网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
The computer system()suddenly while he was searching for information on the Internet.
A
broke down
B
broke out
C
broke up
D
broke in
参考答案
参考解析
解析:
暂无解析
更多 “单选题The computer system()suddenly while he was searching for information on the Internet.A broke downB broke outC broke upD broke in” 相关考题
考题
On his way to the office, he suddenly remembered that he had (made the appointment with) his doctor.()
此题为判断题(对,错)。
考题
You've read of how he had a headache and how, when he got word that Lee was ready to call it quits, he was suddenly and () cured.
A、motivationB、languidC、excessiveD、miraculously
考题
There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist
考题
Tom( )attended the meeting last night, but he didn't as he suddenly fell ill.A. should haveB. hadC. must haveD. could have
考题
The computer system broke out suddenly while he was searching for ination on the Internet.()
此题为判断题(对,错)。
考题
In software engineering the design phase is divided into( )。A.system design and detailed designB.computer design and program designC.system design and hardware designD.computer design and detailed design
考题
An embedded system is an applied computer system,as distinguished from other types of______such as personal computers(PCs)or supercomputers.A.computer systems
B.computer hardware
C.computer software
D.systems
考题
The thief dispersed the papers all over the room while he was searching for the money.A:abandoned
B:vanished
C:scattered
D:desejied
考题
共用题干
HackingPeople tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place. Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?A: Deleting information in the computer's memory.B: Shutting down the computer whenever he wishes.C: Entering your house to steal.D: Spoiling a system for air traffic.
考题
The computer system()suddenly while he was searching for information on the Internet.Abroke downBbroke outCbroke upDbroke in
考题
You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?() A、On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. B、On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. C、In the domain, modify Marc's Logon Workstations list to include the name of the computer.D、In the domain, modify Marc's account properties to unlock the account.
考题
Which of the following is a speed enhancement in Windows performance when searching for files?()A、IndexingB、FormattingC、Disk CleanupD、System Restore
考题
You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy. What are two possible ways to achieve this goal?()A、Run the Secedit /configure /db C:/NewSec.sdb command.B、Run the Secedit /refreshpolicy machine_policy command.C、Copy NewSec.inf to the C:/Windows/Inf folder. D、Copy NewSec.sdb to the C:/Windows/System32/Microsoft/Protect folder. E、Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation. F、Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template.
考题
You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel Data Sources (ODBC).B、Control Panel System Tools Shared Folders.C、Computer Management System Tools System Information.D、Computer Management System Tools Shared Folders Open Files.E、Computer Management System Tools Shared Folders Sessions.F、Computer Management System Tools Shared Folders Shares.
考题
多选题You are the network administrator for ExamSheet. You have implemented the Hisecws.inf security template on all the Windows 2000 Professional client computers in your network. A user has received a driver and utility software for an internal SCSI controller in his computer. The SCSI controller is not currently on the Hardware Compatibility List (HCL). He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly. You discover that the driver is not installed correctly. You want to install the SCSI driver without permanently reducing security on the client computer. What should you do?()ARun theSfc /cancelcommand.BRun theSigverifcommand.CReconfigure the Driver Signing option.DInstall the SCSI driver.ERun theSfc /enablecommand.FReapply the security template settings.
考题
单选题You have updated the modem driver on your Windows 2000 Professional computer. You restart your computer. Immediately after you log on, you receive a stop error. You need to start Windows 2000. What must you do? ()A
Restart the computer in Safe Mode. Uninstall the modem driver.B
Restart the computer by using the last known good configuration.C
Restart the computer in Recovery Console. Replace the new Modem.inf file with the old modem.inf file.D
Start the computer from the Windows 2000 startup floppy disks. Repair the registry.E
Start the computer from the Windows 2000 startup floppy disks. Repair the system files.
考题
单选题You are the network administrator for ExamSheet.net. You have implemented the Hisecws.inf security template on all the Windows 2000 Professional computers in your network by using a GPO. A user has received a driver and utility software for the internal SCSI controller on his computer. The SCSI controller is not currently on the HCL. He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly. You want to allow all users to install this driver on their client computers. You want to accomplish this task with the least amount of administrative effort. What should you do?()A
Modify the GPO to change the Driver Signing option. B
Run theSigverifcommand on each client computer.C
Reconfigure the Driver Signing option on each client computer. Install the driver on each client computer. Reapply the security template settings on each client computer.D
Modify the Hisecws.inf security template on each client computer to change the Driver Signing option.E
Modify the Hisecws.inf security template on the domain controller to change the Driver Signing option.
考题
单选题The computer system()suddenly while he was searching for information on the Internet.A
broke downB
broke outC
broke upD
broke in
考题
单选题When he suddenly() up the subject of genetic engineering, there was an embarrassed silence.A
tookB
broughtC
showedD
came
考题
单选题The police ______ the murderer everywhere when he suddenly appeared in a theatre.A
is searching forB
are searching forC
were searching forD
was searching for
考题
单选题After driving for twenty miles, he suddenly realized that he has been driving in the wrong direction.A
drivingB
realizedC
has been drivingD
the wrong
考题
单选题______ , he finds the work interesting.A
Though he is computer expertB
A computer expert he isC
As computer expertD
Computer expert as he is
考题
单选题I suddenly realized that he was trying to______quarrelling with me.A
considerB
enjoyC
avoidD
prevent
热门标签
最新试卷