网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are looking for an executable file foo. Select the command that would search forfoo within directories set in the shell variable, PATH.()
A

 locate

B

 which

C

 find

D

 query

E

 whereis


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are looking for an executable file foo. Select the command that would search forfoo within directories set in the shell variable, PATH.()A  locateB  whichC  findD  queryE  whereis” 相关考题
考题 You are the administrator of a SQL Server 2000 computer in your company's personnel department. Employee data is stored in a SQL Server 2000 database. A portion of the database schema is shown in the exhibit.You want to create a text file that lists these data columns in the following format title, FirstName, LastName, WorkPhone, PositionName, DepartmentName.You want to create the text file as quickly as possible. You do not expect to re-create this file, and you want to avoid creating new database objects if possible.What should you do?A.Use the bcp utility to export data from each table to a separate text file. Use format files to select the appropriate columns. Merge the data from each text file into a single text file.B.Create a view that joins data from all three tables include only the columns you want to appear in the text file. Use the bcp utility to export data from the view.C.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a local temporary table. Use the bcp utility to export data from the local temporary table to a text file.D.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a global temporary table. Use the bcp utility to export data from the global temporary table to a text file.

考题 The(72)turns the source file into an object file and the(73)turns the object file into an executable file.A.translatorB.compilerC.interpreterD.linker

考题 You are upgrading your Cisco router IOS from a TFTP server over the network. The upgrade procedure is stopped and you are prompted to erase the current flash contents before continuing. What is most plausible reason for this? ()A、There is insufficient room for more than one image.B、The router has detected a copy of the current software image on the TFTP server.C、The file can be relocated and not compressed.D、The image to load is a binary executable file.

考题  You created a custom menu for the Order Entry application. Which step do you perform before attaching the menu module to the form module?()A、Select file--Administration--Convert B、Select file--Administration--Execute C、Select file--Administration--Compile FileD、No further step is necessary. 

考题 喂,你找谁? ()A、Hello, who are you looking for?B、What can I do for you ?C、Are you looking for anyone?D、Who are you?

考题 You are looking for an executable file foo. Select the command that would search forfoo within directories set in the shell variable, PATH.()A、 locateB、 whichC、 findD、 queryE、 whereis

考题 A customer purchased a new PC with Windows XP but wants to run a program designed forWindows 98. Which of the following will allow this program to run under Windows XP?()A、Change the file permissions for the executable file.B、Use the convert utility to change the attributes of the executable file.C、Make sure that Windows XP has FAT32 file system.D、Run the executable file under compatibility mode.

考题 You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo?()A、 foo and bar would both be removed.B、 foo would be removed while bar would remain accessible.C、 foo would be removed, bar would still exist but would be unusable.D、 Both foo and bar would remain accessible.E、 You would be asked whether bar should be removed.

考题 You are developing an ASP.NET application by using Visual Studio 2010. You need to interactively debug the entire application. Which two actions should you perform? ()A、Set the Debug attribute of the compilation node of the web.config file to true.B、Add a DebuggerDisplay attribute to the code-behind file of the page that you want to debug.C、Select the ASP.NET debugger option in the project properties.D、Define the DEBUG constant in the project settings.

考题 You create a Web server control named ContosoControls. You add a Web custom control named ContosoMailer to it. You then distribute the Web Control Library files to your team. You need to provide your team with the correct procedure for adding the Web Control Library to the items in the toolbox of Microsoft Visual Studio .NET. Which procedure should you provide to the team?()A、Within the toolbox, click Choose Items and then browse to and select the ContosoControls user control.B、Within the toolbox, click Choose Items and then browse to and select the ContosoMailer user control.C、Right-click Web Project, click Add Reference, and then browse to and select the ContosoControls.dll file.D、Within the toolbox, click Choose Items and then browse to and select the ContosoControls.dll file.

考题 Your network contains one Active Directory domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). You have a comma delimited file that contains information for 2,000 new employees. You need to create 2,000 new user accounts by using the information in the file. You must achieve this goal by using the minimum amount of administrative effort. Which tool should you use? ()A、Csvde.exeB、Dsmod.exeC、ldifde.exeD、Ntdsutil.exe

考题 You have a computer that runs Windows 7. You create an application shim for a third-party application byusing the Microsoft Application Compatibility Toolkit (ACT). You need to ensure that the application shim isapplied the next time you run the application.  What should you do first ?()A、Run Sdbinst.exe.B、Run Msiexec.exe.C、Right-click the application executable file and modify the compatibility settings.D、Right-click the application executable file and modify the advanced security settings.

考题 You have a computer that runs Windows 7. A user installs a third-party media player on the computer. Youdiscover that all media files automatically open by using the third-party media player. You need to ensurethat all media files open automatically by using Windows Media Player. You must achieve this goal by usingthe minimum amount of administrative effort. What should you do?()A、Select a media file. Right-click the file and select Open with.B、Select a media file. Right-click the file and select Restore previous versions.C、From Control Panel, modify the Set your default programs settings.D、From Control Panel, modify the Set program access and computer defaults settings.

考题 You are developing and XBAP application for your company intranet. During several development iterations, you manually executable, application, and deployement manifest to the test Web Server. You create an HTML file that has a manifest that you use for testing. During the next iteration, you enchance the XBAP application by making changes. When you use the hyperlink to the deployment manifest to test the deployment, you do not see the changes. You need to ensure that the changes you make are visible when you test the deployment from your machine. What should you do ?()A、Restart Microsoft Internet Information Services (IIS). Then click the Install hyperlink again.B、Open Visual Studio command prompt and run mage -cc. Then click the Install hyperlink again.C、Delete the application, deployment, and executable files from Web Server. Then rebuild the XBAP solution files from the project bin directory to the Web Server and click the Install hyperlink againD、Delete the application, deployment, and executable files from Web Server. Then recopy the same files to the Web Server, restart IIS and click the Install hyperlink again

考题 You are the network administrator for The network consists of a single Active Directory domain named The functional level of the domain is Windows Server 2003. Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the password property to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort. First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords. What should you do next?()A、Export the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.B、From the Results pane of the query, select all user accounts and modify their password properties simultaneously.C、Export the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.D、From the Results pane of the query, select each user account and modify the password property, one by one.

考题 单选题Your network contains one Active Directory domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). You have a comma delimited file that contains information for 2,000 new employees. You need to create 2,000 new user accounts by using the information in the file. You must achieve this goal by using the minimum amount of administrative effort. Which tool should you use? ()A Csvde.exeB Dsmod.exeC ldifde.exeD Ntdsutil.exe

考题 单选题You are upgrading your Cisco router IOS from a TFTP server over the network. The upgrade procedure is stopped and you are prompted to erase the current flash contents before continuing. What is most plausible reason for this? ()A There is insufficient room for more than one image.B The router has detected a copy of the current software image on the TFTP server.C The file can be relocated and not compressed.D The image to load is a binary executable file.

考题 单选题You are using Microsoft Windows Internet Explorer 7 on your computer. You need to print only the graphic on a Web page.  How should you print the graphic?()A Use the Page Setup option and select only the graphic.B Use the Print Preview feature and select only the graphic.C Use the Print option from the File menu.D Use the Microsoft XML Paper Specification (XPS) Document image printer.

考题 单选题喂,你找谁? ()A Hello, who are you looking for?B What can I do for you ?C Are you looking for anyone?D Who are you?

考题 多选题You have a computer that runs Windows 7. The computer is in a workgroup. You need to ensure that youcan decrypt Encrypting File System (EFS) files on the computer if you forget your password.  What are two possible ways to achieve this goal?()AFrom Credential Manager, select Back up vault.BFrom User Accounts, select Create a password reset disk.CFrom User Accounts, select Manage your file encryption certificates.DFrom Authorization Manager, modify the Authorization Manager options.

考题 单选题You have read/write permission on an ordinary file foo. You have just run In foo bar. What would happen if you ran rm foo?()A  foo and bar would both be removed.B  foo would be removed while bar would remain accessible.C  foo would be removed, bar would still exist but would be unusable.D  Both foo and bar would remain accessible.E  You would be asked whether bar should be removed.

考题 单选题You have a computer that runs Windows 7. You manually create a system restore point. You need torestore a copy of a file stored on drive C from two days ago. You must achieve this goal in the minimumamount of time. What should you do?()A From Recovery, select System Restore.B From Backup and Restore, select Restore my files.C From the command prompt, run Wbadmin get items.D From the properties of the file, select Previous Versions.

考题 单选题You have a computer that runs Windows 7. A user installs a third-party media player on the computer. Youdiscover that all media files automatically open by using the third-party media player. You need to ensurethat all media files open automatically by using Windows Media Player. You must achieve this goal by usingthe minimum amount of administrative effort. What should you do?()A Select a media file. Right-click the file and select Open with.B Select a media file. Right-click the file and select Restore previous versions.C From Control Panel, modify the Set your default programs settings.D From Control Panel, modify the Set program access and computer defaults settings.

考题 单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()A ldifdeB csvdeC ntdsutil with the authoritative restore optionD dsadd user

考题 单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. The functional level of the domain is Windows Server 2003.Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the passwordproperty to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort.First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords.What should you do next? ()A Export the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.B From the Results pane of the query, select all user accounts and modify their password properties simultaneously.C Export the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.D From the Results pane of the query, select each user account and modify the password property, one by one.

考题 多选题What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()AKill a running process on the endpoint, based on executable name and MD5 checksum.BDelete a file on the endpoint's file system.CDownload and run a remediation executable from the local software distribution server.DAlter registry entries to prevent future execution of an executable, based on executable name and full path.

考题 单选题You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()A In the Backup utility, select the Verify data after backup option.B Run the Ntbackup //TestKing2/TestKingProjects /v:yes command.C Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.D Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.