单选题This kind of computer is_____handling all kinds of information.Acapable toBable toCcapable ofDable of

单选题
This kind of computer is_____handling  all kinds  of information.
A

capable to

B

able to

C

capable of

D

able of


参考解析

解析:

相关考题:

A hospice is an institution that ( ) . A、receives all kinds of patientsB、helps people lives as fully and comfortably as possibleC、aims to meet all needs-physical, emotional, social and spiritualD、supports and cares for people who are facing the end of life

The box is filled ______ all kinds of letters from various places. A. ofB. withC. inD. at

This old building has () all kinds of weather. A. been exposed toB. exposed toC. been exposed onD. exposed on

Dry powder is used to put out ________A.electrical fireB.oil fireC.common firesD.all kinds of fires

There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist

You can find ( )kinds of shoes in this store. A.wholeB.allC.the wholeD.all the

The scientist tried out all kinds of materials and found that ( ) satisfied him. A、nothingB、noneC、noD、much

Everything was white and I remembered _____ all kinds of ladies dressed up in funny white things with all their hair covered with some sort of cloth.A:seeingB:seeC:to seeD:seen

We now know that about ____ of all the kinds of seaweed are animals.A: one fourB: once fourC: once fourthD: one fourth

-- Thank you for your help. -- ____________.A. All rightB. That's all rightC. That's rightD. It's very kind of you

All the decorations in the tree ()to the this kind girl. A、is belongingB、belongC、belongsD、are belonged

Remote administration types are an example of one kind of(71)malicious software, the Trojan horse, or more simply Trojan. The purpose of these programs isn't replication,(72)to penetrate and control. That masquerade as one thing when in fact they are something else, usually something destructive. There are a number of kinds of Trojans, including spybots, (73) report on the Web sites a computer user visits, and keybots or keyloggers, which record and report the user's keystrokes in order to discover passwords and other confidential information.RATS attempt to give a remote intruder administrative control of an infected computer. They work as(74)pairs. The server resides on the infected machine, while the client resides elsewhere, across the network, where it's available to a remote intruder. Using standard TCP/IP or UDP protocols, the client sends instructions to the server. The server does(75) it's told to do on the infected computer.A.nonviralB.unviralC.inviralD.abviral

The requirements of the ISM Code may be applied toA.only oil tankersB.only passenger shipsC.only containersD.all kinds of ships

A ______ computer is a personal computer whose hardware is capable of using any or all of the following media in a program, text, graphics, video and animation.A.databaseB.multimediaC.networkD.mainframes

is one kind of software absolutely necessary for every computer.A.Operating SystemB.Word processingC.KeyboardD.Center Processing Unit

I like all kinds of fruit,but my __________is banana.A.favoriteB.favoredC.favorableD.preferred

Comco, Inc. became the leading supplier of computer ___last year, less than ten years after it was founded.A. amounts B. types C. kinds D. parts

We are () exporters of all kinds of Chinese goods.

All kinds of vegetables()in the free market.Acan buyBwill buyCis boughtDcan be bought

()of the rooms has its own computer.A、EveryB、EachC、WholeD、All

The Supreme Court has original jurisdiction in()A、all kinds of casesB、two kinds of casesC、cases involving foreign citizensD、cases involving a state

You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?() A、For all files, deny the Take ownership permission to the Everyone group. B、From the Local Security Policy, modify the Encrypting File System (EFS) properties.C、From the Certificates snap-in, delete the recovery agent certificate. D、From the Certificates snap-in, delete all trusted root certification authority (CA) certificates.

Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard

单选题This kind of computer is_____handling all kinds of information.Acapable toBable toCcapable ofDable of

单选题There is something wrong with our radar.All kinds of objects can’t be clearly()within the definite range.AshownBexpressedCappearedDdisplayed

问答题Sandy collected pictures of all kinds of butterflies.

单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.