单选题Why is it important to prevent the abuse of computer data bands?ATo protect the right of the individual.BTo maintain discipline in society.CTo encourage economic and social research.DTo collect wide-ranging information.
单选题
Why is it important to prevent the abuse of computer data bands?
A
To protect the right of the individual.
B
To maintain discipline in society.
C
To encourage economic and social research.
D
To collect wide-ranging information.
参考解析
解析:
从第二段中的but they are bought at too high a price if they endanger human freedom or seriously enhance their opportunities of blackmailers可知,防止计算机数据库被滥用是基于对“human freedom”的考虑,即保护个人权利(right of the individual)。因此,A项为正确答案。
从第二段中的but they are bought at too high a price if they endanger human freedom or seriously enhance their opportunities of blackmailers可知,防止计算机数据库被滥用是基于对“human freedom”的考虑,即保护个人权利(right of the individual)。因此,A项为正确答案。
相关考题:
The emphasis on data gathered first-hand, combined with a cross-cultural perspective brought to the analysis of cultures past and present, makes this study a unique and distinctly important social science.
Which of the following helps protect important confidential information from being publiclydisclosed?() A. Hard drive wipingB. Social EngineeringC. ClassificationD. RAS server
Why do hoatzins collect together in smaller groups when the rainy season comes?A.To find more food.B.To protect themselves better.C.To keep themselves warm.D.To produce their young.
The topic of the passage is that __.A.the control of population is essential to the development of a nationB.natural resources are important to the economic development of a countryC.awareness of the effects of man's actions is as important as population controlD. developed countries should do more to protect natural environment on the earth
Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports
()is not a physical wall but a flow virtual data to protect the computer network.A、data wallB、data channelC、databaseD、firewall
()is not a physical wall, but a lot of virtual data to protect the computer network. A、Data wallB、Data ChannelC、Data baseD、firewall
() is not a physical wall, but a lot of virtual data to protect the computer network.A、Date wallB、Date channelC、DatabaseD、Firewall
Which of the following helps protect important confidential information from being publiclydisclosed?()A、Hard drive wipingB、Social EngineeringC、ClassificationD、RAS server
Which of the following best describes how locks are used in DB2?()A、To maintain control of updated rows for commit processingB、To ensure only committed changes are altered by another applicationC、To allow two applications to update the same row of data simultaneouslyD、To prevent multiple applications from accessing the same data simultaneously
You are the administrator of Redington Incorporation. Your optical disks are managed by one of your assistants named Jane and she is having a problem with one application failing to get requested information. You ask her to show you some history on the operation. Where will Jane find the information you want?()A、Under Administrative Tools, click on Performance. From Performance Logs and Alerts, view the Alerts.B、Right click My Computer, Manage, Storage, Removable Storage, Work Queue. C、Right click My Computer, and under System Tools, click on System Information. Expand Software Enironment. Double click on Running Tasks.D、Right click My Computer, and under System Tools, click on Event Viewer, then Application. Click on the Source column to sort the application data.
You have a computer that runs Windows XP Professional. The computer is configured as a Simple Network Management Protocol (SNMP) agent and is monitored by an SNMP management server. You install Windows XP Professional Service Pack 2 (SP2) and Windows Defender on the computer. You discover that the SNMP management server can no longer collect SNMP data from the computer. You need to ensure that the SNMP management server can collect data from the Windows XP Professional computer. What should you do?()A、Reinstall the SNMP.B、Perform a Windows Update.C、Uninstall Windows Defender. D、Create an exception in Windows Firewall.
A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()A、Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.B、Uninstall the payroll software to ensure confidentiality.C、Have the director remove sensitive data before the computer will be repaired.D、Perform needed repairs while avoiding sensitive data.
单选题Parents and children often disagree about what is important or right because _____.Athey have different styles of lifeBthey hate each otherCparents think that their children are troublemakersDthey are in a society of rapidly changing social and moral values
单选题Why is QoS important in a converged network?()ABecause data does not need to arrive intact, so data transfer rates can be variableBBecause lost voice-data packets must be retransmittedCBecause voice data packets should arrive quickly and sequentially, and with no lost dataDBecause voice data packets must follow a single dedicated path through the network
单选题Your company has an Active Directory domain. All consultants belong to a global group named TempWorkers. The TempWorkers group is not nested in any other groups. You move the computer objects of three file servers to a new organizational unit named SecureServers. These file servers contain only confidential data in shared folders. You need to prevent members of the TempWorkers group from accessing the confidential data on the file servers. You must achieve this goal without affecting access to other domain resources. What should you do()ACreate a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this computer froBCreate a new GPO and link it to the domain. Assign the Deny access to this computer from the network user right toCCreate a new GPO and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global gDCreate a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locally user right to
单选题Which of the following best describes how locks are used in DB2?()ATo maintain control of updated rows for commit processingBTo ensure only committed changes are altered by another applicationCTo allow two applications to update the same row of data simultaneouslyDTo prevent multiple applications from accessing the same data simultaneously
单选题Your company has an Active Directory domain. All consultants belong to a global group named TempWorkers. The TempWorkers group is not nested in any other groups. You move the computer objects of three file servers to a new organizational unit named SecureServers. These file servers contain only confidential data in shared folders. You need to prevent members of the TempWorkers group from accessing the confidential data on the file servers. You must achieve this goal without affecting access to other domain resources. What should you do()ACreate a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this computer from the network user right to the TempWorkers global group.BCreate a new GPO and link it to the domain. Assign the Deny access to this computer from the network user right to the TempWorkers global group.CCreate a new GPO and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global group.DCreate a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locallyuser right to the TempWorkers global group.
单选题Why would a network administrator configure port security on a switch?()Ato prevent unauthorized Telnet access to a switch portBto limit the number of Layer 2 broadcasts on a particular switch portCto prevent unauthorized hosts from accessing the LANDto protect the IP and MAC address of the switch and associated portsEto block unauthorized access to the switch management interfaces over common TCP ports
单选题A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()ABackup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.BUninstall the payroll software to ensure confidentiality.CHave the director remove sensitive data before the computer will be repaired.DPerform needed repairs while avoiding sensitive data.
单选题Why is it important to prevent the abuse of computer data bands?ATo protect the right of the individual.BTo maintain discipline in society.CTo encourage economic and social research.DTo collect wide-ranging information.
单选题The most important principle in the stowage is().Ato ensure the safety of the ship and protect the cargo from being damagedBto avoid the rearrangement of the cargo loaded on boardCto reject the damaged cargo during loadingDto prevent the spontaneous combustion of coal and grain
单选题()is not a physical wall, but a lot of virtual data to protect the computer network.AData wallBData ChannelCData baseDfirewall
单选题() is not a physical wall, but a lot of virtual data to protect the computer network.ADate wallBDate channelCDatabaseDFirewall
单选题You have a computer that runs Windows XP Professional. The computer is configured as a Simple Network Management Protocol (SNMP) agent and is monitored by an SNMP management server. You install Windows XP Professional Service Pack 2 (SP2) and Windows Defender on the computer. You discover that the SNMP management server can no longer collect SNMP data from the computer. You need to ensure that the SNMP management server can collect data from the Windows XP Professional computer. What should you do?()AReinstall the SNMP.BPerform a Windows Update.CUninstall Windows Defender. DCreate an exception in Windows Firewall.
单选题You have a computer that runs Windows 7 Professional. A removable drive is attached to the computer.You need to protect data on the removable drive by using BitLocker To Go. What should you do first? ()AUpgrade the computer to Windows 7 Enterprise.BInstall all Windows Updates for Windows 7 Professional.CIssue a digital certificate for the Encrypting File System (EFS).DSelect the Encrypt contents to secure data checkbox from the properties on the removable drive.
单选题In American economy, the basic role of the federal government is _____.Ato levy taxes on any businessBto issue money for economyCto set up banking and control money supplyDto improve markets and protect each economic element from abuse
单选题A consultant has been asked to do a performance analysis on a database server. Which subsystem should the consultant first analyze and why?()ACPU,because the database replication process requires a considerable amount of CPU timeBMemory,because the buffer cache requires a large amount of memory to maintain the data in system memoryCDisk,because it is important to configure a sufficient number of disks to match the CPU processing powerDNetwork,because the data returned to the client from the server can be a large subset of the total database