Whenever new information is entered, it must be stored somewhere in the computer's(70). RAM only(71)the data temporarily. That is, all information stored in the RAM will disappear if you switch the computer off.A.processorB.keyboardC.printerD.memory

Whenever new information is entered, it must be stored somewhere in the computer's(70). RAM only(71)the data temporarily. That is, all information stored in the RAM will disappear if you switch the computer off.

A.processor

B.keyboard

C.printer

D.memory


相关考题:

●If your diskette has been (69) ,the computer can not store any new information on it.(69) A.formattedB.write protectedC.testedD.Certified

If your diskette has been _______,the computer cannot store any new information on it.A.formattedB.write protectedC.testedD.Certified

If your diskette has been(66), the computer can not store any new information on it.A.formattedB.write protectedC.testedD.Certified

We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)A.a binary codeB.wordsC.registersD.positional values

The CPU does not have to look(66)all of RAM to find the spot it needs. But RAM only(67)the data temporarily. As soon as you switch the computer(68), all that information disappears from the RAM. When you switch the computer on again, the RAM is(69), and ready(70)a new program and new data.A.onB.throughC.forD.down upon

To access information on the Intemet,a user must first log on to the client computer'S______network.A.serverB.clientC.hostD.self

All accidents and damage to ship,equipment or personnel,must be ______in the vessel deck log.A.entered intoB.enteredC.entered withD.entered in

Which of the information should be entered on the form?A.Amount of money earnedB.Name of employerC.Remittance method usedD.Employee's company address

( ):a way of storing information in a computer in which the most recently stored item is the first to be retrieved (= found or got back) A. DataB. DatabaseC. BufferD. Stack

共用题干HackingPeople tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link, like someone's hideaway(隐蔽的)cabin in the woods.But just as most of homes are tied to a community by streets,bus routes and electric lines,computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust. A rogue loose(为所欲为的无赖)in a computer system called hacker(黑客)is worse than a thief entering your house. He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory .He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.Hacking,our electronic- age term for computer break-in,is more and more in the news-brainy kids vandalizing university records, even pranking(胡闹)about in supposedly safeguard-ed systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is building:A dissatis- fled former insurance-company employee wipes out information from payroll(工资表)files. A student sends out a“virus”,a secret and destructive command,over a national network .The vi-rus copies itself at lightning speed,jamming the entire network-thousands of academic,commer-cial and government computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic .Yet neither business nor government has done enough to toughen its defenses against at-tack .For one thing,such defenses are expensive;for another,they may interrupt communica- tion—the main reason for using computers in the first place. Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?A: Deleting information in the computer's memory.B: Shutting down the computer whenever he wishes.C: Entering your house to steal.D: Spoiling a system for air traffic.

The operating system file cratab in the Linux platform gets updated whenever you create a new database on the same host machine. What kind of information is stored is stored in this file?()A、OracleSIDsonlyB、Oracle homes onlyC、Oracle install timestampD、Oracle inventory pointer filesE、Oracle database creation timestampF、OracleSIDsand Oracle homes onlyG、OracleSIDs, Oracle homes and flag for auto startup

The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()A、 Information will be carried in the RSTP BPDUs.B、 It will be propagated in VTP updates.C、 Information stored in the Forwarding Information Base and the switch will reply on query.  D、 Multiple Spanning Tree must be manually configured on the appropriate switches.

When installing a new Plug and Play sound card, a technician should turn off and unplug the computer; remove the computer’s cover; locate the sound card slot, insert and secure the card in the slot and:()A、plug in and turn on the computer; let Windows recognize the new hardware and install the driver.B、plug in the computer; let Windows recognize the new hardware and plug in the speakers.C、let Windows recognize the new hardware; install the driver and plug in the speakers.D、turn on and plug in the computer; let Windows recognize the new hardware and install the driver.

The operating system filecratabin the Linux platform gets updated whenever you create a new database on the same host machine.  What kind of information is stored is stored in this file?()A、OracleSIDsonlyB、Oracle homes onlyC、Oracle install timestampD、Oracle inventory pointer filesE、Oracle database creation timestampF、OracleSIDsand Oracle homes onlyG、OracleSIDs, Oracle homes and flag for auto startup

Which scenario describes an appropriate use for opening a form in a new session?()A、The data entered into the called form is logically independent of the data entered in the calling form. B、The called form requires different privileges than the calling form. C、The called form must execute as a different user than the calling form. D、The calling form must be able to query data in the called form before it is saved.

You are the desktop administrator for your company. Laura is a user in the company's accounting department. Laura uses a Windows XP Professional computer. Laura installs a new software application that was listed on her Add or Remove Programs list. Laura reports that the new application now opens whenever she double-clicks any file that has a .doc file name extension. She also reports that 24 new icons appear on the New menu when she right-clicks her desktop. Laura asks you to reconfigure her computer so that Microsoft Word opens when she double-clicks files that have a .doc file name extension. She also wants you to remove the new icons from the New menu. You instruct Laura to uninstall the new application. After she uninstalls the application, she reports that she can no longer open .doc files by double-clicking them. She also reports that the unwanted icons on the New menu are still present. You reinstall the new application, and it continues to open when Laura double-clicks .doc files. You want to restore the .doc file association and to remove the unwanted icons from the New menu on Laura's computer. You want to accomplish these tasks as quickly as possible. You also want to ensure that none of Laura's other documents or personal settings are affected. What should you do?()A、Restore the computer to the restore point that was created when Laura installed the new application.B、Restore the System State data to Laura's computer from a backup tape. C、Use the Windows XP Professional CD-ROM to perform an Automated System Recovery (ASR) restore. D、Restart the computer by using the last known good configuration.

You are the desktop administrator for Company. Janos is a user in Company's accounting department.  Janos uses a Windows 2000 Professional portable computer.  Janos reports that when the computer is unlocked, it randomly displays the following error message:  "JZXDRV.dll failed to load". You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Janos’ docking station. Janos reports that the error message does not appear when the computer is docked.  You need to ensure that the error does not occur on Janos’ computer. You also need to ensure that the storage device continues to function correctly when Janos’ computer is docked.  What should you do?()A、 Remove the storage device from the hardware profile on Janos’ computer.B、 Create a local user account for Janos on his computer. Copy the JZXDRV.dll file to the profile      folder for Janos’ local user account. Instruct Janos to log on to his computer by using his local      user account whenever the computer is unlocked.C、 Copy the computer's default hardware profile to create a new hardware profile named        Undocked.      Remove the storage device from the Undocked hardware profile.D、 Copy the computer's default hardware profile to create a new hardware profile named       Unlocked. Disable the storage device in the Undocked hardware profile. Instruct Janos to start         the computer by using the Undocked hardware profile whenever the computer is undocked.

You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()A、Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.B、Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.C、Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.D、Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.

单选题Which of the following information should be entered on the form?AAmount of money earnedBName of employerCRemittance method usedDEmployee’s company address

单选题Stephen Smith feels thatAthe security of information on the network used to be a worry.Ball the data should be stored on the same system.Cthe company’s computer-based information is well-protected.

问答题Practice 4  Read the following text(s) and write an essay to  1) summarize the main points of the text(s),  2) make clear your own viewpoint, and  3) justify your stand.  In your essay, make full use of the information provided in the text(s). If you use more than three consecutive words from the text(s), use quotation marks (“ ”).  You should write 160—200 words on the ANSWER SHEET.  The information and computer technologies have boosted the efficiency and convenience of people’s work and study. Their application in school education has provided teachers and students with new approaches to knowledge and information. There is a heated discussion about whether computers will replace teachers. The following are the supporters’ and opponents’ opinions.  Supporters:  With the advanced computer and Internet, children can get the learning material whenever they want.  Online teaching is becoming more and more popular that students can get planned lessons online. After each class, there is homework for them to do. Both the learning and practice can be done on computers.  From computers students can learn something that they are interested in so that they won’t be restricted to the subjects that they are taught at school. Therefore, students will have the opportunity to achieve an all-around development.  Opponents:  Students need to communicate with teachers and get instructions from them whenever they have troubles in their study. Computers are only cold devices that will affect children’s ability to have face-to-face communication.  Education is not only about imparting the knowledge, but also being a useful person. So students need to learn some useful values to be a good person which sometimes cannot be easily learned from computers.  Children who use computer will learn to communicate with machines instead of people. There is a risk that they will be a generation of social illiterates.

单选题AA new computer system was installed.BInformation was entered into the computer system correctly.CSome employee information got lost.DPaychecks were distributed for the wrong amount.

单选题Which scenario describes an appropriate use for opening a form in a new session?()AThe data entered into the called form is logically independent of the data entered in the calling form. BThe called form requires different privileges than the calling form. CThe called form must execute as a different user than the calling form. DThe calling form must be able to query data in the called form before it is saved.

单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()AUse Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.BUse Windows Explorer to grant Sales Staff Special access for the reports on the network share.CUse Windows Explorer to enable automatic caching for documents on the network share.DCreate a new share for the Sales users only and enable caching on that share only.

单选题The operating system filecratabin the Linux platform gets updated whenever you create a new database on the same host machine.  What kind of information is stored is stored in this file?()AOracleSIDsonlyBOracle homes onlyCOracle install timestampDOracle inventory pointer filesEOracle database creation timestampFOracleSIDsand Oracle homes onlyGOracleSIDs, Oracle homes and flag for auto startup

单选题You are the desktop administrator for your company. Tom is a user in the company's accounting department. Tom uses a Windows XP Professional portable computer. Tom reports that when the computer is undocked, it randomly displays the following error message: "JZXDRV.DLL failed to load." You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Tom's docking station. Tom reports that the error message does not appear when the computer is docked. You need to ensure that the error does not occur on Tom's computer. You also need to ensure that the storage device continues to function correctly when Tom's computer is docked. What should you do?()ARemove the storage device from the hardware profile on Tom's computer.BCreate a local user account for Tom on his computer. CCopy the JZXDRV.dll file to the profile folder for Tom's local user account. Instruct Tom to log on to his computer by using his local user account whenever the computer is undocked.DCopy the computer's default hardware profile to create a new hardware profile named Undocked. Remove the storage device from the Undocked hardware profile. ECopy the computer's default hardware profile to create a new hardware profile named Undocked. Disable the storage device in the Undocked hardware profile. FInstruct Tom to start the computer by using the Undocked hardware profile whenever the computer is undocked.

单选题The network administrator maps VLAN 10 through 20 to MST instance 2.  How will this information be propagated to all appropriate switches?()A Information will be carried in the RSTP BPDUs.B It will be propagated in VTP updates.C Information stored in the Forwarding Information Base and the switch will reply on query.  D Multiple Spanning Tree must be manually configured on the appropriate switches.