ImageVerifierCode 换一换
格式:DOCX , 页数:16 ,大小:25.27KB ,
资源ID:11521210      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/11521210.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(专英辅导复习资料含答案.docx)为本站会员(b****7)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

专英辅导复习资料含答案.docx

1、专英辅导复习资料含答案首先答案有一些是我网上找的,有一些的是自己做的,如果有不对的请在群上说出来,让大家解决-莫杰焕(也可以叫我雷锋)一、Translate the following words and expressions into Chinese(写出下列词组的汉语。) 1、capacity 性能2、solid-state storage 固态存储器 3、analog signal 模拟信号 4、time-sharing system 分时系统5、Host computer-large centralized computer 主机6、anti-spyware 抗间谍软件 7、Comp

2、uter Fraud and Abuse Act 计算机欺诈和滥用法案 8、history files 历史文档9、keystroke loggers 击键跟踪人10、Web bug 网络臭虫(一种网络入侵间谍软件)二、Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。) 1数据库管理系统 DBMS2传输控制协议 TCP3多文档界面 MDI 4面向对象编程 OOP 5只读存储器 ROM 6数字视频光盘 DVD 7计算机辅助设计 CAD 8结构化查询语言 SQL 9通用串行总线 USB 1

3、0企业之间的电子商务交易方式 B2B三、Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。)c 1. multimedia a.字处理器f 2. software life cycle b.交换机e 3. structured programming c.多媒体g 4. functional testing d.局域网a 5. word processor e.结构化程序设计 h 6. c

4、ode windows f.软件生命周期 j 7. firewall g.功能测试d 8. LAN h.代码窗口i 9. hacker i.黑客b 10. switch j.防火墙. Comprehension(阅读理解)一、Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。) research refers to design Revealing spec

5、ializeCryptography is the science of disguising and _revealing_ encrypted information, in terms of information technology, cryptography usually _refers to_keeping any intercepted information private, For example ,such information may be financial data, like banking and credit card information used i

6、n online shopping, or private e-mail and correspondence .Cryptographers _design_system, break system, and do _research_ on encryption. Responsibilities typically do not include building and maintaining the computer networks that use cryptography ;these are the duties of security engineers are mathem

7、aticians who _specialize_in making and breaking codes二、Tell whether the following statements are true(T) or false(F) according to the passage A.(根据上文的内容判断下列句子的正误)Passage A The central processing unit (CPU) is the heart of the computer systems. Among other things, its configuration determines whether

8、 a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has

9、 often become smaller and smaller, while its speed and capacity have increased tremendously. Indeed, these changes have resulted in microcomputers that are small enough to fit on your desk or your lap.The CPU comprises the control unit and the arithmetic / logic unit (ALU). The control unit is respo

10、nsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices.The ALU performs all the arithmetic and logical (

11、comparison) functions - that is, it adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically less than, greater than, and equal to, can be combined into several common expressions, such as greater than or equal to. The objective of most instructions that use

12、 comparisons is to determine which instruction should be executed next. Question:1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( F ) 2. The movement of electronic signals between main memory and the ALU as well as the control signal between the

13、 CPU and input /output devices are controlled by the control unit of the CPU. ( T )3. The CPU comprises the control unit and memory. ( F )4. The control unit performs all the arithmetic and logical (comparison) functions ( F )5. The central processing unit (CPU) is the heart of the computer systems.

14、 ( T )三、choose the best answer according to the passage B.(根据上文的内容选择正确的答案。Passage BNow work or lack of work is becoming a major social problem in the world. It is part of our daily routine as it takes up one half of our waking life. If we dont have work or unsatisfactory work, then our lives are lik

15、ely to be miserable and empty. It is in this respect that certain industrialized countries now have a particular problem. Out of a working population of about 25 million, at least 3 million are unemployed. This represents just under 10of the workforce. It is a terrible waste. Related to the problems

16、 mentioned above is the difficulty of finding a good job worthy of ones qualifications. Only a small minority of people ever make it to university. Therefore only a very small percentage of people have the opportunity to qualify for the top jobs or for truly professional careers. Yet increasingly, m

17、ore and more graduates fail to find work. For many of us who have always enjoyed having a satisfying job, it is hard to imagine the misery of those who are permanently out of work. Long term unemployment is similar to a disease. The unemployed find it difficult to find accommodation or to pay for ac

18、commodation, and without an address, it is difficult to claim benefits. The problems of unpleasant work or no work are likely to get worse before they get better. It will be something that the next century in particular must take very seriously.Question:1. Work is part of our daily routine because i

19、t takes up_ D _.A. one half of our liveB. one third of our lifeC. one half of our working hoursD. one half of our waking life2. In certain industrialized countries, out of a working population of about 25 million, A .A. at least 3 million are unemployedB. more than 3 million are unemployedC. one thi

20、rd of 25 million are unemployedD. one fourth of 25 million are unemployed3. According to the passage, it is _ B .A. easy for graduates to find workB. difficult for more and more graduates to find workC. easy for graduates to find top jobsD. difficult for graduates to become the governors4. Paragraph

21、 2 talks about a related problem _ C .A. that few people manage to get to universityB. that graduates often dont find jobs easilyC. of finding a good job that matches qualificationsD. that many people manage to get to university5. Paragraph 3 concludes the passage by A .A. re-stating the importance

22、of having a job.B. talking about problems of proper accommodation.C. looking forward to the next century.D. looking for a good job someday.四、choose the best answer according to the passage C.(根据上文的内容选择正确的答案。Passage C A computer virus is a computer program that is created to make and spread copies of

23、 itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous. Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous years t

24、otal number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Lets first examine some common virus types: Basic Virus - a piece of software code that is developed to attack computers and network

25、 systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive. Trojan Horses - This is a program that doesnt replicate when entering a system but can be effectively used to open back doors. Trojan Horses allow hackers to take con

26、trol over a particular system or to steal very important data. Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users computers get infected without even having to click open email attachment or any program, etc. S

27、ince it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may

28、require line-by-line inspection, code retooling and even systems automation to defend the installed programs.Question:1A computer virus is a computer program that is created to make and spread _C_of itself.Aprograms Bvirus C copies Dfiles2Worm spread itself except by D . Anetwork BE-mail Cprogram Dh

29、ardware3Antivirus program can scan and _A_ virus. Aclean Bproduce Creplicate Dmake 4Trojan Horses _C_ .Aquickly replicate itself and gradually attache to files, programs or the hard drive.Binfect the computer without even having to click open email attachment or any program.Callow hackers to take co

30、ntrol over a particular system or to steal very important data.Davoid the virus to attack computer.5According to BusinessWeek, the _B_ attacks reported in the first half of 2003 nearly match previous years total number . A 86,404 B 76,404 C56,354 D34,876.Translation.翻译(30分)一、Translate the following

31、sentences into Chinese.(将下列句子翻译成汉语。)1.As most companies, and in particular those in the financial sector, retain confidential information on electronic medias, they are justifiably prevent data falling into the wrong hands. 由于大部分公司,尤其是那些财政部门,把机密信息通常放在电子媒体上,因而他们更要阻止数据落入不适当的途径。2.Television images, for

32、 example, can be processed by computer programs once they have been converted to digital signals, while those in conventional analog signals cannot. 例如,电视图像在被转换成数字信号后,就可以被计算机程序处理,而常规的模拟信号则不行。3.Operating system software may also contain security monitoring features, such as recording who has logged on and off the system, what pro

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1