Essential Computer Knowledge for Higher Education Entrance Exam

Essential Computer Knowledge for Higher Education Entrance Exam
Essential Computer Knowledge for Higher Education Entrance Exam
Scan to join
Let’s study together!

Computer fundamentals are essential subjects for the higher education entrance exam in some provinces. The exam questions on computer fundamentals are mostly multiple-choice and true/false questions.Although the exam is not very difficult, it requires memorization, as the knowledge points are scattered. Today, I will summarize some computer knowledge points to speed up your review efficiency ↓

Essential Computer Knowledge for Higher Education Entrance Exam
Computer Fundamentals
Essential Computer Knowledge for Higher Education Entrance Exam
1. The symbolization of information is data; thus, data is the concrete representation of information, while information is the logical meaning abstracted from data.
  
2. Information technology refers to the technologies related to acquiring, storing, transmitting, processing, developing, and utilizing information resources.
  
3. The core of culture lies in ideas and values.
  
4. Computer culture is one of the four milestones in human cultural development (the first three being the emergence of language, the use of writing, and the invention of printing).
  
5. The characteristics of computers include: 1) fast computing speed 2) large storage capacity 3) strong versatility 4) automation 5) high precision
  
6. Word length refers to the actual number of bits that a computer can process at one time, and it is an important indicator of computing performance.
  
7. Word length refers to the number of bits of binary data that the computer’s arithmetic unit can process simultaneously, which is closely related to the computer’s functions and applications.
  
8. Character encoding primarily uses ASCII code, which stands for American Standard Code for Information Interchange.
  
9. When representing Chinese characters internally in a computer, the highest bit of the exchange code (national standard code) is set to 1, referred to as “internal code”.
  
10. There are two main methods for recording Chinese character shapes: dot matrix method and vector method, corresponding to two types of character encoding: dot matrix code and vector code.
  
11. A 16×16 dot matrix Chinese character occupies 32 bytes, while a 32×32 dot matrix character occupies 128 bytes, and dot matrix codes are difficult to scale and prone to distortion.
  
12. Chinese character input methods can be classified into four types: flowing code, phonetic code, shape code, and combined phonetic and shape code. Pinyin input methods, such as Smart ABC and Microsoft Pinyin, are phonetic codes, while Wubi input is a shape code. Phonetic codes often have many duplicates and slow input speed, while shape codes have fewer duplicates and faster input speed but are more difficult to learn and master. Currently, Smart ABC, Microsoft Pinyin, Ziguang Pinyin input method, and Sogou input method are the mainstream Chinese input methods.
  
13. A computer system consists of hardware and software systems, with the software system further divided into system software and application software, among which the operating system is the most important system software.
  
14. A computer without any software configuration is called bare metal.
  
15. Common input devices include: mouse, keyboard, scanner, digitizer, digital camera, barcode reader, and A/D converter.
  
16. The controller and arithmetic unit are collectively referred to as the Central Processing Unit (CPU). It is the core component of a computer.
  
17. The most commonly used output devices are monitors, printers, and speakers, as well as plotters and various D/A converters.
  
18. From the perspective of information input and output, disk drives and tape drives can be viewed as both input and output devices.
  
19. An instruction is a command that directs the computer to perform a certain operation, consisting of a string of binary digits that includes both operation codes and address codes.
  
20. A computer has many instructions, each with different functions. The collection of all instructions is called the computer instruction system. Different computer systems have different instruction systems; currently, common instruction systems include Complex Instruction Set Computing (CISC) and Reduced Instruction Set Computing (RISC).
  
21. Software refers to the totality of programs, data, and related documents required for the operation of a computer. Data is the object of program processing, while documents are materials related to the development, maintenance, and use of the program.
  
22. System software is the layer of software closest to the hardware in a computer system, mainly including operating systems, language processing programs, database management systems, and supporting service software.
  
23. An operating system (OS) is a collection of systematic programs that control and manage computer resources. It serves as an interface between users and the computer hardware system, providing users and application software with access to and control of computer hardware.
  
24. Algorithms are characterized by: ①finiteness; ②definiteness; ③effectiveness; ④input/output.
  
25. The operating system is a large management control program that includes five management functions: processor management, storage management, device management, file management, and job management.
  
26. Operating systems can be classified based on their operating environment into real-time operating systems, time-sharing operating systems, and batch processing operating systems.
(2) Based on the number of users managed, they can be divided into single-user operating systems and multi-user operating systems.
(3) Based on the number of jobs managed simultaneously, they can be classified into single-user single-task operating systems, single-user multi-task operating systems, and multi-user multi-task operating systems.
  
27. Common database management systems include FoxPro, FoxBASE+, Access on microcomputers, and large database management systems such as Oracle, DB2, Sybase, SQL Server, etc. They are all relational database management systems.
  
28. Basic programming design: data structures and algorithms are the two main aspects of programming; it can generally be regarded that: program = algorithm + data structure.
  
29. Programming languages:
(1) Machine language: the only language that a computer system can recognize without translation.
(2) Assembly language: symbolization of machine language (3) High-level language: greatly improves programming efficiency.
  
30. Machine language and assembly language are generally referred to as low-level languages.
  
31. High-level languages can be divided into two types: interpreted and compiled.
  
32. Interpreters: An interpreter processes source programs written in a certain programming language (like Basic) by interpreting each statement one by one and executing it, resulting in the final output. An interpreter translates and executes the source program simultaneously without generating a target program.
  
33. Compilers: A compiler translates source programs written in high-level languages into target programs represented in machine language, a process called compilation.
  
34. Microprocessors (CPUs) are ultra-large-scale integrated circuit chips that integrate arithmetic units, controllers, and high-speed internal caches, and are the most important core components of a computer.
  
35. Microcontrollers: A microcontroller integrates a microprocessor (CPU), a certain capacity of memory, and I/O interface circuits into one chip.
  
36. Single-board computers: A single-board computer is formed by installing a microprocessor, memory, and I/O interface circuits on a printed circuit board.
  
37. PC (Personal Computer): A microcomputer used by a single user is generally referred to as a PC, which is the most widely used type of microcomputer today.
  
38. Portable microcomputers: Portable microcomputers generally include laptops and personal digital assistants (PDAs).
  
39. The memory in a microcomputer generally refers to Random Access Memory (RAM). The unit of main frequency is Hertz (Hz).
  
40. Commonly used memory types include SDRAM and DDR SDRAM, as well as DDR II SDRAM.
  
41. Floppy disks have a diameter of 3.5 inches and a capacity of 1.44 MB.
  
42. Floppy disks have a write-protect notch; when the write-protect notch is in the protected state (i.e., opened), information can only be read from the disk and cannot be written to prevent data erasure or rewriting, and to prevent virus intrusion.
  
43. The bus in a microcomputer is generally divided into data buses, address buses, and control buses, used to transmit data, data addresses, and control signals respectively.
  
44. The motherboard is the largest circuit board in a microcomputer system, sometimes referred to as the main board or system board, and is a large printed circuit board with various ports.
  
45. Computers with multimedia processing capabilities are called multimedia computers. Multimedia is characterized by diversity, real-time, interactivity, and integration.
  
46. The development of computers:
(1) First generation (1946—1957) vacuum tube computers, machine language, assembly language, scientific computing.
(2) Second generation (1958—1964) transistor computers, transistors, high-level programming languages, data processing.
(3) Third generation (1965—1970) integrated circuit computers, small and medium-scale integrated circuits, widely used in various fields.
(4) Fourth generation (1971—present) integrated circuit computers, integrated circuits, object-oriented high-level languages, network era.
(5) Fifth generation: future computers using photonic, quantum, DNA, etc.
  
47. The operating system has four main characteristics: (1) concurrency (2) sharing (3) virtualization (4) asynchrony.
  
48. Concurrency refers to the simultaneous execution of two or more running programs within the same time interval.
  
49. The operating system is a concurrent system; systems that adopt concurrent technology are also called multitasking systems.
  
50. File management mainly completes the following tasks: providing logical organization methods for files, providing physical organization methods for files, providing access methods for files, providing usage methods for files, implementing directory management for files, implementing access control for files, and managing file storage space.
51. Operating systems can generally be divided into three basic types: 1) batch processing systems; 2) time-sharing systems; 3) real-time systems.
52. With the development of computer science, many types of operating systems have emerged, mainly including embedded operating systems, personal operating systems, network operating systems, and distributed operating systems.
  
53. Batch processing operating systems work by having users submit jobs to system operators, who then group multiple user jobs into a batch and input them into the computer, creating an automatic continuous job flow, after which the operating system executes each job sequentially, and finally the operator delivers the job results to the users.
  
54. Time-sharing operating systems work by connecting a host to several terminals, with each terminal having a user. Users interactively issue command requests to the system, which accepts each user’s command and processes service requests in a time-slice round-robin manner, displaying results to users interactively on the terminal.
  
55. Real-time operating systems allow computers to respond promptly to external events and complete processing of those events within a strict time frame while coordinating the operation of all real-time devices and tasks.
  
56. Embedded operating systems run in embedded system environments, managing and controlling the various components and resources of the embedded system in a unified manner.
  
57. Based on the number of users using the computer at the same time, operating systems can be divided into single-user operating systems and multi-user operating systems.
  
58. Single-user operating systems allow only one user to use the computer at the same time, with that user enjoying all hardware and software resources, whereas multi-user operating systems allow multiple users to use the computer simultaneously.
  
59. If users can run multiple applications simultaneously (with each application referred to as a task), the operating system is called a multitasking operating system. If users can only run one application at a time, the corresponding operating system is called a single-task operating system.
  
60. Early DOS operating systems were single-user single-task operating systems, while Windows 7 is a single-user multitasking operating system.
  
61. Network operating systems are based on computer networks and are software developed according to network architecture, protocols, and standards, including network management, communication, security, resource sharing, and various network applications, with the goal of enabling communication and resource sharing.
  
62. A large number of computers connected through a network can achieve extremely high computing power and wide data sharing; this system is called a distributed system.
  
63. MS-DOS features a character-based user interface that operates and manages through command-line, which is very inconvenient and requires users to memorize a large number of DOS commands.
  
64. Unix operating systems are universal, interactive time-sharing operating systems.
  
65. The Mac OS operating system, launched by Apple Inc., runs on Macintosh computers. Mac OS is the pioneer of fully graphical interfaces and operation methods.
  
66. Windows XP is currently most popular in both Home and Professional editions.
  
67. Shortcuts are files with the extension .lnk, usually associated with an application or document.
  
68. Minimum system requirements for Windows:
(1) Recommended processor clock frequency of 300 MHz or higher, at least 233 MHz (for single or dual processor systems), recommended Intel Pentium/Celeron series, AMD K6/Athlon/Duron series, or compatible processors;
(2) Recommended 128 MB RAM or higher (minimum support 64 MB, which may affect performance and some features);
(3) 1.5 GB of available hard disk space;
(4) Super VGA (800×600) or higher resolution video adapter and monitor;
(5) CD-ROM or DVD drive;
(6) Keyboard and Microsoft Mouse or compatible pointing device.
  
69. Windows windows are highly unified in appearance, style, and operation methods.
(1) Border (2) Title bar (3) Menu bar (4) Toolbar (5) Status bar (6) Document view (7) Scroll bar
  
70. Modal dialog boxes: When this type of dialog box is open, the main program window is disabled, and only by closing this dialog box can the main window be processed.
  
71. Non-modal dialog boxes: Non-modal dialog boxes allow the main window to be processed even when the dialog box is displayed.
  
72. A file refers to a collection of related information stored on external storage.
  
73. A file may contain a program, an article, a piece of music, a picture, etc.
  
74. Certain symbols such as /, \, *, ?, <, >, | are not allowed in file names.
  
75. The main file name should be related to the file’s content, and the file type should be distinguished by the extension, hence the extension is also called the type name.
  
76. At any given moment, only one node can be in an open state; when a node is in an open state, its name will turn blue, and some node icons will change accordingly.
  
77. The excellent features of Windows are attributed to its adoption of the advanced Unicode character set. The Unicode character set is a 16-bit character encoding standard developed by the Unicode Consortium.
  
78. The right side of the console lists user accounts on the computer; the Administrator and Guest accounts are automatically created during the installation of the Windows system, allowing for management during the first login.
  
79. To prevent unauthorized users from attempting to log in as Administrator, the Administrator account can be renamed but cannot be deleted.
  
80. The Guest account can be disabled or renamed by the administrator for security reasons, but cannot be deleted.
  
81. The Paint program is a simple drawing tool that allows users to create black-and-white or color graphics, which can be saved as bitmap files (.bmp), printed, set as desktop backgrounds, or pasted into other documents, and can also be used to view and edit scanned photos.
  
82. WordPad and Notepad are two text processing programs included in Windows 7, both providing basic text editing functions.
  
83. WordPad has stronger functionality, allowing users to create and edit formatted files, with an interface and usage similar to Word.
  
84. Notepad is a text file editor that allows users to edit simple documents or create web pages. Its usage is very simple, and the files edited are text files, which greatly facilitates editing source programs of some high-level languages.
  
85. In the 1980s, widely used word processing systems included WPS, table editing software CCED, and document editing systems like Word Star.
  
86. Layout design is an important task that includes page setup, page numbering, column layout, header and footer settings, etc.
  
87. The seven commonly used components of Microsoft Office for daily office tasks include: Word for word processing, Excel for spreadsheet processing, PowerPoint for presentations, Access for database management, InfoPath for dynamic forms, Outlook for email management, and Publisher for desktop publishing.
  
88. The title bar is located at the top of the window, defaulting to blue. It contains the application name, document name, and control buttons.
  
89. To show or hide the toolbar:
Right-click on the toolbar or any tab, and select the desired toolbar from the pop-up shortcut menu.
  
90. The task pane can be called up by going to “Page Layout” -> “Task Pane”.
  
91. Rulers come in horizontal and vertical types to determine the document’s position on the screen and paper. The horizontal ruler’s indent buttons can also be used for paragraph indentation and margin adjustments. Tab stops can also be set using the ruler.
  
92. The status bar is located at the bottom of the window, displaying the current status of the form, such as the current page number, section number, current page and total pages, cursor insertion point position, overwrite/insert status, and current language information.
  
93. Common methods to start Word 2010 include:
(1) Click “Start” -> “Programs” -> “Microsoft Office” -> “Microsoft Office Word 2010”.
(2) Double-click the Word shortcut icon on the desktop.
(3) Double-click an established Word document.
  
94. Common methods to exit Word 2010 include:
(1) Click the “Close” button at the top right of the Word window.
(2) Click the “Exit” command in the “File” menu.
(3) Double-click the control icon at the top left of the Word window or use the shortcut key Alt+F4.
  
95. Click the “Options” command in the “Tools” menu, then in the pop-up dialog box, click on the “Save” tab, check the “Automatic Save Time Interval” checkbox, and set the automatic save time interval to edit your work without worry.
  
96. To open a document:
(1) Click the “Open” command in the “File” tab.
(2) Click the “Open” tool button on the common toolbar.
(3) Use the Ctrl+O shortcut key.
(4) Click one of the last four documents listed below the “File” tab (to set the number of documents listed under the “File” menu, select the “Options” command in the “Tools” menu, and click the “General” tab in the dialog box).
  
97. To create a new blank document:
(1) Directly click the “New” button on the common toolbar.
(2) Use the Ctrl+N shortcut key.
  
98. To close a document:
(1) Click the “Close” command in the “File” menu to close the currently edited document.
(2) Click the “Close” button at the top right of the document window to close the currently edited document.
  
99. Using keyboard commands or shortcut keys: Pressing the Home and End keys can quickly move the insertion point to the beginning or end of the document; pressing Ctrl+Home and Ctrl+End can quickly move the insertion point to the start and end of the document.
  
100. Word provides two types of input states: “Insert” and “Overwrite”. The “Insert” state means that the text typed will be inserted at the current cursor position, shifting the text after the cursor; the “Overwrite” state means that the text typed will overwrite the text after the cursor in order.
Essential Computer Knowledge for Higher Education Entrance Exam

The Zhonggong Higher Education Entrance Exam Crash Course is officially open.

Choose your mode, small class teaching, accommodation included.

14 majors, 35 days and 35 nights of intensive training.

More surprises, unlock courses waiting for you!

Reported on February 28, just waiting for you to inquire!

Essential Computer Knowledge for Higher Education Entrance Exam

Great gifts for the start of school!

2023 exam students.

Pay once and study for a year.

Small class teaching with full support.

Essential Computer Knowledge for Higher Education Entrance Exam

Want to know how your review results are?

Want to check if you have made progress?

Mock exam analysis is coming hot!!

Click “Read the original text” to sign up!

Essential Computer Knowledge for Higher Education Entrance Exam





如果有疑问,问小陈老师专升本的路上
与你同行
关注我
有需要记得留言




戳“阅读原文”,一起备考学习吧!

Leave a Comment

×