单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()Asystem /vBwinnt /sCsfc /scannowDchkdsk /f
单选题
A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()
A
system /v
B
winnt /s
C
sfc /scannow
D
chkdsk /f
参考解析
解析:
暂无解析
相关考题:
software, also called end-user program, includes database programs, word processors, spreadsheets etc.A.ApplicationB.SystemC.CompilerD.Utility
The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus
An application software is any program(68)to perform. a specific function directly for the user or, in some cases, for another application program.A.designB.designingC.designedD.praticed
A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A. Run chkdsk.B. Run an antivirus program.C. Replace the faulty mouse.D. Remove any recently added hardware.
A recently installed package needs to be rolled back to aprevious version.Which of the following commands will perform the task?() A.rejectB.cleanupC.deinstallD.uninstall
YouhaveanExchangeorganization.AllserversintheorganizationhaveExchangeServer2010ServicePack1(SP1)installed.AllusershaveWindowsMobile6.5devicesthatconnecttotheorganizationbyusingExchangeActiveSync.AusernamedUser1reportsthatshelostherdeviceandsuccessfullyperformedaremotewipeofthedevice.User1laterreportsthatshelocatedherdevice.User1configuresthedevicetoconnecttoExchangeActiveSyncanddiscoversthattheconnectionfails.YouneedtoensurethatUser1canconnectherdevicebyusingExchangeActiveSync.Whatshouldyoudo?()
describes how to interact with the information system to accomplish specific tasks.A.System specificationB.Program specificationC.User guideD.System document
When you create an account, you are typically asked to enter a user ID and ( ). A nameB requirementC passwordD program
Hardware interrupts are triggered by______outside the microcontroller.A.user instructionsB.peripheral devicesC.kernelD.program
Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. existing database and application programB. application program and user interfaceC. existing database and user interfaceD. existing database,application program and user interface
A technician recently installed a new firewall. Which of the following ports must be open to permit HTTPS traffic?()A、21B、23C、80D、443
Which device is installed in user devices and makes wireless connections between them and a network?()A、Access pointB、BridgeC、RouterD、Client adapter
A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A、Run chkdsk.B、Run an antivirus program.C、Replace the faulty mouse.D、Remove any recently added hardware.
A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing?()A、AdvertisementsB、Resource consumptionC、A trojan infectionD、Unremoved viruses
Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()A、Log onto the user’s computer as a local administrator and install the printer.B、Make sure the user has permission to print to the printer.C、Create and implement a logon script.D、After the user has logged on, install the printer.
A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()A、Safe ModeB、Automated System RecoveryC、Last Known Good ConfigurationD、System Restore
A recently installed package needs to be rolled back to a previous version. Which of the following commands will perform the task?() A、rejectB、cleanupC、deinstallD、uninstall
A system administrator is monitoring a system that has recently shown a decrease in performance. The administrator suspects there is an overload of traffic on a single Ethernet adapter. Which of the following commands is best to identify a possible overload of the Ethernet adapter?()A、pingB、iostatC、netstatD、ifconfig
A system administrator is monitoring a system that has recently shown a decrease in performance.The administrator suspects that the system may be low on memory and may be paging excessively.Which of the following commands is best to identify a possible paging problem?()A、iostatB、netstatC、psD、vmstat
An administrator just completed an AIX installation but suspects that not all filesets installed completely. Which of the following commands would verify that all filesets are completely installed?()A、installp -EB、lslpp -EC、lppchk -cD、instfix -c
A base operating system has just been installed, successfully rebooted, and the user is now logged in as root. The user wants the server software bundle installed, but has additional software that must be installed with the bundle. Which of the following procedures should be performed to complete the installation?()A、Add the software to /usr/sys/inst.imagesB、Update the bundle file in /usr/sys/inst.imagesC、Install the bundle filelists and run update allD、Add the software to the bundle file in /usr/sys/inst.data/sys_bundles
Core files required for user applications are stored in which of the following locations?()A、Program filesB、Temporary filesC、WindowsD、Documents and settings
单选题A system administrator just completed an AIX installation but suspects that not all filesets installed completely. Which command should be run to verify that all filesets are completely installed?()AinstallpBlslppClppchkDoslevel
单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()Asystem /vBwinnt /sCsfc /scannowDchkdsk /f
单选题MySQL is installed on a Linux server and has the following configuration: What is the purpose of changing ownership of datadir to the ‘mysql’ user?()A MySQL requires correct file ownership while remaining secureB MySQL needs to be run as the root user, but file cannot be owned by itC MySQL cannot be run as the root user
单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server has Terminal Server installed. You have a new multi-user application that you plan to install on the server. The setup program for the application is named setup.exe. You need to install the application on the server. You must ensure that the application can be used by all users. What should you do? ()AFrom the command prompt, run setup.exe.BFrom Add or Remove Programs, add a new program.CIn Windows Explorer, use the Run As option to run setup.exe.DIn Windows Explorer, use Compatibility mode to run setup.exe.
单选题A technician recently installed a new firewall. Which of the following ports must be open to permit HTTPS traffic?()A21B23C80D443
单选题A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing?()AAdvertisementsBResource consumptionCA trojan infectionDUnremoved viruses