2008计算机科学导论试题(c卷_第1页
2008计算机科学导论试题(c卷_第2页
2008计算机科学导论试题(c卷_第3页
2008计算机科学导论试题(c卷_第4页
2008计算机科学导论试题(c卷_第5页
已阅读5页,还剩6页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、西南程序设置 本程序只能在Office2003上运行(建议完全安装) 设置Word宏安全:工具-宏-安全性-低 关闭当前Word文档 再打开本文件大学 任课部门选择 任课教师所在部门 按拼音顺序排列 分两个选择框显示 在后框中选择时,前框中选空白项,反之既然. 计算机科学导论 课程 20082009学年 第学期期 考试时间120分钟考核方式学生类别人数适用专业或科类计算机与信息科学学院各专业年级2008 级题号合计得分签名阅卷须知:阅卷用红色墨水笔书写,得分用阿拉伯数字写在每小题题号前,用正分表示,不得分则在题号前写0;大题得分登录在对应的分数框内;统一命题的课程应集体阅卷,流水作业;阅卷后要

2、进行复核,发现漏评、漏记或总分统计错误应及时更正;对评定分数或统分记录进行修改时,修改人必须签名。特别提醒:学生必须遵守课程考核纪律,违规者将受到严肃处理。 命题须知 命题内容须以教学大纲规定的知识内容、能力培养以及相关的教学目标层次要求为依据,课程内容覆盖率80%。 在一般的闭卷笔试中,有关论述题、综合题、辨析题等考查较高能力层次的题型的分值应占有较大比例。 试题题意应清晰明确,文字应准确简练。 A、B两套考题在知识单元、题型、题量、难度和分值上必须相当。 同一门课程本次考题与上次考题以及A、B两套考题的题目重复率应10%。 每套考题一般应有四个以上题型。每大题题干后应注明小题数、分值和大题

3、总分。试题下面应留出答题空间。 试题题量一般应以在110分钟考试时间内做完为标准。 每套试题应有相应的参考答案与评分标准。一. Single Choice(30 Points)1. The most widely used handheld computer is . a) Minicomputer b) RAM c) PDA d) Modem2. The most widely used Web protocol is a) http:/ b) URL c) HTML d) ISP3. The two basic parts of URLs, the second part presents

4、 the name of the server, it is _. a) Client b) Server c) the domain named) the protocol4. Word processors and spreadsheets are examples of applications. a) special-purposeb) artificial intelligence c) multimediad) general-purpose 5. The term refer to criminals that are specialize in stealing, tradin

5、g, and using credit cards over the Internet . a) clients b) carders c) agents d) telneters 6. The largest network in the world is called the a) Internet b) Web c) WWW d) World Wide Web 7. General-purpose applications are also known as . a) software suites b) special-purpose applications c) advanced

6、applications d) basic applications 8. When you copy a paragraph from Word to a PowerPoint presentation, the Word document is the a) hyperlink b) OLE file c) source file d) destination file 9. In a relational database, data is organized into . a) fields b) tables c) rows d) records 10. A database fie

7、ld that uniquely identifies each record is called the .a) ID numberb) primary keyc) legendd) explanation field 11. In commerce, individuals typically sell to other individuals without ever meeting face-to-face. a) C2C b) B2C c) B2B d ) C2I 12. _ is a set of standard on the Internet allowing you to t

8、ransfer files.a) Plug and playb) Unicodec) FTPd) ISA13. is open source software free and available from many sources including the web. a) Linux b) Windows CE c) Mac OS d) Unix14. A occurs when the computer is already on, and you restart it without turning off the power. a) serviceb) cold bootc) hel

9、pd) warm boot 15. Bitmap images are also known as a) Raster images b) clip art images c) vector images d) multimedia images 16. The simulated experience where you can create and experience new forms of reality without actually being there is referred to as _. a) unstructured problems b) virtual real

10、ity c) VRML d) robotics 17. The microprocessor has two basic parts. _ controls the computer system how to carry out a programs instructions and directs the movement of data between memory. a) Control unitb) Arithmetic-logical unitc) Busd) Socket18. Many expert system use , which allows users to resp

11、ond to questions in a human way. a) packets b) fuzzy logic c) story boards d) vector images 19. The term _ refers to a standard that allows musical instruments to connect to the system unit.a) Instructionb) MIDI c) OMR d) Input devices 20. Most presentation graphics programs provide a(n) that steps

12、you through the process of creating a presentation. a) dialog box b) toolbar c) icon d) wizard 21. A(n) , also called a bus, connects the parts of the CPU together. a) adapter card b) serial port c) bus line d) parallel port 22. Random-access memory (RAM) is a kind of storage. a) permanentb) smart c

13、) temporary d)expansion 23. Firmware is also known as . a) ROM b) RAM c) Cache memory d) CMOS24. Speakers and headphones are the most widely used devices.a) audio input b) personal c) multifunction d) audio output25. Writing is the process of information. a) reading b) saving c) accessing d) produci

14、ng 26. Languages that can run on more than one kind of computer are called .a) Machine languagesb) Assembly languagesc) Portable languagesd) Query languages27. is a kind of binary coding scheme which is the most widely used binary coding scheme for microcomputer, uses 8 bits.a) ASCIIb) EBCDIDc) Unic

15、oded) Binary system28. When a program makes a true or false decision, it is an example of a(n) _ logic structure. a) what-if b) do if c) while d) if-then-else29. _ can connect web site to other documents containing related information.a) iconb) windowc) linkd) file30. The two variations of loop stru

16、cture are .a) DO NOW and DO LATERb) DO WHILE and DO DURINGc) DO NOW and DO UNTILd) DO WHILE and DO UNTIL二、Fill In The Blanks With The Given Terms(20 Points)a. resolutionb. wordc. telnetd. bus widthe. mousef. sectorsg. systemh. morphingi. multimediaj. assembly language k. writing l. RAID m. virtual m

17、emoryn. artificial intelligence o. plug and playp. hard copyq. search enginesr. system buss. protocol t. procedure1. _ _ software runs in the background and helps the computer manage its own internal resources.2. Each track is divided into wedge-shaped sections called _. 3. _ is a special effect in

18、which one image seems to melt into another.4. The number of bits that can travel simultaneously down a bus is known as the .5. _ _ is expressed as a matrix of these dots and pixels.6. is a set of hardware and software standards developed by Intel, Microsoft, and others. 7. Printer output is often ca

19、lled .8. . can control pointer and change its shape depending on its current function .9. is the process of saving information to secondary storage devices.10. attempts to develop computer systems that can mimic or simulate human senses, thought processes, and actions.11._ is one part of information

20、 system. Its the rules or guidelines for people to follow.12. _ is the number of bits that can be accessed at one time by the CPU.13. _ can improve the performance of external storage, connect several hard disks to one another by a network or within specialized devices.14. _ connects the CPU to memo

21、ry on the system board.15. _ (s) are rules for exchanging data between computers.16. _ is a Internet standard that allows you to connect to another computer (host) on the Internet and to log on to that computer.17. _ use abbreviations or mnemonics that are automatically converted to the appropriate

22、sequence of 1s and 0s.18. With _ , large programs are divided into parts and the parts stored on a secondary device, usually a hard disk.19. _ are specialized programs that assist you in locating information on the web and the Internet .20. A(n) presentation may include video, music, voice, graphics

23、, and text .三、True/False (20 Points) 1. The five parts of an information system are: people, procedures, software, hardware, and data. ( )2. A linked object will be change automatically when a change is made to the source file. ( )3. A file that is 1000 KB will fit on a traditional floppy disk. ( )

24、4. Image editor is used to editing vector images. ( )5. Stand-alone operating system is stored the ROM of the computer devices. ( )6. Data held in ROM will be lost in the event of a power outage. ( )7. The content of Flash RAM can be lost when the power of the computer is off. ( )8. Notebook compute

25、r can use battery to support its power. ( )9. Serial port sends data one bit at a time. ( )10. Discrete-speech recognition system is able to distinguish between same-sounding words. ( )11. SQL is a kind of high-level procedural languages. ( )12. Dpi is a measure of printer resolution. ( )13. Hard di

26、sk cartridge is stored in a hard plastic cover that is removed when the pack is mounted onto special drivers. ( )14. Disk caching improves processing by acting as a temporary high-speed holding area between I/O devices and CPU. ( )15. The most common input devices are the keyboard and the mouse. ( )

27、16. The best way to write good programs is to create unstructured programs. ( )17. A dumb terminal can process data independently. ( )18. C+ is an example of a machine language. ( )19. “Debugging” refers to the process of eliminating syntax and logic errors. ( )20. A programming language uses a coll

28、ection of symbols, words, and phrases that instruct a computer to perform specific operation. ( )四、Translate the Following Key Terms into Chinese(10 Points)1. CPU 2. File transfer protocol3. Expert system 4. OOP5. Domain name6. HTML7. Uninstall utility8. Network terminal9. Cache memory10. B2B11. Dro

29、p-down menu 12. URL 13. Electronic commerce14. Attachment15. DBMS16. File compression 17. Bus line 18. GUI19. Industrial robots20. Byte五、Complete the following conversions between different numbering systems.(6 Points)1()2=( )10=( )8= ( )162. (21.25)10=( )2 =( )8= ( )16 六、Fill in the Blanks (5 Point

30、s)1. The is a multimedia interface to resources available on the Internet.2. The database is the most widely used database structure.3. In a worksheet, a is a series of continuous cells.4. A software is a collection of application programs bundled together and sold as a group.5. Image , also known a

31、s paint programs, are programs for creating and editing bitmap images. 七、Translate the Following Paragraph into Chinese (9 Points)(1) Communication system (3 Points)Communication systems are the electronic systems that transmit data over communications lines from one location to another. You might u

32、se a wearable computer and a satellite communication system to access the Internet from almost anywhere. You might work for an organization whose computer system is spread throughout a building, or even throughout the country or world. Or you might use telecommunications linestelephone linesto tap i

33、nto information located in an outside data bank. You could then transmit it to your microcomputer for your own reworking and analysis.(2) Virus(3 Points)As many may have known, computer virus is a piece of malicious program, which is able to affect the normal operation of a computer system. When a v

34、irus strikes, the result ranges from merely annoying screen displays to disastrous and extensive data corruption. With the growing popularity of microcomputers, the threat of virus should definitely not be negligible. For example, a new type of virus, named “Marco Virus”, emerged into the computing world in 1995. Its ability to infect document files has broken the

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论