-
You have a computer that runs Windows Vista. The computer has one partition and 1 GB of RAM. Youneed to upgrade the computer to Windows 7. What should you do first?()
A . Add 1 GB of RAM.
B . Create a second partition.
C . Disable User Account Control (UAC).
D . Install Windows Vista Service Pack 2 (SP2).
-
You have a computer that runs Windows 7. The computer has System Protection enabled. You need toretain only the last System Protection snapshot of the computer. All other snapshots must be deleted. Whatshould you do?()
A . Run Disk Cleanup for Programs and Features.
B . Run Disk Cleanup for System Restore and Shadow Copies.
C . From the System Protection Restore settings, select Turn off System Restore.
D . From the System Protection Restore settings, select Only restore previous versions of files.
-
Your portable computer has two 512-MB memory modules installed in the only two memory slots available.
You need to improve the speed of your computer.
What should you do?()
https://assets.asklib.com/images/image2/2018073116201988392.jpg
A . A
B . B
C . C
D . D
-
Your company has an Active Directory domain. The company has purchased 100 new computers. You want to deploy the computers as members of the domain. You need to create the computer accounts in an organizational unit. What should you do()
A . Run the csvde f computers.csv command.
B . Run the ldifde f computers.ldf command.
C . Run the dsadd computer
-
Your company has an Active Directory forest that contains client computers that run Windows Vista and Windows XP. You need to ensure that users are able to install approved application updates on their computers. Which two actions should you perform()
A . Set up Automatic Updates through Control Panel on the client computers.
B . Create a GPO and link it to the Domain Controllers organizational unit. Configure the GPO to automatically search for updates on the Microsoft Update site.
C . Create a GPO and link it to the domain. Configure the GPO to direct the client computers to the Windows Server Update Services (WSUS) server for approved updates.
D . Install the Windows Server Update Services (WSUS). Configure the server to search for new updates on the Internet. Approve all required updates.
-
Deploying the cisco unified computing system platform into the data center provides which two benefits?()
A . it leverages low-speed interfaces
B . only one configuration is used for all blades
C . storage, computing and networking services are combined onto one blade
D . it is A pra-as-you-go incremental deployment
E . server replacement is as easy as replacing the physical blade
-
()of the rooms has its own computer.
A . Every
B . Each
C . Whole
D . All
-
Your network has 1,000 client computers that run Windows 7. You need to install an application, in the Local System account context,on the client computers. What are two possible ways to achieve this goal?()
A . Configure a logon script.
B . Configure a logoff script.
C . Configure a startup script.
D . Configure a shutdown script.
-
Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network. What should you do?()
A . Change the Network Category setting of the wireless connection to Public.
B . Enable the Internet Connection Sharing feature on the wireless network adapter.
C . Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.
D . Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.
-
Your portable computer has two 512-MB memory modules installed in the only two memory slots available. You need to improve the speed of your computer. What should you do? ()
A . Adjust the processor scheduling to optimize for background services.
B . Connect a USB flash drive to the computer. Enable the ReadyBoost feature.
C . Configure the virtual memory file to exist on the same drive as the operating system.
D . Configure the local security policy setting of the computer to clear the virtual page file upon shutdown.
-
You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7installed. You need to start the computer from the VHD. What should you do?()
A . From Diskpart.exe, run Select vdisk.
B . From Disk Management, modify the active partition.
C . Run Bootcfg.exe and specify the /default parameter.
D . Run Bcdedit.exe and modify the Windows Boot Manager settings.
-
You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1. What should you do on Computer1?()
A . Run Winrm.exe quickconfig.
B . From Windows Firewall with Advanced Security, select Export Policy.
C . From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.
D . Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
-
The computer ________ last week has gone wrong.
-
What are the two kinds of software in a computer according to the video?
-
●If your diskette has been (69) ,the computer can not store any new information on it.(69)
●If your diskette has been (69) ,the computer can not store any new information on it.
(69) A.formatted
B.write protected
C.tested
D.Certified
-
The play has been on for two hours so the audience...
The play has been on for two hours so the audiences are very tired. {A; B; C}
A. 这部剧已经演了两个小时了,所以演员们很累了。
B. 这部剧两个小时就演完了,所以观众们不是很累。>
C. 这部剧已经演了两个小时了,所以观众们很累了。
-
Among the computers mentioned in the article, which kind of computers has greatest memory and most extensive calculating abilities?
-
Dell Computer Corporation is an example of a company that has used the low-cost leader
是
否
-
Your portable computer has two 512-MB memory modules installed in the only two memory slots available.You need to improve the speed of your computer.What should you do?()
<img src='https://img2.soutiyun.com/shangxueba/ask/17127001-17130000/17128375/23c715695021ea73873893adefc39cad.jpg' />
A.A
B.B
C.C
D.D
-
"I'm a total geek all around," says Angela B. Yron, a 27-year-old computer prlogrammer who has just graduated from Nova Scotia Community College. And yet, like many other students, she "never had the confidence" to approach any of the various open-source software communities on the internet—distributed teams of volunteers who collaborate to build software that is then made freely available. But thanks to Google, the world's most popular search engine and one of the biggest proponents of open-source software, Ms Byron spent the summer contributing code to Drupal, an open-source project that automates the management of websites. "It's awesome," she says.
Ms Byron is one of 419 students (out of 8,744 who applied) who were accepted for Google's "summer of code". While it sounds like a hyper-nerdy summer camp, the students neither went to Google's campus in Mountain View, California, nor to wherever their mentors at the 41 participating open-source projects happened to be located. Instead, Google acted as a matchmaker and sponsor. Each of the participating open-source projects received $500 for every student it took on; and each student received $4,500 ($500 right away, and $4,000 on completion of their work). Oh, and a T-shirt.
All of this is the idea of Chris DiBona, Google's open-source boss, who was brainstorming with Larry Page and Sergey Brin, Google's founders, last year. They realised that a lot of programming talent goes to waste every summer because students take summer jobs flipping burgers to make money, and let their coding skills degrade. "We want to make it better for students in the summer," says Mr. DiBona, adding that it also helps the open source community and thus, indirectly, Google, which uses lots of open source software behind the scenes. Plus, says Mr. DiBona, "it does become an opportunity for recruiting."
Elliot Cohen, a student at Berkeley, spent his summer writing a "Bayesian network toolbox" for Python, an open-source programming language. "I'm a pretty big fan of Google," he says. He has an interview scheduled with Microsoft, but "Google is the only big company that I would work at," he says. And if that doesn't work out, he now knows people in the open-source community, "and it's a lot less intimidating."
Ms. Byron's comment on her own summer experiment is ______.
A.negative
B.biased
C.puzzling
D.enthusiastic
-
What are the two main problems about the computer center?[Clink on 2 answers. ]
A.So many students have to finish their homework on computers.
B.The computer center is closed so early.
C.There are so few computers, and they are always broken.
D.Very few students come back.
此题为多项选择题。
-
Computer programmer Brendan Tammy earned &55000 a year by designing new computer games, yet he cannot find a bank prepared to let him have a check card. Instead, he has been told to wait another two years until he is 18.
He works for a small company in Liverpool, where most young people of his age are looking for jobs. Brendan's biggest headache is how to use his money. Though he has high payment, he cannot drive a car, or get credit cards.
Brendan got his job four months ago, a year after leaving school with six Olive's(普通成绩)and working for a time in a computer shop. "I got the job because the people who run the company knew I had already written some programs. " he said.
"I suppose 55000 pounds sounds a lot but I hope it will come to more than that this year. "He spends some of his money on records and clothes, and gives his mother 20 pounds a week as he lives with his parents. But most of his spare time is spent working.
"Unfortunately, computing was not part of our studies at school," he said. "But I had been studying it in books and magazines for four years in my spare time. I knew what I wanted to do and never considered staying on at school. Most people in this business are fairly young, anyway. I would like to earn a million and I suppose early retirement (退休)is a possibility. You never know when the market might disappear. "
Why is Brendan so different from other young people of his age?
A.He earns an extremely high payment.
B.He has got a job.
C.He lives at home with his parents.
D.He does not go out much.
-
The ______ in e-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America.
A.illness
B.virus
C.weakness
D.attachment
-
You are the network administrator for TestKing. The network consists of a singleActive Directory domain that contains five member servers running Windows 2000Server. All five servers have CD-ROM drives and floppy disk drives.You purchase a new computer that has a CD-RW drive. This computer does notcurrently have a floppy disk drive, but you plan to install one eventually.You install and configure Windows Server 2003 and Recovery Console on the newcomputer. You configure it as a member server named Testking6.Now you need to ensure that Testking6 can be restored in the event of an operatingsystem failure.Which two actions should you perform? ()(Each correct answer presents part of thesolution. Choose two.)
A. Copy Asr.sif, Asrpnp.sif, and Autorun.exe from the appropriate directories on Testking6 to another server. Copy the same files to a CD-Rom.
B. Copy Asr.sif and Asrpnp.sif from the appropriate directory on Testking6 to another server. Copy the same files to a floppy disk.
C. Start the Automated System Recovery wizard on Testking6.
D. Start the Create an Emergency Repair Disk wizard on Testking6.
E. Copy Autoexec.nt, Config.nt, Setup.log, and Autorun.exe from the appropriate directories on Testking6 to another server. Copy the same files to a CD-Rom.
F. Copy Autoexec.nt, Config.nt, and Setup.log from the appropriate directories on Testking6 to another server. Copy the same files to a floppy disk.