网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user complains that a computer monitor is experiencing a jitter. Replacing the monitor and video card does not fix the problem. Which of the following could be causing the problem?()
A

ESD(electrostatic discharge)

B

motherboard

C

RAMDAC

D

EMI(electromagnetic interference)


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user complains that a computer monitor is experiencing a jitter. Replacing the monitor and video card does not fix the problem. Which of the following could be causing the problem?()A ESD(electrostatic discharge)B motherboardC RAMDACD EMI(electromagnetic interference)” 相关考题
考题 有如下程序: include using namespace std; class Monitor{ public: Monitor(cha 有如下程序:include<iostream>using namespace std;class Monitor{public:Monitor(char t):type(t){ }void Print( )const{cout<<"The type of monitor is"<<type private:char type;};class Computer{public:Computer(int i,char C) :______{}void Print( )const{eout<<"The computer is"<<id<<endl;mort.Print( );}private:int id;Monitor mon;};int main( ){const Computer myComputer(101,'B');myComputer.Print( );return 0;}请将程序补充完整,使程序在运行时输出:The computer is 101The type of monitor is B

考题 ( 11 )有如下程序:#includeiostreamusing namespace std;class Monitor{public:Monitor ( char t ) : type ( t ) {}void print ( ) const{cout"The type of monitor is"typeendl;}private:char type;};class Computer{public:Computer ( int i , char c ) : 【 11 】 {}void Print () const{cout"The computer is"idendl;mon.Print ( ) ; }private:int id;Monitor mon;};const Computer myComputer ( 101,'B' ) ;myComputer .Print ( ) ;return 0;}请将程序补充完整,使程序在运行时输出:The computer is 101'The type of monitor i.s 8

考题 阅读下列程序段,不合法的行是______。 class Computer{} class Monitor extends Computer{} class HardDrive extends Computer { public void test() { Monitor a = new Monitor(); Computer b = new Monitor(); HardDrive c = (HardDrive) a; Monitor d = b; } } ①Monitor a = new Monitor(); ②Computer b = new Monitor(); ③HardDrive c = (HardDfive)a; ④Monitor d = b;A.①②③B.③④C.①③④D.②④

考题 Which command allows you to view interface usage details in real-time?() A.user@host debug interface interface-nameB.user@host monitor usage interface-nameC.user@host monitor interface interface-nameD.user@host traceoptions interface interface-name

考题 A user wants to replace their 17” CRT monitor with the thinnest possible 17” monitor available.Which of the following monitors should the user purchase?() A. LED LCDB. DLPC. CCFL LCDD. Plasma

考题 A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A、An IEEE-1394 deviceB、A NIC deviceC、An IrDA deviceD、A FDD device

考题 Which command allows you to view interface usage details in real-time?()A、user@host debug interface interface-nameB、user@host monitor usage interface-nameC、user@host monitor interface interface-nameD、user@host traceoptions interface interface-name

考题 A technician is troubleshooting a monitor displaying a blank screen and the power indicator light ison. Which of the following should the technician do next?()A、Test the computer with a known-good monitor.B、Check if the monitor is still covered under the manufacturer’s warranty.C、Replace the monitor’s power cord with a known-good power cord.D、Swap out the computer’s video card.

考题 A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account

考题 Your network contains a computer that runs Windows XP Professional. Multiple users share the computer. You create a custom user profile on the computer. You need to ensure that all new users of the computer receive the custom user profile. What should you do?() A、Run the Files and Settings Transfer Wizard.B、At the command prompt, run scanstate.exe. C、Use the Copy To function from the User Profiles settings. D、Rename the folder that contains the custom user profile to winnt_user. 

考题 You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.

考题 Devin, a user on your Windows 2000 network, complains that when he tries logging on locally to his Windows 2000 Professional computer an error message is displayed. ‘The local Policy of this Computer does not allow interactive logons’ Devin is sure that he has used the correct username and password. What is the most likely cause of this problem?()A、The local user account is disabled.B、The logon rights have been modified.C、The local user account password is case-sensitive.D、The local user account username is incorrect.

考题 You have a computer that runs Windows XP Professional. Five users share the computer. A user named User1 is a member of the Power Users group and the Administrators group. User1 has encrypted files on the computer. User1 takes an extended leave of absence. You need to ensure that users cannot access the computer as User1. You must be able to provide User1 access to the files upon User1’s return. What should you do?() A、Disable the User1 account.B、Add User1 to the Guests group. C、Reset the password for the User1 account. D、Rename ntuser.dat as ntuser.man in the User1 user profile.

考题 Your network consists of a single Active Directory domain named Contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You create an organizational unit (OU) that contains a computer account named Computer1.  A Group Policy object (GPO) is linked to the OU and contains settings to enforce the use of IPSec. You log on to Computer1 by using a user account named User1. You need to verify that the IPSec settings have been applied.  Which command should you run?()A、Dsquery user -name User1B、Dsquery computer -name Computer1C、Gpresult /s Computer1 /scope COMPUTER /vD、Gpresult /user User1 /scope USER /v

考题 单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A  Guest user accountB  Limited user accountC  Power user accountD  Administrator user account

考题 单选题You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two localuser accounts named User1 and User2. On Computer1, you run Scanstate.exe /all //server1/data /computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd //server1/data/computer1. You need toensure that User1 and User2 can log on to Computer2.  What should you do on Computer2?()A Enable all user accounts.B Modify the default password policy.C Modify the Allow log on locally user right.D Add User1 and User2 to the local Administrators group.

考题 单选题When experiencing video problems, which of the following should be performed FIRST to ensure that the monitor is not causing the problem? ()A Check for the latest video drivers.B Install a known-good video adapter.C Attach the monitor to a known-good computer.D Replace the monitor.

考题 单选题A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A An IEEE-1394 deviceB A NIC deviceC An IrDA deviceD A FDD device

考题 单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A Instruct User1 to create a new user certificate on Computer2.B Instruct User1 to take ownership of the encrypted files on Computer2.C Instruct User1 to import the user certificate from Computer1 to Computer2.  D Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

考题 单选题A user reports that a network printer will not print, however, other users are not experiencing any problems. The user has rebooted their computer twice and it is still not printing. Which of the following should the technician check?()A Run the printer configuration wizard on the desktop.B Check to see if the network printer is turned on.C Verify that the printer is connected to the network.D Check the local print queue for a failed print job.

考题 单选题A user would like to use an external monitor with their laptop, but when the monitor is plugged in and connected to the laptop, the screen does not display on the monitor. Which of the following is the BEST way to display an image on both the monitor and the laptop?()A Change resolution on laptopB Toggle FN key and external monitor keyC Try a different monitor typeD Try using a different monitor cable

考题 单选题After removing several obsolete programs from a PC, a user is experiencing slower than usuallyprocessing times. Which of the following would be the BEST way to speed up the processing? ()A Use an external hard drive.B Defrag the hard drive.C Add more RAM to the computer.D Install a larger hard drive.

考题 单选题You need to identify the hardware failures have occurred on your computer in the past six months. What should you do?()A Open Device Manager.B Open Reliability Monitor.C Create a User Defined Data Collector Set.D Create a new Event Trace Sessions Data Collector Set.

考题 单选题Devin, a user on your Windows 2000 network, complains that when he tries logging on locally to his Windows 2000 Professional computer an error message is displayed. ‘The local Policy of this Computer does not allow interactive logons’ Devin is sure that he has used the correct username and password. What is the most likely cause of this problem?()A The local user account is disabled.B The logon rights have been modified.C The local user account password is case-sensitive.D The local user account username is incorrect.

考题 单选题A user wants to replace their 17” CRT monitor with the thinnest possible 17” monitor available.Which of the following monitors should the user purchase?()A LED LCDB DLPC CCFL LCDD Plasma

考题 单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()A Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 

考题 单选题You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You needto configure Computer1 so that only Administrators are authorized to shut down the computer.  What should you do?()A From User Accounts, modify the user profiles settings.B From User Accounts, modify the User Account Control (UAC) settings.C From the local computer policy, modify the Security Options.D From the local computer policy, modify the User Rights Assignment.