网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
That sailor wants to use the ()(钢锯).
A
hack saw
B
saw
C
spanner
D
file
参考答案
参考解析
解析:
暂无解析
更多 “单选题That sailor wants to use the ()(钢锯).A hack sawB sawC spannerD file” 相关考题
考题
You plan to install Windows 2000 Server on 10 new computers. These servers will provide file and print services in branch offices of Ezonexam.com. The company wants each branch office to purchase its own copy of Windows 2000 Server, and the installation in each branch office should use the serial number associated with the branch office's own copy.You want to install, configure, and test Windows 2000 Server on these computers at the main office before shipping the computers to the branch offices. You want users in the branch office to enter the computer names and serial numbers when they receive the computers.What should you do?A.Install Windows 2000 Server on the computers by using an unattend.txt file, and then use the registry editor to remove the computer name and license details.B.Start the installation process from an MS-DOS boot disk. Install Windows 2000 Server on the computers from an existing server by running the Winnt command with the PreInst switch.C.Install Windows 2000 Server on the computers, and then use Setup Manager to create a sysprep.inf file for sysprep.exe. Place the sysprep.inf file on the computers and run the sysprep-nosidgen command.D.Create an unattend.txt file by using Setup Manager. Include the following line in the unattend.txt file. emPrenistall=YES. Use this file to perform. the installation.
考题
有如下命令序列: SELECT 1 USE FILEl LIST CLOSE DATABASE SELECT 0 USE FILE2 LIST SELECT 0 USE FILE3 LIST SELECT 0 USE FILE4 执行以上命令序列后,FILE4所在的工作区是______。A.第1区B.第2区C.第3区D.第4区
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING
考题
The administrator wants to backup the existing VIO server software and its current configuration before applying an update. What command will the administrator use to backup the VIO server software so that the backup can be restored from a Network Installation Manager (NIM) server or a Hardware Management Console (HMC)?()A、 mksysb -t vio /mountpointB、 backupios -file /mountpointC、 mksysb -i /mountpoint/vio.mksysbD、 backupios -mksysb -file /mountpoint/vio.mksysb
考题
When you want to saw metal, ()will be used.A、the hack sawB、the hand sawC、the wood working sawD、wood saw
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING
考题
A customer purchased a new PC with Windows XP but wants to run a program designed forWindows 98. Which of the following will allow this program to run under Windows XP?()A、Change the file permissions for the executable file.B、Use the convert utility to change the attributes of the executable file.C、Make sure that Windows XP has FAT32 file system.D、Run the executable file under compatibility mode.
考题
tony wants to create a duplicate of the video application. He wants to keep a version of the data on the same server as the production application but does not want any new documents or documents modifications to be replicated into his new database once he creates it. Which one of the following should tony do to create his archive?()A、create a new copy of the databaseB、create a replica of the databaseC、Use the windows explorer to create a copy of the database file.D、Create a replica copy of the database and disable replication on the database file.
考题
An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this?()A、auditB、syslogC、TCBD、sysck
考题
An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi
考题
You have a large amount of historical data in a flat file. Some analysts in your organization need toquery this data in the file. The file is too large to load the data in it into your current database. Which is the most effective method to access this data in your database()A、Use the database link.B、Use the SQL*Loader utility.C、Use the Oracle Data Pump utility.D、Create an external table and leave the data in the flat file
考题
ou have a large amount of historical data in a flat file. Some analysts in your organization need to query thisdata in the file. The file is too large to load the data in it into your current database. Which is the most effectivemethod to access this data in your database()A、Use the database link.B、Use the SQL*Loader utility.C、Use the Oracle Data Pump utility.D、Create an external table and leave the data in the flat file
考题
You are the administrator of your company’s network. A user named Tom in the art department wants to update his Windows 2000 Professional computer so that he can view graphics at the highest resolution. Tom downloads a video card driver from the Internet and then asks of your assistance in installing it. You are unsure of the source of driver. You want to ensure that Tom does not loose productive time because of the incompatible driver. What should you do?()A、Install the driver in the computer. Save after installing the driver. Restart the computer, then use the last known good configuration to recover the original driverB、Install the driver in the computer. Save after installing the driver, use hardware troubleshooter then use Recovery Console to recover the original driverC、Display the advance attributes a parallel works for video card driver file. Install the file, if the contents have been securedD、Run file signature verification survey to verify that the driver has a digital signature. Do not install otherwise.
考题
You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A、Use IPSec in transport modeB、Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C、Use PEAP-EAP-TLSD、Use Encrypting File System (EFS) remote encryption
考题
单选题An administrator suspects someone is modifying a sensitive file, and wants to log access information for this file. Which of the following AIX component accomplishes this()A
auditB
syslogC
TCBD
sysck
考题
单选题A customer purchased a new PC with Windows XP but wants to run a program designed forWindows 98. Which of the following will allow this program to run under Windows XP?()A
Change the file permissions for the executable file.B
Use the convert utility to change the attributes of the executable file.C
Make sure that Windows XP has FAT32 file system.D
Run the executable file under compatibility mode.
考题
单选题A hospital customer with an experienced AIX and Microsoft Windows staff wants to consolidate all of their file/print services onto fewer systems. They currently use multiple Microsoft Windows-based Intelsystems that are experiencing reliability problems. They also have POWER4+ systems that are running multiple AIX LPARs that have experienced no reliability issues. They need at least 99.99% uptime. Which solution will meet their uptime needs at the lowest cost?()A
Combine the file/print servers onto a larger Intel-based machine (x445).B
Bring up a Linux LPAR on the pSeries and run Samba to provide file/print services.C
Bring up another AIX LPAR on the pSeries and run Samba to provide file/print services.D
Bring up another AIX LPAR on the pSeries and run Connect Direct to provide file/print services.
考题
单选题You are the administrator of your company’s network. A user named Tom in the art department wants to update his Windows 2000 Professional computer so that he can view graphics at the highest resolution. Tom downloads a video card driver from the Internet and then asks of your assistance in installing it. You are unsure of the source of driver. You want to ensure that Tom does not loose productive time because of the incompatible driver. What should you do?()A
Install the driver in the computer. Save after installing the driver. Restart the computer, then use the last known good configuration to recover the original driverB
Install the driver in the computer. Save after installing the driver, use hardware troubleshooter then use Recovery Console to recover the original driverC
Display the advance attributes a parallel works for video card driver file. Install the file, if the contents have been securedD
Run file signature verification survey to verify that the driver has a digital signature. Do not install otherwise.
考题
单选题The administrator wants to backup the existing VIO server software and its current configuration before applying an update. What command will the administrator use to backup the VIO server software so that the backup can be restored from a Network Installation Manager (NIM) server or a Hardware Management Console (HMC)?()A
mksysb -t vio /mountpointB
backupios -file /mountpointC
mksysb -i /mountpoint/vio.mksysbD
backupios -mksysb -file /mountpoint/vio.mksysb
考题
单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A
/tmpB
/var/preserveC
/var/tmp/$USERD
$HOME/.vi
考题
单选题A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A
DHCPB
ARPC
DNSD
PING
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题That sailor wants to use the ()(钢锯).A
hack sawB
sawC
spannerD
file
热门标签
最新试卷