[多选题]计算机指令一般包括操作码和地址码两部分,为分析执行一条指令,其 (1)
正确答案 :CD
操作码和地址码都应存入指令寄存器。
操作码和地址码都应存入程序计数器
解析:答案:(1)C
试题解析:
指令寄存器(IR)用来保存当前正在执行的一条指令。当执行一条指令时,先把它从内存取到数据寄存器(DR)中,然后再传送至IR。指令划分为操作码和地址码字段,由二进制数字组成。为了执行任何给定的指令,必须对操作码进行测试,以便识别所要求的操作。指令译码器就是做这项工作的。指令寄存器中操作码字段的输出就是指令译码器的输入。操作码一经译码后,即可向操作控制器发出具体操作的特定信号。
[单选题]You have 17GB of private files on drive D on your Windows 2000 Professional computer. You have shared the files as private_files. You do not want other users to see this share name in the browse list.You want all other share names to continue to appear in the browser list.What should you do?
正确答案 :C
Change the share name to private_files$.
解析:解析:Explanation: By appending a dollar sign to the end of the share name, the share is hidden and the folder will not be shown in any browse list. Only users who know the folder name can gain access to it if they also possess the proper permissions to it.
[单选题]You copy the contents of the Windows 2000 Professional CD to a shared network folder named \\Server1\Win2000p. You use the shared folder to perform. over-the-network installations of Windows 2000 Professional on new computers purchased by your company.You receive a Windows 2000 Service Pack CD. You apply the Service Pack to Server1 and to the \\Server1\Win2000p folder.
正确答案 :D
Select the Uninstall option.
解析:解析:Explanation: The service pack that has been applied, or slipstreamed, to the installation files and cannot be unapplied. You thus have to replace the installation files in the network share with the original Windows 2000 installation files.
[单选题]You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000 database at the corporate headquarters.A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a key value to each transformed sales record.
正确答案 :F
Use the DBCC CHECKIDENT statement to reseed the Sales table's IDENTITY property.
解析:解析:Explanation: DBCC CHECKIDENT is used to check the current identity value for the specified table. It can be set to correct the identity value by specifying the RESEED option with DBCC CHECKIDENT.
[单选题]You are upgrading a computer from Windows 98 to Windows 2000 Professional. The computer is a 400-Mhz Pentium III, and has 128 MB of RAM and a 10-GB hard disk. You are performing the installation by using the Windows 2000 Professional CD-ROM. After the text mode installation portion is complete, you restart the computer. The BIOS virus checker on your computer indicates you're your computer is infected with a Master Boot Record virus.What should you do before you continue the installation?
正确答案 :B
Disable the BIOS virus checker and restart the computer.
解析:解析:Explanation: During the installation of Windows 2000, the setup program must make changes the boot sector. The BIOS virus checker interprets changes made to the boot sector as the result of a virus and prevents the computer from booting any further. You must therefore disable the BIOS virus checker.
[多选题]You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only.You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.
正确答案 :DE
Allow the intern user account modify permissions on the intern subfolder.
Allow the intern user account traverse folder/execute file permission on the AccSecured folder.
解析:解析:Explanation: The traverse folder/execute file permission" enables Richard to traverse the AccSecured folder to reach the intern folder, while the modify permissions on the intern folder allow Richard to modify information in the intern subfolder.
[单选题]You are the administrator of your company's network. A user named Paul in the service department has a Windows 2000 Professional computer. Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.What should you do?
正确答案 :C
Remove Paul from any other group that has been explicitly denied access to the Sales folder.
解析:解析:Explanation: The Sales group, which Paul is a member of, has permission to access the files. However, Paul still cannot access the files. It would seem that Paul has a permissions conflict. A user can be granted file permissions in a number of contexts: as a user or as a member of a user group. When a user has different file permissions in multiple contexts, the most restrictive permission is applied. Furthermore, the deny permission overrides all other permissions. As Paul does not have access to the file you must therefore assume Paul has explicitly been denied access to the file in some context, as member of one or more groups that have been denied access to the file. You would thus have to remove Paul from such a group so that the restriction is not applied to Paul.
[单选题]Ezonexam has 50 offices. The employees in these offices have limited knowledge of Windows 2000. Each office has a network of between five and 20 client computers. The office networks are connected to each other. The company is buying 50 identical computers to run Windows 2000 Server in these offices. The server must be installed to the company's standard configuration. You use Setup Manager to create a network shared distribution folder and a Unattend.txt file that specifies the company's standard configuration.You want to automate the installation process as much as possible, in the least possible amount of time.
正确答案 :C
Create a Microsoft MS-DOS network boot disk that makes a connection to the network shared distribution folder and runs the winnt command with the /s and /u switches. Instruct an employee at each office to start the installation by using this disk.
解析:解析:Explanation:Winntandnotwinnt32asthebootdisksoperateinDOSmodeandworkswith16-bitapplications.The/s:pathswitchspecifiesthelocationoftheinstallationfilesforWindows2000Server.The/u:fileswitchspecifiesthelocationoftheanswerfileforunattendedinstallationsandthenumberofsecondstowaitbetweencopyingthefilesandrestartingthecomputer.SincetheemployeeshavelimitedknowledgeinsofarasWindows2000isconcerned,itwouldbebesttomakeuseofthewinntcommand-linewiththeabovementionedswitches.Incorrectanswers:A:ThisoptionpresupposesthattheemployeeswhowillbetaskedwiththeinstallationhaveasoundknowledgeofWindows2000.C,D:ThisoptionwouldbeproblematicsincetheemployeeshavelimitedknowledgewhenitcomestoWindows2000.
[单选题]From your Windows 2000 Professional computer, you need to map drive G to the default administrative share on drive C of a server named AppSrv.What can you do to map the drive?
正确答案 :B
Run thenet use G: \\AppSrv\C$command.
解析:解析:Explanation:Therootofeachvolumeonaharddiskisautomaticallyshared,andthesharenameisthedriveletterappendedwithadollarsign($).Theappendeddollarsigncausesthesharetobehidden.Onemethodofmappingasharetoalogicaldriveistoopenthecommandpromptandtypethecommand:NETUSEdevicename:\\computername\sharename.Inthisscenario,thecommandtranslatestothecommand:netuseG:\\AppSrv\C$IncorrectAnswers:A:Thenetsharecommandisusedtocreatesharesnottoconnecttoexistingsharesonothercomputersinthenetwork.C:ItisnotpossibletobrowsetotheadministrativeshareC$onAppSrvsincethisisahiddenshare.D:ItisnotpossibletobrowsetotheadministrativeshareC$onAppSrvsincethisisahiddenshare.
[单选题]You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?
正确答案 :A
Configure an ADM template and add the template to the GPO.
解析:解析:Explanation: It is recommended that we should use the supplied Administrative Templates where possible. Administrative Templates propagate registry settings to a large number of computers without requiring us to have detailed knowledge of the registry. However, the administrator can create custom .adm files if the supplied templates are inadequate. In Windows 2000, we use Group Policy to set registry-based policies. In Windows NT 4.0, we used the System Policy Editor (Poledit.exe) to set System Policy.
查看原题