试卷代号:2241 座位号 中央广播电视大学2012一2013学年度第二学期“开放专科”期末考试 计算机专业英语 试题 2013年7月 题号 I Ⅱ Ⅲ 总分 分 数 得分 评卷人 I.Vocabulary(词汇,30分) (一)Translate the following words and expressions into Chinese(写出下列词组的汉语。l0分, 每题1分)】 1.central processing unit(CPU) 2.operating system 3.electronic spreadsheet 4.management information system 5.electronic commerce 6.database 7.software engineering 8.software crisis 9.network security 10.computer virus 1191
试卷代号 2 2 座位号CD 中央广播电视大学 3学年度第二学期"开放专科"期末考试 计算机专业英语试题 2013 年7 ~~十 I |得分|评卷人| I I I I. Vocabulary (词汇, 0分) {一) Translate the following words and expressions into Chinese( 汉语 每题 1. central processing unit(CPU) 2. operating system 3. electronic spreadsheet 4. management information system 5. electronic commerce 6. database 7. software engineering 8. software crisis 9. network security 10. computer virus 1191
(二)Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语 缩写。10分,每题1分)】 11.只读存储器 12.广域网 13.传输控制协议 14.文件传送[输]协议 15.通用串行总线 16.面向对象编程 17.集成开发环境 18.结构化查询语言 19.数据库管理系统 20.开放系统互连 (=)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。l0分,每空1分) 21.output a.视频 22.high-level language b.输出 23.project window c.高级语言 24.black-box testing d.应用软件 25.multimedia e.工程窗口 26.WWw .系统软件 27.field g.黑盒测试 28.application software h.多媒体 29.system software i.万维网 30.vidio j.字段 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 1192
(二} Fill in the blanks with the corresponding English abbreviations. (根据汉语写出相应的英语 缩写。 1 1. 读存 12. 13. 传输控 协议 14. 文件传送 15. 16. 对象 17. 18. 构化查 19. 20. 统互 {三) Match the following words and expressions in the left column with those similar in meaning in the right column. (将左列的词汇与右列相应的汉语匹配。 21. output a. 22. high-level language b. 23. project window c. 24. black-box testing d. 软件 25. multimedia e. 工程窗 26. WWW f.系统软件 27. field g. 28. application software h. 29. system software 1. 万维 30. vidio ).字段 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 1192
得 分 评卷人 Ⅱ.Comprehension(阅读理解,40分)】 (-)Fill in the blanks with suitable words or expressions from the list given below,and change the form where necessary.(从下面方框中选择合适的词或表达,以其适当的形式填空。 15分,每空3分) high-level language assembly language write machine language notation A programming language,designed to facilitate the communication between human and computers,is a 31. for describing computation in readable form. There are 3 levels of programming languages,they are 32. which can be run directly by computer;33. and 34. There are different high-level programming languages.Fortunately,most of them have many kinds of construct in common and vary only in the way that these must be 35. _Therefore,first thing to be decided about a task is to choose which programming language is best suited for the job. Passage A The central processing unit (CPU)is the heart of the computer systems.Among other things,its configuration determines whether a computer is fast or slow in relation to other computers.The CPU is the most complex computer system component,responsible for directing most of the computer system activities based on the instructions provided.As one computer generation has evolved to the next,the physical size of the CPU has often become smaller and smaller,while its speed and capacity have increased tremendously.Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap. The CPU comprises the control unit and the arithmetic logic unit (ALU). The control unit is responsible for directing and coordinating most of the computer systems activities.It determines the movement of electronic signals between main memory and the arithmetic/logic unit,as well as the control signals between the CPU and input/ output devices. The ALU performs all the arithmetic and logical (comparison)functions-that is,it 1193
得分!评卷人 II. Comprehension (阅读理解, (一) Fill in the blanks with suitable words or expressions from the list given below , and change the form where necessary. (从下西方框中选择合适的词或表达,以其适当的形式填空。 15 空3 high-level language assembly language write machine language notation A programming language , designed to facilitate the communication between human and computers, is a 31. for describing computation in readable form. There are 3 levels of programming languages, they are 32. , which can be run directly by computer; 33. and 34. There are different high-level programming languages. Fortunately , most of them have many kinds of construct in common and vary only in the way that these must be 35. . Therefore , first thing to be decided about a task is to choose which programming language is best suited for the job. Passage A The central processing unit (CPU) is the heart of the computer systems. Among other things , its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component , responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next , the physical size of the CPU has often become ,smaller and smaller, while its speed and capacity have increased tremendously. Indeed , these changes have resulted in microcomputers that are small enough to fit on your desk or your lap. The CPU comprises the control unit and the arithmetic / logic unit (ALU). The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit , as well as the control signals between the CPU and input/ output devices. The ALU performs all the arithmetic and logical (comparison) functions 一that is , it 1193
adds,subtracts,multiplies,divides,and does comparisons.These comparisons,which are basically“less than",“greater than”,and“equal to”,can be combined into several common expressions,such as "greater than or equal to".The objective of most instructions that use comparisons is to determine which instruction should be executed next. ()Tell whether the following statements are true(T)or false(F)according to the passage A. (根据上文的内容判断下列句子的正误。15分,每题3分) 36.With the development of computer,the physical size of the CPU has often become bigger and bigger.( 37.The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control unit of the CPU.( 38.The CPU comprises the control unit and memory.( 39.The control unit performs all the arithmetic and logical (comparison)functions.( 40.The central processing unit (CPU)is the heart of the computer systems.( Passage B A computer virus is a computer program that is created to make and spread copies of itself.The program may however also be designed to have other effects on the systems it infects,ranging from the annoying to the disastrous. Virus attacks are growing rapidly these days.According to Business Week,the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number.As new antivirus tools are more powerful than before,the virus writers are getting a lot smarter with newer and creative ways to attack network systems.Let's first examine some common virus types: Basic Virus-a piece of software code that is developed to attack computers and network systems via email or Internet connections.It quickly replicates itself and gradually attaches to files,programs or the hard drive. Trojan Horses-This is a program that doesn't replicate when entering a system but can be effectively used to open'back doors.'Trojan Horses allow hackers to take control over a particular system or to steal very important data. Worm-this type of virus is able to spread itself automatically over the network from one computer to the next.During a worm attack,users'computers get infected without even having to click open email attachment or any program,etc. 1194
adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically "less than" , "greater than" , and "equal to" , can be combined into several common expressions, such as "greater than or equal to". The objective of most instructions that use comparisons is to determine which instruction should be executed next. {二)Tell whether the following statements are true (T) or false (F) according to the passage A. (根据上文的内容判断下列旬子的正误。 5分,每题 3分) 36. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( ) 37. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input / output devices are controlled by the control unit of the CPU. ( ) 38. The CPU comprises the control unit and memory. ( ) 39. The control unit performs all the arithmetic and logical (comparison) functions. ( ) 40. The central processing unit (CPU) is the heart of the computer systems. ( ) Passage B A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous. Virus attacks are growing rapidly these days. According to BusinessWeek , the 76 ,404 attacks reported in the first half of 2003 nearly match previous year's total number. As new antivirus tools are more powerful than before , the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common vIrus types: Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files , programs or the hard drive. Trojan Horses - This is a program that doesn' t replicate when entering a system but can be effectively used to open' back doors. ' Trojan Horses allow hackers to take control over a particular system or to steal very important data. Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack , users' computers get infected without even having to click open email attachment or any program , etc. 1194
Since it is very difficult to avoid the virus,your best defense is a powerful antivirus program.In order to fight with such viruses,the software vendors should focus on making their products more robust.This may ask for a trade-off between user-friendliness and security.In specific cases it may require line-by-line inspection,code retooling and even systems automation to defend the installed programs. (三)choose the best answer according to the passage B.(根据上文的内容选择正确的答案。10 分,每题2分)】 41.A computer virus is a computer program that is created to make and spread of itself. A.programs B.virus C.copies D.files 42.Worm spread itself except by A.network B.E-mail C.program D.hardware 43.Antivirus program can scan and virus. A.clean B.produce C.replicate D.make 44.Trojan Horses A.quickly replicate itself and gradually attache to files,programs or the hard drive. B.infect the computer without even having to click open email attachment or any program C.allow hackers to take control over a particular system or to steal very important data. D.avoid the virus to attack computer. 45.According to BusinessWeek,the attacks reported in the first half of 2003 nearly match previous year's total number. A.86,404 B.76,404 C.56,354 D.34,876 1195
Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require 1ine- by-1ine inspection, code retooling and even systems automation to defend the installed programs. {三)choose the best answer according to the passage B. (根据上文的内容选择正确的答案。 分,每题 2分} 41. A computer virus is a computer program that is created to make and spread of itself. A. programs C. copies 42. Worm spread itself except by A. network C. program 43. Antivirus program can scan and A. clean C. replicate B. virus D. files B. E-mail D. hardware vIrus. BDMAmoadkuece 44. Trojan Horses A. quickly replicate itself and gradually attache to files , programs or the hard drive. B. infect the computer without even having to click open email attachment or any program. C. allow hackers to take control over a particular system or to steal very important data. D. avoid the virus to attack computer. 45. According to BusinessWeek , the nearly match previous year's total number. attacks reported in the first half of 2003 A. 86,404 C.56 ,354 B. 76,404 D.34 ,876 1195