网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Ten years ago, smaller companies did not use large computers because _____.
A
these companies had not enough money to buy such expensive computers
B
these computers could not do the work that small computers can do today
C
these computers did not come onto the market
D
these companies did not need to use this new technology
参考答案
参考解析
解析:
根据第一段第二句“Before that time, large computers were only fixed by large, rich companies that could afford the investment.”可知,小公司不用大型电脑是因为其费用太高。
根据第一段第二句“Before that time, large computers were only fixed by large, rich companies that could afford the investment.”可知,小公司不用大型电脑是因为其费用太高。
更多 “单选题Ten years ago, smaller companies did not use large computers because _____.A these companies had not enough money to buy such expensive computersB these computers could not do the work that small computers can do todayC these computers did not come onto the marketD these companies did not need to use this new technology” 相关考题
考题
Computers can do () work in a short time, but a man can not do () by himself.
A.great many…manyB.a great deal of…muchC.much…a great dealD.many…a great many
考题
This is not the world we know. This world is controlled by computers. Men and women can be seen, but they are following the orders given to them by machines. The machines were designed by mad scientists, but at some point even the mad scientists were taken over by their super-inventions.Does this sound familiar? You have probably read something like it in magazines or books, or seen it in a film. Why is it so popular? One of the reasons is that it reflects the fears of many people; fear of the unknown fear of what is not understood or, at least, fear of something that is not completely understood.The fact is that every day it seems that computers take control of another area of our lives. Somefactory jobs are now done by robots and the robots are controlled by computers. Our bank accounts are managed by computers. At the airport, our tickets are sold by a computer. Certainly, many of these operations are made moreefficient by computers, but our admiration is sometimes mixed with unsafe feelings. And this lack of safety is caused by the fact that we do not know how computers do these things, and we really don't know what they might do next. But we can find out how computers work, and once we understand them, we can use computers instead of worrying about being used by them. Today, there is a new generation of computer wizards who know exactly how computers get things done. These young men and women, usually university students, are happy to sit for hours, sometimes for days, designing programs, not eating, not sleeping, but discovering what can be done by these wonderful slaves which they have learned to control. These computer wizards have learned to use the computer and search for new tasks for their machines.(1)、According to the passage, our present world is under the control of ______ .A:mad scientistsB:men and womenC:the unknown fearD:some super-inventions(2)、The reason why many people are afraid of computers is that ______ .A:they don't know anything about computersB:they haven't really understood computersC:there are so many computer gamesD:computers are often down(3)、The author mentions computer wizards in order to point out that ______ .A:computers can be controlled by manB:there should be more people devoted to computersC:only young people are interested in computersD:more time and energy is required to control computers(4)、This passage is probably written to suggest that ______ .A:some day computers can deal with all human problemsB:computers can be used in place of traveling to our jobsC:people should not fear computersD:computer technology will not meet people's needs in various situations(5)、The author's attitude towards widely used computers is __.A:positiveB:anxiousC:worriedD:serious
考题
Today, several advances in computer network technology are helping companies to extend the use of computers to the procurement, production and distribution processes.
考题
You want to install Windows 2000 Professional on 20 new PXE compliant computers, which do not have operating systems installed. You create a RIS image and load the image onto the RIS server and then start the new computers. You find that the new computers cannot connect to the RIS server. You verify that existing client computers on the network can connect to network servers.What should you do? (SELECT AND PLACE)
考题
Modern computers based on ( ) are millions to billions of times more capable than the early computers, which occupy a fraction of the space. Simple computers are small enough to fit into mobile devices, an mobile computers can be powered by small batteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as ‘computers’.A.Central Processing UnitB.integrated circuitsC.Hard diskD.software integration
考题
A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A. Install anti-virus software on the student computers.B. Put the faculty computers in a separate VLAN.C. Power down the switches that connect to faculty computers when they are not in use.D. Remove the student computers from the network and put them on a peer-to-peer network.E. Create an access list that blocks the students from the Internet where the hacking tolls are located.
考题
Modern computers based on() are millions to billions of times more capable than the early machines,and occupy a fraction of the space。Simple computers are small enough to fit into mobile devices, a mobile computers can be powered by small batteries. Personal computers in their va
A.Central Processing unit
B.integrateD.circuits
C.HarD.disk
D.software integration
考题
共用题干
第二篇The next big breakthrough in artificial intelligence could come from giving machines not just more logical capacity,but emotional capacity as well.Feeling aren't usually associated with inanimate(无生命的)machines, but Posalind Picard, a professor of computer technology at MIT,believes emotion may be just the thing computes need to work effectively.Computers need artificial emotion both to understand their human users better and to achieve self-analysis and self-improvement,says Picard."If we want computers to be genuinely intelligent,to adapt to us,and to interact naturally with us,then they will need the ability to recognize and express emotions,to have emotions,and to have what has come to be called emotional intelligence,"Picard says.One way that emotions can help computers,she suggests,is by helping keep them from crashing. Today's computers produce error messages,but they do not have a "gut feeling" of knowing when something is wrong or doesn't make sense.A healthy fear of death could motivate a computer to stop trouble as soon as it starts.On the other hand, self-preservation would need to be subordinate to service to humans.It was fear of its own death that promoted RAL,the fictional computer in the film 2002 :A Space Odyssey, to extermine(消灭)most of its human associates.Similarly,computers that could"read"their users would accumulate a store of highly personal information about us一not just what we said and did,but what we likely thought and felt."Emotion not only contribute to a richer quality of interaction,but they directly impact a person's ability to interact in an intelligent way,"Picard says."Emotional skills,especially the ability to recognize and express emotions,are essential for natural communication with humans." According to Picard,emotion intelligence is necessary to computers because_________.A:it can make computers analyze the information more efficientlyB:it can help to eliminate the computrs' innate problemsC:it can improve the mechanic capacity of computersD:it can make computers achieve a better understanding of human users
考题
Your company has servers that run Windows Server 2008. All client computers run Windows XP Service Pack 2 (SP2). Windows 2003 Professional, or Windows Vista. You need to ensure all computers can use the IPv6 protocol. What should you do()A、Install Serivce Pack 4 on all Windows 2000 Professional computersB、Upgrade the Windows 2000 professional computers to Windows XP SP2C、Run the IPv6.exe tool on the Windows 200 Professional and Windows XP computersD、Install Active Directory Client extention (DSClient.exe) on the Windows 2000 Professional and Windows XP computers.
考题
You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()A、Configure all portable computers to cache user credentials locally.B、Ensure that all users of portable computers log on to the network at least once before working offline.C、In all portable computers, rename Ntuser.dat to Ntuser.man.D、For all portable computers, configure the Loopback policy setting.
考题
Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet. You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months. You need to plan the most efficient method for activating all of the computers. What should you do?()A、 Use the Key Management Service (KMS) for all the computers.B、 Use Multiple Activation Key (MAK) Independent for all the computers.C、 Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.D、 Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.
考题
You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.B、Use security templates to create a security template file and import the security settings to modify the default security settings.C、Use the local computer policy to disable the access to this computer from the network option.D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.
考题
You are the network administrator for ExamSheet. Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers. What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.
考题
You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk. Computers in all three types of location use the same hardware. Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security. Branch office computers must use BitLocker Drive Encryption. You have the following requirements:Create deployment images. Minimize image maintenance. You need to define an image-creation strategy that meets the requirements. What should you do?()A、Create a single image to use for the main office computers and the branch office computers, and apply the requiredsettings through Group Policy. Create a separate image to use for the kiosk computers.B、Create one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image.C、Create a single image to use for all location types. Create a custom Windows security template for each location type.D、Create a single image to use for the branch office computers and the kiosk computers.Create a separate image to use for the main office computers.
考题
You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A、Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B、Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C、Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D、Configure the IP properties of the portable computers so that they have an alternate configuration.
考题
单选题According to the writer, the main feature of the revolution in office work over the last ten years is _____.A
the saving of time and moneyB
the use of computers in small companiesC
the wide use of word processorsD
the decreasing number of secretaries
考题
问答题Passage 1 There was a time 1 parents who wanted an educational present for their children would buy a typewriter, a globe or an encyclopedia set. Now those 2 seem hopelessly old-fashioned: this Christmas, there were a lot of personal computers under the tree. Convinced that computers are their key 3 success, parents are also frantically insisting that children 4 taught to use them on school as early as possible. The problem for schools is that when 5 comes to computers, parents don't always know best. Many schools are yielding to parental impatience and are purchasing hardware 6 sound educational planning so they can say, "OK, we've moved into the computer age." Teachers found themselves 7 in the middle of the problem--between parent pressure and wise educational decisions. Educators do not even agree 8 how computers should be used. A lot of money is going for computerized educational materials that research has shown can be taught just as well 9 pencil and paper. Even those 10 believe that all children should have access to computers warn of potential dangers to the very young. The temptation remains strong largely because young children adapt so well 11 computers. First graders have been seen willing to work for two hours on math skills. Some have an attention span of 20 minutes. Not every school, 12 , can afford to go into computing, and that 13 yet another problem: a division between the haves and have-nots. Very few parents ask 14 computer instructions in poor school districts, in 15 there may be barely enough money to pay the teacher.
考题
单选题Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()A
Configure the IPv6 protocol on the Windows 7 computers.B
Configure the network shares on the Windows 7 computers to include the user names of all employees.C
Configure the network shares on the Windows XP computers to include the user names of all employees.D
Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.
考题
单选题Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet. You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months. You need to plan the most efficient method for activating all of the computers. What should you do?()A
Use the Key Management Service (KMS) for all the computers.B
Use Multiple Activation Key (MAK) Independent for all the computers.C
Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.D
Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.
考题
单选题A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()A
Install anti-virus software on the student computers.B
Put the faculty computers in a separate VLAN.C
Power down the switches that connect to faculty computers when they are not in use.D
Remove the student computers from the network and put them on a peer-to-peer network.E
Create an access list that blocks the students from the Internet where the hacking tolls are located.
考题
单选题You are the network administrator for ExamSheet. Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers. What should you do?()A
On the research computers use the Local Computer Policy to disable theAccess this computer from the networkoption.B
Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C
Add the users of the research computers to the Power Users group on each computer.D
On the research computers configure the security settings to prevent anonymous access.
考题
单选题You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()A
Configure all portable computers to cache user credentials locally.B
Ensure that all users of portable computers log on to the network at least once before working offline.C
In all portable computers, rename Ntuser.dat to Ntuser.man.D
For all portable computers, configure the Loopback policy setting.
考题
单选题You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk. Computers in all three types of location use the same hardware. Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security. Branch office computers must use BitLocker Drive Encryption. You have the following requirements:Create deployment images. Minimize image maintenance. You need to define an image-creation strategy that meets the requirements. What should you do?()A
Create a single image to use for the main office computers and the branch office computers, and apply the requiredsettings through Group Policy. Create a separate image to use for the kiosk computers.B
Create one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image.C
Create a single image to use for all location types. Create a custom Windows security template for each location type.D
Create a single image to use for the branch office computers and the kiosk computers.Create a separate image to use for the main office computers.
考题
单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A
Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B
Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C
Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D
Configure the IP properties of the portable computers so that they have an alternate configuration.
考题
单选题The computers made by our company sell best, but several years ago no one could have imagined the role in the markets that they _____.A
were playingB
were to playC
have playedD
played
考题
单选题You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. The application is successfully installed on the 740 out of 750 computers. The ten computers are unable to install the application what should you do to install that application on all the computers in the sales OU.What should you do?()A
Repackage and re-deploy the application's .msi file to the Sales OUB
Repackage and re-deploy the application's .mst file to the Sales OUC
Re-deploy the application by using the Group Policy object (GPO for the Sales OU)D
Restart Windows Installer service on the ten computers.
考题
单选题Which of the following statements is NOT true? _____A
There are both advantages and disadvantages in using a word professor.B
The British companies care much for the health of the people using word processors.C
The technology in the field of computers has been greatly advanced over the last ten years.D
Using world processors, secretaries can get more time to do more interesting work for their bosses.
热门标签
最新试卷