Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()
A、The document is set to hidden.
B、The document is locked.
C、The document was saved as a system document.
D、The document is owned by the first user.
A customer reports that their newly purchased Windows Vista Home Premium notebook is unable tosee other computers in their home office. Which of the following is the MOST likely cause? ()
A、The Windows Defender service is turned on.
B、The Network Location Type is Work.
C、The Network Location Type is Private.
D、The Network Location Type is Public.
You need to change the hostname and IP address of a server. Without manually editing all of the required files, which command can be run to restore a system configuration to an unconfigured state, ready to be reconfigured again restore a system configuration to an unconfigured state, ready to be reconfigured again? ()
A、 /usr/sbin/sys-unconfig
B、 /usr/sbin/unconfig
C、 /sbin/ipconfig
D、 /usr/sbin/set_parms initial
Your company security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of theYour company? security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of the functionality in Solaris 10 to analyze your systems for available OS updates, and also download and install those updates from Sun Microsystems. Which answer describes how to utilize this functionality to analyze your systems for available OS updates, and also download and install those updates without connecting your server directly to the internet? ()
A、 A
B、 B
C、 C
D、 D
在计算机中,保存当前正在执行的指令的寄存器为(1),存放当前指令地址的寄存器叫(2)。在顺序执行指令的情况下(存储器按字节编址,指令字长32位),每执行一条指令,使程序计数器自动加(3)。算术逻辑运算的结果通常放在(4)中。空白(3)处应选择()
A、1
B、2
C、4
D、8
Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()
A、Installing antivirus
B、Reconfiguring the firewall
C、Changing the permissions and passwords
D、Educating the end user