单选题The most suitable title for the passage might be _____.A Funny Computer UsersB High-tech and Low-techC Computers and Helpline UsersD A Qualified Computer User

题目
单选题
The most suitable title for the passage might be _____.
A

Funny Computer Users

B

High-tech and Low-tech

C

Computers and Helpline Users

D

A Qualified Computer User


相似考题

2.You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()A、Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.B、Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.C、Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.D、Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

更多“单选题The most suitable title for the passage might be _____.A Funny Computer UsersB High-tech and Low-techC Computers and Helpline UsersD A Qualified Computer User”相关问题
  • 第1题:

    Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()

    • A、 Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.
    • B、 Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.
    • C、 Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.
    • D、 Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

    正确答案:D

  • 第2题:

    You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()

    • A、Create an account for Peter's computer in the Computers container.
    • B、Grant the Log on locally user right to Peter's user account.
    • C、Enable Peter's user account.
    • D、Change the properties of Peter's user account so he can log on to any computer.

    正确答案:D

  • 第3题:

    You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?() 

    • A、Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. 
    • B、Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. 
    • C、Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. 
    • D、Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 

    正确答案:D

  • 第4题:

    单选题
    The best title for the passage could be _____.
    A

    The Dark Side of Computer Games

    B

    Computer Games—Advantages and Disadvantages

    C

    The Development of Violent Computer Games

    D

    A Study on the Influence of Computer Games


    正确答案: C
    解析:
    全文主要介绍了电脑游戏的负面影响。在第二段第一句中作者提到“But the dark side of the computer games has become more and more obvious.”,但是电脑游戏的负面影响越来越明显了。该句为全文的主题句。

  • 第5题:

    单选题
    You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two localuser accounts named User1 and User2. On Computer1, you run Scanstate.exe /all //server1/data /computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd //server1/data/computer1. You need toensure that User1 and User2 can log on to Computer2.  What should you do on Computer2?()
    A

    Enable all user accounts.

    B

    Modify the default password policy.

    C

    Modify the Allow log on locally user right.

    D

    Add User1 and User2 to the local Administrators group.


    正确答案: D
    解析: 暂无解析

  • 第6题:

    单选题
    Which of the following is the best title for the passage?
    A

    The Main Experts of America

    B

    The Computer TakeBack Campaign

    C

    The Harm of E-waste Treatment

    D

    Electric Waste-a Global Problem


    正确答案: B
    解析:

  • 第7题:

    单选题
    You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()
    A

    Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.

    B

    Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.

    C

    Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.

    D

    Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()
    A

    Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.

    B

    Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.

    C

    Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.

    D

    Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Your network consists of a single Active Directory domain named Contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You create an organizational unit (OU) that contains a computer account named Computer1.  A Group Policy object (GPO) is linked to the OU and contains settings to enforce the use of IPSec. You log on to Computer1 by using a user account named User1. You need to verify that the IPSec settings have been applied.  Which command should you run?()
    A

    Dsquery user -name User1

    B

    Dsquery computer -name Computer1

    C

    Gpresult /s Computer1 /scope COMPUTER /v

    D

    Gpresult /user User1 /scope USER /v


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()
    A

    Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. 

    B

    Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. 

    C

    Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. 

    D

    Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    The most suitable title for the passage might be______.
    A

    Funny Computer Users.

    B

    High-tech and Low-tech.

    C

    Computers and Helpline Users.

    D

    A Qualified Computer User.


    正确答案: B
    解析:
    主旨大意题。通读全文可知,文章的主旨不是对比高科技与低科技,故排除B项;C项的表述过于模糊,没有指明主题,故排除;文章没有提到怎样做一个合格的电脑使用者,故D项错误。本文主要讲述的是人们使用电脑的奇闻轶事,从顾客不会开机、不知道“任意键”在什么位置、拆洗键盘、不会发传真、把鼠标当作遥控器等事例可见,这些问题都十分滑稽,A项较好地概括了原文的意思,故答案为A项。

  • 第12题:

    单选题
    Which of the following is the most suitable title for the passage?
    A

    The Evolution of Insects.

    B

    Environment and Heredity.

    C

    Education: The Influence of the Environment.

    D

    The Instincts of Animals.


    正确答案: D
    解析:
    从文中内容可知,作者是在讲外部环境和遗传是互补的因素。四个选项中,只有B项包含了外部环境和遗传两个方面,因此B项为正确答案。

  • 第13题:

    You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()

    • A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. 
    • B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. 
    • C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. 
    • D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

    正确答案:D

  • 第14题:

    You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()

    • A、Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.
    • B、Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.
    • C、Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.
    • D、Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.

    正确答案:C

  • 第15题:

    单选题
    The best title for the passage would be ______.
    A

    Privacy on data files                

    B

    Heated attacks on the computer

    C

    Privacy issue caused by computer    

    D

    Privacy has been long neglected


    正确答案: A
    解析:
    纵观全文可知,本文核心的内容是计算机与个人隐私的问题(Privacy issue cause by computer),选C项。

  • 第16题:

    单选题
    Your company has an Active Directory domain. A user attempts to log on to a computer that was turned off for twelve weeks. The administrator receives an error message that authentication has failed. You need to ensure that the user is able to log on to the computer. What should you do()
    A

    Run the netdom TRUST /reset command.

    B

    Run the netsh command with the set and machine options.

    C

    Run the Active Directory Users and Computers console to disable, and then enable the computer account.

    D

    Reset the computer account. Disjoin the computer from the domain, and then rejoin the computer to the domain.


    正确答案: A
    解析: 暂无解析

  • 第17题:

    单选题
    The most suitable title of this passage is ______.
    A

    Progress in the Field of Study

    B

    Teachers’ Role in Study

    C

    How to Improve Students’ Ability

    D

    Bad Points of the Examination System


    正确答案: B
    解析:
    主旨大意题。文章从几个方面阐述了现行考试制度的弊端,对现行的考试制度强烈不满。

  • 第18题:

    单选题
    A user selects their proper domain and is unable to log into their Windows computer. The errorstates: System cannot log you on to the domain because the systems computer account in its primary domain is missing or the password on that account is incorrect.  Which of the following is the MOST likely cause for this error?()
    A

     The computers account was removed from Active Directory.

    B

     The users account was removed from Active Directory.

    C

     The computer was disjoined from the domain.

    D

     The user typed in the wrong password.


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()
    A

    Configure each computer to join a workgroup.      Create a user account and a local profile for each user. 

    B

    Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. 

    C

    Configure each computer to join the domain.      Create a user account for each user on a domain controller. 

    D

    Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()
    A

     Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.

    B

     Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.

    C

     Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.

    D

     Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()
    A

    Create an account for Peter's computer in the Computers container.

    B

    Grant the Log on locally user right to Peter's user account.

    C

    Enable Peter's user account.

    D

    Change the properties of Peter's user account so he can log on to any computer.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    问答题
    Why did some computer companies start charging helpline users?

    正确答案: Many users don’t refer to the manual.
    解析:
    推断题。文章第四段尾句提到,电话量太大以致于很多公司都开始对热线收费,第五段首句又谈到,那些问题都简单到只需打开说明书一看便可解决,之后又接着列举了用户不愿意读说明书的例子。由此可见,正是由于用户不愿意看说明书才使热线电话大量增加。

  • 第23题:

    单选题
    You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?()
    A

    On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. 

    B

    On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. 

    C

    In the domain, modify Marc's Logon Workstations list to include the name of the computer.

    D

    In the domain, modify Marc's account properties to unlock the account. 


    正确答案: C
    解析: 暂无解析