网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following technologies can detect and fix single bit memory errors?()
A
RAID
B
Registered memory
C
SDRAM
D
ECC
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following technologies can detect and fix single bit memory errors?()A RAIDB Registered memoryC SDRAMD ECC” 相关考题
考题
Which two statements are true about the RMAN validate database command?()
A. It checks the database for intrablock corruptions.B. It can detect corrupt pfiles.C. It can detect corrupt spfiles.D. It checks the database for interblock corruptions.E. It can detect corrupt block change tracking files.
考题
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()
A.802.11aB.802.11bC.802.11gD.802.11n
考题
Which of the following technologies can detect and fix single bit memory errors?()
A. RAIDB. Registered memoryC. SDRAMD. ECC
考题
Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A、MPLS TE FRB、MPLS VPNC、BFDD、RSVPE、VPLSF、SNMP
考题
A WORM drive can be equated to which of the following common technologies?()A、 CDRWB、 CDRC、 Flash MediaD、 DVDRW
考题
Which two statements are true about the RMAN validate database command?()A、It checks the database for intrablock corruptions.B、It can detect corrupt pfiles.C、It can detect corrupt spfiles.D、It checks the database for interblock corruptions.E、It can detect corrupt block change tracking files.
考题
Which of the following wireless technologies can operate at only 5GHz?()A、802.11b/gB、802.11gC、802.11bD、802.11a
考题
Which of the following are storage technologies that can be hot swappable?()A、SCSIB、SASC、ATAD、IDEE、CMOS
考题
Which of the following Windows Server 2003 technologies can help with making backups of open files?()A、Differential backupB、SnapshotC、VSSD、Incremental backup
考题
Which of the following virtualization technologies can save time during provisioning?()A、CloningB、SnapshotsC、ClusteringD、Virtual memory
考题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning
考题
Which of the following technologies can detect and fix single bit memory errors?()A、RAIDB、Registered memoryC、SDRAMD、ECC
考题
Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()A、802.11aB、802.11bC、802.11gD、802.11n
考题
Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A、MulticastB、Active/passive clusterC、Active/active clusterD、DNS round robin
考题
A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2. Which of the following virtualization technologies can be used?()A、DLPARB、Micro-PartitioningC、Virtual StorageD、Virtual Ethernet
考题
Which of the following methods can be used to detect block corruption?() A、 ANALYZE operationsB、 dbvC、 SQL queries that access the potentially corrupt blockD、 RMANE、 All of the above
考题
单选题Which of the following Windows Server 2003 technologies can help with making backups of open files?()A
Differential backupB
SnapshotC
VSSD
Incremental backup
考题
多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN
考题
单选题Which of the following nondestructive testing methods can be used to detect a suspected subsurface defect in a tail-shaft liner?()A
Dye penetrantB
Magnetic particleC
UltrasonicD
All of the above
考题
单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A
MPLS TE FRB
MPLS VPNC
BFDD
RSVPE
VPLSF
SNMP
考题
单选题Which of the following technologies can save server space and cooling requirements?()A
Energy star ratingsB
Active solar panelsC
Network storage arrayD
Blade servers
考题
单选题A WORM drive can be equated to which of the following common technologies?()A
CDRWB
CDRC
Flash MediaD
DVDRW
考题
单选题Which of the following methods can be used to detect block corruption?()A
ANALYZE operationsB
dbvC
SQL queries that access the potentially corrupt blockD
RMANE
All of the above
考题
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
考题
多选题Which of the following are storage technologies that can be hot swappable?()ASCSIBSASCATADIDEECMOS
考题
单选题Which of the following wireless technologies can operate at only 5GHz?()A
802.11b/gB
802.11gC
802.11bD
802.11a
考题
单选题Which of the following statements is NOT a characteristic of a welfare state mentioned in this passage?A
Free education is available to a child.B
Laws are made to fix the minimum wage.C
A jobless person can be insured.D
There are regulations for rent.
热门标签
最新试卷