单选题Ten years ago, smaller companies did not use large computers because _____.A these companies had not enough money to buy such expensive computersB these computers could not do the work that small computers can do todayC these computers did not come ont

题目
单选题
Ten years ago, smaller companies did not use large computers because _____.
A

these companies had not enough money to buy such expensive computers

B

these computers could not do the work that small computers can do today

C

these computers did not come onto the market

D

these companies did not need to use this new technology


相似考题

4.This is not the world we know. This world is controlled by computers. Men and women can be seen, but they are following the orders given to them by machines. The machines were designed by mad scientists, but at some point even the mad scientists were taken over by their super-inventions.Does this sound familiar? You have probably read something like it in magazines or books, or seen it in a film. Why is it so popular? One of the reasons is that it reflects the fears of many people; fear of the unknown fear of what is not understood or, at least, fear of something that is not completely understood.The fact is that every day it seems that computers take control of another area of our lives. Somefactory jobs are now done by robots and the robots are controlled by computers. Our bank accounts are managed by computers. At the airport, our tickets are sold by a computer. Certainly, many of these operations are made moreefficient by computers, but our admiration is sometimes mixed with unsafe feelings. And this lack of safety is caused by the fact that we do not know how computers do these things, and we really don't know what they might do next. But we can find out how computers work, and once we understand them, we can use computers instead of worrying about being used by them. Today, there is a new generation of computer wizards who know exactly how computers get things done. These young men and women, usually university students, are happy to sit for hours, sometimes for days, designing programs, not eating, not sleeping, but discovering what can be done by these wonderful slaves which they have learned to control. These computer wizards have learned to use the computer and search for new tasks for their machines.(1)、According to the passage, our present world is under the control of ______ .A:mad scientistsB:men and womenC:the unknown fearD:some super-inventions(2)、The reason why many people are afraid of computers is that ______ .A:they don't know anything about computersB:they haven't really understood computersC:there are so many computer gamesD:computers are often down(3)、The author mentions computer wizards in order to point out that ______ .A:computers can be controlled by manB:there should be more people devoted to computersC:only young people are interested in computersD:more time and energy is required to control computers(4)、This passage is probably written to suggest that ______ .A:some day computers can deal with all human problemsB:computers can be used in place of traveling to our jobsC:people should not fear computersD:computer technology will not meet people's needs in various situations(5)、The author's attitude towards widely used computers is __.A:positiveB:anxiousC:worriedD:serious

更多“单选题Ten years ago, smaller companies did not use large computers because _____.A these companies had not enough money to buy such expensive computersB these computers could not do the work that small computers can do todayC these computers did not come ont”相关问题
  • 第1题:

    Modern computers based on ( ) are millions to billions of times more capable than the early computers, which occupy a fraction of the space. Simple computers are small enough to fit into mobile devices, an mobile computers can be powered by small batteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as ‘computers’.

    A.Central Processing Unit

    B.integrated circuits

    C.Hard disk

    D.software integration


    正确答案:B

  • 第2题:

    Modern computers based on() are millions to billions of times more capable than the early machines,and occupy a fraction of the space。Simple computers are small enough to fit into mobile devices, a mobile computers can be powered by small batteries. Personal computers in their va


    A.Central Processing unit
    B.integrateD.circuits
    C.HarD.disk
    D.software integration


    答案:B
    解析:
    基于(集成电路)的现代计算机是比起 早期的计算机,它占用的空间的更小,能力更强,是早期计算机的数百万倍甚至数十亿倍。轻量型的电脑都足够小,以适应移动设备,一个移动计算机可以通过小型 电池供电。个人电脑被广泛应用,以致于信息时代的一种标志,并且是大多数人认为的“计算机”。

  • 第3题:

    Your company has servers that run Windows Server 2008. All client computers run Windows XP Service Pack 2 (SP2). Windows 2003 Professional, or Windows Vista. You need to ensure all computers can use the IPv6 protocol. What should you do()

    • A、Install Serivce Pack 4 on all Windows 2000 Professional computers
    • B、Upgrade the Windows 2000 professional computers to Windows XP SP2
    • C、Run the IPv6.exe tool on the Windows 200 Professional and Windows XP computers
    • D、Install Active Directory Client extention (DSClient.exe) on the Windows 2000 Professional and Windows XP computers.

    正确答案:B

  • 第4题:

    Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()

    • A、 Use the Key Management Service (KMS) for all the computers.
    • B、 Use Multiple Activation Key (MAK) Independent for all the computers.
    • C、 Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.
    • D、 Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.

    正确答案:A

  • 第5题:

    You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()

    • A、On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.
    • B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.
    • C、Add the users of the research computers to the Power Users group on each computer.
    • D、On the research computers configure the security settings to prevent anonymous access.

    正确答案:B

  • 第6题:

    You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()

    • A、Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). 
    • B、Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).
    • C、Add a script to the users' desktops that changes the IP configuration between dynamic and manual.
    • D、Configure the IP properties of the portable computers so that they have an alternate configuration. 

    正确答案:D

  • 第7题:

    问答题
    Passage 1  There was a time  1 parents who wanted an educational present for their children would buy a typewriter, a globe or an encyclopedia set.  Now those  2 seem hopelessly old-fashioned: this Christmas, there were a lot of personal computers under the tree. Convinced that computers are their key  3 success, parents are also frantically insisting that children  4 taught to use them on school as early as possible.  The problem for schools is that when  5 comes to computers, parents don't always know best. Many schools are yielding to parental impatience and are purchasing hardware    6 sound educational planning so they can say, "OK, we've moved into the computer age." Teachers found themselves    7 in the middle of the problem--between parent pressure and wise educational decisions.  Educators do not even agree  8 how computers should be used. A lot of money is going for computerized educational materials that research has shown can be taught just as well  9 pencil and paper. Even those  10 believe that all children should have access to computers warn of potential dangers to the very young.  The temptation remains strong largely because young children adapt so well  11 computers. First graders have been seen willing to work for two hours on math skills. Some have an attention span of 20 minutes.  Not every school,  12 , can afford to go into computing, and that  13 yet another problem: a division between the haves and have-nots. Very few parents ask  14 computer instructions in poor school districts, in  15  there may be barely enough money to pay the teacher.

    正确答案: 1. when 分析句子结构可知,空格部分后面作time的定语从句。由于空格处在定语从句中作状语,因此填入when。
    2. items/presents 通过上下文可知,空格部分指代前面提到的typewriter、globe、encyclopedia set等礼物。因此此处填入items或者presents
    3. to key to success成功的关键。
    4. be 空格前面使用了insist,表示“坚持认为”,因此从句需使用虚拟语气,谓语部分使用should+动词原形,should可以省略。
    5. it when it comes to sth.当说到……的时候,当涉及……的时候。
    6. without 根据上下文语境可知,由于急躁的家长们,很多学校被迫购买计算机硬件,而没有成熟的教育计划。
    7. caught find sb. caught in sth.发现某人陷于某种境地。
    8. on agree on sth.对……取得一致意见,达成共识。后面常接某种决定、意向等。
    9. with 句意:大量的资金投入在用计算机教授课程的材料上了,而研究表明这些材料同样可以用普通的纸和笔来教给学生。
    10. who 根据上下文语境可知,此处those指人,因此后面需使用who引导定语从句。
    11. to adapt to sth.适应某事。
    12. however 上文中讨论了学校购置计算机等硬件,而本句讲到并不是所有学校都能支付得起这笔钱。因此空格处填入表示转折的however。
    13. creates/causes 根据语境可知,此处指引起另外一个问题。因此填入creates或者causes。注意使用动词的单数第三人称形式。
    14. for 在贫困地区,几乎没有哪位父母要求计算机教学。ask for是固定搭配,意为“要求”。
    15. that 结合语境可知,此句是对上文内容的原因进行的说明,则此处应填入一个连词引导状语从句表示“由于”。in that因为;由于。
    解析: 暂无解析

  • 第8题:

    单选题
    Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()
    A

     Use the Key Management Service (KMS) for all the computers.

    B

     Use Multiple Activation Key (MAK) Independent for all the computers.

    C

     Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.

    D

     Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()
    A

    On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.

    B

    Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.

    C

    Add the users of the research computers to the Power Users group on each computer.

    D

    On the research computers configure the security settings to prevent anonymous access.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk.  Computers in all three types of location use the same hardware.   Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security.   Branch office computers must use BitLocker Drive Encryption.   You have the following requirements:Create deployment images. Minimize image maintenance.   You need to define an image-creation strategy that meets the requirements.   What should you do?()
    A

    Create a single image to use for the main office computers and the branch office computers, and apply the requiredsettings through Group Policy. Create a separate image to use for the kiosk computers.

    B

    Create one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image.

    C

    Create a single image to use for all location types. Create a custom Windows security template for each location type.

    D

    Create a single image to use for the branch office computers and the kiosk computers.Create a separate image to use for the main office computers.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    The computers made by our company sell best, but several years ago no one could have imagined the role in the markets that they _____.
    A

    were playing

    B

    were to play

    C

    have played

    D

    played


    正确答案: D
    解析:
    句意为:计算机使我们的产品很畅销,几年前谁都没想到他们会在市场中扮演那么重要的角色。用不定式,表达过去将来时的意思。

  • 第12题:

    单选题
    Which of the following statements is NOT true? _____
    A

    There are both advantages and disadvantages in using a word professor.

    B

    The British companies care much for the health of the people using word processors.

    C

    The technology in the field of computers has been greatly advanced over the last ten years.

    D

    Using world processors, secretaries can get more time to do more interesting work for their bosses.


    正确答案: A
    解析:
    根据第三段最后一句“Safety screens to put over a VDU have been invented but few companies in England bother to buy them.”可知,安全的屏幕已经发明出来,但是只有很少公司购买,说明很多公司为节省成本不舍投入,不关心员工的健康。

  • 第13题:

    A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()

    A. Install anti-virus software on the student computers.

    B. Put the faculty computers in a separate VLAN.

    C. Power down the switches that connect to faculty computers when they are not in use.

    D. Remove the student computers from the network and put them on a peer-to-peer network.

    E. Create an access list that blocks the students from the Internet where the hacking tolls are located.


    参考答案:B

  • 第14题:

    共用题干
    第二篇

    The next big breakthrough in artificial intelligence could come from giving machines not just more logical capacity,but emotional capacity as well.
    Feeling aren't usually associated with inanimate(无生命的)machines, but Posalind Picard, a professor of computer technology at MIT,believes emotion may be just the thing computes need to work effectively.Computers need artificial emotion both to understand their human users better and to achieve self-analysis and self-improvement,says Picard.
    "If we want computers to be genuinely intelligent,to adapt to us,and to interact naturally with us,then they will need the ability to recognize and express emotions,to have emotions,and to have what has come to be called emotional intelligence,"Picard says.
    One way that emotions can help computers,she suggests,is by helping keep them from crashing. Today's computers produce error messages,but they do not have a "gut feeling" of knowing when something is wrong or doesn't make sense.A healthy fear of death could motivate a computer to stop trouble as soon as it starts.On the other hand, self-preservation would need to be subordinate to service to humans.It was fear of its own death that promoted RAL,the fictional computer in the film 2002 :A Space Odyssey, to extermine(消灭)most of its human associates.
    Similarly,computers that could"read"their users would accumulate a store of highly personal information about us一not just what we said and did,but what we likely thought and felt.
    "Emotion not only contribute to a richer quality of interaction,but they directly impact a person's ability to interact in an intelligent way,"Picard says."Emotional skills,especially the ability to recognize and express emotions,are essential for natural communication with humans."

    According to Picard,emotion intelligence is necessary to computers because_________.
    A:it can make computers analyze the information more efficiently
    B:it can help to eliminate the computrs' innate problems
    C:it can improve the mechanic capacity of computers
    D:it can make computers achieve a better understanding of human users

    答案:D
    解析:
    事实细节题。本题考查文中人物的观点。可从第二段的结尾句中找到答案,选项A和C没有依据,选项B与第二段最后一句中的self-improvement不符,improve不等同于eliminate。
    推理判断题。在第三段开头的条件状语从句中," to adapt to us , and to interact naturally with us”既是与“to be genuinely intelligent”并列的结构,也是对其的补充解释,由此可以推断出答案。选项B无合理的依据。根据第四段第二句,情感只是让计算机知道什么时候出了毛病或指令不明,并可对此作出修正,但这并不能说明选项C或D正确。
    词义推断题。在原句中,有了gut feeling,计算机就能知道何时出了毛病,由此可以推断gut feeling应该是一个好的特性,不带有任何贬义,从而排除选项B、C、D。
    推理判断题。本题考查例子与观点的关系。该例子支持的观点是例子的前一句,即第四段第四句。其他选项并非作者在本文要阐明的目的。
    推理判断题,也是观点态度题。根据文章开头以及综观全文可知,作者对改进被赋予情感的计算机的功能寄予了很高的期望。本题最具干扰性的是选项B,计算机对人类的威胁在第四段的例子里有步及,但这并非作者的主要想法,作者认为只要控制得好,情感计算机就能更高效(如最后一段所述)。

  • 第15题:

    You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()

    • A、Configure all portable computers to cache user credentials locally.
    • B、Ensure that all users of portable computers log on to the network at least once before working offline.
    • C、In all portable computers, rename Ntuser.dat to Ntuser.man.
    • D、For all portable computers, configure the Loopback policy setting.

    正确答案:B

  • 第16题:

    You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()

    • A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.
    • B、Use security templates to create a security template file and import the security settings to modify the default security settings.
    • C、Use the local computer policy to disable the access to this computer from the network option.
    • D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

    正确答案:A

  • 第17题:

    You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk.  Computers in all three types of location use the same hardware.   Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security.   Branch office computers must use BitLocker Drive Encryption.   You have the following requirements:Create deployment images. Minimize image maintenance.   You need to define an image-creation strategy that meets the requirements.   What should you do?()

    • A、Create a single image to use for the main office computers and the branch office computers, and apply the requiredsettings through Group Policy. Create a separate image to use for the kiosk computers.
    • B、Create one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image.
    • C、Create a single image to use for all location types. Create a custom Windows security template for each location type.
    • D、Create a single image to use for the branch office computers and the kiosk computers.Create a separate image to use for the main office computers.

    正确答案:A

  • 第18题:

    单选题
    According to the writer, the main feature of the revolution in office work over the last ten years is _____.
    A

    the saving of time and money

    B

    the use of computers in small companies

    C

    the wide use of word processors

    D

    the decreasing number of secretaries


    正确答案: C
    解析:
    从最后一段“Whatever the arguments for or against word processors, they are a key feature of this revolution in office practice.”可知,过去十年办公室工作革命的主要特征就是文字处理器的广泛使用。

  • 第19题:

    单选题
    Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()
    A

    Configure the IPv6 protocol on the Windows 7 computers.

    B

    Configure the network shares on the Windows 7 computers to include the user names of all employees.

    C

    Configure the network shares on the Windows XP computers to include the user names of all employees.

    D

    Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()
    A

    Install anti-virus software on the student computers.

    B

    Put the faculty computers in a separate VLAN.

    C

    Power down the switches that connect to faculty computers when they are not in use.

    D

    Remove the student computers from the network and put them on a peer-to-peer network.

    E

    Create an access list that blocks the students from the Internet where the hacking tolls are located.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You are the network administrator for .Your network consists of a single Active Directory domain named . The Default Domain Group Policy object (GPO) uses all default settings. The network contains five servers running Windows Server 2003 and 800 client computers. Half of the client computers are portable computers. The other half are desktop computers. Users of portable computers often work offline, but users of desktop computers do not. You install Windows XP Professional on all client computers with default settings. Then you configure user profiles and store them on the network. Some users of portable computers now report that they cannot log on to their computers. Other users of portable computers do not experience this problem. You need to ensure that all users of portable computers can log on successfully,whether they are working online or offline. What should you do?()
    A

    Configure all portable computers to cache user credentials locally.

    B

    Ensure that all users of portable computers log on to the network at least once before working offline.

    C

    In all portable computers, rename Ntuser.dat to Ntuser.man.

    D

    For all portable computers, configure the Loopback policy setting.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()
    A

    Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). 

    B

    Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).

    C

    Add a script to the users' desktops that changes the IP configuration between dynamic and manual.

    D

    Configure the IP properties of the portable computers so that they have an alternate configuration. 


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. The application is successfully installed on the 740 out of 750 computers. The ten computers are unable to install the application what should you do to install that application on all the computers in the sales OU.What should you do?()
    A

    Repackage and re-deploy the application's .msi file to the Sales OU

    B

    Repackage and re-deploy the application's .mst file to the Sales OU

    C

    Re-deploy the application by using the Group Policy object (GPO for the Sales OU)

    D

    Restart Windows Installer service on the ten computers.


    正确答案: B
    解析: 暂无解析