1. What are the main applications of computers?
Scientific computing; Information processing; Automatic control; Computer-aided design and teaching assistance; Artificial intelligence; Application of multimedia technology; Operation of computer networks; Business processing; Information management; Home appliances.
2. What is the direction of computer development?
Gigantism; Miniaturization; Networking; Intelligence.
3. What is BCD code?
A coding system where several binary numbers represent a single decimal number.
4. What are the two main components of a complete computer system?
Hardware and software.
5. What are the five major components that make up the hardware of a computer?
Arithmetic unit; Control unit; Memory; Input devices and output devices.
6. What is an operating system?
An operating system (OS) is a system software that effectively manages and controls various resources of a computer system, coordinates the work of different components, fairly organizes the workflow of the computer, and provides a user-friendly interface to facilitate the use of the computer system.
7. What are the characteristics and basic functions of an operating system?
Characteristics: Concurrency; Sharing; Virtuality; Uncertainty.
Basic functions: Processor management; Memory management; Device management; File management; Job management.
8. What are the features of DOS, Windows, and UNIX operating systems?
DOS: Single-user, single-task disk operating system; Character-based interface; Responsible for managing system costs, additional hardware requires corresponding driver installation.
Windows: Single or multi-user, multi-tasking operating system; Graphical user interface; Provides powerful device management functions; Achieves perfect integration with the Internet; Rich management tools and application programs.
UNIX: Multi-user, multi-tasking operating system; Compact and effective; Has excellent portability; Outstanding openness; Network functionality.
9. What is a computer network?
A computer network refers to a system in which multiple independent-functioning computers and their peripheral devices located in different geographical locations are connected via communication lines. Under the management and coordination of network operating systems, network management software, and network communication protocols, they enable resource sharing and information transmission.
10. What are the three main parts that form a computer network?
Several hosts; A communication subnetwork; A series of communication protocols.
11. What are the functions of a computer network?
Data communication; Resource sharing; Realizing distributed information processing; Enhancing the robustness and availability of computer systems.
12. According to the topology structure, into how many categories can computer networks be classified (please provide examples)? What are the characteristics of each category?
Bus type: Simple structure, easy to implement, maintain, and expand, but fault detection is relatively difficult.
Star type: Failure of a single node does not affect other parts of the network, but failure of the central node will cause the entire network to fail.
Ring type: Good fault tolerance, but any node or transmission medium failure in the network will result in a total network failure.
Tree type: Easy to expand and isolate faults, but heavily dependent on the root node.
13. What are the commonly used wired and wireless media today?
Wired media: Twisted pair; Coaxial cable; Optical fiber.
Wireless media: Radio waves; Microwaves; Infrared.
14. What is the role of a network server?
File service; Communication service; Email service; WWW service.
15. What equipment is included in a network setup?
Network server; Network workstation; Network adapter (NIC); Repeater; Hub; Bridge; Switch; Router.
16. What is the function of DNS?
Perform domain name resolution.
17. What are the two main contents of a computer network architecture?
Protocol reference model; Protocol stack.
18. What are the two basic contents that a protocol should have?
Syntax and semantics.
19. Compare the OSI reference model with the TCP/IP reference model.
OSI Reference Model: Physical layer; Data link layer; Network layer; Transport layer; Session layer; Presentation layer; Application layer.
TCP/IP Reference Model: Application layer; Transport layer; Internet layer; Network interface; Hardware.
20. What are the three types of IP phone calls?
Computer to computer; Computer to phone; Phone to phone.
21. What are the common services of the Internet?
World Wide Web; Email; File transfer; Remote login; IP phone.
22. What is WWW?
WWW is the abbreviation for the World Wide Web, also known as "Web" or "万维网" in Chinese. It is based on Hypertext Transfer Protocol (HTTP) and HyperText Markup Language (HTML), providing an Internet information query service with a friendly interface.
23. What is URL?
Uniform Resource Locator (URL) is a method of identifying the address of web pages and other resources on the Internet.
24. What are the two most important communication protocols in the Internet?
TCP/IP and NetBEUI (commonly used by general users).
25. What are the ways to access the Internet? Please list 4 methods.
PSTN; ISDN; DDN; ADSL; VDSL; Cable Modem; PON; LMDS; LAN.
26. What are the two protocols that must be followed during the process of sending and receiving emails?
SMTP; POP.
27. What are the two servers that provide email sending and receiving services?
POP3; IMAP.
28. What are the main features of multimedia technology?
Diversity: Expands the range of information processed by computers from traditional numbers and text to sound and video information.
Integration: Allows computers to present content in multiple formats for better results.
Interactivity: Enables people to manipulate and control multimedia information, making the acquisition and use of information more active.
29. What are the key technologies for handling multimedia information?
Multimedia data compression technology; Multimedia data storage technology; Integrated circuit manufacturing technology; Multimedia database technology.
30. What is analog-to-digital conversion? What is digital-to-analog conversion?
Converting analog signals into digital signals; Converting digital signals into analog signals.
31. What are the three steps of analog-to-digital conversion?
Sampling; Quantization; Encoding.
32. What are some commonly used multimedia creation software?
Photoshop; Flash; 3DS MAX (3D animation creation software); Authorware (multimedia development tool software).
33. What are the key technologies for processing multimedia information?
Multimedia data compression technology; Multimedia data storage technology; Integrated circuit manufacturing technology; Multimedia database technology.
34. What is a computer virus? Which three media can a computer virus infect? What are the three main steps of infection?
A computer virus is a program or set of instructions with destructive effects.
It can infect three media: magnetic media, computer networks, optical media.
The infection process roughly involves three steps: Residing in memory, Waiting for conditions, Executing infection.
35. What are the characteristics of a computer virus?
Destructiveness; Infectivity; Concealment; Triggerability.
36. How are computer viruses classified?
Traditional single-machine viruses (boot sector viruses; file viruses; macro viruses; hybrid viruses).
Modern network viruses (worm viruses; Trojan viruses).
37. How to prevent and treat computer viruses?
1) Install real-time monitoring antivirus software or anti-virus cards and regularly update the virus database.
2) Frequently run Windows Update and install operating system patches.
3) Install firewall tools and set appropriate access rules to filter unsafe site visits.
4) Do not open emails or attachments from unknown sources.
5) Do not install plugins from unknown sources.
6) Do not randomly open links sent by strangers and beware of hidden Trojan viruses in malicious web pages.
7) Do not use pirated software.
8) Before opening downloaded programs or software, perform a virus scan first before proceeding with other operations.
38. What are the key technologies for ensuring information security?
Data encryption and decryption technology, digital signature technology, and identity authentication technology, etc.