单选题According to the first rule, the user should _____.Akeep the cooker under close watchBalways keep the cooker half fullCnever leave the cooker emptyDnever turn off the stove

单选题
According to the first rule, the user should _____.
A

keep the cooker under close watch

B

always keep the cooker half full

C

never leave the cooker empty

D

never turn off the stove


参考解析

解析:
根据文章的第一条规则“Never leave the cooker unwatched when it is in use”可知,使用时需要派人在旁边看守,据此得出答案为A。

相关考题:

According to the first rule, high executive pay is ______.A.nothing but a problem concerning governanceB.due to the abuses of powerC.unrelated with bosses' decisionsD.provided for managers so that it would harm companies

According to the passage,which of the following statements is TRUE?( )A.You should be the first one to leave your work.B.You should ask your C0—workers for your duties.C.You should not be eager to go back home.D.You are required to arrive l 5 minutes earlier.

Embedded systems always require the user to manipulate bits inregisters or variables. Given an integer variable a, write two code fragments.The first should set bit 5 of a. The second shnuld clear bit 5 of a. In bothcases, the remaining bits should be unmodified.

The main feature of(72)is that they follow a first-come/first-served rule. For instance, the line of(73)waiting to be run on a computer system.A.looplinksB.queuesC.stacksD.trees

A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()A、Record the solution in the appropriate logs for future use.B、Ask the user who reported the issue what past documentation they have.C、Ask the user who reported the issue to explain the symptoms in detail.D、Record what steps should be taken to resolve the issue.

Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A、 Reboot the file server.B、 Ask the user what they were doing when they noticed the problem.C、 Ask the user to reboot their PC.D、 Ask the user to ping the default gateway and report the response times back to the administrator.

A user reports that their hard drive has failed and needs to be replaced. Which of the following should the technician do FIRST?()A、Run the hard disk manufacturer’s diagnostic programB、Re-image the driveC、Replace the hard drive and load WindowsD、Ask the user diagnostic questions

A user states that the wireless on their laptop was working when they where at home, however,now in the office no wireless connection can be made. Which of the following should the technician check FIRST?()A、If the wireless is enabledB、If the laptop is connected to the correct gatewayC、If the SSID is enabledD、If the DHCP address scheme is correct

A user reports that they are unable to print to a remote printer. Which of the following should the technician check FIRST?()A、Printer driverB、Protocol stackC、Network connectivityD、Correct patch application

You have an Exchange Server 2010 organization.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1.You must prevent User1 from modifying the membership of Group1.  What should you do?()A、Add User1 to Group1 Managed by listB、Assign User1 as a group moderator for Group1.C、Assign the Message Tracking management role to User1.D、Add User1 to Group1 and then create a new journal rule.

All client computers in your network run Windows 7 Enterprise.    You need to prevent all standard user accounts from running programs that are signed by a specific publisher.   What should you do?()A、Use software restriction policies. Create a path rule.B、Use software restriction policies. Create a hash rule.C、Use AppLocker application control policies. Create an Executable rule.D、Use AppLocker application control policies. Create a Windows Installer rule.

Your computer has Microsoft Windows Firewall enabled.  Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic.  You need to prevent your child from playing this game.  What should you do? ()A、Enable the User Account Control feature.B、Configure the user account of your child as a standard user.C、Create an outbound rule in Windows Firewall to block UDP port 5678.D、Create an outbound rule in Windows Firewall to block TCP port 5678.

You are employed as the exchange administrator at company.com.the company.com network contains an exchange 2010 organization.Company.com has its headquarters in stock holm where you are located.During the course of the week you receive an instruction from the cio to make sure those messages in the inbox folder of a company.com employee named kara lang is moved to a custom folder as soon as it reaches 51 days.What should you do?()A、you should first consider having a new mail folder created using microsoft office outlook. There after a journal rule should be created.B、you should first consider having a new mail folder created using microsoft office outlook.There after use the inbox managed default folder to run the managed content settings wizard.C、you should first consider having a managed custom folder created.thereafter a transport rule should be created.D、you should first consider having a managed custom folder created.There after use the inbox managed default folder to run the managed content settings wizard.

During startup, a Windows 2000 Professional computer in your office proceeds directly to the desktop without first prompting for a user name and password first.  You need to enforce logon requirements. What should you do? ()A、Change the Netlogon service startup setting to manual.B、Disable the Disable CTRL+ALT+DEL requirement for logon option in the local group policy.C、In Control Panel, modify the startup and recovery settings in the system option.D、In Control Panel, add the appropriate user accounts to the Users And Passwords setting.

单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()ACheck if the user account is lockedBCheck group policyCCheck the drive for fragmentationDCheck NTFS permissions

单选题Your network contains one Exchange Server 2010 Service Pack 1 (SP1) Client Access server named Server1. You have a user named User1. You need to limit the size of the attachments that User1 can download by using Windows Mobile 6.5 devices. What should you do first?()ACreate a new Exchange ActiveSync device access rule.BCreate new managed content settings.CModify the message size restrictions for User1.DCreate a new Exchange ActiveSync mailbox policy.

单选题The beginning sentence should present the most important fact because _____.Ait will influence the reader to continueBmost readers read only the first paragraphCit is line best way to write according to the schools of journalismDit details the general attitude of the writer

单选题You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. You want to deploy that application in such a way that the shortcuts of that application should be created on the used desktop as well as in start-menu. When a user first click on the shortcut or try to open any file whose extension is associated with that application, then that application should automatically install on the computer. What should you do to accomplish this task?()AUsing GPO, publish that application at user levelBUsing GPO, assign that application at the user levelCUsing GPO, publish that application at computer levelDUsing GPO, assign that application at the computer level.

单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()AThe cell phone should require a password after a set period of inactivity.BThe cell phone should only be used for company related emails.CThe cell phone data should be encrypted according to NIST standards.DThe cell phone should have data connection abilities disabled.

单选题You create a Web site that is for members only. The behavior of the Web site changes according to the role of the user. The Web site uses the ASP.NET Membership control for creation of user accounts. You need to find out whether a user is a member of a particular role. What should you do? ()APass the user names and passwords to Membership.ValidateUser.BPass the role names to User.IsInRole.CPass the role names to Roles.RoleExists.DPass the user names to Membership.GetUser.

单选题A user reports that their machine seems to be running slower than usual. The user states that the computer has become progressively worse as more applications are installed. Which of the following is the FIRST step the technician should take?()ARun the CHKDSK utilityBRun the disk defragmenter utilityCIncrease the capacity on the system volumeDConvert to a dynamic drive on the system

单选题According to the first rule, the user should _____.Akeep the cooker under close watchBalways keep the cooker half fullCnever leave the cooker emptyDnever turn off the stove

单选题According to the fifth rule, a pressure cooker cover should be opened ______.Aas soon as the cooking is finishedBwhile it is still on the stoveCwith force when it is hotDafter it is cooled down

单选题According to the author, a born naturalist should first of all be______.Afull of enthusiasmBself-disciplinedCfull of ambitionDknowledgeable

单选题According to the passage, we should first ____.Ado some research onlineBmake a plan for lunch

单选题According to the author, a born naturalist should first of all be _____.Afull of enthusiasmBself-disciplinedCfull of ambitionDknowledgeable

单选题A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A Reboot the file server.B Ask the user what they were doing when they noticed the problem.C Ask the user to reboot their PC.D Ask the user to ping the default gateway and report the response times back to the administrator.