试卷详情
-
程序员-计算机专业英语2
-
[单项选择]C++ fully supports ______ programming.
A. visual
B. object-oriented
C. logic
D. natural language
-
[单项选择]Insufficient ______ can cause a processor to work at 50% or even more below its performance potential.
A. mouse
B. I/O
C. document
D. memory
-
[单项选择]In ______, the only element that can be deleted or removed is the one that was inserted most recently.
A. a line
B. a queue
C. an array
D. a stack
-
[单项选择]We can use the word processor to ______ your documents.
A. edit
B. compute
C. translate
D. unload
-
[单项选择]A ______ system placed between the company network and the outside world may limit outside access to the internal network.
A. firewall
B. modem
C. gateway
D. key
-
[单项选择]One of the greatest features of a home ______ is the ability to share one Internet connection simultaneously over two or more computers.
A. computer
B. device
C. network
D. work
-
[单项选择]As an operating system repeatedly allocates and frees storage space, many physically separated unused areas appear. This phenomenon is called ______.
A. fragmentation
B. compaction
C. swapping
D. paging
-
[单项选择]A ______ infected computer may lose its data.
A. file
B. data base
C. virus
D. program
-
[单项选择]The usual address for a Web site is the ______ page address, although you can enter the address of any page and have that page sent to you.
A. home
B. main
C. host
D. house
-
[单项选择]A ______ is a functional unit that interprets and carries out instructions. )
A. memory
B. processor
C. storage
D. network
-
[单项选择]The ______ in e-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America.
A. illness
B. virus
C. weakness
D. attachment
-
[单项选择]The ______ is a collection of modules serving as interface between hardware and software to provide a software platform.
A. computer
B. processor
C. application software
D. operating system
-
[单项选择]The Internet is an open system, and most information is available to everyone. It is very important to add ______ to existing system for protecting the secret information.
A. web pages
B. modem
C. security
D. network
-
[单项选择]______ software, also called end-user program, includes database programs, word processors, spreadsheets etc.
A. Application
B. System
C. Compiler
D. Utility
-
[单项选择]One of the basic rules of computer security is to change your ______ regularly.
A. name
B. computer
C. device
D. password
-
[单项选择]
To document your code can increase program (2) and make program easier to (3) .
A. reliability
B. security
C. readability
D. usability
-
[单项选择]The line of computing jobs waiting to be run on a computer system might be a ______. The jobs are serviced in the order of their arrival, that is, the first in is the first out.
A. queue
B. stack
C. array
D. record
-
[单项选择]Most ______ measures involve data encryption and password.
A. security
B. hardware
C. display
D. program
-
[单项选择]A ______ consists of the symbols, characters, and usage rules that permit people to communicate with computer.
A. programming language
B. network
C. keyboard
D. display