单选题A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()ASafe ModeBAutomated System RecoveryCLast Known Good ConfigurationDSystem Restore
单选题
A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()
A
Safe Mode
B
Automated System Recovery
C
Last Known Good Configuration
D
System Restore
参考解析
解析:
暂无解析
相关考题:
The program memory serves basically as a place(66)instructions, the coded pieces of data(67)direct the activities of the control processing unit(CPU). A group of(68)related in- structions stored in memory is referred to as a program. The CPU "read" each instruction from memory a logically(69)sequence and "use" it to initiate program action. If the program structure is coherent and(70), processing procedures produce intelligible and useful results.A.storedB.to storeC.to be storedD.storing
A technician is dispatched to a malware infected system. Upon arrival, the technician notices themalware’s pop-up on the screen. Which of the following boot methods would the technician utilize?() A. Reboot in Safe ModeB. Reboot in Recovery ConsoleC. Reboot in Last Known Good ConfigurationD. Reboot in System Debug Mode
program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon
The system is designed to be used in conjunction with a word processing program.A:together B:in successionC:in alliance D:in connection
Program(73)describes program's objectives, desired output, input data required, processing requirement, and documentation.A.specificationB.flowchartC.structureD.address
Program( )describes program's objectives,desired output,input data required,processing requirement,and documentation.A.specificationB.flowchartC.structureD.address
Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. existing database and application programB. application program and user interfaceC. existing database and user interfaceD. existing database,application program and user interface
The objective of()is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is().Most information systems require data to be stored and retrieved, whether a small file,such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records.The second function is the(),the processing required to access data, which often means database queries in Structured Query Language. The third function is the(请作答此空 ),which is the logic documented in the DFDs, use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user's commands.The three primary hardware components of a system are (). A. system requirementsB. system architectureC.application logicD.application program
With PGP, which of the following entity signs a users’s public key?()A、 The sender of the message.B、 The receipient of the message.C、 The sender’s administrator who provides the sender with the PGP program.D、 A third party that belongs to what’s often known as "web of trust", that can verify the relationship between the user and the key.E、 The vendor of the PGP program.
An uninstalled program is still attempting to load when Windows starts. Which of the following options can the technician suggest to stop this unwanted program from loading?()A、ServicesB、Add or Remove ProgramsC、System Configuration UtilityD、System File Checker
A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A、system /vB、winnt /sC、sfc /scannowD、chkdsk /f
Which of the following is TRUE about the ate program?()A、When running ate for the first time it will prompt for all the required information and configure all the required devicesB、The program is used by cu to communicate to a remote systemC、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty portD、The program ate calls cu to communicate with the remote system
What will be written to the standard output when the following program is run?() public class Qd803 { public static void main(String args[]) { String word = "restructure"; System.out.println(word.substring(2, 3)); } } A、estB、esC、strD、stE、s
A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()A、Safe ModeB、Automated System RecoveryC、Last Known Good ConfigurationD、System Restore
A technician is dispatched to a malware infected system. Upon arrival, the technician notices themalware’s pop-up on the screen. Which of the following boot methods would the technician utilize?()A、Reboot in Safe ModeB、Reboot in Recovery ConsoleC、Reboot in Last Known Good ConfigurationD、Reboot in System Debug Mode
A user’s OS has become corrupt, and the user would like to restore the PC back to when they first bought the machine. Which of the following would be the BEST choice?()A、Factory Recovery PartitionB、Use Safe ModeC、Last Known Good ConfigurationD、Purchase a copy of the original OS
You run the English (US) edition of Windows 2000 professional on your computer. You are developing a product installation document that has text in both English and Spanish. The word processing program you are using is a Windows 16-bit character-based application. You start theword processing program and complete the English Portion of the document. You then install Spanish as a language group by using Regional Options in Control Panel. However, You cannot use Spanish to complete the Spanish portion of your document. What should you do?()A、Change the language preference from English to Spanish within the word processing Program.B、Install the Spanish version of Windows 2000 Professional. Reconfigure your language settings, and restart the word processing program.C、Save and close the word processing program. Select Spanish by using the locate indicator on the taskbar, and restart the word processing program.D、Save and close the word program. Log off and log on to the computer. Restart the Word processing program, and select Spanish by using the locale indicator on the taskbar.
You run the English (US) edition of Windows 2000 Professional on your home computer. You are writing a letter that will include text in both English and German. The word processing program you are using is a Windows 16-bit character-based document. You then install German language support by using Regional Options in Control Panel. However, you are unable to use German in your document. You want to be able to complete the German portion of the document with the least amount of administrative effort. What should you do?()A、Save the document and close the word processing program. Select German by using the locale indicator on the taskbar and restart the word processing program.B、Save the document and close the word processing program. Log off and log on to the computer. Restart the word processing program and select German by using the locale indicator on the taskbar.C、Install the German version of Windows 2000 Professional. Reinstall the word processing program.D、Change the language preference from English to German within the word processing program.
单选题A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()APerform an antivirus program scanBBoot the machine into Safe ModeCRemove the machine from the networkDCheck for system security patches
单选题Which of the following is TRUE about the ate program?()AWhen running ate for the first time it will prompt for all the required information and configure all the required devicesBThe program is used by cu to communicate to a remote systemCThe program is used for remote communications between the host and a remote system using a modem or null modem via a tty portDThe program ate calls cu to communicate with the remote system
单选题With PGP, which of the following entity signs a users’s public key?()A The sender of the message.B The receipient of the message.C The sender’s administrator who provides the sender with the PGP program.D A third party that belongs to what’s often known as web of trust, that can verify the relationship between the user and the key.E The vendor of the PGP program.
单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()Asystem /vBwinnt /sCsfc /scannowDchkdsk /f
单选题A technician is dispatched to a malware infected system. Upon arrival, the technician notices themalware’s pop-up on the screen. Which of the following boot methods would the technician utilize?()AReboot in Safe ModeBReboot in Recovery ConsoleCReboot in Last Known Good ConfigurationDReboot in System Debug Mode
单选题A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()ASafe ModeBAutomated System RecoveryCLast Known Good ConfigurationDSystem Restore
单选题A Windows XP system has been badly infected with malware. The technician notices that the malware is making repeated attempts to broadcast over the network from activity seen on the local firewall. Which of the following Windows XP startup options would be the SAFEST way to remove the malware?()AUse the Safe Mode with Networking optionBUse the Safe Mode optionCUse the Enable Boot Logging optionDUse the Last Known Good Configuration option
单选题You run the English (US) edition of Windows 2000 professional on your computer. You are developing a product installation document that has text in both English and Spanish. The word processing program you are using is a Windows 16-bit character-based application. You start theword processing program and complete the English Portion of the document. You then install Spanish as a language group by using Regional Options in Control Panel. However, You cannot use Spanish to complete the Spanish portion of your document. What should you do?()AChange the language preference from English to Spanish within the word processing Program.BInstall the Spanish version of Windows 2000 Professional. Reconfigure your language settings, and restart the word processing program.CSave and close the word processing program. Select Spanish by using the locate indicator on the taskbar, and restart the word processing program.DSave and close the word program. Log off and log on to the computer. Restart the Word processing program, and select Spanish by using the locale indicator on the taskbar.
单选题A user’s OS has become corrupt, and the user would like to restore the PC back to when they first bought the machine. Which of the following would be the BEST choice?()AFactory Recovery PartitionBUse Safe ModeCLast Known Good ConfigurationDPurchase a copy of the original OS
单选题You run the English (US) edition of Windows 2000 Professional on your home computer. You are writing a letter that will include text in both English and German. The word processing program you are using is a Windows 16-bit character-based document. You then install German language support by using Regional Options in Control Panel. However, you are unable to use German in your document. You want to be able to complete the German portion of the document with the least amount of administrative effort. What should you do?()ASave the document and close the word processing program. Select German by using the locale indicator on the taskbar and restart the word processing program.BSave the document and close the word processing program. Log off and log on to the computer. Restart the word processing program and select German by using the locale indicator on the taskbar.CInstall the German version of Windows 2000 Professional. Reinstall the word processing program.DChange the language preference from English to German within the word processing program.