您好,欢迎来到意榕旅游网。
搜索
您的当前位置:首页计算机专业英语 单选&判断easy

计算机专业英语 单选&判断easy

来源:意榕旅游网


easy Key

1. (p. 11) The most common input devices are the mouse and the keyboard.

TRUE1.(p. 11) 的最常见的输入的设备是鼠标和键盘。真实

Two most common input devices are the mouse and the keyboard.

Difficulty: Easy OLeary - 001 Chapter... #41 2. (p. 5) Connectivity of computers can be achieved via telephone lines, cable, and satellite or wireless devices.

TRUE2.(p 5) 连接的计算机可以通过电话线、 电缆及卫星或无线设备。真实

Connectivity allows computers to connect and share information. Connections can be by telephone lines, by cable, or through the air.

Difficulty: Easy OLeary - 001 Chapter... #29 3. (p. 10) Another name for a minicomputer is midrange computer.

TRUE3.(p 10) 小型机的另一个名字是中端的计算机。真实

Minicomputers are also known as midrange computers.

Difficulty: Easy OLeary - 001 Chapter... #35 4. (p. 11) A system unit consists of the keyboard, and the monitor.

FALSE4.(p 11) A 系统单元包括键盘和显示器。虚假

The system unit is a container that houses most of the electronic components that make up a computer system, the main components including the microprocessor and memory. 系统单元是一个容器,房子的大部分电子组件构成的计算机系统,包括微处理器和内存的主要组件。

Difficulty: Easy OLeary - 001 Chapter... #39 5. (p. 9) A browser is an example of a specialized application.

FALSE5.(p 9) A 浏览器是一个专门的应用程序的示例。虚假

A browser is an example of a basic application.

一个浏览器是一种典型的基本应用。

Difficulty: Easy OLeary - 001 Chapter... #34 6. (p. 4) Software is a list of instructions that direct the computer to accomplish a specific task.

TRUE6.(p 4) 软件是直接在计算机以完成特定任务的说明的列表。真实

The purpose of software is to convert data (unprocessed facts) into information (processed facts).

Difficulty: Easy OLeary - 001 Chapter... #28 7. (p. 40) A keyword search results in a list of hits.

TRUE7.(p 40) A 关键字点击列表中搜索的结果。真实In a keyword search, you enter a keyword or phrase reflecting the information you want. The search engine compares your entry against its database and returns a list of hits.

Difficulty: Easy

OLeary - 002 Chapter... #40 8. (p. 31) Users can access the Internet from almost anywhere within a country for a standard fee through national service providers.

TRUE8.(p 31) 用户可以几乎任何地方访问从互联网,国内国际服务提供商通过标准收取费用。真实Users can access the Internet from almost anywhere within the country for a standard fee without incurring long-distance telephone charges.

Difficulty: Easy OLeary - 002 Chapter... #28 9. (p. 41) A recent study by the NEC Research Institute found that any one search engine includes only a fraction of the informational sources on the Web.

TRUE9.(p 41) 由 NEC 研究所 A 最近的研究发现任何一个搜索引擎,包括在 Web 上的信息源中只有一小部分。真实

A recent study by the NEC Research Institute found that any one search engine includes only a fraction of the informational sources on the Web, hence using more than one search engine is more fruitful.

Difficulty: Easy OLeary - 002 Chapter... #42

10. (p. 35) Instant messaging is an extension of chat groups.

FALSE10.(p 35) 即时消息是聊天组的扩展。虚假

即时消息 (IM) 是电子邮件,可以使两个或更多人互相联系通过直接、 实时通信的扩展。

Difficulty: Easy OLeary - 002 Chapter... #36 11. (p. 33) Shopping is the most popular Internet activity.

FALSE11.(p 33) 购物是最受欢迎的互联网活动。虚假

Communication is the most popular Internet activity, and its impact cannot be overestimated. 沟通是最受欢迎的互联网活动,和它的影响不能估计过高。

Difficulty: Easy OLeary - 002 Chapter... #31 12. (p. 44) The biggest hurdle for the growth of e-commerce is the evolution of fast, secure, and reliable payment methods for buying goods.

TRUE12.(p 44) 成长的电子商务最大的障碍是购买货物快速、 安全和可靠的支付方式的演变。真实

The single greatest challenge for e-commerce is the de-*velopment of fast, secure, and reliable payment methods for purchasing goods.

Difficulty: Easy OLeary - 002 Chapter... #44 13. (p. 30) The Internet connects millions of computers and resources across the world via wires, cables, and satellite.

TRUE13.(p 30) 互联网在世界各地通过电线、 电缆和卫星连接数以百万计的计算机和资源。真实The Web provides a multimedia interface to resources available on the Internet. The Internet is the actual physical network. It is made up of wires, cables, and satellites.

Difficulty: Easy OLeary - 002 Chapter... #26 14. (p. 33) The three most popular types of Internet communication are e-mail, instant messaging, and discussion groups.

TRUE14.(p 33) 互联网通信最受欢迎的三种类型的电子邮件、 即时消息和讨论组。真实

The three most popular types of Internet communication are e-mail, instant messaging, and discussion groups.

Difficulty: Easy OLeary - 002 Chapter... #32 15. (p. 34) Headers usually contain the addresses, subject, and attachments.

TRUE15.(p 34) 标题通常包含地址、 主题和附件。真实15.(p 34) 标题通常包含地址、 主题和附件。A typical e-mail message has three basic elements: header, message, and signature.

Difficulty: Easy OLeary - 002 Chapter... #33 16. (p. 32) Providing a domain name of the browser is sufficient to gain access to resources.

FALSE16.(p 32) 提供域名的浏览器不足以获得对资源的访问权限。虚假

For browsers to connect to resources, the location or address of the resources must be specified (URLs), which are made up of the protocol and the domain name. 对于浏览器连接到资源,必须的位置或资源的地址 (Url),指定的议定书 》 和域名组成。

Difficulty: Easy OLeary - 002 Chapter... #29

17. (p. 76) The hierarchical database is the most widely used database structure.

FALSE17.(p 76) 层次结构的数据库是使用最广泛的数据库结构。虚假

The relational database is the most widely used database structure. 关系数据库是最广泛使用的数据库结构。

Difficulty: Easy OLeary - 003 Chapter... #38 18. (p. 79) Presentation graphics software is an excellent tool to communicate a message and to persuade people.

TRUE18.(p 79) 演示文稿图形软件是极好的工具,来传达某种信息,并说服人。真实

Presentation graphics are excellent tools to communicate a message and to persuade people.

Difficulty: Easy OLeary - 003 Chapter... #42 19. (p. 64) While working with an application, the icons that are being used are a part of the GUI.

TRUE19.(p 64) 时使用的应用程序,正在使用的图标是图形用户界面的一部分。真实Most applications use a graphical user interface (GUI) that displays graphical elements called icons to represent familiar objects and a mouse.

Difficulty: Easy OLeary - 003 Chapter... #29 20. (p. 64) Application software includes basic applications, and specialized applications.

TRUE20.(p 64) 应用软件包括基本的应用程序,以及专门的应用程序。真实

Application software, in turn, can be divided into two categories. One category, basic applications. The other category, specialized applications.

Difficulty: Easy OLeary - 003 Chapter... #26 21. (p. 76) Querying a database is equivalent to asking a question for specific data contained within it.

TRUE21.(p 76) 查询数据库就相当于问一个问题,它所包含的特定数据。真实

A query is a question or a request used to extract specific data contained in a database.

Difficulty: Easy OLeary - 003 Chapter... #39 22. (p. 68) Using word wrap enables automatic continuation into the next line, if the current line is full while entering text.

TRUE22.(p 68) 使用自动换行功能可以自动延续到下一行,如果当前行已满时输入文本。真实

Word wrap automatically moves the insertion point to the next line once the current line is full.

Difficulty: Easy OLeary - 003 Chapter... #34 23. (p. 76) Each table in a database is made up of rows called fields.

FALSE23.(p 76) 每个数据库中的表的行称为字段组成。虚假

Each table in a database is made up of rows called records.

每个表在数据库中被称为是由一排一排的记录。

Difficulty: Easy

OLeary - 003 Chapter... #40 24. (p. 68) Microsoft Word cannot be used to create personalized Web pages.

FALSE24.(p 68) Microsoft Word 不能用于创建个性化的 Web 页。虚假

Word processors can be used to create personalized Web pages.

Difficulty: Easy OLeary - 003 Chapter... #33 25. (p. 64) Only one window can be displayed on the computer screen at one time.

FALSE25.(p 64) 只有一个窗口可以同时显示在计算机屏幕上。虚假

More than one window can be opened and displayed on the computer screen at one time.

Difficulty: Easy OLeary - 003 Chapter... #30 26. (p. 77) In a database, an employee's unique identification number would be considered a primary key.

TRUE26.(p 77) 在数据库中,会考虑员工的唯一标识号的主键。真实

An employee's unique identification number would be considered a primary key.

Difficulty: Easy OLeary - 003 Chapter... #41 27. (p. 108) Animations can be simple moving text or complicated interactive features.

TRUE27.(p 108) 动画可以是简单的移动文本或复杂的交互功能。真实

Animations can be simple moving text or complicated interactive features.

Difficulty: Easy OLeary - 004 Chapter... #34 28. (p. 112) Industrial robots are used extensively in the automotive industry.

TRUE28.(p 112) 工业机器人在汽车工业中广泛应用。真实

Industrial robots are used extensively in this industry.

Difficulty: Easy

OLeary - 004 Chapter... #45 29. (p. 105) Interactivity describes how the various parts of a multimedia presentation relate to one another.

FALSE29.(p 105) 交互性描述多媒体演示文稿的各部分之间的关系如何。虚假29.(p 105) 交互性描述多媒体演示文稿的各部分之间的关系如何。虚假

Interactivity allows the user to choose the information to view, to control the pace and flow of information, and to respond to items and receive feedback.

Difficulty: Easy OLeary - 004 Chapter... #31 30. (p. 110) Traditionally, people have used computers to solve structured problems.

TRUE30.(p 110) 人们传统上,使用计算机解决结构性的问题。真实

In the past, computers were used to solve structured problems.

Difficulty: Easy OLeary - 004 Chapter... #38 31. (p. 100) Because vector images are created using mathematical equations, they are

difficult to resize and manipulate.

FALSE31.(p 100) 矢量图像使用数学方程来创建的因为他们很难调整大小和操作。虚假31.(p 100) 矢量图像使用数学方程来创建的因为他们很难调整大小和操作。虚假

The objects in vector images can be defined by mathematical equations. Hence they can be easily resized, colored, textured, and manipulated.

Difficulty: Easy OLeary - 004 Chapter... #27 32. (p. 111-112) A robot is different from other assembly-line machines because it can be reprogrammed.

TRUE32.(p 111-112) 机器人是不同于其它装配生产线机器,因为它可以被重新编程。真实

Robots can be reprogrammed to do more than one task.

Difficulty: Easy OLeary - 004 Chapter... #44 33. (p. 104) Multimedia cannot be applied in a word processing document.

FALSE33.(p 104) 多媒体不能应用在字处理文档。虚假

Multimedia can be applied in a word processing document.

Difficulty: Easy OLeary - 004 Chapter... #29 34. (p. 101) Audio editing software, such as Apple's GarageBand can be used to create MP3s.

TRUE34.(p 101) 音频编辑软件,如苹果 GarageBand 可用于创建 mp3。真实

Audio editing software programs such as Apple's GarageBand and Sony's ACID can be used to create your own MP3s.

Difficulty: Easy OLeary - 004 Chapter... #28 35. (p. 111) Virtual reality is a great game tool, but has no serious application.

FALSE35.(p 111) 虚拟现实是一个伟大的游戏工具,但有没有严重的应用程序。虚假

Virtual reality is being used in serious applications such as aviation, surgical operations, and nuclear disaster cleanups.

Difficulty: Easy

OLeary - 004 Chapter... #40 36. (p. 129) Many older operating systems were originally developed using a GUI.

FALSE36.(p 129) 许多旧操作系统最初开发使用 GUI。虚假

Many older operating systems were developed using a character-based interface.

Difficulty: Easy OLeary - 005 Chapter... #28 37. (p. 131) The most popular microcomputer operating system today with over 90 percent of the market is Mac OS.

FALSE37.(p 131) 今天的 90 % 以上的市场最受欢迎的微机操作系统是 Mac OS。虚假

Windows is the most popular microcomputer operating system.

Difficulty: Easy OLeary - 005 Chapter... #34 38. (p. 136) On a disk, a track is a concentric ring, and each track is divided into wedge-shaped sections called sectors.

TRUE38.(p 136) 在磁盘上,一条轨道是同心环,和每个磁道分为楔状的部分,称为部门。真实

Tracks are concentric rings, and each track is divided into wedge-shaped sections called sectors.

Difficulty: Easy OLeary - 005 Chapter... #41 39. (p. 130) A folder cannot contain other folders.

FALSE39.(p 130) 一个文件夹不能包含其他文件夹。虚假

For organizational purposes, a folder can contain other folders.

Difficulty: Easy OLeary - 005 Chapter... #31 40. (p. 133) Apple computers generally use the Windows operating system.

FALSE40.(p 133) 苹果电脑通常使用的 Windows 操作系统。虚假

Apple computers use the Macintosh operating system苹果电脑使用 Macintosh 操作系统。.

Difficulty: Easy

OLeary - 005 Chapter... #35 41. (p. 130) A standard desktop computer comes with an embedded operating system.

FALSE41.(p 130) A 标准桌面计算机附带的嵌入式操作系统。虚假

A handheld computer or PDA would come with an embedded operating system.

Difficulty: Easy OLeary - 005 Chapter... #32 42. (p. 129) Starting or restarting a computer is called tasking the system.

FALSE42.(p 129) 启动或重新启动计算机,称为任务系统。虚假

Starting or restarting a computer is called booting the system.

Difficulty: Easy OLeary - 005 Chapter... #29 43. (p. 130) PDAs generally include a network operating system.

FALSE43.(p 130) 掌上电脑通常包括网络操作系统。虚假

PDAs would have an embedded operating system such as Windows CE.

Difficulty: Easy OLeary - 005 Chapter... #30 44. (p. 134) You can guard your computer against viruses using an antivirus program.

TRUE44.(p 134) 你可以保护您的计算机免受病毒使用防病毒程序。真实

Antivirus programs are used to guard your computer system against viruses.

Difficulty: Easy OLeary - 005 Chapter... #39 45. (p. 128) System software is a single program.

FALSE45.(p 128) 系统软件是一个单一的程序。虚假

System software is not a single program. Rather it is a collection or a system of programs that handle hundreds of technical details with little or no user intervention系统软件不是一个单一的项目。它是一个集合或系统的技术细节的数百个很少或没有用户干预的程序。.

Difficulty: Easy

OLeary - 005 Chapter... #26 46. (p. 137) Running Disk Defragmenter does not improve system performance.

FALSE46.(p 137) 运行磁盘碎片整理程序不改善系统性能。虚假

Disk Defragmenter is a utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.

Difficulty: Easy OLeary - 005 Chapter... #42 47. (p. 162) The more the number of bits, the slower the computer becomes.

FALSE47.(p 162) 愈多位数,速度较慢的计算机变得。虚假

The more bits in a word, the more powerful—and the faster—the computer is.

Difficulty: Easy OLeary - 006 Chapter... #32 48. (p. 170) Serial ports are gradually replacing USB ports.

FALSE48.(p 170) 串行端口正在逐步取代 USB 端口。虚假

USB ports are gradually replacing serial and parallel ports.

Difficulty: Easy OLeary - 006 Chapter... #42 49. (p. 171) FireWire is mainly used to connect digital camcorders and video editing software.

TRUE49.(p 171) 火线主要用于连接数字摄像机和视频编辑软件。真实

FireWire is mainly used for digital camcorders and video editing software.

Difficulty: Easy OLeary - 006 Chapter... #44 50. (p. 170) Accelerated graphics port (AGP) is over twice as fast as the ISA.

FALSE50.(p 170) 加速图形端口 (AGP) 是在 ISA.的两倍虚假

Accelerated graphics port (AGP) is over twice as fast as the PCI bus.

Difficulty: Easy OLeary - 006 Chapter... #39

51. (p. 170) Parallel ports are mostly used to connect printers to the system unit.

TRUE51.(p 170) 并行端口大多用于将打印机连接到系统单元。真实

Printers are most commonly connected using a parallel port.

Difficulty: Easy OLeary - 006 Chapter... #41 52. (p. 165) The speed of a computer's system clock cannot be varied.

TRUE52.(p 165) 不能更改计算机的系统时钟的速度。真实

The speed of a computer's system clock cannot be varied.

Difficulty: Easy OLeary - 006 Chapter... #36 53. (p. 162) 64-bit processors are commonly being used in powerful microcomputers.

TRUE53.(p 162) 64 位处理器常用的功能强大的微型计算机。真实

64-bit processors were only used in large mainframe and supercomputers. All of that is changing as 64-bit processors are becoming commonplace in today's more powerful

microcomputers.

Difficulty: Easy OLeary - 006 Chapter... #31 54. (p. 161) The ALU tells the rest of the computer system how to carry out a program's instructions.

FALSE54.(p 161) 阿鲁告诉计算机系统的其余部分如何执行程序的说明。虚假

The ALU unit performs mathematical calculations.

Difficulty: Easy OLeary - 006 Chapter... #29 55. (p. 167) The number of bits that can travel simultaneously down a bus is known as the word size.

FALSE55.(p 167) 可以同时穿过一辆公共汽车的位数被称为字大小。虚假

The number of bits traveling down a bus is known as the bus width.

Difficulty: Easy

OLeary - 006 Chapter... #38 56. (p. 193) A magnetic card reader does not require the card to actually make contact with the reader.

FALSE56.(p 193) A 磁卡读卡器不需要,实际上使卡与读者联系。虚假 A radio frequency card reader does not require the card to actually make contact with the reader, a magnetic card reader requires the card to be swiped through it.

Difficulty: Easy OLeary - 007 Chapter... #32 57. (p. 190) An optical mouse uses light in order to detect movement.

TRUE57.(p 190) 光电鼠标使用光,以检测运动。真实

An optical mouse emits and senses light to detect mouse movement.

Difficulty: Easy OLeary - 007 Chapter... #27 58. (p. 201) A dot-matrix printer sprays tiny drops of ink onto the page.

FALSE58.(p 201) A 点阵打印机喷雾剂小滴墨水拖到页上。虚假 An ink-jet printer sprays tiny drops of ink onto the page.

Difficulty: Easy OLeary - 007 Chapter... #39 59. (p. 189) Function keys provide shortcuts for specific tasks.

TRUE59.(p 189) 功能键提供针对特定任务的快捷方式。真实

Function keys provide shortcuts for specific tasks.

Difficulty: Easy OLeary - 007 Chapter... #26 60. (p. 200) HDTV is a television/computer hybrid that delivers a much clearer wide-screen image than traditional television.

TRUE60.(p 200) 高清晰度电视是电视/计算机混合,它提供了比传统电视的更清晰的宽屏幕图像。真实

HDTV delivers a much clearer and more detailed wide-screen picture than regular television.

Difficulty: Easy OLeary - 007 Chapter... #37 61. (p. 191) A touch screen is classified as a special type of scanning device.

FALSE61.(p 191) A 触摸屏被列为一种特殊类型的扫描设备。虚假

A touch screen is classified as a pointing device.

Difficulty: Easy OLeary - 007 Chapter... #28 62. (p. 199) The smaller the size of the monitor, the lower the quality of images displayed.

FALSE62.(p 199) 显示器,体积越小越低质量的图像显示。虚假

The smaller the monitor size, the better the quality of images displayed.

Difficulty: Easy OLeary - 007 Chapter... #35 63. (p. 202) Shared laser printers typically support color, are more expensive, and are

used by a group of people.

TRUE63.(p 202) 共享激光打印机通常支持颜色、 更昂贵,和所使用的一群人。真实

Shared laser printers meet this definition.

Difficulty: Easy OLeary - 007 Chapter... #40 64. (p. 205) Telephony is also known as Internet telephony, IP telephony, and Voice over IP (VoIP).

TRUE64.(p 205) 电话在也称为互联网电话、 IP 电话和语音 IP (电话 VoIP)。真实

It is also known as Internet telephony, IP telephony, and Voice over IP (VoIP).

Difficulty: Easy OLeary - 007 Chapter... #43 65. (p. 192) Optical scanners recognize individual letters or images.

FALSE65.(p 192) 光学扫描仪识别单个字母或图像。虚假

These devices do not recognize individual letters or images.

Difficulty: Easy OLeary - 007 Chapter... #31 66. (p. 220) Media is the actual physical material that holds data and programs.

TRUE66.(p 220) 媒体是实际物理材料保存数据和程序。真实

Media is the physical material that holds data and programs.

Difficulty: Easy OLeary - 008 Chapter... #26 67. (p. 232) Internet hard drives give users unlimited storage capacity.

FALSE67.(p 232) 互联网硬盘给用户无限制的存储容量。虚假

Internet hard drives are limited in size.

Difficulty: Easy OLeary - 008 Chapter... #42 68. Magnetic tape stores data and programs by altering the electromagnetic charges on a recording surface.

True False 68.磁带存储数据和程序通过改变电磁收费录制的表面上。真实

Magnetic tape alters electromagnetic charges on the recording surface.

Difficulty: Easy OLeary - 008 Chapter... #43 69. (p. 221) Hard disks use tracks, sectors, and cylinders to store files.

TRUE69.(p 221) 硬盘使用轨道、 部门和瓶来存储文件。真实

Hard disks store and organize files using tracks, sectors, and cylinders.

Difficulty: Easy OLeary - 008 Chapter... #30 70. (p. 224) In a hard-disk pack drive, only one of the read/write heads is activated at a given moment.

TRUE70.(p 224) 包硬磁盘驱动器,读/写磁头中的只有一个激活在给定时刻。真实

In a hard-disk pack drive, only one of the read/write heads is activated at a given moment.

Difficulty: Easy OLeary - 008 Chapter... #35 71. (p. 220) The process of saving information to a secondary storage device is referred to as embedding.

FALSE71.(p 220) 将信息保存到辅助存储设备的过程被称为嵌入。虚假

Writing is the process of saving information to a secondary storage device.

Difficulty: Easy OLeary - 008 Chapter... #27 72. (p. 223) Hard-disk cartridges are used primarily to complement an internal hard disk.

TRUE72.(p 223) 硬盘盒主要用于补充内部硬盘。真实

Hard-disk cartridges are used primarily to complement an internal hard disk.

Difficulty: Easy OLeary - 008 Chapter... #32 73. (p. 223) Credit card size hard-disk cartridges called PC Card hard disks are available

for notebook computers.

TRUE73.(p 223) 信用卡大小硬盘盒称为 PC 卡硬磁盘可用于笔记本电脑。真实

PC Card hard disks are available for notebook computers with typical capacities up to 5 gigabytes.

Difficulty:。、 Easy OLeary - 008 Chapter... #33 74. (p. 220) _____ speed is the measure of the amount of time required by a storage device to retrieve data and programs.

FALSE74.(p 220) _____ 速度是时间的存储设备所检索的数据和程序所需量的措施。虚假

Access speed or access time measures the amount of time required by the storage device to retrieve data and programs.

Difficulty: Easy OLeary - 008 Chapter... #46 75. (p. 267) The client/server network strategy can handle very large networks efficiently.

TRUE75.(p 267) 的客户端/服务器网络战略可以有效地处理非常大的网络。真实

One advantage of the client/server network strategy is the ability to handle very large networks efficiently.

Difficulty: Easy OLeary - 009 Chapter... #44 76. (p. 259) WANs are widely used by organizations to link microcomputers and to share printers and other resources.

FALSE76.(p 259) Wan 广泛用于组织链接微型计算机和共享的打印机和其他资源。虚假

LANs provide companies with these benefits.

Difficulty: Easy OLeary - 009 Chapter... #35 77. (p. 259) A network gateway can be used to connect the LAN of one office group to the LAN of another office group.

TRUE77.(p 259) A 网关可用于一个办公室组的 LAN 连接到另一个办公室组的局域网。真实

LANs can be connected to other LANs using a network gateway.

Difficulty: Easy OLeary - 009 Chapter... #36 78. (p. 249) Communications devices are the actual connecting or transmission medium that carries the message.

FALSE78.(p 249) 通信设备是执行消息的实际连接或传输媒介。虚假

Communication channels are the actual connecting or transmission medium that carries the message.

Difficulty: Easy OLeary - 009 Chapter... #26 79. (p. 261) The bus network is used commonly to link microcomputers to a mainframe to allow access to an organization's database.

FALSE79.(p 261) 的巴士网络通常用于链接到大型机,允许组织的数据库访问的微型计算机。虚假

The star is a common topology for linking microcomputers to a mainframe that allows access to an organization's database.

Difficulty: Easy

OLeary - 009 Chapter... #40 80. (p. 250) Telephone lines use coaxial cables.

FALSE80.(p 250) 电话线路使用同轴电缆。虚假

Telephone lines use twisted pair cable that is made up of hundreds of copper wires.

Difficulty: Easy OLeary - 009 Chapter... #27 81. (p. 261) Network architecture describes how a computer network is configured and what strategies are employed.

TRUE81.(p 261) 网络体系结构描述计算机网络的配置方式和采用什么策略。真实

Network architecture describes how a network is arranged and how resources are coordinated and shared.

Difficulty: Easy OLeary - 009 Chapter... #39 82. (p. 259) The most common cabling standard in LANs is called Ethernet.

TRUE82.(p 259) 局域网中最常见的缆线连接标准被称为以太网。真实 Ethernet is the most common standard for accomplishing this task.

Difficulty: Easy OLeary - 009 Chapter... #37 83. (p. 285) It is highly likely that each one of us has an electronic profile created by information resellers.

TRUE83.(p 285) 很有可能的是我们每一个人都有电子的配置文件,创建的转销商信息。真实

Using publicly available databases and in many cases nonpublic databases, information resellers create electronic profiles or highly detailed and personalized descriptions of individuals.

Difficulty: Easy OLeary - 010 Chapter... #28 84. (p. 296) A spike can cause the destruction of chips and other electronic components of a computer.

TRUE84.(p 296) A 穗可能导致破坏芯片和其它电子元器件的计算机。真实

Too much electricity, as when lightning or some other electrical disturbance affects a power line, may cause a voltage surge, or spike. This excess of electricity may destroy chips or other electronic components of a computer.

Difficulty: Easy OLeary - 010 Chapter... #40 85. (p. 292) Computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology.

TRUE85.(p 292) 计算机犯罪是违法的行为,行为人使用计算机技术的专业知识。真实

A computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology. Typically, computer criminals are either employees, outside users, hackers, crackers, organized crime members, or terrorists.

Difficulty: Easy OLeary - 010 Chapter... #36 86. (p. 295) The use of a company's computer time by an employee to run another personal business is considered theft.

TRUE86.(p 295) 的一家公司的计算机时间运行另一家私人企业雇员使用被认为是盗窃。真实

Theft can take many forms—of hardware, of software, of data, of computer time. White-collar crimes include the theft of data in the form of confidential information such as preferred-client lists. Another common crime is the use (theft) of a company's computer time by an employee to run another business.

Difficulty: Easy OLeary - 010 Chapter... #38 87. (p. 296) Security is concerned with protecting information, hardware, and software from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters.

TRUE87.(p 296) 安全与保护的信息、 硬件和软件,未经授权的使用,以及从入侵、 破坏和自然灾害的损害有关。真实

Security is concerned with protecting information, hardware, and software from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters.

Difficulty: Easy OLeary - 010 Chapter... #41 88. (p. 289) Spy removal programs are designed to detect and remove cookies, Web bugs, and monitoring software.

TRUE88.(p 289) 间谍去除程序旨在检测和删除 cookie、 Web bug 和监控软件。真实

A new category of programs known as anti-spyware or spy removal programs, which are designed to detect and remove cookies, Web bugs, and monitoring software, has evolved recently.

Difficulty: Easy OLeary - 010 Chapter... #34 89. (p. 297) Biometric scanning devices use fingerprint and iris scanners.

TRUE89.(p 297) 生物识别扫描设备使用指纹和虹膜扫描仪。真实

Security experts are constantly devising ways to protect computer systems from access by unauthorized persons. biometric scanning devices such as fingerprint and iris (eye) scanners can also be used.

Difficulty: Easy OLeary - 010 Chapter... #43 90. (p. 346) The logical view focuses on meanings and content of the data.

TRUE90.(p 346) 重点的含义和内容的数据的逻辑视图。真实

One perspective, the logical view, focuses on the meaning and content of the data. End users and most computer professionals are concerned with this view.

Difficulty: Easy OLeary - 012 Chapter... #27 91. (p. 346) Data typically consists of numbers, letters, and symbols.

FALSE91.(p 346) 数据通常包含数字、 字母和符号。虚假

Data was limited to numbers, letters, and symbols recorded by keyboards. Now, data consists of audio, music, photographs, and videos.

Difficulty: Easy OLeary - 012 Chapter... #26 92. (p. 352) The logical arrangement of data in a database is called the data model.

TRUE92.(p 352) 数据库中的数据的逻辑排列称为数据模型。真实

DBMS programs are designed to work with data that is logically structured or arranged in a particular way. This arrangement is known as the data model.

Difficulty: Easy

OLeary - 012 Chapter... #35 93. (p. 354) In a network database, entries can be easily added, deleted, and/or modified.

FALSE93.(p 354) 在网络数据库中,条目可以被方便地添加、 删除,或修改。虚假 The most valuable feature of relational databases is their simplicity. Entries can be easily added, deleted, and modified.

Difficulty: Easy OLeary - 012 Chapter... #40 94. (p. 350) In order to create, modify, and gain access to a database, special software called the database management system is required.

TRUE94.(p 350) 以创建,修改和获得访问数据库的权限,调用数据库管理系统的专用软件需要。真实

In order to create, modify, and gain access to a database, special software is required. This software is called a database management system, which is commonly abbreviated DBMS.

Difficulty: Easy

OLeary - 012 Chapter... #32 95. (p. 348) The ATM works on the principle of real-time processing.

TRUE95.(p 348) 取款机的工作原理的实时处理。真实

Real-time processing, also known as online processing, occurs when data is processed at the same time the transaction occurs.

Difficulty: Easy OLeary - 012 Chapter... #30 96. (p. 357) A proprietary database is generally an enormous database that an organization develops to cover particular subjects.

TRUE96.(p 357) 专有数据库通常是一个庞大的数据库,组织发展到涵盖特定的主题。真实

A proprietary database is generally an enormous database that an organization develops to cover particular subjects.

Difficulty: Easy OLeary - 012 Chapter... #44 97. (p. 13) The most common output device would be a(n)

A. monitor. b. optical disc.

c. set of speakers.

d. USB drive. 97.(p 13) 最常见的输出设备将此 A.监视器。b.光盘。c.套扬声器。d.USB 驱动器。

A monitor would be the most common output device.

Difficulty: Easy OLeary - 001 Chapter... #17 98. (p. 13) Which one of the following cannot be considered as a form of secondary storage?

a. Floppy disk

b. Optical disk

C. RAM

d. Hard disk98.(p 13),下列任一操作不能被视为一种形式的辅助存储?a.软盘 b.光盘 C.RAM d.硬盘

RAM is considered primary storage.

Difficulty: Easy OLeary - 001 Chapter... #18 99. (p. 7) What are the two major software types?

a. System analysis and data warehousing

b. Operating and utilities

C. System and application

d. Database management and application99.(p 7) 的两个主要的软件类型是什么?a.系统分析与数据仓库 b.操作系统和 C.系统实用程序和应用程序 d.数据库管理和应用程序

There are two major kinds of software: system software and application software.

Difficulty: Easy OLeary - 001 Chapter... #4 100. (p. 10, 11) Desktop, notebook, tablet PC, and handheld computers would be classified as

a. mainframe computers.

b. supercomputers.

c. minicomputers.

D. microcomputers. 100.(第 10、 11) 台式机、 笔记本电脑、 平板电脑和掌上电脑将被归类为 a.大型机。b.超级计算机。c.迷你。D.微型计算机。

These computers are classified as microcomputers.

Difficulty: Easy OLeary - 001 Chapter... #11 101. (p. 5) The physical equipment that processes data in order to create information is called the

a. typology.

b. compiler.

C. hardware.

d. software. 101.(p 5) 以创建信息处理数据的物理设备称为 a.类型。b.编译器。C.硬件。d.软件。

The equipment that processes the data to create information is called hardware.

Difficulty: Easy OLeary - 001 Chapter... #2 102. (p. 8) Which of the following is a collection of programs rather than a single program?

a. Procedures

B. System software

c. Hardware

d. Application software102.(p 8) 以下哪一个程序,而不是单个程序的集合吗?a.程序 B.系统软件 c.硬件 d.应用软件

System software is not a single program. Rather it is a collection of programs, including operating systems, utilities, and device drivers.

Difficulty: Easy OLeary - 001 Chapter... #5 103. (p. 7) The word \"software\" is interchangeable with the word

a. procedure.

b. application.

C. program.

d. computer. 103.(p 7)\"软件\"一词是可以互换的 word a.过程。b.应用程序。C.程序。d.计算机。

The words software and programs are interchangeable.

Difficulty: Easy OLeary - 001 Chapter... #3 104. (p. 11) The most widely used handheld computer would be a

a. laptop computer.

B. PDA.

c. subnotebook.

d. tablet PC. 104.(p 11) 使用最广泛的掌上电脑将是 a.膝上型计算机。B.PDA。c.subnotebook。d.平板电脑。

PDAs are the most widely used handheld computers.

Difficulty: Easy OLeary - 001 Chapter... #13 105. (p. 14) Which of the following is not an example of a document file?

A. Spreadsheet

b. Memo

c. Letter

d. Term paper105.(p 14) 哪一项不是文档文件的示例?A.电子表格 b.备注 c.信 d.学期论文

Spreadsheets are classified as worksheet files.

Difficulty: Easy OLeary - 001 Chapter... #21 106. (p. 11) Which of the following will not retain data after the computer is turned off?

a. DVD

B. RAM

c. ROM

d. Hard drive106.(p 11) 哪一项不会保留数据后关闭计算机?a.B.DVD RAM c.ROM d.硬盘

RAM is referred to as temporary storage because its contents will typically be lost if the electrical power to the computer is disrupted.

Difficulty: Easy OLeary - 001 Chapter... #16 107. (p. 11) Hilda is looking for a system that combines pen input, writing recognition, personal organizational tools, and communications capabilities in a very small package. Which among the following devices would meet these requirements?

a. Laptop computer

b. Subnotebook

C. Palm computer

d. Tablet PC107.(p 11) 希尔是寻找一个系统,结合了笔输入、 很小包中书写识别、 个人的组织工具和通信能力。除以下设备将满足这些要求?a.膝上型计算机 b.Subnotebook C.掌上计算机 d.Tablet PC

A palm computer would meet the above stated requirements.

Difficulty: Easy OLeary - 001 Chapter... #14 108. (p. 8) Identify the program that coordinates computer resources, provides an interface between users and the computer, and runs applications.

a. System software

B. Operating system

c. Application software

d. Device driver108.(p 8) 确定的坐标的计算机资源,提供了一个界面之间的用户和计算机,并运行应用程序的程序。a.系统软件 B.操作系统 c.应用软件 d.设备驱动程序

Operating systems are designed to carry out these tasks.

Difficulty: Easy OLeary - 001 Chapter... #7 109. (p. 4) Which of the following is not a required part of an information system?

a. People

b. Procedures

C. Internet

d. Data109.(p 4) 哪一项不是所需信息系统的一部分?a.人 b.程序 C.互联网 d.数据

An information system has five parts: people, procedures, software, hardware, and data.

Difficulty: Easy OLeary - 001 Chapter... #1 110. (p. 33) Applets are written in which programming language?

a. XML

b. Basic

c. Pascal

D. Java110.(p 33) 小程序都写在哪种编程语言?a.XML b.基本 c.帕斯卡尔 · D.Java

Java applets are programs that are written to accomplish a variety of Web activities.

Difficulty: Easy

OLeary - 002 Chapter... #16 111. (p. 30) Launched in 1969 as a U.S funded project that developed a national computer network, the Internet was initially called __________.

a. World Wide Web

b. Intranet

c. NSFNet

D. ARPANET111.(p 30) 启动在 1969 年作为美国资助的项目,制定国家计算机网络、 互联网最初被称为 _____。a.万维网 Intranet b.c.D.NSFNet 阿帕网

The Internet was originally called Advanced Research Project Agency Network (ARPANET).

Difficulty: Easy OLeary - 002 Chapter... #1 112. (p. 32) Rules for exchanging data between computers are called

a. programs.

b. procedures.

c. hyperlinks.

D. protocols. 112.(p 32) 用于计算机之间交换数据的规则被称为 a.程序。b.程序。c.的超链接。D.协议。

Protocols are rules for exchanging data between computers.

Difficulty: Easy OLeary - 002 Chapter... #8 113. (p. 46) Programs that automatically start and operate as a part of your browser are called

A. plug-ins.

b. readers.

c. pop-ups.

d. ActiveX Controls. 113.(p 46) 程序自动启动和经营作为您的浏览器的一部分被称为 b.A.面对读者。c.弹出窗口。d.ActiveX 控件。

Plug-ins are programs that automatically start and operate as a part of your browser.

Difficulty: Easy

OLeary - 002 Chapter... #24 114. (p. 30) This enabled graphics, animation, sound, and video to be added to the Internet.

a. Web browser

b. URI

C. Web

d. Sharewares114.(p 30) 启用此图形、 动画、 声音和视频添加到互联网。a.web 浏览器 b.URI C.Web d.Sharewares

The Web made it possible to include graphics, animations, sound, or video.

Difficulty: Easy OLeary - 002 Chapter... #3 115. (p. 32) URL is an acronym for

a. Universal Remote Location

b. Uniformed Resource locator

C. Uniform Resource Locator d. Universal Resolution List115.(p 32) URL 是 a.通用远程位置 b.统一资源定位器 C.统一资源定位器 d.通用决议列表的缩写

Web addresses are called uniform resource locators (URLs).

Difficulty: Easy OLeary - 002 Chapter... #6 116. (p. 79) Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called

a. graphs.

B. presentation graphics.

c. diagrams.

d. charts. 116.(p 79) 程序结合各种可视对象来创建具有吸引力,视觉上有趣的演示文稿被称为 a.图。B.演示图形。c.图。d.图表。

Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentations.

Difficulty: Easy OLeary - 003 Chapter... #22 117. (p. 76) A question or a request for specific data contained in a database is referred to as a

a. form.

b. report.

c. applet.

D. query. 117.(p 76) A 问题或特定数据库中包含的数据的请求被称为 a.窗体。b.报告。c.小程序。D.查询。

A query is a question or a request for specific data contained in a database.

Difficulty: Easy OLeary - 003 Chapter... #19 118. (p. 71) Spreadsheet programs create

A. workbook files.

b. text documents.

c. graphical representations.

d. tools to enter, retrieve and edit data. 118.(p 71) 电子表格程序创建 A.工作簿文件。b.文本文档。c.图形表示形式。d.工具输入,检索和编辑数据。

Spreadsheet programs create workbook files.

Difficulty: Easy OLeary - 003 Chapter... #12 119. (p. 76) The electronic equivalent of a file cabinet is a

A. database.

b. word processor.

c. spreadsheet.

d. table. 119.(p 76) 的某个 cab 文件的电子等同是 A.数据库。b.文字处理机。c.电子表格。d.表。

A database is the electronic equivalent of a file cabinet.

Difficulty: Easy

OLeary - 003 Chapter... #18 120. (p. 72) When you change one or more numbers in a spreadsheet, all related formulas will automatically update and charts will be recreated. This is called

a. refreshing.

B. recalculation.

c. sensitivity.

d. what-if120.(p 72),当您更改一个或多个数字在电子表格中,所有相关公式将自动更新,并将重新创建图表。这被称为 a.令人耳目一新。B.重新计算。c.灵敏度。d.假设。.

When one or more numbers in a spreadsheet are changed, all related formulas will automatically recalculate and charts will be recreated. This is called recalculation.

Difficulty: Easy OLeary - 003 Chapter... #15 121. (p. 68) The height of a character is called its

A. font size.

b. format.

c. pixel.

d. design121.(p 68) 字符的高度被称为其 A.字体大小。b.格式。c.像素。d.设计。.

The height of a character is its font size.

Difficulty: Easy OLeary - 003 Chapter... #10 122. (p. 68) If you need to create documents that consist primarily of text, you need this software.

a. Presentation graphics

B. Word processor

c. Spreadsheets

d. Database management122.(p 68) 如果您需要创建主要包括文本的文档,您需要此软件。a.演示文稿图形 B.字处理器 c.电子表格 d.数据库管理

Word processor is used to create document files.

Difficulty: Easy

OLeary - 003 Chapter... #9 123. (p. 81) What is an integrated package?

a. A set of different versions of the same software package, like Word 5.0, 6.0, and 7.0.

B. A single program that provides the functionality of several programs.

c. All the business software made by a single vendor, like all the Microsoft software.

d. A set of software like a financial service and a resource sharing bulletin board offered by a single vendor. 123.(p 81) 集成的产品包的是什么?a.一组相同的软件的不同版本的软件包,像 Word 5.0、 6.0、 7.0。B.单一的程序,提供了几种程序的功能。c.所有业务软件由单一的供应商,像微软的所有软件。d.一套软件,如金融服务和单一的供应商所提供的资源共享公告板。

An integrated package is a single program that provides the functionality of a word processor, spreadsheet, database manager, and more.

Difficulty: Easy OLeary - 003 Chapter... #23 124. (p. 76) The most widely used database structure is

a. hierarchical.

B. relational. c. centralized.

d. linear124.(p 76) 最广泛使用的数据库结构是 a.分层。B.关系。c.集中。d.线性。.

The relational database is the most widely used database structure.

Difficulty: Easy OLeary - 003 Chapter... #20 125. (p. 71) Prewritten formulas provided by the spreadsheet program that perform calculations such as adding a series of cells are called

A. functions.

b. entries.

c. grids.

d. values. 125.(p 71) 预写的公式的电子表格程序提供执行计算如添加一系列的细胞称为 A.职责。b.条目。c.网格。d.值。

Prewritten formulas in a spreadsheet program are called functions.

Difficulty: Easy OLeary - 003 Chapter... #14 126. (p. 71) In a spreadsheet, a cell is defined as the

a. intersection of a table and a tuplet.

b. intersection of a file and a database.

C. intersection of a row and column.

d. intersection of a field and a record. 126.(p 71) 在电子表格中,单元格被定义为表和 tuplet a.交集。b.交集的文件和数据库中。C.交集的行和列中。d.交集的字段和记录。

Cell is the intersection of a row and column.

Difficulty: Easy OLeary - 003 Chapter... #13 127. (p. 73) Which would be most appropriate to create, analyze and forecast budgets?

a. DBMS

b. Word processor

C. Worksheet d. Power Point127.(p 73),将是最适合于创建、 分析和预测的预算?a.DBMS b.字处理器工作表 C.d.电源点

Worksheets are used for a wide range of different applications. One of the most common uses is to create, analyze, and forecast budgets.

Difficulty: Easy OLeary - 003 Chapter... #17 128. (p. 68) This is a character-effect.

a. Find and replace

b. Numbered list

C. Color d. Bullets128.(p 68) 这是字符的效果。a.查找和替换 b.C.颜色 d.子弹的编号列表

Color is a character-effect.

Difficulty: Easy

OLeary - 003 Chapter... #8 129. (p. 99) Raster images are also known as

A. bitmap images.

b. vector images.

c. clip art images.

d. multimedia images. 129.(p 99) 栅格图像被称为 A.位图图像。b.矢量图像。c.剪贴画图像。d.多媒体图像。

Raster images are also known as bitmap images.

Difficulty: Easy OLeary - 004 Chapter... #7 130. (p. 99) Which of the following programs is not a popular professional image editor program?

A. Adobe PageMaker

b. Microsoft Paint

c. Adobe Photoshop

d. Corel PhotoPaint130.(p 99) 哪以下程序不是受欢迎的专业图像编辑器程序?A.adobe b.Microsoft 画图 c.Adobe Photoshop PageMaker d.Corel PhotoPaint

Adobe PageMaker is a desktop publishing package.

Difficulty: Easy OLeary - 004 Chapter... #8 131. (p. 112) Perception system robots

a. act as a transportation system, like a \"mailmobile\".

B. imitate some human senses.

c. perform manufacturing tasks like painting cars.

d. are another name for virtual reality131.(p 112) 感知系统机器人 a.充当运输系统,像\"信差\"。B.模仿一些人类感官。c.执行如画汽车制造任务。d.是虚拟现实技术的另一个名称。.

Perception system robots imitate some of the human senses.

Difficulty: Easy

OLeary - 004 Chapter... #25 132. (p. 108) This type of animation is usually full-screen, highly dynamic and interactive.

a. Story board

b. Photoshop

c. Illustrator

D. Flash132.(p 108) 这种类型的动画通常是全屏幕、 高度动态和互动。a.故事板 b.Photoshop c.Illustrator D.闪存

Flash (from Adobe Systems) is a highly dynamic and interactive animation that is usually full-screen.

Difficulty: Easy OLeary - 004 Chapter... #17 133. (p. 111) Another name for a knowledge-based system is

a. a perception system.

b. a conventional system.

C. an expert system. d. a database management system133.(p 111) 基于知识的系统的另一个名字是 a.感知系统。b.常规的系统。C.专家系统。d.一个数据库管理系统。.

Knowledge-based systems are also known as expert systems.

Difficulty: Easy OLeary - 004 Chapter... #23 134. (p. 110) Which of the following languages is used to create real-time 3D animation?

a. HTML

B. VRML

c. XML

d. SGML134.(p 110) 的下列语言,用于创建实时 3D 动画?a.HTML B.VRML c.XML d.SGML

Virtual reality modeling language (VRML) is used to create real-time animated 3-D scenes.

Difficulty: Easy

OLeary - 004 Chapter... #21 135. (p. 101) Which of the following is not an example of graphics suites?

a. CorelDraw

b. Adobe's Creative Suites

C. Quark Xpress

d. Macromedia's Studio135.(p 101) 哪一项不是图形套件中的示例?a.尽 b.Adobe 创意套房 C.夸克 Xpress d.Macromedia Studio

CorelDraw Graphics Suite, includes five individual Corel graphics programs plus a large library of clip art, media clips, and fonts. Two other popular suites are Adobe's Creative Suites and Macromedia's Studio.

Difficulty: Easy OLeary - 004 Chapter... #12 136. (p. 99) Specialized graphic programs used for editing digital photographs are called

a. multimedia authoring programs.

b. blogs.

c. digital scanners.

D. image editors. 136.(p 99) 专用的图形程序用于编辑数码照片被称为 a.多媒体创作程序。b.博客。c.数字扫描仪。D.图像编辑器。

Image editors, also known as photo editors, are specialized graphics programs for editing or modifying digital photographs.

Difficulty: Easy OLeary - 004 Chapter... #5 137. (p. 99) Which of the following programs is not a popular desktop publishing program?

a. Adobe PageMaker

b. Microsoft Publisher

C. Lotus AmiPro

d. QuarkXPress137.(p 99) 哪以下程序不是一个受欢迎的桌面出版程序?a.adobe PageMaker b.C.莲花微软发布 AmiPro d.QuarkXPress

Popular desktop publishing program include Adobe PageMaker, Microsoft Publisher, and QuarkXPress.

Difficulty: Easy OLeary - 004 Chapter... #3 138. (p. 129) In many application programs, this feature is used to provide information or request input.

a. Windows

b. Menus

C. Dialog boxes

d. Pointer38.(p 129) 在许多应用程序中,此功能用来提供信息或要求输入。a.Windows b.C.对话框菜单框 d.指针

Dialog boxes are used to provide information or request input.

Difficulty: Easy OLeary - 005 Chapter... #4 139. (p. 134) To safely remove a program from your computer, you might want to use this type of utility.

a. Backup program

b. File compression program

c. Troubleshooting program

D. Uninstall program139.(p 134) 可安全地删除程序从您的计算机,您可能要使用此实用程序的类型。a.备份程序 b.c.故障排除程序 D.卸载程序文件压缩

Uninstall programs allow you to safely and completely remove unneeded programs and related files.

Difficulty: Easy OLeary - 005 Chapter... #19 140. (p. 131) Most applications developed in the market are typically run on

a. Macintosh.

b. Netware.

c. Linux.

D. Windows140.(p 131) a.Macintosh 上通常运行大多数应用程序开发的市场。b.Netware。c.Linux。D.窗口。.

Because its market share is so large, more application programs are developed to run

under Windows than any other operating system.

Difficulty: Easy OLeary - 005 Chapter... #10 141. (p. 133) Apple computers use which operating system?

a. Windows

b. Be O/S

c. Linux

D. Mac OS141.(p 133) 苹果计算机使用的操作系统?a.Windows b.当操作系统 c Linux D.Mac OS。

Apple computers use the Mac OS.

Difficulty: Easy OLeary - 005 Chapter... #16 142. (p. 128) This type of program performs specific tasks related to managing computer resources.

A. Utility b. Operating system

c. Language translator

d. Device 142.(p 128) 这种类型的程序执行有关管理计算机资源的特定任务。A.实用程序 b.操作系统 c.语言翻译 d.设备驱动程序

Utility programs perform specific tasks related to managing computer resources.

Difficulty: Easy OLeary - 005 Chapter... #2 143. (p. 129) This type of boot occurs when the computer is already on and you restart it without turning off the power.

a. Generic boot

b. Live boot

C. Warm boot

d. Cold boot143.(p 129) 当计算机已经打开,您在不关闭电源的情况下重新启动它的这种类型的启动时发生。a.一般引导 b.活引导 C.温暖引导 d.冷启动

A warm boot occurs when the computer is already on and you restart it without turning off the power.

Difficulty: Easy OLeary - 005 Chapter... #5 144. (p. 130) In a network operating system, this computer coordinates all communication between the other computers.

a. Client

B. Server

c. Terminal

d. Mode144.(p 130) 网络操作系统,在这台计算机协调其他计算机之间的所有通信。a.客户端服务器 B.c.终端 d.模式

The network server coordinates all communication between the other computers.

Difficulty: Easy OLeary - 005 Chapter... #7 145. (p. 137-138) A computer can become infected with viruses in the following ways,

except

a. by opening attachments to e-mail messages.

b. by downloading software from the Internet.

c. by downloading files from the web.

D. by creating a new folder on your computer. 145.(p 137-138) A 计算机可以成为病毒感染通过以下方式,除了 a.通过打开电子邮件附件。b.通过从互联网下载软件。c.通过从网站下载文件。D.通过您的计算机上创建一个新文件夹。

You can \"catch\" a computer virus many ways, including by opening attachments to e-mail messages and downloading software from the Internet.

Difficulty: Easy OLeary - 005 Chapter... #23 146. (p. 133) Name a feature on a Mac which is an advanced search tool that can rapidly locate files, folders, and e-mail messages.

a. Tiger

B. Spotlight

c. Dashboard

d. Leopard146.(p 133) 名称上 Mac,这是一个高级的搜索工具,可以快速查找文件、 文件夹和电子邮件的功能。a.虎 B.聚光灯 c.仪表板 d.豹

Spotlight can rapidly locate files, folders, e-mail messages, addresses, and much more.

Difficulty: Easy OLeary - 005 Chapter... #17 147. (p. 130) In a computer system, data and programs are stored as

A. files.

b. records.

c. archives.

d. annals147.(p 130) 在计算机系统中,数据和程序存储为 A.文件。b.记录。c.档案。d.史册。.

Files are used to store data and programs.

Difficulty: Easy OLeary - 005 Chapter... #6

148. (p. 128) Which of the following is not a system software program type?

a. Utilities

b. Device drivers

c. Language translators

D. Sectors148.(p 128) 哪一项不是一种系统软件程序类型?a.实用程序 b.设备驱动程序 c.语言翻译人员 D.部门

System software consists of four types of programs: operating systems, device drivers, language translators, and utilities.

Difficulty: Easy OLeary - 005 Chapter... #1 149. (p. 139) Whenever you add a new peripheral to a computer system, this must be installed before you can use it.

a. Wizard

b. Icon

C. Device driver

d. Norton SystemWorks149.(p 139) 每当新的外围设备添加到计算机系统时,这必须安装之前,您可以使用它。a.向导 b.图标 C.设备驱动程序 d.诺顿 SystemWorks

Whenever a new device is added to a computer system, a new device driver must be installed.

Difficulty: Easy OLeary - 005 Chapter... #25 150. (p. 131) The operating system is often referred to as the software environment or

a. network.

B. platform.

c. foot plate.

d. desktop. 150.(p 131) 操作系统通常被称为软件环境或 a.网络。B.平台。c.足板。d.桌面

The OS is often referred to as the software environment or platform.

Difficulty: Easy OLeary - 005 Chapter... #9

151. (p. 161) In a microcomputer system, the CPU is contained on a single chip called the

a. semiconductor.

b. ALU.

C. microprocessor.

d. Control Unit. 151.(p 161) 在微机系统中,CPU 包含一个称为 a.半导体芯片上。b.阿鲁。C.微处理器。d.控制单元。

The CPU is contained on a single chip called the microprocessor.

Difficulty: Easy OLeary - 006 Chapter... #10 152. (p. 162) This term is used to describe the number of bits that a CPU can access at one time.

a. Bitrate

B. Word

c. Pulse width

d. Character152.(p 162) 这个词用来描述 CPU 都可以访问一次的位数。a.c.脉冲宽度 d.比特率 B.单词字符

A word is the number of bits that can be accessed at one time by the CPU.

Difficulty: Easy OLeary - 006 Chapter... #11 153. (p. 163) Frequently-accessed information is held in

a. hard drive.

B. cache memory.

c. flash memory.

d. read only memory153.(p 163) 经常访问信息都保存在 a.硬盘。B.高速缓存内存。c.闪存。d.只读存储器。.

Information in RAM that is most frequently used is copied into cache memory.

Difficulty: Easy OLeary - 006 Chapter... #17

154. (p. 162) Which of the following allow a computer to run two programs simultaneously?

a. Coprocessors

b. Multiplexing

C. Dual core chip

d. Binary system154.(p 162) 哪一项允许同时运行两个程序的计算机?a.协处理器 b.多路复用 C.双核心芯片 d.二元体系

Dual core chips allow a single computer to run two programs at the same time.

Difficulty: Easy OLeary - 006 Chapter... #13 155. (p. 160) Tiny circuit-boards etched onto squares of sand-like material called silicon are called

a. buses.

b. slots.

c. sockets.

D. chips. 155.(p 160) 微型-电路板蚀刻的称为硅砂样材料平方称为 a.巴士。b.插槽。c.套接字。D.芯片。

Chips consist of tiny circuit-boards etched onto squares of sand-like material called silicon.

Difficulty: Easy OLeary - 006 Chapter... #6 156. (p. 158) A byte is formed by a group of

a. four bits.

B. eight bits.

c. 12 bits.

d. 16 bits. 156.(p 158) A 字节是由一群 a.四位组成的。B.八位。c.12 位。d.16 位。

Bits are combined into groups of eight called bytes.

Difficulty: Easy OLeary - 006 Chapter... #2

157. (p. 158) Which of the following is not a binary code?

a. EBCDIC

b. ASCII

C. CISC

d. Unicode157.(p 158) 哪一项不是二进制代码?a.EBCDIC b.ASCII C.CISC d.Unicode

ASCII, EBCDIC, and Unicode are the three binary coding schemes.

Difficulty: Easy OLeary - 006 Chapter... #3 158. (p. 164) With this type of memory, large programs are divided into parts and the parts stored on a secondary device, usually a hard disk.

a. Flash

b. Cache

C. Virtual d. Extended158.(p 164) 与此类型的内存,大型程序分为部件和辅助设备,通常是硬盘上存储的部

件。a.flash b.C.扩展虚拟 d.缓存

Virtual memory is used to accomplish this requirement.

Difficulty: Easy OLeary - 006 Chapter... #18 159. (p. 158) This coding system is designed to support international languages like Chinese and Japanese.

a. ASCII

B. Unicode

c. EBCDIC

d. ANSIC159.(p 158) 此编码系统的设计可支持像中国和日本的国际语言。a.c.ASCII B.Unicode 码 d.ANSIC

Unicode is designed to support international languages like Chinese and Japanese.

Difficulty: Easy OLeary - 006 Chapter... #4

160. (p. 156) These systems typically contain the system's electronic components and selected secondary storage devices, but no input devices.

A. Desktop systems

b. Personal digital assistants

c. Palm computers

d. Laptop computers160.(p 156) 这些系统通常包含系统的电子部件和选定的辅助存储设备,但没有输入的设备。A.台式机系统 b.个人数字助理 c.掌上电脑 d.笔记本电脑

Input and output devices, such as a mouse, keyboard, and monitor, are located outside the system unit.

Difficulty: Easy OLeary - 006 Chapter... #1 161. (p. 192) Which of the following is not a type of scanning device?

a. Optical

b. Bar code reader

C. Light pen

d. Character and mark recognition161.(p 192) 哪一项不是一种类型的扫描设备?a.光学 b.C.光笔 d.字符和标记识别条形码阅读器

There are three types of scanning devices: optical scanners, bar code readers, and character and mark recognition devices.

Difficulty: Easy OLeary - 007 Chapter... #9 162. (p. 189) A keyboard key, like Caps Lock, that turns a feature on or off is called a _____ key.

a. power

B. toggle

c. function

d. combination162.(p 189) A 键盘键,如 Caps Lock),打开或关闭的一项功能,称为 _____ 键。a.电源切换 B.c.功能 d.组合

A toggle key turns a feature on or off.

Difficulty: Easy

OLeary - 007 Chapter... #5 163. (p. 200) Used

commonly

for

classroom

presentations,

_____

connect

to

microcomputers to give output similar to a monitor.

a. printers

b. HDTV

c. e-books

D. data projectors163.(p 200) 课堂演示文稿、 _____ 通常用于连接到给输出类似于显示器的微型计算机。a.打印机 b.HDTV c.D.电子书数据投影机

Data projectors are specialized devices that connect to microcomputers and project computer output just as it would appear on a monitor.

Difficulty: Easy OLeary - 007 Chapter... #20 164. (p. 205) Which of the following is used to input and receive data, but cannot process data independently?

a. A host server

B. A dumb terminal c. A Web appliance

d. A network terminal164.(p 205),下列用于输入和接收数据,但不能独立处理数据?a.主机服务器 b。哑终端 c。Web 设备 d。网络终端

A dumb terminal can be used to input and receive data, but it cannot process data independently.

Difficulty: Easy OLeary - 007 Chapter... #24 165. (p. 195) The most widely used audio-input device is the

a. scanner.

b. digital notebook.

C. microphone.

d. bar-code reader165.(p 195) 最广泛使用的音频输入设备是 a.扫描仪。b.数字笔记本。C.麦克风。d.条形码阅读器。.

A microphone is the most widely used audio-input device.

Difficulty: Easy OLeary - 007 Chapter... #15 166. (p. 188) _____ is any data or instructions sent to the computer.

a. Digital

b. Output

c. Information

D. Input166.(p 188) _____ 是任何数据或发送到计算机的指令。a.数字 b.输出 c.D.信息输入

Input is any data or instructions that are used by a computer.

Difficulty: Easy OLeary - 007 Chapter... #1 167. (p. 199) Images displayed on monitors need to have a refresh rate of _____ at the least, otherwise they flicker causing eye strain.

a. 50 hertz

B. 75 hertz

c. 100 hertz

d. 120 hertz167.(p 199) 显示器上显示的图像需要至少有 _____ 的刷新率,否则他们闪烁导致眼睛疲劳。a.50 赫兹 B.75 赫兹 c.100 赫兹 d.120 赫兹

Images displayed on monitors with refresh rates lower than 75 hertz appear to flicker and can cause eye strain.

Difficulty: Easy OLeary - 007 Chapter... #19 168. (p. 191) Tablet PCs and PDAs use a

a. joy stick.

b. light pens.

C. stylus. d. mouse. 168.(p 191) Tablet Pc 和 Pda 使用 a.操纵杆。b.光笔。C.手写笔。d.鼠标。

Tablet PCs and PDAs use styluses.

Difficulty: Easy

OLeary - 007 Chapter... #8 169. (p. 193) Bar code readers use _______ embedded in them to read bar codes.

a. coprocessors

b. magnetic cells

c. RFID microchip

D. photoelectric cells169.(p 193) 栏代码读者使用嵌入在他们的 ________ 读取条形码。a.协处理器 b.磁细胞 c.RFID 芯片 D.光电细胞

Bar code readers contain photoelectric cells that scan or read bar codes, or the vertical zebra-striped marks printed on product containers.

Difficulty: Easy OLeary - 007 Chapter... #10 170. (p. 191) Instead of using a mouse, you can use this pointing device to control the pointer by rotating a ball with your thumb.

a. Pointing stick

b. Touchpad

c. Joystick

D. Trackball170.(p 191) 的而不是使用鼠标,您可以使用此指点设备来控制鼠标指针的旋转球用拇指。a.指点杆 b.触摸板 c.D.轨迹球游戏杆

A trackball has a ball on the top that you move with your thumb.

Difficulty: Easy OLeary - 007 Chapter... #7 171. (p. 188) The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by:

a. representing the phonetics of the alphabets most closely associated with the keyboard.

B. taking the letters of the first six alphabetic characters found on the fourth row of keys.

c. using the alphabetic characters most frequently used on the keyboard.

d. using the letters of the alphabetic characters that are closest to access while typing171.(p 188) 的安排,QWERTY 键盘上的键反映的键盘布局: a.最密切代表字母表的语音学与键盘相关联。B.以发现密钥的第四行的前六个字母字符的字母。c.使用最常使用键盘上的字母字符。d.使用在打字时访问最接近的字母字符的字母。.

This name reflects the keyboard layout by taking the letters of the first six alphabetic

characters found on the fourth row of keys.

Difficulty: Easy OLeary - 007 Chapter... #2 172. (p. 194) This reading device is readily used in banks to read the numbers on the bottom of checks and deposit slips.

A. MICR

b. OCR

c. ORM

d. GRE172.(p 194) 阅读底部的支票上的数字和存款单据在银行随时使用此阅读设备。A.MICR b.OCR c.ORM GRE d.

MICR devices are used by banks to read the numbers.

Difficulty: Easy OLeary - 007 Chapter... #11 173. (p. 205) A network terminal is also known as a(n)

a. dumb terminal.

b. PC terminal.

c. intelligent terminal.

D. thin client. 173.(p 205) A 网络终端也称为此 a.哑终端。b.PC 终端。c.智能终端。D.瘦客户端。

A network terminal is also known as a thin client or network computer.

Difficulty: Easy OLeary - 007 Chapter... #25 174. (p. 190) This type of mouse has no moving parts.

a. Mechanical

b. Cordless

c. Wireless

D. Optical174.(p 190) 这种类型的鼠标已没有移动部件。a.机械 b.无绳 c.无线 D.光

An optical mouse has no moving parts.

Difficulty: Easy OLeary - 007 Chapter... #6 175. (p. 198) The individual dots that form the image on a monitor are called

a. picas.

b. specks.

C. pixels.

d. particles. 175.(p 198) 形成的显示器的图像的单个点被称为 a.活字。b.污点。C.像素。d.粒子。

Images are formed on a monitor by a series of dots or pixels.

Difficulty: Easy OLeary - 007 Chapter... #16 176. (p. 221) Zip disks with capacities of 100 MB, 250 MB, and 750 MB are produced by

a. HP.

b. Toshiba.

c. Sony.

D. Iomega176.a.HP176.a.HP。 b.东芝产生 (p 221) Zip 磁盘 100 MB、 250 MB 和 750 MB 的容量。c.索尼。D.Iomega176.a.HP。。

Difficulty: Easy OLeary - 008 Chapter... #8 177. (p. 221) The standard size for flexible disks with an exterior jacket of hard plastic is currently

a. 1.5 inches.

b. 2.5 inches.

C. 3.5 inches.

d. 4.5 inches. 177.(p 221) 外夹套硬质塑料灵活磁盘的标准大小是目前 a.1.5 英寸。b.2.5 英寸。C.3.5 英寸。d.4.5 英寸。

The standard size for flexible disks is 3.5 inches.

Difficulty: Easy OLeary - 008 Chapter... #5

178. (p. 221) Data on a floppy disk is recorded in rings called

a. sectors.

b. ringers.

c. roundels.

D. tracks. 178.(p 221) 数据软盘上的圆环,称作 a.部门记录。b.连霸。c.换。D.跟踪。

Data on floppy disks are recorded in rings called tracks.

Difficulty: Easy OLeary - 008 Chapter... #7 179. (p. 220) Storage that retains its data after the power is turned off is referred to as

a. volatile storage.

b. sequential storage.

c. direct storage.

D. nonvolatile storage179.(p 220) 存储,电源关闭后保留其数据被称为 a.易失性存储。b.顺序存储。c.直接存储。D.非易失性存储。.

Secondary storage is nonvolatile storage as it does not lose the data when the power is turned off.

Difficulty: Easy OLeary - 008 Chapter... #1 180. (p. 220) The process of accessing information from secondary storage devices is referred to as

a. backing up.

b. restoring.

c. writing.

D. reading180.(p 220) 从辅助存储设备访问信息的过程被称为 a.备份。b.还原。c.写作。D.读。.

Reading is the process of accessing information from secondary storage.

Difficulty: Easy OLeary - 008 Chapter... #2 181. (p. 232) Which of the following is not meant to store highly personalized or sensitive information?

a. Internal hard disk

b. Flash drive

c. Floppy

D. i-drive181.(p 232) 哪一项不是要存储高度个性化的或敏感的信息?a.内部硬盘闪存驱动器的 b.c.D.软盘驱动器 i

Because of certain limitations, Internet hard drives are typically used as a specialized secondary storage device and not for storing highly personalized or sensitive information.

Difficulty: Easy OLeary - 008 Chapter... #24 182. (p. 222) For most microcomputer systems, the internal hard disk drive is designated as the

a. E drive.

B. removable drive. c. C drive.

d. D drive. 182.(p 222) 对于大多数微机系统,内部硬盘驱动器上被指定为 a.E 驱动器。B.可移动驱

动器。c.月 c 日驱动器。d.月 D 日驱动器。

For most microcomputer systems, the internal hard disk drive is designated as the C drive.

Difficulty: Easy OLeary - 008 Chapter... #11 183. (p. 232) Special service sites available on the Web that provide users with storage are called

a. solid state storage.

B. Internet hard drive.

c. Internet flash storage.

d. DAT. 183.(p 232) 特别服务站点在 Web 上提供的用户提供存储称为 a.固态存储。B.网络硬盘。c.互联网闪存存储。d.DAT.

Special service sites on the Web provide users with storage. This storage is known as Internet hard drive.

Difficulty: Easy

OLeary - 008 Chapter... #23 184. (p. 225) Decreasing the amount of space required to store data and programs is accomplished by

A. file compression. b. disk caching.

c. RAID.

d. crashing. 184.(p 225) 降 A.文件压缩来完成存储数据和程序所需的空间量。b.磁盘缓存。c.RAID。d.崩溃。

File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.

Difficulty: Easy OLeary - 008 Chapter... #16 185. (p. 220) Which of the following refers to flat circular pieces of Mylar that have been coated with a magnetic material and used as secondary storage?

a. Nonvolatile media

b. EBCDIC data

C. Floppy disks

d. Standard disks185.(p 220),下列是指已对被包覆磁性材料,并可将其用作辅助存储的聚酯薄膜平面圆形件?a.非易失性媒体 b.十进制数据 C.软盘磁盘 d.标准磁盘

Floppy disks use circular pieces of Mylar which are enclosed in a plastic covering.

Difficulty: Easy OLeary - 008 Chapter... #4 186. (p. 220) The ____ indicates how much data a particular storage medium can hold.

a. access

B. capacity

c. memory

d. storage186.(p 220) ____ 指示数据的特定存储介质可以持有多少。a.访问 B.c.d.容量存储

Capacity measures how much a particular storage medium can hold.

Difficulty: Easy

OLeary - 008 Chapter... #3 187. (p. 249) Which among the following assimilate messages in the form of data, information, and/or instructions?

a. Communication channel

B. Sending and receiving devices

c. Connection devices

d. Data transmission specifications187.(p 249) 以下其中吸收中的数据、 信息以及/或者说明形式的消息?a.通信信道 B.发送和接收设备 c.连接装置 d.数据传输技术规格

Sending and receiving devices are often computer or specialized communication devices, that originate (send) as well as accept (receive) messages in the form of data, information, and/or instructions.

Difficulty: Easy OLeary - 009 Chapter... #2 188. (p. 251) To _____ is to send data to a satellite.

A. uplink

b. downlink

c. modulate

d. demodulate188.(p 251) _____ 是将数据发送到卫星。A.上行下行 b.c.调制 d.解调

Uplink is a term relating to sending data to a satellite.

Difficulty: Easy OLeary - 009 Chapter... #8 189. (p. 256) A unique numeric address used by the computer to deliver e-mail and to locate Web sites is called the

a. domain address.

b. protocol address.

C. IP address.

d. Web address. 189.(p 256) A 独特数字地址传递电子邮件并找到 Web 站点使用的计算机称为 a.域名地址。b.协议地址。C.IP 地址。d.web 地址。

Every computer on the Internet has a unique numeric address called an IP address.

Difficulty: Easy OLeary - 009 Chapter... #14 190. (p. 259) This device enables connectivity between two LANs or a LAN and a larger network.

A. Network gateway

b. Switcher

c. Hub

d. Router190.(p 259) 此设备使两个 Lan 或局域网和更大的网络之间的连接。A.网络网关 b.切换器 c.集线器 d.路由器

A network gateway is a device that allows one LAN to be linked to other LANs or to larger networks.

Difficulty: Easy OLeary - 009 Chapter... #19 191. (p. 255) A widely available technology that uses existing telephone lines to provide high-speed connections is called

a. ISDN.

b. microwave.

c. cable modem.

D. DSL. 191.(p 255) A 广泛提供技术,使用现有的电话线,提供高速连接称为 a.ISDN。b.微波。c.电缆调制解调器。D.DSL。

DSL uses existing telephone lines to provide high-speed connections.

Difficulty: Easy OLeary - 009 Chapter... #10 192. (p. 264) A network in which the central computer is a host to a cluster of other computers that in turn are hosts is called a ____ network.

a. star

b. bus

c. ring

D. hierarchical192.(p 264) 中央计算机是到其他计算机,又是主机的群集主机的网络被称为 ____ 网络。a.明星 b.总线 c.环 D.分层

A hierarchical network consists of several computers linked to a central host computer.

Difficulty: Easy OLeary - 009 Chapter... #22 193. (p. 257) A computer system in which computer power is shared by several separate computers linked by a communications network is called a

A. distributed processing.

b. hierarchical processing.

c. network processing.

d. centralized processing. 193.(p 257) 计算机系统在哪台计算机电源由几个单独的计算机通过通信网络链接共享称为 A.分布式的处理。b.分层处理。c.网络处理。d.集中的处理。

Distributed processing is a system in which computing power is located and shared at different locations.

Difficulty: Easy OLeary - 009 Chapter... #18 194. (p. 248) One of the most dramatic changes in connectivity and communications in

the past five years has been

A. mobile or wireless telephones.

b. chat rooms.

c. satellite uplinks.

d. running programs on remote computers. 194.(p 248) 之一的最重大的变化,在连接和通信在过去五年中的一直是 A.移动或无线电话机。b.聊天室。c.卫星上行链路。d.在远程计算机上运行程序。

The most dramatic changes in connectivity and communications in the past five years have been the widespread use of mobile or wireless telephones.

Difficulty: Easy OLeary - 009 Chapter... #1 195. (p. 250) Which physical connection is the fastest?

a. Twisted pair

b. Coaxial cable

C. Fiber-optics

d. Microwaves195.(p 250) 的物理连接速度最快?a.双绞线 b.同轴电缆 C.光纤 d.微波炉

Fiber-optic cable is faster than the other three types of communications mediums.

Difficulty: Easy OLeary - 009 Chapter... #4 196. (p. 295) The incidence of pirated software usage is the highest in

a. United States

b. Norway

C. Thailand

d. Italy196.(p 295) 盗版的软件使用情况的发生率是最高的 a.美国 b.挪威 C.泰国 d.意大利

Pirated software accounts for over 40 percent of software used in the United States. The incidence of pirated software is even higher overseas in such countries as Italy (82 percent) and Thailand (92 percent).

Difficulty: Easy OLeary - 010 Chapter... #15

197. (p. 298) _____ is concerned with protecting software and data from unauthorized tampering or damage.

a. Data backup

b. Physical security

c. Disaster recovery plan

D. Data security197.(p 298) _____ 关切保护软件和数据免受未经授权的篡改或损坏。a.数据的备份 b.物理安全 c.灾难恢复计划 D.数据安全

Data security is concerned with protecting software and data from unauthorized tampering or damage.

Difficulty: Easy OLeary - 010 Chapter... #22 198. (p. 296) Saving an important document under a file name which is unrecognizable by others is an example of

a. a worm.

b. a technological failure.

c. a virus.

D. a human error. 198.(p 296) 保存一份重要的文件,根据文件的名称,这是别人无法识别是 a.蠕虫的一个示例。b.技术故障。c.病毒。D.人为错误。

Some errors may be the result of sloppy procedures. One such example occurs when office workers save important documents under file names that are not descriptive and not recognizable by others.

Difficulty: Easy OLeary - 010 Chapter... #17 199. (p. 294) Which among the following is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return?

a. Malicious programs

B. Internet scams

c. Theft

d. Data manipulation199.(p 294) 以下其中是一种欺诈或欺骗性的行为,旨在欺骗个人支出很少或没有返回的时间或金钱?a.恶意程序 B.互联网骗案 c.盗窃 d.数据操作

A scam is a fraudulent or deceptive act or operation designed to trick individuals into

spending their time and money for little or no return. An Internet scam is simply a scam using the Internet.

Difficulty: Easy OLeary - 010 Chapter... #12 200. (p. 296) A device that protects against a sudden increase in electrical power is a(n)

a. anti-spiker.

b. voltage regulator.

c. network terminator.

D. surge protector. 200.此 a.反主攻 (p 296) 设备,防止电力突然增加。b.稳压器。c.网络终结器。D.电涌保护器。

A device that protects against sudden increase in electrical power is a surge protector.

Difficulty: Easy OLeary - 010 Chapter... #16 201. (p. 299) The study of human factors related to things people use and fitting a computer to a person, rather than vice versa is called

a. macro building.

b. kinesthetic.

C. ergonomics.

d. chiropractic201.(p 299) 的人为因素有关的东西研究人使用计算机的人,管接头,而不是反之亦然是叫做 a.宏建设。b.动觉。C.人机工程学。d.脊骨。.

Ergonomics is defined as the study of human factors related to things people use – such as computers.

Difficulty: Easy OLeary - 010 Chapter... #23 202. (p. 298) A _____ acts as a security buffer between a company's private network and all external networks.

A. firewall

b. password

c. disaster recovery plan

d. virus checker202.(p 298) A _____ 作为一家公司的专用网络和外部的所有网络之间的安全缓冲区。

A.防火墙 b.密码 c.灾难恢复计划 d.病毒检查程序

A firewall acts as a security buffer between a corporation's private network and all external networks.

Difficulty: Easy OLeary - 010 Chapter... #19 203. (p. 286) Programs that are deposited on a user's hard drive when they visit a Web site are called

A. cookies.

b. codes.

c. cache.

d. proxies. 203.(p 286) 程序在访问 Web 站点时存放在用户的硬盘上,被称为 A.cookie。b.代码。c.缓存。d.代理。

Cookies are programs that are deposited on your hard disk from Web sites visited.

Difficulty: Easy OLeary - 010 Chapter... #3

204. (p. 286) Information about how often you visit a Web site can be stored in a _____ on your hard drive.

a. data file

b. history file

c. cache

D. cookie204.(p 286) 有关您经常访问的 Web 站点的信息可以存储在您硬盘上的 _____。a.数据文件 b.历史文件 c.缓存 D.cookie。

Cookies are specialized text files that are deposited on your hard disk from Web sites you have visited.

Difficulty: Easy OLeary - 010 Chapter... #4 205. (p. 295) Theft can take many forms – of hardware, of software, of data, of computer time. White-collar computer crime frequently involves the theft of

a. applications.

b. company's computer time.

C. data. d. property. 205.(p 295) 盗窃可以采取多种形式 — — 硬件、 软件、 数据、 计算机时间。白领计算机犯罪经常涉及到 a.应用程序被盗。b.公司的计算机的时间。C.数据。d.属性。

White-collar crime involves the theft of data.

Difficulty: Easy OLeary - 010 Chapter... #13 206. (p. 356) A common operational database is a type of

a. distributed database.

b. individual database.

C. shared database.

d. proprietary database. 206.(p 356) A 常见操作数据库是 a.分布式数据库的类型。b.单个数据库。C.共享的数据库。d.专有数据库。

Company (shared) databases are of two types: common operational database and common user database.

Difficulty: Easy

OLeary - 012 Chapter... #20 207. (p. 350) The data manipulation subsystem can use query-by-example as well as

A. SQL.

b. HTML.

c. XML.

d. VBA. 207.(p 350) 的数据操纵子系统可以使用查询的示例,以及 A.SQL。b.html 代码。c.XML。d.VBA。

Data manipulation subsystem provides tools like query-by-example and structured query languages (SQL) for data maintenance and data analysis.

Difficulty: Easy OLeary - 012 Chapter... #10 208. (p. 346) Which view of data deals with how the data is actually formatted and located?

A. Physical view

b. Logical view

c. Information view

d. Technical view208.(p 346) 哪个视图的数据处理实际格式化并位于数据如何?A.物理视图 b.逻辑视图 c.d.技术视图信息

The physical view focuses on the actual format and location of the data.

Difficulty: Easy OLeary - 012 Chapter... #1 209. (p. 355) _____ databases store not only data but also instructions to manipulate the data.

a. Hierarchical

b. Network

C. Object-oriented d. Multidimensional209.(p 355) _____ 数据库存储数据不仅说明操作数据。a.分层 b.网络面向对象 C.d.多维

Object-oriented databases store the data and the instructions to manipulate the data.

Difficulty: Easy

OLeary - 012 Chapter... #17 210. (p. 358) Information collected by an organization, from a variety of external and internal databases, is stored in a(n)

A. data warehouse. b. proprietary database.

c. company database.

d. company warehouse.

210.(p 358) 信息收集的组织,从不同的外部和内部数据库,存储在此 A.数据仓库中。b.专有数据库。c.公司数据库。d.公司仓库。

因篇幅问题不能全部显示,请点此查看更多更全内容

Copyright © 2019- yrrf.cn 版权所有

违法及侵权请联系:TEL:199 1889 7713 E-MAIL:2724546146@qq.com

本站由北京市万商天勤律师事务所王兴未律师提供法律服务