网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

● The (74) is the largest computer network in the world.

(74) A. PC

B. USB

C. Windows

D. Internet


参考答案

更多 “ ● The (74) is the largest computer network in the world.(74) A. PCB. USBC. WindowsD. Internet ” 相关考题
考题 ● The computer you are using is protected usually by (75) .A. password B. key C. mouse D. USB

考题 ●There is free firewall software available that can run on minimal hardware and provide a good level of (74) to your network.(74) A.protectiveB.profectingC.protectionD.profection

考题 ●Network software consists of (74), or rules by which processes can communicate.(74)A.protocolsB.programsC.devicesD.computers

考题 ● Firewall is a ___(74)___ mechanism used by organizations to protect their LANs fromInternet.(74)A. reliable B. stable C. peaceful D. security

考题 ●A small network may only connect two computers inside a home to share a single printer and Internet (74) .(74) A.connectB.connectingC.connectionD.connective

考题 ● Every valid character in a computer that uses even (71) must always have an even number of1bits.(71)A. parity B. check C. test D. compare● The maximum number of data that can be expressed by 8 bits is (72) .(72)A. 64 B. 128 C. 255 D. 256● Integration (73) is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A. trying B. checking C. testing D. coding● GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in (74) .(74)A. an image B. a file C. a window D. a page● Computer (75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.(75)A. storage B. device C. network D. processor

考题 ● Office (74) is the application of the computer and communications technology to improve the productivity of office workers.(74)A. Tool B. Automation C. Device D. FAX

考题 ● The Internet is an open system, and most information is available to everyone. It is very important to add (74) to existing system for protecting the secret information.(74)A. Web pagesB. modemC. securityD. network

考题 ● Maintenance activities include(74).①making enhancements to software products②developing a new software product③correcting problems④adapting products to new environments(74)A.①②B.①③④C.②③④D.①②③④

考题 ● GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in (74) .(74)A. an image B. a file C. a window D. a page

考题 A(74)is a device that enables the computer to handle sounds.A.network cardB.video cardC.sound cardD.monitor

考题 You are the administrator of a network that consists of a single Windows NT 4.0 domain. The network contains five Windows NT Server domain controllers and 1,000 Windows NT Workstation client computers.You want to install Windows 2000 Server on a new computer. You want the new computer to act as domain controller in the existing domain.What should you do?A.On the new computer, install Windows NT Server 4.0 and designate the computer as a BDC in the existing domain. Promote the computer to the PDC of the domain. Upgrade the computer to Windows 2000 Server.B.On the new computer, install Windows NT Server 4.0 and designate the computer as a PDC in a new domain that has the same NetBIOS name as the existing Windows NT domain. Upgrade the computer to Windows 2000 Server. Use the Active Directory sites and services to force synchronization of the domain controllers.C.Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory installation wizard to install Active Directory, specifying the same NetBIOS name for the Windows 2000 domain as the existing Windows NT domain. Restart the Windows NT PDC on the network and demote it to a BDC.D.Shut down the PDC of the existing Windows NT domain from the network. On the new computer, install Windows 2000 Server, and then run the Active Directory installation wizard to install Active Directory as a replica in the existing Windows NT domain. Promote the new computer to the PDC of the domain. Restart Windows NT PDC on the network and demote it to a BDC.

考题 Your network includes Windows 98 computers and Windows 2000 Server computers. You are adding a new computer to the network, and you plan to install Windows 2000 Server on the new computer. The computer has one 20-GB hard disk with no partitions defined.The Windows 2000 Server CD-ROM is unavailable. You want install Windows 2000 Server from source files that are located on a server on the network. You also want the entire hard disk of the new computer to be used for the system partition.What should you do?A.On another Windows 2000 computer, use Makebt32.exe to create installation startup disks. Start the new computer by using the first disk.B.On another Windows 2000 computer, format a floppy disk. Copy NTLDR, Boot.ini, Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the disk.C.Start the new computer by using a Windows 98 network boot disk. Connect to the network server. Run Dsclient.exe. Create and format a 20-GB FAT32 partition.D.Start the new computer by using a Windows 98 network boot disk. Create and format a single FAT32 partition. Connect to the network server. Run Winnt.exe.E.Start the computer by using a Windows 98 network boot disk. Create and format a single FAT32 partition. Start the new computer by using a Windows 2000 Emergency Repair Disk.

考题 You are preparing to install Windows 2000 Server on a new computer. The computer is connected to a network that includes Windows 98 computers and Windows 2000 Server computers.You want to install Windows 2000 Server from source files that are located on a server on the network.What should you do?A.Start the new computer by using a Windows 98 network boot disk. Connect to the network server. Run Winnt32.exe.B.Start the new computer by using Windows 98 network boot disk. Connect to the network server. Run Winnt.exe.C.On a Windows 2000 Server computer, use Makebt32.exe to create installation startup disk. Start the new computer by using the first disk.D.On a Windows 2000 computer, format a floppy disk. Copy NTLDR, boot.ini, Ntdetect.com, Ntbootdd.sys to this disk. Start the new computer by using the disk.

考题 All client computers in your company run Windows 7 Enterprise. Each client computer runs one guest virtual machine (VM) in Windows Virtual PC .A user reports that a supported USB device connected to his client computer does not appear in the guest VM. The USB device functions correctly on the client computer.You need to ensure that the USB device can be installed in the guest VM.What should you do?()A.Use Virtual PC Manager to attach the USB device on the host.B.Run the Add Hardware Wizard in the guest.C.Use the Computer Management console to scan for hardware changes in the guest.D.Use the Computer Management console to update the USB Virtualization Bus driver on the host.

考题 A(74)translates a computer program written in a human-readable computer language into a form. that a computer can executablA.compilerB.linkerC.assemblerD.application

考题 ●The term, (74) loop, refers to a loop that is contained within another loop.(74)A.programB.nestedC.statement,D.Network

考题 ● A (74) is a device that enables the computer to handle sounds.(74)A. network cardB. video cardC. sound cardD. monitor

考题 ●(74) is a worldwide network of computer networks.(74)A. ModemB. InterfaceC. InternetD. Protocol

考题 ● Office (74) is the application of the computer and communications technology to improve the productivity of office workers.(74)A. ToolB. AutomationC. DeviceD. FAX

考题 ● Since RAM is only active when the computer is on, your computer uses disto store information even when the computer is off. Which of the following itrue? (74)(74)A.When your computer is on, only RAM is used to store informationB.When your computer is on, only disk drives are used to storinformation.C.When your computer is off, only RAM is used to store informationD.When your computer is off, only disk drives are used to storinformation.

考题 3, 5, 11, 29,( )。 A. 62 B. 69 C. 74 D. 83

考题 All client computers in your company run Windows 7 Enterprise. Each client computer runs one guest virtual machine (VM) in Windows Virtual PC . A user reports that a supported USB device connected to his client computer does not appear in the guest VM. The USB device functions correctly on the client computer. You need to ensure that the USB device can be installed in the guest VM. What should you do?()A、Use Virtual PC Manager to attach the USB device on the host.B、Run the Add Hardware Wizard in the guest.C、Use the Computer Management console to scan for hardware changes in the guest.D、Use the Computer Management console to update the USB Virtualization Bus driver on the host.

考题 You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go.You need to ensure that you can copy files from the computer to the USB drive. The solution must retain theexisting files on the USB drive.  What should you do?()A、From a computer that runs Windows 7, change the file system of the USB drive.B、From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.C、Log on to Windows XP as member of the Administrators group.D、Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.

考题 You are the network administrator for your company. A user reports that the USB ports on his Windows 2000 Professional portable computer function only when the portable computer is in its docked position at the office. He asks you to configure the computer so that the USB port works when the portable computer is docked and when it is undocked and running on battery power. You verify that the portable computer supports ACPI power management. What should you do?()A、Modify the portable computer’s power management settings to ensure the USB ports are not  shut down when the computer is running on battery power. B、Modify the portable computer’s BIOS settings to disable ACPI when the computer is running  on battery power. C、Modify the portable computer’s undocked hardware profile, and enable the USB root hub. D、Disable the BIOS power management features in the portable computer’s BIOS settings. E、Obtain external power supplies for the user’s USB devices. Ensure that these power supplies  are connected when the portable computer is undocked. F、Undock the portable computer, and reinstall the drivers for the USB port.

考题 单选题You are the network administrator for your company. A user reports that the USB ports on his Windows 2000 Professional portable computer function only when the portable computer is in its docked position at the office. He asks you to configure the computer so that the USB port works when the portable computer is docked and when it is undocked and running on battery power. You verify that the portable computer supports ACPI power management. What should you do?()A Modify the portable computer’s power management settings to ensure the USB ports are not  shut down when the computer is running on battery power. B Modify the portable computer’s BIOS settings to disable ACPI when the computer is running  on battery power. C Modify the portable computer’s undocked hardware profile, and enable the USB root hub. D Disable the BIOS power management features in the portable computer’s BIOS settings. E Obtain external power supplies for the user’s USB devices. Ensure that these power supplies  are connected when the portable computer is undocked. F Undock the portable computer, and reinstall the drivers for the USB port.

考题 单选题You have two portable computers named Computer1 and Computer2 that run Windows 7. You configureComputer1 to connect to a wireless network named Network1. You need to configure Computer2 to connectto Network1 by using the same settings as Computer1.  What should you do on Computer1?()A At the command prompt, run Wecutil.exe es gr.B At the command prompt, run Winrs.exe -environment.C From Windows Firewall with Advanced Security, export the policy.D From the wireless network properties of Network1, copy the network profile to a USB flash drive.