itgle.com
更多“Computer( )focuses on protecting information ,hardware ,and software from unauthorized us ”相关问题
  • 第1题:

    Which of the following software directly interacts with the hardware and handles hardware resource requests from virtual machines?()

    A. Guest OS

    B. Virtual Center

    C. VT

    D. Hypervisor


    参考答案:D

  • 第2题:

    In software engineering the design phase is divided into( )。

    A.system design and detailed designB.computer design and program designC.system design and hardware designD.computer design and detailed design


    正确答案:A

  • 第3题:

    Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.

    A.network B.virus C.security D.architecture


    正确答案:C

  • 第4题:

    Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

    A. network
    B. vims
    C. security
    D. architecture

    答案:C
    解析:
    计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。

  • 第5题:

    Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.

    A.network
    B.virus
    C.security
    D.architecture

    答案:C
    解析:

  • 第6题:

    The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.

    A system is defined as a collection of related components that ( ) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.
    Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )
    From time to time, organizations need to (5 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    (5)应选( )。



    A. modify
    B. replace
    C. Change
    D. transfer

    答案:C
    解析:
    翻译:

    计算机这个术语描述由电子的和机电的部件组合而成的一种设备。计算机本身没有只能,因此称为硬件,仅仅是物理设备。硬件只有和其他要素连接才能使用,所有这些要素即为构成基于计算机信息系统的六要素:硬件、软件、数据/信息、人、操作程序和通信。
    系统定义为一组相关组件的集合,这些组件相互交互以完成一个任务,以实现一个目标。任何使用信息技术的组织会拥有一个基于计算机的信息系统,给管理人员(和各类员工)提供适当类型的信息以帮助他们做出决策。

    系统分析和设计是确定系统如何工作然后经过一系列步骤以使其更好。通常,采用系统方法来定义、描述和解决一个问题或满足一个目标。

    随着时间推移,新的市场机会、政府规定的变化、新技术的出现、公司兼并以及其他方面的发展等,使得组织需要改变其信息系统。当需要改变时,应用系统分析与设计的时机已经成熟。

  • 第7题:

    The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( 1) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.
    A system is defined as a collection of related components that ( 72) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.
    Systems analysis and design is to ascertain how a system works and then take steps to make it (73 ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( 74)
    From time to time, organizations need to (75 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    (1)应选( )。




    A. information
    B. software
    C. intelligence
    D. Data

    答案:C
    解析:
    翻译:

    计算机这个术语描述由电子的和机电的部件组合而成的一种设备。计算机本身没有只能,因此称为硬件,仅仅是物理设备。硬件只有和其他要素连接才能使用,所有这些要素即为构成基于计算机信息系统的六要素:硬件、软件、数据/信息、人、操作程序和通信。
    系统定义为一组相关组件的集合,这些组件相互交互以完成一个任务,以实现一个目标。任何使用信息技术的组织会拥有一个基于计算机的信息系统,给管理人员(和各类员工)提供适当类型的信息以帮助他们做出决策。

    系统分析和设计是确定系统如何工作然后经过一系列步骤以使其更好。通常,采用系统方法来定义、描述和解决一个问题或满足一个目标。

    随着时间推移,新的市场机会、政府规定的变化、新技术的出现、公司兼并以及其他方面的发展等,使得组织需要改变其信息系统。当需要改变时,应用系统分析与设计的时机已经成熟。

  • 第8题:

    In software engineering the design phase is divided into ( ).

    A.system design and detailed design
    B.computer design and program design
    C.system design and hardware design
    D.computer design and detailed design

    答案:A
    解析:
    翻译:

    在软件工程中设计阶段可以分为( )。

    A. 系统设计与详细设计 B. 计算机设计与程序设计

    C. 系统设计与硬件设计 D. 计算机设计与详细设计

  • 第9题:

    Which command shows system hardware and software version information?()

    • A、show configuration
    • B、show environment
    • C、show inventory
    • D、show platform
    • E、show version

    正确答案:E

  • 第10题:

    You have a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to collect the following information from the Web server:  (1)Unauthorized attempts to upload files  (2)Unsuccessful commands that try to run executables  You must achieve this goal by using the minimum amount of administrative effort.What should you do?()

    • A、From Network Monitor, start a capture.
    • B、From the Performance snap-in, create a counter log.
    • C、From Internet Information Services (IIS) Manager, enable logging.
    • D、From Computer Management, modify the properties of the application log.

    正确答案:C

  • 第11题:

    You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()

    • A、From Reliability Monitor, review the informational events.
    • B、From System Information, review the Software Environment.
    • C、From Performance Monitor, review the System Diagnostics Report.
    • D、From Performance Monitor, run the System Performance Data Collector Set.

    正确答案:A

  • 第12题:

    单选题
    Which of the following software directly interacts with the hardware and handles hardware resource requests from virtual machines?()
    A

     Guest OS

    B

     Virtual Center

    C

     VT

    D

     Hypervisor


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You install Microsoft Windows Vista on a computer. You will share the computer with another user. You need to prvent the user from making unauthorized changes to the computer.What should you do?()

    A.A

    B.B

    C.C

    D.D


    参考答案:B

  • 第14题:

    The term computer describes a device made up of a combination of electronic and electromechanical components. By itself, a computer has no( )and is referred to as hardware, which means simply the physical equipment. The hardware can&39;t be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system, hardware, software, data/information, people, procedures and communications. A system is defined as a collection of related components that( )to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees) with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( )Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to( )their information systems, in, response to new marketing&39; opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    A.information B.software C.intelligence D.dataA.interact B.work C.connect D.changeA.improved B.better C.good D.bestA.decision B.need C.standard D.objectiveA.modify B.replace C.changeD.transfer


    正确答案:C,A,B,D,C

  • 第15题:

    Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

    A.network
    B.vims
    C.security
    D.architecture

    答案:C
    解析:
    计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。

  • 第16题:

    Information( )means protecting information and information systems from unauthorized acces,use, disclosure, disruption, modification, or destruction.

    A.integrity
    B.availability
    C.security
    D.consistency

    答案:C
    解析:

  • 第17题:

    In computing,a device driver(commonly referred to as simply a driver)is acomputer program that operates or controls a particular type of device that is attached to a computer.A driver provides______to hardware devices,enabling operating systems and other computer programs to access hardware functions without needing to know precise details of the hardware being used。

    A.a software interface
    B.a programming language
    C.a function
    D.an Internal Bus

    答案:A
    解析:

  • 第18题:

    The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    A.interact
    B.work
    C.connect
    D.change

    答案:A
    解析:
    计算机这个术语描述由电子的和机电的部件组合而成的一种设备。计算机本身没有只能,因此称为硬件,仅仅是物理设备。硬件只有和其他要素连接才能使用,所有这些要素即为构成基于计算机信息系统的六要素:硬件、软件、数据/信息、人、操作程序和通信。系统定义为一组相关组件的集合,这些组件相互交互以完成一个任务,以实现一个目标。任何使用信息技术的组织会拥有一个基于计算机的信息系统,给管理人员(和各类员工)提供适当类型的信息以帮助他们做出决策。系统分析和设计是确定系统如何工作然后经过一系列步骤以使其更好。通常,采用系统方法来定义、描述和解决一个问题或满足一个目标。随着时间推移,新的市场机会、政府规定的变化、新技术的出现、公司兼并以及其他方面的发展等,使得组织需要改变其信息系统。当需要改变时,应用系统分析与设计的时机已经成熟。

  • 第19题:

    Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

    A.complex
    B.unique
    C.catchy
    D.long

    答案:B
    解析:
    网络安全概念。

  • 第20题:

    Where will an administrator find documents in PDFformat that include detailed architecture and step-by-step installation instructions for Power servers?()

    • A、AIX Fix Central
    • B、IBM Developer Works
    • C、IBM Systems Software Information Center
    • D、IBM Systems Hardware Information Center

    正确答案:D

  • 第21题:

    Which of the following software directly interacts with the hardware and handles hardware resource requests from virtual machines?()

    • A、 Guest OS
    • B、 Virtual Center
    • C、 VT
    • D、 Hypervisor

    正确答案:D

  • 第22题:

    You have a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to collect the following information from the Web server: Unauthorized attempts to upload filesUnsuccessful commands that try to run executables You must achieve this goal by using the minimum amount of administrative effort.  What should you do?()

    • A、From Network Monitor, start a capture.
    • B、From the Performance snap-in, create a counter log.
    • C、From Internet Information Services (IIS) Manager, enable logging.
    • D、From Computer Management, modify the properties of the application log.

    正确答案:C

  • 第23题:

    单选题
    Which command shows system hardware and software version information?()
    A

    show configuration

    B

    show environment

    C

    show inventory

    D

    show platform

    E

    show version


    正确答案: D
    解析: 暂无解析