these companies had not enough money to buy such expensive computers
these computers could not do the work that small computers can do today
these computers did not come onto the market
these companies did not need to use this new technology
第1题:
Modern computers based on ( ) are millions to billions of times more capable than the early computers, which occupy a fraction of the space. Simple computers are small enough to fit into mobile devices, an mobile computers can be powered by small batteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as ‘computers’.
A.Central Processing Unit
B.integrated circuits
C.Hard disk
D.software integration
第2题:
第3题:
Your company has servers that run Windows Server 2008. All client computers run Windows XP Service Pack 2 (SP2). Windows 2003 Professional, or Windows Vista. You need to ensure all computers can use the IPv6 protocol. What should you do()
第4题:
Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet. You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months. You need to plan the most efficient method for activating all of the computers. What should you do?()
第5题:
You are the network administrator for ExamSheet. Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers. What should you do?()
第6题:
You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()
第7题:
第8题:
Use the Key Management Service (KMS) for all the computers.
Use Multiple Activation Key (MAK) Independent for all the computers.
Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.
Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.
第9题:
On the research computers use the Local Computer Policy to disable theAccess this computer from the networkoption.
Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.
Add the users of the research computers to the Power Users group on each computer.
On the research computers configure the security settings to prevent anonymous access.
第10题:
Create a single image to use for the main office computers and the branch office computers, and apply the requiredsettings through Group Policy. Create a separate image to use for the kiosk computers.
Create one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image.
Create a single image to use for all location types. Create a custom Windows security template for each location type.
Create a single image to use for the branch office computers and the kiosk computers.Create a separate image to use for the main office computers.
第11题:
were playing
were to play
have played
played
第12题:
There are both advantages and disadvantages in using a word professor.
The British companies care much for the health of the people using word processors.
The technology in the field of computers has been greatly advanced over the last ten years.
Using world processors, secretaries can get more time to do more interesting work for their bosses.
第13题:
A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()
A. Install anti-virus software on the student computers.
B. Put the faculty computers in a separate VLAN.
C. Power down the switches that connect to faculty computers when they are not in use.
D. Remove the student computers from the network and put them on a peer-to-peer network.
E. Create an access list that blocks the students from the Internet where the hacking tolls are located.
第14题:
第15题:
You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()
第16题:
You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()
第17题:
You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk. Computers in all three types of location use the same hardware. Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security. Branch office computers must use BitLocker Drive Encryption. You have the following requirements:Create deployment images. Minimize image maintenance. You need to define an image-creation strategy that meets the requirements. What should you do?()
第18题:
the saving of time and money
the use of computers in small companies
the wide use of word processors
the decreasing number of secretaries
第19题:
Configure the IPv6 protocol on the Windows 7 computers.
Configure the network shares on the Windows 7 computers to include the user names of all employees.
Configure the network shares on the Windows XP computers to include the user names of all employees.
Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.
第20题:
Install anti-virus software on the student computers.
Put the faculty computers in a separate VLAN.
Power down the switches that connect to faculty computers when they are not in use.
Remove the student computers from the network and put them on a peer-to-peer network.
Create an access list that blocks the students from the Internet where the hacking tolls are located.
第21题:
Configure all portable computers to cache user credentials locally.
Ensure that all users of portable computers log on to the network at least once before working offline.
In all portable computers, rename Ntuser.dat to Ntuser.man.
For all portable computers, configure the Loopback policy setting.
第22题:
Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS).
Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).
Add a script to the users' desktops that changes the IP configuration between dynamic and manual.
Configure the IP properties of the portable computers so that they have an alternate configuration.
第23题:
Repackage and re-deploy the application's .msi file to the Sales OU
Repackage and re-deploy the application's .mst file to the Sales OU
Re-deploy the application by using the Group Policy object (GPO for the Sales OU)
Restart Windows Installer service on the ten computers.