单选题He's responsible()the central computer system.AinBforCof

单选题
He's responsible()the central computer system.
A

in

B

for

C

of


参考解析

解析: 暂无解析

相关考题:

Although machines have been around for a long time and people have adapted easily to living with most of them, they haven’t yet learned how to live in harmony with the newest of these: the personal computer. This is so because the widespread use of the personal computer is a relatively new phenomenon. There was the widely publicized case of a family man who became so absorbed in his computer that he spent long hours with it. Of course, if he was spending long hours with his computer, he was spending less time with his family. And if his wife needed to see him, he was unavailable. She became so upset by this state of affairs that she delivered an ultimatum (最后通 牒), declaring that unless he spent fewer hours with the machine and more with her and the family, she was going to divorce him. This issue became so serious that the couple had to go to a doctor to resolve it. The fortunate result was that the husband reduced the time he spent with the computer, and the marriage was saved. Personal computers may cause people to become isolated from one another since work can be done at home alone. In this case, there may be no need for offices, or for that matter, for any other central gathering place. Universities, or even cities, could be abandoned. Moreover, if that which is now recorded on paper is recorded in the computer instead, people will have no reason to use any paper whatsoever: no money, receipts, letters, newspapers, magazines, books, and so on. If this happens, there will be no need to go to the bank, the bookstore, or the library. Will people then be isolated in their separate homes—alone with their computers and their families, apart from fellow workers, readers, or students?66.We can learn from the passage that the personal computer __________.A.has been around for a long timeB.has been accepted by all peopleC.is not welcome to everyoneD.is not widely used yet67.The man’s wife was upset because __________.A.he loved another womanB.he wanted to divorce herC.she didn’t have her own computerD.he was neglecting her and the family68.The man’s wife threatened to divorce him if __________.A.he continued to spend long hours with the computerB.he did not quit his job with the computer companyC.he did not spend time with her parentsD.he did not go to see the doctor with her69.The marriage was saved __________.A.with the help of a doctorB.with the help of a fortune tellerC.after the wife took over the computerD.after the husband sold the computer70. What seems to be worrying the author as far as the computer is concerned?A.People may become isolated from one another.B.Offices may no longer be necessary.C.People will no longer read books or magazines.D.Factory workers will lose their jobs.

Why was David able to get the job in the company?A. He had done well in all his exams.B. He had written some computer programs.C. He was good at playing computer games.D. He had learnt to use computers at school.

The central idea of this passage is ______.A.electronic transfer of fundsB.bank's payment mechanismC.clearing of checksD.computer and payment

A:What does your father do? B:( ).A. He is responsible for the central computer systemB. He works with another manC. He is in the office

● (73) manages the other components of a computer system.(73)A.BusB.Application systemC.Operating systemD.Disk

If he is a common carrier,he is absolutely responsible to the owner of the goods carried ______ any loss or damage to them unless caused by an Act of God or the Queen's enemies,or the inherent vice in the goods themselves,or the negligence of the owner of the goods,or a general average sacrifice.A.byB.toC.atD.for

共用题干HackingPeople tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place. According to the passage,which of the following statements is NOT true?A: Hacking is also known as computer break-in.B: Experts on computer networks consider hacking nothing serious.C: Hacking is a widespread concern.D: Hacking is potentially disastrous.

共用题干HackingPeople tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place. Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?A: Deleting information in the computer's memory.B: Shutting down the computer whenever he wishes.C: Entering your house to steal.D: Spoiling a system for air traffic.

共用题干HackingPeople tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place. The writer mentions“a thief"” in the second paragraph______.A: to show that a hacker is more dangerous than a thiefB: to tell people that thieves like to steal computers nowadaysC: to demand that a protective computer system should be set up against thievesD: to demonstrate that hackers and thieves are the same people

He's responsible()the central computer system.A、inB、forC、of

You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?() A、On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. B、On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. C、In the domain, modify Marc's Logon Workstations list to include the name of the computer.D、In the domain, modify Marc's account properties to unlock the account.

A customer’s computer crashes consistently when a specific application is launched. Thetechnician has looked at the computer and confirmed the cause of the crash. Which of thefollowing is the NEXT troubleshooting step the technician should take?()A、Verify full system functionality.B、Document the findings, actions, and outcomes.C、Establish a plan of action to resolve the problem.D、Question the user and identify changes the user has made to the system.

You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

You are the administrator of your company’s network. A user named Stephen in the graphics department logs on to his Windows 2000 Professional computer. He installs a shared color laser printer. The color laser printer is connected to a computer named Server1. The next day Stephen returns and logs on to a Windows NT Workstation 4.0 computer. Stephan reports that when he attempts to print a document to the shared color laser printer, the printer is not included in the list of available printers. You want to allow Stephen to send print jobs to the shared color laser printer from any computer on the network. What should you do?()A、Configure a roaming user profile for Stephen’s user account.B、Configure the server properties of the printer system folder to connect to the shared printer.C、Install the printer driver for the print device on the Windows NT workstation computer.D、Upgrade the Windows NT Workstation computer to Windows 2000 Professional, and then import the profile settings for Stephen’s user account.

You are the network administrator for your company. An employee named Bruno uses a Windows 2000 Professional portable computer. When he starts the computer, Windows 2000 prompts him to select either a docked or an undocked mode. Bruno primarily works out of the office and does not use a docking station. What should you do?()A、 Modify the portable computer’s BIOS settings, and disable support for the docking stationB、 Modify the portable computer’s hardware profiles, to remove the Docked hardware profileC、 Modify the portable computer’s device settings to disable the Unplug devices icon in the  system tray. D、 Modify the portable computer’s hardware profiles, and move the Docked hardware profile to  the top of the list of hardware profiles.

You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

You are the network administrator for your company. A user reports that the USB ports on his Windows 2000 Professional portable computer function only when the portable computer is in its docked position at the office. He asks you to configure the computer so that the USB port works when the portable computer is docked and when it is undocked and running on battery power. You verify that the portable computer supports ACPI power management. What should you do?()A、Modify the portable computer’s power management settings to ensure the USB ports are not  shut down when the computer is running on battery power. B、Modify the portable computer’s BIOS settings to disable ACPI when the computer is running  on battery power. C、Modify the portable computer’s undocked hardware profile, and enable the USB root hub. D、Disable the BIOS power management features in the portable computer’s BIOS settings. E、Obtain external power supplies for the user’s USB devices. Ensure that these power supplies  are connected when the portable computer is undocked. F、Undock the portable computer, and reinstall the drivers for the USB port.

单选题He's responsible()the central computer system.AinBforCof

单选题You are the network administrator for your company. An employee named Bruno uses a Windows 2000 Professional portable computer. When he starts the computer, Windows 2000 prompts him to select either a docked or an undocked mode. Bruno primarily works out of the office and does not use a docking station. What should you do?()A Modify the portable computer’s BIOS settings, and disable support for the docking stationB Modify the portable computer’s hardware profiles, to remove the Docked hardware profileC Modify the portable computer’s device settings to disable the Unplug devices icon in the  system tray. D Modify the portable computer’s hardware profiles, and move the Docked hardware profile to  the top of the list of hardware profiles.

单选题You are the network administrator for your company. A user reports that the USB ports on his Windows 2000 Professional portable computer function only when the portable computer is in its docked position at the office. He asks you to configure the computer so that the USB port works when the portable computer is docked and when it is undocked and running on battery power. You verify that the portable computer supports ACPI power management. What should you do?()AModify the portable computer’s power management settings to ensure the USB ports are not  shut down when the computer is running on battery power. BModify the portable computer’s BIOS settings to disable ACPI when the computer is running  on battery power. CModify the portable computer’s undocked hardware profile, and enable the USB root hub. DDisable the BIOS power management features in the portable computer’s BIOS settings. EObtain external power supplies for the user’s USB devices. Ensure that these power supplies  are connected when the portable computer is undocked. FUndock the portable computer, and reinstall the drivers for the USB port.

单选题Playing games for hours at a time without a break, Pete sits at the computer screen until his eyes begin to water to water.APete sits at the computer screen until his eyes begin to waterBthe computer screen makes Pete’s eyes waterCPete’s eyes water when he sits at the computer screenDPete’s eyes, who water, sitting at the computer screenEPete sitting at the computer screen with watering eyes

单选题You are responsible for administering the Production OU. You are assigned the Allow - Full Control permission for the OU. All computer objects in the Production OU are administered by another administrator named Tom. The Production OU contains the computer account for a Windows Server 2003 computer named Testking1. Tom submits a list of configuration settings that he wants to apply to Testking1 by means of a Group Policy object (GPO). A GPO that contains Tom's required settings is created in another OU by the domain administrator. You only want to allow Tom to link existing GPOs to the Production OU. He must not have any more rights than he needs to perform the required tasks. What should you do?()AAdd Tom's user account to the Group Policy Creator Owners group in the domain.BRun the Delegation of Control Wizard and assign Tom's user account the Allow - Manage group policy links permission for the Production OU.CRun the Delegation of Control wizard and assign Tom's user account the Allow - Change permission for the Production OU.DRun the Delegation of Control wizard and assign Tom's user account the Allow - Apply group policy permission for all GPOs that are linked to the Production OU.

单选题If he is a common carrier,he is absolutely responsible to the owner of the goods carried ()any loss or damage to them unless caused by an Act of God or the Queen’s enemies,or the inherent vice in the goods themselves,or the negligence of the owner of the goods,or a general average sacrifice.AbyBtoCatDfor

单选题Where goods are stowed on deck without the shipper’s consent,the()is alone responsible for its loss by jettison,because he has placed them in a dangerous position in violation of his undertaking to carry them safely.AChartererBShipownerCCargoownerDMerchant

单选题You are the administrator of Company’s network.  A user named Sven has a Windows 2000 Professional portable computer. He has configured the portable computer with options that provide him with the maximum battery life. Sven reports that when the laptop resumes from standby mode he does not receive a prompt for the password.  You want to configure Sven’s portable computer to ensure that a password is required when the computer resumes from standby mode.   What should you do?()AReset Sven’s user account.BAdd Sven to the Power Users group.CConfigure the Advanced power options properties.DConfigure the power options to use the Home/Office Desk power scheme by default.EConfigure the power options to use the Portable/Laptop power scheme by default.

单选题According to the Sale Contract,it’s of FOB plus S.T.term.It’s quite obvious that().Aour ship is not responsible for trimming and stowingBour ship is responsible for trimming and stowingCour ship is responsible for expensesDour ship is not responsible for expenses

单选题Which of the following is NOT the purpose of America’s central bank?AControlling the flow of money in the economy.BOverseeing the activities of banks.CProducing and distributing bank notes and coins.DContributing to the maintenance of a stable financial system.

单选题______ , he finds the work interesting.AThough he is computer expertBA computer expert he isCAs computer expertDComputer expert as he is