《 计算机科学导论 》课程
2018~2009学年 第学期 | 期 | |||||||||||||||||||||
考试时间 | 120分钟 | 考核方式 | 学生类别 | 人数 | ||||||||||||||||||
适用专业或科类 | 计算机与信息科学学院各专业 | 年级 | 2008 级 | |||||||||||||||||||
题号 | 合计 | |||||||||||||||||||||
得分 | ||||||||||||||||||||||
签名 |
特别提醒:学生必须遵守课程考核纪律,违规者将受到严肃处理。
一. Single Choice(30 Points)
1. The is one of the system software programs.
a) word processor
b) application software
c) operating system
d) information system
2. The largest network in the world is called the
a) Internet
b) Web
c) WWW
d) World Wide Web
3. ______type of memory will lose its content when the power is off.
a) CMOS
b) RAM
c) ROM
d) Flash RAM
4. The two basic parts of URLs, the second part presents the name of the server, it is ______.
a) Client
b) Server
c) the domain name
d) the protocol
5. Service programs are another name for .
a) operating system
b) utilities
c) language translators
e) device drivers
6. Browsers, word processors, and spreadsheets are applications.
a) special-purpose
b) artificial intelligence
c) general-purpose
d) multimedia
7. Web are computers that store and share documents.
a) agents
b) browsers
c) servers
d) search engines
8. In commerce, individuals typically sell to other individuals without ever meeting face-to-face.
a) C2C
b) B2C
c) B2B
d ) C2I
9. ______ is a set of standard on the Internet allowing you to transfer files.
a) Plug and play
b) Unicode
c) FTP
d) ISA
10. A database field that uniquely identifies each record is called the .
a) ID number
b) primary key
c) legend
d) explanation field
11. Applets are typically written in a programming language called .
a) XML
b) Pascal
c) Java
d) Basic
12. The equipment that processes data in order to create information is called______.
a) program
b) compiler
c) hardware
d) software
13. Which one of the following OS is open source software free and available from many sources, including the web?
a) Linux
b) Windows CE
c) Mac OS
d) Unix
14. In a network, the server will use______ operating system.
a) network
b) stand-alone
c) embedded
d) client
15. Raster images are also known as
a) bitmap images
b) clip art images
c) vector images
d) multimedia images
16. When you copy a paragraph from Word to a PowerPoint presentation, the Word document is the .
a) hyperlink
b) OLE file
c) source file
d) destination file
17. Many expert system use , which allows users to respond to questions in a human way.
a) packets
b) fuzzy logic
c) story boards
d) vector images
18. allows you to reorganize, add effects, and more to your digital video footage.
a) Audio editing software
b) Browsers
c) Video editing software
d) Paint program
19. To remove unneeded programs and related files from a hard disk, you would use a .
a) backup program
b) antivirus program
c) file compressed program
d) uninstall program
20. Norton System Works is a .
a) Web service
b) utility suite
c) troubleshooting program
d) none of the above
21. are the most widely used handheld computers.
a) RAMs
b) Notebooks
c) PDAs
d) CPUs
22. ROM is also known as .
a) slots
b) adapter
c) semiconductor
d) firmware
23. _______ is a standard that allows musical instruments to connect to the system unit.
a) Instruction
b) MIDI
c) OMR
d) Input devices
24. When a program makes a true or false decision, it is an example of a(n) ____ logic structure.
a) what-if
b) do until
c) do while
d) if-then-else
25. Desktop operating systems are also called .
a) network operating systems
b) embedded operating systems
c) stand-alone operating systems
d) client operating systems
26. Languages that can run on more than one kind of computer are called .
a) Machine languages
b) Assembly languages
c) Portable languages
d) Query languages
27. The best way to code effective programs is to write .
a) top-down programs
b) loop structured programs
c) structured programs
d) selection structured programs
28. Most presentation graphics programs provide a(n) that steps you through the process of creating a presentation.
a) dialog box
b) toolbar
c) icon
d) wizard
29. The most widely used Web protocol is .
a) http://
b) URL
c) HTML
d) ISP
30. are criminals that specialize in stealing, trading, and using credit cards over the Internet.
a) Clients
b) Agents
c) Carders
d) Servers
二、Fill In The Blanks With The Given Terms(20 Points)
a.downloading
b.protocol
c.bus width
d.mouse
e.utility
f.system
g.morphing
h.multimedia
i.uninstall
j.writing
k.artificial intelligence l.resolution m.plug and play n.hard copy o.audio p.slots q.integrated package r.sectors s.microsecond t.programming language
|
2. is the integration of all sorts of media into one presentation.
3. is the process of receiving a file from another computer.
4. ___ _ software runs in the background and helps the computer manage its own internal resources.
5. To safely remove a program from your computer, it is best to use a(n) ____ program.
6. A(n) ___ __ is a unit of time representing one millionth of a second.
7. Speakers and headphones are both classified as output devices.
8. …. can control pointer and change its shape depending on its current function.
9. Each track is divided into wedge-shaped sections called _________.
10. _______ is a special effect in which one image seems to melt into another.
11. provide a connection point for specialized cards or circuit boards.
12. The number of bits that can travel simultaneously down a bus is known as the .
13. is a set of hardware and software standards developed by Intel, Microsoft, and others.
14. ___ ___ is expressed as a matrix of these dots and pixels.
15. Printer output is often called .
16. is the process of saving information to secondary storage devices.
17. A(n) uses a collection of symbols, words, and phrases that instruct a computer to perform specific operations.
18. _ ____ programs are designed to make computing use easier.
19. attempts to develop computer systems that can mimic or simulate human senses, thought processes, and actions.
20. _ (s) are rules for exchanging data between computers. .
三、True/False (20 Points)
1. The most common input devices are the keyboard and the mouse. ( )
2. Image editor is used to editing vector images. ( )
3. Data are unprocessed facts. ( )
4. A typical e-mail message has three basic elements: header, message, and attachments. ( )
5. A formula is an instruction to calculate or process. ( )
6. The content of Flash RAM can be lost when the power of the computer is off. ( )
7. Special programs called agents, spiders, or bots continually look for new information and update the search services’ databases. ( )
8. You can share data by copying and pasting, or by using object linking and embedding. ( )
9. A master slide is a special slide that does not appear in a presentation but controls all the format and placement of all slides in a presentation. ( )
10. Productivity suites, also known as home suites, contain professional grade application programs. ( )
11. Virtual reality modeling language is used to create real-time animated 3-D scenes.
( )
12. Mac OS is not nearly as widely as the windows operating system. ( )
13. A dumb terminal can process data independently. ( )
14. Monitor output is described as hard copy. ( )
15. Debugging is a programmer’s word for testing and then eliminating errors. ( )
16. EBCDIC is the most widely used binary code for microcomputer. ( )
17. A file that is 1600 KB will fit on a traditional floppy disk. ( )
18. The best way to write good programs is to create unstructured programs. ( )
19. A word is the number of bits that can be accessed at one time by the CPU. ( )
20. Writing the program is called coding. ( )
四、Translate the Following Key Terms into Chinese(10 Points)
1. USB
2. web-based application software
3. Virtual reality
4. Cache memory
5. GUI
6. Electronic commerce
7. Drop-down menu
8. DBMS
9. Expert system
10. C2C | 11. ISP 12. URL 13. OOP 14. Object linking and embedding(OLE) 15. Desktop publishing programs 16. Dpi 17. HDTV 18. Network terminal 19. Domain name 20. system bus |
1.(10101001011)2=( )10=( )8= ( )16
2. (87.125)10=( )2 =( )8= ( )16
六、Fill in the Blanks (5 Points)
1. An information system has five parts: people, ,software, hardware, and data.
2. Operating systems are programs that coordinate computer resources, provide an interface between user and the computer, and run .
3. Web are virtual stores for B2C electronic commerce. .
4. .are programs that provide access to Web resources.
5. In a worksheet, a . is a series of continuous cells.
七、Translate the Following Paragraph into Chinese (9 Points)
(1)E- commerce (3 Points)
Technology creates products that operate faster, are priced cheaper, are often of better quality, or are wholly new. Indeed, new products can be individually tailored to a particular customer’s needs. For example, financial services companies such as Merrill Lynch(美林) have taken advantage of technology to launch cash management accounts. These accounts combine information on a person’s checking, savings, credit card, and securities accounts into a single monthly statement. It automatically sets aside “idle” funds into interest-bearing money market funds. Customers can access their accounts on the Web and get a complete picture of their financial condition at any time. However, even if they don’t pay much attention to their statements, their surplus funds are invested automatically.
(2)Information flow(3 Points)
In large and medium-sized organizations, computerized information systems don’t just keep track of transactions and day-to-day business operations. They also support the flow of information within the organization. This information flows both vertically and horizontally. In order to understand this, we need to understand how an organization is structured. One way to examine an organization’s structure is to view it from a functional perspective. That is, you can study the different basic functional areas in organizations and the different types of people within these functional areas. . .
(3)Network(3 Points)
Connectivity is a concept related to using computer networks to link people and resources. For example, connectivity means that you can connect your microcomputer by telephone or other telecommunications links to other computers and information sources almost anywhere. With this connection, you are linked to the world of larger computers and the Internet. This includes minicomputers and mainframes and their extensive information resources. Thus, becoming computer competent becomes a matter of knowing not only about connectivity through networks to microcomputers, but also about larger computer systems and their information resources.
专业:_________________学号:____________________姓名:___________
Answer Sheet (A)
一. Single Choice(30 Points, 1 point per choice)
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
1. (11001011101)2=( )10=( )8=( )16
2. (127.625)10=( )2 =( )8=( )16
六. Fill in the blank(5 Points)
1 | 2 | 3 | 4 | 5 |