网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
After setting up a new computer, a user states that the mouse and keyboard will not work. Whichof the following is the MOST likely reason?()
A

The network cable is disconnected

B

The PS/2 connectors are switched

C

The USB connectors are switched

D

The hard drive is unplugged


参考答案

参考解析
解析: 暂无解析
更多 “单选题After setting up a new computer, a user states that the mouse and keyboard will not work. Whichof the following is the MOST likely reason?()A The network cable is disconnectedB The PS/2 connectors are switchedC The USB connectors are switchedD The hard drive is unplugged” 相关考题
考题 Many new buildings are ( ) the Su zhou River. A、setting up byB、putting up onC、going up onD、building up by

考题 After setting up a new computer, a user states that the mouse and keyboard will not work. Whichof the following is the MOST likely reason?() A. The network cable is disconnectedB. The PS/2 connectors are switchedC. The USB connectors are switchedD. The hard drive is unplugged

考题 You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.What should you do?()A.AB.BC.CD.D

考题 You install Windows Vista on a new computer by using the default settings. You create an administrator account and a standard user account.You log on to the computer as the standard user and attempt to install a new application. You are prompted for user credentials to complete the installation.You need to install the application on the computer.What should you do?()A.AB.BC.CD.D

考题 As the old empires were broken up and new states were formed,new official tongues began to_at an increasing rate. A. bring up B. build up C. spring up D. strike up

考题 A user selects their proper domain and is unable to log into their Windows computer.The error states:‘System cannot log you on to the domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect’.Which of the following is the MOST likely cause for this error?()A、The computer’s account was removed from Active Directory.B、The user’s account was removed from Active Directory.C、The computer was disjoined from the domain.D、The user typed in the wrong password.

考题 After setting up a new computer, a user states that the mouse and keyboard will not work. Whichof the following is the MOST likely reason?()A、The network cable is disconnectedB、The PS/2 connectors are switchedC、The USB connectors are switchedD、The hard drive is unplugged

考题 After booting up a new computer, a technician observes that the USB ports are not working with any USB devices. Which of the following should be done FIRST?()A、Check the computer to verify that the jumper settings for USB are correct.B、Connect the USB devices to a different computer to test the devices.C、Buy new USB wires and test USB functionality.D、Check the BIOS to verify that USB functionality is enabled.

考题 A computer has been upgraded with a new hard drive and after reassembling the computer and turning the computer on, the drive LED remains lit and an error message during power-on self test (POST) states, ’No Drive Present.’ Which of the following would MOST likely be the cause?()A、The motherboard was damaged and needs replacing.B、The floppy drive was not reconnected.C、A configuration disk was left in the floppy drive.D、The ribbon cable has been installed incorrectly.

考题 After installing a second processor and corresponding heatsink into a server, an administrator notices that the new processor is not showing up during POST.  Which of the following could be the cause of this issue?()A、 The power supply is not sufficient to power the server.B、 The voltage regulator module (VRM) was not installed.C、 The IRQ setting was not set.D、 The DMA setting was not set.

考题 Which statement is true regarding this setting?()A、It drops the connection after the specified number of login attempts fail for any user.B、It is enforced only if the password profile is enabled for the user. C、It locks the user account after the specified number of attempts. D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

考题 You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

考题 You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003. You place computer accounts for servers in OUs that are organized by server roles. You apply GPOs to these servers at the OU level. You need to add a new server to the domain. You need to ensure that the appropriate GPOs are applied to this server. What should you do?()A、Prestage a domain computer account for the new server in the appropriate OU. Join the server to the domain by using the prestaged computer account.B、On the server, add the domain name for the Active Directory domain to the DNS suffix setting. Join the server to the domain.C、Assign a user account the Allow - Create permission for the appropriate OU. Join the new server to the domain by using the user account.D、Join the new server to the Active Directory domain. On the new server, run the gpupdate /force command.

考题 You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()A、Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.B、Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.C、Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.D、Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.

考题 单选题A computer has been upgraded with a new hard drive and after reassembling the computer and turning the computer on, the drive LED remains lit and an error message during power-on self test (POST) states, ’No Drive Present.’ Which of the following would MOST likely be the cause?()A The motherboard was damaged and needs replacing.B The floppy drive was not reconnected.C A configuration disk was left in the floppy drive.D The ribbon cable has been installed incorrectly.

考题 单选题As the old empires were broken up and new states were formed, new official tongues began to _____ at an increasing rate.A bring upB build upC spring upD strike up

考题 单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A Instruct User1 to create a new user certificate on Computer2.B Instruct User1 to take ownership of the encrypted files on Computer2.C Instruct User1 to import the user certificate from Computer1 to Computer2.  D Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

考题 单选题Which statement is true regarding this setting?()A It drops the connection after the specified number of login attempts fail for any user.B It is enforced only if the password profile is enabled for the user. C It locks the user account after the specified number of attempts. D It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named . For security reasons,management decides that a particular user must not be able to log on to the domain after 5:00 P.M. If the user is logged on to the domain at 5:00 P.M., he must be logged off automatically. You configure the Logon Hours setting for the appropriate user account. Thatnight, you verify that the user cannot log on to the domain after 5:00 P.M. The nextday, you notice that the user is still accessing domain resources at 6:00 P.M. Youverify that the time on the user's computer and on the domain controller arecorrect. You need to ensure that the user is logged off automatically if he is still working onthe domain after 5:00 P.M. What should you do?()A In Active Directory Users and Computers, on the Sessions tab, configure the End Session setting for the user account. Instruct the user to log off from the domain and log on again.B Modify the Default Domain Policy GPO to enforce logoff when logon hours expire. Ensure that the user's computer has the latest Group Policy settings applied.C Remove the user's domain account from the local Administrators group on the user's client computer. Instruct the user to log off from the domain and log on again.D Use Computer Management on the domain controller. Restart the Net Logon service.

考题 多选题Immediately after adding a new disk to or removing an existing disk from an ASM instance, you find that the performance of the database goes down initially until the time the addition or removal process is completed, and then gradually becomes normal. Which two activities would you perform to maintain a consistent performance of the database while adding or removing disks?()ADefine the POWER option while adding or removing the disksBIncrease the number of ARB processes by setting up a higher value for ASM_POWER_LIMIT.CIncrease the number of DBWR processes by setting up a higher value for DB_WRITER_PROCESSESDIncrease the number of slave database writer processes by setting up a higher value for DBWR_IO_SLAVES

考题 单选题An internal user has deleted a file named, pagefile.sys and is concerned this deletion may affect the computer. The user should be instructed to:()A reboot the computer because Windows automatically generates a new page file.B add a new hard drive, format the drive and install Windows.C back up all data, reboot the computer and notify a desktop technician.D reformat the hard drive and reinstall Windows.

考题 单选题After installing a second processor and corresponding heatsink into a server, an administrator notices that the new processor is not showing up during POST.  Which of the following could be the cause of this issue?()A  The power supply is not sufficient to power the server.B  The voltage regulator module (VRM) was not installed.C  The IRQ setting was not set.D  The DMA setting was not set.

考题 单选题When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()A userB read_onlyC target_operatorD security_operator

考题 单选题You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()A Copy the .acw file to the c;/documents/setting/default user folderB Save the accessibility option to the floppy disk and change the permission to allow full control  of the fileC Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderD Change the permission of the .acw file in the folder to allow access for Peter’s user account. 

考题 单选题You have a single Active Directory directory service domain. All user accounts in the sales   department are in an organizational unit (OU) named Sales. Your company has five public computers that are members of the domain. You notice a sales tracking application on one of the public computers. You verify that this application is assigned to users in the Sales OU through a Group Policy object (GPO). You need to ensure that when sales department users log on to the public computers, the applications that are assigned to the Sales OU are not made available on the public computers.  What should you do?()A  Add the public computer accounts to a new OU. Create and link a GPO to enable the User Group Policy loopback processing mode setting in merge mode.B  Add the public computer accounts to a new OU. Create and link a GPO to enable the User Group Policy loopback processing mode setting in replace mode.C  Create a new GPO and link it to the Sales OU to enable the User Group Policy loopback processing mode setting in merge mode.D  Create a new GPO and link it to the Sales OU to enable the User Group Policy loopback processing mode setting in replace mode.

考题 单选题You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.  What should you do? ()A Enable the User Account Control: Only elevate executables that are signed and validated option.B Disable the User Account Control: Only elevate executables that are signed and validated option.C Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.D Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.

考题 单选题You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.  What should you do?()A Create a System Restore point.B Perform an Automated System Recovery (ASR) backup and restore.C In the Backup and Restore Center window, click the Back up files button.D In the Backup and Restore Center window, click the Back up computer button.

考题 单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()A Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.