
计算机专业英语题,谁帮忙做下?在线等,万分感谢!!!
二、多项选择题(15道小题,共45分)1、Thefunctionofcomputerhardwareistypicallydividedintothreemaincate...
二、多项选择题(15道小题,共45分)
1、The function of computer hardware is typically divided into three main categories.They are( ). (3分)
A、input B、output
C、cpu D、storage
E、motherboard
2、which is the threat to computer security in the following choices ? (3分)
A、Computer Criminals B、Computer Crime
C、earthquake D、Human Errors
3、You want to ( ) maybe wake up a virus that has residented in memory. (3分)
A、copy a file B、access a diskette
C、execute a program D、del( )ete a file
4、The core of SQL is formed by a command language that allows the ( ) and performing management and administrative functions. (3分)
A、retrieval of data B、ins( )ertion of data
C、updating of data D、deletion of data
E、process of data
5、Viruses can delay their attack for ( ). (3分)
A、days B、weeks
C、months D、years
6、There are AB( ) between the DTEs. (3分)
A、the modem B、communications equipment
C、digital-to-analog converter D、will be replaced by an upd( )ated standard
7、The Windows 2000 product line includes ( ). (3分)
A、Windows 2000 Professional B、Windows 2000 Advanced Server
C、Windows 2000 Server D、Windows 2000 Datacenter Server
8、ADO.NET relies on the services of .NET data providers.There are (3分)
A、Connection B、Command
C、DataReader D、Data Adapter
9、Information Systems has a number of different areas of work: (3分)
A、Information Systems Strategy B、Information Systems Management
C、Information Systems Development D、Information Systems Implement
10、Computer programs fall into two major classes: ( ) and ( ). (3分)
A、application programs B、application suite
C、operating systems D、database application
11、GIS work with two fundamentally different types of geographic models.They are the ( ). (3分)
A、vector model B、geography model
C、data model D、mathematic model
E、raster model
12、Database connection ( ) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database. (3分)
A、pooling B、pond
C、connection D、link
13、Electronic payments include ( ). (3分)
A、digital currencies B、credit card payments
C、electronic checks D、cash payment
14、Some viruses, with no attack phase, often damage the programs or disks they infect because they ( ). (3分)
A、have bugs in them B、contain poor quality code
C、steal storage D、show messages on your screen
15、What make it is difficult to agree on how to count viruses? (3分)
A、new virus arise from an existing virus B、some viruses can create different versions when they infect other programs
C、some viruses can use polymorphic technique D、just a trivial change 展开
1、The function of computer hardware is typically divided into three main categories.They are( ). (3分)
A、input B、output
C、cpu D、storage
E、motherboard
2、which is the threat to computer security in the following choices ? (3分)
A、Computer Criminals B、Computer Crime
C、earthquake D、Human Errors
3、You want to ( ) maybe wake up a virus that has residented in memory. (3分)
A、copy a file B、access a diskette
C、execute a program D、del( )ete a file
4、The core of SQL is formed by a command language that allows the ( ) and performing management and administrative functions. (3分)
A、retrieval of data B、ins( )ertion of data
C、updating of data D、deletion of data
E、process of data
5、Viruses can delay their attack for ( ). (3分)
A、days B、weeks
C、months D、years
6、There are AB( ) between the DTEs. (3分)
A、the modem B、communications equipment
C、digital-to-analog converter D、will be replaced by an upd( )ated standard
7、The Windows 2000 product line includes ( ). (3分)
A、Windows 2000 Professional B、Windows 2000 Advanced Server
C、Windows 2000 Server D、Windows 2000 Datacenter Server
8、ADO.NET relies on the services of .NET data providers.There are (3分)
A、Connection B、Command
C、DataReader D、Data Adapter
9、Information Systems has a number of different areas of work: (3分)
A、Information Systems Strategy B、Information Systems Management
C、Information Systems Development D、Information Systems Implement
10、Computer programs fall into two major classes: ( ) and ( ). (3分)
A、application programs B、application suite
C、operating systems D、database application
11、GIS work with two fundamentally different types of geographic models.They are the ( ). (3分)
A、vector model B、geography model
C、data model D、mathematic model
E、raster model
12、Database connection ( ) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database. (3分)
A、pooling B、pond
C、connection D、link
13、Electronic payments include ( ). (3分)
A、digital currencies B、credit card payments
C、electronic checks D、cash payment
14、Some viruses, with no attack phase, often damage the programs or disks they infect because they ( ). (3分)
A、have bugs in them B、contain poor quality code
C、steal storage D、show messages on your screen
15、What make it is difficult to agree on how to count viruses? (3分)
A、new virus arise from an existing virus B、some viruses can create different versions when they infect other programs
C、some viruses can use polymorphic technique D、just a trivial change 展开
2010-11-10
展开全部
我也是计算机系,希望对你有帮助。
1 ABD
2 D
3 B
4 E
5 ABCD
6 A
7 ABC
8 ABCD
9 ABCD
10 AC
11 BD
12 B
13 ABC
14 C
15 A
1 ABD
2 D
3 B
4 E
5 ABCD
6 A
7 ABC
8 ABCD
9 ABCD
10 AC
11 BD
12 B
13 ABC
14 C
15 A
本回答被提问者采纳
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
在哪里?没看到啊
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
你是中新班的?
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
1.ABC
?
?
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询