Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A.network B.virus C.security D.architecture

题目
Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

A.network
B.virus
C.security
D.architecture

相似考题
参考答案和解析
答案:C
解析:
计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。
更多“Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.”相关问题
  • 第1题:

    The term computer describes a device made up of a combination of electronic and electromechanical components. By itself, a computer has no( )and is referred to as hardware, which means simply the physical equipment. The hardware can&39;t be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system, hardware, software, data/information, people, procedures and communications. A system is defined as a collection of related components that( )to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees) with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( )Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to( )their information systems, in, response to new marketing&39; opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    A.information B.software C.intelligence D.dataA.interact B.work C.connect D.changeA.improved B.better C.good D.bestA.decision B.need C.standard D.objectiveA.modify B.replace C.changeD.transfer


    正确答案:C,A,B,D,C

  • 第2题:

    Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.

    A.network B.virus C.security D.architecture


    正确答案:C

  • 第3题:

    Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

    A.network
    B.vims
    C.security
    D.architecture

    答案:C
    解析:
    计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。

  • 第4题:

    Information( )means protecting information and information systems from unauthorized acces,use, disclosure, disruption, modification, or destruction.

    A.integrity
    B.availability
    C.security
    D.consistency

    答案:C
    解析:

  • 第5题:

    The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.

    A system is defined as a collection of related components that ( ) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.
    Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )
    From time to time, organizations need to (5 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    (5)应选( )。



    A. modify
    B. replace
    C. Change
    D. transfer

    答案:C
    解析:
    翻译:

    计算机这个术语描述由电子的和机电的部件组合而成的一种设备。计算机本身没有只能,因此称为硬件,仅仅是物理设备。硬件只有和其他要素连接才能使用,所有这些要素即为构成基于计算机信息系统的六要素:硬件、软件、数据/信息、人、操作程序和通信。
    系统定义为一组相关组件的集合,这些组件相互交互以完成一个任务,以实现一个目标。任何使用信息技术的组织会拥有一个基于计算机的信息系统,给管理人员(和各类员工)提供适当类型的信息以帮助他们做出决策。

    系统分析和设计是确定系统如何工作然后经过一系列步骤以使其更好。通常,采用系统方法来定义、描述和解决一个问题或满足一个目标。

    随着时间推移,新的市场机会、政府规定的变化、新技术的出现、公司兼并以及其他方面的发展等,使得组织需要改变其信息系统。当需要改变时,应用系统分析与设计的时机已经成熟。

  • 第6题:

    The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( 1) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.
    A system is defined as a collection of related components that ( 72) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.
    Systems analysis and design is to ascertain how a system works and then take steps to make it (73 ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( 74)
    From time to time, organizations need to (75 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    (1)应选( )。




    A. information
    B. software
    C. intelligence
    D. Data

    答案:C
    解析:
    翻译:

    计算机这个术语描述由电子的和机电的部件组合而成的一种设备。计算机本身没有只能,因此称为硬件,仅仅是物理设备。硬件只有和其他要素连接才能使用,所有这些要素即为构成基于计算机信息系统的六要素:硬件、软件、数据/信息、人、操作程序和通信。
    系统定义为一组相关组件的集合,这些组件相互交互以完成一个任务,以实现一个目标。任何使用信息技术的组织会拥有一个基于计算机的信息系统,给管理人员(和各类员工)提供适当类型的信息以帮助他们做出决策。

    系统分析和设计是确定系统如何工作然后经过一系列步骤以使其更好。通常,采用系统方法来定义、描述和解决一个问题或满足一个目标。

    随着时间推移,新的市场机会、政府规定的变化、新技术的出现、公司兼并以及其他方面的发展等,使得组织需要改变其信息系统。当需要改变时,应用系统分析与设计的时机已经成熟。

  • 第7题:

    You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has notentered sleep mode. You need to identify what is preventing the computer from entering sleep mode.  What should you do?()

    • A、At a command prompt, run Powercfg energy.
    • B、At a command prompt, run Systeminfo /s localhost.
    • C、From Performance Monitor, review the System Summary.
    • D、From Performance Information and Tools, review the detailed performance and system information.

    正确答案:A

  • 第8题:

    What should be part of a comprehensive network security plan?()

    • A、Allow users to develop their own approach to network security.
    • B、Physically secure network equipment from potential access by unauthorized individuals.
    • C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
    • D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
    • E、Minimize network overhead by deactivating automatic antivirus client updates.

    正确答案:B

  • 第9题:

    Which of the following methods effectively removes data from a hard drive prior to disposal?()

    • A、Use the remove hardware OS feature
    • B、Formatting the hard drive
    • C、Physical destruction
    • D、Degauss the drive
    • E、Overwriting data with 1s and 0s by utilizing software

    正确答案:C,E

  • 第10题:

    You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()

    • A、Use the Microsoft Windows Task Manager application to end the task for the application.
    • B、Use the Control Panel application to uninstall the application. Reboot the computer.
    • C、Use the Software Explorer application to disable the application. Reboot the computer.
    • D、Use the Services application to disable the Application Experience service, and then launch the application.

    正确答案:C

  • 第11题:

    单选题
    You are the desktop administrator for your company. A remote sales representative named Laura uses a Windows XP Professional portable computer. Laura travels to customer locations daily, and she usually works from home. She does not use a docking station when she starts the computer at home. Each time Laura starts her computer, she is prompted to choose between the Docked and Undocked hardware profiles from the Hardware Profile Menu. You need to ensure that Laura is not prompted to choose a hardware profile each time she starts her computer. You also need to allow her computer to start automatically with the undocked profile and without delay. How should you configure Laura’s computer?()
    A

    Modify the BIOS settings, and disable support for the docking station.

    B

    Modify the hardware profiles, and remove the Docked hardware profile. 

    C

    Modify the Device Manager settings to disable all devices used by the docking station. 

    D

    Configure the hardware profiles so that the Undocked hardware profile is the default hardware profile for startup.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which command shows system hardware and software version information?()
    A

    show configuration

    B

    show environment

    C

    show inventory

    D

    show platform

    E

    show version


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.

    A.network B.virus C.security D.architecture


    正确答案:C

  • 第14题:

    What should be part of a comprehensive network security plan()。

    A.Allow users to develop their own approach to network security

    B.Physically secure network equipment from potential access by unauthorized individuals

    C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

    D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

    E.Minimize network overhead by deactivating automatic antivirus client updates


    参考答案:B

  • 第15题:

    Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

    A. network
    B. vims
    C. security
    D. architecture

    答案:C
    解析:
    计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。

  • 第16题:

    Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.

    A.network
    B.virus
    C.security
    D.architecture

    答案:C
    解析:

  • 第17题:

    The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    A.interact
    B.work
    C.connect
    D.change

    答案:A
    解析:
    计算机这个术语描述由电子的和机电的部件组合而成的一种设备。计算机本身没有只能,因此称为硬件,仅仅是物理设备。硬件只有和其他要素连接才能使用,所有这些要素即为构成基于计算机信息系统的六要素:硬件、软件、数据/信息、人、操作程序和通信。系统定义为一组相关组件的集合,这些组件相互交互以完成一个任务,以实现一个目标。任何使用信息技术的组织会拥有一个基于计算机的信息系统,给管理人员(和各类员工)提供适当类型的信息以帮助他们做出决策。系统分析和设计是确定系统如何工作然后经过一系列步骤以使其更好。通常,采用系统方法来定义、描述和解决一个问题或满足一个目标。随着时间推移,新的市场机会、政府规定的变化、新技术的出现、公司兼并以及其他方面的发展等,使得组织需要改变其信息系统。当需要改变时,应用系统分析与设计的时机已经成熟。

  • 第18题:

    Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

    A.complex
    B.unique
    C.catchy
    D.long

    答案:B
    解析:
    网络安全概念。

  • 第19题:

    If a technician needs to convert a hard drive from Basic to Dynamic, which of the following utilities would the technician use?()

    • A、Add Hardware Wizard
    • B、Device Manager
    • C、Computer Management
    • D、Disk Management

    正确答案:D

  • 第20题:

    which of the following actions will you not take before beginning installation or removal of anyNON-PNP hardware device inside the computer case?()

    • A、Place all the hardware components in static proof bags.
    • B、Remove all the jumpers from the motherboard.
    • C、Switch off the main power and remove the power cord
    • D、Use an anti-static wrist strap.
    • E、Turn off the computer.
    • F、Place the computer on the anti-static mat

    正确答案:B

  • 第21题:

    Which of the following software directly interacts with the hardware and handles hardware resource requests from virtual machines?()

    • A、 Guest OS
    • B、 Virtual Center
    • C、 VT
    • D、 Hypervisor

    正确答案:D

  • 第22题:

    You have a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to collect the following information from the Web server: Unauthorized attempts to upload filesUnsuccessful commands that try to run executables You must achieve this goal by using the minimum amount of administrative effort.  What should you do?()

    • A、From Network Monitor, start a capture.
    • B、From the Performance snap-in, create a counter log.
    • C、From Internet Information Services (IIS) Manager, enable logging.
    • D、From Computer Management, modify the properties of the application log.

    正确答案:C

  • 第23题:

    单选题
    Which of the following is NOT an advantage of computer newspapers?
    A

    They are cheaper than traditional newspapers.

    B

    They are very convenient to use.

    C

    You can get more information from them quickly.

    D

    You can easily save information for future use.


    正确答案: A
    解析:
    按照常识可知,传统意义的报纸肯定要比新型的电脑报纸便宜。而且选项B、C、D在文章中都有体现。所以根据常识就可以得到答案为A选项。

  • 第24题:

    单选题
    What should be part of a comprehensive network security plan()。
    A

    Allow users to develop their own approach to network security

    B

    Physically secure network equipment from potential access by unauthorized individuals

    C

    Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

    D

    Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

    E

    Minimize network overhead by deactivating automatic antivirus client updates


    正确答案: D
    解析: 暂无解析