A computer ( )is a program that maliciously causes unwanted behavior on a computer.A.softwareB.applicationC.virusD.process

A computer ( )is a program that maliciously causes unwanted behavior on a computer.

A.software
B.application
C.virus
D.process

参考解析

解析:一个计算机病毒是一段代码,它会对计算机造成不期望的恶性不良影响。A软件 B应用 C病毒 D过程

相关考题:

Bill Gates made much great __a________ in computer.

● The personal computer or (72) is the smallest general-purpose computer.(72)A. terminalB. minicomputerC. microcomputerD. workstation

Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.A.obviousB.secretC.importantD.easy

Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic

Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer:All system and program settingsAll users settingsOnly the content in the C:\Appdata folderWhich tool should you use?()A.AB.BC.CD.D

You have a desktop computer and a portable computer. Both the computers are configured to allow remote desktop connections. You connect to the desktop computer from the portable computer. You need to save files from within the remote session to the C: drive of the portable computer.What should you do?()A.AB.BC.CD.D

A computer virus is a computer program that is created to make and spread(71)of itself.A.programsB.virusC.copiesD.files

program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.A.WormB.VirusC.DisasterD.Demon

When you open a file or run a program in a computer, a window appears on the desktop of your computer. The(67)of the window indicates which program you are currently working in arid its color will become blue if a window is active. When you click on The(68), the window disappears and appears as a button on the taskbar. Clicking on a button in(69)will invoke a specific command.A.control menuB.control barC.title menuD.status bar

A computer program, orjust a program, is a sequence of (75) ,written to performa specified task with a computer.A.languagesB.instructionsC.programsD.functions

A ( ) translates a computer program written in a human-readable computer language into a form that a computer can execute.A.compilerB.linkerC.assemblerD.application

A______translates a computer program written in a human-readable computer language into a form that a computer can execute.A.compilerB.linkerC.assemblerD.application

You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

You install windows 2000 Professional on a new dual processor Pentium III computer. The system BIOS is APM compliant. When you attempt to shutdown the computer, the shut down dialog box remains on the screen and the power remains on.  What should you do?()A、Restart the computer. Disable the AMP in the system BIOS restart the computer.B、Restart the computer. Use the power options in control panel to enable APM and restart the computer.C、Restart the computer. Use the power options in control panel to enable hibernate support then restart.D、Restart the computer. Use the power options in control panel to create a different power scheme then restart.E、Windows 2000 does not support APM on computers with multiple processors.

You install Windows 2000 Professional on a new APM-compliant portable computer. You notice that whenever you attempt to shut down the computer, the Windows 2000 shutdown screen remains on the screen as the power remains on. You attempt to shut off the computer by using Power Button, but you want the computer to shut off when Windows 2000 Professional shuts down. What should you do? ()A、Restart the computer, disable APM in the system BIOS, and then restart the computer. B、Restart the computer, use power options in control panel to enable APM, and restart the  computer. C、Restart the computer, use power options in control panel to enable hibernate support, and  then restart the computer. D、Restart the computer, use power options in control panel to create a different power scheme,  and then restart the computer.

Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard

You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft.  What should you do?()A、Confirm that Windows Defender is not subscribed to the Microsoft Spynet online community. Select the Use heuristics to detect potentially harmful or unwanted behavior by software that hasnt been analyzed for risks checkbox in Windows Defender.B、Configure Windows Defender with a basic membership to the Spynet online community. C、Configure Windows Defender with an advanced membership to the Spynet online community. D、Configure the Software Explorer option in Windows Defender to display software for all users.

单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()Asystem /vBwinnt /sCsfc /scannowDchkdsk /f

单选题You run the English (US) edition of Windows 2000 professional on your computer. You are developing a product installation document that has text in both English and Spanish. The word processing program you are using is a Windows 16-bit character-based application. You start theword processing program and complete the English Portion of the document. You then install Spanish as a language group by using Regional Options in Control Panel. However, You cannot use Spanish to complete the Spanish portion of your document. What should you do?()AChange the language preference from English to Spanish within the word processing  Program.BInstall the Spanish version of Windows 2000 Professional. Reconfigure your language  settings, and restart the word processing program.CSave and close the word processing program. Select Spanish by using the locate indicator on  the taskbar, and restart the word processing program.DSave and close the word program. Log off and log on to the computer. Restart the Word  processing program, and select Spanish by using the locale indicator on the taskbar.

单选题You run the English (US) edition of Windows 2000 Professional on your home computer. You are writing a letter that will include text in both English and German. The word processing program you are using is a Windows 16-bit character-based document. You then install German language support by using Regional Options in Control Panel. However, you are unable to use German in your document. You want to be able to complete the German portion of the document with the least amount of administrative effort. What should you do?()ASave the document and close the word processing program. Select German by using the locale indicator on the taskbar and restart the word processing program.BSave the document and close the word processing program. Log off and log on to the computer. Restart the word processing program and select German by using the locale indicator on the taskbar.CInstall the German version of Windows 2000 Professional. Reinstall the word processing program.DChange the language preference from English to German within the word processing program.

单选题You have a computer that runs Windows XP Professional. You use Microsoft Outlook Express to download e-mail messages. You need to copy the e-mail messages, Outlook Express settings, and Internet Explorer settings to a new computer that runs Windows XP Professional. What should you do?()ACopy all *.dbx files from the old computer to the new computer. BEstablish a Remote Assistance session from the old computer to the new computer.CBack up the system state on the old computer. Restore the system state on the new computer. DRun the File and Settings Transfer Wizard on the old computer. Run the File and Settings Transfer Wizard on the new computer.

单选题You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()AReinstall the application to another location.BRestore the program from the Quarantined Items list.CRemove the program from the Quarantined Items list.DRepair the program from the Programs option in Control Panel.

单选题You run a Windows Defender scan on your computer system. The scan identifies one of your applications as having potentially unwanted behavior.  You need to continue to use the application. You also need to stop Windows Defender from alerting you about this application.  Which Windows Defender option should you use? ()AIgnoreBRemoveCQuarantineDAlways Allow

单选题An uninstalled program is still attempting to load when Windows starts. Which of the following options can the technician suggest to stop this unwanted program from loading?()AServicesBAdd or Remove ProgramsCSystem Configuration UtilityDSystem File Checker

单选题You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()APrivilege UseBObject UseCSecurity Settings UseDSystem Use

单选题You have a desktop computer and a portable computer.  Both the computers are configured to allow remote desktop connections. You connect to the desktop computer from the portable computer.  You need to save files from within the remote session to the C:// drive of the portable computer.  What should you do?()AOn your portable computer, map a drive to the C:// drive of the remote computer.BIn the System Properties dialog box of the desktop computer, enable the Remote Assistance feature.CIn the properties of the Remote Desktop Connection application, on the portable computer, select the C:// drive as a local resource for the remote session.DIn the properties of the Remote Desktop Connection application, on the portable computer, click the Automatically detect TS Gateway server settings option.

单选题A co-worker uses a gadget from the Windows Sidebar feature on their computer. You examine your computer and find that the gadget is not on the list of available gadgets. You need to add this gadget to the Windows Sidebar feature on your computer.  What should you do?()ADownload and install the gadget file.BDownload the gadget file and copy the file to C:///Windows/System32.CInstruct the co-worker to send the gadget file via e-mail and copy the file to C:///Program Files.DInstruct the co-worker to send the gadget file via e-mail. Drag and drop the gadget file to the Windows Sidebar feature.