808, the following information on the characteristics of the network, not the right one is A, the network data can share B, the network can share C, all the computer must be the same brand, the same model D, the network to facilitate the exchange of information and exchange 809, the following information on the Internet is A, is involved in the region's most extensive resource D, the number of B, access to time, space and other factors, all resources are not charging
810, which of the following tasks is to the computer external information into the computer A, B input device, output device C, D monitor, power line
811, which of the following is a local area network in the external devices to share A, LAN, a number of users to use a certain application B, local area network users to use a printer C, a number of users on the computer at the same time 68
D, with the help of network system transmission of data 812, the following is the main approach to prevent the computer virus A, do not use the foreign software C, copy the data file copy B, regular virus check D, when the virus against computer system, should stop using, must be cleared virus
813, the following is the right of the A, information technology is the modern communication technology. B, information technology is the information acquisition, transmission, storage, processing, communication and expression of technology. C, micro electronic technology and information technology are not related to each of the two technical areas. D, information technology is the technology of processing information. 814, the following description, incomplete A, refers to the media and dissemination of information carrier said it to the people of all kinds of information transfer B, multimedia computer is a computer sound card C, multimedia technology refers to the use of computer technology to multimedia integration, characteristics and technology of D, the processing of the digital multimedia technology refers to the single multimedia in digital form stored in the computer, the right 815 of the following statements is A, a computer virus can only infect executable B, computer software refers to the programs stored in the floppy disk in the process of C, the computer is the same every time you start, because all the information in the RAM in shutdown will not be lost after D, although hard disk installed in the mainframe, but it belongs to the core 816, for the following file compression software is A, Excel B, WinZip PowerPoint, D C, Authorware
817, the following statements about the recycling station, the right is A, the file and folder in the recycle bin are can be restored B, the file and folder in the recycle bin is not to restore the C, the file can be restored, but the folder is not to restore the D, the folder can be restored, but the file is not reduced to 818, which is not correct? A, the computer is the tool to complete the information processing. B, the computer according to people to prepare and store a good program, the input data processing. The use of C, computer can improve the work efficiency and
improve the quality of life. D, due to the development of computer intelligence technology, robots can eventually replace human. 819, the following are the basic components of the computer LAN is A, sound card B, C, D, web browser, media player
820, the following is a computer output device 69
A, microphone
B, monitor
C, scanner
D, digital camera
821, the following belong to the computer input device is A, the mouse B, speaker C, D monitor, printer
822, the following are the domestic WORD2000 text processing software is A, B OFFICE2000, C, D WPS2000, LOTUS
823, the following belong to the application of the software is Linux, B PASCAL, C A, Excel 2000 D, Windows 2000
824, the following belong to the application of the software is Windows, B Unix, C Linux, D A, Word
825, the following statements about the Windows scroll bar is not correct, is A, by clicking on a scroll arrow can realize one-step rolling B, by dragging the scroll bar on the scroll bar can achieve rapid rolling C, the scroll bar has a horizontal and a vertical scroll bar two, each window is D with the rolling 826, below about the Internet information resource description is incorrect, the A Internet originated in the United States, Chinese information resources on the Internet accounted for nine of B, there are a lot of bad information on the Internet, in some areas even became criminals Park C, published in the information resources on the Internet to be responsible for their words, do say, legitimate D, information resources on the Internet we can use at will, to fully enjoy the benefits of the Internet 827 The main features of the database are: I, storage of a large number of data; II, efficient retrieval; III, management is convenient; IV, through the network to achieve data sharing. A, I, II and III B, I and II C, I, II and IV D
828, the display is currently the use of the most A, memory B, input devices C, D, microprocessor, output device
829, Xiao Ming on the Internet to find a good film, he wants to download the movie to his
computer, because the film is relatively large, so how to improve the download speed. A, Download B directly, click the right mouse button, select the target to save
C, download tools to download the D, through the replication to achieve the purpose of 830, the two source of information security is the virus and hackers, because hackers are A, computer programming expert C, B, Cookies, D, of illegal intruders, the producer of information
831, to find the LAN computer, should enter the A, my computer B, C, D, IE browser, control panel
832, to move the location of the WINDOWS window, you must drag it with the mouse 70
A, border
B, status bar
C, title bar
D, dialog box
833, to use IE browser to browse WWW information A, must enter a site's domain name B, must enter a site IP address C, enter a site's domain name or IP address can be D, what are not to enter 834, general, determine the computer class is A, printer speed B, keyboard keys B, CPU performance D, the number of software
835, in general, the memory of the data stored in the A, after the power failure, will not lose B, completely lost C, a small amount of D lost, most lose
836, the general in the Internet domain name (such as, www.nit.edu.cn), the meaning is A, user name, host name, organization name, name, name, unit name, organization name, name, the most senior domain name C, host name, network name, name, network name, host name, organization name, 837, a complete computer system including computer hardware and A, disk C, data line B, memory D, software
In 838, a computer network must be A, Internet to freely express a variety of speech, you can learn to look for B, and into the Family Archives Library C, to learn how to use the valuable source of information to learn and develop their own D, to help other students, to buy their own software to friends the machine with 839, the following statement about the network error is A, the two computers with Internet together is a network of B, according to the network coverage can be divided into LAN and WAN C, computer network data communication, resource sharing and other functions of D, the Internet we enjoy not only service in front of the computer to provide the following information about 840, and the statement is correct A, only in the form of books to the long-term preservation of information. B, digital signal is easy to be interfered with
the analog signal, which leads to the distortion of C, the computer uses the digital technology to process the D and the digital technology has been gradually replaced by the simulation technology, the following several software can be processed, and the system is the least occupied. 71
Word, A
Wps, B
C, writing board
D, Notepad
842, the exchange of information in the following ways is not real-time information exchange is A, B E-mail, C QQ, D MSN, ICQ
843, the following media can not be used as memory is A, B, C, D, CD ROM, magnetic head
844, which belong to the application of artificial intelligence technology A, mouse / graphics user interface C, using the brush to draw B, voice input method - speech recognition technology D, Office assistant
845, the following services do not belong to the Internet services A, email B,, C, electronic commerce D, file transfer
846, the following settings password in the way of which is more secure B, A, C, D, B, A, D, A, B, Doc, C, D,,,, PPT, C, Xls,,,,,, Html, ALT+
849, A, C, A,, B,, C,, the, the D, the BBS, the use of the software is not illegal, the use of the software is not illegal, the following are QQ2007, B A, C FrontPage, B, D, CD, D
852, the following is the operating system is A, B Wps2000, C Windows, XP D Word97, Basic Visual 72
853, the following is the operating system is A, B ADSL, C Linux, D WPS, Excel
854, the following belong to the system software is A, financial management software B, image editing software C, operating system D, application software
855, the Internet
因篇幅问题不能全部显示,请点此查看更多更全内容