There is no question that computer applications such as(71), electronic mail, and(72)publishing have changed the way people work. These computer applications have enhanced users capacity for communication and have improved their productivity. The success of these applications has prompted both vendors and researchers to continue to seek new ways to further advance the information technology revolution. Enter the latest innovation: networked(73)systems. They convey information in multiple(74): text, graphics, video, audio,(75), computer simulations, and so forth. Advocates of these systems argue that they are the next logical step in human communication; however, modifying our current networks to accommodate the variety of media will present significant technical difficulties.A.word transactionB.word processingC.word disposalD.word dealing

There is no question that computer applications such as(71), electronic mail, and(72)publishing have changed the way people work. These computer applications have enhanced users capacity for communication and have improved their productivity. The success of these applications has prompted both vendors and researchers to continue to seek new ways to further advance the information technology revolution. Enter the latest innovation: networked(73)systems. They convey information in multiple(74): text, graphics, video, audio,(75), computer simulations, and so forth. Advocates of these systems argue that they are the next logical step in human communication; however, modifying our current networks to accommodate the variety of media will present significant technical difficulties.

A.word transaction

B.word processing

C.word disposal

D.word dealing


相关考题:

●In the following essay, each blank has four choices.Choose the best answer and write down on the answer sheet.Communicating via Email is by far the most common Internet activity.You can (71) with anyone in the world who has an Internet address or Email (72) with a system connection to the Internet.All you need is (73) the Internet and an Email program.Two of the most widely used Email programs are Microsoft's (74) and Netscape's Navigator.A typical Email message has three basic (75) : header, message, and signature.(71) A.connectB.exchangeC.communicateD.game(72) A.accountB.No.C.userD.administrator(73) A.attach withB.graspC.possessD.access to(74) A.YahooB.ExplorerC.FoxmailD.Outlook Express(75) A.packetsB.elementsC.framesD.cells

TCP/IP(71)layer protocols provide services to the application(72)running on a computer. The application layer does not define the application itself, but rather it defines(73)that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an(74)between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP(75)layer consists of two main protocol options--the Transmission Control Protocol(TCP) and the User Datagram Protocol(UDP).A.applicationB.transportC.linkD.network

●The major problem with Email is that it is (71) easy to use that people can become (72) with messages (73) they can possibly answer in a day.In addition,mail boxes require some management to (74) messages or archive those that might be required later.Senders don't always know about your Email backlog and often send (75) messages.(71) A.tooB.soC.veryD.much(72) A.fullB.lostC.inundatedD.filled(73) A.more thanB.thanC.thatD.which(74) A.manageB.saveC.backupD.dispose of(75) A.toomanyB.redundantC.longD.trivial

Electronic mail and filing permit a user to compose and transmit a message on an office(71)system. In the early 1970s, the ARPANET community developed a number of such systems which have been heavily used. Through standard message format(72), several hundred different computers and electronic mail interfaces are specification of how(73)and return addresses should appear on envelopes and which sizes are allowable for envelopes. In the electronic message world, they describe what(74)of characters are required at the(75)of a message to identify the sending and receiving mailboxes.A.robotizationB.automationC.dynamicD.action

● The Internet is the worlds largest computer (71) .(71)A.networkB.deviceC.displayD.disk

● The (72) in e-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America.(72)A. illnessB. virusC. weaknessD. attachment

假设用户名为computer,该用户接入域名为mail.org.cn的Internet邮件服务器。则该用户的电子邮件地址为() A、mail.org.cn.computerB、computer.mail.org.cnC、mail.org.cn@computerD、computer@mail.org.cn

用户在域名为mail.dlut.edu.cn的邮件服务器上申请了一个账号,账号名为computer,则该用户的电子邮件地址是_______。A.mail.dlut.edu.cn$computerB.computer@mail.dlut.edu.cnC.computer@dlut.edu.cnD.mail.dlut.edu.cn@computer

The major problem with E-mail is that it is(71)easy to use that people can become(72)with messages(73)they can possibly answer in a day. In addition, mail boxes require some management to(74)messages or archive those that might be required later. Senders don't always know about your E-mail backlog and often send(75)messages.A.tooB.soC.veryD.much

Because Web servers axe platform. and application(71), they can send or request data from legacy or external applications including databases. All replies, once converted into(72). mark-up language, can then be transmitted to a(73).Used in this way, Intranets can(74)lower desktop support costs, easy links with legacy applications and databases and,(75)all, ease of use.A.coupledB.dependentC.independentD.related

Software refers to(70). The most important software on any computer is(71).A.inputB.programsC.outputD.electronic

● TCP/IP (71) layer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need—like the ability to transfer a file in the case of HTTP. In short, the application layer provides an (74) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options—the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

The(72)in e-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America.A.illnessB.virusC.weaknessD.attachment

In enterprises, the gateway is the computer that(71) the traffic from a workstation to the outside network that is serving the Web pages. In homes ,the gateway is the(72) that connects the user to the internet.A.findsB.searchesC.routesD.tracks

The display screen is the most common (72) device used to show you what the computer is doing.A.inputB.printingC.outputD.electronic

Your computer runs Microsoft Windows XP Professional. The computer also runs 20 third- party applications. You plan to upgrade your computer to Microsoft Windows Vista. The functionality of the existing applications must be maintained even after you upgrade your computer. You need to ascertain whether the hardware and software on the Windows XP Professional computer will support the upgrade.What should you do?()A.AB.BC.CD.D

Because Web servers are platform. and application(71)they can send or request data from legacy or external applications including databases. All replies, once converted into(72)mark-up language, can then be transmitted to a(73). Used in this way, Intranets can(74)lower desktop support costs, easy links with legacy applications and databases and,(75)all, ease of use.A.relatedB.dependentC.coupledD.independent

共用题干Electronic MailDuring the past few years,scientists all over the world have suddenly found themselves pro-ductively engaged in task they once spent their lives avoiding—writing,any kind of writing,but particularly letter writing. Encouraged by electronic mail's surprisingly high speed,convenience and economy,people who never before touched the stuff are regularly,skillfully,even cheerfully tapping out a great deal of correspondence.Electronic networks,woven into the fabric of scientific communication these days,are the route to colleagues in distant countries,shared data,bulletin boards and electronic journals.Any-one with a personal computer,a modern and the software to link computers over telephone lines can sign on.An estimated five million scientists have done so with more joining every day,most of them communicating through a bundle of interconnected domestic and foreign routes known col-lectively as the Internet,or net.E-mail is starting to edge out the fax,the telephone,overnight mail,and of course,land mail.It shrinks time and distance between scientific collaborators,in part because it is conven-iently asynchronous(异步的)( Writer can type while their colleagues across time zones sleep; their message will be waiting.).If it is not yet speeding discoveries,it is certainly accelerating communication.Jeremy Bernstein,the physicist and science writer,once called E-mail the physicist's umbili-cal cord(脐带).Later other people,too,have been discovering its connective virtues. Physi-cists are using it;college students are using it;everybody is using it;and as a sign that it has come of age,the New Yorker has celebrated its liberating presence with a cartoon—an apprecia-tive dog seated at a keyboard,saying happily,“on the Internet,nobody knows you're a dog.” Why is a dog sitting before a computer keyboard in a cartoon published by New Yorkers?A: Even dogs are interested in the computer.B: E-mail has become very popular.C: Dogs are liberated from their usual duties.D: E-mai deprives dogs of their owners' love.

共用题干第一篇Electronic TeachingThe potential of closed-circuit television and other new electronic teaching tools is so great that it is fascinating to visualize" the school of tomorrow".Televised lessons will originate from a central building having perhaps four or five master studios.The lessons will be carried into classrooms all over a city,or even an entire country.After a televised lesson has been given,the classroom teacher will take over for the all important"follow-up"period.The students will ask any troublesome questions,and difficult points will be cleared up through discussion.The teacher in the classroom will have additional electronic tools.On the teacher's desk,the traditional chalk and erasers will have been replaced by a multiple-control panel and magnetic tape players.The tape machines will run pre-recorded lessons which pupils will follow by headphones. The lessons will be specifically geared to the students' levels of ability.For instance,while the class as a whole studies history,each student will receive an individual history lesson,directed to his par-ticular level of ability.Should question arise,the students will be able to talk directly to the teacher on individual intercoms without disturbing the rest of the class.In this way,the teacher will be able to conduct as many as three classes at the same time.With the rapid development of computer science,students will be aided with specially prepared multi-media software to study their subjects better. Homework will possibly be assigned and handed in via electronic mail system. Students can even take examinations on their computer linked with the teachers' and get the score instantly.They will get certificates or diplomas if they pass all the required examinations.Experts believe that this type of education will be very popular in the years ahead.Computer teaching will help the study in the following ways except that_________.A:teachers can give and collect homework using electronic mail systemB:examinations can be conducted on computers better than on paperC:test scores can be obtained soon after the test is takenD:certificates or diplomas are required if the students want to pass the tests

共用题干Electronic MailDuring the past few years,scientists all over the world have suddenly found themselves productively engaged in task they once spent their lives avoiding-writing,any kind of writing,butparticularly letter writing. Encouraged by electronic mail's surprisingly high speed,convenienceand economy,people who never before touched the stuff are regularly,skillfully,even cheerfullytapping out a great deal of correspondence.Electronic networks,woven into the fabric of scientific communication these days,are theroute to colleagues in distant countries,shared data,bulletin boards and electronic journals. Anyone with a personal computer,a modern and the software to link computers over telephone linescan sign on.An estimated five million scientists have done so with more joining every day,mostof them communicating through a bundle of interconnected domestic and foreign routes known collectively as the Internet,or net.E-mail is starting to edge out the fax,the telephone,overnight mail,and of course,land mail.It shrinks time and distance between scientific collaborators,in part because it is conveniently asynchronous(异步的)( Writer can type while their colleagues across time zones sleep; their message will be waiting).If it is not yet speeding discoveries,it is certainly accelerating communication.Jeremy Bernstein,the physicist and science writer,once called E-mail the physicist's umbilical cord(脐带).Later other people , too , have been discovering its connective virtues. Physicists are using it;college students are using it;everybody is using it;and as a sign that it has come of age,the New Yorker has celebrated its liberating presence with a cartoon-an appreciative dog seated at a keyboard,saying happily,“On the Internet,nobody knows you're a dog.”Why is a dog sitting before a computer keyboard in a cartoon published by the New Yorkers?A: Even dogs are interested in the computer.B: E-mail has become very popular.C: Dogs are liberated from their usual duties.D: E-mai deprives dogs of their owners'love.

共用题干Electronic MailDuring the past few years,scientists all over the world have suddenly found themselves productively engaged in task they once spent their lives avoiding-writing,any kind of writing,butparticularly letter writing. Encouraged by electronic mail's surprisingly high speed,convenienceand economy,people who never before touched the stuff are regularly,skillfully,even cheerfullytapping out a great deal of correspondence.Electronic networks,woven into the fabric of scientific communication these days,are theroute to colleagues in distant countries,shared data,bulletin boards and electronic journals. Anyone with a personal computer,a modern and the software to link computers over telephone linescan sign on.An estimated five million scientists have done so with more joining every day,mostof them communicating through a bundle of interconnected domestic and foreign routes known collectively as the Internet,or net.E-mail is starting to edge out the fax,the telephone,overnight mail,and of course,land mail.It shrinks time and distance between scientific collaborators,in part because it is conveniently asynchronous(异步的)( Writer can type while their colleagues across time zones sleep; their message will be waiting).If it is not yet speeding discoveries,it is certainly accelerating communication.Jeremy Bernstein,the physicist and science writer,once called E-mail the physicist's umbilical cord(脐带).Later other people , too , have been discovering its connective virtues. Physicists are using it;college students are using it;everybody is using it;and as a sign that it has come of age,the New Yorker has celebrated its liberating presence with a cartoon-an appreciative dog seated at a keyboard,saying happily,“On the Internet,nobody knows you're a dog.” How is the Internet or net explained in the passage?A: Electronic routes used to fax or correspond overnight.B: Electronic routes used to read home and international journals.C: Electronic routes waiting for correspondence while one is sleeping.D: Electronic routes connected among millions of users home and abroad.

What is the resulting action when you click on the lock computer button on the Windows Security Dialog Box?()A、Computer is locked.B、Applications continue to run.C、Computer is Shut Down.D、Computer is not locked.E、Applications are frozen.F、The monitor is closed down.

You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

单选题You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()AUse Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.BUse Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.CUse Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.DUse secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

问答题Practice 9  Electronic mail, or e-mail, is a method of transmitting message through a computer network. Business communication by e-mail is basically the same as writing on paper. Although e-mail tends to be a more immediate and personal form of communication, the formal style, tone and language of a business letter should still be employed. Try to avoid long and complicated words and sentences in your e-mail as to make the message easy to read. Keep paragraphs short and use line spaces between paragraphs.

单选题With the introduction of the electronic computer, there is no complicated problem _____ can be solved in a few hours.AbutBwhichCthatDwhat

单选题已知接入Internet网的计算机用户名为Xinhua,而连接的服务商主机名为public.tpt.fj.cn,相应的E-mail地址应为( )。AXinhua@publi.tpt.fi.cnBXinhua.publi.tpt.fj.cnCXinhua.publi.@tpt.fj.cnDPubli.tpt.fj.cn@Xinhua