参考答案和解析
正确答案:A
更多“()allows a laptop to connect to ”相关问题
  • 第1题:

    (C)

    “Get your hands off me, I have been stolen,” the laptop, a portable computer, shouted. That is a new solution to laptop computer theft: a program that lets owners give their property a voice when it has been taken.

    The program allows users to display alerts on the missing computer’s screen and even to set a spoken message. Tracking software for stolen laptops has been on the market for some time, but this is thought to be the first that allows owners to give the thief a piece of their mind.

    Owners must report their laptop missing by logging on to a website, which sends a message to the model: a red and yellow “lost or stolen” banner pops up on its screen when it is started. Under the latest version(版本) of the software, users can also send a spoken message.

    The message can be set to reappear every 30 seconds, no matter how many times the thief closes it. “One customer sent a message saying, ‘You are being tracked. I am right at your door’,” said Carrie Hafeman, chief executive of the company which produces the program, Retriever.

    In the latest version, people can add a spoken message. The default through the computer’s speakers is: “Help, this laptop is reported lost or stolen. If you are not my owner, please report me now.”

    The Retriever software package, which costs $29.95 (£21) but has a free trial period, has the functions of many security software programs. Owners can remotely switch to an alternative password prompt if they fear that the thief has also got hold of the access details.

    If a thief accesses the internet with the stolen laptop, Retriever will collect information on the internet service provider in use, so that the police can be alerted to its location.

    Thousands of laptops are stolen every year from homes and offices, but with the use of laptops increasing, the number stolen while their owners are out and about has been rising sharply.

    Other security software allows users to erase data remotely or lock down the computer.

    72. The expression “to give the thief a piece of their mind” can be understood as “_______”.

    A. to give the thief an alert mind B. to express the owners’ anger to the thief

    C. to remind the thief of his conscience D. to make the thief give up his mind


    正确答案:B

  • 第2题:

    Which statements is true about Foreign Exchange Station (FXS) ports on a router?()

    • A、the FXS interface allows an analog connection to be directed at the public switched telephone network (PSTN’s) central office
    • B、the FXS interface connect directly to a standard telephone, fax machine, or sililar device and supplies ring, voltage, and dial tone
    • C、the FXS interface connect directly to an IP phone and supplies ring, voltage, and dial tone
    • D、the FXS interface connect directly to ISDN voice channels

    正确答案:B

  • 第3题:

    A customer, Bob, needs to be able to access the Internet while traveling. Which of the following could Jill, a technician, recommend to Bob?()

    • A、Cellular service with an adapter for Bob’s laptop.
    • B、USB adapter with 802.11n capabilities for maximum speeds.
    • C、A Bluetooth card to attach to multiple networks.
    • D、Enable Wi-Fi so Bob can connect to any open network.

    正确答案:A

  • 第4题:

    A home user would like to connect their laptop display to their home HD television. Which of the following is the BEST solution?()

    • A、Connecting the laptop’s VGA output to an HDMI adaptor
    • B、Connecting the laptop’s VGA output to the television’s VGA input
    • C、Connecting the laptop's USB output to the HD television’s HDMI adaptor
    • D、Connecting the laptop’s USB output to the television’s USB input

    正确答案:B

  • 第5题:

    A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()

    • A、Upgrade the operating system to Windows XP Home.
    • B、Have the customer convert to NTFS and enable data encryption.
    • C、Tell the customer that a laptop should not be used for classified data.
    • D、Configure the wireless adapter to only connect to secure networks.

    正确答案:B

  • 第6题:

    Which of the following would be the correct way to dispose of a laptop battery? ()

    • A、Place the battery on a shelf for storage.
    • B、Place the battery in a trash compactor separately from the laptop.
    • C、Dispose of the battery in the same manner as the laptop.
    • D、Refer to the disposal information located on the battery.

    正确答案:D

  • 第7题:

    Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()

    • A、REVOKE ACCESS ON DATABASE FROM USER bob
    • B、REVOKE CONNECT ON DATABASE FROM USER tom
    • C、REVOKE tom FROM ACCESS ON DATABASE BY USER bob
    • D、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

    正确答案:B

  • 第8题:

    单选题
    A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()
    A

    The laptop is missing the software supplicant

    B

    The access point SSID is hidden.

    C

    The laptop only supports TKIP and AES encryption,

    D

    The access point is on the wrong channel.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network.  What should you do to enforce the group policy wireless settings to the laptop computers()
    A

    Execute gpupdate/target:computer command at the command prompt on laptop computers

    B

    Execute Add a network command and leave the SSID (service set identifier) blank

    C

    Execute gpupdate/boot command at the command prompt on laptops computers

    D

    Connect each laptop computer to a wired network and log off the laptop computer and then login again.

    E

    None of the above


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A user reports their laptop computer can no longer connect to a server. The computer works correctly in a different office. Which of the following tools would be used to troubleshoot this issue?()
    A

    Cable tester

    B

    Multimeter

    C

    Fiber splicer

    D

    Loopback plug


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)
    A

    It provides multiprotocol support.

    B

    It provides improved availability, strong security, and business continuance measures.

    C

    It enables you to connect Cisco VSAN technology and DAS technology.

    D

    It reduces cost and complexity by providing an easy transition to evolving technologies.

    E

    It allows you to create separate networks on the VSAN.

    F

    It allows you to migrate to new technologies without a complete equipment upgrade.


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following cables can be used to directly connect a laptop to a PC for ICS?()
    A

    IEEE 1394 cable

    B

    CAT5 crossover cable

    C

    CAT5e patch cable

    D

    Parallel cable


    正确答案: C
    解析: 暂无解析

  • 第13题:

    One function of the program is that it allows the owner to ______ at a distance.

    A. change some access details for switching on the laptop

    B. turn on the laptop by using the original password

    C. operate the laptop by means of an alternative password

    D. erase the information kept in the stolen laptop


    正确答案:A

  • 第14题:

    An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()

    • A、Setup an ACL that allows and logs all IP traffic between the two computers
    • B、Configure a spanning tree to check for a loop
    • C、Setup a span port on the switch to watch for CRC errors
    • D、Connect both computers using a crossover cable

    正确答案:D

  • 第15题:

    What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)

    • A、It provides multiprotocol support.
    • B、It provides improved availability, strong security, and business continuance measures.
    • C、It enables you to connect Cisco VSAN technology and DAS technology.
    • D、It reduces cost and complexity by providing an easy transition to evolving technologies.
    • E、It allows you to create separate networks on the VSAN.
    • F、It allows you to migrate to new technologies without a complete equipment upgrade.

    正确答案:A,D,F

  • 第16题:

    A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()

    • A、RJ-11 connector needs to be re-crimped
    • B、User has plugged into the laptop's NIC port
    • C、User has plugged the wrong end of the cable into the port
    • D、RJ-11 connector needs to be replaced with an RJ-45 connector

    正确答案:B

  • 第17题:

    An executive’s laptop screen has been damaged and will not power on. Which of the following is the FASTEST way to get the executive back online?()

    • A、Pull the hard drive and install it in a spare laptop of the same make and model.
    • B、Replace the motherboard on the laptop.
    • C、Build the executive a temporary laptop and attempt to repair the damaged one.
    • D、Replace the backlight on the laptop.

    正确答案:A

  • 第18题:

    A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()

    • A、The laptop is missing the software supplicant
    • B、The access point SSID is hidden.
    • C、The laptop only supports TKIP and AES encryption,
    • D、The access point is on the wrong channel.

    正确答案:A

  • 第19题:

    ertkiller .com has purchased laptop computers that will be used to connect to a wireless network. You create a laptop organizational unit and create a Group Policy Object (GPO) and configure user profiles by utilizing the names of approved wireless networks. You link the GPO to the laptop organizational unit. The new laptop users complain to you that they cannot connect to a wireless network.  What should you do to enforce the group policy wireless settings to the laptop computers()

    • A、Execute gpupdate/target:computer command at the command prompt on laptop computers
    • B、Execute Add a network command and leave the SSID (service set identifier) blank
    • C、Execute gpupdate/boot command at the command prompt on laptops computers
    • D、Connect each laptop computer to a wired network and log off the laptop computer and then login again.
    • E、None of the above

    正确答案:D

  • 第20题:

    单选题
    What is the purpose of the equalizing beam aboard a crane vessel().
    A

    It allows for rotation of the hook in the single mode

    B

    It is required to“twin-up”30-ton pedestal cranes

    C

    It is used to pick up light loads

    D

    It is used to rigidly connect two cranes


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    A customer, Bob, needs to be able to access the Internet while traveling. Which of the following could Jill, a technician, recommend to Bob?()
    A

    Cellular service with an adapter for Bob’s laptop.

    B

    USB adapter with 802.11n capabilities for maximum speeds.

    C

    A Bluetooth card to attach to multiple networks.

    D

    Enable Wi-Fi so Bob can connect to any open network.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    A user replaces a laptop’s wireless PCMCIA card with a different vendor’s card. All of the new card configuration steps have been followed. The OS sees all known wireless networks but cannot connect to the user’s network. Which of the following is the MOST likely reason for this behavior?()
    A

    DMZ is enabled.

    B

    MAC filtering is enabled.

    C

    WEP is being used.

    D

    SSID broadcast is disabled.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which statements is true about Foreign Exchange Station (FXS) ports on a router?()
    A

    the FXS interface allows an analog connection to be directed at the public switched telephone network (PSTN’s) central office

    B

    the FXS interface connect directly to a standard telephone, fax machine, or sililar device and supplies ring, voltage, and dial tone

    C

    the FXS interface connect directly to an IP phone and supplies ring, voltage, and dial tone

    D

    the FXS interface connect directly to ISDN voice channels


    正确答案: D
    解析: 暂无解析