itgle.com

put computers to practical business use, but below the surface it is the heart of an(22) - the kernel - that provides the technical wizardry to juggle multiple programs, connect to networks and store(23).A traditional kernel provides all the functions for

题目

put computers to practical business use, but below the surface it is the heart of an(22) - the kernel - that provides the technical wizardry to juggle multiple programs, connect to networks and store(23).A traditional kernel provides all the functions for applications. The kernel(24) memory, I/O devices and parcels out processor time.The kernel also supports(25) and fault tolerance, which is the ability to recover automatically when parts of the system fail.

A.Databases

B.Applications

C.Drivers

D.Games


相似考题
参考答案和解析
正确答案:B
更多“put computers to practical business use, but below the surface it is the heart of an(2 ”相关问题
  • 第1题:

    从供选择的答案中选出应填入英语文句中()的正确的答案。

    Applications put computers to practical business (A), but below the (B) it's the heart of an operating system the kernel that provides the technical wizardry to juggle multiple program, connect to networks and store (C) .

    A traditional kernel provides all the functions for applications. The kernel (D) memory, I/O devices and parcels out processor time.

    The kernel also supports security and fault (E), which is the ability to recover automatically when parts of the system fail.

    A: ① used ② use ③ apply ④ applied

    B: ① earth ② bottom ③ table ④ surface

    C: ① graphics ② data ③ text ④ image

    D: ① manages ② manage ③ managed ④ managing

    E: ① error ② question ③ tolerance ④ problem


    正确答案:A: ② B: ④ C: ② D: ① E: ③
    A: ② B: ④ C: ② D: ① E: ③

  • 第2题:

    Which of the items below is not a business organization.( )

    A.proprietorship

    B.partnership

    C.entrepreneurship

    D.corporation


    正确答案:C

  • 第3题:

    Applications put computers to pratical business (1), but below the (2) it's the heart of an operating system—the kernel that provides the technical wizardry to juggle multiple program, connect to networks and store (3) . A traditional kernal provides all the functions for applications. The kemal (4) memory, I/O devices and parcels out processor time.

    The kernel also supports security and fault (5) , which is the ablity to recover automatically when parts of the system fail.

    A.used

    B.use

    C.apply

    D.applied


    正确答案:B

  • 第4题:

    ______ such circumstances I usually put the remarks IN DISPUTE.

    A.At

    B.On

    C.Under

    D.Below


    正确答案:C

  • 第5题:

    ______ is a type of fog occurring close to the sea surface when the air is dry and cold-probably at least 9℃ below the sea surface temperature.

    A.MIXING FOG

    B.ADVECTION FOG

    C.RADIATION FOG

    D.ARCTIC SEA SMOKE


    正确答案:D

  • 第6题:

    A college has a small campus where 25 faculty members are located. The faculty offices and student computers are currently on the same network. The faculty are concerned about students being able to capture packets going across the network and obtain sensitive material. What could a network administrator do to protect faculty network traffic from student connections?()

    • A、Install anti-virus software on the student computers.
    • B、Put the faculty computers in a separate VLAN.
    • C、Power down the switches that connect to faculty computers when they are not in use.
    • D、Remove the student computers from the network and put them on a peer-to-peer network.
    • E、Create an access list that blocks the students from the Internet where the hacking tolls are located.

    正确答案:B

  • 第7题:

    Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()

    • A、 Use the Key Management Service (KMS) for all the computers.
    • B、 Use Multiple Activation Key (MAK) Independent for all the computers.
    • C、 Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.
    • D、 Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.

    正确答案:A

  • 第8题:

    You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()

    • A、Configure the HTTP virtual server on the Exchange front-end server to require a secure connection. Instruct the sales personnel to use Microsoft Outlook Web Access to connect to the Exchange front-end server
    • B、Configure the back-end Exchange servers to use static ports for RPC connections. Open the required ports on the firewall. Install Microsoft Outlook 2003 on the portable computers and configure it to connect to the Exchange back-end server using a MAPI connection
    • C、Configure the Exchange front-end server to require secure connections from IMAP4 client computers. Install Microsoft Outlook 2003 on the portable computers and configure it to use a secure IMAP4 connection
    • D、Configure the Exchange servers to support RPC over HTTPS. Install Microsoft outlook 2003 on the portable computers and configure it to use RPC over HTTPS

    正确答案:D

  • 第9题:

    问答题
    Practice 7  An invisible border divides those arguing for computers in the classroom on the behalf of students’ career prospects and those arguing for computers in the classroom for broader reasons of radical educational reform. Very few writers on the subject have explored this distinction, in deed, contradiction, which goes to the heart of what is wrong with the campaign to put computers in the classroom.  An education that aims at getting a student a certain kind of job is a technical education, justified for reasons radically different from why education is universally required by law. It is not simply to raise everyone’s job prospects that all children are legally required to attend school into their teens.

    正确答案:
    【参考译文】
    对于计算机课堂教学,在看法的争论上存在着一条无形的界限:有人提倡以此增加学生的就业前景,有人则希望以此达到从根本上改革教育的目的。很少有人撰文提示这一区别——或者更确切地说是矛盾,这恰恰是计算机课堂教学这一运动的核心问题。
    为使学生获得某种工作的教育是职业教育,设立这种教育的目的与法律规定的人人都要受教育的目的全然不同。法律要求所有孩子十几岁前接受教育的目的并不单纯是为了增加他们的就业前景。
    解析: 暂无解析

  • 第10题:

    单选题
    You need to design a patch management strategy that meets business requirements. What should you do?()
    A

    Install Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domain

    B

    Install Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domain

    C

    Install Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers daily

    D

    Install Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    When an oil fire has been extinguished, the surface of the oil should be kept covered with foam to prevent ().
    A

    air from contacting the oil vapors

    B

    permitting re-ignition boiling of the heated oil

    C

    spontaneous combustion below the oil surface

    D

    toxic fumes from escaping to the surface


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()
    A

     Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.

    B

     Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.

    C

     Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.

    D

     Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    For what purpose are the diving pipes used?

    A. To absorb heat from the sun.

    B. To store heat for future use.

    C. To turn solar energy into heat energy.

    D. To carry heat down below the surface.


    正确答案:D

  • 第14题:

    Because the article falls ________ the scope of our business activities, we are writing to you in the hope of ________ trade relations with you.

    A、within; establishment

    B、within; establishing

    C、below; set up

    D、below; setting up


    正确答案:B

  • 第15题:

    Applications put computers to practical business(67), but below the(68)it's the heart of an operating system-the kernel-that provides the technical wizardry to juggle multiple program, connect to networks and store(69).

    A traditional kernel provides all the functions for applications. The kernel(70)memory, I/0 devices and parcels out processor time.

    The kernel also supports security and fault(71), which is the ability to recover automatically when parts of the system fail.

    A.used

    B.use

    C.apply

    D.applied


    正确答案:B
    解析:计算机被应用到实际的商业用途中,但在它的内部是一个操作系统的核心,它提供了多重程序技术,并且连接网络,储存数据。一个传统的核心提供应用程序的所有功能,它处理记忆功能,输入/输出设备,并分配处理器的时间。这个核心支持安全和容错能力,当系统部分失灵时能够自动恢复。

  • 第16题:

    When referring to quantity of barite in a P-tank,ullage is the ______.

    A.Distance of the barite surface above the tank bottom

    B.Percentage of barite in the tank

    C.Distance of the barite surface below the tank cover

    D.Total weight of barite in UPC(ullages per centimeter)


    正确答案:C

  • 第17题:

    As ___, I think business English is more practical than other courses.

    A.an International Business student major
    B.an International Business major
    C.a International Business student major
    D.an International Business major student

    答案:D
    解析:
    本题考形容词作定语。题目意为“作为一名国际商务专业学生,我认为商务英语比其它课程更加实用。”多个形容词作定语的顺序是:1限:限定词。the, my, a, this…
      2描:描绘性形容词。brave, beautiful, lovely, nice…
      3大:大小、高低、长短等形容词。big,large,small…
      4形:形状。round,square…
      5龄:年龄大小、新旧、年代等。young,old,new…
      6颜:颜色。red,blue,green…
      7籍:国籍、地区、出处。Chinese,America,Japanese…
      8物:物质材料的形容词。golden,wooden,wax…
      9类:表示类别、用途。medical,chemical,writing…
      

  • 第18题:

    What is the LEAST appropriate scenario for Web services?()

    • A、 To integrate legacy systems
    • B、 To propagate security context
    • C、 To expose fine grained operations
    • D、 To use with process choreography
    • E、 For B2B (business to business) applications

    正确答案:C

  • 第19题:

    Your network has 1,000 client computers that run Windows 7.   You plan to deploy a new application.   You need to ensure that the application deploys only during non-business hours.   What should you do?()

    • A、Use Group Policy.
    • B、Use Windows Deployment Services with a schedule cast.
    • C、Use Microsoft System Center Configuration Manager.
    • D、Use a logon script.

    正确答案:C

  • 第20题:

    单选题
    Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()
    A

     Use the Key Management Service (KMS) for all the computers.

    B

     Use Multiple Activation Key (MAK) Independent for all the computers.

    C

     Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.

    D

     Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()
    A

    Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt files

    B

    Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt files

    C

    Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

    D

    Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk.  Computers in all three types of location use the same hardware.   Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security.   Branch office computers must use BitLocker Drive Encryption.   You have the following requirements:Create deployment images. Minimize image maintenance.   You need to define an image-creation strategy that meets the requirements.   What should you do?()
    A

    Create a single image to use for the main office computers and the branch office computers, and apply the requiredsettings through Group Policy. Create a separate image to use for the kiosk computers.

    B

    Create one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image.

    C

    Create a single image to use for all location types. Create a custom Windows security template for each location type.

    D

    Create a single image to use for the branch office computers and the kiosk computers.Create a separate image to use for the main office computers.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    ()is a type of fog occurring close to the sea surface when the air is dry and cold-probably at least 9℃ below the sea surface temperature.
    A

    MIXING FOG

    B

    ADVECTION FOG

    C

    RADIATION FOG

    D

    ARCTIC SEA SMOKE


    正确答案: D
    解析: 暂无解析