计算机英语试卷 6页

  • 74.50 KB
  • 2022-08-30 发布

计算机英语试卷

  • 6页
  • 当前文档由用户上传发布,收益归属用户
  1. 1、本文档由用户上传,淘文库整理发布,可阅读全部内容。
  2. 2、本文档内容版权归属内容提供方,所产生的收益全部归内容提供方所有。如果您对本文有版权争议,请立即联系网站客服。
  3. 3、本文档由用户上传,本站不保证质量和数量令人满意,可能有诸多瑕疵,付费之前,请仔细阅读内容确认后进行付费下载。
  4. 网站客服QQ:403074932
年级:____专业:_____班级:_____姓名:_______学号:___________座号:___成绩:____一、Vocabulary(词汇20分)1.TranslatethefollowingwordsandexpressionsintoChinese.(写出对应的中文,每小题1分)(1)communication____________(2)computervirus________________________(3)workstation______________(4)creditcard__________________(5)3Dimage___________(6)bandwidth___________________(7)networksecurity_____________________(8)E-business_______________________(9)hostnetwork____________________(10)digitalsignature____________________2、TranslatethefollowingChineseintoEnglishorEnglishabbreviations(根据汉语写出相应的英语或英文缩写,每小题1分)(1)源代码_______________(2)网际协议________________(3)信息技术______________(4)文件传输协议__________________(5)统一资源定位符__________________(6)登录_________________(7)图形用户界面______________(8)自动个人计算机_________________(9)研究与开发______________(10)公告板系统______________二、Chooseappropriatewordsandfillintheblanks.(完型填空,每空2分,共20分)ComputerSecuritysystem,filesclock,program,virus,listemployment,eventprogrammercontains,Avirusorotherunwelcomesurprisecanlurkinyourcomputersystemfordaysormonthswithoutdiscovery.Atimebombisacomputerprogramthatstaysinyourundetecteduntilitistriggeredbyacertainintime,suchaswhenthecomputersystemreachesacertaindate.AtimebombisusuallycarriedbyaorTrojanhorse.Forexample,theMichelangelovirusatimebombdesignedtodamageonyourharddiskonMarch6,thebirthdayofartistMichelangelo.Alogicbombisacomputerprogramthatistriggeredbytheappearanceordisappearanceofspecificdata.Forexample,supposeainalargecorporationbelievesthatsheisontheofemployees第6页共6页\ntobeterminatedduringthenextcost-cuttingcampaign.Herhostility(敌意)overcomesherethical(道德的)judgment,andshecreatesalogicbombprogramthatchecksthepayroll(在职人员名单)fileeverydaytomakesureherstatusisstillactive.Iftheprogrammer’sstatuschangesto“terminated,”herlogicbombactivatesathatdestroysdataonthecomputer.三、PartOne:Singlechoice.(单选题,每题1分,共20分)1.A________copyisacopyofacurrentfilemadeinordertoprotectagainstlossordamage.A.hardB.backupC.softD.file2.Theinfamous“Michelangelo”________strikesthousandsofcomputerseveryyearonMarch6th.A.crackerB.hackerC.virusD.disease3.A________isasetofrulesthatcontrolstheinteractionofdifferentdevicesinanetworkorinternetwork.A.modelB.protocolC.dialogD.query4.AfterIfinishedthelastparagraph,Imovedthe________backtothethirdparagraphanddeletedasentence.A.iconB.mouseC.joystickD.cursor5.Thesedaysitisnotuncommonforonetoseepeopleusing________everywhere--evenonairplanes.A.laptopsB.desktopsC.minicomputersD.microcomputers6.Theircompanyusedinternationallawyerstoprosecuteacrimeringinvolvingsoftware________inThailand.A.cloningB.copyingC.duplicationD.piracy7.Somerestaurantshaveprovidedtouch________computerstoenabletheircustomerstoorderfoodviathecomputerwithouthavingtotellsomeone.A.menuB.windowC.displayD.screen8.________printersarebeingphasedoutandreplacedbyprintersthatcanproducecleantype.第6页共6页\nA.LaserB.InkjetC.Dot-matrixD.Drum9.TheabbreviationHTTPstandsforHypertext________Protocol.A.TransferB.TransportationC.TransmissionD.Transition10.A(n)________areanetworkspansacityoratownandprovidesservicestoindividualusersororganizations.A.urbanB.wideC.localD.metropolitan11.Forsometime,we’vebeenexperiencingsome________inthisparticularprogram.Itcannotruninanormalway.A.routinesB.loopsC.bugsD.defaults12.Data________canreducetheamountofdatasentorstoredbypartiallyeliminatinginherentredundancy.A.compressionB.conversionC.configurationD.compilation13.Confidentialityofthemessageisnotenoughinasecurecommunication;________isalsoneeded.Thereceiverneedstobesureofthesender’sidentity.A.encryptionB.authorizationC.authenticationD.encapsulation14.Whenyousendadocumentelectronically,youcanalsosignit.Thisiscalled_______signature.A.onlineB.digitalC.virtualD.simulated15.ToaccessapageontheWWW,oneneedsa________thatusuallyconsistsofthreeparts:acontroller,amethod,andaninterpreter.A.routerB.codeC.passwordD.browser16.TheabbreviationUSBstandsforUniversal________Bus.A.SerialB.SequentialC.SymmetricD.Syntactic第6页共6页\n17.Thedata,whentheyarenotencrypted,arecalled________.A.plaintextB.ciphertextC.hypertextD.context18.Whereasthedecimalsystemisbasedon10,the________systemisbasedon2.Thereareonlytwodigitsinthelattersystem,0and1.A.bilateralB.binaryC.byteD.bit19.Justaminute,I’mwaitingforthecomputerto________up.Itwon’ttakelongtostartit.A.activateB.scrollC.bootD.log20.Ahardwareorsoftwaremalfunctioncancauseasystemto________.A.crushB.crashC.crackD.collidePartTwo:MatchthefollowingabbreviationswiththeirChinesemeaning.(10points)(把对应题号写在括号里,每题1分)21.AOL()A.个人数字助理22.COM()B.综合业务数字网23.Mbps()C.组件对象模型24.Kbps()D.对象请求代理程序25.POP()E.可扩展标记语言26.ISP()F.美国在线服务公司27.ORB()G.兆位每秒28.ISDN()H.千位每秒29.XML()I.邮局协议30.PDA()J.因特网服务提供者四、TranslatethefollowingsentencesintoChinese(英译汉,共20分)1.TheInternetisbasedontheconceptofa(n)client-serverrelationshipbetweencomputers.(2%)___________________________________________________________________________2.Thebiggestcategoryofinformation-basedoccupationsisinformationprocessors..(2%)___________________________________________________________________________3.Information-processinginvolvesthegeneration,storage,transmission,manipulation,anddisplayofinformation.(3%)______________________________________________________________________________________________________________________________________________________第6页共6页\n4.E-checksrequiredigitalsignaturesandauthenticationservicestodigitallyprocessinformationbetweenthepayer,payee,andbank.(3%)______________________________________________________________________________________________________________________________________________________5.Electronicmoneyisalsocalleddigitalcashorelectronictoken.(2%)___________________________________________________________________________6.Securitymeasuresforcomputersystemsconsistofencryption,restrictingaccess,anticipatingdisasters,andmakingbackupcopies.(3%)______________________________________________________________________________________________________________________________________________________7.①Yourbusiness’sWebsiteisapassiveformofmarketing..②Inordertogetpeopletovisitit,youhavetopromoteyourWebsiteaggressively.③Andifyouwanttoensurethatpeopletrturn,you’llhavetooffervaluableservicesorcontent.(5%)请按标注的段落号将译文填入相应的横线中。1____________________________________________________________________2____________________________________________________________________3____________________________________________________________________6.五、Readingcomprehension(阅读理解,每小题2分,共10分)Acomputervirusisacomputerprogramthatiscreatedtomakeandspreadcopiesofitself.Theprogrammayhoweveralsobedesignedtohaveothereffectsonthesystemsitinfects,rangingfromtheannoyingtothedisastrous.Virusattacksaregrowingrapidlythesedays.AccordingtoBusinessWeek,the76,404attacksreportedinthefirsthalfof2003nearlymatchpreviousyear'stotalnumber.Asnewantivirustoolsaremorepowerfulthanbefore,theviruswritersaregettingalotsmarterwithnewerandcreativewaystoattacknetworksystems.Let'sfirstexaminesomecommonvirustypes:BasicVirus-apieceofsoftwarecodethatisdevelopedtoattackcomputersandnetworksystemsviaemailorInternetconnections.Itquicklyreplicatesitselfandgraduallyattachestofiles,programsortheharddrive.TrojanHorses-Thisisaprogramthatdoesn'treplicatewhenenteringasystembutcanbeeffectivelyusedtoopen'backdoors.'TrojanHorsesallowhackerstotakecontroloveraparticularsystemortosteal第6页共6页\nveryimportantdata.Worm-thistypeofvirusisabletospreaditselfautomaticallyoverthenetworkfromonecomputertothenext.Duringawormattack,users'computersgetinfectedwithoutevenhavingtoclickopenemailattachmentoranyprogram,etc.Sinceitisverydifficulttoavoidthevirus,yourbestdefenseisapowerfulantivirusprogram.Inordertofightwithsuchviruses,thesoftwarevendorsshouldfocusonmakingtheirproductsmorerobust.Thismayaskforatrade-offbetweenuser-friendlinessandsecurity.Inspecificcasesitmayrequireline-by-lineinspection,coderetoolingandevensystemsautomationtodefendtheinstalledprograms.Choosethebestansweraccordingtothepassage.(根据上文的内容选择正确的答案。)1.()Acomputervirusisacomputerthatiscreatedtomakeandspreadofitself.A.programsB.virusC.copiesD.files2.()Wormspreaditselfexceptby.A.networkB.E-mailC.programD.hardware3.()Antivirusprogramcanscanandvirus.A.cleanB.produceC.replicateD.make4.()TrojanHorses.A.quicklyreplicateitselfandgraduallyattachetofiles,programsortheharddrive.B.infectthecomputerwithoutevenhavingtoclickopenemailattachmentoranyprogram.C.allowhackerstotakecontroloveraparticularsystemortostealveryimportantdata.D.avoidthevirustoattackcomputer.5.()AccordingtoBusinessWeek,theattacksreportedinthefirsthalfof2003nearlymatchpreviousyear'stotalnumber.A.86,404B.76,404C.56,354D.34,876第6页共6页

相关文档