logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Windows 2000 Server See What Others Are Saying!
  • Question
  • You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?


  • Options
  • A. Move the intranet server to the client segment of the network
  • B. Move the proxy server to the server segment of the network
  • C. Configure each client computer to bypass the proxy server for local addresses
  • D. Configure each client computer to use port 81 for the proxy server
  • E. None of above

  • Correct Answer
  • Configure each client computer to bypass the proxy server for local addresses 


  • More questions

    • 1. A teleprocessing system may consist of

    • Options
    • A. user systems
    • B. communications systems
    • C. computer center systems
    • D. All of the above
    • E. None of the above
    • Discuss
    • 2. Decision tree uses

    • Options
    • A. pictorial depictation of alternate conditions
    • B. nodes and branches
    • C. consequences of various depicted alternates
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. A popular technique for forecasting is

    • Options
    • A. correlation analysis
    • B. regression analysis
    • C. linear programming
    • D. Monte Carlo
    • E. None of the above
    • Discuss
    • 4. The current gain of a transistor is defined as the ratio of the collector current to the

    • Options
    • A. base current
    • B. emitter current
    • C. supply current
    • D. collector current
    • E. None of the above
    • Discuss
    • 5. Which of the following symbols is (are) not the Data Flow Diagram (DFD):

    • Options
    • A. a square
    • B. an open rectangle
    • C. a circle
    • D. a triangle
    • E. a bubble
    • Discuss
    • 6. What command is used to remove a file?

    • Options
    • A. del
    • B. mv
    • C. rm
    • D. remove
    • E. None of the above
    • Discuss
    • 7. A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be

    • Options
    • A. 5
    • B. 10
    • C. 20
    • D. 32
    • E. None of the above
    • Discuss
    • 8. A demultiplexer is also known as

    • Options
    • A. data selector
    • B. data distributor
    • C. multiplexer
    • D. encoder
    • E. None of the above
    • Discuss
    • 9. Which of the following is loaded for CD-ROM support?

    • Options
    • A. VLM.EXE
    • B. CDDEX.EXE
    • C. DOSKEY.EXE
    • D. MSCDEX.EXE
    • Discuss
    • 10. The formula for memory capacity is:

    • Options
    • A. MC = N/2
    • B. MC = 2/N
    • C. MC = N squared.
    • D. MC -2 to the Nth power
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment