Tải bản đầy đủ (.docx) (8 trang)

ôn tập tacn kma

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (144.14 KB, 8 trang )

<span class="text_page_counter">Trang 1</span><div class="page_container" data-page="1">

<b>Câu 1: How many major portions of the process are there in the lifecycle of mobile</b>

development? What are they?

There are 5 major portions of the process: Inception, Design, Development, Stabilization, Deployment... ...

<b>Câu 2: What are the differences between RAM and ROM?</b>

ROM ( Read only memory ): is a type of storage medium that permanently stores data on PCs and other electronic devices. RAM ( Random access memory ): is a form of computer data storage that stores data and machine code currently being used... ...

<b>Câu 3: What is information security and what is cybersecurity?</b>

Cyber security is the activity of securing computer systems, networks, devices, and applications from cyber attacks of any kind. Information security (commonly known as InfoSec) refers to the procedures and practices that corporations use to protect their data.. ...

<b>Câu 4: What are the advantages of the computer mouse over the keyboard?</b>

It is easier to use and handle a mouse as compared to the keyboard. It is quicker to work with a mouse. It takes less time to learn how to use a mouse. Mouse requires less space. Mouse can be used to draw graphics. Mouse is light to carry. Therefore it is portable... ...

<b>Câu 5: What is the motherboard? What components are included in the motherboard?</b>

The motherboard is the main printed ciruit board found in computers and other expandable systems. The mother board includes many components such as: central processing unit (CPU), random access memory (RAM), firmware, and internal and external buses ... ...

<b>Câu 6: What is a source program? What is an application program?</b>

A source programe is the original high-level language program which has to be converted to machine code before it may be executed. Application program is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users... ...

<b>Câu 7: How do computer viruses spread in the early time and today? How many types of</b>

computer virus should you be aware of? What are they?

In the early, pre-internet days, viruses often spread from computer to computer via infected floppy disks. Today, viruses spread via the internet. They are: Resident vs non-resident viruses, Macro viruses, Boot sector viruses, Email viruses, Polymorphic viruses... ...

<b>5. What are the 3 basic steps in the data process?</b>

</div><span class="text_page_counter">Trang 2</span><div class="page_container" data-page="2">

<b>A. accept data – process data – give the resultB. process data – provide output – give the resultC. accept data – sava data – process data</b>

<b>5. Why is graphical user interface successful?A. All are correct</b>

<b>B. It is easy to useC. It is fast</b>

<b>D. It helps users more creative</b>

<b>6. Power of a computer depends on speed and ……….</b>

<b>9. A specialist computer which provides a service to a network is ………A. internet service provider</b>

</div><span class="text_page_counter">Trang 3</span><div class="page_container" data-page="3">

<b>B. picture in pictureC. people in pictureD. picture in people</b>

<b>12. What has the same meaning as monitor?A. Visual display unit</b>

<b>B. Due to main memory</b>

<b>C. Due to hardware and software</b>

<b>17. What is arithmetic logic unit (ALU)?</b>

<b>A. Examines instructions and active other PC’s componentsB. Store and control information</b>

<b>C. Performs mathematic calculators</b>

<b>D. Convert programming language into machine code18. How can processor differ with one another?</b>

<b>A. The quality of outputB. The ammount of dataC. The capacity of RAMD. All are correct</b>

<b>19. Before the data is processed by the microprocessor, it is loaded into……….A. RAM</b>

</div><span class="text_page_counter">Trang 4</span><div class="page_container" data-page="4">

<b>B. ROM</b>

<b>C. storage devicesD. All are correctIII. Reading the passages</b>

<b>Reading 1:</b>

The most popular tool used when mining is artificial intellgence (AI). AI technologies try to work the way the human brain works, by making intelligent guesses, learning by example, and using deductive reasoning. Some of the more – popular AI methods userd in data mining include neural network, clustering, and decision trees.

Neural networks look at the rules of using data, which are based on the connections found or on a sample set of data. As a result, the software continually analyses value and compares it to the other factors, and it compares these factors repeatedly until it finds patterns emerging. These patterns are known as rules. The software then looks for other patterns based on these rules or sends out an alarm when a trigger value is hit.

Clustering divides data into groups based on similar features data ranges, clusters are used when data isn’t labelled in a way that is favorable to mining. For instance, an insurance company that wants to find instances of fraud wouldn’t have its records labelled as fraudulent or not fraudulent. But after analyzing patterns within clusters, the mining software can start to figure our rules that point to which claims are likely to the false.

Decision trees, like clusters, separate the data into subsets and then analyze the subsets to divide them into further subsets. The final subsets are then small enough that the mining process can find interesting patterns and relationships within the data.

Once the data to be mined is identified, it should be cleansed, cleansing data frees it from duplicate information and erroneous data. Next, the data should be stored in a uniform format within relevant categories of fields. Mining tools can work with all types of data storage, from large data warchouses to smaller desktop databases to flat files. Data warehouses and data marts are storage methods that involve archingving large amounts of data in a way that makes it easy to access when necessary. When the process is complete, the mining software generates a report. An analyst goes over the report to see if futher work needs to be done, such as refilling parameters, using other data analysis tools to examine the data, or even scrapping the data if it’s unusable. If no further work is required, the report proceeds to the decision makers for appropriate action. The power of data mining is being used for many purposes, such as analyzing Supreme Court decisions, discovering patterns in health care, pulling stories about competitors from newswires, resolving bottlenecks in production processes, and analyzing sequences in the human genetic makeup. There really is no limit to the type of business or area of study data mining can be beneficial.

<i><b>Answer the questions:</b></i>

<b>1. What tool is often used in data mining?</b>

</div><span class="text_page_counter">Trang 5</span><div class="page_container" data-page="5">

popular AI methods such as: neural network, clustering, and decision trees...

<b>2. What AI method is used for the following processes?</b>

<b>a. Separate data into subsets and then analyze the subsets to devide them into further</b>

subsets for a member of levels.

<b>b. Continually analyze and compare data until patterns emerge.</b>

<b>c. Divide data into groups based on similar features or limited data ranges</b>

Decision trees – Neural networks – Clustering... ...

<b>3. What term is used for the patterns found by neural networks?</b>

<b>4. When are clusters used in data mining?</b>

clusters are used when data isn’t labelled in a way that is favorable to mining...

<b>5. What types of datastorage can be used in data mining?</b>

all types of data storage, from large data warchouses to smaller desktop databases to flat files...

<b>6. What can an analyst do to improve the data mining results?</b>

refilling parameters, using other data analysis tools to examine the data, or even scrapping the data if it’s unusable...

<b>7. Name some of the ways in which data mining is currently used</b>

analyzing Supreme Court decisions, discovering patterns in health care, pulling stories about competitors from newswires, resolving bottlenecks in production processes, and analyzing sequences in the human genetic makeup...

<b>8. How many AI methods are used in data mining? What are they?</b>

3 : neural network, clustering, and decision trees...

<b>Reading 2:</b>

Large computer systems, or mainframes, as they are referred to in the field of computer science, are those computer systems found in computer installations processing immense amounts of data. These powerful computers make use of very high – speed main memories into which data and programes to be dealt with are transferred for rapid access. These powerful machines have a larger repertoire of more complex instructions which can be executed more quickly. Whereas smaller computer may take serveral steps to perform a particular operation, a larger machine may accomplish the same thing with one instruction.

These computers can be of two types: digital or analog, The digital computer or general – purpose computer as it is often known, makes up about 90 percent of the large computers now in use. It gets its name because the data that are presented to it are made up of code consisting of digits single character numbers. The digital computer is like a gigantie eash register in that it can do calculations in steps, one after another at tremendous speed and with great accuracy. Digital computer programming is by far the most commonly used in

</div><span class="text_page_counter">Trang 6</span><div class="page_container" data-page="6">

electronic data processing for business or statistical purposes. The analog computer works something like a car speedometer, in that it continuously works out calculations. It í used essentially for problems involving measurements. It can simulate, or imitate different measurements by electronic means. Both of these computer types the digital and the analog – are made up of electronic components that may require a large room to accommodate them. At present, the digital computer is capable of doing anything the analog once did. Moreover, it is easier to program and cheaper to operate. A new type of scientific computer systems called the hybrid computer has now been produced that combines the two types into one. Really powerful computers continue to be bulky and require special provision of their housing, refrigeration systems, air filtration and power suppliers. This is because much more space is taken up by the input output devices the magnetic tape and disk unit and other peripheral equipment than by the electronic components that do not make up the bulk of the machine in powerful installation. The power consumption of these machines is also quite high, not to mention the price that runs into hundreds of thousand of dollars. The future will bring great developments in the mechanical devices associated with computer systems. For a long time these have been the weak link, from the point of view of both effciency and reliability.

<b>Decide if the following sentences are True, False or No Information 9. A mainframe is the type of computer that can sit on top of a desk.</b>

<b>11. The analog computer is far smaller than a digital computer and therefore occupies</b>

very little space.

</div><span class="text_page_counter">Trang 7</span><div class="page_container" data-page="7">

<b>IV. Translation: Translate into Vietnamese.</b>

People prefer open source software to proprietary software for a number of reasons, including:

Control: Many people prefer open source software because they have more control over that kind of software. They can examine the code to make sure it’s not doing anything they don’t want to do, and they can change parts of it they don’t like. Users who aren’t programmers also benefit from open source software, because they can use this software for any purpose wish – not merely the way somone else thinks they should.

Training: Other people like open source software because it helps them become better programmers. Because open source code is publicly accessible, students can easily study it as they learn to make better sofrware. Students can also share their work with others, inviting comment and critique, as they develop their skills. When people discover mistakes in programe source code, they can share those mistakes with others to help them avoid making those same mistakes themselves.

Security: Some people prefer open source software because they consider it more secure and stable than proprietary software. Because anyone can view and modify open source software, someone might spot and correct errors or omissions that a program’s original authors might have missed. And because so many programmers can work on a piece of open source software without asking for permission from original authors, they can fix, update, and upgrade open source software more quickly than they can proprietary software.

Stability: Many users prefer open source software to proproetary software for important, long – term projects. Because programmers publicly distribute the source code for open source software, users relying on that software for critical taks can be sure their tools won’t disappear or fall into disrepair if their original creators stop working on them. Additionally, open source software tends to both incorporate and operate according to open standards.

... ...

</div><span class="text_page_counter">Trang 8</span><div class="page_container" data-page="8">

Mọi người thích phần mềm nguồn mở hơn phần mềm độc quyền vì một số lý do, bao gồm:

Kiểm sốt: Nhiều người thích phần mềm nguồn mở hơn vì họ có nhiều quyền kiểm sốt hơn đối với loại phần mềm đó. Họ có thể kiểm tra mã để đảm bảo mã khơng làm bất cứ điều gì họ khơng muốn làm và họ có thể thay đổi các phần mà họ khơng thích. Người dùng khơng phải là lập trình viên cũng được hưởng lợi từ phần mềm nguồn mở, bởi vì họ có thể sử dụng phần mềm này cho bất kỳ mục đích nào mong muốn – khơng chỉ theo cách mà người khác nghĩ rằng họ nên làm.

Đào tạo: Những người khác thích phần mềm nguồn mở vì nó giúp họ trở thành những lập trình viên giỏi hơn. Vì mã nguồn mở có thể truy cập cơng khai nên sinh viên có thể dễ dàng nghiên cứu nó khi họ học cách tạo ra phần mềm tốt hơn. Học sinh cũng có thể chia sẻ cơng việc của mình với những người khác, mời bình luận và phê bình, khi họ phát triển kỹ năng của mình. Khi mọi người phát hiện ra những sai lầm trong mã nguồn chương trình, họ có thể chia sẻ những sai lầm đó với những người khác để giúp họ tránh mắc phải những sai lầm tương tự.

Bảo mật: Một số người thích phần mềm mã nguồn mở hơn vì họ cho rằng nó an tồn và ổn định hơn phần mềm độc quyền. Bởi vì bất kỳ ai cũng có thể xem và sửa đổi phần mềm mã nguồn mở, nên ai đó có thể phát hiện và sửa các lỗi hoặc thiếu sót mà các tác giả ban đầu của chương trình có thể đã bỏ sót. Và bởi vì rất nhiều lập trình viên có thể làm việc trên một phần mềm nguồn mở mà không cần xin phép tác giả gốc, nên họ có thể sửa chữa, cập nhật và nâng cấp phần mềm nguồn mở nhanh hơn so với phần mềm sở hữu độc quyền.

Tính ổn định: Nhiều người dùng thích phần mềm mã nguồn mở hơn phần mềm độc quyền cho các dự án dài hạn, quan trọng. Bởi vì các lập trình viên phân phối công khai mã nguồn cho phần mềm nguồn mở, người dùng dựa vào phần mềm đó để thực hiện các nhiệm vụ quan trọng có thể chắc chắn rằng công cụ của họ sẽ không biến mất hoặc rơi vào tình trạng hư hỏng nếu người tạo ban đầu của họ ngừng làm việc với chúng. Ngoài ra, phần mềm nguồn mở có xu hướng kết hợp và vận hành theo các tiêu chuẩn mở... ...

</div>

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×