Skip to content
Unified college entrance examination, practice questions and listen to classes, see KuKe↑
The computer fundamentals are mandatory subjects for the unified college entrance examination in some provinces, most of the exam questions on computer fundamentals are multiple-choice and judgment questions.The exam is not very difficult, but remember to study a lot, the knowledge points are scattered,Today, Xiao Ku summarizes some computer knowledge points for everyone to speed up review efficiency↓
1. The symbolization of information is data, so data is the specific representation of information, and information is the logical meaning abstracted from data.
2. Information technology refers to the related technologies for obtaining, storing, transmitting, processing, developing, and utilizing information resources.
3. The core of culture is: concepts and values.
4. Computer culture is one of the four milestones in the development of human culture (the first three are: the emergence of language, the use of writing, and the invention of printing).
5. Characteristics of computers: 1) Fast calculation speed 2) Large storage capacity 3) Strong versatility 4) Automation of work 5) High precision
6. Word length is the actual bit length that a computer can process at one time, and word length is an important indicator of computing performance.
7. Word length refers to the number of binary data bits that the computer’s arithmetic unit can process simultaneously, which is greatly related to the computer’s functions and uses.
8. Character encoding mainly uses ASCII code, which stands for American Standard Code for Information Interchange.
9. When representing Chinese characters internally, the highest bit of the exchange code (national standard code) is changed to 1, which is called “internal code.”
10. There are usually two methods to record the shape of Chinese characters: dot matrix method and vector method, corresponding to two types of character encoding: dot matrix code and vector code.
11. A 16×16 dot matrix Chinese character occupies 32 bytes, while a 32×32 dot matrix Chinese character occupies 128 bytes, and dot matrix code is difficult to scale and prone to distortion.
12. Chinese character input codes can be divided into four types: flow code, phonetic code, shape code, and combined phonetic and shape code. Full pinyin input method, intelligent ABC, and Microsoft Pinyin are phonetic codes, while Wubi input method is a shape code. Phonetic codes have many duplicates and slow input speed; shape codes have fewer duplicates, faster input speed, but are more difficult to learn and master. Currently, mainstream Chinese input methods include intelligent ABC, Microsoft Pinyin, Unisound Pinyin input method, and Sogou input method, which are primarily phonetic input methods.
13. A computer system consists of two parts: hardware system and software system, and the software system can be divided into system software and application software, among which the operating system is the most important system software.
14. A computer without any software configured is called bare metal.
15. Common input devices include: mouse, keyboard, scanner, digitizer, digital camera, barcode reader, digital camera, A/D converter, etc.
16. The controller and arithmetic unit are collectively referred to as the Central Processing Unit (CPU). It is the core component of the computer.
17. The most commonly used output devices are monitors, printers, and speakers, as well as plotters and various D/A converters.
18. From the perspective of information input and output, disk drives and tape drives can be regarded as both input and output devices.
19. An instruction is a command that instructs the computer to perform a certain operation, consisting of a string of binary digits that includes an operation code and an address code.
20. A computer has many instructions, each serving different purposes. The collection of all instructions is called the computer instruction system. Different computer systems have different instruction systems, and the common instruction systems include Complex Instruction Set Computer (CISC) and Reduced Instruction Set Computer (RISC).
21. Software refers to the totality of programs, data, and related documents required for the computer to operate. Data is the processing object of the program, and documents are materials related to the development, maintenance, and use of the program.
22. System software is the layer closest to the hardware in the computer system, mainly including the operating system, language processing programs, database management systems, supporting service software, etc.
23. An operating system (OS) is a collection of systematic programs that control and manage computer resources, serving as an interface between users and the computer hardware system, providing a bridge for users and application software to access and control computer hardware.
24. An algorithm is primarily characterized by: ① finiteness; ② determinism; ③ feasibility; ④ input/output.
25. The operating system is a large management control program that includes five management functions: processor management, storage management, device management, file management, and job management.
26. Operating systems can be categorized based on their running environment into real-time operating systems, time-sharing operating systems, and batch processing operating systems.
(2) Based on the number of users it manages, operating systems can be divided into single-user operating systems and multi-user operating systems.
(3) Based on the number of jobs managed simultaneously, operating systems can be classified as single-user single-task operating systems, single-user multi-task operating systems, and multi-user multi-task operating systems.
27. Common database management systems include FoxPro, FoxBASE+, Access on microcomputers, and large database management systems such as Oracle, DB2, Sybase, SQL Server, etc., all of which are relational database management systems.
28. Basic program design: data structures and algorithms are the two main aspects of programming; it can generally be considered that: program = algorithm + data structure.
29. Programming languages:
(1) Machine language: the only language that can be recognized by computer systems without translation
(2) Assembly language: the symbolization of machine language (3) High-level language: greatly improves programming efficiency
30. Machine language and assembly language are generally referred to as low-level languages.
31. High-level languages can be divided into two categories: interpreted and compiled.
32. An interpreter: an interpreter accepts source programs written in a certain programming language (such as Basic language), then interprets and executes each statement of the source program one by one, ultimately yielding results. The interpreter translates and executes the source program simultaneously, without producing a target program.
33. A compiler: a compiler is a translation program that translates a source program written in a high-level language into an equivalent target program expressed in machine language, a process known as compilation.
34. A microprocessor (CPU) is a large-scale integrated circuit chip that integrates the arithmetic unit, control unit, and high-speed internal cache, and is the most important core component of the computer.
35. A microcontroller integrates a microprocessor (CPU), a certain capacity of memory, and I/O interface circuits on a single chip.
36. A single board computer integrates a microprocessor, memory, and I/O interface circuits on a printed circuit board.
37. A personal computer (PC) is generally referred to as a microcomputer for single-user use, which is currently the most widely used type of microcomputer.
38. Portable microcomputers generally include notebook computers and personal digital assistants (PDAs).
39. The memory in a microcomputer generally refers to random access memory (RAM). The unit of main frequency is Hertz (Hz).
40. The commonly used memory types include SDRAM and DDR SDRAM, as well as DDR II SDRAM, etc.
41. A floppy disk has a diameter of 3.5 inches and a capacity of 1.44 MB.
42. A floppy disk has a write protection hole, and when the write protection hole is in the protection state (i.e., the write protection hole is open), data can only be read from the disk and not written to it, to prevent erasure or rewriting of data, and also to prevent virus intrusion.
43. The bus in a microcomputer is generally divided into data bus, address bus, and control bus, used for transmitting data, data addresses, and control signals respectively.
44. The motherboard is the largest circuit board in a microcomputer system, sometimes referred to as the main board or system board, and is a large printed circuit board with various ports.
45. Computers with multimedia processing capabilities are called multimedia computers. Multimedia is characterized by diversity, real-time, interactivity, and integration.
46. The development of computers:
(1) First generation (1946-1957) electronic tube computers, machine language, assembly language, scientific computing
(2) Second generation (1958-1964) transistor computers, transistors, high-level programming languages, data processing
(3) Third generation (1965-1970) integrated circuit computers, medium and small-scale integrated circuits, high-level programming languages widely used in various fields
(4) Fourth generation (1971-present) integrated circuit computers, integrated circuits, object-oriented high-level languages, network era
(5) Fifth generation future computers: photonic, quantum, DNA, etc.
47. The operating system mainly has four characteristics: (1) concurrency (2) sharing (3) virtualization (4) asynchrony
48. Concurrency refers to the simultaneous execution of two or more running programs within the same time interval.
49. The operating system is a concurrent system, and systems that use concurrency technology are also called multitasking systems.
50. File management mainly completes the following tasks: providing logical organization methods for files, providing physical organization methods for files, providing access methods for files, providing usage methods for files, implementing directory management for files, implementing access control for files, and implementing storage space for files.
51. Operating systems can generally be divided into three basic types: 1) batch processing systems; 2) time-sharing systems; 3) real-time systems.
52. With the development of computer science, many types of operating systems have emerged, mainly including embedded operating systems, personal operating systems, network operating systems, distributed operating systems, etc.
53. The working method of batch processing (Batch Processing) operating systems is: users submit jobs to the system operator, who compiles many users’ jobs into a batch job, then inputs it into the computer, forming an automatic, continuous job flow in the system, and then starts the operating system, which automatically executes each job in order, and finally the operator delivers the job results to the users.
54. The working method of time-sharing (Time Sharing) operating systems is: a mainframe connects several terminals, each terminal has a user, and users interactively issue command requests to the system. The system accepts each user’s command, processes service requests using time slice rotation, and displays results to users on the terminal through interactive means.
55. A real-time operating system (Real Time Operating System) is one that enables the computer to respond promptly to external event requests and complete the processing of that event within a specified strict time while coordinating the work of all real-time devices and tasks.
56. An embedded operating system (Embedded Operating System) operates in an embedded system environment, coordinating, scheduling, directing, and controlling all resources of the embedded system and its various components.
57. Based on the number of users using the computer at the same time, operating systems can be divided into single-user operating systems and multi-user operating systems.
58. A single-user operating system is one where only one user can use a computer at the same time, allowing that user to enjoy all hardware and software resources of the system alone, while if multiple users are allowed to use the computer simultaneously, it is called a multi-user operating system.
59. If users can run multiple applications at the same time (each application is referred to as a task), such an operating system is called a multitasking operating system; if users can only run one application at a time, the corresponding operating system is called a single-task operating system.
60. Early DOS operating systems were single-user single-task operating systems, while Windows 7 is a single-user multi-task operating system.
61. A network operating system is based on computer networks and is developed on various computer operating systems according to network architecture, protocols, and standards, including network management, communication, security, resource sharing, and various network applications, with the goal of enabling mutual communication and resource sharing.
62. A large number of computers connected through networks can achieve extremely high computing power and extensive data sharing, and such a system is called a distributed system (Distributed System).
63. MS-DOS features a character-based user interface, using a command-line method for operation and management, which is quite inconvenient and requires users to memorize a large number of DOS commands.
64. The Unix operating system is a universal, interactive time-sharing operating system.
65. The Mac OS operating system is produced by Apple Inc. and runs on Macintosh computers. Mac OS is the pioneer of fully graphical interfaces and operation methods.
66. Windows XP is currently most popular in its Home and Professional editions.
67. A shortcut is a file with the extension .lnk, generally associated with an application or document.
68. The minimum system requirements for Windows are:
(1) Recommended computer clock frequency of 300 MHz or higher processor, at least 233 MHz (single or dual-processor systems), recommended using Intel Pentium/Celeron series, AMD K6/Athlon/Duron series or compatible processors;
(2) Recommended 128 MB RAM or higher (minimum support 64M, which may affect performance and certain functions);
(3) 1.5GB available hard disk space;
(4) Super VGA (800×600) or higher resolution video adapter and monitor;
(6) Keyboard and Microsoft mouse or compatible pointing device.
69. Windows windows are highly unified in appearance, style, and operation.
(1) Border (2) Title bar (3) Menu bar (4) Toolbar (5) Status bar (6) Document view (7) Scroll bar
70. Modal dialog: refers to a type of dialog that, when opened, prohibits the main program window until it is closed.
71. Non-modal dialog: a non-modal dialog refers to those dialog boxes that allow the main window to be processed even when the dialog is displayed.
72. A file (File) is a collection of related information stored on external storage.
73. A file can contain a program, an article, a piece of music, a picture, etc.
74. Certain symbols such as /, \, *, ?, <, >, | are not allowed in file names.
75. The main file name should relate to the content of the file, and the extension is used to distinguish the type of file, thus the extension is also called the type name.
76. At any given moment, only one node can be in an open state, and when a node is open, its name will turn blue, and some node icons will change accordingly.
77. The excellent features of Windows should be credited to the adoption of the advanced Unicode character set. The Unicode character set is a 16-bit character encoding standard developed by the Unicode Consortium.
78. The right side of the console lists the user accounts on the computer, and the Administrator and Guest accounts are automatically created when the Windows system is installed, allowing for management upon first logging into the computer.
79. To prevent unauthorized users from attempting to log into the computer as Administrator, the Administrator account can be renamed but cannot be deleted.
80. The Guest account can be disabled or renamed by the administrator for security reasons but cannot be deleted.
81. The paint program is a simple drawing tool that allows users to draw black and white or color graphics, which can be saved as bitmap files (.bmp), printed, used as desktop backgrounds, or pasted into another document, and can also be used to view and edit scanned photos.
82. WordPad and Notepad are two word processing programs that come with Windows 7, both providing basic text editing functions.
83. WordPad has stronger functions, allowing users to create and edit formatted files, with an interface and usage method very similar to Word.
84. Notepad is a text file editor that allows users to edit simple documents or create web pages. Notepad is very easy to use, as the files it edits are text files, which greatly facilitates editing source programs of some high-level languages.
85. In the 1980s, widely used word processing systems included WPS, CCED, Word Star, etc.
86. Layout design is an important task that includes page setup, page numbers, column layout, header and footer settings, etc.
87. Microsoft Office consists of seven commonly used components for daily office work. They are: word processing software Word, spreadsheet processing software Excel, presentation software PowerPoint, database management software Access, dynamic form software InfoPath, email management software Outlook, and desktop publishing software Publisher.
88. The title bar is located at the top of the window, defaulting to blue. It contains the application name, document name, and control buttons.
89. The method to show or hide toolbars is:
Right-click on any position of the toolbar or tab, and select the desired toolbar from the pop-up shortcut menu.
90. The task pane can be called up through “Page Layout” – “Task Pane”.
91. The ruler has horizontal and vertical types, used to determine the position of the document on the screen and paper. The horizontal ruler’s indent button can also be used to adjust paragraph indentation and borders. Tab stops can be set using the tab character on the ruler.
92. The status bar is located at the bottom of the window, displaying the current status of the form, such as the current page number, section number, current page and total pages, cursor insertion point position, overwrite/insert status, current language being used, and other information.
93. Common methods to start Word 2010 include:
(1) Click “Start” → “Programs” → “Microsoft Office” → “Microsoft Office Word 2010”.
(2) Double-click the Word shortcut icon established on the desktop.
(3) Double-click a Word document that has been established.
94. Common methods to exit Word 2010 include:
(1) Click the “Close” button in the upper right corner of the Word window.
(2) Click the “Exit” command in the “File” menu.
(3) Double-click the control icon in the upper left corner of the Word window or use the shortcut key Alt+F4.
95. Click on the “Options” command in the “Tools” menu, in the pop-up dialog box, click on the “Save” tab, check the “Automatically save time interval” checkbox and set the automatic save time interval, so you can edit your work with peace of mind.
(1) Click the “Open” command in the “File” tab
(2) Click the “Open” tool button on the common toolbar
(3) Use the Ctrl+O shortcut key.
(4) Click one of the four documents usually listed under the “File” tab (to set the number of documents listed under the “File” menu, select the “Options” command in the “Tools” menu, and click on the “General” tab in the dialog box).
97. Create a new blank document (1) directly click the “New” button on the common toolbar. (2) Use the shortcut key Ctrl+N.
(1) Click the “Close” command in the “File” menu to close the currently edited document.
(2) Click the “Close” button in the upper right corner of the document window to close the currently edited document.
99. Use keyboard commands or shortcut keys: pressing the Home and End keys can quickly move the insertion point to the beginning and end of the document; pressing the Ctrl+Home and Ctrl+End shortcut keys can quickly move the insertion point to the beginning and end of the document.
100. Word provides two input states: “Insert” and “Overwrite”. The “Insert” state means that the text typed will be inserted at the current cursor position, pushing the text behind the cursor sequentially; the “Overwrite” state means that the text typed will overwrite the text behind the cursor sequentially.
For more materials, courses, and questions regarding college entrance examination, please follow “KuKe Online School”,If you want to know about the courses, you can reply “courses” in the public account message bar to learn about course discount details~

Click to share

Click to like

Click to view