-
In which area of the campus LAN are the user computers attached to the network?()
A . core
B . access
C . distribution
D . aggregatio
-
You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements. How should you configure the computer?()
A . As a caching-only DNS servers
B . As the primary DNS server for the fourthcoffee.com DNS zone
C . With a stub zone for the fourthcoffee.com DNS zone hosted by the ISP
D . As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP
-
You are designing a strategy for configuring a newly installed Windows Server 2003 computer to meet the Active Directory DNS requirements. How should you configure the computer?()
A . As a caching-only DNS servers
B . As the primary DNS server for the fourthcoffee.com DNS zone
C . With a stub zone for the fourthcoffee.com DNS zone hosted by the ISP
D . As a secondary DNS server for the fourthcoffee.com DNS zone hosted by the ISP&e
-
You are designing a client computer upgrade strategy for Contoso.Ltd. What should you do?()
A . Use the ldifde command to migrate user settings.
B . Use the User State Migration Tool (USMT) to Migrate user settings.
C . Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
D . Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
-
Which of the following are three areas that favor IBMs position in Web2.0 computing?()
A . Acquisition cost, speed and density
B . High performance processors, cooling and reliability
C . Power, cooling and density
D . Acquisition cost, density and reliability
-
In a Cisco Unified Computing System, where are SAN port channels connected to?()
A . Only to Cisco Fibre Channel switches
B . Only to Cisco Fibre Channel switches in NPIV mode
C . To any Fibre Channel switch
D . Directly to storage arrays
E . Only to Nexus Switche
-
Today there are ()computers in our homes and offices than there are people who live and work in them.
A . less
B . more
C . little
D . lotsof
-
On a Cisco Unified Computing System (UCS), which two statements regarding Ethanalyzer are true?()
A . Interface inbound-low handles Rx and Tx of low-priority control packet
B . Interface inbound-lo handles Rx and Tx of high-priority control packet
C . Interface inbound-low maps to internal interface eth3
D . Interface inbound-low maps to internal interface eth4
-
You are designing a client computer upgrade strategy for Contoso.Ltd. What should you do?()
A . Use the ldifde command to migrate user settings.
B . Use the User State Migration Tool (USMT) to Migrate user settings.
C . Create trust relationships between the Chicago domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
D . Create trust relationships between the forest root domain and the San Francisco domain. Use the Active Directory Migration Tool (ADMT) to migrate user settings.
-
You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You needto configure Computer1 so that only Administrators are authorized to shut down the computer. What should you do?()
A . From User Accounts, modify the user profiles settings.
B . From User Accounts, modify the User Account Control (UAC) settings.
C . From the local computer policy, modify the Security Options.
D . From the local computer policy, modify the User Rights Assignment.
-
What are the two kinds of software in a computer according to the video?
-
Jonathan Hee and Michael Tran attend different high schools and so are indifferent computer programs.
-
Two advances in computer technology in the 1980s made 8 bit, 32 bit and 64 bit machines have more computing power than a decent-sized mainframe.
-
Recent advances are described______the computer system for high production application.
A.how to improve
B.about improving
C.which improve
D.as improving
-
Like personal computers,most workstations are(72) computers.A.single-userB.single userC.mu
Like personal computers,most workstations are(72) computers.
A.single-user
B.single user
C.multi-user
D.multi user
-
Today, several advances in computer network technology are helping companies to extend the use of computers to the procurement, production and distribution processes.
-
Today, computers are still inferior to man in terms of______.
A.decision making
B.drives and feelings
C.growth of reasoning power
D.information absorption
-
What are the two main problems about the computer center?[Clink on 2 answers. ]
A.So many students have to finish their homework on computers.
B.The computer center is closed so early.
C.There are so few computers, and they are always broken.
D.Very few students come back.
此题为多项选择题。
-
In resent years,computers are being made________.
A.1arger and more,expensive
B.smaller and cheaper
C.more hard to use
D.to work more slowly
-
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.
Your company has two domains cohovineyard.com and westcoastsales.com.
The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0
You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.
What should you do?
A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.
B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.
C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.
D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.
-
The purposes for several users to share a mainframe are ______.
A.to divide the cost of the equipment among them
B.to utilize the equipment to the maximum extent
C.to produce fewer PCs
D.both A and B
-
Computers have aided in the study of humanities for almost as long as the machines have existed. Decades ago, when the technology consisted solely of massive, number-crunching mainframe. computers, the chief liberal arts applications were in compiling statistical indexes of works of literature. In 1964, IBM held a conference on computers and the humanities where, according to a 1985 article in the journal Science, "most of the conferees were using compeers to compile concordances, which are alphabetical indices used in literary research."
Mainframe. computers helped greatly in the highly laborious task, which dates back to the Renaissance, of cataloging each reference of a particular word in a particular work. Concordances help scholars scrutinize important texts for patterns and meaning. Other humanities applications for computers in this early era of technology included compiling dictionaries, especially for forei8n or antiquated languages, and cataloging library collections.
Such types of computer usage in the humanities may seem limited at first, but they have produced some interesting re suits in the last few years and promise to continue to do so. As computer use and access have grown, so has the number of digitized texts of classic literary works.
The computer-hosed study of literary texts has established its own niche in academia. Donald Foster, an English professor at Vassar College in Poughkeepsie, New York, is one of the leaders in textual scholarship. In the late 1980s Foster created SHAXICON, a database that tracks all the "rare" words used by English playwright William Shakespeare. Each of these words appears in any individual Shakespeare play no more than 12 times. The words can then be cross-referenced with some 2,000 other poetic texts, allowing experienced researchers to explore when they were written, who wrote them, how the author was influenced by the works of other writers, and how the texts changed as they were reproduced over the centuries.
In late 1995 Foster’s work attracted widespread notice when he claimed that Shakespeare was the anonymous author of an obscure 578-1ine poem, A Funeral Elegy (1612). Although experts had made similar claims for other works in the past, Foster gained the backing of a number of prominent scholars because of his computer-based approach. If Foster’s claim holds up to long-term judgment, the poem will be one of the few additions to the Shakespearean canon in the last 100 years.
Foster’s work gained further public acclaim and validation when he was asked to help identify the anonymous author of the heat-selling political novel Primary Colors (1996). After using his computer program to compare the stylistic traits of various writers with those in the novel, Foster tabbed journalist Joe Klein as the author. Soon after, Klein admitted that he was the author. Foster was also employed as an expert in the case of the notorious Unabomber, a terrorist who published an anonymous manifesto in several major newspapers in 1995.
Foster is just one scholar who has noted the coming of the digital age and what it means for traditional fields such as literature. "For traditional learning and humanistic scholarship to be preserved, it, too, must be digitized," he wrote in a scholarly paper. "The future success of literary scholarship depends on our ability to integrate those electronic texts with our ongoing work as scholars and teachers, and to exploit fully the advantages offered by the new medium."
Foster noted that people can now study Shakespeare via Internet Shakespeare Editions, using the computer to compare alternate wordings in different versions and to consult editorial footnotes, literary criticism, stage history, explanatory graphics, video clips, theater reviews, and archival records. Novelist and literary journalist Gregory Feeley noted that "the simplest (and least radic
A.computers have not been very helpful in humanities study until recently
B.computers were widely used in all kinds of literary texts very long ago
C.computers were invented by International Business Machines Corporation
D.computers began to be used for literary study as soon as they were invented
-
Cloud computing is a style of computing in which dynamically scalabled of ten(72)resources are provided as a service over the internet.
A.real
B. fixed
C. actual
D. virtualized
-
You are logged on as the administrator of your new computer, which runs Windows NT wor
A.Directory Replication
B.Workstation
C.Netlogon
D.Server