网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The most suitable title for the passage might be _____.
A

Funny Computer Users

B

High-tech and Low-tech

C

Computers and Helpline Users

D

A Qualified Computer User


参考答案

参考解析
解析:
主旨大意题。通读全文可知,文章的主旨不是对比高科技与低科技,故排除B项;C项的表述过于模糊,没有指明主题,故排除;文章没有提到怎样做一个合格的电脑使用者,故D项错误。本文主要讲述的是人们使用电脑的奇闻轶事,从顾客不会开机、不知道“任意键”在什么位置、拆洗键盘、不会发传真、把鼠标当作遥控器等事例可见,这些问题都十分滑稽,A项较好地概括了原文的意思,故答案为A项。
更多 “单选题The most suitable title for the passage might be _____.A Funny Computer UsersB High-tech and Low-techC Computers and Helpline UsersD A Qualified Computer User” 相关考题
考题 The most suitable title for this passage would be__________.A.How to Save Money on the House B.How to Borrow Money from a Bank C.How to Take a Mortgage D.How to Buy a House

考题 You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two localuser accounts named User1 and User2. On Computer1, you run Scanstate.exe /all //server1/data /computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd //server1/data/computer1. You need toensure that User1 and User2 can log on to Computer2.  What should you do on Computer2?()A、Enable all user accounts.B、Modify the default password policy.C、Modify the Allow log on locally user right.D、Add User1 and User2 to the local Administrators group.

考题 You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()A、Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.B、Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.C、Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.D、Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

考题 A user selects their proper domain and is unable to log into their Windows computer. The errorstates: System cannot log you on to the domain because the systems computer account in its primary domain is missing or the password on that account is incorrect.  Which of the following is the MOST likely cause for this error?()A、 The computers account was removed from Active Directory.B、 The users account was removed from Active Directory.C、 The computer was disjoined from the domain.D、 The user typed in the wrong password.

考题 Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A、 Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B、 Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C、 Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D、 Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

考题 You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

考题 You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()A、Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.B、Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.C、Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.D、Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.

考题 You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?() A、Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B、Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C、Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D、Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 

考题 单选题The best title for the passage would be ______.A Privacy on data files B Heated attacks on the computerC Privacy issue caused by computer D Privacy has been long neglected

考题 单选题The best title for the passage could be _____.A The Dark Side of Computer GamesB Computer Games—Advantages and DisadvantagesC The Development of Violent Computer GamesD A Study on the Influence of Computer Games

考题 单选题The most suitable title for the passage might be _____.A Funny Computer UsersB High-tech and Low-techC Computers and Helpline UsersD A Qualified Computer User

考题 单选题Your company has an Active Directory domain. A user attempts to log on to a computer that was turned off for twelve weeks. The administrator receives an error message that authentication has failed. You need to ensure that the user is able to log on to the computer. What should you do()A Run the netdom TRUST /reset command.B Run the netsh command with the set and machine options.C Run the Active Directory Users and Computers console to disable, and then enable the computer account.D Reset the computer account. Disjoin the computer from the domain, and then rejoin the computer to the domain.

考题 单选题You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two localuser accounts named User1 and User2. On Computer1, you run Scanstate.exe /all //server1/data /computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd //server1/data/computer1. You need toensure that User1 and User2 can log on to Computer2.  What should you do on Computer2?()A Enable all user accounts.B Modify the default password policy.C Modify the Allow log on locally user right.D Add User1 and User2 to the local Administrators group.

考题 单选题The most suitable title of this passage is ______.A Progress in the Field of StudyB Teachers’ Role in StudyC How to Improve Students’ AbilityD Bad Points of the Examination System

考题 单选题Which of the following is the best title for the passage?A The Main Experts of AmericaB The Computer TakeBack CampaignC The Harm of E-waste TreatmentD Electric Waste-a Global Problem

考题 单选题A user selects their proper domain and is unable to log into their Windows computer. The errorstates: System cannot log you on to the domain because the systems computer account in its primary domain is missing or the password on that account is incorrect.  Which of the following is the MOST likely cause for this error?()A  The computers account was removed from Active Directory.B  The users account was removed from Active Directory.C  The computer was disjoined from the domain.D  The user typed in the wrong password.

考题 单选题You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()A Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.B Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.C Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.D Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.

考题 单选题You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C Configure each computer to join the domain.      Create a user account for each user on a domain controller. D Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

考题 单选题You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()A Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.B Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.C Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.D Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

考题 单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A  Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B  Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C  Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D  Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

考题 单选题Your network consists of a single Active Directory domain named Contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You create an organizational unit (OU) that contains a computer account named Computer1.  A Group Policy object (GPO) is linked to the OU and contains settings to enforce the use of IPSec. You log on to Computer1 by using a user account named User1. You need to verify that the IPSec settings have been applied.  Which command should you run?()A Dsquery user -name User1B Dsquery computer -name Computer1C Gpresult /s Computer1 /scope COMPUTER /vD Gpresult /user User1 /scope USER /v

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A Create an account for Peter's computer in the Computers container.B Grant the Log on locally user right to Peter's user account.C Enable Peter's user account.D Change the properties of Peter's user account so he can log on to any computer.

考题 单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()A Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 

考题 问答题Why did some computer companies start charging helpline users?

考题 单选题The most suitable title for the passage might be______.A Funny Computer Users.B High-tech and Low-tech.C Computers and Helpline Users.D A Qualified Computer User.

考题 单选题You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?()A On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. B On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. C In the domain, modify Marc's Logon Workstations list to include the name of the computer.D In the domain, modify Marc's account properties to unlock the account. 

考题 单选题Which of the following is the most suitable title for the passage?A The Evolution of Insects.B Environment and Heredity.C Education: The Influence of the Environment.D The Instincts of Animals.