网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
On the Internet, users can share( )and communicate with each other.
A.process B.tasks C.resources D.documents
参考答案
更多 “ On the Internet, users can share( )and communicate with each other.A.process B.tasks C.resources D.documents ” 相关考题
考题
●A user interface can be defined as the combination of hardware and software that helps people and computers (72) with each other.(72) A.intercourseB.intercommunionC.communicateD.intercommunicate
考题
Which of the following statements about internet is (are) correct?Ⅰ.Each host in internet only has a IP address.Ⅱ.It is possible to have multiple names corresponding to the same IP address.Ⅲ.In users' points, Internet means a virtual network.A.NoneB.Ⅰ and ⅡC.Ⅱ and ⅢD.All
考题
How wonderful it would be if human being can live in___ peace with each other.
A.theB.aC.anD./
考题
● OSI is a theoretical model that shows how any two different systems can communicate with each other.Router, as a networking device, operate at the (71) layer of the OSI model.(71)A.transportB.applicationC.networkD.physical
考题
OSI is a theoretical model that shows how any two different systems can communicate with each other. Router, as a networking device, operate at the ______ layer of the OSI model.A.transportB.applicationC.networkD.physical
考题
( )is the extension of internet connectivity into physical devices 3nd everyday objects.Embedded with electronicsjntemet connectivity and other forms of hardware(such as sensors),these devices can communicate and interact with others over the Internet,and they can be remotely monitored and controlled.A.Cloud Computing
B.Internet of things
C.Block Chain
D.Artificial intelligence
考题
( )is the extension of internet connectivity into physical devices and everyday objects. Embedded with electronics, internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlledA.Cloud Computing
B.Internet of Things
C.BIock Chain
D.Artificial Intelligence
考题
Which three statements about the secure domain router are true?()A、The logical router can span across chassis.B、The fabric and system controller module are shared by all logical routers.C、Each logical router has a distinct fabric and system controller moduleD、The logical router can share a route processorE、The logical router cannot share a route processor
考题
Which of the following is true about the following share access properties? ()A、 +managers will be resolved as a Winbind group. B、 The timo and taki users can manipulate files regardless of the file system permissions. C、 +managers will be resolved as a Unix group. D、 +managers is a builtin default Samba group. E、 The "admin users" can be applied only to print shares.
考题
A customer has multiple application servers which create one process for each connected user. All users share the same AIX environment. What is a benefit of using WPARs in this environment?()A、WPARs give more controls for resource management than the traditional AIX operating system tools.B、WPARs support Live Application Mobility which can be used to balance user processes acrosssystems.C、WPARs each have a copy of the AIX kernel, offering better availability than a system without WPARs.D、WPARs provide the ability to apply fixes specific for each environment, enabling the customer to create specialized application servers.
考题
Your network contains multiple computers that run Windows XP Professional. Multiple users share the computers. You need to ensure that users can switch their keyboard layouts between multiple languages. What should you do?() A、Install the Multilingual User Interface (MUI) pack.B、From Internet Explorer, modify the Language Preferences.C、From the Keyboard settings, update the driver for the keyboard. D、From Regional and Language Options, modify the Text services and input languages settings.
考题
You share your computer with other users. You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users. What should you do?()A、Uninstall the new Windows Internet Explorer add-on.B、Log on as an administrator and disable the new Windows Internet Explorer add-on.C、Direct other users to log on and disable the new Windows Internet Explorer add-on.D、Select the Turn off Automatic Website Checking option for the Phishing filter.
考题
Which of the following describe private IP addresses?()A、Addresses chosen by a company to communicate with the Internet.B、Addresses that cannot be routed through the public Internet.C、Addresses that can be routed through the public Internet.D、A scheme to conserve public addresses.E、Addresses licensed to enterprise or ISPs by an Internet registry organization.
考题
What is the purpose of assigning an IP address to a switch?()A、Provides local hosts with a default gateway addressB、Allows remote management of the switch.C、Allows the switch to respond to ARP requests between two hostsD、Ensures that hosts on the same LAN can communicate with each other.
考题
You have an Exchange Server 2010 organization that contains 1,500 mailboxes.The Average size of each mailbox is a 750 MB.All users run either Microsoft Office Outlook 2010 or Outlook Web App to access their e-mail.All users who run Outlook 2010 are configured to use Cached Exchange Mode.You need to configure a mailbox solution for the organization to meet the following requirements: (1)Ensure that administrators can search and find any message (2)Reduce the size of the offline store (OST) for each user (3)Provide access to all e-mail messages by using either Outlook 2010 or Outlook Web App What should you do?()A、Create a Personal Archive for each user and then create a retention policy.Instruct users to compact the OST file.B、Create a personal folder (PST) file for each user.Store all PST files on a network share. Instruct users to compact the OST file.C、Create a second disabled user account and a second mailbox for each user.Configure Journal rules to journal all the messages for each user to the users second mailboxD、Create a new disabled user account and a new mailbox named Journaling Mailbox. Configure journal rules to journal all the messages for each user to Journaling Mailbox.
考题
Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You create a folder named CorporateData. You share the folder as CorpData and assign the Change permission to the Domain Users group. In the CorporateData folder, you create a folder named HumanResources. On the HumanResources folder, you assign the Modify permission to a global group named HRUsers. You share the HumanResources folder as HRData. You confirm that all users in the domain can view the files in the HRData share. You need to ensure that only HRUsers and administrators can access files in the HRData share. The solution must maintain user access to the CorpData share. What should you do? ()A、On the CorpData share, assign the Read permission to Domain Users.B、On the CorpData share, remove Domain Users and assign the Change permission to HRUsers.C、On the CorporateData folder, disable permission inheritance and remove the inherited permissions.D、On the HumanResources folder, disable permission inheritance and remove the inherited permissions.
考题
You are the administrator of a small server based network. While installing Windows 2000 Professional on your computer, you configure the network adapter card for each computer to use TCP/IP and assign static IP setting information. During installation the setup detects and installs the 10/100 MBPS UTP only network adepter card on computers 6 8 and 10 MBPS/UTP combination adapter card on the other 7 computers. You accept the default settings for the network adapter card and finish installing the network adapter card. All computers are connected to 10/100 switch that has category 5 UTP cabling. After installation you find that computer 6 and 8 can communicate with each other. You want all 9 computers on your network to be able to communicate with each other. What should you do?()A、Configure the 10/100 switch to transfer only at the 100 MBPS rate.B、Configure 10/100 MBPS network adapter card to switch all the computers at 10 MBPS rate.C、Change the combination network adapter card to use the BNC transceiver setting.D、Change the combination network adapter card to use the UTP transceiver setting.
考题
our network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user. All users have the necessary permissions to access only their home folder. The users report that when they access Share1, they can see the home folders of all the users. You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?()A、From Windows Explorer,modify the properties of the volume that contains Share1.B、From Server Manager,modify the properties of the volume that contains Share1.C、From Server Manager,modify the properties of Share1.D、From Windows Explorer,modify the properties of Share1.
考题
You upgraded a computer to Windows 2000 Professional and kept the FAT32 file system. You want each of three employees who use this computer to have their own documents area that no one else can access. You create a shared folder for each of the three users. You give only the owner permission to use the folder. Later in the week you are informed that User1's folder was modified while User1 was on vacation. What is wrong with your security configuration? ()A、Local computer policy must restrict the rights of the three users.B、You gave each share the same name under the users’ Documents and Settings folders.C、Shared folder security only works when accessing the folder over the network.D、Domain authentication should be required at log on.
考题
You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner. What should you modify?()A、the Federation TrustB、the EWS virtual directoryC、the default sharing policyD、the Organizational Relationship
考题
单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?()A
From the Display Properties, modify the Desktop settings.B
From Internet Explorer, modify the Language Preferences. C
From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe. D
From Regional and Language Options, modify the Location settings and the Input Languages settings.
考题
单选题Your company has two offices. Each office is configured as a separate subnet. The network contains a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). Users report that they are unable to resolve host names on the Internet. You verify that users can access all servers on both subnets.You need to ensure that users can resolve names on the Internet. The solution must ensure that users can access resources on the internal network. What should you configure?()A
all client computers to use the IP address of a DNS server on the Internet as the primary DNS serverB
all client computers to use the IP address of a DNS server on the Internet as the secondary DNS serverC
the internal DNS servers to use a forwarderD
the internal DNS servers to use round robin
考题
单选题You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner. What should you modify?()A
the Federation TrustB
the EWS virtual directoryC
the default sharing policyD
the Organizational Relationship
考题
单选题Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()A
Create a new VLAN for the out-of-range users.B
Add a wireless access point for the out-of-range users.C
Upgrade the out-of-range users’ SSID searching software.D
Enable network sharing on the users’ computers that are within range.
考题
单选题A technician who separated two departments using VLANs now discovers that the VLANs cannot communicate with each other. Which of the following does the technician need to enable communication between the VLANs?()A
Port spanningB
VLAN concentratorC
FirewallD
Router
考题
多选题Which of the following is true about the following share access properties? ()A+managers will be resolved as a Winbind group.BThe timo and taki users can manipulate files regardless of the file system permissions.C+managers will be resolved as a Unix group.D+managers is a builtin default Samba group.EThe admin users can be applied only to print shares.
考题
单选题Jill, a technician, is tasked with installing BitLocker on all the machines in an office. Which of the following may the users experience?()A
Frequent rebootsB
Delayed processor timesC
Disabled Internet connectionD
Denied access to share drives
热门标签
最新试卷