|
5 t* l- J% ~1 x( d' u" W% n/ D
, _* a: r% J3 b- E- L9 K l5 k西南大学培训与继续教育学院课程考试) m2 x: D* _- P' I2 D8 q
课程名称:(0089)《专业英语》* a; {: \. W1 _& g; w
! S% y& @9 P0 e7 r
考试时间:150分钟
/ x" t+ y, f9 F+ F/ k3 k! a+ K 7 M& b5 C4 T' X2 d( w% f8 I
更多资料下载:谋学网(www.mouxue.com):100分
: [( h0 l" v# h
, e$ y8 A# P4 q% r
# `' B/ X5 z* X% W! t: J1 ] ! @* E F$ ^; I9 O/ d5 z& _
学号:- N& c* v9 e8 P# {
# h( o2 x" V/ C3 N
一、
+ R: V- v0 w. o9 t+ Y! R更多资料下载:谋学网(www.mouxue.com)(本大题共10小题,每道题2.0分,共20.0分)
2 }- Y f2 j( D% d) S/ g+ w9 M1.5 ?# d% N7 k8 ]+ F% R% b' _' X5 l
( ) is a fast and powerful operating system, based on the UNIX O.S. M7 E9 ^% V8 c3 f
A.Windows* t4 |$ S9 }; O
B.Office
8 _) S; ^# q0 E) _0 \& j. m' g- mC.Windows
+ C$ d+ L) M# N5 d. a' yD.Linux
5 r. w( S+ V, A* Q, G2.
" c h, U/ e( h$ S) a0 kThe RGB value is composed of ( ) components
" b% |1 [# E; A6 \/ P0 |: yA.one
- U3 X7 i3 X7 E/ R9 c$ o( lB.two# z9 I! [5 N- K' I w* l
C.three; X9 [5 ~5 t j
D.four
6 f. I y# }; b- M* N3.
1 Q5 V" N" k* |5 V5 \2 G% R4 ?, IThe ( ) turns the object file into an executable program
5 |: e' i( X5 h1 l c2 Q/ PA.linker0 x2 h( L7 r" P) @0 f
B.compiler$ u% ]1 s( g! t- }6 j0 t1 z- ]0 |
C.interpreter
) b' u0 b6 P1 B$ JD.computer
9 M# i, U: Y! S7 n8 i- J4.* I. c3 H5 E1 R: G
( ) is a word processing tool that helps you to create quality documents.# Y( R0 d) }0 F0 d8 c$ r* p
A.Word
+ T* Z0 M0 Q6 d3 Q2 rB.Outlook8 I, z) Z; Q% u' l
C.Access6 a5 ]2 y+ \# {/ e1 J. k ~1 j
D.Excel
: w/ Y/ S% n/ ?6 ]3 }- O5.
# S# s" A V- E5 Q6 pThe OSI model has ( ) layers
r2 `* H q/ m1 PA.four: ]! G% D) }" Z: R2 H2 ?
B.five0 E6 @' V% p7 z
C.six
6 Z/ L+ j6 l- G) T& vD.seven
% ^9 x3 J0 @% _; H6.; Y4 j8 r3 x$ U/ m! i" `
( ) is used to communicate with another computer over telephone lines.4 C" ~/ B" B w7 n
A.Keyboard
4 O W$ c c# ?4 X) L2 [B.Modern
2 v4 S( e$ t% u6 s: IC.Mouse+ ]" R9 j3 E1 O4 c" f- f. v( [
D.Printer
$ w6 P8 h- O+ X" j1 M# b1 x! ]7.* e9 j/ m" \2 V: d
Virus is a ( )
. F- v, i& F, j$ Q+ |A.Program
& E/ n/ P* j/ k" DB.Computer
8 D5 Y6 d. V: D* [( w! B: oC.Bad man
0 E8 l2 a- O$ N* QD.Beast
9 d6 Z. X9 @' Z! r* f2 j3 X8.& L: @# }7 G- s7 @0 e4 T4 @ H" r4 B+ v& Q
Which one is not a computer languages?( )
5 i$ s2 \. {8 \2 u* b' l) vA.word; c; G, M: C& [+ ?5 F% ?/ a3 N
B.Python
" n1 ]# T) F; N, e/ C* GC.C
! d: ?" Z6 ~- n% f! F0 qD.C++
/ C M+ y3 {3 w. H# y* A! q: C9.( ~" Y- S5 \8 _5 S
The purpose of the ( ) is to provide fully integrated analog services to users.% {9 }8 F% L; v0 Y2 N1 m
A.ISDN( }' F% w9 F- a% R6 a. I
B.WWW
2 C% X1 ~) {$ R2 I& @C.FTP+ W+ E. F( c: o5 L
D.HTTP9 i6 M& F9 n7 {! P
10.
4 t& y5 l5 ?& N- }5 G6 z( ) is a device that enables the computer to handel sounds1 u2 ?, ^7 D* W1 Z# U q6 g3 u
A.network card
7 s2 m% J2 f+ fB.video card
2 a2 f+ e/ i: A7 gC.sound card2 ]0 ^8 c# N7 D6 \: c+ ?4 c6 X6 y
D.monitor
( p5 ~) ], V* u9 j3 p0 C二、
" `# i& {; r- [6 U( q1 F$ G( D, t. l填空题(本大题共10小题,每道题3.0分,共30.0分)
5 }+ J2 g+ ?+ G1 [6 @, }% _8 t! W1.! u; W* z$ J, c( `( L/ {
The increase in ( ) connections in homes is a key element in the second wave of electronic commerce.
- b: j% N) r" n! J& L8 v& A
0 h7 {: y% l1 ]* N. ~提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
8 ~& P7 f4 P: k0 f7 R- f) P2.
& B- }) s: S! N; b( QSecurity concerns with respect to data encompass availability, secrecy, and ( )$ p) _ Q7 O& L% h
+ _( i# k ^' N9 d, K提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。* |; ` H! _* J T7 {+ F6 `
3.2 P' S* {: z$ s" ]: x+ P
In computer security, integrity covers the two related concepts of ( ) integrity and system integrity
4 q$ Y9 w* ?" I" I# v% q# I
* b) n' x9 m% W0 n Y提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。" D: {$ V. I! ?4 y# ~ D
4.
w% P: M7 i% b% P, N0 O6 dThe three most commonly used categories of electronic commerce are B2C,( ) and business processes.
$ ^; u( u( e) t" T D: z" O& ~* y f7 a4 Z; Q( e; r8 V- F& o
提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
1 t/ l9 B* S6 x: H5.8 m7 y3 k% s4 ~
Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and ( )of goods or services using the internet. `% O/ b) [1 C9 V; @% R# m' ?& x4 m
* W5 s6 F5 C" p3 z! i7 v提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。7 Y0 ?- A; Y% V& V1 c
6.
6 v0 I! b. O/ N# eA ( )is a string of characters used for authenticating a user on a computer system. " e: s }/ [# e2 X1 K
5 `4 K# k: d q0 r2 P# j" q提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
m: Z2 U* B5 G/ Y7.( J8 S" Q; a# y
The year 2000 was a turning point in electronic commerce. It marked then end of the dot-com( )
. Q* q7 L0 e/ q3 M
- j3 x9 a6 Q5 a) O' h/ {8 `& }& X提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
; H6 U5 U& m) I8., c: T! u) F0 `
Most people use the terms electronic commerce and electronic ( )interchangeably8 u( b$ E5 j4 z8 x, \9 m; p# ]
& G. y! r8 I1 \; P4 ~; X! F3 ]提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
2 ]. f+ Y1 V D% I, B5 \9.
7 Y8 k' ~: N# t( D J2 l* jWhen a consumer sells a good or service to another consumer, the model is called ( )
0 I3 n8 L. k1 q1 c0 G2 [# W
$ S0 j. R9 M8 T0 `提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
. W1 h# Z+ d( }" O6 K10.
! Y# ?3 s7 N. hIn C2C transactions, one party is selling, and thus acting as a business, so they are sometimes treated as part of ( )electronic commerce
; z* @ q3 [3 L! _/ S$ {6 K
& l$ d. D! `3 _1 @: p2 Q9 v提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。% p) r& }$ B4 L1 E5 G4 H. m6 [: m
三、
1 p+ e+ N8 g- A3 z资料来源:谋学网(www.mouxue.com)(本大题共5小题,每道题2.0分,共10.0分)
( \' R% l( R. {$ |' L: r$ R4 I1.
9 [) {. b+ x& S1 |1 i, ]" G [" [Your computer uses two types of memory: primary meory and secondary memory
# d: L% h% v* Y, z1 M对
& ^' o% l2 n* [: E1 J2 a3 U( I错
$ L! j" \7 ]5 [8 C0 @0 `2.
7 R" K- p9 h. T" JWhen you send an email you should provide the sender's email address
5 i$ `8 `4 }% n* q; x对 : ~! a& |% N: `# T4 ^: L1 O
错 & j) _# N: B8 y: E
3.
+ R9 y" ^' e8 K6 f+ B7 L9 SViruses can cause programs crashing but cant cause entire hard disk deleting
9 H( m3 `9 g$ n! k( R对 - v0 v" U; H" A+ l- G4 \& Q- ]8 L
错 ! [9 [; _: q3 M, m: Y& L
4.$ J0 l- ?8 x# j8 g6 c
We can use multimedia in Education, Entertainment and and so on.
l9 b. `. D- T( j3 n( L对 5 q/ k1 x" C, f# Y/ H
错 5 D' p' b3 r @4 l! Q$ H
5." W, o% b7 M1 Y1 G* U7 S6 v. |
The TCP/IP Internet protocol suite is formed from five standards4 z; p6 i- r6 Q5 u. p
对 . O& k8 S! x+ I
错
) E% w8 |$ `9 Q$ P1 A ~4 A8 F( r四、7 m# V/ w. i0 K {
翻译题(本大题共5小题,每道题8.0分,共40.0分)) U! e7 s. t8 ^7 w2 _
1.) R+ Z0 w9 o8 \) W) J
Please translate the following into Chinese
; \0 p6 D+ E" Z' S: w, m! h; @, D$ E; Q* V( b3 |+ l: p7 n& V) x
The word "mobile" has a storied history in the computer world. The term was intially used in the 1980s to describe computers that you could take with you and use while you were on-the-go. H+ q; m, u, E. O
# @ ?8 J) D+ t% W1 A
提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
, R) n+ p/ z( e/ X% O. l: Q2.: S& }! N7 d! F2 F# p9 w
Please translate the following into Chinese+ x# \9 p& Z: t& p% C8 `* @
4 d/ w4 R2 n- F- T0 n& LBefore digital recording took over the audio and video industries, everything was recorded in analog.
6 K c% I5 j3 G6 f* |: V0 s1 o6 ?, ~1 i, D Q/ ~1 D1 `
提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。! ?( Y0 O: r- O( W% ?2 [
3.
9 L+ g2 u3 {7 _8 q; lPlease translate the following into English4 |5 l8 h, s7 f9 Q/ C0 I
: J$ i- j/ `6 M: h. |* Q$ \5 }6 @
蓝牙是通常用于无线键盘和鼠标、无线打印和无线手机耳机的技术。9 y* p% ~: J0 z9 Q
5 i1 i) C7 v D
提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
- E- g( b. L2 `/ S4.# H: O/ z" k3 G* h1 y( N- p
Please translate the following into English
* A& {( k- V _7 d5 \+ d8 p# k' O! P4 C' E( B
百万像素是一百万像素。它通常用于描述数码相机的分辨率。 u( G0 `- Z( O* _$ z% }
- W' q' Z2 h7 X, {1 v提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。. i6 a! F3 @) B. w3 ^
5.8 D1 I; k) @- b: c! y
Please translate the following into Chinese
- h( y; a2 c1 x9 A/ H+ E3 i5 V8 S3 ~+ B5 v/ ]& R
A database management system(DBMS) defines, creates, and maintains a database. The DBMS also allows controlled access to data to the database. A DBMS is a combination of five components: hardware, software, data users, and procedures.# d% w) T# j- {
+ n0 Q, L9 z6 V: s+ ^6 Y: C Q" S
提示:点击工具栏中相机图标拍照上传可以使用手机微信扫码拍照上传照片,请确保拍摄的照片清晰。
8 X' m4 S& G0 W0 [! ^/ j9 R0 C
" f! {3 ?0 W! R: j x/ J |
|