20 East Spring semester "Computer Application Foundation" Online usually work 2

[Statement] Bowen content is limited tutorial will be available, if infringement please let me delete, such as not timely reply or unclear please add micro-channel aopon007, if you can specify from CSDN very much hope to share with you through this platform CSDN

20 Spring semester "Computer Application Foundation" online jobs usually 2
papers Total: 100 Score: 100
First, multiple choice (a total of 25 questions, a total of 100 points)
1. statement about Windows screen saver is not correct ( ).
A. It can reduce the loss of screen
B. It can protect system security
C. It saves computer memory
D. It can set password

2. The current logic element is used in a microcomputer ().
A. Small scale integrated circuit
B. scale integration in
C. massive VLSI and
D. discrete components

3. The following is a narrative about the Chinese Windows file name, the error is ().
A. allow characters in the file name
B. File Name Spaces are allowed
C. filenames allow multiple dot delimiters
D. filenames allows the use of a vertical bar ( "|")

4. The following language which belongs to the machine language oriented languages ____.
A. assembly language
BC language
C.Java language
D. Structured Query Language

The phenomenon may occur after the computer infected with the virus ().
A. unusual system start or often "crash"
B. sudden loss of programs or data
C. disk space smaller
D. All of the above

6.Telnet function is ().
A. Download
B. Telnet
C.WWW browse
D. newscast

7. The following statement on e-mail, is not correct is ______.
A. A person can apply for multiple e-mail
B. e-mail is the abbreviation-mail E
C. on a computer application "e-mail", only after receiving this computer through the Internet
D. join the Internet each user can get an application through the "E-mail"

8. Windows operating system features include ().
A. graphical interface
B. multitasking
C. Plug and Play
D. All of the above

9. People often say that computer's memory, referring to the ____.
A.ROM
B.CMOS
C.CPU
D.RAM

10. With regard to the basic ASCII code representation in a computer is described accurately ().
A. 8-bit binary numbers, the rightmost bit is 1
B. 8-bit binary numbers, the leftmost bit is 1
C. 8-bit binary numbers, the rightmost bit is 0
D. 8-bit binary number, The leftmost bit is 0

11.Excel in the worksheet using the "Chart Wizard" to create a chart, the first dialog box that lets the user select ().
A. correct data area and reference data series generated in the "row" or "column"
position B. The generated graph is embedded in the original sheet or a new chart sheet
C. Suitable chart type
content and the chart title D. specified category axis, the data axis

12. The following options are not part of the display main technical indexes is ______.
Resolution A.
B. weight
C. pixel pitch
D. size of the display

13. In the dialog box that allows select multiple options is ().
A. checkbox
B. checkboxes
C. list box
D. command button

Up to 14 bytes can be compiled with a different code ____.
A.8
B.2
C.128
D.256

Word 15. In edit mode, just copy the contents of the selected text format without having to copy the selected text should
A. directly Paste button
B. select "Edit" → "Paste" operation
C. Select "edit" → "paste"
D. right-clicking the mouse at the specified location

16. There LAN hardware (), personal computer, workstation or other intelligent devices, network cards, and cables.
A. Network Server
B. network operating systems
C. Network protocol
D. Router

17. The computer virus may be present in the () is.
A. E-mail
B. Application
C.Word document
D. All of the above

18. The type of virus spread by email belongs ().
Guided A.
B. file type
C. Compound
D. networked

19. The photo-text is one of Word's features, the following description error is
A.Word provides the ability to add text in a closed graphic
B.Word provides a fill color of the graphics functions in a closed
C. Word can use the color schemes in the document
D.Word can set the background in the document

20. If the e-mail arrives, your computer does not boot, then the email will ____.
A. returned to the sender
B. stored on the service provider's host
C. After a while the other party to resend
D. never sent

21. The legal IP address is ____.
A.202: 196: 112: 50
B.202,196,112,50
C.202,196,112,50
D.202.196.112.50

22. International Organization for Standardization defines the Open Systems Interconnection model (OSI), the model will be divided into a protocol () layer.
A.5
B.6
C.7
D.8

Meaning 23. anonymous FTP service is ____.
A. No FTP service address on the Internet
B. Allow users without an account login to the FTP server
C. sent an anonymous letter
D. unrestricted use resources on the FTP server

24. The cache memory is increased between the main memory and the CPU is ____ purpose.
A. Increasing memory
B. improving memory reliability
C. solution velocity matching between the CPU and main memory
D. increasing the memory capacity, faster access while

25. Exit the current application method is ().
Press Esc A.
B. press Ctrl + Esc key
C. press Alt + Esc key
D. press Alt + F4 key

Published 15 original articles · won praise 0 · Views 69

Guess you like

Origin blog.csdn.net/aopenfang/article/details/105163670