网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which of the following can be used to determine the amount of physical memory installed in a laptop? ()
A

Check Device Manager Snap-in.

B

Type WINVER in the command prompt.

C

Check the BIOS.

D

Check System Information in the Accessibility folder.

E

Check System Information.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which of the following can be used to determine the amount of physical memory installed in a laptop? ()ACheck Device Manager Snap-in.BType WINVER in the command prompt.CCheck the BIOS.DCheck System Information in the Accessibility folder.ECheck System Information.” 相关考题
考题 Which of the following can be used to determine the amount of physical memory installed in a laptop? ()A、Check Device Manager Snap-in.B、Type WINVER in the command prompt.C、Check the BIOS.D、Check System Information in the Accessibility folder.E、Check System Information.

考题 A basic cable tester can be used to do which of the following?()A、Assure end to end continuity of a UTP cable.B、Locate the distance to a cable break.C、Determine the CAT level of a UTP cable.D、Determine the distance to the nearest wiring closet.

考题 Which of the following media types can hold the GREATEST amount of data?()A、 DVDB、 SDLTC、 LTOD、 Blu-Ray

考题 Which of the following commands should be used to determine DNS name resolution performance?()A、 iptraceB、 vmstatC、 hostnameD、 ifconfig

考题 An AIX system administrator needs to adjust the maximum amount of memory that can be pinned. Which of the following commands is used to make the change?()A、 vmtune -MB、 svmon -mC、 vmstat -sD、 schedtune -m

考题 Which of the following utilities can be used to determine the current partition information on an attached storage device?()A、Add Hardware WizardB、Device ManagerC、Disk ManagementD、Control Panel

考题 Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted

考题 Which of the following utilities could be used to determine a subnet mask?()A、PINGB、NSLOOKUPC、TRACERTD、IPCONFIG

考题 Which of the following metrics provided by the iostat report is used to initially determine if a disk is I/O bound?()A、 tinB、 toutC、 % idleD、 % tm_act

考题 Which of the following commands should be used to determine whether a logical volume is contiguous across a disk?()A、 lslvB、 lsfsC、 lspvD、 fileplace

考题 Which of the following metrics provided by the iostat report is used to initially determine if a system is I/O bound?()A、 % idleB、 % sysC、 % userD、 % iowait

考题 A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect.  Which of the following commands can be used to determine the block size of the backup tape ()A、ddB、tarC、cpioD、restore

考题 Which of the following commands should be used to determine if a remote print queue is down?()A、 lsqdev B、 lpstat C、 lptest D、 prtconf

考题 A system administrator is attempting to unmount filesystem /dev/data and receives the following message:   umount: 0506-349 Cannot unmount /dev/data: The requested resource is busy.   Which of the following commands can be used to determine which process has open references within the filesystem?()A、lsfsB、topasC、fuserD、mount

考题 Which of the following commands is used to determine the route that the IP packets take to a network host?()A、 route B、 netstat C、 iptrace D、 traceroute

考题 A system administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape?()A、ddB、tarC、cpioD、restore

考题 Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A、 filemonB、 istatC、 vmstatD、 iostat

考题 which one of the following accurately describes field names?()A、they must be unique in a database  B、they can only be used once in a view  C、they can only used once on each form  D、they can be used mulriple times on a form 

考题 Which of the following performance tools can be used to determine if a system is thrashing?()A、 svmon and tprofB、 vmtune and schedtuneC、 ps and schedtuneD、 vmstat and topas

考题 单选题Which of the following metrics provided by the iostat report is used to initially determine if a system is I/O bound?()A  % idleB  % sysC  % userD  % iowait

考题 单选题Which of the following performance tools can be used to determine if a system is thrashing?()A  svmon and tprofB  vmtune and schedtuneC  ps and schedtuneD  vmstat and topas

考题 单选题An AIX system administrator needs to adjust the maximum amount of memory that can be pinned. Which of the following commands is used to make the change?()A  vmtune -MB  svmon -mC  vmstat -sD  schedtune -m

考题 单选题Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A  filemonB  istatC  vmstatD  iostat

考题 单选题Which of the following metrics provided by the iostat report is used to initially determine if a disk is I/O bound?()A  tinB  toutC  % idleD  % tm_act

考题 单选题Which statement about HTTPS decryption on the WSA is true?()A if enabled, all HTTPS traffic must be decryptedB if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD object size can be used to determine whether the HTTPS traffic is to be decrypted

考题 单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A aaa authentication enable method defaultB aaa authentication enable defaultC aaa authentication enable levelD aaa authentication enable default local

考题 单选题Which of the following commands should be used to determine whether a logical volume is contiguous across a disk?()A  lslvB  lsfsC  lspvD  fileplace