Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A. networkB. vimsC. securityD. architecture

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

A. network
B. vims
C. security
D. architecture

参考解析

解析:计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。

相关考题:

There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist

data effectively is crucial for success in today's competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the(2)in hardware and software.(3)integration uses a base document that contains copies of other objects.(4)integration uses a base document that contains the current or most recent version of the source document it contains.(5)provides an overview of the program written in "plain" English, without the computer syntax.A.GeneralizingB.SharingC.General-usingD.Globalizing

which of the following actions will you not take before beginning installation or removal of anyNON-PNP hardware device inside the computer case?() A. Place all the hardware components in static proof bags.B. Remove all the jumpers from the motherboard.C. Switch off the main power and remove the power cordD. Use an anti-static wrist strap.E. Turn off the computer.F. Place the computer on the anti-static mat

In software engineering the design phase is divided into( )。A.system design and detailed designB.computer design and program designC.system design and hardware designD.computer design and detailed design

The term computer describes a device made up of a combination of electronic and electromechanical components. By itself, a computer has no( )and is referred to as hardware, which means simply the physical equipment. The hardware cant be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system, hardware, software, data/information, people, procedures and communications. A system is defined as a collection of related components that( )to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees) with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( )Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to( )their information systems, in, response to new marketing opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.information B.software C.intelligence D.dataA.interact B.work C.connect D.changeA.improved B.better C.good D.bestA.decision B.need C.standard D.objectiveA.modify B.replace C.changeD.transfer

Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.A.network B.virus C.security D.architecture

Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.A.network B.virus C.security D.architecture

What should be part of a comprehensive network security plan()。 A.Allow users to develop their own approach to network securityB.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE.Minimize network overhead by deactivating automatic antivirus client updates

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A.networkB.vimsC.securityD.architecture

Information( )means protecting information and information systems from unauthorized acces,use, disclosure, disruption, modification, or destruction.A.integrityB.availabilityC.securityD.consistency

Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.A.networkB.virusC.securityD.architecture

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications. A system is defined as a collection of related components that ( ) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to (5 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.(5)应选( )。 A. modifyB. replaceC. ChangeD. transfer

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.interactB.workC.connectD.change

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( 1) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications. A system is defined as a collection of related components that ( 72) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it (73 ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( 74) From time to time, organizations need to (75 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.(1)应选( )。 A. informationB. software C. intelligenceD. Data

Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complexB.uniqueC.catchyD.long

You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has notentered sleep mode. You need to identify what is preventing the computer from entering sleep mode.  What should you do?()A、At a command prompt, run Powercfg energy.B、At a command prompt, run Systeminfo /s localhost.C、From Performance Monitor, review the System Summary.D、From Performance Information and Tools, review the detailed performance and system information.

If a technician needs to convert a hard drive from Basic to Dynamic, which of the following utilities would the technician use?()A、Add Hardware WizardB、Device ManagerC、Computer ManagementD、Disk Management

What should be part of a comprehensive network security plan?()A、Allow users to develop their own approach to network security.B、Physically secure network equipment from potential access by unauthorized individuals.C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E、Minimize network overhead by deactivating automatic antivirus client updates.

which of the following actions will you not take before beginning installation or removal of anyNON-PNP hardware device inside the computer case?()A、Place all the hardware components in static proof bags.B、Remove all the jumpers from the motherboard.C、Switch off the main power and remove the power cordD、Use an anti-static wrist strap.E、Turn off the computer.F、Place the computer on the anti-static mat

Which of the following methods effectively removes data from a hard drive prior to disposal?()A、Use the remove hardware OS featureB、Formatting the hard driveC、Physical destructionD、Degauss the driveE、Overwriting data with 1s and 0s by utilizing software

Which of the following software directly interacts with the hardware and handles hardware resource requests from virtual machines?()A、 Guest OSB、 Virtual CenterC、 VTD、 Hypervisor

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()A、Use the Microsoft Windows Task Manager application to end the task for the application.B、Use the Control Panel application to uninstall the application. Reboot the computer.C、Use the Software Explorer application to disable the application. Reboot the computer.D、Use the Services application to disable the Application Experience service, and then launch the application.

You have a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to collect the following information from the Web server: Unauthorized attempts to upload filesUnsuccessful commands that try to run executables You must achieve this goal by using the minimum amount of administrative effort.  What should you do?()A、From Network Monitor, start a capture.B、From the Performance snap-in, create a counter log.C、From Internet Information Services (IIS) Manager, enable logging.D、From Computer Management, modify the properties of the application log.

单选题You are the desktop administrator for your company. A remote sales representative named Laura uses a Windows XP Professional portable computer. Laura travels to customer locations daily, and she usually works from home. She does not use a docking station when she starts the computer at home. Each time Laura starts her computer, she is prompted to choose between the Docked and Undocked hardware profiles from the Hardware Profile Menu. You need to ensure that Laura is not prompted to choose a hardware profile each time she starts her computer. You also need to allow her computer to start automatically with the undocked profile and without delay. How should you configure Laura’s computer?()AModify the BIOS settings, and disable support for the docking station.BModify the hardware profiles, and remove the Docked hardware profile. CModify the Device Manager settings to disable all devices used by the docking station. DConfigure the hardware profiles so that the Undocked hardware profile is the default hardware profile for startup.

单选题Which of the following is NOT an advantage of computer newspapers?AThey are cheaper than traditional newspapers.BThey are very convenient to use.CYou can get more information from them quickly.DYou can easily save information for future use.

单选题Which command shows system hardware and software version information?()Ashow configurationBshow environmentCshow inventoryDshow platformEshow version

单选题What should be part of a comprehensive network security plan()。AAllow users to develop their own approach to network securityBPhysically secure network equipment from potential access by unauthorized individualsCEncourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenDDelay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedEMinimize network overhead by deactivating automatic antivirus client updates