网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A user has been having difficulty with their PC. Which of the following is the BEST response atechnician should give when a user asks for the definition of a particular bluescreen message?()

  • A、“It is a message that informs the technician of what hardware needs to be replaced.”
  • B、“A bluescreen message is just another name for an error.”
  • C、“It provides the technician with more information about the problem.”
  • D、“It is a complex message that is very difficult to explain to those who are not familiar with computers.”

参考答案

更多 “A user has been having difficulty with their PC. Which of the following is the BEST response atechnician should give when a user asks for the definition of a particular bluescreen message?()A、“It is a message that informs the technician of what hardware needs to be replaced.”B、“A bluescreen message is just another name for an error.”C、“It provides the technician with more information about the problem.”D、“It is a complex message that is very difficult to explain to those who are not familiar with computers.”” 相关考题
考题 All the money ______, Frederick started looking for work.A. having spentB. has been spentC. having been spentD. had been spent

考题 The project requires more labor than ____ because it is extremely difficult. A.has been putB.have been putC.being put inD.to.be put in

考题 An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits?()A. Implement an intrusion detection system (IDS).B. Implement a dual-factor authentication method.C. Implement a patch management process.D. Implement stronger user passwords.

考题 34.—It’s difficult for the village children to cross the river for school.— I think a bridge ___________over the river.A. was builtB. is being builtC. has been builtD. should be built

考题 This crop has similar qualities to the previous one, ________ both wind resistant and adapted to the same type of soil.A.being B.been C.to be D.having been

考题 This crop has similar quantities to theprevious one, ______ both wind-resistant and adapted to the same type of soil.A.being B.been C.to be D.having been

考题 A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

考题 A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()A、 getCreationTimeB、 invalidateAfterC、 getLastAccessedTimeD、 getMaxInactiveInterval

考题 All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

考题 Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A、After an unsuccessful rebootB、If a user’s IP address has been spoofedC、After using IPCONFIG /RELEASED、If the computer has an ARP address conflict

考题 An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()A、 Implement an intrusion detection system (IDS).B、 Implement a dual-factor authentication method.C、 Implement a patch management process.D、 Implement stronger user passwords.

考题 A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?()A、Document the solution and process.B、Establish the most probable cause.C、Implement and test the solution.D、Identify additional symptoms and problems

考题 A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.

考题 A user is browsing to a newly created internal site called www.comptia.org. After putting incredentials the page comes up blank. Which of the following is MOST likely the cause?()A、The user must add the new site to the local log file.B、A proxy exception has not been configured.C、SMTP has not been configured.D、The loopback address has not been configured.

考题 A server has been having a memory problem. What feature can be used to determine the failing memory module?()A、Reboot the serverB、RSA IIC、LightPath DiagnosticsD、ServerGuide

考题 单选题A rogue loose called a hacker could take control of the entire system by implanting his own instructions in the software and then he could program the computer to erase any sign ______ .A of his being ever thereB he ever has been thereC of his having ever been thereD of him having ever been there

考题 单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A The website has updated the security policies.B The user’s identity has been stolen.C The browser has been hijacked.D The user typed the website address incorrectly.

考题 单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A The user has a UID less than 200B The user has been defined as an administrative userC The file /usr/es/sbin/cluster/clpasswd is not executable by the userD The user needs explicit authorization to change their password cluster-wide

考题 单选题A user is browsing to a newly created internal site called www.comptia.org. After putting incredentials the page comes up blank. Which of the following is MOST likely the cause?()A The user must add the new site to the local log file.B A proxy exception has not been configured.C SMTP has not been configured.D The loopback address has not been configured.

考题 单选题The international situation has been growing _____ difficult for the last few years.A invariablyB presumablyC increasinglyD dominantly

考题 单选题_____ a lot of money made the study abroad possible for him.A Tom savedB Tom has savedC Tom's having been savedD Tom's having saved

考题 单选题(), the book has many mistakes.A Having not been written carefullyB Not writing carefullyC Having written not carefullyD Not having been written carefully

考题 单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A The wireless access point is using MAC address filteringB The user has connected to a nearby wireless access point from another officeC The user has configured the wireless settings with the wrong encryption typeD The wireless access point has SSID broadcast disabled

考题 单选题Having a _______ attitude towards people with different ideas is an indication that one has been well educated.A forgivingB bearableC compoundD tolerant

考题 单选题Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A After an unsuccessful rebootB If a user’s IP address has been spoofedC After using IPCONFIG /RELEASED If the computer has an ARP address conflict

考题 单选题Which of the following is correct according to the passage you have just heard?A Microsoft has been through a bruising battle with antitrust regulators.B Mr. Gates’s position as the industry’s figurehead has been challenged.C The computer industry is currently having a hard time.D Mr. Gates has earned 870 billion US dollars over the last two decades.

考题 填空题Having been badly damaged by the earthquake,the city has to be (rebuild) ____.