.原子数据类型 atomic data type       

108.结构化数据类型  structured data type

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

选择

  1. The CPU can also retrieve information from   memory
  2.  is the functional unit that provides the       The Arithmetic/Logic Unit
  3.  is used to keep track of which instruction     Program counter 
  4. The clock rate set by the system clock         speed 
  5. When power is removed, information in the      B.lost
  6. The     are usually located at the top of the       A. function keys
  7. The    is the measure ofhow much space there   A.dot pitch

9.  The    is the number of times that the image on в. refresh rate

10. To facilitate execution of I/0 operations, most       A.operating systems 

11. When operating systems are coded in a, this even p  D.high level language

12.  Data structures organize data in ways that make   C.algorithms

13. An executable program is a sequence of extremely   C.instructions

14. The     receives the request, and checks it for s    B.DBMS

15. The    must retrieve each of the required physical   C.DBMS

16. Data mining applies algorithms, such as decision    B.contents  

17. Big data analysis requires a cloud-based          A.data transmission

18. A switched may be so fine grained it has only one    D.LAN

  1. Cryptanalysis is the science of breaking the cipher,  B.disguise

20. Active attacks include altering           A.message contents

21. Users piggybacking on your     might use  A.Internet connection

22.The characteristics of electronic commerce   A.traditional commerce

23.      Llays a major role in shaping our    B.Web navigation

24.On the web, the duration of time spent on     C.seconds  

25. A        implements an application     A.network provider

26. Consumers need to feel        that they   D.sorry

27.         is the set of activities necessary to   A.Order processing  

28. The ability for      to conduct research      A.students

29. The difference between robots and machinery    A.precision

30.The _________ is the number of times that   D.refresh rate

31.A modem is used to____A. change incoming analog signals to digital signals

32.To facilitate execution of I/O operations ,most_______ A.operating systems 33.Dependce on ______ is caused by the need   D.architectural features

34.When operating systems are coded in a __________,D.high level language

35.______ may bear no relation to any given A.A high-level programming language

36.Data structures organize data in ways that make ____ more   C.algorithms

37.The _____ must retrieve each of the required    C.DBMS

38.In case of a decentralized organization,   C.non-homogeneous distributed

39.Cloud resources are usually not only shared by_____  A.multiple users

40.With the ___ topology ,two or more topologies are    C.hybrid

41.When no modification has taken place,the information  B.preprocessing

42.The frequencies in the RF band cover a significant portion  C.9

43.There are a number of different dimension to ______,B.network security

44.There are many kinds of digital money,or electronic token  C.real-time

45.Some electronic-check softeware can provide e-wallets  D.bank account

46.________  processing is the set of activities necessary   A.Order

47.In the "laws of thought " approach to artificial intelligence,D.correct inferences

48.On the web,the duration of tiem spent on a page is typically  C.second

49.Consumers need to feel______ that they will not be   D.sorry

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

判断

1.As computer network facilitates information exchange in a speedy and expensive way.  F

2. Electronic payments offer a more costly and more efficient alternative.  F

3. Credit cards are the preferred method of payment among traditional consumers   F

4.Smart cards containing an IC are sometimes called Integrated Circuit Cards.  T

5.Internet now penetrates into almost every corner of the world.  T

6.In electronic commerce, users of dffrer types and on diferen tiers can  T

7.Showing the position of a page within a site by highlighting    T

8.Before beginning to design web navigation, you should take time   T

9.A common tactic in navigation design is to cluster options, grouping like    T

10. When navigating your site, visitors should not be informed about what's going on.  T

11. Navigation should be "visible" to the user.   F

12.Links are text or graphics in one page that connect to another page or a different   T

T 13.An OS can not use a resource table as the central data structure allocation.

T 14.C++ is a marriage of the low-level with the high-level.

F 15.Assembly languages have the same structure and set of commands as high-level

T 16.Abstraction means hiding neccessary details.

F 17.Algorithms and data structures can not be specified in any adequately precise

T 18.Any operating system is designed to organize data to suit a specific purpose.

F 19.Operation data is not  the highly structured sets of informaition that support the ongoing and

T20.Platform as a Service in the cloud is defined as a set of software and product development

T21.A LAN is a homogenous entity.

T 22.A bridge knows what network addresses are .

F 23.A routed LAN has a very fast,multi-port bridge called a "switch" or "switch

T 24.Measures put in place to minimize security risks today will need to be upgraded in the future.

T 25.Different security mechanisms can be used to enforce the security properties defined in a

F 26.IT and network staff may not need to install additional authentication process that only

F 27.The identity of a user is dtermined by an initial authentication process that only requires a

F 28.The identity of a user is dtermined by an initial authentication process that only requires a

T 29..In a Bluethooth network,the master of the piconet controls the changing network topologies

T 30.Wireless networks serve as the transport mechanism between devices and among devices and

T 31.Wireless access  points can announce their presence to wirless-enabled computer.

F 32.Access point devices typically have coverage areas of up to 500 feet.

F 33.Wardrivers often note the location of secured wireless networks and publish thees

T 34.Showing the position of a page within a site by highlighting its category in the navigation

T 35.Showing the position of a page within a site by highlighting its category in the navigation

T 36.A common tactics in navigaton design is to cluster options ,grouping like items together to

F 37.When navigation your site,visitors should not be informed about what's going on .

F 38.Navigation should be "visible" to the user.

F 39.A study of the top 400 mobile firms by sales indicates that 75% of mobile commerce is for

T 40..Entertainment has always played a crucial role in Internet application and is probably the

T 41.It is a short number of steps from owning a smart phone or tablet,to searching for products

T 42.Commerce is the exchange or buying and selling of commodities on a large scale involving

F 43.Compared to an electronic commerce system,a mobile commerce system is not much more

T 44.Mobile commerce is possible mainly because of the availability of wireless network.

T45.Peak logistics efficiency and effectiveness demand a superior integrated logistics information

T 46.Software, on the other hand, does not wear out  

T 47.Acquiring this understand of modification  can be a difficult task even when the software is

T 48.It is a well-established principle that the best structure for a large software system is a

T 49.Many of these errors may go undetected for the life of the system, but others may cause

T 50.development process of a large software system  in a strictly sequential manner  is now

T 51.To develop a large software system is to solve a problem.

T 52.creative problem solving seeks a nonstructured  environment  one can drop previous plans

T 53.the top-down methodology,In this manner, a complex problem becomes a collection of

T 54.The result of top-down design tends to be a hierarchical system of refinements that often

T 55.A system is rational if it does the right thing.

T. 56.The Turing Test,was designed to provide a satisfactory operational definition of intelligence.

F 57.Thinking rationally means acting so as to achieve one's goals,given one's beliefs.

T 58.One of the first expert systems was MYCIN in 1974,which diagnosed bacterial infections

T 59.. in the 1990s,computer speech recognition reached a practical level for limited purposed.

T 60.Most of artificial intelligence will eventually lead to robotics.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

填空

1.Operating systems can use ____virtual_____ memory to run __processes_____

2.Linux is open. This means that all programmers and users can have__access to__  the source code  as well as the right to ___ modify___  it.

3.These CD/floppy disk also provide g tools to __ install__the system  configure__

4.Computer Programs that can be run by a compu system are called __executables__.

5.Machine code instructions are _binary__,that is ,sequence of bits.

6.When the engineer uses the resistor,he need know  about the _ internal state__

7.A database is __logically__ coherent of data with some _ inherent__  meaning.

8.A __ relational___structure is made up of many tables.

9..The _effectiveness__ of the data warehourse application intensifies especially when the operational data _ resides__in distrbuted,non-homogenous systems and replace mannual data _gathering__ and reconciliation procefures.

10.Data warehouses often contain capabilities to _ remodel___the data. __views_

11..Part of the task of a warehouse is to _perform__ schema integration,and to __ convert__ date to the _integrated__ schema before they are stored.

12.The enormous growth of data has _coincided___ with the development of the "cloud",which is really just a new _alias___ for the global Internet.

13.Users want fast ___ response____ times and__immediate______results,especially in the largest and most __ complex__ web-based business environmentsp

14.A group of computers and other devices connected together is called a __network__,and the technical concept of __connected____ computers__sharing__

15.__ Database administrator__ is responsible for programming and maintaining a

16..Active attacks include __ altering__ message contents, masquerading as someone else,_ denial__ of service  and planting__viruses__.

17.A _firewall__ is an important access control system at the network layer.

18.The original message is called _plaintext___.message_ciphertext__.

19.WLANs allow greater _flexibility__ and _portability__ than do traditonal wired

20..Malicious users may be able to  _access__ files on your computer,_install___spy  

21.Web navigation design is about _linking__.

22.A common goal in _ navigation_ design is to ceate effortless _ interaction__ with information.

23.Mobile commerce is an _ effective__ and convenient way to _deliver__ electronic

24.Be__consistent__ is a primary guideline of interface design.

25.A __ content_ provider implement an application by providing two sets of

26..The __elimination___ of such errors is one of the goals of software engineering.

27.The advanced _encryption__ and authentication system can make _digital__

28..The stages within t phasethe__analysis___,___design__,__implementation___,

30.if one approaches the design task from the object-oriented perspective, modules are seen as _objects__and the design process becomes that of identifying the_entities__ (objects) in the proposed system as well as how these entities should

31..The difference between robots and  _autonomy_,_flexibility  and _ precision_

 

 

未知

1.A database is designed, built, and populated with data for a specific purpose." It has anintended group of users and some preconceived applications in which these users are interested.

2. A database management system is a collection of programs that enables users to create andmaintain a database (Fig. 4-1). The DBMS is hence a general-purpose software system thatfacilitates the processes of a defining, constructing, and manipulating database for variousapplications. Defining a database involves specifying the types of data to be stored in the database,along with a detailed description of each type of data. Constructing the database is the process ofstoring the data itself on some storage medium that is controlled by the DBMS. Manipulating adatabase includes such functions as querying the database to retrieve specific data, updating thedatabase to reflect changes in the mini-world, and generating reports from the data.

3. Big data analysis requires a cloud-based solution- -a networked approach capable of keepingup with the accelerating volume and speed of data transmission. This means that clusters of serversand software such as Hadoop and enterprise control language (ECL), which help find hiddenmeaning in large amounts of data, are distributed throughout the cloud on high-bandwidth cables.Using the cloud-based approach, a Google marketing analyst may be sitting in Silicon Valleyinputting information requests, but the data is being processed simultaneously in Tokyo, Amsterdamand Austin, Texas.

4.The name cloud computing was inspired by the cloud symbol that is often used to represent theInternet in flow charts and diagrams. Clouds can be classified as public, private or hybrid.Businesses often use applications available in the public cloud; they also frequently create a privatecloud just for data and applications belonging to their company.

5. Mobile commerce is an effective and convenient way to deliver electronic commerce to consumers fromanywhere and at anytime. Realizing the advantages to be gained from mobile commerce, many major companies have begun to offer mobile commerce options for their customers.

6.Compared to an electronic commerce system, a mobile commerce system is much morecomplicated because components related to mobile computing have to be included.I The followingoutline gives a brief description of a typical procedure that is initiated by a request submitted by amobile user.

7.Office Automation (OA) is the application of computer and communications technology to improve the productivity of clerical and managerial office workers. In the mid-1950s, the term wasused as a synonym for almost any form of data processing, referring to the ways in whichbookkeeping tasks were automaled.

8. Graphics- - Information that, may be in the form of numbers and words, then keyed into acomputer and displayed on a screen in a graph, chart, table, or other visual form that makesit easier to understand.

9. Computer-base approaches to education can enhance almost all other forms of distance education.

 

 

 

 

第一周
计算机处理的数据形式有哪些?

采用的二进制存储式信息

The types of computer that you know 

超级计算机 大型机 工作站 微机 微控制器(单片机)

No work can be done without energy.此句采用何种语态?如何翻译?

被动语态

没有能量就不能做工

过去分词在句子中的作用

Given the voltage and current, we can determine the resistance.

做状语

给定电压和电流,我们可以确定电阻。

专业复合词

object-oriented

market-oriented

process-oriented

面向对象的

以市场为导向

面向流程的

 

翻译下列复合词
-based基于,以……为基础 以。。。。为中心
rate-based client-centric 
credit-based user-centric 
file-based host-centered 
-ware 件(部件) 
hardware 
software 
firmware 
groupware 
freeware

101

基于速率 以客户为中心
基于信用 以用户为中心
基于文件 以主机为中心
硬件
软件
固件
组件
免费软件

试着分析 翻译长句。
Factories will not buy machines unless they believe that the machine will produce goods that they are able to sell to consumers at a price that will cover all cost.

工厂不会购买机器,除非他们相信机器能够生产出他们能够以能覆盖所有成本的价格卖给消费者的产品。

翻译长句
ex1
Increased cooperation with China is in the interests of the United States.

ex 2
China is a large country with four-fifths of the population engaged in agriculture, but only one tenth of the land is farmland, the rest being mountains, forests and places for urban and other uses.(合译法)

101

加强与中国的合作利与美国的利益。
中国是一个大国,五分之四的人口从事农业,但是只有十分之一的土地是农田,其余的是山、森林和城市及其他用途的地方。

第二周
What"s the cpu and functions of CPU?
中央处理器

1.处理指令2.执行操作3.控制时间4.处理数据

What does an instruction include?
一条指令包括两个内容:操作码和操作数

What's the meaning of 'A' and 'L' in ALU?
A stands for :
L stands for:

Arithmetic:算术运算。

logic:思维方式;解释方法;逻辑。

What's the PC and IR?

我的答案:

PC是程序计数器,其功能是存放当前欲执行指令的地址,并可自动计数形成下一条指令地址。

IR是指令寄存器,其功能是存放当前正在执行的指令。

The performance factor of CPU?
时钟频率 字长 高速缓存

What's the difference between ROM & RAM?
RAM:随机存取存储器,可读可写,断电后信息丢失
ROM:只读存储器,掉电保护,数据不丢失

地址线条数是n,可寻址的最大单元数量是多少?
2n

How many addresses and bits of a cell on 64*8RAM Chip? 
2的19次方位,128个地址

第三周
1【单选题】

 

 The _________ is the number of times that the image on the display is drawn each second.

A、
dot pitch 

B、
scan style

C、
solution

D、
refresh rate

我的答案:D

resolution pixel 是指什么?

分辨率像素

1【单选题】


A modem is used to____

A、
 change incoming analog signals to digital signals and outgoing digital signals to analog signals

B、
connect two computers using a satellite uplink

C、
connect a computer to a shared printer.    

D、
 None of above

我的答案:A

1【填空题】

Operating systems can use _________ memory to run _______ that require more main memory than is actually available

我的答案:

第一空: 

virtual

第二空: 

processes

How many states of a process?
Ready, running, blocking

1【判断题】

An OS can not use a resource table as the central data structure allocation.

我的答案:×

Translate:static allocation ;dynamic allocation?

静态分配 动态分配

1【口语题】

Deciding which program should be given the CPU and for how long is a critical function. This function is called CPU scheduling, or simply scheduling.

我的答案:
决定哪个程序应该被赋予CPU和多长时间是一个关键的功能。这个函数称为CPU调度,或简单的调度。

translate:preemption,scheduling
先占

安排

1【单选题】

To facilitate execution of I/O operations ,most_______ have a standard set of control instructions to handle the processing of all input and output instrucitons.

A、
operating systems

B、
software

C、
system data

D、
I/O system

我的答案:A

选择已完成
1【单选题】

Dependce on ______ is caused by the need to exercise complete control over all functional units of the system.

 

A、
OS

B、
software feature

C、
architecture

D、
architectural features

我的答案:D

2【单选题】

When operating systems are coded in a __________,this even permits cide sharing across operating system.

A、
natural language

B、
machine level language

C、
low level language

D、
high level language

我的答案:D

第四周
Can you try to find severa words to express the differences ?
stable and security,copyright,free,

linux is open

1【填空题】

Linux is open. This means that all programmers and users can have__________  the source code  as well as the right to ________  it. 

These CD/floppy disk  also provide  graphical tools to ______the system and ______it.

 

我的答案:

第一空: 

access to

第二空: 

modify

第三空: 

install

第四空: 

configure

翻译:virtual memory; souce code;内核;同步的(单号)

虚拟内存;源代码;kernel;Synchronous

翻译:非同步的;命令行;graphical tools;(双号)

asynchronous;command line;图形工具

1【填空题】


Computer Programs that can be run by a computer's oprating system are called ________

Machine code instructions are ______,that is ,sequence of bits

我的答案:

第一空: 

executables

第二空: 

binary

翻译:汇编器,grammatical rule(单号);

Assembler ,语法规则

翻译:抽象代码,user-defined type(双号)

abstract codes ,用户自定义类型

discuss :features of high-level language
structure the program 
define data elements 
process data elements
control flow of program
allow input/output of data

判断已完成
1【判断题】


C++ is a marriage of the low-level with the high-level

我的答案:√

2【判断题】

Assembly languages have the same structure and set of commands as high-level languages

我的答案:×

 翻译:封装,数据隐藏

encapsulation, Data hiding

1【单选题】


______ may bear no relation to any given computer but does assume that a computer is going to be used.

A、
A high-level programming language

B、
Machine language

C、
A low-level programming language

D、
Assembly language

我的答案:A

2【填空题】
When the engineer uses the resistor,he need know nothing about the ______ of the resistor.

我的答案:

第一空: 

internal state

(单号)Translate: context-free, binary tree, algorithmic abstraction

无关的 二叉树 抽象算法

(双号)翻译:顺序存储结构;链式存储结构

顺序:Sequential storage structure

链式:Chain storage structure

1.common organizations of data structure have _____?
数组 (Array)
栈 (Stack)
队列 (Queue)
链表 (Linked List)
树 (Tree)
图 (Graph)
堆 (Heap)
散列表 (Hash)

 2.区别: 顺序存储结构 及 链式存储结构?

链式存储结构的内存地址不一定是连续的,但顺序存储结构的内存地址一定是连续的
链式存储适用于在较频繁地插入、删除、更新元素时,而顺序存储结构适用于频繁查询时使用。

1【单选题】
Data structures organize data in ways that make ____ more efficient.

A、
data

B、
instruction

C、
algorithms

D、
memory

我的答案:C

判断已完成
1【判断题】
Abstraction means hiding neccessary details.

我的答案:×

2【判断题】
Algorithms and data structures can not be specified in any adequately precise language.

我的答案:×

3【判断题】

Any operating system is designed to organize data to suit a specific purpose

我的答案:×

翻译:原子数据类型;结构化数据类型

原子数据类型:atomic data type

结构化数据类型:structured data type

1【填空题】

A database is ______ coherent of data with some _____  meaning.

我的答案:

第一空: 

logically

第二空: 

inherent

第五周
翻译:概念模式;syntax error(单号);数据处理语言,user-request(双号)

数据处理语言DPL(Data processing language)概念模式(Conceptual schema)

Choose已完成
1【单选题】


The _____ must retrieve each of the required physical records and construct the logical view of the data requested by the user.

A、
data processor

B、
database

C、
DBMS

D、
MIS

我的答案:C

1【填空题】


A _________structure is made up of many tables

我的答案:

第一空: 

relational

 the difference tree and network structure?
网络结构(Network Structure)指计算机网络的结构。
树形结构(Tree Structure)是一层次的嵌套结构。

Tranlsate :决策支持系统,事务级系统

决策支持系统:Decision support system

事物级系统:Object level system

第六周
1【填空题】

The ____ of the data warehourse application intensifies especially  when the operational data _____in distrbuted,non-homogenous systems and    replace mannual data ______ and reconciliation procefures.

我的答案:

第一空: 

effectiveness

第二空: 

resides

第三空: 

gathering

6.2.3Choose已完成
1【单选题】

In case of a decentralized organization,operational data is generated at remote location sometimes in ___________system.

A、
homogeneous distributed

B、
non-homogeneous

C、
non-homogeneous distributed

D、
homogeneous

我的答案:C

1【填空题】

Data warehouses often contain capabilities to ______the data.A relational databse allow __________of data into two dimensions.

我的答案:

第一空: 

remodel

第二空: 

views

6.2.5Fill已完成
1【填空题】

Part of the task of a warehouse is to _____ schema integration,and to _________ date to the _____ schema before they are stored.

我的答案:

第一空: 

perform

第二空: 

convert

第三空: 

integrated

6.2.5Judge已完成
1【判断题】

Operation data is not  the highly structured sets of informaition that support the ongoing and day-to-day operation of an organization.

我的答案:×

Translation:marketing strategy, 决策树,数据挖掘(单号)

营销策略,decision trees,data mining

translation:risk management; 海量存储技术,数据挖掘(双号)

风险管理,Mass storage systems,data mining

第七周
1【填空题】

The enormous growth of data has ______ with the development of the "cloud",which is really just a new _____ for the global Internet.

我的答案:

第一空: 

coincided

第二空: 

alias

2【填空题】

Users want fast ___________ times and ________results,especially in the largest and most ____ web-based business environments, operating at Internet speed.

我的答案:

第一空: 

response

第二空: 

immediate

第三空: 

complex

7.2 Judge && FIll已完成
1【填空题】

Big data analysis requires a cloud-based solution-a networked approach capable of keeping up with the _____ volume and speed of data __________.

我的答案:

第一空: 

第二空: 

2【判断题】

The largest companies making the most sophisticated industrial equipment are now able to go from merely detecting equipment failures to predicting them.

我的答案:√

3【判断题】

Businesses are interested in  big data because they contain more patterns and interesting anomalies than smaller data sets.

我的答案:√

 

7.3 Choose已完成
1【单选题】

Cloud resources are usually not only shared by_____ but are also dynamically reallocated per demand.

A、
multiple users

B、
single user

C、
big data

D、
cloud computing

我的答案:A

Translate:云计算,私有云,virtual server instance(单号)

cloud computing,Private Clouds, 虚拟服务器实例

Translate:公有云,云计算,shared services(双号)

Public cloud, cloud computing, 共享服务

7.4 Judge已完成
1【判断题】


Platform as a Service in the cloud is defined as a set of software and product development tools hosted on the provider's infrastructure

我的答案:√

第八周
1【填空题】

A group of computers and other devices connected together is called a ________,and the technical concept of __________ computers_____________resources is called networking.

正确答案:

第一空: 

 

network

 

 

 

第二空: 

 

connected

 

第三空: 

sharing

我的答案:得分: 100.0分

第一空: 

network

第二空: 

connected

第三空: 

sharing

8.1.3Judge已完成本次成绩:100
最高成绩:100

1【判断题】

A LAN is a homogenous entity.

正确答案:√ 我的答案:√得分: 33.3分

2【判断题】

A bridge knows what network addresses are on each side of it.

正确答案:√ 我的答案:√得分: 33.3分

3【判断题】

A routed LAN has a very fast,multi-port bridge called a "switch" or "switch hub".

正确答案:× 我的答案:×

8.1.4Fill已完成本次成绩:100
最高成绩:100

重做 还可以重做1次

1【填空题】

__________________ is responsible for programming and maintaining a larege multi-relational database  in a networked environment.

正确答案:

第一空: 

Database administrator

我的答案:得分: 100.0分

第一空: 

Database administrator

8.1.5Choose已完成本次成绩:100
重做 还可以重做1次

1【单选题】

With the ___ topology ,two or more topologies are combined to form a complete network.

A、
bus

B、
ring

C、
hybrid

D、
network

正确答案: C 我的答案:C

LIst the topology structure of network?
star network
grid network
bus network
ring network
hybrid network

1【填空题】

Active attacks include ______ message contents, masquerading as someone else,_____ of service  and planting_______.

我的答案:

第一空: 

altering

第二空: 

denial

第三空: 

viruses

8.2.2Judge已完成
1【判断题】

Measures put in place to minimize security risks today will need to be upgraded in the future.

我的答案:√

2【判断题】

Different security mechanisms can be used to enforce the security properties defined in a given security policy.

我的答案:√

3【判断题】

IT and network staff may not need to install additional authentication process that only requires a name.

我的答案:×

8.2.3已完成本次成绩:100
最高成绩:100

作答记录

1【填空题】

A _____ is an important access control system at the network layer.

正确答案:

第一空: 

firewall 

我的答案:得分: 33.3分

第一空: 

firewall

2【判断题】

The identity of a user is dtermined by an initial authentication process that only requires a name.

正确答案:× 我的答案:×得分: 33.3分

3【判断题】

A password is an important access control system at the network layer.

正确答案:× 我的答案:×

8.2.4已完成本次成绩:100
最高成绩:100

1【单选题】

When no modification has taken place,the information at the receiver is identical to the one at the sender before the ____ step.

A、
post-processing

B、
preprocessing

C、
processing

D、
first

正确答案: B 我的答案:B得分: 50.0分

2【填空题】

The original message is called ______.The corresponding disguised message is denoted as ______.

正确答案:

第一空: 

plaintext

第二空: 

ciphertext

我的答案:得分: 50.0分

第一空: 

plaintext

第二空: 

ciphertext

第九周
Translate:radio frequency transmission, 无线技术(单号)

无线电频率传输Wireless technology

Translate:infra-red device , 电磁波(双号)

红外线装置electromagnetic wave

9.1.2wireless已完成本次成绩:100
最高成绩:100

1【单选题】

The frequencies in the RF band cover a significant portion of the electromagnetic radiation spectrum,extending from ______  kilohertz,the lowest allocated wireless communicaitons frequency,to thousands of gigahertz.

A、
6

B、
8

C、
9

D、
12

我的答案:C

9.1.3wireless已完成
作答记录

1【填空题】

WLANs allow greater _______ and _______ than do traditonal wired local area networks.

正确答案:

第一空: 

flexibility

第二空: 

portability

我的答案:

第一空: 

flexibility

第二空: 

portability

2【判断题】

In a Bluethooth network,the master of the piconet controls the changing network topologies of these networks.

正确答案:√ 我的答案:√

3【判断题】

Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks.

正确答案:√ 我的答案:√

9.1.4已完成
1【填空题】

Malicious users may be able to  _____ files on your computer,______spy  ware and other malicous programs,or   take control of your computer 

正确答案:

第一空: 

access

第二空: 

install

我的答案:

第一空: 

access

第二空: 

install

2【判断题】

Wireless access  points can announce their presence to wirless-enabled computer.

正确答案:√ 我的答案:√

3【判断题】

Access point devices typically have coverage areas of up to 500 feet.

正确答案:× 我的答案:×

9.1.5已完成本次成绩:100
最高成绩:100

重做 还可以重做1次

1【判断题】

Wardrivers often note the location of secured wireless networks and publish thees information on web sites.

正确答案:× 我的答案:×得分: 100.0分

主题讨论:Translate : 恶意程序 ,sensitive information(单号)

Malicious Procedures敏感信息

主题讨论:Translate:接入点 ,路由器,service violation(双号)

Access Point,Router,服务违规。

9.2.1已完成本次成绩:100
最高成绩:100

重做 还可以重做1次

1【填空题】

Web navigation design is about _______

正确答案:

第一空: 

linking

我的答案:得分: 50.0分

第一空: 

linking

2【填空题】

A common goal in _____ design is to ceate effortless ______ with information.

正确答案:

第一空: 

navigation

第二空: 

interaction

我的答案:得分: 50.0分

第一空: 

navigation

第二空: 

interaction

9.2.2已完成
重做 还可以重做1次

1【判断题】

Showing the position of a page within a site by highlighting its category in the navigation helps oreint visitors to their location.

我的答案:√

2【判断题】

Before beginning to design web navigation ,you should take time to investigate how people look for information.

我的答案:√

9.2.4已完成
重做 还可以重做1次

1【单选题】

On the web,the duration of tiem spent on a page is typically measured in ______

A、
minutes

B、
hours

C、
second

D、
milliseconds

正确答案: C 我的答案:C

2【判断题】

A common tactics in navigaton design is to cluster options ,grouping like items together to provide layers of focus.

正确答案:√ 我的答案:√

3【判断题】

When navigation your site,visitors should not be informed about what's going on .

正确答案:× 我的答案:×

9.2.5已完成本次成绩:100
重做 还可以重做1次 作答记录

1【填空题】

Be______ is a primary guideline of interface design.

正确答案:

第一空: 

consistent

我的答案:得分: 50.0分

第一空: 

consistent

2【判断题】

Navigation should be "visible" to the user.

正确答案:× 我的答案:×

第十周
1【填空题】

Mobile commerce is an ______ and convenient way to ______ electronic commerce to consumers from anywhere and at anytime.

我的答案:得分: 33.3分

第一空: 

effective

第二空: 

deliver

2【判断题】

A study of the top 400 mobile firms by sales indicates that 75% of mobile commerce is for retail goods.

我的答案:√得分: 0.0分

3【判断题】

Entertainment has always played a crucial role in Internet application and is probably the most popular application for the younger generation.

我的答案:√得分: 33.4分

10.1.2已完成本次成绩:100
重做 还可以重做1次

1【填空题】

A ______ provider implement an application by providing two sets of programs:client-side programs,such as user interface on a micro-browser,and server-side programs.

我的答案:得分: 50.0分

第一空: 

content

2【判断题】

It is a short number of steps from owning a smart phone or tablet,to searching for products and services,browsing,and then purchasing.

我的答案:√得分: 50.0分

10.1.3已完成本次成绩:100
重做 还可以重做1次

1【单选题】

Consumers need to feel______ that they will not be charged for services they have not used.

A、
afraid

B、
comfortless

C、
comfortable

D、
sorry

我的答案:C得分: 50.0分

2【单选题】

There are a number of different dimension to ______,each corresponding to a different class of threat of vulnerability.

A、
network

B、
network security

C、
electronic commerce

D、
mobile commerce

我的答案:B得分: 50.0分

10.1.4已完成本次成绩:66.7
作答记录

1【判断题】

Commerce is the exchange or buying and selling of commodities on a large scale involving transportation from place to place.

我的答案:√

2【判断题】

Compared to an electronic commerce system,a mobile commerce system is not much more complicated.

我的答案:×得分: 33.3分

3【判断题】

Mobile commerce is possible mainly because of the availability of wireless network.

我的答案:√得分: 33.4分

主题讨论:Translate:移动商务,智能卡,mobile station(单号)

mobile commerce

smart card

移动台

Translate:移动商务,智能卡,mobile marking(双号)

mobile commerce,smart card,移动标记

10.2.2已完成本次成绩:100
重做 还可以重做1次

1【单选题】

There are many kinds of digital money,or electronic token,which mainly could be classed into two categories:_______ payment mechanism and after payment mechanism.

A、
digital

B、
check 

C、
real-time

D、
credit card

正确答案: C 我的答案:C得分: 50.0分

2【填空题】

The advanced _______ and authentication system can make _____ money be used more safely and privately than paper money.

正确答案:

第一空: 

encryption

第二空: 

digital

我的答案:得分: 50.0分

第一空: 

encryption

第二空: 

digital

10.2.3已完成
重做 还可以重做1次

1【单选题】

Some electronic-check softeware can provide e-wallets for their customers,which also enable the cumstomers to write checks at any where even they have no _______

A、
money

B、
information

C、
digital cash

D、
bank account

正确答案: D 我的答案:D

Translate:ILIS ,库存状态(单号)

集成物流信息系统inventory status

Translate:ILIS ,库存状态(单号)

集成物流信息系统 digital signature

10.2.5已完成本次成绩:100
最高成绩:100

重做 还可以重做1次

1【单选题】

________  processing is the set of activities necessary to make the correct goods ready for shipment to the cumstomer-right to the point where warehousing assembles the order.

A、
Order

B、
Report

C、
Outputs

D、
Information

正确答案: A 我的答案:A得分: 100.0分

10.2.6已完成本次成绩:100
最高成绩:100

重做 还可以重做1次 作答记录

1【判断题】

Peak logistics efficiency and effectiveness demand a superior integrated logistics information system.

正确答案:√ 我的答案:√得分: 50.0分

2【判断题】

An ILIS gathers information from all possible sources to assist the integrated logistics manager in makeing decisions.

正确答案:√ 我的答案:√得分: 50.0分

第十一周
11.1.2已完成
重做 还可以重做1次

1【判断题】

Software, on the other hand, does not wear out

我的答案:√

2【判断题】

Acquiring this understand of modification  can be a difficult task even when the software is well-designed and documented.

我的答案:√

11.1.3已完成本次成绩:100
重做 还可以重做1次

1【填空题】

The stages within the development phase of the software life cycle are ________,_________,________,

,and testing and maintenance.

 

我的答案:得分: 100.0分

第一空: 

analysis

第二空: 

design

第三空: 

implementation

11.1.4已完成
重做 还可以重做1次

1【填空题】

if one approaches the design task from the object-oriented perspective, modules are seen as _______and the design process becomes that of identifying the________ (objects) in the proposed system as well as how these entities should behave.

我的答案:

第一空: 

objects

第二空: 

entities

2【判断题】

It is a well-established principle that the best structure for a large software system is a modular one. 

我的答案:√

11.1.5已完成本次成绩:100
重做 还可以重做1次

1【填空题】

The ________ of such errors is one of the goals of software engineering

我的答案:得分: 50.0分

第一空: 

elimination

2【判断题】

Many of these errors may go undetected for the life of the system, but others may cause major malfunctions. 

我的答案:√得分: 50.0分

11.2.1已完成
1【判断题】

 

development process of a large software system  in a strictly sequential manner  is now referred

to as the waterfall model.

 

 

我的答案:√

2【判断题】

To develop a large software system is to solve a problem.

我的答案:√

11.2.2已完成
作答记录

1【判断题】

creative problem solving seeks a nonstructured  environment  one can drop previous plans of

attack to pursue sparks of intuition without explaining why.

 

我的答案:√

 How to explain or understand to incremental model?

增量模型

11.2.5已完成
作答记录

1【判断题】

the top-down methodology,In this manner, a complex problem becomes a collection of simpler problems whose solutions collectively solve the original problem.

我的答案:√

2【判断题】

The result of top-down design tends to be a hierarchical system of refinements that often can be translated directly into a modular structure 

我的答案:√

第十二周
12.2已完成
重做 还可以重做1次

1【判断题】

A system is rational if it does the right thing.

我的答案:√

2【判断题】

The Turing Test,was designed to provide a satisfactory operational definition of intelligence.

我的答案:√

12.3已完成
1【单选题】

In the "laws of thought " approach to artificial intelligence,the whole emphasis was on _________

A、inferences
B、
incorrect  inferences

C、
wrong inferences

D、
correct inferences

我的答案:D

2【判断题】

Thinking rationally means acting so as to achieve one's goals,given one's beliefs.

我的答案:×

12.4已完成
1【判断题】

One of the first expert systems was MYCIN in 1974,which diagnosed bacterial infections of the blood and suggested treaments.

我的答案:√

2【判断题】

in the 1990s,computer speech recognition reached a practical level for limited purposed.

我的答案:√

12.5已完成
1【填空题】

The difference between robots and machinery is the presence of ___     _,______  and __________.

我的答案:

第一空: 

autonomy

第二空: 

flexibility

第三空: 

precision

2【判断题】


Most of artificial intelligence will eventually lead to robotics.

我的答案:√

 
 

你可能感兴趣的:(计算机期末复习)