搜题
网友您好,请在下方输入框内输入要搜索的题目:
搜题
题目内容 (请给出正确答案)
提问人:网友zhang26262 发布时间:2022-01-07
[主观题]

Your Windows 2000 Professional computer contains a single hard disk configured as a single

partition.

You want to move a folder named Sales under a folder named Corp on your computer.

You want the files in the Sales folder to remain compressed after moving the folder. You want the files in the Corp folder to remain uncompressed. You want to ensure that the files are recoverable in case of any disk problems. You also want to move the files with the least amount of administrative effort.

What should you do?

A.Copy the Sales folder to the Corp folder. Do nothing further.

B.Backup the Sales folder. Move the Sales folder to the Corp folder.

C.Compress the Corp folder. Then copy the Sales folder to the Corp folder.

D.Move the Sales folder to a second computer. Then move the Sales folder to the Corp folder.

简答题官方参考答案 (由简答题聘请的专业题库老师提供的解答)
查看官方参考答案
更多“Your Windows 2000 Professional computer contains a single hard disk configured as a single”相关的问题
第1题
在内核配置时,哪个关键词是来包含下一级Kconfig ()

A、menu endmenu

B、source

C、choice endchoice

D、depends on

点击查看答案
第2题
下列代码输出的是哪一项? print('a'.rjust(10,"*"))

A、a*********

B、a

C、*********a

D、a*

点击查看答案
第3题
Dao cannot be named, but can only be intuited as it rebuffs language and ________.
点击查看答案
第4题
You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

点击查看答案
第5题
You are configuring five computers for Windows NT Workstation 4.0 and Windows 2000 Professional.

Each computer has an 8 GB hard disk.

You configure the hard disk on each computer to have two 4 GB partitions. Windows NT Workstation is installed on drive C and Windows 2000 Professional on drive D.

In Windows 2000 Professional, you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart your computer and load Windows NT Workstation. You notice that users can save files to drive D.

You want to prevent users from saving the files to drive D in either operating system. You also want to ensure that users can access both drives while using either operating system.

What should you do?

A.Use Windows 2000 Professional to configure drive D as a dynamic partition.

B.Use Windows 2000 Professional to enable encrypting file system on drive D.

C.Use Windows NT workstation to configure NTFS permissions on drive D to deny the users write permission.

D.Reinstall Windows NT Workstation after configuring disk quotas.

点击查看答案
第6题
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only.

You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.

What should you do? (Choose all that apply)

A.Map a network drive to the AccSecured\intern folder from Richard's computer.

B.Map a network drive to the AccSecured shared folder from Richard's computer.

C.Allow the intern user account modify permissions on the intern subfolder.

D.Allow the intern user account traverse folder/execute file permission on the AccSecured folder.

E.Allow the intern user account list folder content permission on the AccSecured folder. Remove read extended attributes and read permissions.

点击查看答案
第7题
You are the administrator of the Coho Vineyard network. The network consists of 10 Windows 2000 Advanced Server computers and 250 Windows 2000 Professional computers.

Your company has two domains cohovineyard.com and westcoastsales.com.

The company's intranet site is on a Windows 2000 Advanced Server computer named ServerA. ServerA is in the cohovineyard.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0

You want to configure the Windows 2000 Professional computers in the westcoastsales.com domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://serverA rather than its fully qualified domain name.

What should you do?

A.Add cohovineyard.com to the Domain Suffix Search Order on the computers.

B.Add westcoastsales.com to the Domain Suffix Search Order on the computers.

C.Add westcoastsales.com to the exceptions list in the proxy server settings on the computers.

D.Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.

点击查看答案
第8题
You are the database administrator for a financial services company. Employees enter data 24 hours a day into a SQL Server 2000 database. These employees report slower response times when new account information is gathered from branch offices and added to the database. You currently use the following BULK INSERT statement to add the account information:

BULK INSERT finance.dbo.customers

FROM ‘di\bulk\accts143_10141000.txt’

WITH DATAFILETYPE = ‘char’,

FIELD/TERMINATOR = ‘\t’,

ROWTERMINATOR = ‘\n,’

TABLOCK

You want to ensure that response times do not slow when new account information is added to the database. What should you do?

A.Drop the indexes for the customers table before the data load, and then re-create the indexes after the data load is complete.

B.Remove the TABLOCK option from the BULK INSERT statement.

C.Add the BATCHSIZE option to the BULK INSERT statement and then set the option equal to 10 percent of the number of rows to be loaded.

D.Add the ROWS_PER_BATCH option to the BULK INSERT statement and then set the option equal to 10 percent of the number of rows to be loaded.

点击查看答案
第9题
You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000 database at the corporate headquarters.

A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a key value to each transformed sales record.

After loading this month's sales data, you discover that a portion of the data contains errors. You stop loading data, identify the problem records, and delete those records from the database.

You want to reuse the key values that were assigned to the records that you deleted. You want to assign the deleted key values to the next sales records you load. You also want to disrupt users' work as little as possible.

What should you do?

A.Export all records from the Sales table to a temporary table. Truncate the Sales table, and then reload the records from the temporary table.

B.Export all records from the Sales table to a text file. Drop the Sales table, and then reload the records from the text file.

C.Use the DBCC CHECKIDENT statement to reseed the Sales table's IDENTITY property.

D.Set the Sales table's IDENTITY_INSERT property to ON. Add new sales records that have the desired key values.

点击查看答案
第10题
You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.

You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.

Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)

A.Enable the Always read properties from UDL file option in the Connection Properties dialog box.

B.Disable the Always read properties from UDL file option in the Connection Properties dialog box.

C.Delete the .udl files and store connection details in the registry by using system data source names.

D.Delete the .udl files, and store connection details in the registry by using user data source names.

E.Make the .udl files available on a network share.

点击查看答案
重要提示: 请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案
购买前请仔细阅读《购买须知》
请选择支付方式
微信支付
支付宝支付
点击支付即表示你同意并接受《服务协议》《购买须知》
立即支付
搜题卡使用说明

1. 搜题次数扣减规则:

功能 扣减规则
基础费
(查看答案)
加收费
(AI功能)
文字搜题、查看答案 1/每题 0/每次
语音搜题、查看答案 1/每题 2/每次
单题拍照识别、查看答案 1/每题 2/每次
整页拍照识别、查看答案 1/每题 5/每次

备注:网站、APP、小程序均支持文字搜题、查看答案;语音搜题、单题拍照识别、整页拍照识别仅APP、小程序支持。

2. 使用语音搜索、拍照搜索等AI功能需安装APP(或打开微信小程序)。

3. 搜题卡过期将作废,不支持退款,请在有效期内使用完毕。

请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

- 微信扫码关注简答题 -
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反简答题购买须知被冻结。您可在“简答题”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
- 微信扫码关注简答题 -
请用微信扫码测试
欢迎分享答案

为鼓励登录用户提交答案,简答题每个月将会抽取一批参与作答的用户给予奖励,具体奖励活动请关注官方微信公众号:简答题

简答题官方微信公众号

简答题
下载APP
关注公众号
TOP