网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Why is it important to prevent the abuse of computer data bands?
A

To protect the right of the individual.

B

To maintain discipline in society.

C

To encourage economic and social research.

D

To collect wide-ranging information.


参考答案

参考解析
解析:
从第二段中的but they are bought at too high a price if they endanger human freedom or seriously enhance their opportunities of blackmailers可知,防止计算机数据库被滥用是基于对“human freedom”的考虑,即保护个人权利(right of the individual)。因此,A项为正确答案。
更多 “单选题Why is it important to prevent the abuse of computer data bands?A To protect the right of the individual.B To maintain discipline in society.C To encourage economic and social research.D To collect wide-ranging information.” 相关考题
考题 The emphasis on data gathered first-hand, combined with a cross-cultural perspective brought to the analysis of cultures past and present, makes this study a unique and distinctly important social science.

考题 Which of the following helps protect important confidential information from being publiclydisclosed?() A. Hard drive wipingB. Social EngineeringC. ClassificationD. RAS server

考题 Why do hoatzins collect together in smaller groups when the rainy season comes?A.To find more food.B.To protect themselves better.C.To keep themselves warm.D.To produce their young.

考题 The topic of the passage is that __.A.the control of population is essential to the development of a nationB.natural resources are important to the economic development of a countryC.awareness of the effects of man's actions is as important as population controlD. developed countries should do more to protect natural environment on the earth

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 ()is not a physical wall but a flow virtual data to protect the computer network.A、data wallB、data channelC、databaseD、firewall

考题 ()is not a physical wall, but a lot of virtual data to protect the computer network. A、Data wallB、Data ChannelC、Data baseD、firewall

考题 () is not a physical wall, but a lot of virtual data to protect the computer network.A、Date wallB、Date channelC、DatabaseD、Firewall

考题 Which of the following helps protect important confidential information from being publiclydisclosed?()A、Hard drive wipingB、Social EngineeringC、ClassificationD、RAS server

考题 Which of the following best describes how locks are used in DB2?()A、To maintain control of updated rows for commit processingB、To ensure only committed changes are altered by another applicationC、To allow two applications to update the same row of data simultaneouslyD、To prevent multiple applications from accessing the same data simultaneously

考题 You are the administrator of Redington Incorporation. Your optical disks are managed by one of your assistants named Jane and she is having a problem with one application failing to get requested information. You ask her to show you some history on the operation. Where will Jane find the information you want?()A、Under Administrative Tools, click on Performance. From Performance Logs and Alerts, view  the Alerts.B、Right click My Computer, Manage, Storage, Removable Storage, Work Queue. C、Right click My Computer, and under System Tools, click on System Information. Expand  Software Enironment. Double click on Running Tasks.D、Right click My Computer, and under System Tools, click on Event Viewer, then Application.  Click on the Source column to sort the application data.

考题 You have a computer that runs Windows XP Professional. The computer is configured as a Simple Network Management Protocol (SNMP) agent and is monitored by an SNMP management server.  You install Windows XP Professional Service Pack 2 (SP2) and Windows Defender on the computer. You discover that the SNMP management server can no longer collect SNMP data from the computer. You need to ensure that the SNMP management server can collect data from the Windows XP Professional computer.  What should you do?()A、Reinstall the SNMP.B、Perform a Windows Update.C、Uninstall Windows Defender. D、Create an exception in Windows Firewall. 

考题 A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()A、Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.B、Uninstall the payroll software to ensure confidentiality.C、Have the director remove sensitive data before the computer will be repaired.D、Perform needed repairs while avoiding sensitive data.

考题 单选题Parents and children often disagree about what is important or right because _____.A they have different styles of lifeB they hate each otherC parents think that their children are troublemakersD they are in a society of rapidly changing social and moral values

考题 单选题Why is QoS important in a converged network?()A Because data does not need to arrive intact, so data transfer rates can be variableB Because lost voice-data packets must be retransmittedC Because voice data packets should arrive quickly and sequentially, and with no lost dataD Because voice data packets must follow a single dedicated path through the network

考题 单选题Your company has an Active Directory domain. All consultants belong to a global group named  TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named  SecureServers. These file servers contain only confidential data in shared folders.    You need to prevent members of the TempWorkers group from accessing the confidential data  on the file servers. You must achieve this goal without affecting access to other domain  resources.     What should you do()A Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this computer froB Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network user right toC Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global gD Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locally user right to

考题 单选题Which of the following best describes how locks are used in DB2?()A To maintain control of updated rows for commit processingB To ensure only committed changes are altered by another applicationC To allow two applications to update the same row of data simultaneouslyD To prevent multiple applications from accessing the same data simultaneously

考题 单选题Your company has an Active Directory domain. All consultants belong to a global group named   TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named SecureServers.   These file servers contain only confidential data in shared folders.   You need to prevent members of the TempWorkers group from accessing the confidential data on the file  servers. You must achieve this goal without affecting access to other domain resources.   What should you do()A Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this  computer from the network user right to the TempWorkers global group.B Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network  user right to the TempWorkers global group.C Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the  TempWorkers global group.D Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locallyuser right to the TempWorkers global group.

考题 单选题Why would a network administrator configure port security on a switch?()A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 单选题A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()A Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.B Uninstall the payroll software to ensure confidentiality.C Have the director remove sensitive data before the computer will be repaired.D Perform needed repairs while avoiding sensitive data.

考题 单选题Why is it important to prevent the abuse of computer data bands?A To protect the right of the individual.B To maintain discipline in society.C To encourage economic and social research.D To collect wide-ranging information.

考题 单选题The most important principle in the stowage is().A to ensure the safety of the ship and protect the cargo from being damagedB to avoid the rearrangement of the cargo loaded on boardC to reject the damaged cargo during loadingD to prevent the spontaneous combustion of coal and grain

考题 单选题()is not a physical wall, but a lot of virtual data to protect the computer network.A Data wallB Data ChannelC Data baseD firewall

考题 单选题() is not a physical wall, but a lot of virtual data to protect the computer network.A Date wallB Date channelC DatabaseD Firewall

考题 单选题You have a computer that runs Windows XP Professional. The computer is configured as a Simple Network Management Protocol (SNMP) agent and is monitored by an SNMP management server.  You install Windows XP Professional Service Pack 2 (SP2) and Windows Defender on the computer. You discover that the SNMP management server can no longer collect SNMP data from the computer. You need to ensure that the SNMP management server can collect data from the Windows XP Professional computer.  What should you do?()A Reinstall the SNMP.B Perform a Windows Update.C Uninstall Windows Defender. D Create an exception in Windows Firewall. 

考题 单选题You have a computer that runs Windows 7 Professional. A removable drive is attached to the computer.You need to protect data on the removable drive by using BitLocker To Go.  What should you do first? ()A Upgrade the computer to Windows 7 Enterprise.B Install all Windows Updates for Windows 7 Professional.C Issue a digital certificate for the Encrypting File System (EFS).D Select the Encrypt contents to secure data checkbox from the properties on the removable drive.

考题 单选题In American economy, the basic role of the federal government is _____.A to levy taxes on any businessB to issue money for economyC to set up banking and control money supplyD to improve markets and protect each economic element from abuse

考题 单选题A consultant has been asked to do a performance analysis on a database server.  Which subsystem should the consultant first analyze and why?()A CPU,because the database replication process requires a considerable amount of CPU timeB Memory,because the buffer cache requires a large amount of memory to maintain the data in system memoryC Disk,because it is important to configure a sufficient number of disks to match the CPU processing powerD Network,because the data returned to the client from the server can be a large subset of the total database