奥鹏作业答案-谋学网-专业的奥鹏在线作业答案辅导网【官网】

 找回密码
 会员注册

微信登录,扫一扫

手机号码,快捷登录

VIP会员,3年作业免费下 !奥鹏作业,奥鹏毕业论文检测新手作业下载教程,充值问题没有找到答案,请在此处留言!
2022年5月最新全国统考资料投诉建议,加盟合作!点击这里给我发消息 点击这里给我发消息
奥鹏课程积分软件(2021年最新)
查看: 1131|回复: 0

大工14秋《专业英语(计算机英语)》在线测试3辅导资料

[复制链接]
发表于 2014-11-8 11:59:22 | 显示全部楼层 |阅读模式
谋学网
谋学网(www.mouxue.com)是国内最专业的奥鹏作业资料,奥鹏离线作业资料及奥鹏毕业论文辅导型网站,主要提供奥鹏中医大、大工、东财、北语、北航、川大、南开等奥鹏作业资料辅导,致力打造中国最专业的远程教育辅导社区。

  
大工14秋《专业英语(计算机英语)》在线测试3
      
单选 判断题


一、单选题(共 20 道试题,共 80 分。)
1.  ( ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
-----------------选择:A      
2.  ( ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
-----------------选择:B      
3.  ( ) is a way of transferring files over the Internet from one computer to another.
A. Internet
B. FTP
C. E-mail
D. ISP
-----------------选择:B      
4.  Which one is a word processing and text editing tool?( )
A. Photoshop
B. Word
C. Extreme 3D
D. Premiere
-----------------选择:B      
5.  The ( ) was the precursor to the Internet. Developed in the late 1960's and early 1970's by the U.S. Department of Defence as an experiment in wide-area-networking that would survive a nuclear war.
A. ARPANET
B. Apple
C. Microsoft
D. None of the above
-----------------选择:      
6.  ( ), referring to a person who breaks into computer systems for the challenge or steal computer resources or corrupt a computer's data.
A. Hacker
B. Password
C. DES
D. Authenticate
-----------------选择:      
7.  ( ) is a protocol that lets a user log in to a remote computer and use programs and data that the remote owner has made available, just as if it were their own computer.
A. FTP
B. WWW
C. Telnet
D. NSFNET
-----------------选择:      
8.  ( ) stands for "World Wide Web"; it is the large global collection of Internet servers which support hypertext documents coded in HTML, and transferred via HTTP.
A. Internet
B. WWW
C. ARPANET
D. ISP
-----------------选择:      
9.  ( ) ,conversion of either encoded or enciphered text into plaintext.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
-----------------选择:      
10.  ( ), the process of changing plaintext data into enciphered text through an algorithm.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
-----------------选择:      
11.  ( ) will provoke radical changes in the teaching process during the coming decades, particularly as smart students discover they can go beyond the limits of traditional teaching methods.
A. Animation
B. WAV
C. Multimedia
D. none of the above
-----------------选择:      
12.  ( ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.
A. MP3
B. MP4
C. JPEG
D. AVI
-----------------选择:      
13.  ( ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
-----------------选择:      
14.  ( ), a secret code assigned to a user which is known by the computer system. Knowledge of the password associated with the user ID is considered proof of authorization.
A. Hacker
B. Password
C. DES
D. Authenticate
-----------------选择:      
15.  The ( ) is a worldwide system of computer networks in which any one computer can get information from/or talk to any other connected computer using the TCP/IP protocols.
A. Internet
B. WWW
C. ARPANET
D. ISP
-----------------选择:      
16.  ( ) is the messages, usually text, send from one person to another via the Internet.
A. TCP/IP
B. Telnet
C. FTP
D. E-mail
-----------------选择:      
17.  ( ), technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
-----------------选择:      
18.  ( ), executable code that, when run by someone, infects other executable code in a computer.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
-----------------选择:     
19.  ( ) is a computer technology that creates three dimensional real illusion in an artificial world.
A. Vector image
B. Bitmap
C. JPEG
D. Virtual Reality
-----------------选择:      
20.  ( ), the process of compressing a file such that some data is lost after the file is compressed and decompressed.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
-----------------选择:      


   
大工14秋《专业英语(计算机英语)》在线测试3
      
单选题 判断题


二、判断题(共 10 道试题,共 20 分。)
1.  An ISP is a company that provides access to the Internet.( )
A. 错误
B. 正确
-----------------选择:      
2.  TCP/IP is the suite of communications protocols used to connect computers on the Internet.( )
A. 错误
B. 正确
-----------------选择:      
3.  Electronic Commerce means buying and selling products and services online via the Internet.( )
A. 错误
B. 正确
-----------------选择:     
4.  A Domain Name System is an Internet service that translates domain names to or from IP addresses.( )
A. 错误
B. 正确
-----------------选择:      
5.  An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.( )
A. 错误
B. 正确
-----------------选择:      
6.  EDI is a set of computer interchange standards for business documents such as invoices, bills, and purchase orders.( )
A. 错误
B. 正确
-----------------选择:      
7.  Symmetric key(Private Key):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.( )
A. 错误
B. 正确
-----------------选择:      
8.  A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )
A. 错误
B. 正确
-----------------选择:      
9.  Asymmetric key(Public Key),in encryption, one key is used to both lock and unlock data.( )
A. 错误
B. 正确
-----------------选择:      
10.  A credit card is a plastic card that allows the holder to obtain goods and services on credit terms without the immediate requirement to pay cash.( )
A. 错误
B. 正确
-----------------选择:      



谋学网(www.mouxue.com)是国内最专业的奥鹏作业资料,奥鹏离线作业资料及奥鹏毕业论文辅导型网站,主要提供奥鹏中医大、大工、东财、北语、北航、川大、南开等奥鹏作业资料辅导,致力打造中国最专业的远程教育辅导社区。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?会员注册

×
奥鹏作业答案,奥鹏在线作业答案
您需要登录后才可以回帖 登录 | 会员注册

本版积分规则

 
 
客服一
客服二
客服三
客服四
点这里给我发消息
点这里给我发消息
谋学网奥鹏同学群2
微信客服扫一扫

QQ|关于我们|联系方式|网站特点|加入VIP|加盟合作|投诉建议|法律申明|Archiver|小黑屋|奥鹏作业答案-谋学网 ( 湘ICP备2021015247号 )

GMT+8, 2024-4-20 18:20 , Processed in 0.123962 second(s), 24 queries .

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表