计算机英语spss多选题分析The tools w...

计算机专业英语-修改后复习版_学霸学习网
计算机专业英语-修改后复习版
《计算机专业英语》群: 第一单元Multiple Choice Questions 1. (p. 4) Which of the following is not a required part of an information system? A. People B. Procedures C. Internet D. Data An information system has five parts: people, procedures, software, hardware, and data. 2. (p. 6) The physical equipment that processes data in order to create information is called the A. typology B. compiler C. hardware D. software The equipment that processes the data to create information is called hardware. 3. (p. 8) The word &software& is interchangeable with the word A. procedure B. application C. program D. computer The words software and programs are interchangeable. 4. (p. 8) What are the two major software types? A. System analysis software and data warehousing software B. Operating system software and utilities software C. System software and application software D. Database management software and application software There are two major kinds of software: system software and application software. 5. (p. 9) Which of the following is a collection of programs rather than a single program? A. Procedures B. System software C. Hardware D. Application software System software is not a single program. Rather it is a collection of programs, including operating systems, utilities, and device drivers. 6. (p. 9) &Background& software that allows the computers to work is called A. shareware. B. application software. C. desktop. D. system software.1 / 51 《计算机专业英语》群: System software is &background& software that helps the computer manage its own internal resources. 7. (p. 9) Identify the program that coordinates computer resources, provides an interface between users and the computer, and runs applications. A. Systems software B. Operating system C. Application software D. Device driver Operating systems are programs that coordinate computer resources, provide an interface between users and the computer, and run applications. 8. (p. 9) Disk Defragmenter eliminates unnecessary file fragments and rearranges files and unused disk space to optimize computer operations. This is an example of which type of program? A. System software B. Operating system C. Application software D. Utilities Utilities perform specific tasks related to managing computer resources. 9. (p. 9) System software includes all of the following except A. operating systems. B. device drivers. C. utilities. D. browser. A browser is used to navigate, explore, and find information on the Internet. It is an example of application software, not system software. 10. (p. 11) Which of the following is most likely to be used to monitor anufacturing processes and assembly-line operations? A. Minicomputers B. Mainframe computers C. Supercomputers D. Microcomputers Minicomputers are refrigerator-sized machines often used in medium-sized companies or departments of large companies for specific purposes, such as monitoring manufacturing processes and assembly-line operations. 11. (p. 11) Desktop, media center, notebook, netbook, tablet PC, and handheld computers are classified as A. mainframe computers. B. supercomputers. C. minicomputers. D. microcomputers. These computers are classified as microcomputers.2 / 51 《计算机专业英语》群: 12. (p. 11) The most widely used handheld computers are A. laptop computers. B. PDAs and smartphones. C. notebooks and netbooks. D. tablet PCs. PDAs (Personal Digital Assistants) and smartphones are the most widely used handheld computers. 13. (p. 11) A specific type of notebook computer that accepts handwriting is called a A. laptop computer B. netbook C. subnotebook D. tablet PC A tablet PC is a type of notebook that accepts handwriting, converting the input to standard text that can be used by programs such as word processors. 14. (p. 12) This computer component holds data that is currently being processed. A. RAM B. ROM C. Bus D. Ports RAM holds the program and data that is currently being processed. 15. (p. 12) Which of the following will not retain data after the computer is turned off? A. DVD B. RAM C. ROM D. Hard drive RAM is referred to as temporary storage because its contents will typically be lost if the electrical power to the computer is disrupted. 16. (p. 12) Identify the four basic categories of hardware in a microcomputer system. A. Hard disk, input/output, secondary storage, and display devices. B. System unit, input/output, secondary storage, and primary storage. C. System unit, input/output, secondary storage, and communication. D. System unit, modem, RAM, and microprocessor. Hardware for a microcomputer system consists of a variety of different devices. This physical equipment falls into four basic categories: system unit, input/output, secondary storage, and communication. 17. (p. 12) The most common output devices are A. monitors and printers. B. DVD drives and monitors. C. speakers and printers. D. printers and DVD drives. Monitors and printers are the most common output devices.3 / 51 《计算机专业英语》群: 18. (p. 12) Which one of the following is not considered a form of secondary storage? A. Solid-state storage B. Optical disk C. RAM D. Hard disk The most important kinds of secondary media are hard disks, solid-state storage, and optical disks. RAM is primary, not secondary, storage. 19. (p. 13) Flash memory cards are a type of what kind of secondary storage? A. Optical disks B. Hard drives C. High-definition disks D. Solid-state storage The three types of solid-state storage are solid-state drives, flash memory cards, and USB drives. 20. (p. 14) The most widely used communication device is A. a personal computer. B. the Internet. C. a telephone line. D. a modem. A modem is the most widely used communication device. A modem modifies telephone communications into a form that can be processed by a computer. 21. (p. 15) Which of the following is not an example of a document file? A. Spreadsheet B. Memo C. Letter D. Term paper Spreadsheets are classified as worksheet files. 22. (p. 15) A financial budget would typically be what type of data file? A. A database B. A worksheet C. A presentation D. A document Worksheets are used to analyze things like budgets and to predict sales. 23.(p. 15) Employee records, including names, social security numbers, and related information, would typically be what type of data files? A. Document files B. Presentation files C. Database files D. Worksheet files4 / 51 《计算机专业英语》群: Database files contain highly structured and organized data storing records of related information. 24. (p. 15) The capability of your microcomputer to share information with other computers is referred to as A. the wireless revolution. B. system memory. C. computer competency. D. connectivity. Connectivity is the capability of your microcomputer to share information with other computers. 25. (p. 16) The Internet is the largest _____ in the world. A. network B. system unit C. database program D. operating system The largest network in the world is the Internet. It is like a giant highway that connects you to millions of other people and organizations located throughout the world. True / False Questions 26. (p. 5) The five parts of an information system are: people, procedures, software, hardware, and data. TRUE The five parts of an information system are people, procedures, software, hardware, and data. 27. (p. 6) The purpose of software is to convert data into information. TRUE The purpose of software is to convert data (unprocessed facts) into information (processed facts). 28. (p. 6) Software is another name for a program or programs. TRUE Software is another name for a program or programs. 29. (p. 6) To be a competent computer user, you must understand the essentials of information technology (IT). TRUE In microcomputer systems, end users must understand the essentials of IT, including software, hardware, and data. 30. (p. 9) Application software is &background& software which helps the computer manage its own internal resources. FALSE System software, not application software, helps the computer manage its own internal resources. 31. (p. 9) System software is a collection of programs. TRUE System software is not a single program. Rather it is a collection of programs including the operating system, utilities, and device drivers.5 / 51 《计算机专业英语》群: 32. (p. 9) Disk Defragmenter is a Windows utility that is commonly used to format secondary devices. FALSE Disk Defragmenter is a Windows utility that is used to locate and eliminate unnecessary file fragments and rearrange files and unused disk space to optimize computer operations. 33. (p. 9) System software might be described as end user software. FALSE Application software, not system software, may be described as end user software. 34. (p. 9) A browser is an example of a specialized application. FALSE A browser is an example of a basic application. 35. (p. 10) Another name for a minicomputer is midrange computer. TRUE Minicomputers are also known as midrange computers. 36. (p. 10) Insurance companies are most likely to use midrange computers to process information about millions of policyholders. FALSE Insurance companies use mainframe computers for this purpose. 37. (p. 11) Media centers combine the functionality of a desktop computer with an entertainment center. TRUE Media centers blur the line between desktop computers and dedicated entertainment devices. 38. (p. 12) Two important components of the system unit are the microprocessor and the hard disk. FALSE The primary components of the system unit are the microprocessor and memory. 39. (p. 12) A system unit consists of the keyboard and the monitor. FALSE The system unit is a container that houses most of the electronic components that make up a computer system. 40. (p. 12) RAM will retain data when the computer is turned off. FALSE RAM is sometimes referred to as temporary storage because its contents will typically be lost if the electrical power to the computer is disrupted. 41. (p. 12) The most common input devices are the mouse and the keyboard. TRUE The two most common input devices are the mouse and the keyboard. 42. (p. 12) Secondary storage will retain data when the computer is turned off. TRUE Secondary storage does not lose data and programs when electrical power to the computer is disrupted. 43. (p. 13) Solid-state storage uses rigid metallic platters to store data using the magnetic charges of the disk's surface. FALSE Solid-state storage does not have any moving parts. Hard disks use metallic platters to store data using the magnetic charges of the disk's surface.6 / 51 《计算机专业英语》群: 44. (p. 15) The four common types of files are document files, worksheet files, database files, and presentation files. TRUE The four types of files include document files, worksheet files, database files, and presentation files. 45. (p. 15) Highly structured and organized data is stored in database files. TRUE Database management programs contain highly structured and organized data. Fill in the Blank Questions 46. (p. 4) Computer _____ refers to acquiring computer-related skills. competency Computer competency refers to acquiring computer-related skills, and is an indispensable tool for today. 47. (p. 5) The rules to follow when using software, hardware, and data are called _____. procedures The rules or guidelines for people to follow when using software, hardware, and data are procedures. 48. (p. 6) _____ is the equipment that processes data to create information. Hardware Hardware is the equipment that processes data to create information. 49. (p. 6) Raw, unprocessed facts, including text, numbers, images, and sounds, are called _____. data Software processes data (raw, unprocessed facts) to yield information (processed facts). 50. (p. 8) _____ is a collection of programs that helps the computer manage its own resources and enables application software to interact with computer hardware. System software System software includes operating systems, utilities, and device drivers to help the computer manage internal resources and enable application software to interact with computer hardware. 51. (p. 9) _____ are specialized programs designed to allow particular input or output devices to communicate with the rest of the computer system. Device drivers Device drivers are specialized programs designed to allow particular input or output devices to communicate with the rest of the computer system. 52. (p. 9) Application software can be categorized as either basic applications or _____ applications. specialized Basic applications include applications that you have to know to be considered computer competent. Specialized applications are more narrowly focused on specific disciplines and occupations. 53. (p. 9) The basic application used to navigate, explore, and find information on the Internet is called a _____. browser One of the basic application software used is a browser to navigate, explore, and find information on the Internet. Internet Explorer is one of the most widely used browsers.7 / 51 《计算机专业英语》群: 54. (p. 10) _____ computers are not nearly as powerful as supercomputers, but are capable of great processing speeds and data storage. Mainframe Although Mainframes are not nearly as powerful as supercomputers, they are capable of great processing speeds and data storage. 55. (p. 11) The six types of microcomputers are: _____ computers, media centers, notebooks, netbooks, tablet PCs, and handheld computers. desktop Desktop computers are small enough to fit on top of a desk, yet are too big to carry around. 56. (p. 11) _____ computers are the smallest type of microcomputer and are designed to fit into the palm of one hand. Handheld Personal digital assistants (PDAs) and smartphones are the most widely used handheld computers. 57. (p. 12) The _____ is the container that houses most of the electronic components of a computer system. system unit The system unit is the container that houses most of the electronic components of a computer system. 58. (p. 12) _____storage devices do not lose data or programs after the electrical power is turned off. Secondary Secondary storage holds data and programs even after electrical power to the computer system has been turned off. 59. (p. 13) _____are rigid metallic platters used to store programs and very large data files. Hard disks Hard disks are used to store programs and large data files. 60. (p. 13) _____ are secondary storage devices that have the greatest capacity. Optical discs Optical discs have the greatest capacity. 61. (p. 15) A _____ file might contain audience handouts and speaker notes in addition to electronic slides. presentation Presentation files might contain audience handouts, speaker notes, and electronic slides. 62. (p. 15) Increased use of mobile devices has been termed the _____ revolution. wireless The widespread use of mobile or wireless communication devices has been the biggest change in connectivity. Experts predict that these wireless applications are just the beginning of the wireless revolution. 63. (p. 16) A _____ is a communications system connecting two or more computers. network Central to the concept of connectivity is the network. A network is a communications system connecting two or more computers. 64. (p. 16) The _____provides a multimedia interface to the numerous resources available on the Internet. Web8 / 51 《计算机专业英语》群: The Web provides a multimedia interface to the numerous resources available on the Internet. 65. (p. 16) The largest network in the world is the _____. Internet The largest network in the world is the Internet. Essay Questions(M→medium H→hard E→easy)66. (p. 5, 6) Describe all the parts of an information system(M). An information system typically consists of five parts: people, procedures, software, hardware, and data. Information systems are used by people in order to increase productivity. Procedures are rules or guidelines for people to follow when using software, hardware, and data. Software is a program that contains the step-by-step instructions that tell the computer how to do its work. Hardware consists of the physical equipment that processes the data to create information. Data consists of raw unprocessed facts, including text, numbers, images, and sounds. 67. (p. 6) Where would it be most relevant to use the term &data& and the term &information&? Give an example of each.(M) Data are unprocessed facts, including text, numbers, images and sound. An example might be a listing of all customer purchases at a bookstore over the last year. Information is processed data that has been rendered usable with the help of various types of software. From the previous example, you could derive information such as the addresses of customers who bought more than $500 worth of books or the year's top ten horror novels. 68. (p. 8, 9) What is an operating system? Give two examples.(M) Operating systems are software that make the computer function. It is the layer that connects the hardware to the applications software. All programs that run on the computer do so in coordination with the operating system. Mainly, operating systems are programs that coordinate computer resources, provide an interface between the users and the computer, and run applications. Some examples of operating systems are Windows 7 and Mac OS X. 69. (p. 9, 10) What is application software? Describe the two categories of the application software(H). Application software might be described as end user software. These programs can be categorized as either basic or specialized applications. Basic applications are widely used in a large number of careers. One of these basic applications is a browser to navigate, explore, and find information on the Internet. One of the most widely used browsers is Microsoft's Internet Explorer. Specialized applications include thousands of other programs that are more narrowly focused on specific disciplines and occupations. Some of the best known are graphics, audio, video, multimedia, Web authoring, and artificial intelligence programs. 70. (p. 10) What are the differences between a supercomputer and a mainframe computer? (M) Supercomputers are the most powerful type of computer. These machines are special high-capacitycomputers used by very large organizations. Although mainframe computers are not as powerful as supercomputers, mainframe computers are capable of great processing speeds and data storage. For example, insurance companies use mainframes to process information about millions of policyholders.9 / 51 《计算机专业英语》群: 71. (p. 11) Describe the differences between minicomputers and microcomputers.(M) Minicomputers, also known as midrange computers, are refrigerator-sized machines. Medium-sized companies or departments of large companies typically use them for specific purposes. For example, production departments use minicomputers to monitor certain manufacturing processes and assembly-line operations. Microcomputers are the least powerful, yet the most widely used, type of computer. There are six types of microcomputers: desktop computers, media centers, notebooks, netbooks, tablet PCs, and handheld computers. 72. (p. 11) Describe the different types of microcomputers with relevant examples(H). There are six types of microcomputers: desktop computers, media centers, notebooks, netbooks, tablet PCs, and handheld computers. Desktop computers are small enough to fit on top of or alongside a desk yet are too big to carry around. Media centers blur the line between desktop computers and dedicated entertainment devices. Notebooks, also called laptops, are portable, lightweight, and fit into most briefcases. Netbooks are smaller, lighter, and less expensive than notebooks. Tablet PCs convert handwriting to standard text that can be further processed by programs such as a word processor. Handheld computers are the smallest microcomputers and are designed to fit into the palm of one hand. Personal digital assistants (PDAs) and smartphones are the most widely used handheld computer. 73. (p. 12) Explain what a system unit is(M). The system unit is a container that houses most of the electronic components that make up a computer system. Two important components of the system unit are the microprocessor and memory. The microprocessor controls and manipulates data to produce information. Memory is a holding area for data, instructions, and information. One type of memory, random-access memory (RAM), holds the program and data that is currently being processed. This type of memory is sometimes referred to as temporary storage because its contents will typically be lost if the electrical power to the computer is disrupted. 74. (p. 12, 13) What is secondary storage? What is the difference between hard disks and solid-state storage? (H) Unlike memory, secondary storage holds data and programs even after electrical power to the computer system has been turned off. Hard disks are typically used to store programs and very large data files. Using rigid metallic platters and read/write heads that move across the platters, hard disks store and retrieve data using magnetic charges. In contrast, solid-state storage does not have any moving parts. It is more reliable and requires less power than hard disks. Solid-state storage saves data electronically in a manner similar to RAM except that its contents will not be lost if electrical power is disrupted. 75. (p. 15) Describe the four types of files.(E) Document files are created by word processors. They include memos, term papers, and letters. Worksheet files are created by electronic spreadsheets to analyze things like budgets and to predict sales. Database files are typically created by database management programs to contain highly structured and organized data. Presentation files are created by presentation graphics programs to save presentation materials, including audience handouts, speaker notes, and electronic slides.第二单元10 / 51 《计算机专业英语》Multiple Choice Questions群: 1. (p. 30) Launched in 1969 as a U.S funded project that developed a national computer network, the Internet was initially called __________. A. World Wide Web B. Intranet C. NSFNet D. ARPANET The Internet was originally called Advanced Research Project Agency Network (ARPANET). 2. (p. 30) The Web was introduced in 1991 at A. National Aeronautics and Space Administration (NASA). B. Center for European Nuclear Research (CERN). C. Research Center for Nuclear Physics (RCNP). D. National Science Foundation (NSF). The Web was introduced in 1991 in Switzerland, at the Center for European Nuclear Research (CERN). 3. (p. 30) The Internet is a(an) _____. A. actual network B. virtual network C. multimedia interface D. domain name The Internet is the actual physical network. It is made up of wires, cables, and satellites. 4. (p. 30) This enabled graphics, animation, sound, and video to be added to the Internet. A. Web browser B. URI C. Web D. Sharewares The Web made it possible to add graphics, animations, sound, or video to Internet resources. 5. (p. 31) The most common way to access the Internet is through A. an Internet service provider (ISP). B. an instant messaging (IM) service. C. an application service provider (ASP). D. Facebook. ISPs are already connected to the Internet and provide a path or connections for individuals to access the Internet. 6. (p. 32) Which of the following is not a well-known browser? A. Internet Explorer B. Windows Explorer C. Safari D. Google Chrome Windows Explorer is not a Web browser.11 / 51 《计算机专业英语》群: 7. (p. 32) A Web page typically contains _____ which contains the formatting instructions to allow the page to display Internet resources. A. uniform resource locators (URLs) B. top-level domain (TLD) C. Hypertext Markup Language (HTML) D. hyperlinks The browser displays the contents of a Web page by reading the Hypertext Markup Language (HTML) code contained in the Web page document. 8. (p. 32) For browsers to connect to a resource on the Internet, the address of the resource must be specified through addresses called _____. A. uniform resource locators (URLs) B. top-level domains (TLDs) C. Hypertext Markup Language (HTML) D. hyperlinks All resources on the Internet are identified by an address called a uniform resource locator (URL). 9. (p. 32) In the URL &&, what is the domain name? A.
C. simnetonline D. com A Web page's URL begins with the protocol (http), followed by the domain name (). 10. (p. 32) In the URL &&, &.com& is the _____. A. top-level domain (TLD) B. uniform resource locator (URL) C. domain name server (DNS) D. domain name Top-level domains (TLD) such as .com, .gov, .edu, .mil, and, .net are used to identify the type of organization. 11. (p. 33) Applets are written in which programming language? A. AJAX B. JavaScript C. HTML D. Java Java applets can be downloaded quickly and run by most browsers. 12. (p. 35) Which one of the following has been difficult to enforce due to the fact that over 50 percent of all spam originates from servers outside the United States? A. Spam blockers B. E-mail filter options C. Photo identity D. CAN-SPAM Act The CAN-SPAM Act of 2003 requires that every marketing-related e-mail provide an opt-out option. When the option is selected, the recipient's e-mail address is to be removed from future mailing lists.12 / 51 《计算机专业英语》群: 13. (p. 38) One of the fastest-growing uses of the Internet is _____, or connecting individuals to one another. A. social networking B. instant messaging C. e-mail D. blogging Social networking is one of the fastest-growing uses of the Internet. 14. (p. 38) Facebook is an example of what type of social networking site? A. Friend-of-a-friend site B. Reuniting site C. Microblog site D. Common interest site Reuniting sites, like Facebook, are designed to connect people who have known one another but have lost touch. 15. (p. 38) Twitter is an example of what type of site? A. Wiki B. Blog C. Microblog D. Search A microblog, like Twitter, publishes short sentences that only take a few seconds to write, rather than long stories or posts like a traditional blog. 16. (p. 44) Which type of search engine presents a list of topics or categories from which you select subtopics until your search is narrowed to a list of Web sites? A. Directory search B. Keyword search C. Metasearch D. Reference search In a directory search, you select a category or topics that fits the information you want, and then narrow your search by selecting subtopics until a list of Web sites appears. 17. (p. 45) Programs that automatically submit your search request to several search engines simultaneously are called ____. A. metasearch engines B. Webcrawlers C. spiders D. hits Metasearch engines are programs that automatically submit your search request to several search engines simultaneously. 18. (p. 45) Which of these sites is an example of a metasearch engine? A. Google B. Dogpile C. Ask D. Medscape Dogpile is one of the best known metasearch engines.13 / 51 《计算机专业英语》群: 19. (p. 47) This type of e-commerce often resembles the electronic version of the classifieds ads or an auction. A. B2C B. C2C C. C2B D. B2B Consumer-to-consumer (C2C) involves individuals selling to individuals. This often takes the form of an electronic version of the classified ads or an auction. 20. (p. 47) Online banking is an example of what type of e-commerce? A. B2C B. C2C C. C2B D. B2B Online banking is one of the most widely used Business-to-Consumer (B2C) e-commerce applications. 21. (p. 49) Which of these applications is a Web-based application? A. QuickTime B. BitTorrent C. Google Apps D. PayPal Google Apps provides free online access to programs with similar capabilities to Microsoft's Word, Excel, and PowerPoint. 22. (p. 50) Programs that automatically start and operate as a part of your browser are called A. plug-ins. B. readers. C. pop-ups. D. ActiveX Controls. Plug-ins are programs that automatically start and operate as a part of your browser. 23. (p. 48) Parents can use this type of program to block access to selected Web sites. A. Plug-in B. FTP C. BitTorrent D. Filter Filters are programs that can monitor use and generate reports detailing the total time spent on the Internet and the time spent at individual Web sites, chat groups, and newsgroups. 24. (p. 51) This method of file transfer has been used for decades and is frequently used for uploading changes to a Web site hosted by an Internet service provider. A. ASP B. FTP C. BitTorrent D. drop.io File transfer protocol (FTP) has been used for decades and still remains one of the most popular methods of file transfer.14 / 51 《计算机专业英语》群: 25. (p. 51) This method of file transfer distributes file transfers across many different computers. A. ASP B. FTP C. BitTorrent D. drop.io BitTorrent distributes file transfers across many different computers for more efficient downloads. True / False Questions 26. (p. 30) The Internet connects millions of computers and resources across the world via wires, cables, and satellite. TRUE The Internet is the actual physical network. It is made up of wires, cables, and satellites. 27. (p. 30) The Internet and the Web are the same. FALSE It is easy to get the Internet and the Web confused, but they are not the same thing. The Internet is the actual network made up of wires, cables, and satellites. The Web is a multimedia interface to the resources available on the Internet. 28. (p. 31) Users can access the Internet from almost anywhere within a country for a standard fee through national service providers. TRUE Users can access the Internet from almost anywhere within the country for a standard fee without incurring long-distance telephone charges. 29. (p. 32) In order to connect to a Web site, the browser must know only the site's domain name. FALSE For browsers to connect to Internet resources, the location or address of the resources must be specified via the URL, which is made up of the protocol and the domain name. 30. (p. 33) Web pages that contain hypertext markup language commands are typically written in Java. FALSE Some Web pages contain Applets, special programming used to add interest and activity. Applets are written in the Java programming language. 31. (p. 34) Shopping is the most popular Internet activity. FALSE Communication is the most popular Internet activity. 32. (p. 34) Internet communications include e-mail, instant messaging, social networking, blogs, and wikis. TRUE Popular types of Internet communications include e-mail, instant messaging, social networking, blogs, and wikis. 33. (p. 34) E-mail headers usually contain the addresses, subject, and attachments. TRUE The e-mail header appears first and typically includes the addresses of the sender, the recipient, and anyone who receives a copy as well as the subject of the e-mail and any attachments.15 / 51 《计算机专业英语》群: 34. (p. 35) Attachments to e-mail messages are always safe to open. FALSE Unsolicited e-mail may contain computer viruses or other destructive programs. You should never open an e-mail attachment from someone you don't know. 35. (p. 35) The CAN-SPAM Act has proven to be more effective than spam blockers at preventing unwanted e-mail. FALSE The CAN-SPAM Act has had minimal impact since over 50 percent of all spam originates from servers outside the United States. 36. (p. 38) Instant messaging is text only. FALSE Most instant messaging programs include video conferencing features, file sharing, and remote assistance in addition to text capabilities. 37. (p. 36) drop.io is an example of a social networking site. FALSE drop.io is an example of a Web-based file transfer service. Social networking sites such as Facebook, MySpace, and LinkedIn, connect individuals to one another. 38. (p. 38) Social networking sites only connect individuals who already know each other. FALSE While reuniting sites such as Classmates Online and Facebook are designed to reconnect people who know each other but have lost touch, other friend-of-a-friend sites like Friendster and MySpace and common interest sites like Flikr and Meetup are designed to bring together people who may not have known each other previously. 39. (p. 43) A keyword search results in a list of hits. TRUE In a keyword search, you enter a keyword or phrase reflecting the information you want. The search engine compares your entry against its database and returns a list of hits. 40. (p. 44) Using more than one search engine when researching an important topic is not necessary. FALSE A recent study by the NEC Research Institute found that any one search engine includes only a fraction of the informational sources on the Web. Therefore, it is highly recommended that you use more than one search engine when researching important topics. Difficulty: Medium 41. (p. 45) To evaluate information you find on the Web, you must consider four factors: authority, accuracy, objectivity, and graphical representation. FALSE To evaluate the usefulness of information you find on the Web, you must consider the site's authority, accuracy, objectivity, and currency. 42. (p. 48) The biggest hurdle for the growth of e-commerce is the evolution of fast, secure, and reliable payment methods for buying goods. TRUE16 / 51 《计算机专业英语》群: The single greatest challenge for e-commerce is the development of fast, secure, and reliable payment methods for purchasing goods. 43. (p. 47) RealPlayer and Acrobat Reader are classified as plug-ins programs. TRUE RealPlayer and Adobe Acrobat Reader are both plug-in programs. 44. (p. 49) Web utilities are programs used to create Web pages. FALSE Web utilities are specialized utility programs that make using the Internet easier and safer. 45. (p. 51) Uploading is the process of copying a file from a Web site to your computer. FALSE Downloading is the process of copying a file from a Web site to your computer. Uploading is the process of copying a file from your computer to another computer on the Internet. Fill in the Blank Questions 46. (p. 32) Google Chrome is an example of a Web _____. browser Google Chrome is a Web browser. 47. (p. 32) The protocol _____ is used for Web traffic and is the most widely used Internet protocol. http Protocols are rules for exchanging data between computers. The protocol http is the most widely used Web protocol. 48. (p. 32) In the URL &&, && is the _____ name. domain A Web page's URL begins with the protocol (http), followed by the domain name (). 49. (p. 32) HTML stands for _____. Hypertext Markup Language Hypertext Markup Language (HTML) contains the formatting instructions telling the Web browser how to display the Web page. 50. (p. 32) A _____ is a link on a Web page that leads to another Web page. hyperlink Hyperlinks connect to other Web pages or documents containing related information (including text files, graphics, audio, and video clips). 51. (p. 33) Special Web browsers called _____ browsers are designed to run on portable devices such as cell phones. mobile Mobile browsers are designed to run on portable devices such as cell phones. 52. (p. 34) The typical e-mail has three basic elements: _____, message, and signature. header A typical e-mail message has three basic elements: header, message, and signature. 53. (p. 34) Unwelcome e-mail is called _____. spam17 / 51 《计算机专业英语》群: Americans receive billions of unwanted and unsolicited e-mails every year. This unwelcome e-mail is called spam. 54. (p. 38) Some software companies have started providing _______ instant messenger programs that support communication with other instant messaging services. universal Many instant messaging services do not support communication with other services. However, some services have started providing universal instant messenger programs that support communication with others. 55. (p. 39) A _______ publishes short sentences that only take a few seconds to write. microblog A microblog publishes short sentences that only take a few seconds to write, rather than long stories or posts like a traditional blog. 56. (p. 39) The most popular microblogging site is _______. Twitter Twitter is the most popular microblogging site. 57. (p. 42) A _______ is a Web site specially designed to allow visitors to fill in missing information or correct inaccuracies. wiki Wikis support collaborative writing in which there isn't a single expert author, but rather a community of interested people that builds knowledge over time. 58. (p. 42) &Wiki& comes from the Hawaiian word for _______. fast &Wiki& comes from the Hawaiian word for fast, which describes the simplicity of editing and publishing through wiki software. 59. (p. 44) A ______ search provides a list of categories or topics as a starting point for your search. directory In a directory search, you begin by selecting a category or topic that fits the information that you want. Then you continue to narrow your search by selecting subtopics, until a list of Web sites appears. 60. (p. 45)
is an example of a _____ search engine. specialize Specialized search engines focus on subject-specific Web sites. 61. (p. 46) When evaluating a Web site's content, whether or not the information is up to date is considered part of the _____ element. currency A Web site's &currency& is how up to date the site's information is. One way to tell is to check to see if the site specifies the date when the site was updated. 62. (p. 48) _____ are criminals who specialize in stealing, trading, and using stolen credit cards over the Internet. Carders18 / 51 《计算机专业英语》群: Criminals known as carders specialize in stealing, trading, and using stolen credit cards over the Internet. 63. (p. 51) Copying files from a Web site to your computer is called _____. downloading Using file transfer utility software, you can copy files to your computer from specially configured Web servers. This is called downloading. 64. (p. 52) A _____ is a collection of utility programs designed to maintain your security and privacy while you are on the Web. Internet security suite An Internet security suite is a collection of utility programs designed to maintain your security and privacy while you are on the Web. 65. (p. 52) Knowledge of HTML is considered essential for the job of a _____. Webmaster Employers look for candidates with a bachelor's degree in computer science or information systems and knowledge of common programming languages and Web development software. Knowledge of HTML is considered essential. Essay Questions(M→medium H→hard E→easy)66. (p. 30) Describe the evolution of the Internet and Web(E). The Internet was launched in 1969 when the United States funded a project to develop a national computer network called Advanced Research Project Agency Network (ARPANET). The Internet is a large network that connects together smaller networks all over the globe. Initially, the Internet was all text C no graphics, animations, sound, or video. The Web was introduced in 1991 at the Center for European Nuclear Research (CERN) in Switzerland and added a multimedia interface to the resources available on the Internet. 67. (p. 32) Define the parts of a URL(M). For browsers to connect to resources on the Internet, the address of the resources must be specified. These addresses are called uniform resource locators or URLs. All URLs have at least two basic parts. The protocol is the first part of the address and specifies which protocol (set of rules for exchanging data) to use when connecting to the Internet resources. In the example, , the protocol is http. The protocol http is used for Web traffic and is the most widely used Internet protocol. The second part of the URL is the domain name, for . This indicates the specific address where the resource is located. The part of the domain name following the dot (.) is the top-level domain. It identifies the type of organization. A .com top-level domain indicates a commercial site. 68. (p. 34) Describe the three basic parts of an e-mail message.(E) The header appears first and typically includes the e-mail address of the person the message is being sent to, the email address of the person sending the message, a subject line briefly describing the topic of the message, and the names of any file attachments. The second part of the e-mail message is the letter or message itself. Finally, the signature provides additional information about the sender such as name, address, and telephone number. 69. (p. 35) Briefly explain how instant messaging works. (M)19 / 51 《计算机专业英语》群: Instant messaging (IM) is an extension of e-mail that allows two or more people to contact each other via direct, live communication. To use instant messaging, you specify a list of friends and register with an instant messaging server. Whenever you connect to the Internet, special software informs your messaging server that you are online. In response, the server will notify you if any of your contacts are online. At the same time, it notifies your friends that you are online. You can then send messages directly back and forth to one another. 70. (p. 39) Describe the three types of social networking sites and give an example of each.(H) Three basic categories of social networking sites are reuniting, friend-of-a-friend, and common interest. Reuniting sites are designed to connect people who have known one another but have lost touch. Classmates Online is an example of a reuniting site. Friend-of-a-friend sites are designed to bring together people who do not know one another but share a common friend. MySpace is an example of a friend-to-a-friend site. Finally, common interest sites, like Meetup, bring together individuals who share common interests or hobbies. 71. (p. 42) Describe a wiki and explain how a wiki differs from a blog(H). A wiki is a Web site designed to allow visitors to fill in missing information or correct inaccuracies. Wikis support collaborative writing in which there isn't a single expert author, but rather a community of interested people that builds knowledge over time. Although blogs may have multiple authors, community feedback is limited to adding comments to the site. Blogs are not a collaborative effort like wikis. 72. (p. 43) Explain how a directory search works(E). In addition to keyword search, most search engines also provide a directory or list of categories or topics such as Finance, Health, and News. In a directory search, you select a category or topic that fits the information that you want. Another list of subtopics related to the topic you selected appears. You select the subtopic that best relates to your topic and another subtopic list appears. You continue to narrow your search in this manner until a list of Web sites appears. This list corresponds to the hit list produced by a keyword search. 73. (p. 45) Discuss the four elements to consider when evaluating the accuracy of information on the Web.(M) There are four elements to consider when evaluating the accuracy of information on the Web: authority, accuracy, objectivity, and currency. Authority refers to the author's expertise on the subject. Is the site an official site for the information presented, or is the site an individual's personal Web site? In order to determine the accuracy of a Web site, consider whether or not the information has been critically reviewed for correctness prior to posting on the Web. Does the Web site provide a method to report inaccurate information to the authors? Objectivity is reached when the information is factually reported without an author bias. Finally, currency is the timeliness of the Web site. Is the information up to date? Does the site specify the date when the site was last updated? 74. (p. 46) Describe both the advantages, and the disadvantages associated with electronic commerce(M).20 / 51 《计算机专业英语》群: Electronic commerce, also known as e-commerce, is the buying and selling of goods over the Internet. The underlying reason for the rapid growth in e-commerce is that it provides incentives for both buyers and sellers. From the buyer's perspective, goods and services can be purchased at any time of day or night. Traditional commerce is typically limited to standard business hours when the seller is open. Additionally, buyers no longer have to physically travel to the seller's location. From the seller's perspective, the costs associated with owning and operating a retail outlet can be eliminated. Another advantage is reduced inventory. Some of the disadvantages include the inability to provide immediate delivery of goods, the inability to &try on& prospective purchases, and questions relating to the security of online payments. 75. (p. 48) Differentiate between auction house sites and person-to-person auction sites. (M) Auction house sites sell a wide range of merchandise directly to bidders. The auction house owner presents merchandise that is typically from a company's surplus stock. These sites operate like a traditional auction, and bargain prices are not uncommon. Auction house sites are generally considered safe places to shop. Person-to-person auction sites operate more like flea markets. The owner of the site provides a forum for numerous buyers and sellers to gather. While the owners of these sites typically facilitate the bidding process, they are not involved in completing transactions or in verifying the authenticity of the goods sold. As with purchases at a flea market, buyers and sellers need to be cautious.第三单元Multiple Choice Questions 1. (p. 66) This type of software can be described as end user software and is used to accomplish a variety of tasks. A. Communications software B. Application software C. Utility software D. System software Application software is designed to accomplish a variety of different tasks. 2. (p. 66) When one of the items on a menu bar is selected, a(n) _____ appears. A. additional list of menu options or a dialog box B. window C. toolbar D. graphical user interface When one of the menu items is selected, an additional list of menu options or a dialog box that provides additional information and requests user input appears. 3. (p. 66) Most applications use a(n) _____ that displays graphical elements called icons to represent familiar objects. A. integrated package B. dialog box C. graphical user interface D. menu button21 / 51 《计算机专业英语》群: Most applications use a graphic user interface (GUI) that displays graphical elements called icons to represent familiar objects and a mouse. 4. (p. 66) Basic applications include all of the following except A. web authoring B. word processors C. spreadsheet D. database management systems22 / 51 《计算机专业英语》群: Web authoring software is classified as a specialized application. 5. (p. 67) This is a new interface design element introduced with Office 2007 that displays graphic representations of the alternatives from a list: A. buttons. B. galleries. C. ribbons. D. contextual tabs. Galleries simplify the process of making a selection from a list of alternatives. This is accomplished by displaying small graphic representations of the alternatives. 6. (p. 67) In Microsoft Office 2007 and 2010, menus and toolbars have been replaced by A. buttons. B. galleries. C. ribbons. D. contextual tabs. Ribbons replace menus and toolbars by organizing commonly used commands into a set of tabs. 7. (p. 67) While working on a document the verbal command &copy& is given and the selected text gets copied. This means that the application supports: A. input keys. B. internal inputs. C. speech recognition. D. commands. Speech recognition is the ability to accept voice input to select menu options and dictate text. 8. (p. 70) If you need to create documents that consist primarily of text, you need this software. A. Presentation graphics B. Word processor C. Spreadsheets D. Database management Word processors are used to create document files. 9. (p. 71) This is a character-effect. A. Find and replace B. Numbered list C. Color D. Bullets Color is a character-effect. 10. (p. 74) Prewritten formulas provided by the spreadsheet program that perform calculations such as adding a series of cells are called A. functions. B. entries. C. grids. D. values .Prewritten formulas in a spreadsheet program are called functions.23 / 51 《计算机专业英语》群: 11. (p. 73) In a spreadsheet, a cell is defined as the A. intersection of a table and a row. B. intersection of a table and a column. C. intersection of a row and column. D. intersection of a column and a record. The intersection of a row and column creates a cell. 12. (p. 73) Spreadsheet programs create A. workbook files. B. text documents. C. financial presentations. D. tools to enter, retrieve and edit data. Spreadsheet programs create workbook files. 13. (p. 73) The purpose of this software program is to manipulate numeric data. A. Database manager B. Function C. Formula D. Spreadsheet Spreadsheet programs are used to manipulate numeric data. 14. (p. 74) Creating a bar graph using data selected from a spread sheet is an example of a(n) A. analytical graph. B. graphics software. C. pie chart. D. spreadsheet. Analytical graphs or charts are visual representations of data in a spreadsheet. 15. (p. 75) When you change one or more numbers in a spreadsheet, all related formulas will automatically update and charts will be recreated. This is called A. refreshing. B. recalculation. C. sensitivity. D. what-if. When one or more numbers in a spreadsheet are changed, all related formulas will automatically recalculate and charts will be recreated. This is called recalculation. 16. (p. 73) Which would be most appropriate application to create, analyze and forecast budgets? A. DBMS B. Word processor C. Spreadsheet D. PowerPoint Spreadsheet programs organize, analyze, and graph numeric data such as budgets and financial reports .17. (p. 79) The printed output generated from a database is called a(n) A. form. B. query. C. table. D. report.24 / 51 《计算机专业英语》群: Data from tables and queries in a database can be printed in a variety of different types of reports. 18. (p. 79) The most widely used database structure is A. hierarchical. B. relational. C. centralized. D. linear. The relational database is the most widely used database structure. 19. (p. 79) A question or a request for specific data contained in a database is referred to as a(n) A. form. B. report. C. applet. D. query. A query is a question or a request for specific data contained in a database. 20. (p. 78) The electronic equivalent of a file cabinet is a A. database. B. word processor C. spreadsheet. D. table. A database is the electronic equivalent of a file cabinet. 21. (p. 82) Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called: A. graphs B. presentation graphics C. diagrams D. charts Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentations. 22. (p. 84) What is an integrated package? A. A set of different versions of the same software package B. A single program that provides the functionality of several programs C. All the business software made by a single vendor, like all the Microsoft software D. A set of software like a financial service and a resource sharing bulletin board offered by a single vendor An integrated package is a single program that provides the functionality of a word processor, spreadsheet, database manager, and more. 23. (p. 84) Integrated packages are sometimes referred to as A. personal software. B. software suites. C. application suites. D. online software. Integrated packages are popular with many home users and are sometimes classified as personal or home software25 / 51 《计算机专业英语》群: 24. (p. 85) Google docs is an example of a(n) A. online office suite. B. downloadable office suite. C. search engine. D. utility suite. Popular online office suites are Google Docs, Zoho, and ThinkSmart. 25. (p. 88) Which of these suites include a variety of programs designed to make computing easier and safer? A. Norton Internet Security Suite B. Google Docs C. IBM Lotus Symphony D. Apple iWork Utility suites include a variety of programs designed to make computing easier and safer. One of the best known is Norton Internet Security Suite. True / False Questions 26. (p. 66) Only one window can be displayed on the computer screen at one time. FALSE More than one window can be opened and displayed on the computer screen at one time. 27. (p. 66) Application software includes basic applications and specialized applications. TRUE Application software can be divided into two categories. One category is basic applications. The other category is specialized applications. 28. (p. 66) Microsoft Access is an example of basic application software. TRUE Basic applications programs are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, and database management systems. Microsoft Access is one of the most widely used database management systems designed for microcomputers. 29. (p. 66) A window is a rectangular area that can contain a document, a program, or a message. TRUE A window is a rectangular area that can contain a document, a program, or a message. (Do not confuse the term window with the various versions of Microsoft's Windows operating systems, which are programs.) 30. (p. 66) Microsoft Office 2010 uses an interface with traditional menus and toolbars. FALSE Microsoft Office 2010 uses an interface with ribbons, tabs, and galleries to make it easier for users to find and use all the features of an application. 31. (p. 66) Microsoft Office 2007 and Office 2010 are examples of programs that use toolbars and menus. FALSE Microsoft Office 2007 and Office 2010 use a new interface design that introduces ribbons, tabs, and galleries to make it easier for users to find and use all the features.26 / 51 《计算机专业英语》群: 32. (p. 67) Speech recognition uses your voice to control application software. TRUE Speech recognition is the ability to accept voice input to select menu options and dictate text. 33. (p. 70) Microsoft Word cannot be used to create personalized Web pages. FALSE Word processors can be used to create personalized Web pages. 34. (p. 70) Using word wrap enables automatic continuation into the next line, if the current line is full while entering text. TRUE Word wrap automatically moves the insertion point to the next line once the current line is full. 35. (p. 73) Organizing, analyzing, and recalculating are common features of word processing operations. FALSE Spreadsheet programs organize, analyze, and graph numeric data such as budgets and financial reports. 36. (p. 74) Functions provide structure to a spreadsheet by describing the contents of rows and columns. FALSE Functions are prewritten formulas provided by the spreadsheet program that perform calculations. 37. (p. 75) What-if analysis is a very powerful and simple tool to test the effects of different changes in a spreadsheet. TRUE The process of observing the effect of changing one or more cells is often referred to as what-if analysis. 38. (p. 79) The hierarchical database is the most widely used database structure. FALSE The relational database is the most widely used database structure. 39. (p. 79) Querying a database is equivalent to asking a question for specific data contained within it. TRUE A query is a question or a request used to extract specific data contained in a database. 40. (p. 79) Each table in a database is made up of rows called fields. FALS Each table in a database is made up of rows called records .41. (p. 79) Each field in a database contains records of data about some specific person, place, or thing. FALSE Each table in a database is made up of rows called records and columns called fields. Each record contains fields of data about some person, place, or thing .42. (p. 82) Presentation graphics software is an excellent tool to communicate a message and to persuade people. TRUE Presentation graphics are excellent tools to communicate a message and to persuade people.27 / 51 《计算机专业英语》群: 43. (p. 84) The primary advantage of an integrated package is that the capabilities of each function are extensive and equivalent to those found in individual programs. FALSE Integrated packages are not as extensive as individual programs. Their primary advantages are cost and simplicity. 44. (p. 88) A software suite that is designed to make computing easier and safer is known as a home suite. FALSE A software suite that is designed to make computing easier and safer is known as a utility suite. 45. (p. 88) Computer trainers are responsible for writing new software for personal computers. FALSE Computer trainers instruct new users on the latest software or hardware. Fill in the Blank Questions 46. (p. 66) A(n) _____ is a rectangular area that can contain a document, program, or message. window A window is a rectangular area that can contain a document, program, or message. 47. (p. 66) Graphical elements called _____ are used to represent functions and programs. icons Most applications use a graphical user interface (GUI) that displays graphical elements called icons to represent familiar objects and a mouse. 48. (p. 66) As opposed to basic applications which are widely used in nearly every discipline, _____ applications are more narrowly focused. specialized Specialized applications include thousands of other programs that are more narrowly focused on specific disciplines and occupations. 49. (p. 66) _____ software is end-user software designed to accomplish a variety of different tasks. Application Application software can be described as end user software and is used to accomplish a variety of tasks. 50. (p. 67) In Microsoft Office 2007 and later, _____ replace menus and toolbars. ribbons Ribbons replace menus and toolbars by organizing commonly used commands into a set of tabs .51. (p. 67) _____ are used to create text-based documents. Word processors Word processors create text-based documents. 52. (p. 74) _____ are prewritten formulas provided by the spreadsheet program to perform calculations. Functions Functions are prewritten formulas provided by the spreadsheet program to perform calculations such as adding a series of cells.28 / 51 《计算机专业英语》群: 53. (p. 73) The intersection of a row and column creates a _____. cell The intersection of a row and column creates a cell. 54. (p. 75) The process of observing the effect of changing one or more cells is often referred to as_____. what-if analysis The process of observing the effect of changing one or more cells is often referred to as what-if analysis. 55. (p. 79) The _____ tool can quickly rearrange a table's records according to a selected field. sort A sort tool will quickly rearrange a table's records according to a selected field. 56. (p. 79) A(n) _____ is a question or a request for specific data contained in a database. query A query is a question or a request for specific data contained in a database. 57. (p. 78) A _____ is a collection of related data. database A database is a collection of related data. A database management system (DBMS) is a program that sets up or structures a database. 58. (p. 79) The _____ database is the most widely used database structure. relational The relational database is the most widely used database structure. 59. (p. 79) Every record in a database is composed of several _____ like Name, Date of Birth, etc. Fields Each record contains fields of data about some specific person, place, or thing. 60. (p. 82) An electronic presentation consists of a series of _____ or pages. slides An electronic presentation consists of a series of slides or pages. 61. (p. 82) _____ can be used to animate how the presentation moves from one slide to another. Transitions Transitions can be used to animate how the presentation moves from one slide to the next. 62. (p. 82) In a _____ template, the color schemes, slide layouts, and special effects are provided for you. design Design templates provide professionally selected combinations of color schemes, slide layouts, and special effects. 63. (p. 84) The most widely used integrated software package is _____. Microsoft Works The most widely used integrated package is Microsoft Works. 64. (p. 85) Office suites are also known as _____ suites. productivity29 / 51 《计算机专业英语》群: 65. (p. 88) Norton Internet Security Suite is an example of a _____ suite. utility Utility suites include programs designed to make computing easier and safer. Norton Internet Security Suite is one of the best known. Essay Questions(M→medium H→hard E→easy)66. (p. 66) What is the difference between system software and application software? (E) System software works with end users, application software, and computer hardware to handle the majority of technical details. Application software can be described as end user software designed to accomplish a variety of different tasks. 67. (p. 66) Describe a graphical user interface. (M) A user interface is the portion of the application that allows you to control and to interact with a program. A graphical user interface displays graphical elements called icons to represent familiar objects and a mouse. A graphical user interface also includes windows C rectangular areas that contain a document, program, or message. 68. (p. 66, 70, 73, 78, 82) List the four types of basic applications, what each application is used for, and an example of each. (H) The four basic applications are word processors, spreadsheets, database management systems, and presentation graphics. Word Processors are used to create text-based documents such as letters, memos, faxes, and reports. Microsoft Word is the most widely used word processor. Spreadsheet programs organize, analyze, and graph numeric data such as budgets and financial reports. The most widely used spreadsheet program is Microsoft Excel. A database management system is a program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database. Microsoft Access is one of the most widely used database management systems designed for PCs. Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentations. Microsoft PowerPoint is an example of a widely used presentation graphics program. 69. (p. 75) Explain what-if analysis as it applies to spreadsheet programs. How is it different from recalculation? (H) When you change a value in a spreadsheet program, all related formulas will automatically recalculate and charts will be recreated. This is called recalculation. The process of observing the effects of recalculation is called what-if analysis. 70. (p. 78) What is a database? What is a database manager? (E) A database is a collection of related data. It is the electronic equivalent of a file cabinet. A database management system (DBMS) or database manager is a program that sets up, or structures, a database. It also provides tools to enter, edit, and retrieve data from the database.30 / 51 《计算机专业英语》群: 71. (p. 82) What are presentation graphics programs? What are they used for? (E) Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentations. They are excellent tools to communicate a message and to persuade people. 72. (p. 84) What are the advantages and disadvantages of an integrated software package?(M) An integrated package is a single program that provides the functionality of a word processor, spreadsheet, database manager, and more. The primary advantages of an integrated software package are cost and simplicity. The primary disadvantage is that the capabilities of each function (such as word processing) are not as extensive as in the individual programs (such as Microsoft Word). 73. (p. 84, 85) What is the difference between a software suite and an integrated package? (E) A software suite is a collection of several different programs that have been bundled together and sold as a group. The applications function exactly the same whether purchased in a suite or separately. An integrated package is a program that provides the functionality of several different programs. However, the capabilities of each function are less extensive than in the individual programs. 74. (p. 85) Discuss the advantages and disadvantages of online office suites.(M) Online office suites may be free, or they may charge a small fee, making them more affordable than traditional office suites. Online office suites are stored online and are available anywhere you can access the Internet. Documents created with these applications can also be stored online, making it easy to share documents and collaborate with others. However, a disadvantage to storing documents online is that you are dependent upon the server providing the applications. If the server is unavailable, you cannot use the application or access y}

我要回帖

更多关于 计算机英语多选题 的文章

更多推荐

版权声明:文章内容来源于网络,版权归原作者所有,如有侵权请点击这里与我们联系,我们将及时删除。

点击添加站长微信