网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()
A

system /v

B

winnt /s

C

sfc /scannow

D

chkdsk /f


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A system /vB winnt /sC sfc /scannowD chkdsk /f” 相关考题
考题 software, also called end-user program, includes database programs, word processors, spreadsheets etc.A.ApplicationB.SystemC.CompilerD.Utility

考题 The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus

考题 An application software is any program(68)to perform. a specific function directly for the user or, in some cases, for another application program.A.designB.designingC.designedD.praticed

考题 A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A. Run chkdsk.B. Run an antivirus program.C. Replace the faulty mouse.D. Remove any recently added hardware.

考题 A recently installed package needs to be rolled back to aprevious version.Which of the following commands will perform the task?() A.rejectB.cleanupC.deinstallD.uninstall

考题 YouhaveanExchangeorganization.AllserversintheorganizationhaveExchangeServer2010ServicePack1(SP1)installed.AllusershaveWindowsMobile6.5devicesthatconnecttotheorganizationbyusingExchangeActiveSync.AusernamedUser1reportsthatshelostherdeviceandsuccessfullyperformedaremotewipeofthedevice.User1laterreportsthatshelocatedherdevice.User1configuresthedevicetoconnecttoExchangeActiveSyncanddiscoversthattheconnectionfails.YouneedtoensurethatUser1canconnectherdevicebyusingExchangeActiveSync.Whatshouldyoudo?()

考题 describes how to interact with the information system to accomplish specific tasks.A.System specificationB.Program specificationC.User guideD.System document

考题 When you create an account, you are typically asked to enter a user ID and ( ). A nameB requirementC passwordD program

考题 Hardware interrupts are triggered by______outside the microcontroller.A.user instructions B.peripheral devices C.kernel D.program

考题 Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. existing database and application program B. application program and user interface C. existing database and user interface D. existing database,application program and user interface

考题 A technician recently installed a new firewall. Which of the following ports must be open to permit HTTPS traffic?()A、21B、23C、80D、443

考题 Which device is installed in user devices and makes wireless connections between them and a network?()A、Access pointB、BridgeC、RouterD、Client adapter

考题 A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A、Run chkdsk.B、Run an antivirus program.C、Replace the faulty mouse.D、Remove any recently added hardware.

考题 A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing?()A、AdvertisementsB、Resource consumptionC、A trojan infectionD、Unremoved viruses

考题 Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()A、Log onto the user’s computer as a local administrator and install the printer.B、Make sure the user has permission to print to the printer.C、Create and implement a logon script.D、After the user has logged on, install the printer.

考题 A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()A、Safe ModeB、Automated System RecoveryC、Last Known Good ConfigurationD、System Restore

考题 A recently installed package needs to be rolled back to a previous version. Which of the following commands will perform the task?() A、rejectB、cleanupC、deinstallD、uninstall

考题 A system administrator is monitoring a system that has recently shown a decrease in performance. The administrator suspects there is an overload of traffic on a single Ethernet adapter. Which of the following commands is best to identify a possible overload of the Ethernet adapter?()A、pingB、iostatC、netstatD、ifconfig

考题 A system administrator is monitoring a system that has recently shown a decrease in performance.The administrator suspects that the system may be low on memory and may be paging excessively.Which of the following commands is best to identify a possible paging problem?()A、iostatB、netstatC、psD、vmstat

考题 An administrator just completed an AIX installation but suspects that not all filesets installed completely. Which of the following commands would verify that all filesets are completely installed?()A、installp -EB、lslpp -EC、lppchk -cD、instfix -c

考题 A base operating system has just been installed, successfully rebooted, and the user is now logged in as root. The user wants the server software bundle installed, but has additional software that must be installed with the bundle. Which of the following procedures should be performed to complete the installation?()A、Add the software to /usr/sys/inst.imagesB、Update the bundle file in /usr/sys/inst.imagesC、Install the bundle filelists and run update allD、Add the software to the bundle file in /usr/sys/inst.data/sys_bundles

考题 Core files required for user applications are stored in which of the following locations?()A、Program filesB、Temporary filesC、WindowsD、Documents and settings

考题 单选题A system administrator just completed an AIX installation but suspects that not all filesets installed completely. Which command should be run to verify that all filesets are completely installed?()A installpB lslppC lppchkD oslevel

考题 单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A system /vB winnt /sC sfc /scannowD chkdsk /f

考题 单选题MySQL is installed on a Linux server and has the following configuration: What is the purpose of changing ownership of datadir to the ‘mysql’ user?()A MySQL requires correct file ownership while remaining secureB MySQL needs to be run as the root user, but file cannot be owned by itC MySQL cannot be run as the root user

考题 单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has Terminal Server installed. You have a new multi-user application that you plan to install on the server. The setup program for the application is named setup.exe. You need to install the application on the server. You must ensure that the application can be used by all users. What should you do? ()A From the command prompt, run setup.exe.B From Add or Remove Programs, add a new program.C In Windows Explorer, use the Run As option to run setup.exe.D In Windows Explorer, use Compatibility mode to run setup.exe.

考题 单选题A technician recently installed a new firewall. Which of the following ports must be open to permit HTTPS traffic?()A 21B 23C 80D 443

考题 单选题A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing?()A AdvertisementsB Resource consumptionC A trojan infectionD Unremoved viruses