单选题The Internet is a ()system of interconnected computer networks that use thestandard Internet protocol suite (TCP/IP) to serve several billion users worldwide.AglobalBregionalClocalDnational

单选题
The Internet is a ()system of interconnected computer networks that use thestandard Internet protocol suite (TCP/IP) to serve several billion users worldwide.
A

global

B

regional

C

local

D

national


参考解析

解析: 本题翻译为:因特网是一种连通的计算机网络的()系统,该网络使用标准因特网协议系列来为全世界数十亿用户提供服务。A.全球的B.局部的C.本地的D.国家的根据因特网的定义,是一种全球性的服务,选A。

相关考题:

●The firewall device is a(75)system for connecting a computer network to other computer network.(75)A.hardwareB.softwareC.securityD.I/O

The Internet is a ()system of interconnected computer networks that use thestandard Internet protocol suite (TCP/IP) to serve several billion users worldwide. A.globalB.regionalC.localD.national

There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist

The computer system broke out suddenly while he was searching for ination on the Internet.() 此题为判断题(对,错)。

The firewall device is a( )system for connecting a computer network to other computer network.A.hardwareB.softwareC.securityD.I/O

A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.The router fails. You connect the computer directly to the Internet.You need to ensure that the computer is connected to the Internet in the most secure manner possible.What should you do?()A.AB.BC.CD.D

In software engineering the design phase is divided into( )。A.system design and detailed designB.computer design and program designC.system design and hardware designD.computer design and detailed design

Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances

The Internet is a () system of interconnected computer networks that use the standard Internet protocol suits(TCP/IP) to serve several billion users worldwide。A.global B.regional C.local D.national

An embedded system is an applied computer system,as distinguished from other types of______such as personal computers(PCs)or supercomputers.A.computer systemsB.computer hardwareC.computer softwareD.systems

In software engineering the design phase is divided into ( ). A.system design and detailed design B.computer design and program design C.system design and hardware design D.computer design and detailed design

Cyberspace is described by William Gibson as( ) A.a function only legitimate computer operators have B.a representation of data from the human system C.an important element stored in the human system D.an illusion held by the common computer users

We have had a new computer system()AinstallBinstalledCinstallingDto install

The computer system()suddenly while he was searching for information on the Internet.Abroke downBbroke outCbroke upDbroke in

He's responsible()the central computer system.A、inB、forC、of

We have had a new computer system()A、installB、installedC、installingD、to install

You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()A、Privilege UseB、Object UseC、Security Settings UseD、System Use

You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

You have a computer that runs Windows XP Professional. The computer has a limited amount of free disk space. You need to identify the amount of disk space that is used to store the following:Temporary Internet Files, Files in the Recycle Bin, Downloaded program files. What should you do?()A、From the command prompt, run chkdsk.exe.B、From the System Tools menu, run Disk Cleanup.C、From Internet Explorer, view the Internet Options.D、From System Properties, view the User Profiles settings.

A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

All client computers in your company run Windows 7 Enterprise.Users run Windows XP Mode guest virtual machi nes (VMs) on their computers. Each client computer runs two guest VMs. Each guest VM requires network connectivity to the other guest VM on the host computer, but must not have network connectivity to the host computer operating system or to the Internet. You need to configure each guest VM to meet the requirements. What should you do?()A、Set each VM network adapter to Not connected.B、Configure each VM to use one Internal Network network adapter.C、Configure each VM to use one Shared Networking (NAT) networ k adapter.D、Disable Integration Features for each VM. Configure Windows Firewall to allow incoming ICMP traffic,and remove all other Windows Firewall exceptions.

You have a computer that runs Windows 7. You perform regular data backups and system image backups.The computer experiences a hard disk failure. You replace the failed hard disk. You need to recover thecomputer to the previous Windows 7 environment. You start the computer from the Windows 7 installationmedia. Which recover option should you select?()A、Command PromptB、Startup RepairC、System Image RecoveryD、System Restore

单选题You have a computer that runs Windows 7. The computer has System Protection enabled. You need toretain only the last System Protection snapshot of the computer. All other snapshots must be deleted.  Whatshould you do?()ARun Disk Cleanup for Programs and Features.BRun Disk Cleanup for System Restore and Shadow Copies.CFrom the System Protection Restore settings, select Turn off System Restore.DFrom the System Protection Restore settings, select Only restore previous versions of files.

单选题You have a computer that runs Windows XP Professional. You use Microsoft Outlook Express to download e-mail messages. You need to copy the e-mail messages, Outlook Express settings, and Internet Explorer settings to a new computer that runs Windows XP Professional. What should you do?()ACopy all *.dbx files from the old computer to the new computer. BEstablish a Remote Assistance session from the old computer to the new computer.CBack up the system state on the old computer. Restore the system state on the new computer. DRun the File and Settings Transfer Wizard on the old computer. Run the File and Settings Transfer Wizard on the new computer.

单选题The computer system()suddenly while he was searching for information on the Internet.Abroke downBbroke outCbroke upDbroke in

单选题AA new computer system was installed.BInformation was entered into the computer system correctly.CSome employee information got lost.DPaychecks were distributed for the wrong amount.

单选题You have a computer named Computer1 that runs Windows 7 and Windows Internet Explorer 8. A userreports that Computer1 has a number of Internet Explorer configuration issues that cause instability whenbrowsing the Internet. You need to configure Internet Explorer to use all default settings.  What should youdo from Internet Options?()AFrom the Advanced tab, click Reset.BFrom the Programs tab, click Set programs.CFrom the Advanced tab, click Restore advanced settings.DFrom the Security tab, click Reset all zones to default level.