网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

● A(75) is a device that enables data from one computer to travel to another computer by using telephone lines.

(75) A. modem

B. disk

C. printer

D. CPU


参考答案

更多 “ ● A(75) is a device that enables data from one computer to travel to another computer by using telephone lines.(75) A. modemB. diskC. printerD. CPU ” 相关考题
考题 ●The firewall device is a(75)system for connecting a computer network to other computer network.(75)A.hardwareB.softwareC.securityD.I/O

考题 A(71) is a device that enables the computer to handle sounds.A.video cardB.network cardC.sound cardD.card games

考题 Robots differ from automatic machines ______after completion of one specific task, they can be reprogrammed by a computer to do another one.A. thatB. whichC. in thatD. in which

考题 ● Computer(75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.(75)A. storage B. device C. network D. processor

考题 ● A (75) infected computer may lose its data.(75)A. fileB. data baseC. virusD. program

考题 A(74)is a device that enables the computer to handle sounds.A.network cardB.video cardC.sound cardD.monitor

考题 Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.A.obviousB.secretC.importantD.easy

考题 One of the basic roles of computer security is to change your((73))regularly.A.nameB.computerC.passwordD.device

考题 Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic

考题 Password is a secret series of(69)that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(70). The password helps ensure that(71)users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic

考题 You install Microsoft Windows Vista on a computer. You will share the computer with another user. You need to prvent the user from making unauthorized changes to the computer.What should you do?() A.AB.BC.CD.D

考题 Businesses have also been engaging in a type of electronic commerce , ( )occurs when one business transmits computer-readable data in a standard format to another business.A.EFT B.EDI C.ERP D.CRM

考题 ●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.(75)A.firewallB.protocolC.hackerD.virus

考题 ● A (74) is a device that enables the computer to handle sounds.(74)A. network cardB. video cardC. sound cardD. monitor

考题 Businesses have also been engaging in a type of electronic commerce, ______ occurs when one business transmits computer-readable data in a standard format to another business. A.EFT B.EDI C.ERP D.CRM

考题 A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.)()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN

考题 A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()A、hubB、routerC、switchD、STPE、subinterfacesF、VLAN

考题 You install Windows 2000 Professional on your portable computer. You install an SCSI and PC card adapter, that you can use in the office to use color scanner. You use a docking station for your computer when you are in the office. You want to maximize the battery performance for your portable computer. You also want to prevent the driver from loading whenever you are away from the office. What should you do?()A、When away from the office use Device Manager to remove the adapter. B、When away from the office configure the startup properties for the adapter to be automatic. C、Remove the computer from the docking station and start Windows 2000 Professional to disable the SCSI PC card adapter device for the current profile.D、Remove the computer from the docking station and start Windows 2000 Professional, use Device Manager to remove SCSI PC card adapter device.

考题 You are the desktop administrator for Company. Janos is a user in Company's accounting department.  Janos uses a Windows 2000 Professional portable computer.  Janos reports that when the computer is unlocked, it randomly displays the following error message:  "JZXDRV.dll failed to load". You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Janos’ docking station. Janos reports that the error message does not appear when the computer is docked.  You need to ensure that the error does not occur on Janos’ computer. You also need to ensure that the storage device continues to function correctly when Janos’ computer is docked.  What should you do?()A、 Remove the storage device from the hardware profile on Janos’ computer.B、 Create a local user account for Janos on his computer. Copy the JZXDRV.dll file to the profile      folder for Janos’ local user account. Instruct Janos to log on to his computer by using his local      user account whenever the computer is unlocked.C、 Copy the computer's default hardware profile to create a new hardware profile named        Undocked.      Remove the storage device from the Undocked hardware profile.D、 Copy the computer's default hardware profile to create a new hardware profile named       Unlocked. Disable the storage device in the Undocked hardware profile. Instruct Janos to start         the computer by using the Undocked hardware profile whenever the computer is undocked. 

考题 多选题You install an updated device for the Zip drive on your Windows 2000 Professional computer. You restart the computer.  During the startup process, the computer stops responding.   You then restart the computer in safe mode. During the startup process, the computer stops responding again. You suspect the new device driver is causing the problem. You want to resolve the problem so that the computer starts successfully.   What should you do?()AUse the listsvc command to disable the Zip device driver.BUse the disable command to disable the Zip device driver.CSelect Recovery Console from the Repair menu.DSelect debug mode from the Windows 2000 Advanced Options menu.EInsert the Emergency Repair Disk.FSpecify the path to the recovery files on the hard disk.GStart the computer by using the Windows 2000 Professional CD-ROM.

考题 多选题Your mobile device runs the latest version of the Microsoft Windows Mobile operating system.  Your mobile device supports the use of Bluetooth and Infrared (IR) for data synchronization. You need to configure data synchronization on your computer to only use Bluetooth.  Which three actions should you perform?()AClear the Allow USB connections check box.BSelect the Allow USB connections check box.CSelect the Bluetooth option from the drop down list.DClear the Allow connections to one of the following check box.ESelect the Allow connections to one of the following check box.FInstall the latest version of Microsoft ActiveSync on the computer and perform an initial sync.

考题 多选题Your computer has a TV tuner card installed.  You install a wireless router and a Microsoft Windows Media Center Extender device. You need to access all the digital media on your computer from a different room in your house.  Which two actions should you perform? ()AIdentify the setup key from the Windows Media Extender device, and input the key on your Microsoft Windows Vista computer.BConfigure the Windows Media Center Extender device and your Microsoft Windows Vista computer to be on the same subnet.CConfigure the Windows Media Center Extender device and your Microsoft Windows Vista computer to be on different subnets.DEnter the password for your Microsoft Windows Vista user account as the setup key for the Windows Media Center Extender device.

考题 多选题A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device (Choose two.)()。AhubBrouterCswitchDSTPEsubinterfacesFVLAN

考题 多选题A company is installing IP phones. The phones and office computers connect to the same devicE.To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffiC.What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? ()AhubBrouterCswitchDSTPEsubinterfacesFVLAN

考题 单选题You have two computers named Computer1 and Computer2 that run Windows XP Professional. A local printer is connected to Computer1. From Computer1, you establish a Remote Desktop Connection to Computer2.  You discover that there are no printers available from within the Remote Desktop Connection. The event log on Computer 2 displays the following event: Source: TermServDevices, ID: 1111. Description: Driver Printer 1000 required for printer Printer 1000 is unknown. Contact the administrator to install the driver before you log on again. You need to ensure that you can send a print job to the print device connected to Computer1 from the Remote Desktop Connection. What should you do?()A On Computer1, reinstall the printer. B On Computer1, run mstsc /console, and then connect to Computer2.C On Computer2, install the driver from the print device manufacturer. D On Computer1, disable printers in the Remote Desktop Connection configuration. 

考题 多选题You work as an administrator at Company.com handling a Windows 200 network.You install an updated device for the removable storage device on your Windows 2000 Professionalcomputer. You restart the computer. During the startup process the computer stops responding.You then restart the computer in safe mode. During the startup process, the computer stops responding again.   You want to resolve the problem so that the computer starts successfully.  What should you do?()AUse the listvc command to disable the removable storage device driver.BUse the disable command to disable the removable storage device driver.CSelect debug mode from the Windows 2000 Advanced Options menu.DSelect Recovery Console from the Repair menu.EStart the computer by using the Windows 2000 Professional CD-ROM.FInsert an Emergency Repair Disk.

考题 多选题You install a Zip device on your Windows 2000 Professional computer. You reboot your computer only to find out that the computer does not respond at all. You reboot into Safe Mode, and again, the computer does not respond. How do you recover from this problem?()AUse the listsvc command to disable the Zip device driverBSelect Recovery Console from the Recovery Menu.CUse the disable command to disable the Zip device driverDSelect the Debug mode from the Windows 2000 Advanced Options menuEInsert the Emergency Repair Disk and specify the path of the recovery file on the hard diskFStart the computer using the Windows 2000 Professional CD-ROM.