网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The users did all of the following funny things EXCEPT______.
A

failing to switch on the computer.

B

regarding the keyboard as a remote control.

C

spending much time looking for a key.

D

washing the keys individually with soap.


参考答案

参考解析
解析:
细节题。由第一段和第七段的例子可知,有的用户不会开机,故排除A项。第八段的例子表明,很多用户不知道一些按键在键盘上的位置,排除C项。倒数第二段列举把键盘拆开来清洗的例子,故排除D项。文章第九段尾句举例说道,有位客人拿着鼠标对着屏幕狂按,可见他以为鼠标是遥控器,而不是把键盘当作遥控器,故答案为B项。
更多 “单选题The users did all of the following funny things EXCEPT______.A failing to switch on the computer.B regarding the keyboard as a remote control.C spending much time looking for a key.D washing the keys individually with soap.” 相关考题
考题 Which of the following did the author probably suggest?[A] Support not the most supported.[B] Deny everything others believe.[C] Throw all tradition into trashcan.[D] Keep your eyes open all the time.

考题 The writer decided to drop out of the conspicuous consumption gang because____ (She Is an Unwilling Tool of Middleclassdom) A. of inflationB. life is made too easy by modern miracle-performing appliancesC. she’s spending too much time and energy to keep things runningD. her children will be leaving home soon

考题 Everything was white and I remembered _____ all kinds of ladies dressed up in funny white things with all their hair covered with some sort of cloth.A:seeingB:seeC:to seeD:seen

考题 He regretted__________too much time on computer game.A.to cost B.costing C.to spend D.spending

考题 How much did you()all these things? More than forty dollars.AspendBcostCgiveDpay for

考题 How much did you()all these things? More than forty dollars.A、spendB、costC、giveD、pay for

考题 Which of the following is true regarding Label Distribution Protocol (LDP)?()A、It is a label distribution protocol for MPLSB、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC、Tag distribution Protocol (TDP) was the basis for LDPD、All of the above are true

考题 Which of the following is TRUE about the ate program?()A、When running ate for the first time it will prompt for all the required information and configure all the required devicesB、The program is used by cu to communicate to a remote systemC、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD、The program ate calls cu to communicate with the remote system

考题 Which of the following is true regarding NetWare Directory Services (NDS) configuration?()A、Remote users can access the tree through dial-in connections.B、Mobile users do not require changing the NDS name context.C、Remote users do not require a special NDS object entry.D、There are no differences between mobile users and remote users.

考题 Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A、 To ensure the router has the correct time when generating its private/public key pairs.B、 To ensure the router has the correct time when checking certificate validity from the remote peersC、 To ensure the router time is sync with the remote peers for encryption keys generationD、 To ensure the router time is sync with the remote peers during theDH exchangeE、 To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

考题 A remote host can be pinged from all switches except one.  Which of the following is the most likely reason for this failure?()A、VTP pruning has isolated the switch.B、IP routing is disabled on the switch.C、PoE is failing on the remote port.D、There is a loop in the topology.

考题 A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()A、Remote management cardB、Terminal servicesC、Remote desktopD、LDAP enabled IP KVM

考题 A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?()A、Switching loop is occurring on the switch.B、Wrong subnet mask on the switch.C、Incorrect SNMP settings on the switch.D、Port is misconfigured on the switch.

考题 A user needs a laptop keyboard replaced because the space bar is not working. Mike, a technician, replaces the keyboard, and notices that a diagonal set of keys will not respond. Which of the following is the MOST likely cause?()A、StickyKeys is enabled and needs to be disabled.B、The new keyboard is defective and needs to be replaced.C、The system board is defective.D、The keyboard ribbon is not seated properly.

考题 单选题A user needs a laptop keyboard replaced because the space bar is not working. Mike, a technician, replaces the keyboard, and notices that a diagonal set of keys will not respond. Which of the following is the MOST likely cause?()A StickyKeys is enabled and needs to be disabled.B The new keyboard is defective and needs to be replaced.C The system board is defective.D The keyboard ribbon is not seated properly.

考题 单选题Which of the following is TRUE about the ate program?()A When running ate for the first time it will prompt for all the required information and configure all the required devicesB The program is used by cu to communicate to a remote systemC The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD The program ate calls cu to communicate with the remote system

考题 单选题A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()A The system’s local time settingsB The system’s O/S version and patch statusC The system’s network configurationD The mail server’s configuration

考题 单选题A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()A Remote management cardB Terminal servicesC Remote desktopD LDAP enabled IP KVM

考题 单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long/x7frunning queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries.  You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()A set the CPU time per call in the users profileB set the CPU time per session in the users profilesC set the CPU levels for the users’ group using Resource ManagerD set the TIMED_STATISTICS parameter to TRUE in the parameter file

考题 单选题Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A  To ensure the router has the correct time when generating its private/public key pairs.B  To ensure the router has the correct time when checking certificate validity from the remote peersC  To ensure the router time is sync with the remote peers for encryption keys generationD  To ensure the router time is sync with the remote peers during theDH exchangeE  To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

考题 单选题When revising the fairy tales, Wilhelm did all of the following EXCEPT _____.A adding character judgmentsB making the tales much longerC deleting the violent scenesD polishing up the language

考题 单选题How much did you()all these things? More than forty dollars.A spendB costC giveD pay for

考题 单选题A remote host can be pinged from all switches except one.  Which of the following is the most likely reason for this failure?()A VTP pruning has isolated the switch.B IP routing is disabled on the switch.C PoE is failing on the remote port.D There is a loop in the topology.

考题 单选题A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?()A Switching loop is occurring on the switch.B Wrong subnet mask on the switch.C Incorrect SNMP settings on the switch.D Port is misconfigured on the switch.

考题 单选题Which of the following is true regarding NetWare Directory Services (NDS) configuration?()A Remote users can access the tree through dial-in connections.B Mobile users do not require changing the NDS name context.C Remote users do not require a special NDS object entry.D There are no differences between mobile users and remote users.

考题 单选题Which trigger property applies to Key triggers? ()A Hide Keys B Show Menu Keys C Hide Menu Keys D Display in 'Keyboard Help' E Hide Keys Description 

考题 单选题The users did all of the following funny things EXCEPT _____.A failing to switch on the computerB regarding the keyboard as a remote controlC spending much time looking for a keyD washing the keys individually with soap