大工14秋《专业英语(计算机英语)》在线测试3答案
一、单选题(共 20 道试题,共 80 分。)
V
1. (A ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4 分
2. (B ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4 分
3. ( B) is a way of transferring files over the Internet from one computer to another.
A. Internet
B. FTP
C. E-mail
D. ISP
满分:4 分
4. Which one is a word processing and text editing tool?(B )
A. Photoshop
B. Word
C. Extreme 3D
D. Premiere
满分:4 分
5. The ( A) was the precursor to the Internet. Developed in the late 1960's and early 1970's by the U.S. Department of Defence as an experiment in wide-area-networking that would survive a nuclear war.
A. ARPANET
B. Apple
C. Microsoft
D. None of the above
满分:4 分
6. ( A), referring to a person who breaks into computer systems for the challenge or steal computer resources or corrupt a computer's data.
A. Hacker
B. Password
C. DES
D. Authenticate
满分:4 分
7. (C ) is a protocol that lets a user log in to a remote computer and use programs and data that the remote owner has made available, just as if it were their own computer.
A. FTP
B. WWW
C. Telnet
D. NSFNET
满分:4 分
8. (B ) stands for "World Wide Web"; it is the large global collection of Internet servers which support hypertext documents coded in HTML, and transferred via HTTP.
A. Internet
B. WWW
C. ARPANET
D. ISP
满分:4 分
9. (A ) ,conversion of either encoded or enciphered text into plaintext.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
满分:4 分
10. (B ), the process of changing plaintext data into enciphered text through an algorithm.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
满分:4 分
11. (C ) will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.
A. Animation
B. WAV
C. Multimedia
D. none of the above
满分:4 分
12. (A ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.
A. MP3
B. MP4
C. JPEG
D. AVI
满分:4 分
13. (B ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
满分:4 分
14. (B ), a secret code assigned to a user which is known by the computer system. Knowledge of the password associated with the user ID is considered proof of authorization.
A. Hacker
B. Password
C. DES
D. Authenticate
满分:4 分
15. The ( A) is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.
A. Internet
B. WWW
C. ARPANET
D. ISP
满分:4 分
16. (D ) is the messages, usually text, send from one person to another via the Internet.
A. TCP/IP
B. Telnet
C. FTP
D. E-mail
满分:4 分
17. ( A), technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4 分
18. (C ), executable code that, when run by someone, infects other executable code in a computer.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
满分:4 分
19. ( D) is a computer technology that creates three dimensional real illusion in an artificial world.
A. Vector image
B. Bitmap
C. JPEG
D. Virtual Reality
满分:4 分
20. ( A), the process of compressing a file such that some data is lost after the file is compressed and decompressed.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
满分:4 分
二、判断题(共 10 道试题,共 20 分。)
1. An ISP is a company that provides access to the Internet.(B )
A. 错误
B. 正确
满分:2 分
2. TCP/IP is the suite of communications protocols used to connect computers on the Internet.( B)
A. 错误
B. 正确
满分:2 分
3. Electronic Commerce means buying and selling products and services online via the Internet.(B )
A. 错误
B. 正确
满分:2 分
4. A Domain Name System is an Internet service that translates domain names to or from IP addresses.(B )
A. 错误
B. 正确
满分:2 分
5. An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.(B )
A. 错误
B. 正确
满分:2 分
6. EDI is a set of computer interchange standards for business documents such as invoices, bills, and purchase orders.(B )
A. 错误
B. 正确
满分:2 分
7. Symmetric key(Private Key):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.( A)
A. 错误
B. 正确
满分:2 分
8. A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( B)
A. 错误
B. 正确
满分:2 分
9. Asymmetric key(Public Key),in encryption, one key is used to both lock and unlock data.( A)
A. 错误
B. 正确
满分:2 分
10. A credit card is a plastic card that allows the holder to obtain goods and services on credit terms without the immediate requirement to pay cash.(B )
A. 错误
B. 正确
满分:2 分
暂无评论内容