注意:此页面搜索的是所有试题
国家开放大学计算机英语
In order to solve a computational problem, its solution must be specified in terms of a sequence of computational steps, each of which may be performed by a human or a digital computer . If you want to solve the computational problem with a computer, you should learn how to program. The task of developing programs for the solution of computational problems is referred to as programming. Computer programming is the process of planning and creating a sequence of steps for a computer to follow. In general, this process will help us resolve a problem, which is either too tedious or difficult to work out otherwise . So programming is breaking a task down into small steps.
Programming is sometimes contrasted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines of program text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others.
What.s actually involved in programming - the actual process of writing programs? Here.s a quick overview of the process:
· Write a program.
· Compile the program.
· Run the program.
· Debug the program.
· Repeat the whole process until the program is finished.
choose the best answer according to the passage .(根据上文的内容选择正确的答案。)
1.If you want to solve the computational problem with a computer, you should learn how to .( B )
A. calculate B. program C. add D. subtract
2. Computer programming is the process of planning and creating a sequence of ( A ) for a computer to follow.
A. steps B. process C. lines D. graphics
3. The term coder is used to describe D .
A. machine B. computer C. keyboard D. person
4. In order to solve a computational problem, you can let a person or a (B ) to do it.
A. machine B. computer C. keyboard D. mouse
5. Which of the following is not the stages of programming? ( C )
A. Write a program.
B. Debug the program.
C. Print the program.
D. Compile the program.
A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.
Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year.s total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let.s first examine some common virus types:
Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.
Trojan Horses - This is a program that doesn.t replicate when entering a system but can be effectively used to open .back doors.. Trojan Horses allow hackers to take control over a particular system or to steal very important data.
Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users. computers get infected without even having to click open email attachment or any program, etc.
Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.
choose the best answer according to the passage.(根据上文的内容选择正确的答案。)
1.A computer virus is a computer program that is created to make and spread ( C ) of itself.
A.programs B.virus C. copies D.files
2.Worm spread itself except by D .
A.network B.E-mail C.program D.hardware
3.Antivirus program can scan and A virus.
A.clean B.produce C.replicate D.make
4.Trojan Horses C .
A.quickly replicate itself and gradually attache to files, programs or the hard drive.
B.infect the computer without even having to click open email attachment or any program.
C.allow hackers to take control over a particular system or to steal very important data.
D.avoid the virus to attack computer.
5.According to BusinessWeek, the B attacks reported in the first half of 2003 nearly match previous year.s total number .
A. 86,404 B. 76,404 C.56,354 D.34,876
The Internet, then known as ARPANET, was brought online in 1969, which initially connected four major computers at universities in the southwestern US . The early Internet was used by computer experts , engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personal computers in those days, and anyone who used it, whether a computer professional or an engineer or scientist or librarian, had to learn to use a very complex system.
The Internet matured in the 1970.s as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today. s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources.
In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network.
Since the Internet was initially funded by the government, it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 1990.s, when independent commercial networks began to grow.
1. 2. 3. 4. 5.
Choose the best answer according to Passage.( 根据上文的内容选择正确的答案。)
1. How many computers were connected to the initial Internet in 1969 ? ( B )
A. Ten B. Four C. Twenty D. Three
2. Only A could use the early Internet.
A. computer experts, engineers, scientists, and librarians
B. any experts, engineers, scientists, and librarians
C. computer experts, engineers, scientists, and students
D. experts, engineers, and scientists in universities in US
3. The Internet became a lot easier for non-technical people to learn and use because of the common B .
A. commands B. protocols C. topologies D. architecture
4. The first really friendly interface to the Internet appeared with the introduction of a ( C ) system for files and information access.
A. computer B. operating C. menu D. application
5. Which statement is not true according to Passage C? ( D )
A. Many more people in universities began to use the Internet in the 1970s, but it wasn.t as user-friendly as today.s standards.
B. The restrictions to commercial uses changed as the independent commercial networks were not funded by the government.
C. Commercial uses were allowed for the early Internet if they directly served the goals of research and education.
D. The early Internet was logged in from home or office personal computers.
A computer system can roughly be divided into three components:
·The hardware (memory, CPU, arithmetic-logic unit, various bulk storage, I/O, peripheral devices…)
·System software (operating system, compilers, editors, loaders, utilities...)
·Application software (database systems, business programs...)
A computer system can be described or shown in the following Figure.
Fig. 1 Conceptual view of a computer system
The central processing unit (CPU) is located on chips inside the system unit. The CPU is the brain of the computer. This is the place where the computer interprets and processes information.
The operating system is the first component of the systems programs that interests us here. Systems programs are programs written for direct execution on computer hardware in order to make the power of the computer fully and efficiently accessible to applications programmers and other computer users.
An application software (also called end-user program) is any program designed to perform a specific function directly for the user or, in some cases, for another application program. Examples of application software include word processors; database programs; Web browsers; development tools; drawing, paint, and image editing programs; and communication programs.
choose the best answer according to the passage.(根据上文的内容选择正确的答案。)
1.A computer system can roughly be divided into three components except ( D ) .
A.hardware B.System software C. Application software D.CPU
2.The central processing unit (CPU) is an important part of the computer, and it can interpret and ( A ) information.
A.process B.use C.brain D.heart
3.The operating system is one of ( B ) .
A.hardware B.system software C.application software D.computer
4.An application software is any program designed to perform a ( A ) function directly for the user or, in some cases, for another application program.
A.specific B.normal C.general D.abnormal
5. Which of the following is not an application software? ( D ) .
A. word processor B. database program C.Web browser D.compiler
Programming is sometimes contrasted with coding. Coding generally refers to the writing of programs for given program specification, while programming includes the task of preparing the program specification as well as that of writing the program. The text of a program is sometimes referred to as code, and lines of program text are referred to as lines of code, especially in the case of machine-language programs. The term coder is used to describe a person engaged exclusively in implementing program specifications prepared by others.
What.s actually involved in programming - the actual process of writing programs? Here.s a quick overview of the process:
· Write a program.
· Compile the program.
· Run the program.
· Debug the program.
· Repeat the whole process until the program is finished.
choose the best answer according to the passage .(根据上文的内容选择正确的答案。)
1.If you want to solve the computational problem with a computer, you should learn how to .( B )
A. calculate B. program C. add D. subtract
2. Computer programming is the process of planning and creating a sequence of ( A ) for a computer to follow.
A. steps B. process C. lines D. graphics
3. The term coder is used to describe D .
A. machine B. computer C. keyboard D. person
4. In order to solve a computational problem, you can let a person or a (B ) to do it.
A. machine B. computer C. keyboard D. mouse
5. Which of the following is not the stages of programming? ( C )
A. Write a program.
B. Debug the program.
C. Print the program.
D. Compile the program.
A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous.
Virus attacks are growing rapidly these days. According to BusinessWeek, the 76,404 attacks reported in the first half of 2003 nearly match previous year.s total number . As new antivirus tools are more powerful than before, the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let.s first examine some common virus types:
Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.
Trojan Horses - This is a program that doesn.t replicate when entering a system but can be effectively used to open .back doors.. Trojan Horses allow hackers to take control over a particular system or to steal very important data.
Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack, users. computers get infected without even having to click open email attachment or any program, etc.
Since it is very difficult to avoid the virus, your best defense is a powerful antivirus program. In order to fight with such viruses, the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection, code retooling and even systems automation to defend the installed programs.
choose the best answer according to the passage.(根据上文的内容选择正确的答案。)
1.A computer virus is a computer program that is created to make and spread ( C ) of itself.
A.programs B.virus C. copies D.files
2.Worm spread itself except by D .
A.network B.E-mail C.program D.hardware
3.Antivirus program can scan and A virus.
A.clean B.produce C.replicate D.make
4.Trojan Horses C .
A.quickly replicate itself and gradually attache to files, programs or the hard drive.
B.infect the computer without even having to click open email attachment or any program.
C.allow hackers to take control over a particular system or to steal very important data.
D.avoid the virus to attack computer.
5.According to BusinessWeek, the B attacks reported in the first half of 2003 nearly match previous year.s total number .
A. 86,404 B. 76,404 C.56,354 D.34,876
The Internet, then known as ARPANET, was brought online in 1969, which initially connected four major computers at universities in the southwestern US . The early Internet was used by computer experts , engineers, scientists, and librarians. There was nothing friendly about it. There were no home or office personal computers in those days, and anyone who used it, whether a computer professional or an engineer or scientist or librarian, had to learn to use a very complex system.
The Internet matured in the 1970.s as a result of the TCP/IP architecture. As the commands for E-mail, FTP , and telnet were standardized, it became a lot easier for non-technical people to learn to use the nets. It was not easy by today. s standards by any means, but it did open up use of the Internet to many more people in universities in particular. Other departments besides the libraries, computer, physics, and engineering departments found ways to make good use of the nets -- to communicate with colleagues around the world and to share files and resources.
In 1991, the first really friendly interface to the Internet was developed at the University of Minnesota. The University wanted to develop a simple menu system to access files and information on campus through their local network.
Since the Internet was initially funded by the government, it was originally limited to research, education, and government uses. Commercial uses were prohibited unless they directly served the goals of research and education. This policy continued until the early 1990.s, when independent commercial networks began to grow.
1. 2. 3. 4. 5.
Choose the best answer according to Passage.( 根据上文的内容选择正确的答案。)
1. How many computers were connected to the initial Internet in 1969 ? ( B )
A. Ten B. Four C. Twenty D. Three
2. Only A could use the early Internet.
A. computer experts, engineers, scientists, and librarians
B. any experts, engineers, scientists, and librarians
C. computer experts, engineers, scientists, and students
D. experts, engineers, and scientists in universities in US
3. The Internet became a lot easier for non-technical people to learn and use because of the common B .
A. commands B. protocols C. topologies D. architecture
4. The first really friendly interface to the Internet appeared with the introduction of a ( C ) system for files and information access.
A. computer B. operating C. menu D. application
5. Which statement is not true according to Passage C? ( D )
A. Many more people in universities began to use the Internet in the 1970s, but it wasn.t as user-friendly as today.s standards.
B. The restrictions to commercial uses changed as the independent commercial networks were not funded by the government.
C. Commercial uses were allowed for the early Internet if they directly served the goals of research and education.
D. The early Internet was logged in from home or office personal computers.
A computer system can roughly be divided into three components:
·The hardware (memory, CPU, arithmetic-logic unit, various bulk storage, I/O, peripheral devices…)
·System software (operating system, compilers, editors, loaders, utilities...)
·Application software (database systems, business programs...)
A computer system can be described or shown in the following Figure.
Fig. 1 Conceptual view of a computer system
The central processing unit (CPU) is located on chips inside the system unit. The CPU is the brain of the computer. This is the place where the computer interprets and processes information.
The operating system is the first component of the systems programs that interests us here. Systems programs are programs written for direct execution on computer hardware in order to make the power of the computer fully and efficiently accessible to applications programmers and other computer users.
An application software (also called end-user program) is any program designed to perform a specific function directly for the user or, in some cases, for another application program. Examples of application software include word processors; database programs; Web browsers; development tools; drawing, paint, and image editing programs; and communication programs.
choose the best answer according to the passage.(根据上文的内容选择正确的答案。)
1.A computer system can roughly be divided into three components except ( D ) .
A.hardware B.System software C. Application software D.CPU
2.The central processing unit (CPU) is an important part of the computer, and it can interpret and ( A ) information.
A.process B.use C.brain D.heart
3.The operating system is one of ( B ) .
A.hardware B.system software C.application software D.computer
4.An application software is any program designed to perform a ( A ) function directly for the user or, in some cases, for another application program.
A.specific B.normal C.general D.abnormal
5. Which of the following is not an application software? ( D ) .
A. word processor B. database program C.Web browser D.compiler