




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、Chapter 1 Computers and Digital Basics1A “All Things Digital”1. Data processing was the computing technology behind the first phase of the digital revolution.2. Local software refers to any software that is installed on a computers hard drive.3. A computer network is a group of computers linked toge
2、ther to share data and resources.4. The process of converting text, numbers, sound, photos, or video into data that can be processed by a computer is called digitization .5. Cloud computing provides access to information, applications, communications, and storage over the Internet.1 B “Digital Devic
3、es” computer basics 1.A computer is a digital device that processes data according to a series of stored instructions called a program or software.1. Computer data is temporarily stored in memory, but is usually transferred to storage where it can be left on a more permanent basis.2. Personal comput
4、ers are available in desktop and portable models.3. A digital device, such as a computer, is called a(n) client,when it requests data from a server.4. A(n) microcontroller is a special-purpose microprocessor that is built into the machine it controls. 5. A computer accepts input, processes data, sto
5、res data, and produces output, according to a series of instructions.1C “Digital Data Representation” 1. Data representation refers to the format in which data is stored, processed, and transferred.2. Digital devices often use the binary number system to represent numeric data.3. Most computers use
6、Unicode or Extended ASCII code to represent character data. (Hint: Use the acronym.)4. KB is the abbreviation for Kilobyte.1D “Digital Processing”1. A(n) compiler converts all of the source code instructions into a new file containing object code.2. A microprocessor is hard-wired to perform a set of
7、 activities called a(n) instruction set.3. The ALU in your computers microprocessor holds data in register.4. The microprocessors control unit contains a(n) instruction pointer<指令指針> that holds the address of the instruction being executed. 5. The human-readable version of a program, createdi
8、n a high-level language by a programmer,is called source code. 6. The ALU in your computers microprocessor performs arithmetic and logical operations.7. The microprocessors control unit fetches each instruction.1E “Password Security” 1. An authentication protocol is any method that confirms a person
9、s identity using something the person knows, something the person possesses, or something the person is.2. On a(n) case-sensitive server, the user ID BJP is different from bjp.3. A(n) dictionary attack can guess your password if you are using common passwords or everyday words.4. A(n) phishing scam
10、looks like a request from your bank or an online payment service, but is actually a hacker who wants you to disclose your user ID and password.Chapter 2 Computer Hardware2A “Personal Computer Basics”1. A computer system unit houses the main circuit board, microprocessor, storage devices, and network
11、 card.2. Desktop and laptop computer platforms include PC, Mac, and Linux. 3. Popular peripheral devices include printers, digital cameras, scanners, joysticks, and speakers.4. To determine whether two computers are compatible, you have to consider if they run the same software and use the same peri
12、pheral devices.5. A device driver is software usually run in the background without opening a window and is designed to help a peripheral device establish communication with a computer. 2 B “Microprocessors and Memory”1. A personal computer with an Intel Core i7 microprocessor is likely to operate a
13、t a speed of 3.4 GHZ. (Hint: Use the abbreviation.)2. A(n) front side bus is circuitry that transports data to and from the processor.3. 4004, 8088, Athlon, and Pentium are all types of microprocessor.4. DDR2, virtual, and volatile are terms that apply to RAM. (Hint: Use the acronym.)5. The instruct
14、ions for loading the operating system into RAM when a computer is first turned on are stored in ROM. (Hint: Use the acronym.) 6. A dual core processor allows a computer to execute multiple instructions at the same time to achieve parallel processing.7. RAM is volatile, which means that it cannot hol
15、d data when the computer power is off.8. A computer does not usually run out of RAM because it can use an area of the hard disk called virtual memory. 2C “Storage Devices”1. Access time is typically faster for random-access devices than for sequential access devices.2. A magnetic storage device uses
16、 a read-write head to magnetize particles that represent data.3. A hard disk drive that is rated at a speed of 7200 rpm<revolutions per minute>will give you faster access to your data than a drive rated at 5400. (Hint: Use the acronym.)4. CD-R technology allows you to write data on a disc, and
17、 then change that data. True or false? False<可以增加內容,但不能更改已經加入的內容>5. A(n) SSD<Solid State Drive>uses the same storage technology as a USB flash drive, but is not designed to be removable. (Hint: Use the acronym.) 6. Access time is the average time it takes a computer to locate data on a s
18、torage medium and read it.7. A disk drive is a(n) random access device; a tape drive is a(n) sequential<順序的> access device. 2D “Input and Output Devices”1. One type of graphics circuitry, referred to as integrated graphics<集成顯卡>, is built into a computers system board.2. A(n) USB port pr
19、ovides one of the fastest, simplest ways to connect peripheral devices. (Hint: Use the acronym.) 3. In the context of computer display technology, response rate<響應率> refers to the speed at which the screen image is repainted.4. The number of dots that form images and text on a monitor or print
20、er is referred to as resolution<分辨率>.5. VGA, HDMI, and DVI are types of expansion ports that can be used for connecting a display device to a computer. Chapter 3 Software3C “Installing Software and Upgrades”1. Most web applications require no installation and are accessed through a browser.2.
21、On a PC, a(n) setup program guides you through the installation process.3. Portable software can be copied to a flash drive and run without additional installation.4. A(n) service pack is a set of patches that correct problems and address security vulnerabilities. 3D “Buying Software”Software Copyri
22、ghts and Licenses 1. Copyright law allows you to make an extra, or backup, copy of software as long as you do not defeat any copy protection mechanisms.2. Shareware that expires after a set period of time is often factory-installed on new computers.3. LibreOffice, Firefox, and Linux are examples of
23、open source software that can be legally modified and redistributed. 3E “Security Software”1. A computer virus can lurk<潛伏> in a computer for days or months, quietly replicating<復制> itself.2. A mass-mailing worm spreads to other computers by sending itself to all the addresses stored in
24、the local e-mail client.3. A group of zombie computers controlled by a hacker is called a(n) zombie.4. A virus signature is a unique section of malicious code that can be identified by antivirus software.Chapter4 Operating System and File Management4A “Operating System Basics”1. An operating system
25、manages a computers resources,such as RAM , storage , and peripherals<通過應用軟件、設備軟件和硬件>. 2. Most personal computer operating systems have multitasking capabilities so that they can simultaneously run two or more tasks, jobs , or programs. 3. The core part of an operating system is called its ker
26、nel<常駐內存;提供最重要的服務:內存管理、文件夾訪問>. 4. During the boot process<啟動過程>, a program<指BIOS> stored in ROM tells the hard disk to load the operating system Into RAM.5. Most computers today have graphical user interfaces<圖形用戶界面>. 6. Microsoft windows featured the first graphical user int
27、erface .True or false? false<不是微軟是詩樂> 7. An open source operating system called Linux is the foundation for several handheld operating systems, such as Symbian and Android OS. 8. The two main software categories are application software and system software. 4C “File System”1. .bmp , docx , exe
28、 , and . mov are examples of files extensions. 2. A disk partition is a section of a hard disk drive that is treated as a separate storage unit. 4D “File Management”1. Logical file storage models , such as a filling cabinet or tree metaphor , help you visualize the organization of your computer 2. A
29、 hard disk stores data in concentric circles called tracks , which are divided into wedge-shaped sectors.3. The acronyms NTFS , HFS+ , and MFT pertain to<從屬于> physical file storage models. Chapter 5 Local Area Networks5A “Network Building Blocks”1. A dorm-room network covers a limited area and
30、 is an example of a local area network.2. Each connection point on a network is referred to as a network node.3. Communications protocols, such as TCP/IP, set standards for encoding and decoding data, guiding data to its destination, and mitigating the effects of noise.4. A(n) circuit switching<電
31、路交換> network establishes a dedicated connection between two devices, whereas a(n) packet switching network divides messages into small parcels and handles them on a first-come, first-served basis. 5. IP Address can be assigned by an ISP or system manager, or can be automatically obtained from a(n
32、) DHCP<Dynamic Host Configuration Protocol,動態主機配置協議:自動分配動態地址> server. 6. To connect to a LAN, a computer requires network circuitry, sometimes referred to as a network interface card<NIC>.7. A peer-to-peer network is simply a small version of a client/server network . 8. True or false? F
33、alse<p2p網上各臺計算機有相同的功能,無主從之分,一臺計算機都是既可作為服務器,設定共享資源供網絡中其他計算機所使用,又可以作為工作站,沒有專用的服務器,也沒有專用的工作站>9. A(n) dynamic IP address can be assigned to a network workstation by a DHCP server. 5B “Wired and Wireless Technology”1. Todays most popular wired network technology is Ethernet and is defined by IEEE 8
34、02.3 standards.2. Wi-Fi is todays most popular wireless network technology for LAN. Chapter 6 The Internet6A “Internet Technology ”1. TCP/IP is the primary protocol suite used on the Internet2. 204.127.129.1 is an example of an IPv4 address, True or False? Ture 3. A(n) domain name server maintains a
35、 database of IP addresses that correspond to addresses such as .4. Most ISP offer asymmetric<非對稱> Internet connections, meaning the downstream speed is faster than the upstream speed. 5. The Internet backbone is a network of high-capacity communications links that provides the main routes for
36、data traffic across the Internet.6. The top-level domain for most schools and universities is edu .7. On the Internet, TCP breaks a message into packets, and IP is responsible for addressing packets so that they can be routed to their destination.8. Computers on the Internet that act as servers use static IP addresses, whereas most other computers use dynamic IP addresses. 6B “Fixed Internet Access”1. Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false? True.2. The two requirements for cable Internet service are circuitry to
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025至2030中國方竹筍市場經營方向與競爭格局分析報告
- 2025至2030中國抗酸藥甘草制劑行業產業運行態勢及投資規劃深度研究報告
- 2025至2030中國心臟傳導阻滯治療儀行業發展趨勢分析與未來投資戰略咨詢研究報告
- 2025年中學教師資格考試《綜合素質》教育熱點案例分析題庫及答案試題
- 2025年美發師(高級)實操技能考核試卷:燙發技巧與造型設計
- 2025年教師資格證面試結構化面試真題卷:教育政策與教師職業發展
- 2025年證券從業資格考試金融市場基礎知識歷年真題分類試卷
- 2025年護士執業資格考試題庫:護理教育與培訓護理兒科護理歷年真題及解析
- 從ESPN平臺看NBA新聞漢譯實踐與策略探索
- Glut-1:食管鱗癌放化療預后的關鍵生物標記物探究
- 消防改造工程技術標書模板
- NSTEMI指南解讀課件
- 精品解析:湖南省永州市2020年中考地理試題(原卷版)
- 貸款申請表(標準模版)
- 合理應用喹諾酮類抗菌藥物專家共識精品課件
- 西北工業大學數電實驗報告二Quartus和Multisim
- GB∕T 41666.3-2022 地下無壓排水管網非開挖修復用塑料管道系統 第3部分:緊密貼合內襯法
- k受體激動劑在臨床中的應用
- 第四節-酸堿平衡失常的診治課件
- 在挫折中成長(課堂PPT)
- 國家學生體質健康標準登記卡高中樣表
評論
0/150
提交評論