Traditional Culture Encyclopedia - Photography and portraiture - Summary of computer examination knowledge points

Summary of computer examination knowledge points

1. Computer test skills

Computer test knowledge points 1. What does the computer major test for?

Knowledge points mastered: electronic science and technology, information and communication engineering, computer science and technology, circuit theory series courses, computer technology series courses, information theory and coding, signal and system, digital signal processing, electromagnetic field theory, automatic control principle, sensing technology, etc.

Knowledge and ability to be prepared:

1. Systematically master a wide range of technical basic theoretical knowledge in this professional field and adapt to a wide range of work in the field of electronic information engineering;

2. Master the basic theory and experimental technology of electronic circuits, and have the basic ability to analyze and design electronic equipment;

3. Master the basic theory and general application methods of information acquisition and processing, and have the basic ability to design, integrate, apply and simulate information systems by computer;

4. Understand the basic principles, policies and regulations of the information industry and the basic knowledge of enterprise management;

5. Understand the theoretical frontiers of electronic equipment and information systems, and have the initial ability to research and develop new systems and technologies;

6. Master the basic methods of literature retrieval and information query, and have certain scientific research and practical work ability.

2. What are the common knowledge points of computer level 1 exam "MSOffice"?

1。

The concept of computer virus Computer virus (puter Viruses CV): It is a computer program compiled artificially, which has destructive effect. 2。

The characteristics of computer viruses are destructive, contagious, concealed, latent and exciting. Classification of computer viruses ① According to the media in which viruses exist, viruses can be divided into network viruses, file viruses and boot viruses ② According to their destructive ability, they can be divided into harmless categories: when infected, there is no other impact on the system except reducing the available disk space.

Non-dangerous: This kind of virus only reduces memory, displays images, and makes sounds and similar sounds. Dangerous: This virus will cause serious errors in the operation of the computer system.

Very dangerous: this virus will delete programs, destroy data, and clear the system memory area and important information in the operating system. ③ Classify companion viruses according to virus-specific algorithms: such viruses do not change the file itself, but generate companion () of EXE files with the same name and different extensions, such as XCOPY.

EXE's companion is XCOPY. .

Worm virus: spread through computer network, without changing files and data information, use the network to spread from the memory of one machine to the memory of other machines, calculate the network address, and send its own virus through the network. Sometimes they exist in the system and generally do not occupy other resources except memory.

Parasitic virus: Except companion virus and worm virus, other viruses can be called parasitic viruses. They are attached to the boot sector or file of the system and spread through the functions of the system. According to the algorithm, it is divided into: practical virus: the virus itself contains errors and cannot spread well. For example, some viruses are not ready to attack at the debugging stage. Mysterious virus: Generally, DOS interrupt and sector data are not modified directly, but DOS is modified internally through device technology and file buffer, so it is difficult to see resources and use advanced technology.

Use the free data area of DOS to work. Variant virus (also known as ghost virus): This kind of virus adopts complex algorithms, so that each copy it spreads has different content and length.

4。 Prevention and cure of computer virus ① Prevention of virus There are two main ways to spread computer virus: floppy disk and network.

To prevent the invasion of virus, we should give priority to prevention and block the transmission route of virus. ② There are two ways to detect and remove viruses, one is manual detection and removal, and the other is software detection and removal.

3. What are the basic knowledge of learning computer?

-Basic computer knowledge is defined as having basic computer knowledge and preliminary application ability, mastering basic skills of Office automation (Office or WPS) software such as word processing, spreadsheet (excel) and presentation (powerpoint) and Internet application, and having the ability to engage in secretarial and office information computerization in institutions, enterprises and institutions.

-Holding the certificate of National Computer Rank Examination 1 level, which can prove that the holder has the above abilities. Of course, those without certificates may not have the above abilities. -Proficient in computer application, able to deal with various computer problems, and an important manifestation of basic computer knowledge. If there is any problem with the application, you can refer to this computer problem network/-according to the scenario you provided, the boss's request should be: 1. Proficient in basic computer operation (refer to the website I gave you). 2. Be familiar with office software such as Word, Excel and PowerPoint (practice on your own computer). That's it. It shouldn't be too difficult. I wish you success!

4. Overview of basic computer knowledge

You can search casually: Section 1 Computer Overview 1. Overview of Computer Development The first generation of electron tube computers (1946- 1957), the second generation of transistor computers (1957- 1964) and the third generation of small and medium-sized integrated circuit computers (1964-65434) are very large. Computer applications 1. Scientific computing II. Data processing. Real time control. Computer aided work CAD CAM CAI CAE 5. Artificial intelligence iii. Computer information processing (1) can complete various data processing tasks with high speed and high quality.

(2) The data storage capacity is huge and the data access speed is extremely fast. (3) It can provide convenient application modes and various information output forms.

(4) Convenient and fast computer communication makes information sharing easy to realize. (5) Efficient means of computer-aided development.

Simulation exercise example 1. The main feature of the fourth-generation multiple-choice computer is (). A. Electron tube B. Transistor C. Small and medium-sized integrated circuits D. Large-scale and very large-scale integrated circuits "correct answer" D Example 2. The abbreviation of multiple-choice computer-aided design is ().

A.CAD B.CAI C.CAM D.CAT [correct answer] A Representation of data in computer in the second quarter 1. The International Organization for Standardization of Data and Information (ISO) defines data as: "Data is a special expression of facts, concepts or instructions. This special expression can be communicated, translated or processed by manual methods or automated equipment. " Information is useful data, which may affect people's behavior decisions.

Two. Related concepts of binary (1) binary 1. Binary, digital electronic computer adopts binary counting method. In the binary counting method, there are only two numbers, 0 and 1, and the radix is two, that is, every two high places enter one. 2. Conversion between binary numbers and decimal numbers. Octal and hexadecimal numbers are related to the conversion between binary numbers, decimal numbers, octal numbers and hexadecimal numbers, which can be done by using the calculator in the Annex.

(2) Binary unit (supplementary content) bit: the smallest unit used to represent binary bits and store information. Byte: the basic unit for storing information.

1 byte =8 bits 1 byte = 8-bit conversion unit:1kb =10b1MB =1024kb = 220b1GB = 65433. Commonly used: 8-bit, 16-bit, 32-bit and 64-bit. 3. The representation of numerical data in computer is in binary form, and its representation methods include fixed-point representation and floating-point representation.

4. The representation of western characters in the computer. Western languages include English letters, numerical symbols, punctuation marks, operation symbols and control symbols. ASCII code-american standard code for information interchange code (binary code) The basic ASCII code is represented by a 7-bit binary number, occupying one byte, and the highest bit is 0. For example, the 7-digit ASCII code of the English letter' b' is 100 00 10.

The storage time is 0 100 00 10. Comparison size: numbers

Keyboard input methods: number coding (positioning code), pinyin coding (full spelling and double spelling), font coding (five strokes font) and phonetic symbol coding (natural code). 2. International exchange code and internal code Chinese character country code: the standard code for exchanging Chinese character information between computers and other systems or equipment, also known as international code. 198 1 year, China promulgated the national standard "Basic Set of Character Coded Character Sets for Information Interchange". The Chinese character set * * contains 7445 Chinese characters and graphic symbols, including 3755 first-class Chinese characters, 3008 second-class Chinese characters and 682 graphic symbols.

First-class Chinese characters are frequently used Chinese characters, which are arranged in the order of pinyin and Mu An. Chinese characters that are not commonly used are secondary Chinese characters arranged by radicals. In Chinese character interchange code, each Chinese character is represented by two bytes.

Chinese character internal code (internal code): it is the code used by computer system to store and process Chinese and western information. Chinese character internal code: represented by two bytes.

The relationship between internal code and national standard code: the difference between them is that the highest bit of two bytes of international code is "0", while the highest bit of two bytes of internal code is "1". 3. Chinese character font code Chinese character output code is also called Chinese character font code or Chinese character font.

The sum of Chinese character output codes is the output of Chinese characters, and a string of binary numbers formed by digitizing Chinese character glyphs through lattice is called Chinese character output codes. Dot matrix glyphs use a set of binary numbers arranged in a square matrix to represent a character (e.g. 16* 16, 24*24, 48 * 48 ...).

16* 16 dot matrix fonts are often used for screen display, and the strokes are stiff and the details are difficult to distinguish: the printed output is usually 24*24, 40*40, 48*48, or even 96*96 or above. The larger the number of dots, the more complete the strokes and the clearer and more beautiful the handwriting. Byte calculation of dot matrix font: number of dots /8 4. Introduction of common Chinese character input methods simulation exercise example 3. Judge whether the ASCII code of question' 9' is less than that of' a'.

() "Correct Answer" Comparative Example 4. The basic unit for storing information in multiple-choice questions is (). A.bit B.byte C.KB D.MB [correct answer] b Example 5. The true and false Chinese character input code is a code compiled to solve the problem of computer Chinese character input.

() "Correct Answer" Comparative Example 6. It takes () bytes of storage space to select more than one Chinese character in a 24*24 dot matrix font. A. 16b.72c.48d.64 "Correct answer" B Example 7. Different Chinese character input methods for multiple-choice questions After inputting Chinese characters, the internal code of the Chinese character is ().

A. Same B. Completely different C. Most of them are the same D. Some of them are the same [correct answer] A. Computer hardware I. Computer system A complete computer system is a man-machine system composed of hardware, software and users. Second, the logical structure of the computer The basic idea of computer architecture: von Neumann principle 1. Input device 2. Output device 3. Memory (1) main memory, also called memory, is characterized by fast access speed and high reliability, but its capacity is limited.

(2) auxiliary storage.

5. What are the basic computer knowledge?

Computer foundation can be divided into hardware and software.

Hardware: motherboard, CPU, hard disk, memory, graphics card, chassis power supply, mouse and keyboard, CD-ROM drive, audio, etc.

Software: the application of common basic tools such as WINDOWS system and OFFICE and the installation of the system.

Step 1: Understand the difference between the host and the monitor, and don't laugh! ! I really don't know. Some guests in my business room just turn on the monitor. If it doesn't light up, they say the computer is broken.

Second: distinguish the left and right mouse buttons. Don't laugh. When you really know when to turn left and when to turn right, you can say that I know computers.

Number 3: Do you know what the keys on the keyboard are called? Not laughing? Maybe you only have one or two keys that you don't know their names. I don't know what this is for. When you know it, you will get close to the master.

Fourth: understand that the interfaces on the computer can be plugged in correctly, except the keyboard, mouse and audio interface.

Fifth: Understand that the best way to practice typing is to chat online. Never use audio to chat, it won't improve.

No.6: Understand a truth: If you want to learn well, break first and then be quick.

Seventh: Understand that the help of WINDOWS (F 1) is the biggest garbage, and nothing can be solved! Well, you're an expert.

Eighth: This is absolutely original. I remember my 12 computer career while typing. Copyright belongs to Baidu. Please indicate the source and do not use it for commercial profit. Please forget it immediately after reading it. If you like it, please buy the original.

The National Computer Rank Examination Computer Level 1 exam includes multiple-choice questions, basic Windows operation questions, Chinese character input questions, Word operation questions, Excel operation questions, PowerPoint operation questions and Internet operation questions.

Basic requirements for the content outline of computer level 1 examination

1. Have basic knowledge of using microcomputer (including common knowledge of computer virus prevention).

Understand the composition of microcomputer system and the functions of each component.

3. Understand the basic functions and functions of the operating system. Master the basic operation and application of Windows.

4. Understand the basic knowledge of word processing, master the basic operation and application of word processing software "MS Word", and master it skillfully.

A Chinese character (keyboard) input method.

5. Understand the basic knowledge of spreadsheet software and master the basic operation and application of spreadsheet software "Excel".

6. Understand the basic knowledge of multimedia presentation software and master the basic operation and application of presentation software "PowerPoint".

Understand the basic concepts of computer network and the preliminary knowledge of Inter.

8. Master the basic operation and use of IE browser software and OutlookExpress software.

6. Computer related knowledge

Give you some computer information: We often use the shift key, but there are some functions you may not know. Let's talk about the wonderful use of the shift key from ten aspects: First, when you chat with others on QQ, do you sometimes send messages slowly? It doesn't matter, as long as you press the Shift key when sending a message, the message will be sent out soon! When you face a lot of windows, but you want to close them one by one.

Is it annoying? As long as you hold down the shift key and click the Close button, all windows will be closed.

Third, when you enter uppercase and lowercase letters, press shift to change their case! It is sometimes useful to restart the computer when installing new software. Just press the shift key first, you can skip the self-check of the computer, saving a lot of time! 5. When selecting a file, press the shift key first. When you select the last file, you can select a larger number. 6. When deleting a file, press shift to delete it directly.

Without going through the recycle bin. When playing a CD seven times, press the shift key several times to skip automatic playback! Press shift +F 10 to replace the right mouse button.

When opening a file, if you don't want to open it by default, press the shift key, and then right-click the file. On the menu on the right, there will be more ways to open it. Do it yourself! Press the shift key ten times, and then click the hyperlink to open a new window. For ordinary users, the ESC key at the top left of the keyboard is not commonly used, but do you know? In fact, with the help of ESC key, many shortcut operations can be realized! 1. When surfing the Internet, if you click on the wrong website, you can directly press ESC to stop opening the current webpage. 2. It is inevitable to fill in some user names when surfing the Internet. If it is not correct, press ESC to clear everything in the box. When typing, if you make a mistake, you can also press ESC to clear the typo selection box.

3. In addition to "Ctrl+Alt+Del", you can call up the windows Task Manager, and you can also start the Task Manager by pressing "Ctrl+Shift+Esc". 4. When a program is inactive and we want to restore it to the active state, press the "Alt+Esc" key to activate the application without clicking the program title bar with the mouse.

5. For the pop-up window with "Cancel" option, if you want to cancel, you can directly press the ESC key to realize the "Cancel" operation. PC: personal computer CPU: central processing unit CPU Fan: "Fan" MB of CPU: motherboard RAM: random access memory, with PC- code as the specification. Such as PC- 133, PC- 1066, PC-2700 HDD: hard disk drive FDD: Floopy disk drive CD-ROM: CD-ROM: DVD drive digital versatile disk read-only memory CD-RW: Recordpact disk rewriter VGA: display card (the official language of display card should be displaycard) AUD: sound card (the official language of sound card should be sound card). LAN: network card (the official language of network card should be work card) MODM network camera capture: audio-visual acquisition card chassis: chassis power supply: power display: screen, CRT as CRT screen, LCD as LCD screen USB: universal serial bus, used to connect peripheral devices. IEEE 1394: new high-speed serial bus specification ins * * * te of electrical and electronic engineers mouse: mouse, commonly used interface specifications are PS/2 and USB KB: keyboard, commonly used interface specifications are PS/2 and USB speaker: speaker: printer: scanner: UPS: uninterruptible power supply system IDE: refers to IDE interface specifications to integrate equipment electronics. IDE interface devices generally refer to various devices with IDE interfaces. SCSI: refers to the SCSI interface specification for small computer system interfaces, and SCSI interface devices generally refer to various devices with SCSI interfaces. GHz: (CPU operation speed reaches) Gega/ sec. FSB: refers to the "front-side bus" frequency. Ata takes MHz as the unit: refers to the hard disk transmission rate when connecting, ATA- 133 means the transmission rate is 133 MB/ s AGP: displays the bus accelerated graphics port, and 2X, 4X and 8X represent the transmission bandwidth mode. PCI: peripheral component interconnection. ATX: refers to the specifications of the current power supply. Also refers to the motherboard standard size BIOS: hardware (input/output) basic setup program basic input/output system CMOS: memory chip for storing BIOS basic setup data supplementary metal oxide semiconductor Post: power-on self-check OS: operating system W. Windows: Windows operating system, Graphical interface DOS: Text instruction interface of early operating system fdisk: "Plan hard disk sector"-One of DOS instruction formats: "Format hard disk sector"-One of DOS instruction setup.exe: "Execute installation program" -DOS instruction socket: Slot, such as CPU socket pin: pin such as Socket478, For example, ATA 133 hard disk cable is 80Pin, for example, PC2700 memory stick is 168Pin jumper: jumper (short circuit terminal) bit: bit (0 and 1), and the most basic unit of computer data bytes: byte, which is equal to. There are 256 circuit states), and a computer character is represented by 8 bits. KB: equal to 1024 bytes MB: equal to 1024 KB GB: equal to 1024 MB.

7. What are the common knowledge points of computer level 1 exam "MSOffice"?

Character Coding At present, the commonly used character coding in the world is ASCII code, that is, american standard code for information interchange code.

ASCII code uses 7 binary digits to represent one character, which can represent 27 characters, totaling 128 characters. Includes 32 general control symbols, 10 decimal digits, 52 uppercase and lowercase English letters and 34 special symbols.

In a byte (8 bits), the last 7 bits are used to indicate the encoding of the character, and the highest bit is the check bit, which is generally treated as 0. Chinese character encoding ASCII codes only encode English letters, numbers and punctuation marks.

Similarly, if you want to deal with Chinese characters, you should also unify the coding and give each Chinese character a unique coding. 1980, China issued the national Chinese character coding standard GB23 12- 1990.

The number of Chinese characters is too large to be distinguished by one byte, so Chinese characters are encoded by two bytes. A Chinese character takes up two bytes, and a character takes up one byte of an N*N lattice. The space used in Chinese characters is the relationship between N*N/8 country code, internal code and area code. Country code = area code +2020H internal code = country code +8080H internal code = area code +a0a0H computer software and hardware system composition and main technical indicators. The computer hardware system consists of arithmetic unit, controller and memory.

Controller: Central processing unit -CPU= arithmetic unit+controller is the core part of the computer. According to the way of storing information, memory can be divided into read-only memory (ROM) and random access memory (RAM). And cache: random access memory can be read and written, and information is lost after power failure. DRAM: Dynamic RAM, equivalent to cache. The speed of CPU and memory is different. SRAM: Static RAMROM: Read-only memory can be read and written, and information will not be lost after power failure. Input devices: keyboard, mouse, scanner, light pen output devices: monitor, speaker, printer, plotter bus: data bus. Program: It is a series of ordered instructions.

The reason why a computer can automatically and continuously complete predetermined operations is the result of running a specific program. Computer programs are usually compiled in computer languages, and the work of compiling programs is called programming.

Data: refers to all kinds of information, numerical and non-numerical. Document: The text describing the program in natural language (Chinese or English) is called a document.

8. What is the knowledge in the Computer Rank Examination?

It depends on which level you took the exam. The first level is divided into three subjects: first-level MS office, first-level B and first-level WPS office. This paper mainly examines the application of office automation software, some basic knowledge of computers and some simple computer operation problems.

The second level is divided into seven subjects: C, C++, Vb, VB, ACCESS, JAVA and Delphi, among which VF and ACCESS belong to database design and others belong to programming. The third level is divided into three-level network, three-level information management, three-level database and three-level PC technology; The fourth level is divided into four levels: network engineer, database engineer and software testing engineer. The key to the specific investigation of knowledge depends on which level and subject you take, so as to introduce it in detail. If you plan to take the exam, you can look at the recommended materials.