当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

国家开放大学:2015年春季学期“开放专科”软件开发与应用专业计算机专业英语期末试题(7月)

资源类别:文库,文档格式:PDF,文档页数:9,文件大小:233.4KB,团购合买
点击下载完整版文档(PDF)

试卷代号:2241 座位号■ 国家开放大学(中央广播电视大学)2015年春季学期“开放专科”期末考试 计算机专业英语 试题(A) 2015年7月 题 号 Ⅱ Ⅲ 总 分 分 数 得分 评卷人 I.Vocabulary(词汇,30分) (一)Translate the following words and expressions into Chinese(写出下列词组的汉语。l0分, 每题1分) 1.hard disk 2.operating system 3.electronic spreadsheet 4.management information system 5.electronic commerce 6.data structure 7.software engineering 8.computer virus 9.machine language 10.credit card 953

试卷代号 :2241 座位号 国家开放大学(中央广播电视大学 )2015 年春季学期"开放专科"期末考试 计算机专业英语试题 (A) 2015 E I H mm |得分|评卷人| | 1. Vocabulary (词汇, 30 分} {一) TransJate the foJJowing words and expressions into Chinese( 写出下列词组的汉语。 10 分, 每题 分} 1. hard disk 2. operating system 3. electronic spreadsheet 4. management information system 5. electronic commerce 6. data structure 7. software engineering 8. computer virus 9. machine language 10. credi t card 953

(二)Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语 缩写。10分,每题1分)】 11.结构化查询语言 12.广域网 13.超文本链接标示语言 14.文件传送[输]协议 15.单文档界面 16.面向对象编程 17.集成开发环境 18.传输控制协议/网际协议 19.数据库管理系统 20.电子数据交换 (=)Match the following words and expressions in the left column with those similar in meaning in the right column,(将左列的词汇与右列相应的汉语匹配。l0分,每空1分) 21.RAM(random access memory) a.视频 22.high-level language b.随机存储器 23.project window c.高级语言 24.functional testing d.应用软件 25.multimedia e,工程窗口 26.hacker {.系统软件 27.memory g.功能测试 28.application software h.多媒体 29.system software i黑客 30.vedio j.内存 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 954

{二) FiII in the blanks with the corresponding English abbreviations. (根据汉语写出相应的英语 缩写。 10 分,每题 分} 11. 结构化查询语言 12. 广域网 13. 超文本链接标示语言 14. 文件传送[输]协议 15. 单文档界面 16. 面向对象编程 17. 集成开发环境 18. 传输控制协议/网际协议 19. 数据库管理系统 20. 电子数据交换 {三) Match the following words and expressions in the left column with those similar in meaning in the right column. (将左列的词汇与右到相应的汉语匹配。 10 分,每空 分) 21. RAM(random access memory) 22. high-level language 23. project window 24. functional testing 25. multimedia 26. hacker 27. memory 28. application software 29. system software 30. vedio 21. 26. 954 22. 27. 23. 28. a. 视频 b. 随机存储器 c. 高级语言 d. 应用软件 e. 工程窗口 f.系统软件 g. 功能测试 h. 多媒体 1. 黑客 J. 内存 24. 29. 25. 30

得分 评卷人 Ⅱ。Comprehension(阅读理解,40分) (-)Fill in the blanks with suitable words or expressions from the list given below,and change the form where necessary,(从下面方框中选择合适的词或表达,以其适当的形式填空。 15分,每空3分) toolbar ruler title bar menu bar incotporate into Microsoft Word XP is the current Window version of Word,and documents created in Word XP can be easily31. Excel,Power Point and Access files.In the interface of Word,the 32. displays the name of the current application and name of the current document;the 33. lists the names of the menus available;the 34. gives the user quick access to frequently used editing functions;the 35. enables the user to change left and right margin. Passage A During initial days of computing,software was largely developed by small groups of people.When this software was to be maintained by another set of people,it used to be a nightmarish experience.When large commercial projects were to be handled,it used to be an almost impossible task to keep the time and budget under control,and projects used to get delayed and many projects were abandoned halfway.There was no systematic procedure for the software development;everything was done on ad hoc basis.This ad hoc approach led to the 'software crisis'. Over the last few decades there has been a tremendous growth in information technology and its impact on everyday life.Complex software systems have become critical to the operation of many systems in areas such as banking,communications,manufacturing, power generation,and transportation.Progress in computer science and accumulated experience with industrial production of software have led to the emergence of software 955

|得分|评卷人| | 11. Comprehension (阅读理解, 40 分} {一) FiII in the blanks with suitable words or expressions from the Iist given below , and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。 15 分,每空 分} toolbar ruler title bar menu bar mcotporate mto Microsoft Word XP is the current Window version of Word. and documents created in W ord XP can be easily31. Excel , Power Point and Access files. In the interface of W ord , the 32. displays the name of the current application and name of the current document; the 33. lists the names of the menus available; the 34. gives the user quick access to frequently used editing functions; the 35. enables the user to change left and right margin. Passage A During initial days of computing , software was largely developed by small groups of people. When this software was to be maintained by another set of people , it used to be a nightmarish experience. When large commercial projects were to be handled. it used to be an almost impossible task to keep the time and budget under control , and projects used to get delayed and many projects were abandoned halfway. There was no systematic procedure for the software development; everything was done on ad hoc basis. This ad hoc approach led to the ‘ software crisis'. Over the last few decades there has been a tremendous growth in information technology and its impact on everyday life. Complex software systems have become critical to the operation of many systems in areas such as banking , communications, manufacturing , power generation , and transportation. Progress in computer science and accumulated experience with industrial production of software have led to the emergence of software 955

engineering as a separate discipline.The software engineering discipline has been defined as "the application of systematic,disciplined,quantifiable approaches to the development, operation,and maintenance of software.that is,the application of engineering to software. The computer science discipline concerns with developing large applications.Software engineering covers not only the technical aspects of building software systems,but also management issues,such as directing programming teams,scheduling,and budgeting. For developing a software product,the development process is divided into different stages.A convenient way of splitting the whole process is to divide the development into the following five stages: Requirements Analysis Specification:define the system requirements in detail Design:specify system architecture and modules in detail Coding:produce source code Testing:deal with unit testing and system testing Maintenance:fix bugs,enhance features and adapt across platforms. ()Tell whether the following statements are true(T)or false(F)according to the passage A. (根据上文的内容判断下列句子的正误。15分,每题3分) 36.During initial days of the development of software,everything was done in discipline.( 37.The definition of software engineering is "the application of systematic,disciplined, quantifiable approaches to the development,operation,and maintenance of software."( 38.For developing a software product,you need design,coding and testing.( 39.software engineering is the application of engineering to software.( 40.Software engineering only covers the technical aspects of building software systems. () Passage B A computer virus is a computer program that is created to make and spread copies of itself.The program may however also be designed to have other effects on the systems it infects,ranging from the annoying to the disastrous. 956

engineering as a separate discipline. The software engineering discipline has been defined as "the application of systematic , disciplined , quantifiable approaches to the development , operation , and maintenance of software. " that is, the application of engineering to software . The computer science discipline concerns with developing large applications. Software engineering covers not only the technical aspects of building software systems, but also management issues, such as directing programming teams, scheduling , and budgeting. For developing a software product , the development process is divided into different stages. A convenient way of splitting the whole process is to divide the development into the following five stages: Requirements Analysis & Specification: define the system requirements in detail Design: specify system architecture and modules in detail Coding: produce source code Testing: deal with unit testing and system testing Maintenance: fix bugs, enhance features and adapt across platforms. (二) Tell whether the following statements are true ( T) or false ( F) according to the passage A. {根据上文的内容判断下列旬子的正误。 15 分,每题 分} 36. During initial days of the development of software , everything was done ill discipline. ( ) 37. The definitioll of software engineering is "the applicatioll of systematic , disciplilled , quantifiable approaches to the development, operation , and maintenance of software. " ( ) 38. For developing a software product , you need design , coding and testing. ( ) 39. software engineering is the application of engineering to software. ( ) 40. Software engineering only covers the technical aspects of building software systems. ( ) Passage B A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous. 956

Virus attacks are growing rapidly these days.According to BusinessWeek,the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number.As new antivirus tools are more powerful than before,the virus writers are getting a lot smarter with newer and creative ways to attack network systems.Let's first examine some common virus types: Basic Virus-a piece of software code that is developed to attack computers and network systems via email or Internet connections.It quickly replicates itself and gradually attaches to files,programs or the hard drive. Trojan Horses-This is a program that doesn't replicate when entering a system but can be effectively used to open'back doors.'Trojan Horses allow hackers to take control over a particular system or to steal very important data. Worm-this type of virus is able to spread itself automatically over the network from one computer to the next.During a worm attack,users'computers get infected without even having to click open email attachment or any program,etc. Since it is very difficult to avoid the virus,your best defense is a powerful antivirus program.In order to fight with such viruses,the software vendors should focus on making their products more robust.This may ask for a trade-off between user-friendliness and security.In specific cases it may require line-by-line inspection,code retooling and even systems automation to defend the installed programs. (三)choose the best answer according to the passage B.(根据上文的内容选择正确的答案。I0 分,每题2分)】 41.A computer virus is a computer program that is created to make and spread of itself. A.programs B.virus C.copies D.files 42.Worm spread itself except by A.network B.E-mail C.program D.hardware 957

Virus attacks are growing rapidly these days. According to BusinessWeek. the 76.404 attacks reported in the first half of 2003 nearly match previous year' s total number. As new antivirus tools are more powerful than before. the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let' s first examine some common vlrus types: Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files. programs or the hard drive. Trojan Horses - This is a program that doesn't replicate when entering a system but can be effectively used to open ‘ back doors. ' Trojan Horses allow hackers to take control over a particular system or to steal very important data. Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack. users' computers get infected without even having to click open email attachment or any program. etc. Since it is very difficult to avoid the virus. your best defense is a powerful antivirus program. In order to fight with such viruses. the software vendors should focus on making their products more robust. This may ask for a trade-off between user-friendliness and security. In specific cases it may require line-by-line inspection. code retooling and even systems automation to defend the installed programs. {三 )chωse the best answer according to the passage B. (根据上文的内容选择正确的答案。 10 分,每题 分} 41. A computer virus is a computer program that is created to make and spread 一一一一­ of itself. A. programs C. copies 42. W orm spread itself except by 一一一一一一· A. network C. program B. virus D. files B. E-mail D. hardware 957

43.Antivirus program can scan and virus. A.clean B.produce C.replicate D.make 44.Trojan Horses A.quickly replicate itself and gradually attache to files,programs or the hard drive B.infect the computer without even having to click open email attachment or any program C.allow hackers to take control over a particular system or to steal very important data D.avoid the virus to attack computer 45.According to BusinessWeek,the attacks reported in the first half of 2003 nearly match previous year's total number. A.86,404 B.76,404 C.56,354 D.34,876 得 分 评卷人 Ⅲ.Translation(翻译,30分)】 (一)Translate the following sentences into Chinese.(将下列句子翻译成汉语。20分,每题5分) 46.For developing a software product,the development process is divided into 5 stages: Requirements Analysis &Specification,Design,Coding,Testing,and Maintenance. 47.An application software is any program designed to perform a specific function directly for the user or,in some cases,for another application program. 48.A small network may only connect two computers inside a home to share a single printer and Internet connection. 49.Some applications,such as Word,allow for several windows in a special mode called MDI in which you can open multiple documents within the same application. (二)Translate the following paragraph into Chinese.(将下段文章翻译成汉语。l0分) 50.A high-level language is an artificial language with which we can write various 958

43. Antivirus program can scan and 一一一-一 vlrus. A. clean B. produce C. replicate D. make 44. Trojan Horses A. quickly replicate itself and gradually attache to files , programs or the hard drive B. infect the computer without even having to click open email attachment or any program C. allow hackers to take control over a particular system or to steal very important data D. avoid the virus to attack computer 45. According to BusinessWeek, the 一一一一_ attacks reported in the first half of 2003 nearly match previous year' s total number . A. 86 ,404 C.56 ,354 B. 76.404 D.34 ,876 |得分|评卷人| | 皿. Translation (翻译, 30 分} {一) 1hmsIate foll州喀则阳阳 hωα由眠{将下列旬子翻译成汉语。 20 分,每题 分) 46. For developing a software product. the development process is divided into 5 stages: Requirements Analysis &. Specification , Design , Coding. Testing , and Maintenance. 47. An application software is any program designed to perform a specific function directly for the user or, in some cases, for another application program. 48. A small network may only connect two computers inside a home to share a single printer and Internet connection. 49. Some applications, such as Word , allow for several windows in a special mode called MDI in which you can open multiple documents within the same application. {二) Translate the following paragraph into Chinese. (将下段文章翻译成汉语。 10 分) 50. A high-level language is an artificial language with which we can write various 958

instructions.This is possible not because computer processors are now so technologically advanced that they can understand'these languages.You should translate from programming languages into machine language which can be understood by the computer processors.Compilers can accomplish this task.This does mean that a high-level language program is not directly executable:it must be compiled to produce processor program, which is executable. 959

instructions. This is possible not because computer processors are now so technologically advanced that they can 'understand' these languages. Y ou should translate from programming languages into machine language which can be understood by the computer processors. Compìlers can accomplish this task. Thìs does mean that a high-level language program is not directly executable: it must be compiled to produce processor program , which is executable. 959

试卷代号:2241 国家开放大学(中央广播电视大学)2015年春季学期“开放专科”期末考试 计算机专业英语 试题答案及评分标准(A) (供参考) 2015年7月 I。Vocabulary(词汇,30分) (一)Translate the following words and expressions into Chinese(写出下列词组的汉语。l0分, 每题1分)小 1.硬盘 2.操作系统 3.电子表格 4.管理信息系统 5.电子商务 6.数据结构 7.软件工程 8.计算机病毒 9.机器语言 10.信用卡 (二)Fill in the blanks with the corresponding English abbreviations..(根据汉语写出相应的英语 缩写。共10分,每题1分) 11.SQL 12.WAN 13.HTML 14.FTP 15.SDI 16,OOP 17.IDE 18.TCP/IP 19.DBMS 20.EDI (=)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。l0分,每空1分) 21.b 22.c 23.e 24.g 25.h 26.i 27.j 28.d 29.f 30.a 960

试卷代号 :2241 国家开放大学(中央广播电视大学 )2015 年春季学期"开放专科"期末考试 计算机专业英语 试题答案及评分标准 (A) (供参考) 2015 1. Vocabulary( 词汇, 30 分} {一) Translate the following words and expressions into Chinese (写出下列词组的汉语。 10 分, 每题 分) 1.硬盘 2. 操作系统 3. 电子表格 4. 管理信息系统 5. 电子商务 6. 数据结构 7. 软件工程 8. 计算机病毒 9. 机器语言 10. 信用卡 {二) FiII in the blanks with the corresponding EngIish abbreviations. (根据汉语写出相应的英语 缩写。共 10 分,每题 分} 11. SQL 16.00P 12. WAN 17. IDE 13. HTML 14. FTP 18. TCP/IP 19. DBMS 15. SDI 20. EDI {三) Match the following words and expressions in the left column with those similar in meaning in the right column. (将左列的词汇与右列相应的汉语匹配。 10 分,每空 分} 21. b 26. 960 22.c 27. j 23.e 28. d 24.g 29. f 25.h 30. a

Ⅱ,Comprehension(阅读理解,40分) (-)Fill in the blanks with suitable words or expressions from the list given below,and change the form where necessary..(从下面方框中选择合适的词或表达,以其适当的形式填空。 15分,每空3分) 31.incorporated into 32.title bar 33.menu bar 34.toolbar 35.ruler ()Tell whether the following statements are true(T)or false(F)according to the passage A. (根据上文的内容判断下列句子的正误。15分,每题3分)】 36.F 37.T 38.F 39.T 40.F (三)choose the best answer according to the passage B.(根据上文的内容选择正确的答案。l0 分,每题2分)】 41.C 42.D 43.A 44.C 45.B Ⅲ.Translation(翻译,30分) (一)Translate the following sentences into Chinese..(将下列句子翻译成汉语。20分,每题5分)】 46.开发一个软件产品,开发过程分为五个步骤:需求分析和说明,设计,写代码,测试和 维护。 47.应用软件是直接为用户设计的具有专门功能的软件,或在某些情况下,为另一种应用 程序设计的软件。 48.一个小型的网络可能是连结一个家庭中的两个计算机,共同分享一个打印机和 Internet连结。 49.一些应用软件,例如Word,允许几个窗口同时在一个叫做MDI的模式下存在,你能够 在一个软件中打开多个文档。 (二)Translate the following paragraph into Chinese..(将下段文章翻译成汉语。l0分)】 50.高级语言是一种人造语言,使用它我们可以写不同的指令。这成为可能不是因为计 算机处理器如今是如此的技术先进以至于它们可以理解这些语言。你需要将这些语言翻译成 计算机处理器能够理解的机器语言。编译器能够完成这项工作。这就意味着高级语言程序不 是直接可执行的:它必须被编译生成处理器程序,这些程序是可执行的。 961

n. Comprehension (阅读理解, 40 分} {一) FiII in the blanks with suitable words or expressions from the Iist given below , and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。 15 分,每空 分) 31. incorporated into 33. menu bar 35. ruler 32. title bar 34. toolbar {二) Tell whether the following statements are true ( T) or false ( F) according to the passage A. {根据上文的内容判断下列旬子的正误。 15 分,每题 分} 36. F 37. T 38. F 39. T 40. F (三) choose the best answer according to the passage B. (根据上立的内窑选择正确的答案。 10 分,每题 分) 41. C 42.D 43. A 44. C 45. B 皿. Translation (翻译, 30 分} {一)币四1SIate the follo咧吨 sen cesinω Chi 配. (将下到旬子翻译成汉语。 20 分,每题 分} 46. 开发一个软件产品,开发过程分为五个步骤:需求分析和说明,设计,写代码,测试和 维护。 47. 应用软件是直接为用户设计的具有专门功能的软件,或在某些情况下,为另一种应用 程序设计的软件。 48. 一个小型的网络可能是连结一个家庭中的两个计算机,共同分享一个打印机和 Internet 连结。 49. 一些应用软件,例如 Word ,允许几个窗口同时在一个叫做 MDI 的模式下存在,你能够 在一个软件中打开多个文档。 {二) Translate the following paragraph into Chinese. (将下段文章翻译成汉语。 10 分} 50. 高级语言是一种人造语言,使用它我们可以写不同的指令。这成为可能不是因为计 算机处理器如今是如此的技术先进以至于它们可以理解这些语言。你需要将这些语言翻译成 计算机处理器能够理解的机器语言。编译器能够完成这项工作。这就意味着高级语言程序不 是直接可执行的 它必须被编译生成处理器程序,这些程序是可执行的。 961

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
已到末页,全文结束
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有