网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()
A

Software problems don't generate errors. 

B

The user is more knowledgeable about software. 

C

The system logs will provide useful information alone. 

D

Key information pertaining to the software may be uncovered.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A Software problems don't generate errors. B The user is more knowledgeable about software. C The system logs will provide useful information alone. D Key information pertaining to the software may be uncovered.” 相关考题
考题 Which of the following statements about testing software with data is (are) true?Ⅰ.The primary purpose of such testing is to find errors.Ⅱ.Such testing can demonstrate the existence of errors but cannot demonstrate the absence of errors.A.NeitherB.I onlyC.ⅡonlyD.Ⅰand Ⅱ

考题 You asked me to tell you about culture shock for an Iranian in Britain.There is culture shock in a sense.One of the things was that when you talk to people in Iran, you can comfortably ask how much people earn and which religion they are.I found this very difficult with English people.They don' t tell you, they look away or they somehow get around the question.I didn' t understand why.I mean, I still don' t understand why people are uncomfortable answering that sort of question.In Iran, it's no problem, there' s no problem in asking anybody It’ s not rude at all.I had that confirmed to me when in one of my English classes my teacher told me not to talk to English people about three things politics, religion and money.(判断正误)26.People in Iran are not happy to talk about their salary or their religion.()27.People in England try to avoid personal questions.()28.In Iran, it's rude to ask questions about salary and religion()29.The writer was advised to avoid talking to English people about politics, religion and money.()30.The main idea of the passage is culture shock.()

考题 Which two statements about login classes correctly define their usage within the JUNOS software?() A.A different login class must be configured for each user.B.Individual commands can be explicitly allowed or denied.C.A user must be assigned to one of the default login classes.D.Each login class is associated with one or more permissions flags.

考题 A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?() A. NTBACKUP logB. Advanced tab in the System applet in Control PanelC. Event LogD. Internet Options applet in Control Panel

考题 A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?() A.FTPB.SMTPC.POPD.SNMP

考题 ● Documentation of a software package is normally produced for two purposes. One is to explain the __(71)__ of the software and describe how to use them. This is known as __(72)__ because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software,s internal composition so that the system can be maintained later in its life cycle. Documentation of this type is known as __(73)__.(71)A.plansB.costC.featuresD.schedules(72)A.system documentationB.user documentationC.vender documentationD.product documentation(73)A.system documentationB.user documentationC.vender documentationD.license documentation

考题 Which of following statements about testing software with data is (are) true?Ⅰ.The primary purpose of such testing is to find errors.Ⅱ.Such testing can demonstrate the existence of errors but can not demonstrate the absence of errors.A.NeitherB.Ⅰ onlyC.Ⅱ onlyD.Ⅰ and Ⅱ

考题 Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. existing database and application program B. application program and user interface C. existing database and user interface D. existing database,application program and user interface

考题 Documentation of a software package is normally produced for two purposes. One is to explain the (1) ofthe software and describe how to use them. This is known as (2) because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation ofthis type is known as ( 3 ) 空白(3)处填()A、system documentationB、user documentationC、vender documentationD、license documentation

考题 A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?()A、NTBACKUP logB、Advanced tab in the System applet in Control PanelC、Event LogD、Internet Options applet in Control Panel

考题 A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()A、FTPB、SMTPC、POPD、SNMP

考题 A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A、The file associations were not returned after the software was uninstalled.B、The user is not opening the files correctly.C、The uninstalled software has corrupted all the audio files on the computer.D、The sound card is not properly configured.

考题 An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A、The supporting documentationB、The vendor websiteC、The InternetD、The server event logs

考题 Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A、Software problems don't generate errors. B、The user is more knowledgeable about software. C、The system logs will provide useful information alone. D、Key information pertaining to the software may be uncovered.

考题 Which two statements about login classes correctly define their usage within the JUNOS software?()A、A different login class must be configured for each user.B、Individual commands can be explicitly allowed or denied.C、A user must be assigned to one of the default login classes.D、Each login class is associated with one or more permissions flags.

考题 A customer has determined they want to install an IBM x445 system in their company.  They will be running a large database on the system.  In order to determine how many CPUs will be needed to attain the optimum cost-effective solution, which TWO of the following questions should be asked?()A、How large is the database?B、What is the expected user workload?C、How is the database software licensed?D、What type of user interface will be used?E、How much data cache will the database be allocated?

考题 The local library has several public desktops and is concerned about PCs being opened andcomponents being stolen. Which of the following could prevent this?()A、Secure the PCs to the table with cable locks.B、Install biometrics to track user access and identities.C、Install real-time system resource monitoring software.D、Use security screws to prevent the case from being opened.

考题 单选题A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A The file associations were not returned after the software was uninstalled.B The user is not opening the files correctly.C The uninstalled software has corrupted all the audio files on the computer.D The sound card is not properly configured.

考题 单选题A base operating system has just been installed, successfully rebooted, and the user is now logged in as root. The user wants the server software bundle installed, but has additional software that must be installed with the bundle. Which of the following procedures should be performed to complete the installation?()A Add the software to /usr/sys/inst.imagesB Update the bundle file in /usr/sys/inst.imagesC Install the bundle filelists and run update allD Add the software to the bundle file in /usr/sys/inst.data/sys_bundles

考题 问答题题目要求:  In this part of the test, the examiner reads out a scenario and gives you some prompt material in the form of pictures or words. You have 30 seconds to look at the task prompt, an example of which is below, and then about two minutes to discuss the scenario with your partner. After that, the examiner will ask you more questions related to the topic.Practice 1  For two or three candidates  I’m going to describe a situation.  Your company is going to rent offices. Talk together about the topics you could include when you decide to rent offices. Decide which 3 topics you think are most important.  * three minutes for groups of three candidates  Prompt material  Topics to include  ●Location  ●Cost  ●Transportation  Follow-up questions:  (l) Are facilities important when renting office? (Why? / Why not? )  (2) Do you think security system should be safe? (Why? / Why not? )  (3) Why do big companies also choose big office buildings? (Why? / Why not? )

考题 多选题Which two statements about login classes correctly define their usage within the JUNOS software?()AA different login class must be configured for each user.BIndividual commands can be explicitly allowed or denied.CA user must be assigned to one of the default login classes.DEach login class is associated with one or more permissions flags.

考题 单选题An administrator has encountered a problem with a particular piece of software installed on the serverand begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A  The supporting documentationB  The vendors websiteC  The InternetD  The servers event logs

考题 单选题A user states that their web browser was recently updated and continuously crashes. Which of the following could the technician use to gather more information about the issue?()A NTBACKUP logB Advanced tab in the System applet in Control PanelC Event LogD Internet Options applet in Control Panel

考题 单选题A user wants to upgrade to Windows 2000. Which of the following WINNT32 command switches can be run to determine whether the users computer and software is compatible with the new operating system?()A CMDCOMSB CHECKUPGRADEONLYC COPYSOURCED DUPREPARE

考题 单选题A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()A FTPB SMTPC POPD SNMP

考题 单选题An administrator has encountered a problem with a particular piece of software installed on the server and begins the troubleshooting process. Which of the following is the FIRST place the administrator should look for specific information about the problem?()A The supporting documentationB The vendor websiteC The InternetD The server event logs

考题 单选题The local library has several public desktops and is concerned about PCs being opened andcomponents being stolen. Which of the following could prevent this?()A Secure the PCs to the table with cable locks.B Install biometrics to track user access and identities.C Install real-time system resource monitoring software.D Use security screws to prevent the case from being opened.