正在加载图片...
adds,subtracts,multiplies,divides,and does comparisons.These comparisons,which are basically“less than",“greater than”,and“equal to”,can be combined into several common expressions,such as "greater than or equal to".The objective of most instructions that use comparisons is to determine which instruction should be executed next. ()Tell whether the following statements are true(T)or false(F)according to the passage A. (根据上文的内容判断下列句子的正误。15分,每题3分) 36.With the development of computer,the physical size of the CPU has often become bigger and bigger.( 37.The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input /output devices are controlled by the control unit of the CPU.( 38.The CPU comprises the control unit and memory.( 39.The control unit performs all the arithmetic and logical (comparison)functions.( 40.The central processing unit (CPU)is the heart of the computer systems.( Passage B A computer virus is a computer program that is created to make and spread copies of itself.The program may however also be designed to have other effects on the systems it infects,ranging from the annoying to the disastrous. Virus attacks are growing rapidly these days.According to Business Week,the 76,404 attacks reported in the first half of 2003 nearly match previous year's total number.As new antivirus tools are more powerful than before,the virus writers are getting a lot smarter with newer and creative ways to attack network systems.Let's first examine some common virus types: Basic Virus-a piece of software code that is developed to attack computers and network systems via email or Internet connections.It quickly replicates itself and gradually attaches to files,programs or the hard drive. Trojan Horses-This is a program that doesn't replicate when entering a system but can be effectively used to open'back doors.'Trojan Horses allow hackers to take control over a particular system or to steal very important data. Worm-this type of virus is able to spread itself automatically over the network from one computer to the next.During a worm attack,users'computers get infected without even having to click open email attachment or any program,etc. 1194adds, subtracts, multiplies, divides, and does comparisons. These comparisons, which are basically "less than" , "greater than" , and "equal to" , can be combined into several common expressions, such as "greater than or equal to". The objective of most instructions that use comparisons is to determine which instruction should be executed next. {二)Tell whether the following statements are true (T) or false (F) according to the passage A. (根据上文的内容判断下列旬子的正误。 5分,每题 3分) 36. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( ) 37. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input / output devices are controlled by the control unit of the CPU. ( ) 38. The CPU comprises the control unit and memory. ( ) 39. The control unit performs all the arithmetic and logical (comparison) functions. ( ) 40. The central processing unit (CPU) is the heart of the computer systems. ( ) Passage B A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the annoying to the disastrous. Virus attacks are growing rapidly these days. According to BusinessWeek , the 76 ,404 attacks reported in the first half of 2003 nearly match previous year's total number. As new antivirus tools are more powerful than before , the virus writers are getting a lot smarter with newer and creative ways to attack network systems. Let's first examine some common vIrus types: Basic Virus - a piece of software code that is developed to attack computers and network systems via email or Internet connections. It quickly replicates itself and gradually attaches to files , programs or the hard drive. Trojan Horses - This is a program that doesn' t replicate when entering a system but can be effectively used to open' back doors. ' Trojan Horses allow hackers to take control over a particular system or to steal very important data. Worm - this type of virus is able to spread itself automatically over the network from one computer to the next. During a worm attack , users' computers get infected without even having to click open email attachment or any program , etc. 1194
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有