网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
The computer system()suddenly while he was searching for information on the Internet.

Abroke down

Bbroke out

Cbroke up

Dbroke in


参考答案

参考解析
更多 “The computer system()suddenly while he was searching for information on the Internet.Abroke downBbroke outCbroke upDbroke in” 相关考题
考题 上周他被指控闯入电脑系统。He the computer system last week.

考题 Since RAM is only active when the computer is on, your computer uses disk to store information even when the computer is off. Which of the following is true?(74).A.When your computer is on, only RAM is used to store information.B.When your computer is on, only disk drives are used to store information.C.When your computer is off, only RAM is used to store information.D.When your computer is off, only disk drives are used to store information.

考题 There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist

考题 A(n) ______ is a destructive program that fills a computer system with self-replicating information,clogging the system so that its operations are slowed or stopped.A.wormB.macroC.CIHD.Trojan

考题 The computer system broke out suddenly while he was searching for ination on the Internet.() 此题为判断题(对,错)。

考题 The smallest unit of information in a computer system is called a(72)A.BitB.ByteC.blockD.file

考题 While most recent attention in the AI field has been focused on expert system software, AI(66)has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major professional and engineering workstations, and the personal computer emerging as a(67). tool for expert system development. The next few years will see this technology evolves further.Because the(68)of an AI computer represents a sizable investment, companies should carefully(69)all options that are available as well as have a good idea of what the next generation of systems will offer in order to(70)the optimum system. This publication provides the information necessary to gain this understanding.A.choiceB.readC.importantD.softwareE.hardware

考题 The term computer describes a device made up of a combination of electronic and electromechanical components. By itself, a computer has no( )and is referred to as hardware, which means simply the physical equipment. The hardware cant be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system, hardware, software, data/information, people, procedures and communications. A system is defined as a collection of related components that( )to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees) with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( )Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to( )their information systems, in, response to new marketing opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.information B.software C.intelligence D.dataA.interact B.work C.connect D.changeA.improved B.better C.good D.bestA.decision B.need C.standard D.objectiveA.modify B.replace C.changeD.transfer

考题 The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications. A system is defined as a collection of related components that ( ) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to (5 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design. (5)应选( )。 A. modify B. replace C. Change D. transfer

考题 The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.interact B.work C.connect D.change

考题 The thief dispersed the papers all over the room while he was searching for the money.A:abandoned B:vanished C:scattered D:desejied

考题 共用题干 HackingPeople tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place. Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?A: Deleting information in the computer's memory.B: Shutting down the computer whenever he wishes.C: Entering your house to steal.D: Spoiling a system for air traffic.

考题 共用题干 HackingPeople tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place. The writer mentions“a thief"” in the second paragraph______.A: to show that a hacker is more dangerous than a thiefB: to tell people that thieves like to steal computers nowadaysC: to demand that a protective computer system should be set up against thievesD: to demonstrate that hackers and thieves are the same people

考题 He's responsible()the central computer system.A、inB、forC、of

考题 You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?() A、On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. B、On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. C、In the domain, modify Marc's Logon Workstations list to include the name of the computer.D、In the domain, modify Marc's account properties to unlock the account. 

考题 A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A、Application logB、File Replication logC、System logD、Security log

考题 You are the administrator of Redington Incorporation. Your optical disks are managed by one of your assistants named Jane and she is having a problem with one application failing to get requested information. You ask her to show you some history on the operation. Where will Jane find the information you want?()A、Under Administrative Tools, click on Performance. From Performance Logs and Alerts, view  the Alerts.B、Right click My Computer, Manage, Storage, Removable Storage, Work Queue. C、Right click My Computer, and under System Tools, click on System Information. Expand  Software Enironment. Double click on Running Tasks.D、Right click My Computer, and under System Tools, click on Event Viewer, then Application.  Click on the Source column to sort the application data.

考题 You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

考题 A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

考题 Your computer is unable to support some display features of Microsoft Windows Aero. You need to check the graphics component rating of the computer.  Which Control Panel option should you use? ()A、Programs  Programs and FeaturesB、Appearance and Personalization  Ease of Access CenterC、System and Maintenance  Problem Reports and SolutionsD、System and Maintenance  Performance Information and Tools/

考题 单选题He's responsible()the central computer system.A inB forC of

考题 单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A Control Panel  Data Sources (ODBC).B Control Panel  System Tools  Shared Folders.C Computer Management  System Tools  System Information.D Computer Management  System Tools  Shared Folders  Open Files.E Computer Management  System Tools  Shared Folders  Sessions.F Computer Management  System Tools  Shared Folders  Shares.

考题 单选题The computer system()suddenly while he was searching for information on the Internet.A broke downB broke outC broke upD broke in

考题 单选题Stephen Smith feels thatA the security of information on the network used to be a worry.B all the data should be stored on the same system.C the company’s computer-based information is well-protected.

考题 单选题A A new computer system was installed.B Information was entered into the computer system correctly.C Some employee information got lost.D Paychecks were distributed for the wrong amount.

考题 单选题The police ______ the murderer everywhere when he suddenly appeared in a theatre.A is searching forB are searching forC were searching forD was searching for

考题 单选题You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has notentered sleep mode. You need to identify what is preventing the computer from entering sleep mode.  What should you do?()A At a command prompt, run Powercfg energy.B At a command prompt, run Systeminfo /s localhost.C From Performance Monitor, review the System Summary.D From Performance Information and Tools, review the detailed performance and system information.