单选题The users did all of the following funny things EXCEPT______.Afailing to switch on the computer.Bregarding the keyboard as a remote control.Cspending much time looking for a key.Dwashing the keys individually with soap.

单选题
The users did all of the following funny things EXCEPT______.
A

failing to switch on the computer.

B

regarding the keyboard as a remote control.

C

spending much time looking for a key.

D

washing the keys individually with soap.


参考解析

解析:
细节题。由第一段和第七段的例子可知,有的用户不会开机,故排除A项。第八段的例子表明,很多用户不知道一些按键在键盘上的位置,排除C项。倒数第二段列举把键盘拆开来清洗的例子,故排除D项。文章第九段尾句举例说道,有位客人拿着鼠标对着屏幕狂按,可见他以为鼠标是遥控器,而不是把键盘当作遥控器,故答案为B项。

相关考题:

Which of the following did the author probably suggest?[A] Support not the most supported.[B] Deny everything others believe.[C] Throw all tradition into trashcan.[D] Keep your eyes open all the time.

The writer decided to drop out of the conspicuous consumption gang because____ (She Is an Unwilling Tool of Middleclassdom) A. of inflationB. life is made too easy by modern miracle-performing appliancesC. she’s spending too much time and energy to keep things runningD. her children will be leaving home soon

Everything was white and I remembered _____ all kinds of ladies dressed up in funny white things with all their hair covered with some sort of cloth.A:seeingB:seeC:to seeD:seen

He regretted__________too much time on computer game.A.to costB.costingC.to spendD.spending

How much did you()all these things? More than forty dollars.AspendBcostCgiveDpay for

How much did you()all these things? More than forty dollars.A、spendB、costC、giveD、pay for

Which of the following is true regarding Label Distribution Protocol (LDP)?()A、It is a label distribution protocol for MPLSB、It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a networkC、Tag distribution Protocol (TDP) was the basis for LDPD、All of the above are true

Which of the following is TRUE about the ate program?()A、When running ate for the first time it will prompt for all the required information and configure all the required devicesB、The program is used by cu to communicate to a remote systemC、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD、The program ate calls cu to communicate with the remote system

Which of the following is true regarding NetWare Directory Services (NDS) configuration?()A、Remote users can access the tree through dial-in connections.B、Mobile users do not require changing the NDS name context.C、Remote users do not require a special NDS object entry.D、There are no differences between mobile users and remote users.

Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A、 To ensure the router has the correct time when generating its private/public key pairs.B、 To ensure the router has the correct time when checking certificate validity from the remote peersC、 To ensure the router time is sync with the remote peers for encryption keys generationD、 To ensure the router time is sync with the remote peers during theDH exchangeE、 To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

A remote host can be pinged from all switches except one.  Which of the following is the most likely reason for this failure?()A、VTP pruning has isolated the switch.B、IP routing is disabled on the switch.C、PoE is failing on the remote port.D、There is a loop in the topology.

A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()A、Remote management cardB、Terminal servicesC、Remote desktopD、LDAP enabled IP KVM

A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?()A、Switching loop is occurring on the switch.B、Wrong subnet mask on the switch.C、Incorrect SNMP settings on the switch.D、Port is misconfigured on the switch.

A user needs a laptop keyboard replaced because the space bar is not working. Mike, a technician, replaces the keyboard, and notices that a diagonal set of keys will not respond. Which of the following is the MOST likely cause?()A、StickyKeys is enabled and needs to be disabled.B、The new keyboard is defective and needs to be replaced.C、The system board is defective.D、The keyboard ribbon is not seated properly.

单选题A user needs a laptop keyboard replaced because the space bar is not working. Mike, a technician, replaces the keyboard, and notices that a diagonal set of keys will not respond. Which of the following is the MOST likely cause?()AStickyKeys is enabled and needs to be disabled.BThe new keyboard is defective and needs to be replaced.CThe system board is defective.DThe keyboard ribbon is not seated properly.

单选题Which of the following is TRUE about the ate program?()AWhen running ate for the first time it will prompt for all the required information and configure all the required devicesBThe program is used by cu to communicate to a remote systemCThe program is used for remote communications between the host and a remote system using a modem or null modem via a tty portDThe program ate calls cu to communicate with the remote system

单选题A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()AThe system’s local time settingsBThe system’s O/S version and patch statusCThe system’s network configurationDThe mail server’s configuration

单选题A company is looking to improve upon their current remote management capabilities.  Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS.  Which of the following remote management systems would support both these requirements?()ARemote management cardBTerminal servicesCRemote desktopDLDAP enabled IP KVM

单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long/x7frunning queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries.  You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message. Which method would you follow to achieve this?()Aset the CPU time per call in the users profileBset the CPU time per session in the users profilesCset the CPU levels for the users’ group using Resource ManagerDset the TIMED_STATISTICS parameter to TRUE in the parameter file

单选题Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A To ensure the router has the correct time when generating its private/public key pairs.B To ensure the router has the correct time when checking certificate validity from the remote peersC To ensure the router time is sync with the remote peers for encryption keys generationD To ensure the router time is sync with the remote peers during theDH exchangeE To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

单选题When revising the fairy tales, Wilhelm did all of the following EXCEPT _____.Aadding character judgmentsBmaking the tales much longerCdeleting the violent scenesDpolishing up the language

单选题How much did you()all these things? More than forty dollars.AspendBcostCgiveDpay for

单选题A remote host can be pinged from all switches except one.  Which of the following is the most likely reason for this failure?()AVTP pruning has isolated the switch.BIP routing is disabled on the switch.CPoE is failing on the remote port.DThere is a loop in the topology.

单选题A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?()ASwitching loop is occurring on the switch.BWrong subnet mask on the switch.CIncorrect SNMP settings on the switch.DPort is misconfigured on the switch.

单选题Which of the following is true regarding NetWare Directory Services (NDS) configuration?()ARemote users can access the tree through dial-in connections.BMobile users do not require changing the NDS name context.CRemote users do not require a special NDS object entry.DThere are no differences between mobile users and remote users.

单选题Which trigger property applies to Key triggers? ()AHide Keys BShow Menu Keys CHide Menu Keys DDisplay in 'Keyboard Help' EHide Keys Description

单选题The users did all of the following funny things EXCEPT _____.Afailing to switch on the computerBregarding the keyboard as a remote controlCspending much time looking for a keyDwashing the keys individually with soap