20 East Spring semester "Computer Application Foundation" usually online job 1

[Statement] Bowen content is limited tutorial will be available, if infringement please let me delete, such as not timely reply or unclear please add micro-channel aopon007, if you can specify from CSDN very much hope to share with you through this platform CSDN

20 Spring semester "Computer Application Foundation" online jobs usually 1
papers Total: 100 Score: 100
First, multiple choice (a total of 25 questions, a total of 100 points)
Find 1.Word, the substitutions are extremely powerful, the following description the right is
A. can not find the specified format text, you can only specify the replacement text format
B. You can specify find text format, but you can not specify an alternative text format
C. not to find and replace text in the format specified
D. can search and replace text in the format specified

2. In the following unsigned decimal number, the 8-bit binary numbers can be represented by ().
A.255
B.256
C.289
D.317

3. In Windows, the extension waveform audio file is ____.
A.AVI
B.WAV
C.MID
D.CMF

4. often said microcomputer 386, microcomputer 486, wherein the numerals refer to ().
A. hard drive model
type B. floppy disk
models C. display
D.CPU models

5. "von? Neumann computer" architecture is divided into five ____ composition
A. external memory, an internal memory, CPU, display, print and
B. an input, an output, the arithmetic unit, a controller, a memory
C. Input , output, control, memory, peripherals
D. none

6. On the PC, the most common character encoding is ().
A.BCD code
B.ASCII code
C. GB code
D. area code

7. The following memory belonging to the internal memory is ______.
Floppy A.
B. hard
C.ROM
D.CD a ROM-

8. The following description, the error is ().
A. floppy disk drive may be used as input devices, output devices can also be used as
B. operating system for managing a computer system hardware and software resources
function represented by the function keys on the keyboard C. is determined by the computer hardware
when the machine power D.PC should be connected to an external power supply apparatus, the main power supply is turned on

9. The following are not measures to protect the security of the network is ().
A. encryption
B. Firewall
C. set user privileges
D. create a personal home page

10. Before sending a new e-mail, in addition to written contents of the letter, fill out the theme of the letter, but also must be ().
A. E-mail to reach the Fill path through
B. fill in the sender's phone number
C. fill in E-mail address of the recipient
D. fill in the number of e-mail

11.PowerPoint document can not be saved as () files.
A. Presentation
B.WEB page
C. Presentation Design Template
D. plain text

12. Start an address on the Internet, the browser page displayed first, called ________.
A. The domain
B. Site
C. network
D. Home

13. The current computer virus prevention system can not do is ().
A. known viruses automatically killing
B. Automatic tracking unknown virus
C. automatically killing unknown virus
D. automatic upgrade and release upgrade package

14. In a computer hardware technology, the minimum unit of memory is ____.
A. byte (Byte)
B. bits ( 'bit)
C. Word (Word)
D. Double Word (Double Word)

15. browse a web page with IEs, want to display another page in a new window, the method of operation is correct ().
A. Click inside the "address bar" box, enter the Internet address, then press Enter
B. Select "View" menu "Go" and "Home" item
"New" C. Select the "File" menu of " window "item, enter the Internet address in the address bar to open the window, press the enter key
D. choose the" file "menu in the" open "item in the open dialog box, enter the address bar

16. do "Toy windmill" animation for the selected text in PowerPoint method of operation is ____.
A. Select "Slide Show" menu "animation programs" command
B. select the "Format" menu "animation programs" command
C. Select "Slide Show" menu "Slide Transition" command
D. Selection "format" menu "slide switch" command

17. In Windows, if you want to simultaneously change the height and width of the window, by dragging and dropping () is achieved.
A. corner window
B. window border
C. scroll bar
D. Menu bar

111010.11 18. The binary number is converted to a hexadecimal number ().
A.3AC
B.3A.C
C.3A3
D.3A.3

The 19.Windows "Clipboard" is ().
A. An area of the hard disk
a floppy disk in the region B.
C. in a cache area of
a memory area D.

20. The following statement on data encryption is not correct ().
A. plaintext message is called
B. plaintext using a set of rules called the encryption algorithm encrypts the
procedure C. disguised message in some way to hide its contents is referred to as a decryption
D. encryption algorithm and a decryption algorithm typically under the control of the key

21.URL general format is ().
A. protocol name / address of the computer domain [path [filename]]
B. Protocol name: / Computer domain name address [path [filename]]
C. protocol name: / Computer domain address / [path [/ filename]]
D The agreement names: // computer domain address / [path [/ filename]]

22.Windows after the system is installed and activated, arranged by the system on the desktop icon is ().
A. Resource Manager
B. trash
C. Notepad
D. Control Panel

23. LAN unified command (), provides file, print, communications, and database functions.
A. NIC
B. Workstation
C. network operating system
D. Database Management System

24. A network interconnection of different network architectures, requires the use of ().
A. repeater
B. gateway
C. bridges
D. hub

25. The computer performance can be used to measure many indicators, in addition to the main index with the calculation speed, word length, etc., you can also use the following (), respectively.
A. Size of the main memory capacity
size of hard disk capacity B. The
size of the display C.
manufacturing cost computer D.

Published 15 original articles · won praise 0 · Views 68

Guess you like

Origin blog.csdn.net/aopenfang/article/details/105163458