网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
( )algorithm specifies the way to arrange data in a particular order.
A.Search
B.Random
C.Sorting
D.Merge
B.Random
C.Sorting
D.Merge
参考答案
参考解析
解析:本题考查计算机专业英语知识()按特定顺序排列数据的方式A 搜索B 随机C 排序D 合并
更多 “( )algorithm specifies the way to arrange data in a particular order.A.Search B.Random C.Sorting D.Merge ” 相关考题
考题
● One feature of (74) is that it is possible to arrange for a singlemessage to be sent to a large number of other users simultaneously.(74)A. FaxB. IP telephoneC. Data ProcessingD. E-mail
考题
●The principle for a stack memory to store data is (72) .(72) A.FIFOB.randomC.FILOD.other way
考题
The X.25 standard specifies three layers of functionality.Which layers of the OSI model correspond to the X.25 layers?A.the Physical, Network, and Session LayersB.the Physical, Data Link, and Network LayersC.the Physical, Data Link, and Transport LayersD.the Physical, Session, and Presentation layers
考题
M.Jackson suggested the data structure oriented software design method.Which of the following structure can be introduced by using input data structure?A.algorithm structureB.procedure structureC.code structureD.program structure
考题
Is a programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster.The model is a specialization of the split-apply-combine strategy for data analysis().A.HDFSB.ChukwaC.MapReduceD.HBase
考题
Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)A. After a collision, the station that detected the collision has first priority to resend the lost data.B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
考题
Referring to the exhibit, what is the purpose of the targets section of the configuration?()
A. It defines which devices will be sending traps.B. It specifies where to send traps.C. It defines the IP addresses of management systems that can access the device.D. It specifies which devices can be polled for SNMP data.
考题
What is the purpose of the magic number in an LCP negotiation?()
A.It is used to detect loops.B.It is an interface identifier.C.It selects a compression algorithm.D.It specifies the transmission media.
考题
DBMS will "manage "the stored data items and assemble the needed items from the(74) database in response to the queries of those who aren't programmers.A.extentionB.the sameC.commonD. particular
考题
●In computer science ,a data (72) is a way of storing data in acomputer so that it can be used efficiently.(72)A.recordB.fileC.structureD.pool
考题
The word “packages” (Line 3, Paragraph 2) means_____.[A] parcels carried in travelling [B] a comprehensive set of activities[C] something presented in a particular way [D] charity actions
考题
● (72) is the process ofarranging a group of data elements into some desired order.(72)A. FileB.RecordC.SortingD.Database
考题
Designing the data storage architecture is an important activity in system design. There are two main types of data storage formats: files and databases. Files are electronic of data that have been optimized to perform a particular transaction. There are several types of files that differ in the way they are used to support an application. ( ) store core information that is important to the business and , more specifically , to the application , such as order information or customer mailing information. ( ) contain static values , such as a list of valid codes or the names of cities . Typically, the list is used for validation. A database is a collection of groupings of information that are related to each other in some way. There are many different types of databases that exist on the market today. ( ) is given to those databases which are based on older , sometimes outdated technology that is seldom used to develop new applications . ( ) are collections of records that are related to each other through pointers In relational database , (请作答此空) can be used in ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized.A. identifying relationships
B. normalization
C. referential integrity
D. store procedure
考题
What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router
考题
Some xSeries servers support 4-way memory interleaving and some support 2-way interleaving. In both types of interleaving, the data is accessed 256 bits at a time. How is this 256-bit data access achieved with 2-way interleaving?()A、The DIMMs used for 2-way interleaving are double the width of DIMM used in 4-way interleaving.B、The DIMMs used for 2-way interleaving are 64-bit wide and data bits are accessed both on the rising edge and falling edge of the clock cycle.C、The DIMMs used for 2-way interleaving are 32-bit wide and data bits are accessed both on the rising edge and falling edge of the clock cycle.D、The DIMMs used for 2-way interleaving are double the width and data bits are accessed both on the rising edge and falling edge of the clock cycle.
考题
A customer is planning to migrate a financial application to a 12-way p5-570 system with 96GB of memory. The application data is stored on an ESS Model 800 attached to a p670 server with AIX 5.2. They will have a short outage window to perform the data migration. What is the quickest way to move all the data stored on the attached ESS from the p670 to the new p5-570?()A、Use rsync to synchronize the data across servers.B、Use exportvg and importvg to move the data to the target system.C、Use NFS to copy the data from the source system to the target system.D、Backup the data from the source system and restore to the target system.
考题
A customer with a single IBM System Storage DS8100 reports severe performance problems for some of their applications when a particular data warehousing application creates a heavy load. What is the most cost effective way to resolve this issue()A、add additional disks to the DS8100B、add more cache to the DS8100C、move affected volumes to a different disk enclosureD、implement TPC for Disk to monitor performance
考题
What is the purpose of the magic number in an LCP negotiation?()A、It is used to detect loops.B、It is an interface identifier.C、It selects a compression algorithm.D、It specifies the transmission media.
考题
Name three attributes used to configure a multi-data source in Oracle WebLogic ()A、 Statement Cache TypeB、 Logging Last ResourceC、 Algorithm TypeD、 Failover Request if BusyE、 JNDI Name
考题
You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Analysis Services (SSAS) database. The database contains a data mining structure that uses a SQL Server 2008 table as a data source. A table named OrderDetails contains detailed information on product sales. The OrderDetails table includes a column named Markup. You build a data mining model by using the Microsoft Decision Trees algorithm. You classify Markup as discretized content. The algorithm produces a large number of branches for Markup and results in low confidence ratings on predictable columns. You need to verify whether the Markup values include inaccurate data. What should you do? ()A、 Modify the content type of Markup as Continuous.B、 Create a data mining dimension in the SSAS database from OrderDetails.C、 Create a data profile by using SQL Server 2008 Integration Services (SSIS).D、 Create a cube in SSAS. Use OrderDetails as a measure group. Recreate the data mining structure and mining model from the cube data.
考题
单选题A researcher needs to regularly analyze large quantities of data. They are interested in putting together a cluster of 16 UDB EEE partitions of four processors each for their data mining environment. Each UDB partition needs to be approximately 15 rPerf. Which of the following solutions would best fit their performance needs?()A
p655 4-way nodesB
p655 8-way nodesC
p5-570 4-way nodesD
p5-570 8-way nodes
考题
单选题What is the purpose of the magic number in an LCP negotiation?()A
It is used to detect loops.B
It is an interface identifier.C
It selects a compression algorithm.D
It specifies the transmission media.
考题
单选题You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use?()A
Microsoft ClusteringB
Microsoft Decision TreeC
Microsoft Nave BayesD
Microsoft Association
考题
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Analysis Services (SSAS) database. The database contains a data mining structure that uses a SQL Server 2008 table as a data source. A table named OrderDetails contains detailed information on product sales. The OrderDetails table includes a column named Markup. You build a data mining model by using the Microsoft Decision Trees algorithm. You classify Markup as discretized content. The algorithm produces a large number of branches for Markup and results in low confidence ratings on predictable columns. You need to verify whether the Markup values include inaccurate data. What should you do? ()A
Modify the content type of Markup as Continuous.B
Create a data mining dimension in the SSAS database from OrderDetails.C
Create a data profile by using SQL Server 2008 Integration Services (SSIS).D
Create a cube in SSAS. Use OrderDetails as a measure group. Recreate the data mining structure and mining model from the cube data.
考题
单选题What is the objective of the aaa authentication login console-in local command?()A
It specifies the login authentication method list named console-in using the local user database on the routerB
It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC
It specifies the login authentication list named console-in using the local username- password data base on the routerD
It specifies the login authorization method list named console-in using the local username- password data base on the router
考题
单选题Referring to the exhibit, what is the purpose of the targets section of the configuration?()A
It defines which devices will be sending traps.B
It specifies where to send traps.C
It defines the IP addresses of management systems that can access the device.D
It specifies which devices can be polled for SNMP data.
热门标签
最新试卷