Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc. 空白(1)处应选择()
第1题:
Microsoft's COM is a software(73) that allows applications to be built from binary software components。
A.structure
B.protocol
C.procedure
D.architecture
第2题:
Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.
A.network B.virus C.security D.architecture
第3题:
第4题:
第5题:
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The employees of TestKing.comuse Microsoft Outlook 2003 to connect to their Mailboxes. You have received instructions from the CIO tochange the network to Exchange Server 2010. However, the CIO wants you to propose a solution for Mailboxes access that will keep the support and software cost to a minimum as well as ensuring access tothe public folders. What should you do?()
第6题:
If XYZ LTD needs to upgrade the Cisco IOS Software of a Cisco Router, Where is the best place to download the upgrade image file from?()
第7题:
Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC. 空白(1)处应选择()
第8题:
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
第9题:
Which of the following is an advantage of hardware RAID over software RAID?()
第10题:
Certkiller .com has a software evaluation lab. There is a server in the evaluation lab named as CKT. CKT runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. CKT has 200 virtual servers running on an isolated virtual segment to evaluate software. To connect to the internet, it uses physical network interface card. Certkiller .com requires every server in the company to access Internet. Certkiller .com security policy dictates that the IP address space used by software evaluation lab must not be used by other networks. Similarly, it states the IP address space used by other networks should not be used by the evaluation lab network. As an administrator you find you that the applications tested in the software evaluation lab need to access normal network to connect to the vendors update servers on the internet. You need to configure all virtual servers on the CKT server to access the internet. You also need to comply with company’s security policy. Which two actions should you perform to achieve this task()
第11题:
第12题:
The best option is to download it from the Cisco TAC website
The best option is to download it from the Cisco.Com Software support site
The best option is to download it form the Cisco Advanced Services website
The best option is to download it from the TFTP site on Cisco.com
第13题:
Software Engineering is best described as ( ).
A.the practice of designing, building, and maintaining off-the-shelf software from prefabricated parts
B.the practice of designing, building, and maintaining ad-hoc software without the use of formal methods
C.the practice of designing, building, and maintaining reliable and cost-effective software using standard techniques
D.the practice of designing, building, and maintaining fast and flexible software specifically for engineering applications
第14题:
Microsoffs COM is a software(66)that allows applications to be built from binary software components. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(67)standard developed by Microsoft. OLE makes it possible to create(68)with one application and link or embed them in a second application. Embedded objects retain their original format and(69)to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(70)compound document standard developed mainly by Apple and IBM is called OpenDoc.
A.architecture
B.protocol
C.procedure
D.structure
第15题:
第16题:
第17题:
Which statement about Software Maintenance Upgrade is true?()
第18题:
Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE.COM defines a binary standard for function calling between components,a way for components to dynamically discover the interfaces implemented by other components,and a mechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft.OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them.Support for OLE is built into the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoC. 空白(4)处应选择()
第19题:
对URL:http://www.teach.com/software/test.htm的描述哪个不正确?()
第20题:
Microsoft's COM is a software(1)that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components,a way for components to dynarmically discover the interfaces implemented by other components, and amechanism to identify components and their interfaces uniquely. OLE is a compound(2)standard developed by Microsoft. OLE makes it possible to create(3)with one application and link or embed them in a second application.Embedded objects retain their original format and(4)to the application that created them. Support for OLE is builtinto the Windows and MacOS Operating Systems.A(5)compound document standard developed mainly by Apple and IBM is called OpenDoc. 空白(3)处应选择()
第21题:
Cer-tech .com has an Active Directory domain installed on a server that runs Windows Server 2008.Another server named S3 also runs Windows Server 2008. All client machines have Windows Vista. Cer-tech .com has instructed you to install the Terminal Services role, Terminal Services Gateway role andTerminal Services Web Access role service on S3. To protect the network, you want to ensure that all client machines have firewall, antivirus software and anti-spyware software installed. Which actions shouldyou perform to achieve this task?()
第22题:
You are a network administrator for Alpine Ski House. The network consists of a single Active Directory domain named alpineskihouse.com.Your company acquires a company named Adventure Works. The Adventure Works network consists of a single Active Directory domain named adventure-works.com. A server named Server32 is a network-management application server in the adventure-works.com domain. Server32 accesses all of the desktop client computers to perform automated software upgrades and hardware inventory. The network-management software on Server32 references desktop computers by unqualified host names, which are resolved to clientname.adventure-works.com by using a DNS server. You join Server32 to your domain to become server32.alpineskihouse.com. The Server32 IP address is 10.10.10.90.You are gradually migrating all adventure-works.com desktop client computers to your domain to become clientname.alpineskihouse.com. You do not have access to the adventure-works.com DNS server. When Server32 attempts to apply an update to the client computers, the network-management software returns many alerts that say that desktop computers cannot be found. You want to allow the network-management software on Server32 to resolve unqualified client computer host names in adventure-works.com or alpineskihouse.com, and you want to use the minimum amount of administrative effort. What should you do?()
第23题:
This can be accomplished using Personal Archive and forms-based authentication.
This can be accomplished by upgrading all client computers to Outlook 2010 and use Autodiscover.
This can be accomplished using Outlook Anywhere and changin the Outlook RPC encryption settings.
This can be accomplished using using POP3 and IMAP4 access.