网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()
- A、Safe Mode
- B、Automated System Recovery
- C、Last Known Good Configuration
- D、System Restore
参考答案
更多 “A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()A、Safe ModeB、Automated System RecoveryC、Last Known Good ConfigurationD、System Restore” 相关考题
考题
Which of the following would require real-time processing?( )A.Playing a computer gameB.Executing a program that predicts the state of economyC.Printing labelsD.Listening the music
考题
The program memory serves basically as a place(66)instructions, the coded pieces of data(67)direct the activities of the control processing unit(CPU). A group of(68)related in- structions stored in memory is referred to as a program. The CPU "read" each instruction from memory a logically(69)sequence and "use" it to initiate program action. If the program structure is coherent and(70), processing procedures produce intelligible and useful results.A.storedB.to storeC.to be storedD.storing
考题
A technician is dispatched to a malware infected system. Upon arrival, the technician notices themalware’s pop-up on the screen. Which of the following boot methods would the technician utilize?()
A. Reboot in Safe ModeB. Reboot in Recovery ConsoleC. Reboot in Last Known Good ConfigurationD. Reboot in System Debug Mode
考题
program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon
考题
Word processing software is used to creat edit,save and print (74)A.photosB.graphicsC.documentsD.spreadsheets
考题
The system is designed to be used in conjunction with a word processing program.A:together
B:in succession
C:in alliance
D:in connection
考题
Program(73)describes program's objectives, desired output, input data required, processing requirement, and documentation.A.specification
B.flowchart
C.structure
D.address
考题
( ), also called end-user program, includes database programs, spreadsheets, word processors etc.A. Application software
B. Utility software
C. System software
D. Compiler software
考题
Program( )describes program's objectives,desired output,input data required,processing requirement,and documentation.A.specification
B.flowchart
C.structure
D.address
考题
Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities.
A. existing database and application program
B. application program and user interface
C. existing database and user interface
D. existing database,application program and user interface
考题
With PGP, which of the following entity signs a users’s public key?()A、 The sender of the message.B、 The receipient of the message.C、 The sender’s administrator who provides the sender with the PGP program.D、 A third party that belongs to what’s often known as "web of trust", that can verify the relationship between the user and the key.E、 The vendor of the PGP program.
考题
A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()A、Perform an antivirus program scanB、Boot the machine into Safe ModeC、Remove the machine from the networkD、Check for system security patches
考题
A Windows XP system has been badly infected with malware. The technician notices that the malware is making repeated attempts to broadcast over the network from activity seen on the local firewall. Which of the following Windows XP startup options would be the SAFEST way to remove the malware?()A、Use the Safe Mode with Networking optionB、Use the Safe Mode optionC、Use the Enable Boot Logging optionD、Use the Last Known Good Configuration option
考题
An uninstalled program is still attempting to load when Windows starts. Which of the following options can the technician suggest to stop this unwanted program from loading?()A、ServicesB、Add or Remove ProgramsC、System Configuration UtilityD、System File Checker
考题
A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A、system /vB、winnt /sC、sfc /scannowD、chkdsk /f
考题
Which of the following is TRUE about the ate program?()A、When running ate for the first time it will prompt for all the required information and configure all the required devicesB、The program is used by cu to communicate to a remote systemC、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD、The program ate calls cu to communicate with the remote system
考题
A technician is dispatched to a malware infected system. Upon arrival, the technician notices themalware’s pop-up on the screen. Which of the following boot methods would the technician utilize?()A、Reboot in Safe ModeB、Reboot in Recovery ConsoleC、Reboot in Last Known Good ConfigurationD、Reboot in System Debug Mode
考题
A user’s OS has become corrupt, and the user would like to restore the PC back to when they first bought the machine. Which of the following would be the BEST choice?()A、Factory Recovery PartitionB、Use Safe ModeC、Last Known Good ConfigurationD、Purchase a copy of the original OS
考题
When a system has both online transaction processing as well as large batch processing, which of the following common procedures will best help to improve system performance?()A、 Boost the priority of batch jobs.B、 Schedule batch runs to reduce contention with OLTP.C、 Schedule OS maintenance such that it includes frequent application of PTFs.D、 Perform incremental backups of transaction processing and full backups of batch processing.
考题
You run the English (US) edition of Windows 2000 professional on your computer. You are developing a product installation document that has text in both English and Spanish. The word processing program you are using is a Windows 16-bit character-based application. You start theword processing program and complete the English Portion of the document. You then install Spanish as a language group by using Regional Options in Control Panel. However, You cannot use Spanish to complete the Spanish portion of your document. What should you do?()A、Change the language preference from English to Spanish within the word processing Program.B、Install the Spanish version of Windows 2000 Professional. Reconfigure your language settings, and restart the word processing program.C、Save and close the word processing program. Select Spanish by using the locate indicator on the taskbar, and restart the word processing program.D、Save and close the word program. Log off and log on to the computer. Restart the Word processing program, and select Spanish by using the locale indicator on the taskbar.
考题
You run the English (US) edition of Windows 2000 Professional on your home computer. You are writing a letter that will include text in both English and German. The word processing program you are using is a Windows 16-bit character-based document. You then install German language support by using Regional Options in Control Panel. However, you are unable to use German in your document. You want to be able to complete the German portion of the document with the least amount of administrative effort. What should you do?()A、Save the document and close the word processing program. Select German by using the locale indicator on the taskbar and restart the word processing program.B、Save the document and close the word processing program. Log off and log on to the computer. Restart the word processing program and select German by using the locale indicator on the taskbar.C、Install the German version of Windows 2000 Professional. Reinstall the word processing program.D、Change the language preference from English to German within the word processing program.
考题
单选题Which of the following is TRUE about the ate program?()A
When running ate for the first time it will prompt for all the required information and configure all the required devicesB
The program is used by cu to communicate to a remote systemC
The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD
The program ate calls cu to communicate with the remote system
考题
单选题With PGP, which of the following entity signs a users’s public key?()A
The sender of the message.B
The receipient of the message.C
The sender’s administrator who provides the sender with the PGP program.D
A third party that belongs to what’s often known as web of trust, that can verify the relationship between the user and the key.E
The vendor of the PGP program.
考题
单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A
system /vB
winnt /sC
sfc /scannowD
chkdsk /f
考题
单选题A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()A
Safe ModeB
Automated System RecoveryC
Last Known Good ConfigurationD
System Restore
考题
单选题What will be written to the standard output when the following program is run?() public class Qd803 { public static void main(String args[]) { String word = "restructure"; System.out.println(word.substring(2, 3)); } }A
estB
esC
strD
stE
s
考题
单选题A user’s OS has become corrupt, and the user would like to restore the PC back to when they first bought the machine. Which of the following would be the BEST choice?()A
Factory Recovery PartitionB
Use Safe ModeC
Last Known Good ConfigurationD
Purchase a copy of the original OS
热门标签
最新试卷