名词解释题计算机软件(Computer Software)

名词解释题
计算机软件(Computer Software)

参考解析

解析: 暂无解析

相关考题:

( )is the first line of protect between your computer and the public Internet.A.The Internet protocolB.The firewallC.The anti-virus software D.The intrusion-detection systems

You want to connect your Windows 2000 Professional computer to a new color laser printer. The printer is Plug and Play compliant. The printer is included on the current Hardware Compatibility List (HCL).You are a member of the Sales organizational unit (OU). You want to share the printer with other users in the Sales Organizational Unit.You plug the printer into the LPT port on the back of the computer. You then attempt to install the 32-bit application printer software that came with the printer. During the installation you receive an error message as shown in the exhibit.What should you do before you share the printer to other users in the Sales OU?A.Change the LPT port settings to enable legacy Plug and Play detection on your computer.B.Change the LPT port setting to bidirectional in the BIOS on your computer. Then reinstall the printer software.C.Connect the printer to another computer in the Sales Organizational Unit. Then install the device drivers for the printer.D.Obtain and install WDM-compliant device drivers and printing software for the printer.

There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist

Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression

He developed computer software to handle complicated______(finance) transactions.

Software refers to(70). The most important software on any computer is(71).A.inputB.programsC.outputD.electronic

______ is permanently stored in the computer and provides a link between the hardware and other programs that run on the PC.A.InterfaceB.Operating systemC.InternetD.Applicaion software

Without systems software, application software in a computer is(73)A.nouseB.usefulC.usenessD.useless

Your computer runs Microsoft Windows XP Professional. The computer also runs 20 third- party applications. You plan to upgrade your computer to Microsoft Windows Vista. The functionality of the existing applications must be maintained even after you upgrade your computer. You need to ascertain whether the hardware and software on the Windows XP Professional computer will support the upgrade.What should you do?()A.AB.BC.CD.D

In software engineering the design phase is divided into( )。A.system design and detailed designB.computer design and program designC.system design and hardware designD.computer design and detailed design

Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.A.network B.virus C.security D.architecture

Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.A.network B.virus C.security D.architecture

()is the basic software that allows the user to interface with the computer. A.DisplayB.ApplicationC.ScreenD.Operating System

The most appropriate title for this text is.[A]Differences between Two Webs[B]The Humanization of Computer Software[C]A New Solution to World Problems[D]The Creator and His Next Creation

Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.A.networkB.virusC.securityD.architecture

In software engineering the design phase is divided into ( ). A.system design and detailed design B.computer design and program design C.system design and hardware design D.computer design and detailed design

CASE(Computer-Aided Software Engineering)的含义是计算机辅助()A、设计B、教育C、分析D、软件工程

计算机软件(Computer Software)

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional, and all client computer objects are store din the Clients organizational unit (OU). Client computers receive critical security patches from servers at Microsoft. A server named Testking1 runs Software Update Services (SUS). You enable Testking1 to obtain and store security patches for distribution on the internal network. Now you need to ensure that all client computers receive future security patches from Testking1 only. You open the Group Policy object (GPO) for the Clients OU. Which setting should you configure?()A、Computer Configuration/Software Settings/Software InstallationB、User Configuration/Software Settings/Software InstallationC、Computer Configuration/Administrative Templates/Windows Components/Windows InstallerD、User Configuration/Administrative Templates/Windows Components/Windows InstallerE、Computer Configuration/Administrative Templates/Windows Components/Windows UpdateF、User Configuration/Administrative Templates/Windows Components/Windows Update

下列哪一项不是Group Policy的段()A、Software SettingsB、Windows SettingsC、Administrative TemplatesD、Computer Settings

A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A、The file associations were not returned after the software was uninstalled.B、The user is not opening the files correctly.C、The uninstalled software has corrupted all the audio files on the computer.D、The sound card is not properly configured.

Which of the following malicious software types will create multiple pop-ups on a computer?()A、AdwareB、GraywareC、WormsD、Spyware

You are the desktop administrator for your company. You install Windows XP Professional on a new portable computer that will be used by one of the company's software developers. You test the computer after you complete the installation and find out that the computer functions properly. The computer contains a 6-GB hard disk and a removable 4-GB hard disk. The 6-GB hard disk is configured as drive C, and the removable hard disk is configured as drive D. You install Windows 98 on drive D and deliver the computer to the software developer. The software developer reports that the computer does not start when drive D is not connected. Instead, the computer briefly displays an operating system menu, and then it displays an error message stating that an operating system could not be found. When drive D is connected, the computer starts Windows 98. You need to configure the computer so that it starts Windows XP Professional whether or not drive D is connected. What should you do?()A、Modify the computer's BIOS so that it automatically detects whether drive D is connected.B、Modify the computer's BIOS so that drive C is first in the computer's boot order. C、Modify the Boot.ini file on the computer by changing the default= entry to the following value: multi(0)disk(0)rdisk(0)partition(1)="Microsoft Windows XP Professional" /fastdetect.D、Modify the Boot.ini file on the computer by changing the entry for Windows 98 to the following value: D: "Microsoft Windows 98" /fastdetect.

You have a single Active Directory directory service domain. All domain controllers run Windows Server 2003. All client computers run Windows Vista. The computers in the sales department are located in an organizational unit (OU) named Sales. You use a Default Domain Policy to configure company user and computer settings. You configure a software restriction policy for the domain. The policy prevents users from running software that is not approved.  You need to allow computers in the Sales OU to run software that is not approved while maintaining other required settings.  What should you do?()A、 Configure the Sales OU to block inheritance.B、 Create a new software restriction policy that reverses the settings in the Default Domain Policy. Link the new software restriction policy to the Sales OU.C、 Link the software restriction policy to the Sales OU. Disable the user configuration settings of this policy.D、 Link the software restriction policy to the Sales OU. Disable the computer configuration settings of this policy.

Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

单选题A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()ABackup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.BUninstall the payroll software to ensure confidentiality.CHave the director remove sensitive data before the computer will be repaired.DPerform needed repairs while avoiding sensitive data.

单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile