第1题:
The term computer describes a device made up of a combination of electronic and electromechanical components. By itself, a computer has no( )and is referred to as hardware, which means simply the physical equipment. The hardware can&39;t be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system, hardware, software, data/information, people, procedures and communications. A system is defined as a collection of related components that( )to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees) with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( )Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to( )their information systems, in, response to new marketing&39; opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.
A.information B.software C.intelligence D.dataA.interact B.work C.connect D.changeA.improved B.better C.good D.bestA.decision B.need C.standard D.objectiveA.modify B.replace C.changeD.transfer
第2题:
Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.
A.network B.virus C.security D.architecture
第3题:
第4题:
第5题:
第6题:
第7题:
You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has notentered sleep mode. You need to identify what is preventing the computer from entering sleep mode. What should you do?()
第8题:
What should be part of a comprehensive network security plan?()
第9题:
Which of the following methods effectively removes data from a hard drive prior to disposal?()
第10题:
You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower. You need to prevent the application from auto starting without uninstalling the application. What should you do?()
第11题:
Modify the BIOS settings, and disable support for the docking station.
Modify the hardware profiles, and remove the Docked hardware profile.
Modify the Device Manager settings to disable all devices used by the docking station.
Configure the hardware profiles so that the Undocked hardware profile is the default hardware profile for startup.
第12题:
show configuration
show environment
show inventory
show platform
show version
第13题:
Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.
A.network B.virus C.security D.architecture
第14题:
A.Allow users to develop their own approach to network security
B.Physically secure network equipment from potential access by unauthorized individuals
C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
E.Minimize network overhead by deactivating automatic antivirus client updates
第15题:
第16题:
第17题:
第18题:
第19题:
If a technician needs to convert a hard drive from Basic to Dynamic, which of the following utilities would the technician use?()
第20题:
which of the following actions will you not take before beginning installation or removal of anyNON-PNP hardware device inside the computer case?()
第21题:
Which of the following software directly interacts with the hardware and handles hardware resource requests from virtual machines?()
第22题:
You have a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to collect the following information from the Web server: Unauthorized attempts to upload filesUnsuccessful commands that try to run executables You must achieve this goal by using the minimum amount of administrative effort. What should you do?()
第23题:
They are cheaper than traditional newspapers.
They are very convenient to use.
You can get more information from them quickly.
You can easily save information for future use.
第24题:
Allow users to develop their own approach to network security
Physically secure network equipment from potential access by unauthorized individuals
Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
Minimize network overhead by deactivating automatic antivirus client updates