2024年计算机考试-微软认证笔试考试历年高频考点试题摘选含答案_第1页
2024年计算机考试-微软认证笔试考试历年高频考点试题摘选含答案_第2页
2024年计算机考试-微软认证笔试考试历年高频考点试题摘选含答案_第3页
2024年计算机考试-微软认证笔试考试历年高频考点试题摘选含答案_第4页
2024年计算机考试-微软认证笔试考试历年高频考点试题摘选含答案_第5页
已阅读5页,还剩28页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

2024年计算机考试-微软认证笔试考试历年高频考点试题摘选含答案第1卷一.参考题库(共75题)1.Your company has an Active Directory domain.     A user attempts to log on to the domain from a client computer and receives the following  message: "This user account has expired. Ask your administrator to reactivate the account."     You need to ensure that the user is able to log on to the domain.     What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.2.You are creating a Windows application for graphical image processing by using the .NET Framework 3.5. You create an image processing function and a delegate.You plan to invoke the image processing function by using the delegate.You need to ensure that the calling thread meets the following requirements:  (1)It is not blocked when the delegate is running   (2)It is notified when the delegate is complete What should you do?()A、Call the Invoke method of the delegate.B、Call the BeginInvoke and EndInvoke methods of the delegate in the calling thread.C、Call the BeginInvoke method by specifying a callback method to be executed when the delegate is complete.Call the EndInvoke method in the callback method.D、Call the BeginInvoke method by specifying a callback method to be executed when the delegate is complete.Call the EndInvoke method of the delegate in the calling thread.3.Youhaveastand-aloneserverthatrunsWindowsServer2003ServicePack2(SP2). YouattempttologontotheserverbyusingtheAdministratoraccountandreceivethefollowingerror message. YouneedtologontotheserverbyusingtheAdministratoraccount. Whatshouldyoudofirst?()A、RestarttheserverinSafemode.B、RestarttheserverbyusingtheLastKnownGoodConfigurationoption.C、Logontoanotherstand-aloneserverasanAdministrator.D、LogontotheserverbyusinganaccountthatisamemberofthePowerUsersgroup.4.Youarethenetworkadministratorfor.YouaretheadministratorofaWindowsServer2003computernamedTestKing8. YoulogontoTestKing8andattempttoaccessthenetwork.Youdiscoverthattheserverisnotcommunicationgonthenetwork.YoudiscoverthataservicepackandanupdatednetworkadapterdriverwereinstalledonTestKing8thepreviousnight. Acompletebackup,includingtheSystemStatedata,wasperformedbeforetheservicepackandthedriverwereinstalled. Youneedtorestorenetworkcommunications. Whatshouldyoudofirst?()A、UseRollBackDrivertoreinstallthepreviousdriverforthenetworkadapter.B、UsetheBackporRestoreWizardtorestorethebackupfromthepreviousnight.C、RestartTestKing8byusingLastKnownGoodConfigurationoption.D、UsetheRegistryEditortodeletetheregistrysettingsforthenetworkadapterdriver.5.Your network consists of a single Active Directory domain. The network is located on the /23  subnet.   The company hires temporary employees. You provide user accounts and computers to the temporaryemployees. The temporary employees receive computers that are outside the Active Directory domain.   The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system.   You need to plan the network’s security so that it complies with the company's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the /23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the /23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.6.You are designing a VPN Server strategy to meet the business and technical requirement. What should  you do?()A、Configure all client computers to point to a VPN server in Amsterdam.  B、Configure all client computers to use Multilink Bandwidth Allocation Protocol (BAP).C、Create a network Load Balancing cluster of VPN servers.  D、Create a shutdown script for the VPN servers to delete the host(A) resource record of the VPN sever from the DNS database when the VPN server are shutdown.7.Which class defines the contract that ASP.NET implements to provide membership services using custom membership providers?()A、FormsAuthenticationB、RoleProviderC、SqlRoleProviderD、MembershipProvider8.You are the administrator of your company’s network. The network consists of a single Active Directory domain. The network includes Windows XP Professional and Windows 2000 Professional client computers. All computers have manually configured IP addresses. A portion of your network is shown in the Configuration exhibit. You install a new Windows XP Professional client computer on Subnet2.  The user of this computer reports that she cannot access an application hosted on APPSRV1.  When she tries to access the application, she receives the following error message: “Network path not found.” The user verifies that she can access resources on other servers located on both subnets. You view the configuration of her network connection, as shown in the Network Connection Details exhibit. You need to ensure that the user can access the application on APPSRV1. What should you do?()A、Configure the computer to use the address of the DNS server on Subnet1.B、Configure the computer to use the address of the WINS server on Subnet1.  C、Configure the computer to use DHCP to automatically receive its TCP/IP configuration.D、Configure the computer to use an IP address from Subnet1 as an alternate configuration.9.You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  You create a Web page named Default.aspx in the root of the application. You add an ImageResources.resx resource file in the App_GlobalResources folder. The ImageResources.resx file contains a localized resource named LogoImageUrl. You need to retrieve the value of LogoImageUrl. Which code segment should you use?()A、AB、BC、CD、D10.YournetworkcontainsaservernamedServer1.Server1runsWindowsServer2008R2andhasasinglenetworkconnection.Theconnectionisconfiguredtouseadefaultgatewayaddressof.Thedefaultgatewayhasametricvalueof100.Youconfigureaseconddefaultgatewaythatusesanaddressof.Youneedtoensurethatisonlyusedasthedefaultgatewayifisunreachable.Whatshouldyoudo?()A、Fortheinterface,settheinterfacemetricto100.B、Forthegateway,setthemetricto50.C、Forthegateway,setthemetricto200.D、Forthegatewayandthegateway,enableautomaticmetric.11.You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to prevent external organizations that do not have sender policy framework (SPF) records from sending e-mail messages to the organization. What should you configure?()A、sender reputationB、sender ID filteringC、an IP block list providerD、sender filtering12.Your company has an Active Directory domain. You plan to install the Active Directory Certificate Services (AD CS) server role on a member  server that runs Windows Server 2008 R2.     You need to ensure that members of the Account Operators group are able to issue smartcard  credentials. They should not be able to revoke certificates.     Which three actions should you perform()A、Install the AD CS server role and configure it as an Enterprise Root CA .B、Install the AD CS server role and configure it as a Standalone CA .C、Restrict enrollment agents for the Smartcard logon certificate to the Account Operator group.D、Restrict certificate managers for the Smartcard logon certificate to the Account Operator group.E、Create a Smartcard logon certificate.F、Create an Enrollment Agent certificate.13.你需要设计安全策略确定未经验证的用户不能访问职员的数据。你的方案必须遵守安全要求和公司的新管理模型。你应该怎么做?()A、在域的默认域策略GPO中,添加LA/HRUsers组到受限制组列表中 只添加HR部的用户帐户到允许成员列表中B、在域的默认域策略GPO中,添加LA/HRUsers组到受限制组列表中添加HR部的用户帐户到允许成员列表中C、在域的默认域策略GPO中,添加LA/HRUsers组和CORP/Backup Operators组到受限制组列表中,只添加HR部的用户帐户和管理员的帐户到各组的允许成员列表中D、在域的默认域策略GPO中,添加LA/HRUsers组和CORP/Backup Operators组到受限制组列表中,添加HR部的用户帐户到LA/HRUsers组允许成员列表中,添加管理员的帐户到CORP/Backup Operators组的允许成员列表中14.贵公司使用的一个名为Application1的应用程序,此程序使用的.netFramework的版本是1.0。这个应该程序已经安装在了一台共享的计算机中,此计算机中已安装了.netFramework1.0和1.1的版本。您需要移动此应用程序到另一台计算机中,此计算机已安装.netFramework1.1和2.0的版本。此应用程序和1.1的版本是兼容的,但与.netFramework2.0是不兼容的。您需要确保应用程序在新计算机上使用.netFramework的1.1版本。您将怎样做?() A、AB、BC、CD、D15.Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A、 Microsoft Assessment and Planning (MAP) ToolkitB、 Microsoft Baseline Security AnalyzerC、 Microsoft System Center Operations ManagerD、 Windows Server Update Services (WSUS)16.You have an Exchange organization that contains the Exchange servers shown in the following  table.You plan to move all mailboxes from Server2 to Server3.You need to ensure that all users can send and receive e-mail messages after their mailboxes are moved to Server3. What should you do?() A、Install the Exchange Server 2010 Hub Transport server role.B、Install the Exchange Server 2010 Edge Transport server role.C、Remove all Exchange Server 2003 servers.D、Remove the Exchange Server 2003 front-end server.Install a new Exchange Server 2010 Client Access server.17.You have two Exchange Server 2010 named Server1 and Server2.Server1 has the Mailbox server role installed.Server2 has the Hule Transport and client access server roles installed.You need to ensure that users can send e-mail and receive e-mail by using Windows Live Mail or Microsoft Outlook Express. What should you do?()A、From the command Prompt on server1,run net start MsExchangePOP3B、From the command Prompt on Server2,run net start MsExchangePOP3C、On Server1 and Server2,modify the properties of the MsExchangePOP3(TCP-in) Windows Firewall ruleD、On Server1,modify the properties of the MsExchangeIMAP4(TCP-in) Windows Firewall rule.On server2, modify the properties of the client receive connector18.你运行Windows 7 企业版的计算机有两块内置硬盘。操作系统和应用程序都安装在C盘上,并且C盘上启用了系统保护。D盘是一块容量为500G的硬盘并格式化为NTFS文件系统,被你用来存储个人文件。你想存储几个月以前的版本,这样你打算为系统保护保留200GB空间。你没有使用内置硬盘来做备份,而是使用了一个外置的1TB的USB硬盘。你应该怎样配置D盘上的系统保护?()A、选择“恢复系统设置和以前版本的文件”B、选择“只恢复以前版本的文件”C、设置“最大使用率”滑块到40%D、设置“最大使用率”滑块到4%19.You have an Exchange Server 2010 organization.  The network contains an Exchange Server 2010 Mailbox server named Server1. All mailboxes are stored on Server1.  You perform a Typical installation of Exchange Server 2010 on a new server named Server2. You plan to implement redundancy for mailbox access.  You need to recommend a solution that ensures that client computers can reconnect to their mailboxwithin five minutes if Server1 fails.  What should you recommend?()A、Configure cluster continuous replication (CCR). Implement a file share witness.B、Configure a Network Load Balancing cluster that includes Server1 and Server2. Implement Active Directory-integrated DNS zones.C、Configure a database availability group (DAG) that includes Server1 and Server2. Set the time to live (TTL) for the DNS record.D、Configure a database availability group (DAG) that includes Server1 and Server2. Use the same certificate for both servers20.您的计算机上装有一个有线网络适配卡和一个无线网络适配卡。您只有在出门旅行时才使用无线网络适配卡。 您需要设定网络适配卡设定文件,确定计算机只有在家里时才会寻找其它网络装置。 这时应执行哪两个动作?()A、 当设定家中的有线网络存取时,将有线网络适配卡的位置类型设为 [公用]。B、 当设定家中的有线网络存取时,将有线网络适配卡的位置类型设为 [私人]。C、 当设定公用无线存取点的存取时,将无线网络适配卡的位置类型设为 [公用]。D、 当设定公用无线存取点的存取时,将无线网络适配卡的位置类型设为 [私人]。21.You need to recommend changes to the software deployment process that meet the company’s technical requirements.   What should you include in the recommendation?()A、BranchCache in Distributed Cache modeB、BranchCache in Hosted Cache modeC、domain-based Distributed File System (DFS)D、standalone Distributed File System (DFS)22.You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup23.YoudeployyourcompanysInternetWebsite.YouneedtodenyanonymousaccesstotheWebsite,allowingonlyauthenticatedusers.Whichcodesegmentshouldyouuse?()A、B、C、D、24.Yourcompanyhasrecentlydeployedaserverthatrunswindowsserver2008.Theserverhastheipinformationshownbelow.Ipaddress86Subnetmask:92Defaultgateway:Usersonremotesubnetsreportthattheyareunabletoconnecttotheserver.Youneedtoensureallusersareabletoconnecttotheserver.Whatshouldyoudo?()A、ChangetheIPaddressto29B、ChangetheIPaddressto00C、Changethesubnetmasktoa24-bitmaskD、Changethesubnetmasktoa27-bitmask.25.You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable  devices that have beenpreviously installed on the computer.  What should you modify in the Local Group Policy?()A、Enable the Prevent redirection of USB devices setting.B、Enable the Prevent installation of removable devices setting.C、Disable the WPD Devices: Deny read access setting.D、Disable the Allow administrators to override Device Installation Restriction policies setting.26.C has hired you as a system administrator for their network. You make use of .NETFramework v3.5 in order to create a Microsoft ASP.NET application.  You decide to create a Web form. You add the subsequent code fragment to the Web form. ’ /> The DataSource control named CKDataSource recovers the Quantity column values from a tablenamed Orders. You the create the rptData_ItemDataBound event handler using the subsequentcode fragment. (The line numbers is included for reference purposes)  1 protected void rept_b(object sender, RepeaterItemEventArgs e) 2 { 3 4 if(CKLbl != null) 5 if(int.Parse(CKLbl.Text) A、Your best option would be to insert Label CKLbl = e.Item.FindControl("lblQty") as Label at line4.B、Your best option would be to insert Label CKLbl = Page.FindControl("lblQty") as Label at line 4.C、Your best option would be to insert Label CKLbl = rptData.FindControl("lblQty") as Label at line4.D、Your best option would be to insert Label CKLbl = e.Item.Parent.FindControl("lblQty") as Labelat line 427.You need to design a strategy for providing e-mail access to the subsidiary users. What should you do?()A、Deploy POP3 and IMAP4 services on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of POP3, IMAP4, and SMTP onlyB、Deploy Microsoft Outlook Web Access on Exchange mailbox servers. Make the mailbox servers accessible from the Internet by means of HTTPS and SMTP onlyC、Deploy Microsoft Outlook Web Access on Exchange front-end servers. Make the front-end servers accessible from the Internet by means of HTTPS onlyD、Deploy an additional Exchange mailbox server that contains all subsidiary mailboxes. Deploy Microsoft Outlook Web Access on the server. Make the server accessible from the Internet by means of HTTPS only28.You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()A、 Use the authentication method of the default IPSec policies.B、 Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C、 Create a custom IPSec policy and use certificate-based authentication.D、 Create a custom IPSec policy and use preshared key authentication.E、 Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.29.You have an Exchange Server 2010 organization that contains 20 mailbox databases. You configure each database to retain all deleted items for 30 days.You need to ensure that all items that pass the retention period are permanently deleted daily between 02:00 and 06:00. Which cmdlet should you use?()A、Set-MailboxDatabaseB、Set-MailboxServerC、Set-OrganizationConfigD、Set-RetentionPolicy30.You replace the uniprocessor computer in your design department with new MPS-compliant computers. Each computer has two 550-MHz processors. You install design software that includes Win32, Win16, and DOS-based applications. When users use a Win16-based application, they do not notice an improvement in performance compared to using the uniprocessor computers. What should you do? ()A、Modify the short cut for the Win 16 based application to enable it to use multiple processors. B、Set the ‘Use multi-processor feature if available for Win 16 applications’ through theaccessibility option.C、Replace the Win16-based applications with available Win32-based applications. D、None of the above options provides a valid solution.31.Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network.Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the Security Center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the connection until the required updates are installed.32.Your network consists of a single Active Directory domain. Users access and share documents by using a DFS namespace. You need to recommend a solution to manage user access to documents. Thesolution must meet the following requirements: èAllow for document versioning èAllow for online collaboration What should you recommend?()A、File Server Resource Manager (FSRM)B、Volume Shadow Copy Service (VSS)C、Microsoft SharePoint Foundation 2010D、Windows System Resource Manager (WSRM)33.Youinstallathird-partyapplicationonyourcomputer.Theapplicationusesport80tonegotiatealisteningport.Afterestablishingthelisteningport,theapplicationusesdynamicportsabove6000.YouneedtoconfigureMicrosoftWindowsFirewalltoallowtrafficfortheapplication. Whatshouldyoudo?() A、AB、BC、CD、D34.You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. You create a page that contains the following code fragment:       You write the following code segment in the code-behind file for the page:   void BindData(object sender, EventArgs e) {   lstLanguages.DataSource =  CultureInfo.GetCultures(CultureTypes.AllCultures);   lstLanguages.DataTextField = "EnglishName";  lstLanguages.DataBind();   }   You need to ensure that the lstLanguages ListBox control maintains the selection of the user during postback.  Which line of code should you insert in the constructor of the page?()A、this.Init += new EventHandler(BindData); B、this.PreRender += new EventHandler(BindData); C、lstLanguages.PreRender += new EventHandler(BindData); D、lstLanguages.SelectedIndexChanged += new EventHandler(BindData);35.yourcompanyhasserversthatrunwindowsserver2008.AllclientcomputersrunwindowsXPservicepack2(SP2.).windows2000professional,orwindowsvista.YouneedtoensureallcomputerscanusetheIPv6protocol.Whatshouldyoudo?()A、Installservicepack4onallwindows2000professionalcomputers.B、Upgradethewindows2000professionalcomputerstowindowsXPSP2.C、RuntheIPv6.exetoolonthewindows2000professionalandwindowsXPcomputers.D、Installactivedirectoryclientextenticon.(DSClient.exe)onthewindows2000professionalandwindowsXPcomputers.36.You need to recommend an RD Gateway configuration that meets the company’s technical requirements.   What should you recommend?()A、Create two Remote Desktop connection authorization policies (RD CAPs) and one Remote Desktop resource authorization policy (RD RAP).B、Create one Remote Desktop connection authorization policy(RD CAP)and two Remote Desktop  resource authorization policies (RD RAPs).C、Create one Remote Desktop resource authorization policy(RD RAP)and deploy the Remote Desktop Connection Broker(RD Connection Broker) role service.D、Create one Remote Desktop connection authorization policy(RD CAP) and deploy the Remote  Desktop Connection Broker (RD Connection Broker) role service.37.联合搜索连接器通过什么方式安装?()A、在线购买联合搜索安装工具包,并从网站购买独立的搜索连接器B、从一个合法资源下载一个.osdx 文件。双击下载的文件并选择添加到安装C、到Microsoft网站,只有经过Microsoft联合搜索工具作者协会数字签名的卖主可以参与D、到A 并下载联合搜索共享资源工具38.You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage virtual machines (VMs). You need to deploy a cloned VM and automatically assign it a different name.  Where should you deploy the cloned VM?()A、to the same host as the source VMB、to a different host from the source VMC、to the same library as the source VMD、to a different library from the source VM39.Your network contains an Active Directory domain named . C contains a  member server that runs Windows Serever 2008 Standart.   You need to install an enterprise subordinate certification authority (CA) that support private key  archival. You must achieve this goal by using the minimum amount of administrative effort. What do you do first()A、Initialize the Trusted Platform Module (TPM)B、Upgrade the menber server to Windows Server 2008 R2 Standard.C、Install the Certificate Enrollment Policy Web Service role service on the member server.D、Run the Security Configuration Wizard (SCW) and select the Active Directory Certificate Services - Certification40.You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain have Windows Server 2012 R2 installed, while domain controllers have Windows Server 2008 R2 installed.You are then tasked with deploying a new Windows Server 2012 R2 domain controller. You are preparing to install the DNS Server role, and enable the global catalog server option.  Which of the following actions should you take?()A、You should consider making use of Server Manager.B、You should consider making use of the Active Directory Installation Wizard.C、You should consider making use of the DHCP Installation WizardD、You should consider making use of TS Manager41.You have an Exchange Server 2010 organization.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a solution to reduce the number of e-mail messages that are accidentally sent todistribution groups that contain company executives.  What should you include in the plan?()A、custom MailTipsB、dynamic distribution groupsC、Outlook Protection RulesD、sharing policies42.您网络中所有的计算机都运行Windows XP。一些计算机是安全网络的一部分。一些计算机通过虚拟专用网(VPN)连接到网络。您正在计划部署Windows 7。您需要满足以下要求:使用专用服务器进行部署。使用单一操作系统映像进行部署。确保您能使用可移动媒体部署映像。确保您能在部署时选择在一台客户端计算机上安装哪些应用程序。您需要设计一项满足要求的部署策略。您应该怎么做?()A、使用Windows PE启动媒体,使用ImageX从网络共享将映像应用到客户端计算机B、使用System Center Configuration Manager2007 R2执行zero-touch安装C、使用Microsoft Deployment Toolkit执行lite-touch安装D、在网络服务器上使用Windows Deployment Services通过一个安装映像来部署Windows 743.Your company hires 10 new employees. You want the new employees to connect to the main  office through a VPN connection. You create new user accounts and grant the new employees  the Allow Read and Allow Execute permissions to shared resources in the main office.     The new employees are unable to access shared resources in the main office. You need to  ensure that users are able to establish a VPN connection to t

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论