A user who is running Windows XP Professional reports that the computer monitor stopped functioning following an installation of an updated driver for the video card and that attempts to delete and re-install the original driver have not corrected the situation. Which of the following actions would be BEST to correct this situation?()A、Reset the system BIOS.B、Use System Restore.C、Change the color profile.D、Replace the video card.

A user who is running Windows XP Professional reports that the computer monitor stopped functioning following an installation of an updated driver for the video card and that attempts to delete and re-install the original driver have not corrected the situation. Which of the following actions would be BEST to correct this situation?()

  • A、Reset the system BIOS.
  • B、Use System Restore.
  • C、Change the color profile.
  • D、Replace the video card.

相关考题:

Evaluate the following block of code:What is the outcome of the above code?() A. It produces an error because a fully qualified host name needs to be specified.B. It produces an error because the range of ports associated with the hosts has not been specified.C. It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.D. It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.

When should you create a role? () A. To simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.B. To grant a group of related privileges to a user.C. When the number of people using the database is very high.D. To simplify the process of granting and revoking privileges.E. To simplify profile maintenance for a user who is constantly traveling.

A customer, who brings their laptop to work on a daily basis, calls to ask for the best way to add USB ports and an additional network card to their laptop. Which of the following would meet the user’s requirements?()A. Docking stationB. Self powered USB hubC. KVM switchD. Non-powered USB hub

An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A. NetstatB. IfconfigC. HostnameD. Ping

Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());

如果想要在JSP中使用user包中的User类,则以下写法正确的是()。 A、 jsp:useBean id="user" class="user.User" scope="page"/B、 jsp:useBean class="user.User.class" / C、 jsp:useBean name="user" class="user.User"/D、 jsp:useBean id="user" class="User" import="user.* "/

在JSP中要使用user包中的User类,则以写法正确的是()。A、〈jsp:useBean id="user" class="user.User" scope="page"/〉B、〈jsp:useBean class="user.Use.class"/〉C、〈jsp:useBean name="user" class="user.User"/〉D、〈jsp:useBeam id="user" class="user" import="user.*"/〉

An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A、NetstatB、IfconfigC、HostnameD、Ping

A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()A、Record the solution in the appropriate logs for future use.B、Ask the user who reported the issue what past documentation they have.C、Ask the user who reported the issue to explain the symptoms in detail.D、Record what steps should be taken to resolve the issue.

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

A user has been having difficulty with their PC. Which of the following is the BEST response atechnician should give when a user asks for the definition of a particular bluescreen message?()A、“It is a message that informs the technician of what hardware needs to be replaced.”B、“A bluescreen message is just another name for an error.”C、“It provides the technician with more information about the problem.”D、“It is a complex message that is very difficult to explain to those who are not familiar with computers.”

Small in-ceiling speakers are BEST suited for()A、loud, bass intensive music (e.g. heavy metal, rock).B、providing a sub-woofer for great bass reproduction.C、background music and blending in with decor.D、the user who wants perfect sound reproduction.

Your database initialization parameter file has the following entry:   SEC_MAX_FAILED_LOGIN_ATTEMPTS=3   Which statement is true regarding this setting?()A、 It drops the connection after the specified number of login attempts fail for any user.B、 It is enforced only if the password profile is enabled for the user.C、 It locks the user account after the specified number of attempts.D、 It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

Which statement is true regarding this setting?()A、It drops the connection after the specified number of login attempts fail for any user.B、It is enforced only if the password profile is enabled for the user. C、It locks the user account after the specified number of attempts. D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()A、Active Directory Users and ComputersB、Exchange Control Panel (ECP)C、Exchange Management Console (EMC)D、Microsoft Office Outlook

TS1 is a server running Windows Server 2008 and Terminal Services. Users in your organization connectto the server TS1 to run a line-of-business application. Recently, you have noticed that user profiles arethreatening to consume the total disk capacity on TS1. You want users to be able to save their own data,but you also want to prevent profiles from exhausting the total storage capacity of the disk on TS1. Whatshould you do?()A、Use Group Policy to assign mandatory profiles to users who connect to TS1.B、Configure disk quotas for the disk on TS1 on which user profiles are stored.C、Use Group Policy to assign Terminal Services roaming user profiles to users who connect to TS1.D、Configure disk quotas for the local disk of each user who connects to TS1.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. The Default Domain Policy GPO is configured to prompt users to change their password 14 days before it expires. A user who returns from a two-week vacation reportes that she cannot log on to the domain. You discover that when she last logged on, she was prompted to change her password. She reports that she did not change her password before leaving on vacation. You need to ensure that the user can log on to the domain. What should you do?()A、Enable the user account.B、Reset the password for the user account.C、Use Active Directory Users and Computers to select the Password never expires option.D、Configure the Prompt user to change password before expiration security policy option to 21 days.

单选题You have an Exchange Server 2010 organization that contains 1,500 mailboxes. The average sizeeach mailbox is a 750 MB. All users run either Microsoft Office Outlook 2010 or Outlook Web App to access their e-mail. All users who run Outlook 2010 are configured to use Cached Exchange Mode. You need to configure a mailbox solution for the organization to meet the following requirements: Ensure that administrators can search and find any message Reduce the size of the offline store (OST) for each user Provide access to all e-mail messages by using either Outlook 2010 or Outlook Web App  What should you do()?ACreate a Personal Archive for each user and then create a retention policy. Instruct users to compact the OST file.BCreate a personal folder (PST) file for each user. Store all PST files on a network share. Instruct users to compact the OST file.CCreate a second disabled user account and a second mailbox for each user. Configure journal rules to journal all the messages for each user to the user¯s second mailboxDCreate a new disabled user account and a new mailbox named Journaling Mailbox. Configure journal rules to journal all the messages for each user to Journaling Mailbox.of

单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()APhishing scamBSocial engineeringCMan-in-the-MiddleDShoulder surfing

单选题如果想要在JSP中使用user包中的User类,则以下写法正确的是()。A jsp:useBean id=user class=user.User scope=page/B jsp:useBean class=user.User.class / C jsp:useBean name=user class=user.User/D jsp:useBean id=user class=User import=user.* /

单选题在JSP中要使用user包中的User类,则以写法正确的是()。A〈jsp:useBean id=user class=user.User scope=page/〉B〈jsp:useBean class=user.Use.class/〉C〈jsp:useBean name=user class=user.User/〉D〈jsp:useBeam id=user class=user import=user.*/〉

单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()ACopy the shortcut to %systemdrive%/documents and settings/default user/desktop/.BCopy the shortcut to %systemdrive%/documents and settings/all users/desktop/.CCopy the shortcut to your desktop. Modify the %comspec% system environment variable. DCopy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.

单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A Implement preventative measures.B Close the issue.C Document the outcome.D Question other users to make sure they are not having the same issue.

单选题You are developing an application that runs by using the credentials of the end user. Only users who are members of the Administrator group get permission to run the application. You write the following security code to protect sensitive data within the application.bool isAdmin=false;  WindowsBuiltInRole role=WindowsBuiltInRole.Administrator; ......  if(!isAdmin)          throw new Exception("User not permitted");   You need to add a code segment to this security code to ensure that the application throws an exception if a user is not a member of the Administrator group. Which code segment should you use?()A AB BC CD D

单选题Small in-ceiling speakers are BEST suited for()Aloud, bass intensive music (e.g. heavy metal, rock).Bproviding a sub-woofer for great bass reproduction.Cbackground music and blending in with decor.Dthe user who wants perfect sound reproduction.

多选题When should you create a role?()ATo simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.BTo grant a group of relate privileges to a user.CWhen the number of people using the database is very high.DTo simplify the process of granting and revoking privileges.ETo simplify profile maintenance for a user who is constantly traveling.

多选题TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()ACreate a function that returns a list of values that represent the login times for the given user.BCreate a function that returns a list of values that represent the people who have logged more hours than the current user has logged.CCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current day.DCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current month.