覆盖学起Plus、超星学习通等平台的全学科作业答案、历年真题与考试速查系统
中国大学MOOC作业考试答案

想要快速找到正确答案?

立即关注 超新尔雅学习通微信公众号,轻松解决学习难题!

超新尔雅学习通
扫码关注

作业辅导
扫码关注
论文指导
轻松解决学习难题!

中国大学MOOC计算机英语(自编教材)作业答案

计算机英语(自编教材)

学校: 无

平台: 超星学习通

题目如下:

1. What are the two classes of hardware according to IT professionals? _______.

A. CPU and RAM

B. Components and peripherals

C. Keyboard and mouse

D. Input devices and ouput devices

答案: Components and peripherals

2. The type of a computer, as well as what the computer is capable of doing, is usually defined by _______.

A. the operating system

B. the display

C. the components, or core internal devices

D. memory

答案: the components, or core internal devices

3. Which of the following is NOT a component sitting on the motherboard?

A. Microprocessor

B. Printer

C. The chipset

D. RAM

答案: Printer

4. Within a computer, all the calculations are done by _____.

A. memory

B. registers

C. ROM

D. CPU

答案: CPU

5. _____ allows your computer to hold the operating system and all running programs while your computer is in use.

A. ROM

B. USB disk

C. RAM

D. Registers

答案: RAM

6. Which of the following is a multimedia component? _____.

A. Graphics card

B. RAM

C. Printer

D. Hard disk

答案: Graphics card

7. The core components are connected by _______.

A. buses

B. CPU

C. USB

D. BIOS

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

8. The "brain" of a computer refers to _____.

A. CPU

B. GPU

C. ROM

D. PCI

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

9. In the 20th century, coprocessors were often used for _______.

A. GPUs

B. sound generation

C. physics applications

D. mathematics

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

10. A computer is just a machine, but a computer system consists of two main elements: the ___1____(机器) and programs. Like a person, a computer system is composed of two parts: the bone—___2____(硬件) and the soul—software. The central idea of a computing system is that input is processed into output. Input is the data which is ____3____(录入) into the computer, and output is the result of processing done by the computer, usually printed out or displayed on the screen. Let us get closer to the computer from the basic components. When talking about computers, such image as Pic 2.1 will appear in our mind: a display screen known as the basic output ____4____(设备), a keyboard usually together with a mouse as the basic input device, and a cabinet known as a machine box. With the development of science and technology, the modern computer becomes more and more ____5____(灵活的), and the hardware family becomes stronger and stronger. A lot of new peripherals appear. These peripherals can be classified into two groups—input devices and output devices.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

11. CPU can be considered as the brain of a computer.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

12. Peripherals are installed on the motherboard directly.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

13. RAM will lose its data when the computer is turned off.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

14. ROM will lose its data when the computer is turned off.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

15. In the 20th century, coprocessors were often used for 3D graphhics.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

16. Buses and ports are used for data storage.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

17. Mouse and keyboard are peripherals.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

18. A musician usually buys an expensive graphics card.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

19. Taking a computer apart is as easy as assembling a computer.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

20. Components and peripherals are two main classes of hardware.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

21. 写出下列术语的英文表达 开放源码:__________ 文字处理程序:__________ 操作系统:_________ 二进制语言:__________ 源代码:__________ 编译器:__________ 批准;许可:__________ 经销商;发行商:__________ 垄断;专卖权:__________ 黑客:__________

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

22. Which of the following is NOT one of the four most popular programming languages mentioned in the text?

A. C

B. Java

C. C#

D. Python

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

23. WORA is the feature of _____.

A. C++

B. C

C. Python

D. Java

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

24. Java is ________ natively compiled languages.

A. slower than

B. faster than

C. as fast as

D. more popular than

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

25. Because Java uses JVM, it is very _____.

A. fast

B. portable

C. difficult

D. inflexible

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

26. C is developed by _____.

A. Sun Microsystem

B. Dennis Ritchie

C. Bjarne Stroustrup

D. Guido van Rossum

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

27. A programmer might choose C because _______.

A. the software developed by it can run in any system

B. the memory management is very easy

C. the software developed by it can run fast

D. it is a very new language

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

28. The weakness of C is _______.

A. difficult memory management

B. speed

C. unsteadiness

D. clumsiness

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

29. Which is not a feature of C++?

A. It is backwards-compatible with C.

B. It is an object-oriented language.

C. It can be used to develop games.

D. It can be used to develop a cellphone app.

渝粤题库 :red">答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

30. _______ is NOT an object-oriented language.

A. C

B. C++

C. Java

D. C#

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

31. Use of indentation for readability is a feature of _______.

A. C++

B. Assembly Language

C. Python

D. Java

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

32.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

33. The Internet community today is populated by individuals, companies, and a variety of organizations located throughout the world. Virtually anyone with a computer that has communications ___1___(能力) can be part of the Internet, either as a user or as a supplier of information or services. Most members of the Internet ___2___(社区) fall into one or more of the following groups. Users are people who avail themselves of the vast amount of ___3___(资源) available through the Internet at work or in their personal lives. There were up to 404 million Internet users inChinaby the end of April in 2010. The Internet use began to approach the ___4___(普及度) of the phone and TV. Internet service providers (ISPs) —often called service providers or access providers for short—are organizations that provide Internet access to others, such as ___5___(中国电信), China Unicom, China Mobile. They operate very much like a cross between cable–television and phone companies in that they provide ___ 渝粤教育 6___(使用权) to a communications service, usually for a monthly fee. Internet content providers, or content providers, are the parties that furnish the information ___7___(可得到的) through the Internet. Here are some examples of content providers: A ___8___(软件) company creates a Web site that users can access to both get product information and download trial copies of software. A ___9___(音乐) publisher creates a site where sample songs can be downloaded and custom CDs can be created, purchased, and downloaded. A film student releases his original short movies to be viewed on the ___10___(网).

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

34. 根据中文写出英文 面向对象的:________(形容词) Java虚拟机:________ 可移植性:________(名词) 句法:________ 嵌入式系统:________ 向后兼容的:________ 内存管理:________ 编译:________ 缩排:________(名词) 开发者:________

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

35. Learning one of the most popular programming language is a good way to start programming career.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

36. Java is a kind of object-oriented language.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

37. Nowadays Java is still in need of a library of reusable software components.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

38. Java virtual machine enables a Java program to run faster.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

39. Java is welcome in university computer science classes.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

40. C is a procedural language.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

41. C is also designed to be object-oriented.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

42. C++ is a very new language used to create a wide array of applications.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

43. Python was named after a kind of snake.

A. true

B. false

答案:请关注【九八五题库】微信公众 成人学历 广东开放大学 号,发送题目获取正确答案。

44. The indentation of Python made it less readable.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

45. Hackers demanded a ransom from Colonial Pipeline Company after ________.

A. undermining the company's computers

B. stealing the company's customer information

C. controlling the company's network system

D. disabling oil supply to America's east coast

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

46. Ireland suffered a "ransomware" attack because _______.

A. hackers controlled 国家开放大学 its oil supply

B. hackers invaded its financial system

C. hackers paralysed the defence system

D. hackers paralysed many hospitals in that country.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

47. According to the text, which of the following is NOT mentioned as a potential victim of hacker attack?

A. air-traffic-control system

B. nuclear-power plant

C. oil pipelines

D. breweries

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

48. Which of the following is a growing focus of cybercrime?

A. financial industry

B. food industry

C. tertiary industry

D. advertising industry

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

49. What is the tendency of bank robbers nowadays?

A. They tend to resort to ransomware attack via hacker techniques.

B. They like to resort to violence for robbery.

C. They like to cheat the bank with a false cheque.

D. They tend to use a bomb to threaten bank tellers.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

50. Dealing with cyber-insecurity is hard because _______.

A. it is difficult to locate the hacker

B. the network attack might be a governmental behavior

C. hackers are clever enough to escape the police

D. there are too many cybercrimes

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

51. The attitude of "one eye open and one eye closed" means _______.

A. a clear and determined attitude

B. an attitude of granting something but announcing its illegality

C. a contemptuous attitude

D. a serious attitude

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

52. Why was Colonial Pipeline Company vulnerable to hacker attack?

A. There is no way to guarantee network security.

B. The company is expected to pay an amazing sum of ransom.

C. The company is ignorant to precautious measures.

D. The hacker hid just in the company.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

53. Why did the author suggest to make it harder to transfer money from orthodox financial system to ordinary bank accounts?

A. The orthodox financial system account might be illegal.

B. The ordinary bank accounts might lose money in the transaction.

C. It might stop hackers from taking ransom.

D. The transaction will not be easy for audit work.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

54. Which is not mentioned as a way to counter hacker attack in the text?

A. Victims should disclose the attack and their potential cost.

B. Ways should be taken to make it harder to transfer money from orthodox financial system to ordinary bank accounts.

C. The firewalls of all companies should be provided by one authorized developer.

D. Liberal societies should work together to contain attacks.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

55.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

56. LH: Hello and welcome to Talk Asia, a special edition coming to you from Beijing. I'm Lorraine Hahn. My guest today is the ___1___(创立者) and ___2___(首席执行长官) of Chinese e-commerce giant Alibaba.com -- Jack Ma. Born in Hangzhou in 1964, Ma first made a name for himself with his idea to start an ___3___ directory called "China Pages," widely regarded to beChina's first Internet company. In 1999, Ma founded "Alibaba.com," which currently operates the world's largest online marketplace, serving small and small- and medium-sized ___4___(企业) by connecting global buyers with sellers inChina. In 2005, Alibaba.com added to its international profile by acquiring and operating YahooChina. Ma himself has impressed many with his sharp entrepreneurial sense and work ethic. Mr. Ma, thank you for joining us. It's good to see you. You have for years carried the image as the underdog. But this particular underdog has done very well for him, hasn't he? JM:Yes, we've been sort of very lucky. LH: You emerged from virtually nowhere, right? And you started this first Chinese Internet-based company. Where did this idea come from? JM:In 1995, I went to Seattle and I ... My friend said Jack, 'This is internet.' And I have never heard about the internet and never used the computer before that day. My first time in my life I used the internet, I touched on the keyboard and I find well -- this is something I believe; it is something that is going to change the world and change China. LH : What aboutChinaPages? JM:ChinaPages, it was just...we were making ______5______(主页) for Chinese companies and list it in theUSAand let the world know about Chinese companies. That's the earliest e-commerce, and that's probably the first internet company inChina. LH: But only with, I read, 2,000 dollars? JM: Yup, I borrowed 2,000 dollars from my relatives, my brother-in-law and my parents. So we started the company.

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

57. 根据中文写出英文 地缘政治学:_______ 正统法:_______ 加密货币:_______ 峰会:_______ (与)计算机或网络(有关)的:_______ 不安全:_______(名词) 预防措施:_______ 事业单位;企业:_______ 勒索软件:_______ 合法的,依法的:_______

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

58. The ransomware attack against Colonial Pipeline Company happened after the ransom attack against Ireland.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

59. Colonial Pipeline Company was responsible for supplying oil to some areas of America.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

60. Oil pipelines, power plants and ports suffering cybercrime will only have their own business cancelled.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

61. Bank robbers prefered to use laptops in the past but used guns nowadays.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

62. Dealing with cyber-insecurity is very easy.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

63. Network attackers are always private actors.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

64. Cybercrimes continue to exist because some attacking behaviors are done by the government.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

65. Some companies suffered network attack because they ignored precautions.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

66. Government should make transaction between orthodox financial system and ordinary bank accounts easier.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

67. Presidents Joe Biden and Vladimir Putin have begun a dialogue on finanicial management.

A. true

B. false

答案:请关注【九八五题库】微信公众号,发送题目获取正确答案。

文章目录


    文章说明
    本文标签:
    ©版权声明
    本站提供的文章均来自网上,如有侵权请邮件与我们联系处理。敬请谅解!
    评论留言

    昵称

    个人资料
    个人资料
    学通智库​ 是专为 ​学起Plus、超星学习通、安徽继续教育、云上河开​ 等主流学习平台用户打造的一站式资源中心。
    • 文章82087
    • 评论0
    • 微语0
    标签