()is the basic software that allows the user to interface with the computer. A.DisplayB.ApplicationC.ScreenD.Operating System

()is the basic software that allows the user to interface with the computer.

A.Display

B.Application

C.Screen

D.Operating System


相关考题:

●A user interface can be defined as the combination of hardware and software that helps people and computers (72) with each other.(72) A.intercourseB.intercommunionC.communicateD.intercommunicate

A Web ______ is one of many software applications that function as the interface between a user and the Internet.A.displayB.browserC.windowD.view

Which two statements about the track configuration option are correct?() A. The track option monitors interfaces as defined by the user.B. The track option monitors all interfaces participating in VRRP.C. The track option allows for a reduction of the priority value if the monitored interface goes down.D. The track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

Which JUNOS software feature allows a user to define specific next-hop values for IP packets based on the source IP address of that packet?() A. MPLSB. Load BalancingC. Class Based ForwardingD. Filter Based Forwarding

A Web (73) is one of many software applications that function as the interface between a user and the InternetA.displayB.browserC.windowD.view

Which command allows you to decode packets in JUNOS?() A.debug packet interface-nameB.show interface extensiveC.traceoptions interface-nameD.monitor traffic interface interface-name

Which command allows you to view interface usage details in real-time?() A.user@host debug interface interface-nameB.user@host monitor usage interface-nameC.user@host monitor interface interface-nameD.user@host traceoptions interface interface-name

A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?() A. Remove the BIOS chip on the PCB. Re-flash the BIOSC. Run password cracking software on the users PCD. Set the password clear jumper on the motherboard

A user interface can be defined as the combination of hardware and software that helps people and computers(70)with each other.A.intercourseB.intercommunionC.communicateD.intercommunicate

Microsoft's COM is a software(73) that allows applications to be built from binary software components。A.structureB.protocolC.procedureD.architecture

What is the reason for configuring a passive interface on a router?() A. Allows interfaces to share common IP addresses.B. Allows an interface to remain up without the aid of keepalives.C. Allows a router to send routing and not receive updates via that interface.D. Allows a routing protocol to forward updates that is missing its IP address.E. Allows a router to receive routing updates on an interface but not send updates via that interface.

TCP/IP ( )layer protocols provide services to the application( )running on a computer. The application layer does not define the application itself, but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an(请作答此空)between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP( )layer consists of two main protocol options--the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).A.iterationB.objectC.interface]D.activity

BRI(Basic Rate Interface)基本速率接口

A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()A、A custom logo on the user interface pageB、A maximum timeout value of 600 minutesC、A maximum time out value of 1200 minutesD、A default Juniper Networks logo on the user interface page

Which command allows you to view interface usage details in real-time?()A、user@host debug interface interface-nameB、user@host monitor usage interface-nameC、user@host monitor interface interface-nameD、user@host traceoptions interface interface-name

What is the reason for configuring a passive interface on a router?()A、Allows interfaces to share common IP addresses.B、Allows an interface to remain up without the aid of keepalives.C、Allows a router to send routing and not receive updates via that interface.D、Allows a routing protocol to forward updates that is missing its IP address.E、Allows a router to receive routing updates on an interface but not send updates via that interface.

A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()A、Remove the BIOS chip on the PCB、Re-flash the BIOSC、Run password cracking software on the users PCD、Set the password clear jumper on the motherboard

What is the User Interface (UI) feature called that allows a form field’s text to be automatically filled in?()A、Auto completionB、Auto InsertC、Field ValidationD、Type Ahead

Which two statements about the track configuration option are correct?()A、The track option monitors interfaces as defined by the user.B、The track option monitors all interfaces participating in VRRP.C、The track option allows for a reduction of the priority value if the monitored interface goes down.D、The track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

You need to receive alerts when unanalyzed software is detected on your computer. You must achieve this goal without sending information to Microsoft.  What should you do?()A、Confirm that Windows Defender is not subscribed to the Microsoft Spynet online community. Select the Use heuristics to detect potentially harmful or unwanted behavior by software that hasnt been analyzed for risks checkbox in Windows Defender.B、Configure Windows Defender with a basic membership to the Spynet online community. C、Configure Windows Defender with an advanced membership to the Spynet online community. D、Configure the Software Explorer option in Windows Defender to display software for all users.

You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.

多选题Which two statements about the track configuration option are correct?()AThe track option monitors interfaces as defined by the user.BThe track option monitors all interfaces participating in VRRP.CThe track option allows for a reduction of the priority value if the monitored interface goes down.DThe track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.

单选题Which command allows you to decode packets in JUNOS?()Adebug packet interface-nameBshow interface extensiveCtraceoptions interface-nameDmonitor traffic interface interface-name

单选题You are administrator of your company’s network. Your company has offices in New York, Madrid, Paris and Tokyo. A user named Carmen works in the New York office, but she often travels to the Madrid office. Carmen uses the multi-language version of Windows 2000 Professional on her portable computer. She needs to be able to access both an English and Spanish user interface, input locale, and keyboard layout/IME. When Carmen is in the New York office, she logs on to the network by using the Carmen_eng user account. She is given the English user interface, input locale and keyboard layout/IME. When Carmen is in the Madrid office she logs on to the network by using the Carmen_span user account. She is then given the Spanish interface, input locale and keyboard layout/IME. Carmen reports that when she logs on to the network by using the Carmen_eng user account, she is not allowed to add any languages to her computer other than English, which is already installed. What should you do?( )AAdd the Spanish keyboard layout/IME for the Carmen_eng user account profileBAdd the English keyboard layout/IME for the Carmen_span user account profileCReconfigure the Group Policy Object for the Carmen_eng user account to allow her to  change the languages on her computerDConfigure the Group Policy Object for the Carmen_span user account to allow her to change  the languages on her computer.

单选题Which JUNOS software feature allows a user to define specific next-hop values for IP packets based on the source IP address of that packet?()AMPLSBLoad BalancingCClass Based ForwardingDFilter Based Forwarding

单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()ASecedit /refreshpolicy user_policy /enforceBSecedit /refreshpolicy machine_policy /enforceCGpupdate /target:computer /syncDGpupdate /target:user /sync