Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()A、The document is set to hidden.B、The document is locked.C、The document was saved as a system document.D、The document is owned by the first user.

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()

  • A、The document is set to hidden.
  • B、The document is locked.
  • C、The document was saved as a system document.
  • D、The document is owned by the first user.

相关考题:

Multipurpose Internet Mail Extension(MIME)is a(71)document messaging standard in the Internet enviroment, with MIME, users can send(72)Email messages that include audio, video, graphices, and text to any other user of a TCP/IP network. Richtext information can also be(73)into messages. It defines the fonts, formats, and(74)features of a document so the document can be easily(75)on many different types of systems.A.completeB.compoundC.simpleD.efficient

Multipurpose Internet Mail Extension (MIME) is a (71) document messaging standard in theInternet enviroment.With MIME,users can send (72) Email messages that include audio,video,graphices,and text to any other user of TC/IP network.Richtext information can also be (73) into messages.It defines the fonts,formats,and (74) features of a document sothe document can be easily (75) on many different types of systems.(75)A.completeB.compoundC.simpleD.efficient

A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page.Based on the merging of these two roles, which two will be applied?()A. A custom logo on the user interface pageB. A maximum timeout value of 600 minutesC. A maximum time out value of 1200 minutesD. A default Juniper Networks logo on the user interface page

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()A. The document is set to hidden.B. The document is locked.C. The document was saved as a system document.D. The document is owned by the first user.

A(n) ______ document is an interlinked system of documents in which a user may iump from one document to another in a nonlinear,associative way.A.HipertextB.WebC.HtmlD.XML

A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB、the user can see all the users except those in the Admin group, but can only modify the user’s own accountC、the user can see only the user’s own account, and cannot modify itD、the user can see only the user’s own account, and can change the password only

A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()A、A custom logo on the user interface pageB、A maximum timeout value of 600 minutesC、A maximum time out value of 1200 minutesD、A default Juniper Networks logo on the user interface page

You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?() A、Add the certificate of User2 to file1. doc. B、Assign User2 the Full Control NTFS permission on file1. doc. C、Copy file1. doc the %systemroot%/documents and settings/all users/ folder.D、Move file1. doc to the %systemroot%/documents and settings/all users/ folder.

You have a stand-alone computer that runs Windows XP Professional. Five users use the computer. Each user has a local user account. The user accounts are member of only the Users group. You need to share a document between all users of the computer. What should you do?() A、Copy the file to the Shared Documents folder. B、Copy the file to the My Documents folder of the local administrator. C、Copy the file to the %SystemRoot%/CSC folder. Add all user accounts to the guests group.D、Enable Offline File and Folder Caching. Copy the file to the %SystemRoot%/CSC folder.

A user installs a laser jet printer on a Windows XP desktop. The user states that Windows XPgeneric printer drivers were used. When the user prints a document, the pages are printing out with random symbols, letters, and numbers. Which of the following should the technician do?()A、Download manufacturer printer driversB、Restart the printer spoolerC、Check for Microsoft Windows updatesD、Check Device Manager

The last step in resolving an end user ticket should be which of the following?()A、Create an incident recordB、Verify the problem is resolvedC、Document the solutionD、Notify the user the problem is resolved

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

Which of the following is the default directory for User Profiles in Windows 7?()A、C:/ProfilesB、C:/User ProfilesC、C:/Users/ProfilesD、C:/Users

The enableModifiedFlag enables which of the following?()A、User initiated edit document commandB、Silent navigation from an edited pageC、User initiated save commandD、Removal of a locked for editing status

You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()A、Add Julia’s user account to the local Power Users group.B、Add Julia’s user account to the local Administrators group.C、Allow Julia’s user account Write permissions to C:///Data.D、Allow Julia’s user account Full Control permission to C:///Data.

You are designing a strategy for migrating the UNIX user accounts to Active Directory.  Which three actions should you perform?()A、 Import the user accounts as inetOrgPerson objects.B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.C、 Export all user accounts from the UNIX servers to a text file.D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.E、 Assign random passwords to each user object, and securely distribute the password to the users.F、 Create the same strong password for each user object, and require users to change their passwords at first logon.G、 Instruct users to use the same name and password as they used on the UNIX servers.

You are the administrator of your company’s network. A user named Stephen in the graphics department logs on to his Windows 2000 Professional computer. He installs a shared color laser printer. The color laser printer is connected to a computer named Server1. The next day Stephen returns and logs on to a Windows NT Workstation 4.0 computer. Stephan reports that when he attempts to print a document to the shared color laser printer, the printer is not included in the list of available printers. You want to allow Stephen to send print jobs to the shared color laser printer from any computer on the network. What should you do?()A、Configure a roaming user profile for Stephen’s user account.B、Configure the server properties of the printer system folder to connect to the shared printer.C、Install the printer driver for the print device on the Windows NT workstation computer.D、Upgrade the Windows NT Workstation computer to Windows 2000 Professional, and then import the profile settings for Stephen’s user account.

You manage a server that runs Windows Server 2008. You have installed the Windows SharePointServices (WSS) server role on the server. The server is configured to accept incoming mail. Tostreamline the process, you create a new document library. You have to make sure that any user can sendemail to the document library. What should you do to achieve this task?()A、Change the incoming email settings for the document libraryB、Enable basic user authentication for the document libraryC、Modify the document library settings to accept emails from SMTP serversD、Change the permissions for the document library

You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.

You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()A、Configure the terminal server so that users log on by using local user accountsB、Configure the terminal server so that users log on by using domain accountsC、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverD、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverE、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverF、Use Appsec.exe to restrict applications on the terminal server

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).A user named User1 frequently logs on to several different computers.You need to ensure that the documents and shortcuts User1 stores on his desktop are available on the desktop of each computer he uses.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、From Active Directory Users and Computers, modify the properties of the User1 account.B、From Active Directory Users and Computers, modify the properties for each computer account used by User1.C、On a file server, create a shared folder named Profiles and assign the Change share permission to Everyone group.D、On a file server, create a shared folder named Profiles and assign the Full Control share permission to the Everyone group.

A user’s document will not print, and as a result sends the same print job several times to the printer. A technician notices that the print queue is still waiting for the first job to finish before printing successive jobs. Which of the following would BEST resolve this issue?()A、Restart the print spooler serviceB、Delete the files in C:/Windows/Spool32C、Delete all print jobs after the first oneD、Print a Windows test page

单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A Implement preventative measures.B Close the issue.C Document the outcome.D Question other users to make sure they are not having the same issue.

多选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).A user named User1 frequently logs on to several different computers.You need to ensure that the documents and shortcuts User1 stores on his desktop are available on the desktop of each computer he uses.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)AFrom Active Directory Users and Computers, modify the properties of the User1 account.BFrom Active Directory Users and Computers, modify the properties for each computer account used by User1.COn a file server, create a shared folder named Profiles and assign the Change share permission to Everyone group.DOn a file server, create a shared folder named Profiles and assign the Full Control share permission to the Everyone group.

多选题You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()AConfigure the terminal server so that users log on by using local user accountsBConfigure the terminal server so that users log on by using domain accountsCConfigure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverDConfigure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverEUse software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverFUse Appsec.exe to restrict applications on the terminal server

单选题Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()AThe document is set to hidden.BThe document is locked.CThe document was saved as a system document.DThe document is owned by the first user.