网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Operating systems provide ( ) between users and the computer.

A.a link

B.an interface

C.devices

D.applications


参考答案

更多 “ Operating systems provide ( ) between users and the computer.A.a linkB.an interfaceC.devicesD.applications ” 相关考题
考题 Most Computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP(). A.planB.requirementC.implementationD.design

考题 Some operating systems prefer a wireline ( ) over wireless because it is assumed to have more bandwidth and be more reliable, and some operating systems ( ) the user to define the preference order of the available interfaces.A.link B.chain C.connection D.fiber A.allow B.allowed C.allowing D.is allowing

考题 ● The (72) is a collection of modules serving as interface between hardware and software to provide a software platform.(72)A. computerB. processorC. application softwareD. operating system

考题 For users, microkernel technology promises(90), compact and sophisticated operating systems that are typically(91)across a range of hardware platforms. These operating systems will be customizable to let users run multiple operating system and application "personalities" on top of a single microkernel(92).Microkernel based systems can provide this flexibility because the core operating system functions are(93)from the large number of utilities, features and extensions that are layered on top of them. As a result, updating and maintaining operating system is easier, since developers don't have to modify the(94)every time they must acid a new feature.A.slowB.fastC.quicklyD.speed

考题 The(72)is a collection of modules serving as interface between hardware and software to provide a software platform.A.computerB.processorC.application softwareD.operating system

考题 Acts as an interface between computer hardware and users()。A.Operating systemB.Application softwareC.USBD.MODEM

考题 The kernel is the(66)of an operating system such as Windows98, Windows NT, Mac OS or Unix. The kernel provides basic services for the other parts of the operating system,(67)it possible for it to run several programs at once(multitasking), read and write files and connect to networks and peripherals. Applications and utility programs use the services provided by the kernel to provide practical business functionality.In operating systems such as Windows or most versions of Unix, the kernel(68)everything except application and utility programs.In microkernel operating systems such as Digital Unix and Apples forthcoming Mac OS Server, the kernel(69)supports only multitasking and memory management. Other services such as applications, utilities and the user interface support device drivers, API and graphics which all(70)outside the microkernel.A.nucleusB.centerC.coreD.heart

考题 An administrator receives reports from users in an office that their 802.11g wireless connectivityhas been problematic since the installation of the new wireless phone system.At which of the following frequencies are both systems operating at to cause this issue?()A.2.4GHzB.900MHzC.1.1GHzD.5GHz

考题 For users, microkernel technology promises(11), compact and sophisticated operating systems that are typically(12) across a range of hardware platforms.A.quicklyB.speedC.slowD.fast

考题 A socket is basically an end point of a communication link between two applications. Sockets that extend over a network connect two or more applications running on(61)computers attached to the network. A socket(62)two addresses:(63). Sockets provide a(64)communication channel between one or more systems.There are(65)sockets separately using TCP and UDP.A.uniqueB.separateC.sameD.dependent

考题 work(请作答此空),systems that effectively isolate an organization's internal network structure from an ( ) network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.A.safeguards B.firewalls C.routers D.switches

考题 In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权). An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources. In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.components B.users C.mechanisms D.algorithms

考题 “Those users boot up the new OS,they will recognize nothing”(in Para.2) is closest in meaning to ( ) A.those who use Windows are generally not good at using computers B.Apple’s OS is so different from Windows C.Windows is so good that other operating systems can hardly survive D.Windows has been enjoying a monopolistic position in operating system market

考题 What is the goal of the borderless network architecture?()A、to provide users with A single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies with A way to extend their security and control over employees on the internet

考题 What is the goal of the borderless network architecture?()A、to provide users withA single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies withA way to extend their security and control over employees on the internet

考题 An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?()A、2.4GHzB、900MHzC、1.1GHzD、5GHz

考题 A hypervisor has 4GB of RAM, 1TB of RAID 5 SATA storage,two Xeon 2.4GHz Quad CoreProcessors,and four gigabit NIC cards.The hypervisor is running twelve guest operating systems and users are reporting slow response times.Which of the following is MOST likely the cause?()A、ProcessorB、RAMC、HDDD、NIC

考题 Which of the following will allow multiple operating systems to run on one workstation?()A、FireWireB、KVMC、VirtualizationD、Terminal servers

考题 A company may use the Windows XP Professional MUI Pack because the company:()A、has offices where users who speak different languages share computers.B、wants to maintain multiple operating systems.C、has users who work remotely at home offices.D、wants to deploy and maintain a single operating system standard.

考题 What is a key ability of IBM Systems Director Enterprise Edition as compared to Standard Edition?()A、Manage multiple operating systems on a serverB、Manage energy consumption and network traffic to increase efficiencyC、Manage LPARs, operating systems and servers to reduce administrationD、Manage workloads across multiple servers to optimize resource utilization

考题 You need to design security changes that provide maximum protection for customer data and courier assignments.What should you do?()A、Create a separate domain for courier authenticationB、Implement smart card authentication for business office users and couriers, upgrading client operating systems as needed. Modify the Web kiosks to require smart card presence for continued accessC、Modify the Default Domain Policy Group Policy object (GPO) so that couriers must use complex user account passwords. Require all couriers to change their passwords the next time they log on to the Web applicationD、Use Encrypting File System (EFS) to encrypt all files that contain customer data

考题 Your computers have both Windows NT Workstation 4.0, and Windows 2000 Professional operating systems. You configure the hard disk on each computer to have two 4-GB partitions. Windows NT Workstation is installed on drive C, and Windows 2000 Professional is installed on drive D. You configure a disk quota on drive D to prevent users from saving data on the disk.  How can you prevent users from saving files to drive D in either operating system?()A、The required result cannot be obtained with the above given solutionsB、Enable EFS on DC、Format the NT 4 partition and reload NT 4D、Use NT 4.0 NTFS permissions to deny users write access to D

考题 单选题You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()A Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.

考题 单选题Your computers have both Windows NT Workstation 4.0, and Windows 2000 Professional operating systems. You configure the hard disk on each computer to have two 4-GB partitions. Windows NT Workstation is installed on drive C, and Windows 2000 Professional is installed on drive D. You configure a disk quota on drive D to prevent users from saving data on the disk.  How can you prevent users from saving files to drive D in either operating system?()A The required result cannot be obtained with the above given solutionsB Enable EFS on DC Format the NT 4 partition and reload NT 4D Use NT 4.0 NTFS permissions to deny users write access to D

考题 单选题The operating medium for control systems may be ().A compressed airB hydraulic oilC electricityD All of the above

考题 单选题Most Computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP().A planB requirementC implementationD design

考题 单选题What is the goal of the borderless network architecture?()A to provide users with A single device that permits access to information anywhereB to provide users with the same productivity and access to information no matter where are or which device they useC to eliminate the need for border security and firewallsD to provide companies with A way to extend their security and control over employees on the internet