单选题The most suitable title for the passage might be _____.AFunny Computer UsersBHigh-tech and Low-techCComputers and Helpline UsersDA Qualified Computer User

单选题
The most suitable title for the passage might be _____.
A

Funny Computer Users

B

High-tech and Low-tech

C

Computers and Helpline Users

D

A Qualified Computer User


参考解析

解析:
主旨大意题。通读全文可知,文章的主旨不是对比高科技与低科技,故排除B项;C项的表述过于模糊,没有指明主题,故排除;文章没有提到怎样做一个合格的电脑使用者,故D项错误。本文主要讲述的是人们使用电脑的奇闻轶事,从顾客不会开机、不知道“任意键”在什么位置、拆洗键盘、不会发传真、把鼠标当作遥控器等事例可见,这些问题都十分滑稽,A项较好地概括了原文的意思,故答案为A项。

相关考题:

The most suitable title for this passage would be__________.A.How to Save Money on the HouseB.How to Borrow Money from a BankC.How to Take a MortgageD.How to Buy a House

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two localuser accounts named User1 and User2. On Computer1, you run Scanstate.exe /all //server1/data /computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd //server1/data/computer1. You need toensure that User1 and User2 can log on to Computer2.  What should you do on Computer2?()A、Enable all user accounts.B、Modify the default password policy.C、Modify the Allow log on locally user right.D、Add User1 and User2 to the local Administrators group.

You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()A、Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.B、Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.C、Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.D、Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

A user selects their proper domain and is unable to log into their Windows computer. The errorstates: System cannot log you on to the domain because the systems computer account in its primary domain is missing or the password on that account is incorrect.  Which of the following is the MOST likely cause for this error?()A、 The computers account was removed from Active Directory.B、 The users account was removed from Active Directory.C、 The computer was disjoined from the domain.D、 The user typed in the wrong password.

Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A、 Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B、 Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C、 Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D、 Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()A、Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.B、Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.C、Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.D、Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.

You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?() A、Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B、Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C、Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D、Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.

单选题The best title for the passage would be ______.APrivacy on data files BHeated attacks on the computerCPrivacy issue caused by computer DPrivacy has been long neglected

单选题The best title for the passage could be _____.AThe Dark Side of Computer GamesBComputer Games—Advantages and DisadvantagesCThe Development of Violent Computer GamesDA Study on the Influence of Computer Games

单选题The most suitable title for the passage might be _____.AFunny Computer UsersBHigh-tech and Low-techCComputers and Helpline UsersDA Qualified Computer User

单选题Your company has an Active Directory domain. A user attempts to log on to a computer that was turned off for twelve weeks. The administrator receives an error message that authentication has failed. You need to ensure that the user is able to log on to the computer. What should you do()ARun the netdom TRUST /reset command.BRun the netsh command with the set and machine options.CRun the Active Directory Users and Computers console to disable, and then enable the computer account.DReset the computer account. Disjoin the computer from the domain, and then rejoin the computer to the domain.

单选题You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two localuser accounts named User1 and User2. On Computer1, you run Scanstate.exe /all //server1/data /computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd //server1/data/computer1. You need toensure that User1 and User2 can log on to Computer2.  What should you do on Computer2?()AEnable all user accounts.BModify the default password policy.CModify the Allow log on locally user right.DAdd User1 and User2 to the local Administrators group.

单选题The most suitable title of this passage is ______.AProgress in the Field of StudyBTeachers’ Role in StudyCHow to Improve Students’ AbilityDBad Points of the Examination System

单选题Which of the following is the best title for the passage?AThe Main Experts of AmericaBThe Computer TakeBack CampaignCThe Harm of E-waste TreatmentDElectric Waste-a Global Problem

单选题A user selects their proper domain and is unable to log into their Windows computer. The errorstates: System cannot log you on to the domain because the systems computer account in its primary domain is missing or the password on that account is incorrect.  Which of the following is the MOST likely cause for this error?()A The computers account was removed from Active Directory.B The users account was removed from Active Directory.C The computer was disjoined from the domain.D The user typed in the wrong password.

单选题You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()AInstruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.BAssign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.CReset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.DConfigure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.

单选题You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()AConfigure each computer to join a workgroup.      Create a user account and a local profile for each user. BConfigure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. CConfigure each computer to join the domain.      Create a user account for each user on a domain controller. DConfigure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

单选题You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()AUse Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.BUse Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.CUse Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.DUse secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

单选题Your network consists of a single Active Directory domain named Contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You create an organizational unit (OU) that contains a computer account named Computer1.  A Group Policy object (GPO) is linked to the OU and contains settings to enforce the use of IPSec. You log on to Computer1 by using a user account named User1. You need to verify that the IPSec settings have been applied.  Which command should you run?()ADsquery user -name User1BDsquery computer -name Computer1CGpresult /s Computer1 /scope COMPUTER /vDGpresult /user User1 /scope USER /v

单选题You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()ACreate an account for Peter's computer in the Computers container.BGrant the Log on locally user right to Peter's user account.CEnable Peter's user account.DChange the properties of Peter's user account so he can log on to any computer.

单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()ALog on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. BCreate a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. CRemove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. DBack up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.

问答题Why did some computer companies start charging helpline users?

单选题The most suitable title for the passage might be______.AFunny Computer Users.BHigh-tech and Low-tech.CComputers and Helpline Users.DA Qualified Computer User.

单选题You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?()AOn the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. BOn the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. CIn the domain, modify Marc's Logon Workstations list to include the name of the computer.DIn the domain, modify Marc's account properties to unlock the account.

单选题Which of the following is the most suitable title for the passage?AThe Evolution of Insects.BEnvironment and Heredity.CEducation: The Influence of the Environment.DThe Instincts of Animals.