试卷代号:2241 座位号■ 国家开放大学(中央广播电视大学)2015年春季学期“开放专科”期末考试 计算机专业英语 试题(A) 2015年7月 题 号 Ⅱ Ⅲ 总 分 分 数 得分 评卷人 I.Vocabulary(词汇,30分) (一)Translate the following words and expressions into Chinese(写出下列词组的汉语。l0分, 每题1分) 1.hard disk 2.operating system 3.electronic spreadsheet 4.management information system 5.electronic commerce 6.data structure 7.software engineering 8.computer virus 9.machine language 10.credit card 953
试卷代号 :2241 座位号 国家开放大学(中央广播电视大学 )2015 年春季学期"开放专科"期末考试 计算机专业英语试题 (A) 2015 E I H mm |得分|评卷人| | 1. Vocabulary (词汇, 30 分} {一) TransJate the foJJowing words and expressions into Chinese( 写出下列词组的汉语。 10 分, 每题 分} 1. hard disk 2. operating system 3. electronic spreadsheet 4. management information system 5. electronic commerce 6. data structure 7. software engineering 8. computer virus 9. machine language 10. credi t card 953
(二)Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语 缩写。10分,每题1分)】 11.结构化查询语言 12.广域网 13.超文本链接标示语言 14.文件传送[输]协议 15.单文档界面 16.面向对象编程 17.集成开发环境 18.传输控制协议/网际协议 19.数据库管理系统 20.电子数据交换 (=)Match the following words and expressions in the left column with those similar in meaning in the right column,(将左列的词汇与右列相应的汉语匹配。l0分,每空1分) 21.RAM(random access memory) a.视频 22.high-level language b.随机存储器 23.project window c.高级语言 24.functional testing d.应用软件 25.multimedia e,工程窗口 26.hacker {.系统软件 27.memory g.功能测试 28.application software h.多媒体 29.system software i黑客 30.vedio j.内存 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 954
{二) FiII in the blanks with the corresponding English abbreviations. (根据汉语写出相应的英语 缩写。 10 分,每题 分} 11. 结构化查询语言 12. 广域网 13. 超文本链接标示语言 14. 文件传送[输]协议 15. 单文档界面 16. 面向对象编程 17. 集成开发环境 18. 传输控制协议/网际协议 19. 数据库管理系统 20. 电子数据交换 {三) Match the following words and expressions in the left column with those similar in meaning in the right column. (将左列的词汇与右到相应的汉语匹配。 10 分,每空 分) 21. RAM(random access memory) 22. high-level language 23. project window 24. functional testing 25. multimedia 26. hacker 27. memory 28. application software 29. system software 30. vedio 21. 26. 954 22. 27. 23. 28. a. 视频 b. 随机存储器 c. 高级语言 d. 应用软件 e. 工程窗口 f.系统软件 g. 功能测试 h. 多媒体 1. 黑客 J. 内存 24. 29. 25. 30
得分 评卷人 Ⅱ。Comprehension(阅读理解,40分) (-)Fill in the blanks with suitable words or expressions from the list given below,and change the form where necessary,(从下面方框中选择合适的词或表达,以其适当的形式填空。 15分,每空3分) toolbar ruler title bar menu bar incotporate into Microsoft Word XP is the current Window version of Word,and documents created in Word XP can be easily31. Excel,Power Point and Access files.In the interface of Word,the 32. displays the name of the current application and name of the current document;the 33. lists the names of the menus available;the 34. gives the user quick access to frequently used editing functions;the 35. enables the user to change left and right margin. Passage A During initial days of computing,software was largely developed by small groups of people.When this software was to be maintained by another set of people,it used to be a nightmarish experience.When large commercial projects were to be handled,it used to be an almost impossible task to keep the time and budget under control,and projects used to get delayed and many projects were abandoned halfway.There was no systematic procedure for the software development;everything was done on ad hoc basis.This ad hoc approach led to the 'software crisis'. Over the last few decades there has been a tremendous growth in information technology and its impact on everyday life.Complex software systems have become critical to the operation of many systems in areas such as banking,communications,manufacturing, power generation,and transportation.Progress in computer science and accumulated experience with industrial production of software have led to the emergence of software 955
|得分|评卷人| | 11. Comprehension (阅读理解, 40 分} {一) FiII in the blanks with suitable words or expressions from the Iist given below , and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。 15 分,每空 分} toolbar ruler title bar menu bar mcotporate mto Microsoft Word XP is the current Window version of Word. and documents created in W ord XP can be easily31. Excel , Power Point and Access files. In the interface of W ord , the 32. displays the name of the current application and name of the current document; the 33. lists the names of the menus available; the 34. gives the user quick access to frequently used editing functions; the 35. enables the user to change left and right margin. Passage A During initial days of computing , software was largely developed by small groups of people. When this software was to be maintained by another set of people , it used to be a nightmarish experience. When large commercial projects were to be handled. it used to be an almost impossible task to keep the time and budget under control , and projects used to get delayed and many projects were abandoned halfway. There was no systematic procedure for the software development; everything was done on ad hoc basis. This ad hoc approach led to the ‘ software crisis'. Over the last few decades there has been a tremendous growth in information technology and its impact on everyday life. Complex software systems have become critical to the operation of many systems in areas such as banking , communications, manufacturing , power generation , and transportation. Progress in computer science and accumulated experience with industrial production of software have led to the emergence of software 955
engineering as a separate discipline.The software engineering discipline has been defined as "the application of systematic,disciplined,quantifiable approaches to the development, operation,and maintenance of software.that is,the application of engineering to software. The computer science discipline concerns with developing large applications.Software engineering covers not only the technical aspects of building software systems,but also management issues,such as directing programming teams,scheduling,and budgeting. For developing a software product,the development process is divided into different stages.A convenient way of splitting the whole process is to divide the development into the following five stages: Requirements Analysis Specification:define the system requirements in detail Design:specify system architecture and modules in detail Coding:produce source code Testing:deal with unit testing and system testing Maintenance:fix bugs,enhance features and adapt across platforms. ()Tell whether the following statements are true(T)or false(F)according to the passage A. (根据上文的内容判断下列句子的正误。15分,每题3分) 36.During initial days of the development of software,everything was done in discipline.( 37.The definition of software engineering is "the application of systematic,disciplined, quantifiable approaches to the development,operation,and maintenance of software."( 38.For developing a software product,you need design,coding and testing.( 39.software engineering is the application of engineering to software.( 40.Software engineering only covers the technical aspects of building software systems. () Passage B A computer virus is a computer program that is created to make and spread copies of itself.The program may however also be designed to have other effects on the systems it infects,ranging from the annoying to the disastrous. 956
engineering as a separate discipline. The software engineering discipline has been defined as "the application of systematic , disciplined , quantifiable approaches to the development , operation , and maintenance of software. " that is, the application of engineering to software . The computer science discipline concerns with developing large applications. Software engineering covers not only the technical aspects of building software systems, but also management issues, such as directing programming teams, scheduling , and budgeting. For developing a software product , the development process is divided into different stages. A convenient way of splitting the whole process is to divide the development into the following five stages: Requirements Analysis & Specification: define the system requirements in detail Design: specify system architecture and modules in detail Coding: produce source code Testing: deal with unit testing and system testing Maintenance: fix bugs, enhance features and adapt across platforms. (二) Tell whether the following statements are true ( T) or false ( F) according to the passage A. {根据上文的内容判断下列旬子的正误。 15 分,每题 分} 36. During initial days of the development of software , everything was done ill discipline. ( ) 37. The definitioll of software engineering is "the applicatioll of systematic , disciplilled , quantifiable approaches to the development, operation , and maintenance of software. " ( ) 38. For developing a software product , you need design , coding and testing. ( ) 39. software engineering is the application of engineering to software. ( ) 40. Software engineering only covers the technical aspects of building software systems. ( ) Passage B A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous. 956
Virus attacks are growing rapidly these days.According to BusinessWeek,the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number.As new antivirus tools are more powerful than before,the virus writers are getting a lot smarter with newer and creative ways to attack network systems.Let's first examine some common virus types: Basic Virus-a piece of software code that is developed to attack computers and network systems via email or Internet connections.It quickly replicates itself and gradually attaches to files,programs or the hard drive. Trojan Horses-This is a program that doesn't replicate when entering a system but can be effectively used to open'back doors.'Trojan Horses allow hackers to take control over a particular system or to steal very important data. Worm-this type of virus is able to spread itself automatically over the network from one computer to the next.During a worm attack,users'computers get infected without even having to click open email attachment or any program,etc. Since it is very difficult to avoid the virus,your best defense is a powerful antivirus program.In order to fight with such viruses,the software vendors should focus on making their products more robust.This may ask for a trade-off between user-friendliness and security.In specific cases it may require line-by-line inspection,code retooling and even systems automation to defend the installed programs. (三)choose the best answer according to the passage B.(根据上文的内容选择正确的答案。I0 分,每题2分)】 41.A computer virus is a computer program that is created to make and spread of itself. A.programs B.virus C.copies D.files 42.Worm spread itself except by A.network B.E-mail C.program D.hardware 957
Virus attacks are growing rapidly these days. According to BusinessWeek. the 76.404 attacks reported in the first half of 2003 nearly match previous year' s total number. As new antivirus tools are more powerful than before. the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let' s first examine some common vlrus types: Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files. programs or the hard drive. Trojan Horses - This is a program that doesn't replicate when entering a system but can be effectively used to open ‘ back doors. ' Trojan Horses allow hackers to take control over a particular system or to steal very important data. Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack. users' computers get infected without even having to click open email attachment or any program. etc. Since it is very difficult to avoid the virus. your best defense is a powerful antivirus program. In order to fight with such viruses. the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection. code retooling and even systems automation to defend the installed programs. {三 )chωse the best answer according to the passage B. (根据上文的内容选择正确的答案。 10 分,每题 分} 41. A computer virus is a computer program that is created to make and spread 一一一一 of itself. A. programs C. copies 42. W orm spread itself except by 一一一一一一· A. network C. program B. virus D. files B. E-mail D. hardware 957