单选题You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()AUse the Microsoft Windows Task Manager application to end the task for the application.BUse the Control Panel application to uninstall the application. Reboot the computer.CUse the Software Explorer application to disable the application. Reboot the computer.DUse the Services application to disable the Application Experience service, and then launch the application.

单选题
You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()
A

Use the Microsoft Windows Task Manager application to end the task for the application.

B

Use the Control Panel application to uninstall the application. Reboot the computer.

C

Use the Software Explorer application to disable the application. Reboot the computer.

D

Use the Services application to disable the Application Experience service, and then launch the application.


参考解析

解析: 暂无解析

相关考题:

Protective softwares are always efficient as long as you install them in your computer.()

You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()A. Performance consoleB. System MonitorC. Network MonitorD. Task Manager

You have recently completed the creation of a new application.Certkiller .com requires you to ensure that this new application creates a file that contains an array of bytes.What should you do?() A.B.C.D.

You install a third-party application on your computer. The application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above 6000.  You need to configure Microsoft Windows Firewall to allow traffic for the application.  What should you do? ()A、Add a port exception for port 80.B、Disable the Core Networking exception.C、Restore the Windows Firewall defaults.D、Add a program exception for the new application.

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()A、Use the Microsoft Windows Task Manager application to end the task for the application.B、Use the Control Panel application to uninstall the application. Reboot the computer.C、Use the Software Explorer application to disable the application. Reboot the computer.D、Use the Services application to disable the Application Experience service, and then launch the application.

You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. Thepackage consists of three components.The first component is a data acquisition application that monitors continuous data output fromscientific instruments. The second component is a data analysis application that receives data from thedata acquisition application by using shared memory. The third component is a data graphingapplication that displays the processed data in real time.The data analysis application communicates with the data graphing application by using OLE. When youattempt to analyze large data sets, your computer is not able to display data in real time. You install asecond processor in your computer. Only one processor is used while the package is running, even thoughtask manager shows both processors.You want your data analysis package to use both processors. What should you do?()A、Configure the data acquisition application to run in its own virtual DOS machine (VDM). B、Configure the data analysis application to run in its own virtual DOS machine (VDM). C、Configure the data graphing application to run in its own virtual DOS machine (VDM). D、Configure the virtual DOS machine for the data acquisition and data analysis applications to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1. E、Configure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0.Configure the VDM for the data graphing application to have a hard affinity for processor1.

You are maintaining a Microsoft ASP.NET Web Application that was created by using the Microsoft .NET Framework version 3.5.  You obtain the latest version of the project from the source control repository. You discover that an assembly reference is missing when you attempt to compile the project on your computer.You need to compile the project on your computer.  What should you do?()A、Add a reference path in the property pages of the project to the location of the missing assembly.B、Add a working directory in the property pages of the project to the location of the missing assembly.C、Change the output path in the property pages of the project to the location of the missingassembly.D、Delete the assembly reference. Add a reference to the missing assembly by browsing for it on your computer.

Your portable computer has two 512-MB memory modules installed in the only two memory slots available.  You need to improve the speed of your computer.  What should you do? ()A、Adjust the processor scheduling to optimize for background services.B、Connect a USB flash drive to the computer. Enable the ReadyBoost feature.C、Configure the virtual memory file to exist on the same drive as the operating system.D、Configure the local security policy setting of the computer to clear the virtual page file upon shutdown.

You are maintaining a Microsoft ASP.NET Web Application that was created by using the Microsoft .NET Framework version 3.5.  You obtain the latest version of the project from the source control repository. You discover that an assembly reference is missing when you attempt to compile the project on your computer. You need to compile the project on your computer.  What should you do?()A、Add a reference path in the Property Pages of the project to the location of the missing assembly. B、Add a working directory in the Property Pages of the project to the location of the missing assembly. C、Change the output path in the Property Pages of the project to the location of the missing assembly. D、Delete the assembly reference. Add a reference to the missing assembly by browsing for it on your computer.

Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

You are the desktop administrator for ExamSheet.  Your Windows 2000 Professional computer is configured to support two monitors. You install a DOS-based application on your computer. The application uses the Windows 2000 Professional default settings Autoexec.nt and Config.nt.  Your primary video adapter is set to 24 bit color, 800 x 600 resolution, and default refresh rates. Your secondary video adapter is set to 32 bit color, 1024 x 768 resolution, and a refresh refresh of 72 hertz. You create a shortcut for the DOS-based application on the secondary monitor's desktop and use the  default PIF settings. You attempt to run the DOS-based application on the secondary monitor. The application opens, but the display area is scrambled. You then attempt to run the DOS-based application on the primary monitor.  The application does not open. Both monitors function correctly when you run Windows based applications.  You want to be able to run the DOS-based application on either monitor.  What should you do?()A、Reconfigure the shortcut properties to run the DOS-based application in full screen mode.B、Reconfigure the PIF settings of the DOS-based application to start in a window.C、Change the drivers for both video adapters from WDM compliant drivers to DOS drivers.D、Change the refresh rate setting to 72 hertz for both video adapters.E、Change the color setting for both video adapters to 256 colors.

Your company purchases a new application to deploy on 200 computers. The application requires  that you modify the registry on each target computer before you install the application.     The registry modifications are in a file that has an .adm extension.     You need to prepare the target computers for the application.     What should you do()A、Import the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that computer.B、Create a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.C、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAID、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTA

Your network has client computers that run Windows XP.  All users access a custom line-of- business application.   The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7.   You have the following requirements:   The application must run on all client computers.   The application executable must reside on each client computer.    You need to manage application compatibility to meet the requirements.   What should you do?()A、Install the application on a Remote Desktop Services server.B、Install a shim for the application on each client computer.C、Install the Windows Compatibility Evaluator on each client computer.D、Virtualize the application by using Microsoft Application Virtualization (App-V).

Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

You are the network administrator for ExamSheet.net. You administer ExamSheet's Windows 2000 network. You want to update the device driver for the network adapter in your Windows 2000 Professional computer. You log on the computer by using the local Administrator account. You use Device Manager to verify that the network adapter is installed on your computer. You select the Driver tab and Update Driver option, and install a new driver from the network adapter manufacturer. You restart the computer. After displaying the Windows 2000 Professional startup screen, your computer displays aCkernel stop error message. You want to configure your computer to start successfully.  Which two methods can you use to resolve the problem?()A、Perform an emergency repair of the system from the Windows 2000 Professional CD-ROM by     using the Emergency Repair Disk for the computer.B、Restart the computer. In the Recovery Console, use the Extract utility to reinstall the loopback     driver from the Windows 2000 Professional CD-ROM.C、Restart the computer by using the last know good configuration.D、Restart the computer in safe mode and reinstall the original network adapter driver. E、Restart the computer and disable Plug and Play in the computer BIOS.

多选题You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()AConfigure your shared Internet connection to disable LCP extensions.BConfigure you shared Internet connection to disable on-demand dialing.CCreate an Internet Connection Sharing application type for HTTP to use remote server port 25.DCreate an Internet Connection Sharing application type for HTTP to use remote server port 80.ECreate an Internet Connection Sharing application type for FTP to use remote server port 21.FCreate an Internet Connection Sharing application type for FTP to use remote server port 72.

单选题You should assemble the Windows Sound System microphoneAbefore you have installed your audio hardware.Bbefore you connect it to your hardware.Cafter you have connected it to your hardware.

单选题Your company purchases a new application to deploy on 200 computers. The application requires that you modify the registry on each target computer before you install the application. The registry modifications are in a file that has an .adm extension. You need to prepare the target computers for the application. What should you do()AImport the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that contains the target computers.BCreate a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.CCreate a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAINER-DN command on each target computer.DCreate a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTAINER-DN command on each target computer.

多选题Your home computer runs Windows 2000 Professional. You have just installed a new application and restarted the computer. During the boot process you receive the following error message: "NTLDR is missing - Press any key to restart." You do not have an emergency repair disk. You want your computer to start properly. You want to do this with the least amount of administrative effort.  What should you do?()AReinstall the operating system.BStart the computer by using the Windows 2000 Professional CD-ROM.CSelect Repair option and choose the option to verify system files.DStart the recovery console and type Diskpart from the command prompt.EStart the recovery console and enter Fixmbr from the command prompt.

单选题You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132.  All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?()ARun the IPconfig /renew command. BStop and then restart the World Wide Web Publishing service. CEnsure that the Everyone group has Allow - Full Control permission on the Inetpub folder. DIn the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.

多选题You are the desktop administrator for ExamSheet. Your Windows 2000 Professional computer is configured to support two monitors. You install a DOS-based application on your computer. The application uses the Windows 2000 Professional default settings Autoexec.nt and Config.nt.  Your primary and secondary video adapters are both set to 32 bit color, 800 x 600 resolution, and default refresh rates. You create a shortcut for the DOS-based application on the primary monitor's desktop and use the default PIF settings. You attempt to run the DOS-based application on the primary monitor. The application opens, but the display area is scrambled. You then attempt to run the DOS-based application on the secondary monitor. The application does not open. Both monitors function correctly when you run Windows based applications. You want to be able to run the DOS-based application on either monitor. What should you do?()AReconfigure the PIF settings of the DOS-based application to start in a window.BReconfigure the shortcut properties to run the DOS-based application in full screen mode.CChange the drivers for both video adapters from WDM compliant drivers to DOS drivers.DChange the refresh rate setting to 72 hertz for both video adapters.EChange the color setting for both video adapters to 256 colors.

单选题Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()APublish the application by using Group Policy Software Installation.BDeploy the application by using Windows Server Update Services (WSUS).CService an online image of Windows 7 to add the new application.DService an offline image of Windows 7 to add the new application.

单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()ACopy the shortcut to %systemdrive%/documents and settings/default user/desktop/.BCopy the shortcut to %systemdrive%/documents and settings/all users/desktop/.CCopy the shortcut to your desktop. Modify the %comspec% system environment variable. DCopy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.

单选题You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. You want to deploy that application in such a way that the shortcuts of that application should be created on the used desktop as well as in start-menu. When a user first click on the shortcut or try to open any file whose extension is associated with that application, then that application should automatically install on the computer. What should you do to accomplish this task?()AUsing GPO, publish that application at user levelBUsing GPO, assign that application at the user levelCUsing GPO, publish that application at computer levelDUsing GPO, assign that application at the computer level.

单选题You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()AReinstall the application to another location.BRestore the program from the Quarantined Items list.CRemove the program from the Quarantined Items list.DRepair the program from the Programs option in Control Panel.

单选题Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

单选题You have a desktop computer and a portable computer.  Both the computers are configured to allow remote desktop connections. You connect to the desktop computer from the portable computer.  You need to save files from within the remote session to the C:// drive of the portable computer.  What should you do?()AOn your portable computer, map a drive to the C:// drive of the remote computer.BIn the System Properties dialog box of the desktop computer, enable the Remote Assistance feature.CIn the properties of the Remote Desktop Connection application, on the portable computer, select the C:// drive as a local resource for the remote session.DIn the properties of the Remote Desktop Connection application, on the portable computer, click the Automatically detect TS Gateway server settings option.