搜索
您的当前位置:首页正文

引论答案

2024-08-12 来源:星星旅游
计算机引论答案及考试题型

Chapter 1

Crssword Puzzle

1. people 2、enduser 3、procedures 4、documentfile 5、devicedriver 6、databasefile

7、operationsystem 8、hardware 9、Internet 10、modem 11、software 12、information 13、data 14、tablet PC Multiple Choice

1-5 b b a b d 6-10 d a c d d Open-ended

1. An information system has five parts:people,procedures,software, hardware and data.

People:Are end users who use computer to make themselves more productive. Procedures:Specify rules or guidelines for computer operations. Software:Provides step-by-step instructins for computer hardware. Hardware:Processes the data to create information.

Data:Consist of unprocessed facts including text,numbers, image and sounds. People are the most important part of any information system.

2. System software helps the computer manage its own internal resources.It includes three kinds

of programs:operating systems,utilities and device drivers programs.

3. Basic applications are the kinds of programs to be considered computer competent.

Specialized applications are more narrowly focused on specific disciplines and occupations. Basic applications have some types,such as browser,word processor,spreadsheet ,and so on. Also specialized applications have many types,some of the best known are graphics,audio and video,multimedia,Web authoring ,and artificial intelligence programs.

4. There are four types of computers:supercomputers,mainframe computers,minicomputers,and

microcomputers.

Supercomputers are the most powerful type of computer.

Mainframe computers occupy specially wired,air-conditioned rooms,they are capable of great processing speeds and data storage.

Minicomputers are refrigeratorsized machines.

Microcomputers are the least powerful,yet the most widely used and fastest-growing,type of computer.

Microcomputers are the most common type of computers.

There are four types of microcomputers:Desktop computers,Notebook computers,Handheld computers and PDA. 5. Connectivity is the capability of you microcomputer to share the information with other

computers.

Wireless revolution dramatically affect connectivity.

A computer network is a communications system connecting two or more computers. Internet is the largest network in the world.

The Web provides a multimedia interface to the numerous resources available on the Internet.

Chapter2

Crossword Puzzle:

1、hits 2、ISP 3、spam 4、applets 5、surf,search engine 6、url 7、ftp

1

计算机引论答案及考试题型

8、carder 9、attachment 10、B2B 11、Browser 12、filter 13、link 14、downloading ,dsl Multiple Choice:

1-5dacca 6-10aaadb Matching:

1----I 2----d 3----g 4----e 5---f 6----c 7---h 8---j 9---a 10—b Open-Ended

1. The most common uses of the Internet are the following:communicating,shopping,searching,

etertainment,education,and so on.I have participated in almost all of them.I think cmmunicating is the most popular.

2. The two most common types of providers are National and wireless.

National service providers provide access through standard telephone connections.

Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.

3. A typical e-mail message has three basic elements:header,message,and signature.

4. Social networking is the grouping of individuals into specific groups.There are three basic categories of social networking sites:reuniting,friend-of-a-friend,and common interest

Reuniting sites are designed to connect people who have known one another but have lost touch.

Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.

Common interest sites bring together individuals that share common interests or hobbies. 5.There are three types of search engines: crawler-based search engines, metasearch engines and specialized search engines

Crawler-based search engines, such as Google, create their listings automatically.

Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates,orders the hits,and then provides the edited list to you .one of the best known is Dogpile. Specialized search engines focus on subject-specific Web sites.such as Environment.

Chapter 3

Crossword Puzzle

1、menu /2、worksheet 3、table 4、window 5、DBMS 6、master slide

7、dialog box 8、software suite 9、word wrap 10、sort 11、cell 12、range 13、column/ 14、database 15、toolbar 16、document 17、slides 18、query Multiple Choice

1-5dcbdd 6-10abbcb Matching

1-5jachb 6-10diegf Open-Ended

1. General-purpose application are widely used in nearly every discipline and occupation.They

include word processors,spreadsheets,database management systems,and presentation graphics.

Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.

2

计算机引论答案及考试题型

2. Most applications use a GUI,use windows to display information,and have menus to present commands.

3. A formula is an instruction to calculate or process.Functions are prewritten formulas.A

formula related to what-if analysis is called recalculation.

4. Presentation graplics are programs that combine a variety of visual objects to create

autractive,visually interesting presentation.People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional. 5. An integrated package is a single program that provides the functionality of a word

processor,spreadsheet,database manager, and more. The primary disadvantage of an integrated

package is that the capabilities of each function are not as extensive as in the individual programs.The primary advantages are cost and simplicity.

A software suite is a collection of separate application programs bundled together and sold as a group.It is significantly less expensive to buy a suite of applications than to buy each application separately

Chapter 4

Crossword Puzzle

1、bitmap imag 2、vrml 3、morphing 4、story board 5、interactivity 6、ACID 7、fuzzy logic 8、blog/9、web authoring/10、graphical/ 11、map/ 12、pixels/ 13、link/ 14、vector image/ 15、ai/ 16、flash Multiple Choice

1. a 2、a 3.a 4b 5a 6b 7c 8b 9a 10b Matching

1.i 2g 3d 4e 5c 6f 7h 8b 9j 10a Open-Ended

1. Graphics are widely used to analyze data and to create professional-looking presentations;

Desktop publishers focus on page design and layout and provide greater flexibility;

Image editors are programs for creating and editing bitmap images; Illustration programs are used to create and to edit vector images; Image galleries are libraries of electronic images.These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;

Graphics suites are some companies combining their separate graphics programs in groups. 2. Audio editing software allows you to create and edit audio clips,most software allow you to

add audio effects to your tracks. Video editing software allows you to reorganize,add effects,and more to your digital video footage.

3. Multimedia is the integration of all sorts of media into one presentation.The creation of

interactive multimedia presentations follows several steps:Plan, Design, Create and Support. 4. Creating a site is called Web authoring.A web site design is an interactive multimedia form of

communication,designing a web site begins with determining the site’s overall content,the

overall site design is commonly represented in a graphical map.More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.

5. The three areas of artificial intelligence are virtual reality ,knowledge-based systems and

robotics.Virtual reality is an artificial,or simulated,reality generated in 3-D by a

3

计算机引论答案及考试题型

computer.Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users.Robotics is the field of study concerned with developing and using robots.

Chapter 5

Crossword Puzzle

1.lder .twork server gui fragmented backup,booting warm boot windows utility suite driver icons tracks nos Multiple Choice

1. c 2d 3c 4a 5a 6c 7b 8b 9a 10c Matching

1. j 2d 3f 4b 5g 6h 7a 8e 9i 10c

Open-Ended

1. System software works with end users,application software,and computer hardware to handle

the majority of technical details.It consists of four types of programs:operating systems,utilities,device drivers and language translators.

2. The basic functions of every operating system are :managing computer resources,providing a

user interface, and running applications.The three basic operating system categories are :embedded,network and stand-alone. 3. Windows is by far the most popular microcomputer operating system today.It comes in a

variety of different versions and is designed to run with Intel and Intel-compatible microprocessors.Mac OS is not nearly as widely used as the Windows operating system.It is a powerful,easy-to-use operating system that is popular with professional graphic designs,desktop publishers,and many home users.While Windows,the Mac OS are proprietary operating systems,Linux is not.It is open source software free and available from many sources,including the Web.

4. Utilities are specialized programs designed to make computing easier.The five most essential

utilities are :troubleshooting or diagnostic programs,antivirus programs,uninstall programs,backup programs and file compression programs.Unility suites combine several programs into one package.

5. A device driver works with the operating system to allow communication between the device

and the rest of the computer system.Each time the computer system is started, the operating

system loads all of the device drivers into memory.Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used. Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver.Windows uses Windows Update to make reinstalling or updating device drivers easily.

Chapter 6

Crossword Puzzle

system unit microprocessor bus width memory cable plug and play byte cache ascii system clock Multiple Choice

1. d 2b 3c 4b 5b 6a 7a 8c 9b 10d

4

计算机引论答案及考试题型

Matching

1. j 2a 3c 4h 5g 6i 7d 8e 9f 10b Open-Ended

1. There are four basic types of system units:Desktop system units,Notebook system units,Tablet

PC system units ,and Handheld computer system units.

Desktop system units typically contain the system’s electronic components and selected secondary storage devices .

Notebook system units are portable and much smaller.They contain the electronic components,selected secondary storage devices,and input device .

Tablet PC system units are highly protable devices that support the use of a stylus or pen to input commands and data.

Handheld computer system units are the smallest and are designed to fit into the palm of one hand.

2. The two basic components are:the control unit and the arithmetic-logic unit.

Control unit tells the rest of the computer system how to carry out a program’s instructions. Arithmetic-logic unit performs two types of operations---arithmetic and logical.

3. There are three types of memory chips:RAM, ROM, and CMOS.

RAM chips hold the program and data that the CPU is presently processing,everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.

ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.

CMOS chips provides flexibility and expandability for a computersystem.It contains essential information that is required every time the computer system is turned on.It is powered by a battery and does not lose its contents when the power is turned.Its contents can be changed to reflect changes in the computer system.

4. Five expansion cards are:graphics cards,sound cards,modem cards,NIC and TV tuner cards.

Graphics cards connect the system board to the computer’s monitor,they convert the internal

electronic sighals to video signals so they can be displayed on the monitor.

Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer,they also convert internal electronic signals to audio signals. Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.

NIC are used to connect a computer to one or more other computers.

TV tuner cards can changes the TV signal into one that can be displayed on you monitor.

5. Four standard ports are:serial ports,parallel ports, universal serial bus ports and firewire ports.

Serial ports are often used to connect a mouse,keyboard,modem,and many other devices to the system unit.

Parallel portsa are used to connect external devices that need to send or receive a lot of data over a short distance.

USB ports are gradually replacing serial and parallel ports. FireWire ports provide connections to specialized FireWire devices .

5

计算机引论答案及考试题型

Chapter 7

Crossword Puzzle

dot pitch keyboard wheel botton mechanical dumb omr refresh rate dpi webcam digital camera toggle printer joystick hdtv upcpixel flexible Multiple Choice

1. a 2b 3a 4b 5d 6a 7d 8c 9d 10b Mathing

1. I 2e 3f 4j 5a 6b 7g 8d 9c 10h Open-Ended

1. Input is any data or instructions that are used by a computer.Input devices are hardware used

to translate what people understand into a form that computers can process.

2. ①There are a widely of different pointing devices including the mouse,joystick,touch

screen,light pen,and stylus. A mouse controls a pointer that is displayed on the monitor.

A joystick is the most popular input device for computer games.You control game actions by varying the pressure,speed,and direction of the joystick.

A touch screen is a particular kind of monitor with a clear plastic outer layer. A light pen is a light-sensitive pen-like device.

A stylus acts with the computer through handwriting recognition software.

②There are three types of scanning devices:optical scanners,card readers,bar code readers,and character and mark recognition devices.

An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.

Card readers interpret encoded information.

Bar code readers are either handheld wand readers or platform scanners.

Character and mark recognition devices are scanners that are able to recognize special characters and marks.

③Image capturing devices include digital cameras and digital video cameras. Digital cameras capture still images.Digital video cameras capture motion. ④Audio input can take many forms including the human voice and music.

Voice recognition systems accept voice commands to control computer operations and to create document.

MIDI is a standard for connecting musical instruments to the system unit. 3. The most widely used output devices are monitors,printers and audio output.

Monitors present visual images of text and graphics.

Printers translate information that has been processed by the system unit and present the information on paper.

Audio output devices translate audio information from the computer into sounds that people can understand.

4. Output is processed data or information.Output devices are hardware used to translate information that has been processed by the system unit into a form that humans can understands.

5. Devices combines features of input devices such as scanners with features of output devices

6

计算机引论答案及考试题型

like printers are called combination input and output devices.

Combination devices include fax machines,multifunction devices,Internet telephones,and terminals.

A fax machine is a standard tool in nearly every office.

Multifunction devices combine the capabilities of a scanner,printer,fax,and copying machine. Internet telephone are specialized input and output devices for receiving and sending voice communication.

Terminals are input and output device that connect you to a mainframe or other type of computer.

Chapter 8

Crossword Puzzle

Track Raid access time pits and lands disk caching online storage sector floppy zip cylinder density Multiple Choice

1. a 2a 3c 4a 5c 6a 7c 8d 9d 10c Matching

1. g 2a 3j 4i 5d 6b 7h 8c 9f 10e Open-Ended

1. The traditional floppy disk is the 1.44MB 3-inch disk.They have a thin exterior jacker made

of hard plastic to protect the flexible disk inside.

The high capacity floppy disks are 3 inches in diameter.They are able to store more information,are thicker,and require special disk drives.

2. There are three types of hard disks:internal hard disk,hard-disk cartridge,and hard-disk pack.

Three ways to improve the performance of hard disks are disk caching,redundant arrays of

inexpensive disks,and file compression/decompression.

Disk caching improves hard-disk performance by anticipating data needs.

Redundant arrays of inexpensive disks improve performance by expending external storage,improving access speed,and providing reliable storage.

File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.

3. The two most common optical disc formats are CD and DVD.Hi def is the next generation of

optical discs.

①There are four basic types of CDs:read only,write once,rewritable,and Picture and Photo CDs.

Read only CDs cannot be written on or erased by the users,they are used to distribute large databases , references ,and large software application packages.

Write once CDs can be written to once,they are used to archive data and to record music download from the Internet.

Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.

Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.

②There are three types of DVDs :read only,write once,and rewriteable.

7

计算机引论答案及考试题型

Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.

Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.

Rewriteable DVDs are competing rewriteable formats.

4. Solid-state storage does not have moving parts.Internet drives use the Internet to store data

and information.Magnetic tape provides sequential access for backup.

Solid-state storage is more expensive than the others,it is more reliable and requires less power. Internet drives are low cost and the flexibility to access information from any location using the Internet.Access speed is slower.

Magnetic tapes provide slower sequential access.It is an effective and commonly used tool for backing up data.

5. Mass storage refers to the storage of large amounts of data in a persisting and

machine-readable fashion. Enterprise storage systems are the computer storage systems designed for large-scale, high-technology environments of the modern enterprises.Mass storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tape drives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory

Chapter 9

Crossword Puzzle

Client bus network network gateway modulation base station packets analog gps topology nic bps Bluetooth Node Bandwidth Dsl hub Multiple Choice

1. c 2b 3a 4d 5c 6d 7b 8b 9b 10d Matching

1. g 2b 3a 4i 5h 6e 7c 8j 9d 10f Open-Ended

1. ①Connectivity is a concept related to using computer networks to link people and resources.

②The single most dramatic change in connectivity and communications in the past five years has been the widespread use of mobile or wireless telephones.This wireless technology allows individuals to stay connected with one another from almost anywhere at any time,the revolution is just beginning.

③Communication systems transmit data from one location to another.Every communication system has four basic elements:sending

and receiving devices,communication

channel,connection devices,and data transmission specifications.

2. ①Physical connections use a solid medium to connect sending and receiving devices. These connections include telephone lines,coaxial cable,and fiber-optic cables. Telephone lines consist of twisted pair cable,they have been the standard transmission medium for years for both voice and data.

Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core. Fiber-optic cable transmits data as pulses of light through tiny tubes of glass. ②Wireless connections use the air to connect sending and receiving devices.

8

计算机引论答案及考试题型

Primary technologies used for wireless connections are infrared,boardcast radio,microwave, and satellite.

Infrared uses infrared light waves to communicate over short distances.

Broadcast radio communication uses special sending and receiving towers called transceivers. Microwave communication uses high-frequency radio waves.

Satellite communication uses sstellites orbiting about 22000 miles above the earth as microwave relay stations.

3. The standard protocol for the Internet is TCP/IP.The essential features of this protocol

involve:identifying sending and receiving devices and reformatting information for

transmission across the Internet.

Identification:Every computer on the Internet has a unique number address called an IP address,the Internet uses IP addresses to deliver e-mail and to locate Web sites.

Reformatting:Information sent or transmitted across the Internet usually travels through numerous interconnected networks.Before the massage is sent,it is reformatted or broken down into small parts called packets,at the receiving end,the packets are reassembled into the correct order.

4. The four principal network topologies are star,bus,ring,and hierarchical.

In a star network,a number of small computers or peripheral devices are linked to a central unit,all communications pass through this central unit.

In a bus network, each device in the network handles its own communication control. In a ring network,each device is connected to two other devices,forming a ring.

The hierarchical network consists of several computers linked to a central host computer,other computers are also hosts to other,smaller computers or to peripheral devices.

5. The most common network strategies are terminal,client/server,and peer-to-peer systems.

①In a terminal network system,processing power is centralized in one large computer.For the

end user it is lack of control and flexibility.

②Client/server network system use one computer to coordinate and supply services to other nodes on the network.The abiligy of powerful network management software to monitor and control network activities.

③In a peer-to-peer network system,nodes have equal anthority and can act as both clients and servers.The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.

Chapter 10

Crossword Puzzle

Cookie surge protector mal ware ergononics cracker keystroke logger snoopware hacker history file

Multiple Choice

1. a 2a 3d 4b 5a 6c 7d 8c 9b 10d Matching

1. g 2h 3f 4a 5b 6c 7j 8d 9i 10e

Open-Ended

1. Large databases raise some serious concerns on privacy:identity theft and mistaken identity.

The impact of private networks on privacy have the two parts:The first instance,of firms

9

计算机引论答案及考试题型

eavesdropping on employees,has inspired attempts at federal legislation.The second instance,in which online information services screen and reject messages,is a common activity with most commercial services.

The internet brings illusion of anonymity,the web creates a history file ,your web activity is monitored is by cookies. To respond to these privacy concerns, a code of fair information practice has been established. 2. Computer criminals are of five types:

Employees:The largest category of computer criminals consists of those with the easiest access to computers-namely,employees.

Outside users:Some suppliers or clients may have access to a company’s computer system. Hackers and crackers:Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it.Crackers do the same thing but for malicious purposes. Organized crime:Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do,but for illegal purpose.

Terrorists:Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems. 3. Some of the principal measures to protect computer security are encryption,restricting

access,anticipating disasters,and backing up data.

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily

understood by unauthorized people.

Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals.Individuals are also using encryption programs to safeguard their private communications.

4. Ergonomics is defined as the study of human factors related to things people use.

The physical health matters related to computers that have received the most attention

recently are the following:eyestrain and headache,back and neck pain,and repetitive strain injury.Computer technology creates some irritants that may be counterproductive:noise,and electronic monitoring.

5. The basic elements of the Green PC are:System unit ,display, and manufacturing.

As a computer user,you can do to help protect the environment are the following:

conserve, recycle ,and educate.

期末考试题型如下:

1. 名词缩写(英文) 2. 填空(中文) 3. 选择(英文) 4. 连线(英文) 5. 计算(中文) 6. 简答(中文)

10

因篇幅问题不能全部显示,请点此查看更多更全内容

Top