()allows a laptop to connect to other devices such as monitor, printer, etc.
第1题:
(C)
“Get your hands off me, I have been stolen,” the laptop, a portable computer, shouted. That is a new solution to laptop computer theft: a program that lets owners give their property a voice when it has been taken.
The program allows users to display alerts on the missing computer’s screen and even to set a spoken message. Tracking software for stolen laptops has been on the market for some time, but this is thought to be the first that allows owners to give the thief a piece of their mind.
Owners must report their laptop missing by logging on to a website, which sends a message to the model: a red and yellow “lost or stolen” banner pops up on its screen when it is started. Under the latest version(版本) of the software, users can also send a spoken message.
The message can be set to reappear every 30 seconds, no matter how many times the thief closes it. “One customer sent a message saying, ‘You are being tracked. I am right at your door’,” said Carrie Hafeman, chief executive of the company which produces the program, Retriever.
In the latest version, people can add a spoken message. The default through the computer’s speakers is: “Help, this laptop is reported lost or stolen. If you are not my owner, please report me now.”
The Retriever software package, which costs $29.95 (£21) but has a free trial period, has the functions of many security software programs. Owners can remotely switch to an alternative password prompt if they fear that the thief has also got hold of the access details.
If a thief accesses the internet with the stolen laptop, Retriever will collect information on the internet service provider in use, so that the police can be alerted to its location.
Thousands of laptops are stolen every year from homes and offices, but with the use of laptops increasing, the number stolen while their owners are out and about has been rising sharply.
Other security software allows users to erase data remotely or lock down the computer.
72. The expression “to give the thief a piece of their mind” can be understood as “_______”.
A. to give the thief an alert mind B. to express the owners’ anger to the thief
C. to remind the thief of his conscience D. to make the thief give up his mind
第2题:
Which statements is true about Foreign Exchange Station (FXS) ports on a router?()
第3题:
A customer, Bob, needs to be able to access the Internet while traveling. Which of the following could Jill, a technician, recommend to Bob?()
第4题:
A home user would like to connect their laptop display to their home HD television. Which of the following is the BEST solution?()
第5题:
A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()
第6题:
Which of the following would be the correct way to dispose of a laptop battery? ()
第7题:
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()
第8题:
The laptop is missing the software supplicant
The access point SSID is hidden.
The laptop only supports TKIP and AES encryption,
The access point is on the wrong channel.
第9题:
Execute gpupdate/target:computer command at the command prompt on laptop computers
Execute Add a network command and leave the SSID (service set identifier) blank
Execute gpupdate/boot command at the command prompt on laptops computers
Connect each laptop computer to a wired network and log off the laptop computer and then login again.
None of the above
第10题:
Cable tester
Multimeter
Fiber splicer
Loopback plug
第11题:
It provides multiprotocol support.
It provides improved availability, strong security, and business continuance measures.
It enables you to connect Cisco VSAN technology and DAS technology.
It reduces cost and complexity by providing an easy transition to evolving technologies.
It allows you to create separate networks on the VSAN.
It allows you to migrate to new technologies without a complete equipment upgrade.
第12题:
IEEE 1394 cable
CAT5 crossover cable
CAT5e patch cable
Parallel cable
第13题:
One function of the program is that it allows the owner to ______ at a distance.
A. change some access details for switching on the laptop
B. turn on the laptop by using the original password
C. operate the laptop by means of an alternative password
D. erase the information kept in the stolen laptop
第14题:
An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()
第15题:
What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)
第16题:
A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()
第17题:
An executive’s laptop screen has been damaged and will not power on. Which of the following is the FASTEST way to get the executive back online?()
第18题:
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()
第19题:
ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network. What should you do to enforce the group policy wireless settings to the laptop computers()
第20题:
It allows for rotation of the hook in the single mode
It is required to“twin-up”30-ton pedestal cranes
It is used to pick up light loads
It is used to rigidly connect two cranes
第21题:
Cellular service with an adapter for Bob’s laptop.
USB adapter with 802.11n capabilities for maximum speeds.
A Bluetooth card to attach to multiple networks.
Enable Wi-Fi so Bob can connect to any open network.
第22题:
DMZ is enabled.
MAC filtering is enabled.
WEP is being used.
SSID broadcast is disabled.
第23题:
the FXS interface allows an analog connection to be directed at the public switched telephone network (PSTN’s) central office
the FXS interface connect directly to a standard telephone, fax machine, or sililar device and supplies ring, voltage, and dial tone
the FXS interface connect directly to an IP phone and supplies ring, voltage, and dial tone
the FXS interface connect directly to ISDN voice channels