华中师范大学网络教育学院
《教育技术学专业英语》练习测试题库及答案
一、Fill in the blanks
1. First-generation computers' main parts are ____________. 2. Second-generation computers' main parts are ____________. 3. Third-generation computers' main parts are ____________. 4. Fourth-generation computers' main parts are ____________.
5.____ is the integration of text, audio sound, static graphic images, animations, and full-motion video.
6. ____ is the basis for word processing programs.
7. Audio sound is available in several formats, such as ____, ____, ____. 8.____ is another buzzword going through the industry. 9.____,____,____,____ are four basic processes of CAD.
10.In most practical applications,____ would be incorporated in a much large specific applications system.
11. In a manufacturing industry, discrete islands of implementation fall into five c1asses: ____,____,____,____,____.
12. The integration effort should include both ____and____. 13.As early as l980, the CASA/SME published a presentation of ____ in order to provide a common set of terms for its members.
14. An adage ____is certainly as valid today as it was l00 years ago. 15. Computer graphics is concerned with all aspects of ____. 16. An idea of the complete picture includes____.
17. ____show us state--of--the--art hardware and software. 18. In raster graphics, the picture elements are ____.
19. A special memory area in Which the pixels are stored is called ____. 20. A ____ is simply any collection of objects. 21. An assertion such as 1+1=3 which is either true or false, but not both, is ca11ed a ____
22. The truth values of compound propositions can be described by____. The ____of the compound proposition p(p1,..,pn) 1ists all Possible combinations of truth va1ues for pl... pn, T denoting true and F denoting false, and for each such combinations lists the truth va1ue of p(p1,..,pn). 23. In ____, complete simP1e sentences, such as \taken as unbroken units, and are not analyzed into their component parts. 24. In ____,our logical analysis goes deeper, into the interna1 structure of the simple sentences and instead of singe letters to represent complete sentences, we have various symbo1s to represent the various parts of a sentence.
25. It has n vertices and precise1y one edge between each Pair of distinct vertices. It is cal1ed____.
1
26. Graphs that contain a circuit that includes every edge exactly once. It is called____.
27. ____ graph is one that contains a circuit that visits each vertex exact1y once. 28. Computational image processing can be defines as the operation of ____ on numeric representations of pictorial scenes. 29. Image are formed either by ____or____ 30. The two fundamental characteristics of image are their ____resolution and their ____resolution.
31. Lossless compression means that you can achieve a certain ____and be able to exactly reproduce the original image.
32 .A fast computer implementation of the Discrete Cosine Transform is known as a ____. 33. Artificial systems need many features of brain such as____, ____, ____, ____ and____.
34 .Neural computation is also known as ____ ____ ____ ____ and ____. 35 .The fundamental theory of a neuron is ____ and is as ____.
36.The brain is composed of about ____ neurons and as a ____of about 1011 processors
37. Robust of a neuron system means ____.
38 .The typical cycle time of neurons is a few ____ and the cycle time of semiconductor gates is ____.
39 .The main problem of making neural network chips is ____. 40 .A new technology which will potentially alternate the IC chips is ____. 41 .We can \the neura1 network to perform the desired computation in two main ways: ____ and ____.
42 .The excitement of neural networks is their ability to ____.
43 .Select the perfect font ___________with the new drop-down___________ font menu,
which gives you a preview of font styles before you choose them. 44 .Word automatically________________ what language a user is typing and applies the correct Proofing tools, including ________,_______ and________.
45.As part of office 2000, Microsoft Word allows you to easily ____________ information through ______,______, and _____, using tools you're already familiar with.
46.Just click to open _______am in Word and send your document as an E-mail message that retains ______ formatting.
47. Use _________ to add documents, ________ through existing comments, view or
hide the discussion window, or subscribe to a document.
48. The Microsoft Outlook 2000 messaging and collaboration client helps you____________ and______________ and_______________ across your enterprise.
2
49. And in today's workplace, ______________means increased productivity. 50. Whether scheduling meetings, __________ and ___________, or____________ client
contacts, Outlook 2000 gives you all___________ you need to collaborate more efficiently.
51. Microsoft Outlook 2000 helps you organize all your__________ in _________, so
you can always find the information you want, when you want it.
52. The \searches for E-mail messages,_____________, and tasks, and _____________ organizing your inbox efficiently. 53. Direct disk writes are disabled only when_____________________________. 54. Boot sector viruses infect at a________________ level________________ any operating system has been loaded.
55. The Windows-specific viruses are direct-action viruses; namely, they___________, but rely on infecting other programs when the infected program is executed.
56. As a result, these viruses have had limited success in__________, which reside in memory and _____________ functions performed by___________ and have always bcen __________________. 57. Macro viruses pose the greatest threat to___________.
58. I don't mind________ at the grocery store or getting panicky calls for help, the hours are________ and the pay is_________.
59. And troubleshooting nascent networks requires you to know__________ and running_________.
60. I chose the Mac because______________.
61. Today, expansion _________ can give you a music synthesizer, a fax machine, a CD-ROM drive, ect.
62. The control unit fetches _________ from memory and decodes them. 63. When power is removed, information in the semiconductor memory is ________ .
64. Please find the item that is not belong to the DBA _________ . 65. A database _________ is designed to manage large bodies of information.
66. A characteristic of operating system is resource _________ .
67. Assembly-language instructions are a series of abstract _________ . 68. _______ program also has potential benefits in parallel processing. 69. An advantage of a ring network is that it needs less _________ . 70. An ISP supplies a service _________ that you can dial from your computer to log on the internet server.
71. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.
72. Electronic bulletin boards are _________ communication platforms.
3
二、TRUE/FALSE
1. Special purpose computers can adapted to many situation by giving them an appropriate program.
2. A minicomputer is the smallest and least expensive type of computer. 3. A digital computer has worked the value of pi(π) out to 500,000 decimal place.
4. A special purpose computer performs only one specific task and thus lacks versatility.
5. The larger the system the greater is its processing speed, storage capacity.
6. Mainframe computers are designed to process complex scientific application 7. A computer's operational software defines the schedule of jobs awaiting execution.
8. Though an operating system can schedule the execution of jobs, it does not manage the availability of I/O devices.
9. The IOCS component of an operating system controls I/O operations. 10. It is a major problem for the operating system to map the logical file concept onto physical storage devices such as magnetic tape or disk. 11. Files can only be direct access on a disk system.
12. The logic structure and nomenclature of the different operating systems vary considerably.
13 .Flowcharting is used primarily for program design and rarely for systems design.
14. When programming in a procedure--oriented language, you tell the computer \15. --Assembler--level languages use memonics to represent instructions. 16. The purpose of office automation is to reduce the human intervention and raise the work efficiency.
17. The key to attaining office automation ties in being equipped with a wide variety of advanced hardware and software. 18. Desktop publishing is a electronic technology that handles the sending and receiving of messages.
19. Electronic mailbox is used to store and distribute messages. 20.Multimedia is a product.
21. Multimedia aims at making computers easier to use. 22.Only a few corporations are turning to multimedia applications to train their employees.
23. Magnetic tape can be used to store large amounts of data where random-access is not required. 24. CD-ROM is Rewritable.
25. In this coming decade we will send and receive more information not just on the telephone.
26. Using the general television, people can hold a business meeting
4
without leaving their living room. 27.From the user’s point of view ISDN will be a complex worldwide network. 28. “Smart building” contains a network for voice, data, environment control and closed-circuit TV.
29.In developing countries fiber is rapidly replacing microwave and coaxial cable transmission paths.
30. End—to—end digitization is the hardware base and the first step in the process toward re1alizing an ISDN.
31. Goals of ISDN will be realized by the availability of well—specified and functional user-network interface characteristics and the network transport function that best meets the end user’s needs.
32. ISDN does not include that element that provides one kind of service. 33.Special purpose ISDN can provide single service. 34.Workstations in ISDN used for CAD, graphics arts and desktop publishing will become communicating terminals. 35.Bank robberies in developed countries commonly crop up for these years. 36.Some computing professionals and managers have recognized the value of the resources they use or control.
37.Judges do not recognize electromagnetic signals as the statute property.
38.The multiplicity of intruding a computing system makes computer security difficult.
39.Control is a protective way for reducing a vulnerability.
40.Wiretapping to obtain data in a network is an interruptive action. 41.Coding in computer security makes data be unintelligible to the outside observer.
42.Encryption can solve all computer security.
43.Software controls directly influence the way users interact with a computing system..
44.Principle of Effectiveness points out that control must be effective, efficient, appropriate and easy to use.
45.The possible symbols in the binary numbering system are 0 to 9. 46.The decimal value of 16 is represented in 4 bit BCD as 0001010l. 47.Alphanumeric versions of BCD commonly use 6, 7, or 8 bits to represent characters.
48.A 6 bit alphanumeric code can represent 128 different characters. 49. There are four 8 bit codes in current use.
50.Each 8 bit unit used to code data is called a byte.
51.performance management statistics would most likely be used by computer operators.
52.performance management software monitors the use of files, file and I/O devices and utility software.
53.Thinking about a new computer system is an opportunity to reexamine a business and the manner in which it is operated.
5
百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库华中师大《教育技术学专业英语》练习测试题库及答案在线全文阅读。
相关推荐: