网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

With techniques for running applications on most PC, you can ( ) a desktop icon or select the application from a menu.

A.open

B.close

C.click

D.double-click


参考答案

更多 “ With techniques for running applications on most PC, you can ( ) a desktop icon or select the application from a menu.A.openB.closeC.clickD.double-click ” 相关考题
考题 Recently, there’s been much theft in the school. What security measures shall we take then?A.We can install cameras and set up police line for you.B.We can install infrared surveillance cameras and intrusion alarms for you.C.We can install alarming system for you.D.We can equip techniques and electronic system for you.

考题 Because Web servers axe platform. and application(71), they can send or request data from legacy or external applications including databases. All replies, once converted into(72). mark-up language, can then be transmitted to a(73).Used in this way, Intranets can(74)lower desktop support costs, easy links with legacy applications and databases and,(75)all, ease of use.A.coupledB.dependentC.independentD.related

考题 Because Web servers are platform. and application (1), they can send or request data from legacy or external applications including databases. All replies, once convened into (2) mark-up language, can then be transmitted to a (3) . Used in this way, Intranets can (4) lower desktop support costs, easy links with legacy applications and databases and, (5) all, ease of use.A.coupledB.dependentC.independentD.related

考题 What are the techniques which you can use to teach intonation in a meaningful way?

考题 You need to configure the WLAN client utility on a new machine.  Which two of the following are true regarding this utility? ()A、The Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAP authentication with dynamic WEP.B、In Windows XP environment, a client adapter can only be configured and managed with the Microsoft Configuration Manager.C、The Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility (ASTU) icon in the Windows system tray.D、The Cisco Aironet Desktop Utility (ADU) and the Microsoft Wirelss Configuration Manager can both be enabled at the same time to setup WLAN client cards.

考题 Which two are true about aggregate functions?()A、You can use aggregate functions in any clause of a SELECT statement.B、You can use aggregate functions only in the column list of the select clause and in the WHERE clause of a SELECT statement.C、You can mix single row columns with aggregate functions in the column list of a SELECT statement by grouping on the single row columns.D、You can pass column names, expressions, constants, or functions as parameter to an aggregate function.E、You can use aggregate functions on a table, only by grouping the whole table as one single group.F、You cannot group the rows of a table by more than one column while using aggregate functions.

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You run Remote Desktop Services and Microsoft Virtual Desktop Infrastructure (VDI). You have the servers shown in the following table. Name Server role Server1 RD Session Host Server2 RD Virtualization Host Server3 RD Connection Broker Server4 RD Web Access You are configuring Remote Desktop Web Access (RD Web Access) to publish VDI desktops and remote applications on the RD Web Access server. You need to ensure that when remote users log on to the RD Web Access server they are presented with all remote applications and only their assigned VDI desktop. Which two actions should you perform on Server4?()A、Set the source name to Server3.B、Set the source name to Server1;Server2.C、Select the option to use to one or more RemoteApp sources.D、Select the option to use a Remote Desktop Connection Broker server as the source.

考题 You are using NBAR to get a statistical baseline for the applications running on your network butdiscover that some applications are not being recognized. Which of the following are possiblesolutions?(Choose all that apply.)()A、Use the ip nbar pdlm command to allow NBAR to reference a new PDLM in flash memoryB、If NBAR doesn’t recognize certain applications you must contact Cisco and ask them to emailyou a new PDLM for that applicationC、Use the ip nbar port-map command to allow NBAR to recognize certain applications with anev/port numberD、The applications not being recognized can be rerouted to an NBAR collector, which has a morecomplete list of applicationsE、Use the copy nbar flash: command to download a new PDLM file to flashF、Use the ip nbar pdlm command to download a new NBAR reference file from the Cisco website

考题 You need to recommend a solution to provision new applications on the VMs for the planned virtual desktop pool deployment. What should you recommend?()A、Deploy the applications to the VMs by using App-V streaming.B、Deploy the applications to the VMs by using Group Policy Software Installation.C、Deploy a MED-V workspace to each VM. Deploy the applications to the workspace.D、Deploy the applications by using RemoteApp.Create a RemoteApp and Desktop Connection for each  VM.

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You run Remote Desktop Services and Microsoft Virtual Desktop Infrastructure (VDI). You have the serve rs shown in the following table. You are configuring Remote Desktop Web Access (RD Web Access) to publish VDI desktops and r emote applications on the RD Web Access server. You need to ensure that when remote users log on to the RD Web Access server they are presented with all remote applications and only their assigned VDI desktop. Which two actions should you perform on Server 4?()A、Set the source name to Server3.B、Set the source name to Server1;Server2.C、Select the option to use to one or more RemoteApp sources.D、Select the option to use a Remote Desktop Connect ion Broker server as the source.

考题 Your network includes the servers shown in the following table. Server n ame Operating s ystem Role s ervices S erver 1 Windows Server 2008 R2 Standard RDS Licensing S erver 2 Windows Server 2008 R2 Enterprise Remote Desktop Server3 Windows Server 2008 R2 Enterprise Remote Desktop Per-device Remote Desktop Services client access licenses (RDS CALs) are installed on Server1. After you refresh a group of client computers with Windows 7, users on those computers can no longer connect to Server2. You need to ensure that the users can connect to remote applications. What should you do?()A、From the affected client computers, initiate a Remote Desktop connection to Server1.B、From the affected client computers, initiate a Remote Desktop connection to Server3.C、On the affected client computers, open port 3389 on the Windows Firewall.D、On Server1, revoke the RDS device CALs of the affected client computers.

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()A、Trusted third party SSL certificateB、Authenticated SessionC、Workstation AuthenticationD、Remote Desktop Protocol (RDP) Signing

考题 All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS).You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears. What should you do?()A、In the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.B、In the RD Session Host Configuration tool, select the Allow connections from computers running any version of Remote Desktop option.C、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use smart card.D、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use locally logged-on credentials.

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.

考题 You have a single Active Directory directory service domain. You use Group Policy to assign applications. A computer named Desktop1 must be moved to a different organizational unit (OU). Youneed to ascertain the effect that the move will have on the applications that are assigned to the computer account.  What should you do?()A、 Use the RSoP tool in logging mode on Desktop1.B、 Use the RSoP tool in planning mode on Desktop1.C、 Use the RSoP tool in logging mode on a domain controller.D、 Use the RSoP tool in planning mode on a domain controller.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your new assistant, Tess, will perform basic administrative tasks on a member server named TestKingSrvC. Tess is not a member of the local Administrators group on TestKingSrvC, but she can log on to the server console. Tess reports that she receives an error message when she tries to use Remote Desktop. The error message states: "The local policy of this system does not permit you to log on interactively". You need to ensure that Tess can use Remote Desktop to log on to TestKingSrvC. What should you do?()A、Add Tess's user account to the Remote Desktop Users domain local group.B、Add Tess's user account to the Remote Desktop Users local group on TestKingSrvc.C、On the Remote Control tab of Tess's domain account, select the Enable remote control option.D、On the Security tab of Tess's domain account, add the Remote Desktop Users domain local group. Assign the Allow - Full Control permissions to this group.

考题 单选题All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS).You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears. What should you do?()A In the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.B In the RD Session Host Configuration tool, select the Allow connections from computers running any version of Remote Desktop option.C In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use smart card.D In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use locally logged-on credentials.

考题 多选题You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()AUtility ManagerBAccessibility WizardCAccessibility Options icon in Control PanelDUsers and Passwords icon in Control Panel

考题 单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()A Remote Desktop GatewayB Remote Desktop Connection BrokerC Windows Deployment ServicesD Windows Virtual PC and Windows XP Mode

考题 多选题Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digita l certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()ATrusted third party SSL certificateBAuthenticated SessionCWo rkstation AuthenticationDRemote Desktop Protocol (RDP) Signing

考题 单选题Your network consists of a single Active Directory domain. The domain contains a server that runs Windows Server 2008 R2 and that has the Remote Desktop Services server role installed.   The server has six custom applications installed.The custom applications are configured as Remote Apps.   You notice that when a user runs one of the applications,other users report that the server seems slow and that some applications become unresponsive.    You need to ensure that active user sessions receive equal access to system resources. What should you do?()A Implement Remote Desktop Web Access.B Implement Remote Desktop Connection Broker.C Configure Performance Monitor.D Implement Windows System Resource Manager.

考题 多选题You need to configure the WLAN client utility on a new machine.  Which two of the following are true regarding this utility? ()AThe Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAP authentication with dynamic WEP.BIn Windows XP environment, a client adapter can only be configured and managed with the Microsoft Configuration Manager.CThe Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility (ASTU) icon in the Windows system tray.DThe Cisco Aironet Desktop Utility (ADU) and the Microsoft Wirelss Configuration Manager can both be enabled at the same time to setup WLAN client cards.

考题 单选题You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new Windows Presentation Foundation (WPF) XAML browser application (XBAP).The deployment must meet the following requirements:  (1)shortcut is added to the Start menu   (2)The most recent version of the application is installed and executed on client computers   (3)Users can uninstall the application from the control panel    You need to identify a deployment technology that meets the specified requirements.You want to achieve this goal by using the minimum amount of development effort. Which deployment technology should you use?()A XCOPYB ClickOnceC MicrosoftWindows InstallerD Remote Desktop connections

考题 问答题What are the techniques which you can use to teach intonation in a meaningful way?

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your new assistant, Tess, will perform basic administrative tasks on a member server named TestKingSrvC. Tess is not a member of the local Administrators group on TestKingSrvC, but she can log on to the server console. Tess reports that she receives an error message when she tries to use Remote Desktop. The error message states: "The local policy of this system does not permit you to log on interactively". You need to ensure that Tess can use Remote Desktop to log on to TestKingSrvC. What should you do?()A Add Tess's user account to the Remote Desktop Users domain local group.B Add Tess's user account to the Remote Desktop Users local group on TestKingSrvc.C On the Remote Control tab of Tess's domain account, select the Enable remote control option.D On the Security tab of Tess's domain account, add the Remote Desktop Users domain local group. Assign the Allow - Full Control permissions to this group.

考题 单选题As the administrator of your company’s network you are asked to upgrade several Windows NT 4.0 computers to Windows 2000 Professional.  All user settings and application settings must be preserved. Most applications currently running are compatible with Windows 2000 and all the Windows NT 4.0 computers meet the minimum hardware requirements. After you upgrade several computers to Windows 2000 Professional, you find that some applications did not upgrade properly.   What utilities and/or applications should be disabled (or removed) before upgrading?()A Custom printer third-party software.B APM and Anti-virus softwareC All Non-Microsoft ProductsD All 32-bit applicationsE Third-party video drivers

考题 单选题You are the desktop administrator for your company. You install Windows XP Professional on your portable computer. The computer is configured to use an IEEE 1394 PC card. You use the computer to download pictures from a digital camera while you are at the office. You attend a meeting every Monday. During the meeting you use a battery to supply power to your portable computer. Occasionally, the battery runs out of power during these meetings. You need to configure the computer to conserve battery power while you attend your weekly meeting without affecting your power options when you use the computer at your office. How should you configure your computer?()A Use Device Manager to disable the IEEE 1394 PC card power device. B In Control Panel, select the Minimal Power Management power scheme in the Power Options Properties. C Create an additional hardware profile, and disable the IEEE 1394 PC card for this profile. D Use Device Manager to configure the IEEE 1394 PC card Host Controller power management scheme. Select the Allow this device to bring the computer out of standby check box.