2016年计算机一级MSOffice考试试题冲刺及答案(2).pdf
《2016年计算机一级MSOffice考试试题冲刺及答案(2).pdf》由会员分享,可在线阅读,更多相关《2016年计算机一级MSOffice考试试题冲刺及答案(2).pdf(16页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、2016 年电脑一级 MSOffice考试试题冲刺及答案(2)一、选择题1 如果在一个非零无符号二进制整数后添加一个0,则此数的值为原数的()。A.1/4B.1/2C.2倍 D.4 倍参考答案:C 2 以下关于电子邮件的说法,不正确的选项是()。A.电子邮件的英文简称是E mail B.加入因特网的每个用户通过申请都可以得到一个“电子信箱”C.在一台电脑上申请的“电子信箱”,以后只有通过这台电脑上网才能收信D.一个人可以申请多个电子信箱参考答案:C 参考解析:在一台电脑上申请的电子信箱,不必一定要通过这台电脑收信,通过其他的电脑也可以。3 世界上公认的第一台电子电脑诞生的年代是()。A.194
2、3B.1946C.1950D.1951 参考答案:B 参考解析:世界上第一台名为ENIAC 的电子电脑于1946 年诞生于美国宾夕法尼皿大学。4 在以下字符中,其ASCII 码值最大的一个是()。A.9B.ZC.dD.X 参考答案:C 参考解析:ASCI1 码(用十六进制表示)为:9 对应 39,Z 对应 5A,X 对应 58,d 对应 64。5 电脑病毒除通过读/写或复制移动存储器上带病毒的文件传染外,另一条主要的传染途径是()。A.网络 B.电源电缆C.键盘 D.输入有逻辑错误的程序文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2
3、T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P
4、6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1
5、G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10
6、C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N
7、1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9
8、G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A
9、10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8文档编码:CB8A10C2T8B5 HT6S3N1P6M9 ZP8X1V9G1G8参考答案:A 参考解析:电脑病毒主要通过移动存储介质(如 u 盘、移动硬盘)和电脑网络两大途径进行传播。6 以下表达中,正确的选项是()。A.所有电脑病毒只在可执行文件中传染B.电脑病毒主要通过读/写移动存储器或Internet网络进行传播C.只要把带病毒的优盘设置成只读状态,那么此盘上的病毒就不会因读盘而传染给另一台电脑D.电脑病毒是由于光盘外表不清洁而造成的参考答案
10、:B 参考解析:电脑病毒主要通过移动存储介质(如 U 盘、移动硬盘)和电脑网络两大途径进行传播。文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5
11、文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:C
12、S1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2
13、S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 H
14、Q2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5
15、K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 Z
16、R4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z57 以下关于电脑病毒的表达中,错误的选项是()。A.电脑病毒具有潜伏性B
17、.电脑病毒具有传染性C.感染过电脑病毒的电脑具有对该病毒的免疫性D.电脑病毒是一个特殊的寄生程序参考答案:C 参考解析:电脑病毒的特点有寄生性、破坏性、传染性、潜伏性、隐蔽性。8 如果在一个非零无符号二进制整数之后添加2 个 0,则此数的值为原数的()。A.4 倍 B.2 倍 C.1/2D.1/4 参考答案:A 考解析:最后位加0 等于前面所有位都乘以4 再相加,所以是4 倍。文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6
18、K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4
19、T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y
20、10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档
21、编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1
22、U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7
23、A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2
24、M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z59 以下关于软件的表达中,错误的选项是()。A.电脑软件系统由程序和相应的文档资料组成B.Windows操作系统是系统软件C.Word2010是应用软件D.软件具有知识产权,不可以随便复制使用参考答案:A 参考解析:所谓软件是指为方便使用电脑和提高使用效率而组织的程序以及用于开发、使用和维护的有关文档。软件系统可分为系统软件和应用软件两大类。10 电脑操作系统通常具有的五大功能是()。
25、A.CPU 管理、显示器管理、键盘管理、打印机管理和鼠标器管理B.硬盘管理、软盘驱动器管理、CPU 的管理、显示器管理和键盘管理C.处理器(CPU)管理、存储管理、文件管理、设备管理和作业管理文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A10Y10Z5文档编码:CS1U9Q2S7A6 HQ2M6W5K6K8 ZR4T9A1
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2016 计算机 一级 MSOffice 考试 试题 冲刺 答案
限制150内