单选题The computer system()suddenly while he was searching for information on the Internet.Abroke downBbroke outCbroke upDbroke in

单选题
The computer system()suddenly while he was searching for information on the Internet.
A

broke down

B

broke out

C

broke up

D

broke in


参考解析

解析: 暂无解析

相关考题:

上周他被指控闯入电脑系统。He the computer system last week.

On his way to the office, he suddenly remembered that he had (made the appointment with) his doctor.() 此题为判断题(对,错)。

You've read of how he had a headache and how, when he got word that Lee was ready to call it quits, he was suddenly and () cured. A、motivationB、languidC、excessiveD、miraculously

There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist

Tom( )attended the meeting last night, but he didn't as he suddenly fell ill.A. should haveB. hadC. must haveD. could have

The computer system broke out suddenly while he was searching for ination on the Internet.() 此题为判断题(对,错)。

In software engineering the design phase is divided into( )。A.system design and detailed designB.computer design and program designC.system design and hardware designD.computer design and detailed design

An embedded system is an applied computer system,as distinguished from other types of______such as personal computers(PCs)or supercomputers.A.computer systemsB.computer hardwareC.computer softwareD.systems

He suddenly returned__________a Sunday morning.A.onB.atC.inD.during

The thief dispersed the papers all over the room while he was searching for the money.A:abandonedB:vanishedC:scatteredD:desejied

共用题干HackingPeople tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place. Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?A: Deleting information in the computer's memory.B: Shutting down the computer whenever he wishes.C: Entering your house to steal.D: Spoiling a system for air traffic.

The computer system()suddenly while he was searching for information on the Internet.Abroke downBbroke outCbroke upDbroke in

He's responsible()the central computer system.A、inB、forC、of

You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?() A、On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. B、On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. C、In the domain, modify Marc's Logon Workstations list to include the name of the computer.D、In the domain, modify Marc's account properties to unlock the account.

Which of the following is a speed enhancement in Windows performance when searching for files?()A、IndexingB、FormattingC、Disk CleanupD、System Restore

You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy. What are two possible ways to achieve this goal?()A、Run the Secedit /configure /db C:/NewSec.sdb command.B、Run the Secedit /refreshpolicy machine_policy command.C、Copy NewSec.inf to the C:/Windows/Inf folder. D、Copy NewSec.sdb to the C:/Windows/System32/Microsoft/Protect folder. E、Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation. F、Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template.

You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

多选题You are the network administrator for ExamSheet.  You have implemented the Hisecws.inf security template on all the Windows 2000 Professional client computers in your network. A user has received a driver and utility software for an internal SCSI controller in his computer. The SCSI controller is not currently on the Hardware Compatibility List (HCL). He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly. You discover that the driver is not installed correctly. You want to install the SCSI driver without permanently reducing security on the client computer.  What should you do?()ARun theSfc /cancelcommand.BRun theSigverifcommand.CReconfigure the Driver Signing option.DInstall the SCSI driver.ERun theSfc /enablecommand.FReapply the security template settings.

单选题He's responsible()the central computer system.AinBforCof

单选题You have updated the modem driver on your Windows 2000 Professional computer. You restart your computer. Immediately after you log on, you receive a stop error. You need to start Windows 2000. What must you do? ()ARestart the computer in Safe Mode. Uninstall the modem driver.BRestart the computer by using the last known good configuration.CRestart the computer in Recovery Console. Replace the new Modem.inf file with the old modem.inf file.DStart the computer from the Windows 2000 startup floppy disks. Repair the registry.EStart the computer from the Windows 2000 startup floppy disks. Repair the system files.

单选题You are the network administrator for ExamSheet.net.  You have implemented the Hisecws.inf security template on all the Windows 2000 Professional computers in your network by using a GPO. A user has received a driver and utility software for the internal SCSI controller on his computer. The SCSI controller is not currently on the HCL. He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly.  You want to allow all users to install this driver on their client computers. You want to accomplish this task with the least amount of administrative effort. What should you do?()AModify the GPO to change the Driver Signing option. BRun theSigverifcommand on each client computer.CReconfigure the Driver Signing option on each client computer. Install the driver on each client     computer. Reapply the security template settings on each client computer.DModify the Hisecws.inf security template on each client computer to change the Driver Signing     option.EModify the Hisecws.inf security template on the domain controller to change the Driver Signing     option.

单选题The screen of my computer went()suddenly.AbackBblankCemptyDnothing

单选题When he suddenly() up the subject of genetic engineering, there was an embarrassed silence.AtookBbroughtCshowedDcame

单选题The police ______ the murderer everywhere when he suddenly appeared in a theatre.Ais searching forBare searching forCwere searching forDwas searching for

单选题After driving for twenty miles, he suddenly realized that he has been driving in the wrong direction.AdrivingBrealizedChas been drivingDthe wrong

单选题______ , he finds the work interesting.AThough he is computer expertBA computer expert he isCAs computer expertDComputer expert as he is

单选题I suddenly realized that he was trying to______quarrelling with me.AconsiderBenjoyCavoidDprevent