网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
This kind of computer is_____handling all kinds of information.
A
capable to
B
able to
C
capable of
D
able of
参考答案
参考解析
解析:
更多 “单选题This kind of computer is_____handling all kinds of information.A capable toB able toC capable ofD able of” 相关考题
考题
A hospice is an institution that ( ) .
A、receives all kinds of patientsB、helps people lives as fully and comfortably as possibleC、aims to meet all needs-physical, emotional, social and spiritualD、supports and cares for people who are facing the end of life
考题
This old building has () all kinds of weather.
A. been exposed toB. exposed toC. been exposed onD. exposed on
考题
Dry powder is used to put out ________A.electrical fireB.oil fireC.common firesD.all kinds of fires
考题
There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist
考题
The scientist tried out all kinds of materials and found that ( ) satisfied him.
A、nothingB、noneC、noD、much
考题
Everything was white and I remembered _____ all kinds of ladies dressed up in funny white things with all their hair covered with some sort of cloth.A:seeingB:seeC:to seeD:seen
考题
We now know that about ____ of all the kinds of seaweed are animals.A: one fourB: once fourC: once fourthD: one fourth
考题
-- Thank you for your help. -- ____________.A. All rightB. That's all rightC. That's rightD. It's very kind of you
考题
All the decorations in the tree ()to the this kind girl.
A、is belongingB、belongC、belongsD、are belonged
考题
Remote administration types are an example of one kind of(71)malicious software, the Trojan horse, or more simply Trojan. The purpose of these programs isn't replication,(72)to penetrate and control. That masquerade as one thing when in fact they are something else, usually something destructive. There are a number of kinds of Trojans, including spybots, (73) report on the Web sites a computer user visits, and keybots or keyloggers, which record and report the user's keystrokes in order to discover passwords and other confidential information.RATS attempt to give a remote intruder administrative control of an infected computer. They work as(74)pairs. The server resides on the infected machine, while the client resides elsewhere, across the network, where it's available to a remote intruder. Using standard TCP/IP or UDP protocols, the client sends instructions to the server. The server does(75) it's told to do on the infected computer.A.nonviralB.unviralC.inviralD.abviral
考题
The requirements of the ISM Code may be applied toA.only oil tankersB.only passenger shipsC.only containersD.all kinds of ships
考题
A ______ computer is a personal computer whose hardware is capable of using any or all of the following media in a program, text, graphics, video and animation.A.databaseB.multimediaC.networkD.mainframes
考题
is one kind of software absolutely necessary for every computer.A.Operating SystemB.Word processingC.KeyboardD.Center Processing Unit
考题
I like all kinds of fruit,but my __________is banana.A.favoriteB.favoredC.favorableD.preferred
考题
Comco, Inc. became the leading supplier of computer ___last year, less than ten years after it was founded.A. amounts
B. types
C. kinds
D. parts
考题
The Supreme Court has original jurisdiction in()A、all kinds of casesB、two kinds of casesC、cases involving foreign citizensD、cases involving a state
考题
You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel Data Sources (ODBC).B、Control Panel System Tools Shared Folders.C、Computer Management System Tools System Information.D、Computer Management System Tools Shared Folders Open Files.E、Computer Management System Tools Shared Folders Sessions.F、Computer Management System Tools Shared Folders Shares.
考题
You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?() A、For all files, deny the Take ownership permission to the Everyone group. B、From the Local Security Policy, modify the Encrypting File System (EFS) properties.C、From the Certificates snap-in, delete the recovery agent certificate. D、From the Certificates snap-in, delete all trusted root certification authority (CA) certificates.
考题
Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer: All system and program settings All users settings Only the content in the C:///Appdata folder Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard
考题
单选题This kind of computer is_____handling all kinds of information.A
capable toB
able toC
capable ofD
able of
考题
单选题There is something wrong with our radar.All kinds of objects can’t be clearly()within the definite range.A
shownB
expressedC
appearedD
displayed
考题
单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7. You have the following requirements:Migrate the user state for each user. Preserve the file system and existing applications for only the sales department computers. You need to recommend the deployment method that is appropriate for the environment. Which combination of deployment scenarios should you recommend?()A
Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B
Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C
Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D
Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.
热门标签
最新试卷