1. [多选题]计算机指令一般包括操作码和地址码两部分,为分析执行一条指令,其 (1)
A. 操作码应存入指令寄存器(IR),地址码应存入程序计数器(PC.。
B. 操作码应存入程序计数器(PC.,地址码应存入指令寄存器(IR)。
C. 操作码和地址码都应存入指令寄存器。
D. 操作码和地址码都应存入程序计数器
E. 求解析。
2. [单选题]You have 17GB of private files on drive D on your Windows 2000 Professional computer. You have shared the files as private_files. You do not want other users to see this share name in the browse list.You want all other share names to continue to appear in the browser list.What should you do?
A. Stop the computer browser service, and disable the startup state.
B. Change the comment for the share to hidden:Yes
C. Change the share name to private_files$.
D. Add a hidden entry to the HKLMSystem\currentcontrolset\services\larmanserver\shares\private_files registry value entry.
3. [单选题]You copy the contents of the Windows 2000 Professional CD to a shared network folder named \\Server1\Win2000p. You use the shared folder to perform. over-the-network installations of Windows 2000 Professional on new computers purchased by your company.You receive a Windows 2000 Service Pack CD. You apply the Service Pack to Server1 and to the \\Server1\Win2000p folder.
A. You discover that the Service Pack contains several files that are incompatible with the new computers.
B. You want to make sure that the Service Pack files are not installed on any new computers until the problem has been corrected. What can you do?
C. Use Update.exe from the Service Pack CD on server1.
D. Select the Uninstall option.
E. Copy the contents of the Windows 2000 Professional CD to \\Server1\Win2000p again, allowing the operating system to overwrite newer files while copying.
F. Run\\Server1\Win2000p\WinNT32.exe/uon the new computer.
G. RunUpdate.exe/s:\\Server1\Win2000p/ufrom the Service Pack CD on Server1.
4. [单选题]You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000 database at the corporate headquarters.A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a key value to each transformed sales record.
A. After loading this month's sales data, you discover that a portion of the data contains errors. You stop loading data, identify the problem records, and delete those records from the database.
B. You want to reuse the key values that were assigned to the records that you deleted. You want to assign the deleted key values to the next sales records you load. You also want to disrupt users' work as little as possible.
C. What should you do?
D. Export all records from the Sales table to a temporary table. Truncate the Sales table, and then reload the records from the temporary table.
E. Export all records from the Sales table to a text file. Drop the Sales table, and then reload the records from the text file.
F. Use the DBCC CHECKIDENT statement to reseed the Sales table's IDENTITY property.
G. Set the Sales table's IDENTITY_INSERT property to ON. Add new sales records that have the desired key values.
5. [单选题]You are upgrading a computer from Windows 98 to Windows 2000 Professional. The computer is a 400-Mhz Pentium III, and has 128 MB of RAM and a 10-GB hard disk. You are performing the installation by using the Windows 2000 Professional CD-ROM. After the text mode installation portion is complete, you restart the computer. The BIOS virus checker on your computer indicates you're your computer is infected with a Master Boot Record virus.What should you do before you continue the installation?
A. Remove the virus checker in Windows 98.
B. Disable the BIOS virus checker and restart the computer.
C. Run Fixmbr.Exe from the Windows 2000 Professional CD-ROM.
D. Modify the Boot.ini file to include a signature parameter on the ARC path of the system partition.
6. [多选题]You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only.You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.
A. What should you do? (Choose all that apply)
B. Map a network drive to the AccSecured\intern folder from Richard's computer.
C. Map a network drive to the AccSecured shared folder from Richard's computer.
D. Allow the intern user account modify permissions on the intern subfolder.
E. Allow the intern user account traverse folder/execute file permission on the AccSecured folder.
F. Allow the intern user account list folder content permission on the AccSecured folder. Remove read extended attributes and read permissions.
7. [单选题]You are the administrator of your company's network. A user named Paul in the service department has a Windows 2000 Professional computer. Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.What should you do?
A. Grant Paul NTFS permission so that he can access any parent folder to files in the shared folder.
B. Share the Sales folder and grant Paul shared folder permission to access the shared Sales folder.
C. Remove Paul from any other group that has been explicitly denied access to the Sales folder.
D. Delete the Sales local group and recreate it. Add individual user accounts from the Sales department back into Sales local group.
8. [单选题]Ezonexam has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each office has a network of between five and 20 client computers. The office networks are connected to each other. The company is buying 50 identical computers to run Windows 2000 Server in these offices. The server must be installed to the company's standard configuration. You use Setup Manager to create a network shared distribution folder and a Unattend.txt file that specifies the company's standard configuration.You want to automate the installation process as much as possible, in the least possible amount of time.
A. What should you do?
B. Run Makebt32.exe to create four installation startup disks and add the Unattend.txt file to the first disk. Instruct an employee at each office to start the installation by using these disks.
C. Create a Microsoft MS-DOS network boot disk that makes a connection to the network shared distribution folder and runs the winnt command with the /s and /u switches. Instruct an employee at each office to start the installation by using this disk.
D. Create a floppy disk that contains only the Unattend.txt file. Instruct an employee at each office to start the installation by using the Windows 2000 Server compact disc, with the floppy disk inserted.
E. Create a Windows 2000 folder on a hard disk. Copy the Windows 2000 Server compact disc to the folder. Add the Unattend.txt file to the folder. Copy the folder to a writeable C Instruct an employee at each office to start the installation by suing this C
9. [单选题]From your Windows 2000 Professional computer, you need to map drive G to the default administrative share on drive C of a server named AppSrv.What can you do to map the drive?
A. Run thenet share C$=G:\command.
B. Run thenet use G: \\AppSrv\C$command.
C. Browse to AppSrv in Windows Explorer, and map drive G to the C$ share.
D. Browse to AppSrv in My Network Places, and map drive G to the C$ share.
10. [单选题]You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?
A. Configure an ADM template and add the template to the GPO.
B. Configure an INF policy and add the policy to the GPO.
C. Configure a Microsoft Windows installer package and add the package to the GPO.
D. Configure RIS to include the registry entry.