网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()
A

Zip drive

B

15,000 rpm SATA

C

7,200 rpm IDE

D

USB flash


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A Zip driveB 15,000 rpm SATAC 7,200 rpm IDED USB flash” 相关考题
考题 You are the administrator of a Windows 2000 Professional computer that is shared by several users in the Sales department. User accounts have been created for current users. Current users can log on to the computers. To accommodate new users, you add two new user accounts named User7 and User8 to computer5. When User7 attempts to log on o the computer, she receives the following error message: "Windows cannot copy file C:\Documents and Settings\Default User\ to location C:\Documents and Settings\User7. Contact your network administrator. Detail - Access is denied." When User8 attempts to log on to the computer, he receives the same type of error message.You want to allow the two new users, as well as other users in the Sales department, to be able to log on to the computer.Which two methods can you use to accomplish your goal? (Choose two.)A.Add the User7 and User8 user accounts to the DACL for the Profiles shared folder on the network server.B.Add the User7 and User8 user accounts to the DACL for the C:\Documents and Settings\Default User folder.C.Add the Everyone group to the DACL for the C:\Documents and Settings\Default User folder.D.Add a Group Policy object (GPO) for the Sales OU that redirects user profiles to a shared folder.E.Log on by using the local Administrator account and create new folders for User7 and User8 in the C:\Documents and Settings folder.F.Select the allow inheritable permissions from parent to propagate to this object option on the C:\Documents and Settings\Default User folder, and reset the permissions on all child objects.G.Move and retain permissions and compressions.

考题 Which of the following components are used to convert alternating current produced in the generator windings to direct current?A.Armature and equalizerB.Commutator and brushesC.Rotor and interpolesD.Field and exciter

考题 A(66)computer is a personal computer whose hardware is capable of using any or all 0f the following media in a program:audio,text,graphics,video and animation.A.databaseB.multimediaC.networkD.mainframes

考题 A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A. Zip driveB. 15,000 rpm SATAC. 7,200 rpm IDED. USB flash

考题 A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? () A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag

考题 A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A、Zip driveB、15,000 rpm SATAC、7,200 rpm IDED、USB flash

考题 How do oyu write the current candidate configuration to the permanent storage media?()A、[edit] user@router# save /var/tmp/current.confB、[edit] user@router# write /var/tmp/current.confC、[edit] user@router# commit /var/tmp/current.confD、[edit] user@router# dump /var/tmp/current.conf

考题 A user reports that their machine seems to be running slower than usual. The user states that the computer has become progressively worse as more applications are installed. Which of the following is the FIRST step the technician should take?()A、Run the CHKDSK utilityB、Run the disk defragmenter utilityC、Increase the capacity on the system volumeD、Convert to a dynamic drive on the system

考题 A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag

考题 A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A、The file associations were not returned after the software was uninstalled.B、The user is not opening the files correctly.C、The uninstalled software has corrupted all the audio files on the computer.D、The sound card is not properly configured.

考题 A user wants to upgrade to Windows 2000. Which of the following WINNT32 command switches can be run to determine whether the users computer and software is compatible with the new operating system?()A、CMDCOMSB、CHECKUPGRADEONLYC、COPYSOURCED、DUPREPARE

考题 A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A、Remote DesktopB、TelnetC、Computer ManagementD、Remote Assistance

考题 A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account

考题 You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

考题 You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.

考题 Your network consists of a single Active Directory domain named Contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You create an organizational unit (OU) that contains a computer account named Computer1.  A Group Policy object (GPO) is linked to the OU and contains settings to enforce the use of IPSec. You log on to Computer1 by using a user account named User1. You need to verify that the IPSec settings have been applied.  Which command should you run?()A、Dsquery user -name User1B、Dsquery computer -name Computer1C、Gpresult /s Computer1 /scope COMPUTER /vD、Gpresult /user User1 /scope USER /v

考题 单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A  Guest user accountB  Limited user accountC  Power user accountD  Administrator user account

考题 单选题You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two localuser accounts named User1 and User2. On Computer1, you run Scanstate.exe /all //server1/data /computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd //server1/data/computer1. You need toensure that User1 and User2 can log on to Computer2.  What should you do on Computer2?()A Enable all user accounts.B Modify the default password policy.C Modify the Allow log on locally user right.D Add User1 and User2 to the local Administrators group.

考题 单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A Instruct User1 to create a new user certificate on Computer2.B Instruct User1 to take ownership of the encrypted files on Computer2.C Instruct User1 to import the user certificate from Computer1 to Computer2.  D Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

考题 单选题A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A The file associations were not returned after the software was uninstalled.B The user is not opening the files correctly.C The uninstalled software has corrupted all the audio files on the computer.D The sound card is not properly configured.

考题 单选题A user in your company network needs to encrypt a folder that is on her Windows 2000 Professional computer. Her computer has two drives: Drive C and Drive D. The folder that needs to be encrypted is located on Drive D. When the user attempts to encrypt the folder, no option for encryption can be found in the folder properties. What should you do to enable the user to encrypt the folder? ()A Log on to her computer as an administrator, and then run the cipher/e command.B Instruct the user to run the chipper/e command.C Log on to her computer as an administrator, and then run the Secedit/enforce command.D Instruct the user to run the Secedit/enforce command.E Log on to her computer as an administrator, and then run the Convert d:/FS:NTFS command.

考题 单选题Which of the following components are used to convert alternating current produced in the generator windings to direct current?()A Armature and equalizerB Commutator and brushesC Rotor and interpolesD Field and exciter

考题 单选题How do you write the current candidate configuration to the permanent storage media?()A [edit] user@router# save /var/tmp/current.confB [edit] user@router# write /var/tmp/current.confC [edit] user@router# commit /var/tmp/current.confD [edit] user@router# dump /var/tmp/current.conf

考题 单选题Sandy works in Tron Electronics and uses a Windows 2000 Professional system to work on. Today she is visiting another department, and is using a Windows NT 4.0 system. She wants to print a document but is missing her printer. You want her to be able to print from any computer she logs in at. What can you do to insure that she has this ability?()A  Configure the server properties of printer system folder to connect to the shared printer. B Install a print driver for the print device on the Windows NT workstation computer. C Create a roaming user profile for Sandy D Upgrade the Windows NT 4 computer to a Windows 2000 Professional computer and then  import the file settings for Sandy's user account.

考题 单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()A Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 

考题 单选题You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You needto configure Computer1 so that only Administrators are authorized to shut down the computer.  What should you do?()A From User Accounts, modify the user profiles settings.B From User Accounts, modify the User Account Control (UAC) settings.C From the local computer policy, modify the Security Options.D From the local computer policy, modify the User Rights Assignment.

考题 多选题TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()ACreate a function that returns a list of values that represent the login times for the given user.BCreate a function that returns a list of values that represent the people who have logged more hours than the current user has logged.CCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current day.DCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current month.