- 1、本文档共15页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
计算机导论考试简答题(Introduction to computer examination short answer)
计算机导论考试简答题(Introduction to computer examination short answer)
9, the assembly of a personal computer, what parts? Please give a computer parts list.
Answer: motherboard, graphics card, memory, hard drives, chassis, power supply, keyboard, mouse, CD-ROM, display, CPU. The card has a good graphics card and integrated on the motherboard, you can also buy independent and sound equipment.
10, for structured programming language can be divided into three basic program structure, what is the three basic structure of the program, please explain.
Answer: sequence structure, selection of structure, circulation structure;
1. order structure: from top to bottom in turn.
2. structure: if statement
3. loop structure: for, while statement
11. The file is a collection of related data stored in memory on the computer. What is the file name? Operating system organization in what way? What are the advantages of this organization?
Answer: a file name including the main file name and extension of the two part. The extension when separated by.
In the same folder, a file name is the same file is not allowed,
Organization: according to the level of file organization
Advantages: it will greatly improve the efficiency of file management, especially the efficiency of file search.
12, for the computer system? Neumann system, let the computer to complete a task, which can be divided into several steps?
Answer: input - - control - storage operation - output,
What are the main technical measures of 15, guarantee the security of the computer system?
Answer: the three aspects of safety technology, safety management, safety law.
Anti-virus technology, anti hacking technology, firewall technology, intrusion detection technology, data encryption technology, authentication technology
16, the development of computer.
Answer: a few short years after the birth of ENIAC, the rapid development of computer. The main electronic devices have used vacuum tubes, transistors, small and medium scale integrated cir
您可能关注的文档
- 第1课 汽车的种类(Type first class car).doc
- 第一章习题(The first chapter exercises).doc
- 第一章企业资料通讯导论(The first chapter introduction to enterprise data communications).doc
- 第一第二第三届华人寻根节(炎帝)(The first second of the third Chinese roots Festival (Yan Di)).doc
- 第一讲 辩证唯物主义世界观(The world outlook of dialectical materialism).doc
- 第7章第二十三节怎样写比较式议论文(The seventh chapter twenty-third section is how to write essays).doc
- 第一章 国际税收导论-范(The first chapter of the introduction of international tax van).doc
- 第三单元教材分析 识字3(Third unit 3 literacy textbook analysis).doc
- 第三季度个人小结(The third quarter personal summary).doc
- 第1章金属材料导论(Chapter first introduction to metal materials).doc
- 分析let s单元56ago2卷纸zheng unit56.pdf
- 塑胶材料其它分类原料pa9t 12.pdf
- md16x16数字媒体切换器设备.pdf
- 者参考项目发起人学科类型单位序列承包商修订页代码顺序典型.pdf
- 届世界天然气大会阿姆斯特丹2006add10288.pdf
- 期测试记录表每周weekly g1g6 journeys tests level 6 lesson26.pdf
- modernize-whitepaper现代化您应用程序白皮书.pdf
- anybackup产品典型案例分析.pdf
- 约克金融工程课程tfeslide32.pdf
- 广州市妇女儿童医疗中心历份教学药历01tjy.pdf
文档评论(0)