单选题The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()ANo account. They can use the built-in guest account.BNo Account. They can use the built-in Administrator account.CLocal user accountDDomain user account

单选题
The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()
A

No account. They can use the built-in guest account.

B

No Account. They can use the built-in Administrator account.

C

Local user account

D

Domain user account


参考解析

解析: 暂无解析

相关考题:

A network has been developed with resources from six different departments. One of the six departments has just informed you that they can increase the number of employees from to . This will result in:A.A shortening of the critical path.B.A shortening of the noncritical path.C.A decrease in the total cost of the project.D.An increase in the cost of the project.E.A through D are possible based upon where the resources are deployed.

104 A network has been developed with resources from six different departments. One of the six departments has just informed you that they can increase the number of employees from 5 to 8. This will result in:A. A shortening of the critical path.B. A shortening of the noncritical path.C. A decrease in the total cost of the project.D. An increase in the cost of the project.E. A through D are possible based upon where the resources are deployed

— You are the manager of the marketing department in your company. A new assistant manager has recently been appointed and will start work soon.— Write an email to all staff in the department:— explaining the need for the appointment— saying when the assistant manager will start work— describing the experience the assistant manager has.— Write 40 - 50 words.From: Candace WoodwardTo: All marketing staffSubject: New assistant manager

That's something you can improve by talking to human _______ . A courses ;B resources ;C sources

The company’s Human Resources department will then select the most suitable people to() an interview. A、joinB、attendC、go

The company's Human Resources department will then select the most suitable people to()an interview.A. attendB. joinC. go

Human language has two levels of structures, such as, units of the primary level are composed of elements of the secondary level and each of the two levels has its own principles of organization. Language is hierarchical. It indicates ______ of human language.A.dualityB.cultural transmissionC.arbitrarinessD.cognitive creativity

Write a memo in about 50 words. You are Human Resources Manager. Your company is going to provide the staff with training in E-Commerce. There will be two course levels: intermediate level and advanced level. The training course will be given on Saturdays for five weeks. Write a memo to department managers: ·Informing them of the coming training course; ·Asking them to encourage the staff to participate; ·Asking them to help obtain the names of the interested staff.

Your network contains an Active Directory forest. The forest schema contains a custom attribute  for user objects.     You need to give the human resources department a file that contains the last logon time and the  custom attribute values for each user in the forest.     Which should you use()A、the Dsquery toolB、the Export-CSV cmdletC、the Get-ADUser cmdletD、the Net.exe user command

You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A、 The HybridDictionary collection class.B、 The HashTable collection class.C、 The ListDictionary collection class.D、 The StringCollection collection class.

The IT department is creating a human resources application that will require several new tables. You need to develop a standard alone executable that will defines these tables and their relationships. Which developer/2000 component could you use to create the executable?()A、Procedure builder. B、Query builder. C、Schema builder. D、Form builder. E、Project builder. F、Transactional builder.

Your company has a server that runs Windows Server 2008 R2.You have a new application that locates remote resources by name. The new application requires IPv6.You need to ensure that the application can locate remote resources by using IPv6. What should you do?()A、CreateanewPointer(PTR)DNSrecord.B、CreateanewQuad-A(AAAA)DNSrecord.C、CreateanewSignature(SIG)DNSrecord.D、CreateanewRouteThrough(RT)DNSrecord.

You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()A、Enable Windows authentication.B、Enable basic authentication.C、Disable anonymous authentication.D、Enable anonymous authentication.

The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()A、No account. They can use the built-in guest account.B、No Account. They can use the built-in Administrator account.C、Local user accountD、Domain user account

单选题The IT department requested a report to list each server name and the name of each department that utilizes resources from each server. You create a tabular layout that breaks on the server name. You ran the report and noticed that the department field is too large for most of the department names. Which field size setting would you use to allow the field to be smaller but not larger than the field layout size?()AFixed BExpand CContract DVariable

单选题Your company has a server that runs Windows Server 2008 R2.You have a new application that locates remote resources by name. The new application requires IPv6.You need to ensure that the application can locate remote resources by using IPv6.What should you do?()ACreate a new Pointer (PTR) DNS record.BCreate a new Quad-A (AAAA) DNS record.CCreate a new Signature (SIG) DNS record.DCreate a new Route Through (RT) DNS record.

问答题Write a memo in about 50 words. You are Human Resources Manager. Your company is going to provide the staff with training in E-Commerce. There will be two course levels: intermediate level and advanced level. The training course will be given on Saturdays for five weeks. Write a memo to department managers: ·Informing them of the coming training course; ·Asking them to encourage the staff to participate; ·Asking them to help obtain the names of the interested staff.

填空题I (work) ____ in the Human Resources Department for five months since I joined the company.

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.  A new TestKing.com compliance policy requires that e-mail messages sent to the marketing users olderthan 150 days be deleted and e-mail messages sent to users in other departments are deleted after 90days. You receive an intruction from the CIO to recommend a solution to management that will complywith the eompliance policy. What should you do?()AYour best option would be to create two Managed Folder mailbox policies.You should then use one for users in the marketing department and the other for users in the other departmens.BYour best option would be configure deleted item retention for all testking.com users.CYour best option would be to create two new message classifications.You should then use one for e-mails sent to users in the marketing department and the other for e-mails sent to users in the other departments.DYour best option would be to configure Personal Archives for users in the marketing department.

单选题The IT department is creating a human resources application that will require several new tables. You need to develop a standard alone executable that will defines these tables and their relationships. Which developer/2000 component could you use to create the executable?()AProcedure builder. BQuery builder. CSchema builder. DForm builder. EProject builder. FTransactional builder.

多选题You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()ACreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.BCreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.CCreate a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.DCreate a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.EUse System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

单选题You install the Web Server (IIS) role on a server that runs Windows Server 2008. Your companys human resources department has a Web site named www.contoso.com/hr.  You need to create a virtual directory on the company Web site for the HR department. Which command should you run on the Web server?()Aappcmd add app /app.name:contoso /path:/hr /physicalPath:c:/websites/hrBappcmd add site /name:hr /physicalPath:c:/websites/hrCappcmd add vdir /app.name:contoso /path:/hr /physicalPath:c:/websites/hrDappcmd set vdir /vdir.name:hr /path:/hr /physicalPath:c:/websites/hr

单选题Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to give the human resources department a file that contains the last logon time and the custom  attribute values for each user in the forest.   What should you use()Athe Dsquery toolBthe Export-CSV cmdletCthe Get-ADUser cmdletDthe Net.exe user command

单选题Your network contains an Active Directory domain named contoso.com. Your company hires 500 temporary employees for the summer. The human resources department gives you a Microsoft Excel document that contains a list of the temporary employees. You need to automate the creation of user accounts for the 500 temporary employees. Which tool should you use?()AThe Add-Member cmdletBADSI EditCThe csvde.exe commandDActive Directory Users and Computers

问答题Practice 6  ● Your department needs to employ some temporary staff.  ● Write an email to the Human Resources Manager:  ● saying how many staff you need and giving the date you want them to start  ● explaining why you need them  ● stating what skills they should have  ● Write 40—50 words.

多选题Which two statements are true regarding ownership of shared entities? ()(Choose two.)ACustomers is owned by Oracle Human Resources whereas Locations is owned by Oracle Receivables.BItems is owned by Oracle Purchasing whereas Locations is owned by Oracle Receivables.CSales Force is owned by Oracle Order Management whereas Employees is owned by Oracle Human Resources.DSet of books is owned by Oracle General Ledger whereas Locations is owned by Oracle Human Resources.ESuppliers is owned by Oracle Purchasing whereas Units of Measure is owned by Oracle Inventory.

问答题Practice 8  ● You are the Director of the Human Resources Department. The CEO has asked you to prepare a proposal on how to turn classroom training into workplace learning for the management discussion.  ● Write the proposal explaining how to turn the classroom training into workplace learning.  ● In your proposal, you need to:  ● refer to the importance of turning professional training into workplace learning,  ● summarize the key factors in effective learning cycle such as goals, practice, and application, etc.  ● Write 200-250 words on the separate answer paper provided.