大连理工大学14春《专业英语(计算机英语)》在线测试
大工14春《专业英语(计算机英语)》在线测试3
试卷总分:100 奥鹏学习网(aopeng123.cn) 发布
判断题
单选题
一、判断题(共 10 道试题,共 20 分。)
V
1. An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
2. A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
3. To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
4. A Domain Name System is an Internet service that translates domain names to or from IP addresses.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
5. Electronic Commerce means buying and selling products and services online via the Internet.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
6. EDI is a set of computer interchange standards for business documents such as invoices, bills, and purchase orders.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
7. FTP is the messages, usually text, send from one person to another via the Internet.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
8. To protect data, you need to implement a data backup and recovery plan.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
9. Program flowchart is an outline of the logic of the program you will write.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
10. A file is a collection of relation fields.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
大工14春《专业英语(计算机英语)》在线测试3
试卷总分:100 奥鹏学习网(aopeng123.cn) 发布
判断题
单选题
二、单选题(共 20 道试题,共 80 分。)
V
1. ( ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
需要购买答案的联系QQ:79691519满分:4 分
2. ( ) is a way of transferring files over the Internet from one computer to another.
A. Internet
B. FTP
C. E-mail
D. ISP
需要购买答案的联系QQ:79691519满分:4 分
3. ( ) stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
A. Relational Database
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
需要购买答案的联系QQ:79691519满分:4 分
4. ( ) is a protocol that lets a user log in to a remote computer and use programs and data that the remote owner has made available, just as if it were their own computer.
A. FTP
B. WWW
C. Telnet
D. NSFNET
需要购买答案的联系QQ:79691519满分:4 分
5. ( ), the process of changing plaintext data into enciphered text through an algorithm.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
需要购买答案的联系QQ:79691519满分:4 分
6. A ( ) is a line rented from a telephone company for the exclusive use of a customer to access Internet.
A. leased line
B. online payment
C. credit card
D. ISP
需要购买答案的联系QQ:79691519满分:4 分
7. ( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.
A. MIDI
B. WAV
C. RA
D. Audio
需要购买答案的联系QQ:79691519满分:4 分
8. ( ), executable code that, when run by someone, infects other executable code in a computer.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
需要购买答案的联系QQ:79691519满分:4 分
9. ( ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.
A. MP3
B. MP4
C. JPEG
D. AVI
需要购买答案的联系QQ:79691519满分:4 分
10. ( ), referring to a person who breaks into computer systems for the challenge or steal computer resources or corrupt a computers data.
A. Hacker
B. Password
C. DES
D. Authenticate
需要购买答案的联系QQ:79691519满分:4 分
11. ( ) is a person who is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed.
A. Database Management Administrator
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
需要购买答案的联系QQ:79691519满分:4 分
12. ( ) ,conversion of either encoded or enciphered text into plaintext.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
需要购买答案的联系QQ:79691519满分:4 分
13. ( ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
需要购买答案的联系QQ:79691519满分:4 分
14. ( ) is a computer technology that creates three dimensional real illusion in an artificial world.
A. Vector image
B. Bitmap
C. JPEG
D. Virtual Reality
此题选: D 满分:4 分
15. ( ), a secret code assigned to a user which is known by the computer system. Knowledge of the password associated with the user ID is considered proof of authorization.
A. Hacker
B. Password
C. DES
D. Authenticate
需要购买答案的联系QQ:79691519满分:4 分
16. ( ) is the messages, usually text, send from one person to another via the Internet.
A. TCP/IP
B. Telnet
C. FTP
D. E-mail
此题选: D 满分:4 分
17. ( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
需要购买答案的联系QQ:79691519满分:4 分
18. ( ), in networking, to establish the validity of a user or an object.
A. Authenticate
B. Decrypt
C. Encryption
D. Firewall
需要购买答案的联系QQ:79691519满分:4 分
19. ( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
需要购买答案的联系QQ:79691519满分:4 分
20. ( ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
需要购买答案的联系QQ:79691519满分:4 分
试卷总分:100 奥鹏学习网(aopeng123.cn) 发布
判断题
单选题
一、判断题(共 10 道试题,共 20 分。)
V
1. An online payment is a monetary transcation from the customer to the vendor over the Internet by credit card, digital cash, e-wallets, and smart cards.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
2. A leased line is a line rented from a telephone company for the exclusive use of a customer to access Internet.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
3. To access the Web, users require a Web browser ,which is the software program used to access the World Wide Web.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
4. A Domain Name System is an Internet service that translates domain names to or from IP addresses.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
5. Electronic Commerce means buying and selling products and services online via the Internet.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
6. EDI is a set of computer interchange standards for business documents such as invoices, bills, and purchase orders.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
7. FTP is the messages, usually text, send from one person to another via the Internet.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
8. To protect data, you need to implement a data backup and recovery plan.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
9. Program flowchart is an outline of the logic of the program you will write.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
10. A file is a collection of relation fields.( )
A. 错误
B. 正确
需要购买答案的联系QQ:79691519满分:2 分
大工14春《专业英语(计算机英语)》在线测试3
试卷总分:100 奥鹏学习网(aopeng123.cn) 发布
判断题
单选题
二、单选题(共 20 道试题,共 80 分。)
V
1. ( ) (Motion Picture Experts Group) standards are the main algorithms used to compress videos.Due to the fact that movies contain both images and sound, it can compress both audio and video.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
需要购买答案的联系QQ:79691519满分:4 分
2. ( ) is a way of transferring files over the Internet from one computer to another.
A. Internet
B. FTP
C. E-mail
D. ISP
需要购买答案的联系QQ:79691519满分:4 分
3. ( ) stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
A. Relational Database
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
需要购买答案的联系QQ:79691519满分:4 分
4. ( ) is a protocol that lets a user log in to a remote computer and use programs and data that the remote owner has made available, just as if it were their own computer.
A. FTP
B. WWW
C. Telnet
D. NSFNET
需要购买答案的联系QQ:79691519满分:4 分
5. ( ), the process of changing plaintext data into enciphered text through an algorithm.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
需要购买答案的联系QQ:79691519满分:4 分
6. A ( ) is a line rented from a telephone company for the exclusive use of a customer to access Internet.
A. leased line
B. online payment
C. credit card
D. ISP
需要购买答案的联系QQ:79691519满分:4 分
7. ( ) shorts for Waveform. It is the audio file format of Microsoft, and it is the waveform sound file format in Windows defined by Microsoft. It is the most common file format of digital sound derived from sampling.
A. MIDI
B. WAV
C. RA
D. Audio
需要购买答案的联系QQ:79691519满分:4 分
8. ( ), executable code that, when run by someone, infects other executable code in a computer.
A. Computer Security
B. Digital signatures
C. Computer virus
D. none of the above
需要购买答案的联系QQ:79691519满分:4 分
9. ( ), which stands for Motion Picture Experts Group (MPEG) Layer 3, is rapidly becoming the standard for music transmission via Internet.
A. MP3
B. MP4
C. JPEG
D. AVI
需要购买答案的联系QQ:79691519满分:4 分
10. ( ), referring to a person who breaks into computer systems for the challenge or steal computer resources or corrupt a computers data.
A. Hacker
B. Password
C. DES
D. Authenticate
需要购买答案的联系QQ:79691519满分:4 分
11. ( ) is a person who is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed.
A. Database Management Administrator
B. Data Integrity
C. Data Dictionary
D. Data Warehouse
需要购买答案的联系QQ:79691519满分:4 分
12. ( ) ,conversion of either encoded or enciphered text into plaintext.
A. Decrypt
B. Encryption
C. Authenticate
D. Hacker
需要购买答案的联系QQ:79691519满分:4 分
13. ( ) (Joint Photographic Experts Group), standard for compressing continuous-tone still pictures. It does not handle black-and-white images, nor does it handle motion picture compression.
A. JPEG
B. MPEG
C. MIDI
D. none of the above
需要购买答案的联系QQ:79691519满分:4 分
14. ( ) is a computer technology that creates three dimensional real illusion in an artificial world.
A. Vector image
B. Bitmap
C. JPEG
D. Virtual Reality
此题选: D 满分:4 分
15. ( ), a secret code assigned to a user which is known by the computer system. Knowledge of the password associated with the user ID is considered proof of authorization.
A. Hacker
B. Password
C. DES
D. Authenticate
需要购买答案的联系QQ:79691519满分:4 分
16. ( ) is the messages, usually text, send from one person to another via the Internet.
A. TCP/IP
B. Telnet
C. FTP
D. E-mail
此题选: D 满分:4 分
17. ( ):In encryption, a two-key system in which the key used to lock data is made public, so everyone can "lock".A second private key is used to unlock or decrypt.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
需要购买答案的联系QQ:79691519满分:4 分
18. ( ), in networking, to establish the validity of a user or an object.
A. Authenticate
B. Decrypt
C. Encryption
D. Firewall
需要购买答案的联系QQ:79691519满分:4 分
19. ( )(Pravate Key),in encryption, one key is used to both lock and unlock data. Compare with public key.
A. Asymmetric key
B. Symmetric key
C. Coputer virus
D. Digital signatures
需要购买答案的联系QQ:79691519满分:4 分
20. ( ), the process of compressing a file such that,after being compressed and decompressed, it matches its original format bit for bit.
A. Lossy compression
B. Lossless compression
C. Bitmap
D. Vector image
需要购买答案的联系QQ:79691519满分:4 分
版权声明
声明:有的资源均来自网络转载,版权归原作者所有,如有侵犯到您的权益
请联系本站我们将配合处理!
上一篇 : 大连理工大学14春《基础会计》在线作业3免费答案