网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

7、利用源码包安装程序时,如果在./configure 这出现如下错误提示"configure: error: no acceptable C compiler found in $PATH" 该怎么办?


参考答案和解析
ABCD
更多 “7、利用源码包安装程序时,如果在./configure 这出现如下错误提示"configure: error: no acceptable C compiler found in $PATH" 该怎么办?” 相关考题
考题 xampp安装后,在ie输入地址后,页面出现Object not found!和Error 40怎么回事???

考题 Your network consists of a single domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You need to ensure that users’ personal settings are the same when they log on to different client computers in the domain.What should you do? ()A. From the properties of each user account, configure a profile path.B. From the properties of each user account, configure a home folder path.C. From the Default Domain Policy, configure a logon script that runs Loadstate.exe.D. From the Default Domain Policy, configure a logon script that runs Scanstate.exe.

考题 安装源代码发布软件包时,在使用./configure命令配置时,如果需要将软件安装到指定的目录可以使用参数()A.--prefixB.--directoryC.--temporaryD.--install

考题 zemax2009破解版在win7系统上安装,点击破解文件时出现如下错误: opening sentinelfilter :error 6 老是出现这样的问题,请问怎样解决

考题 在RHEL5系统中,通过源码编译的方式构建php环境时“./configure”的()选项用于设置php.ini配置文件存放的路径。() A.--enable-mbstringB.--with-apxs2C.--with-mysqlD.--with-config-file-path

考题 在Red Hat Enterprise linux 5系统中,可以采用的软件包安装方式有()。A、源码安装B、rpm包安装C、直接执行二进制文件D、利用APT工具安装E、利用yum工具安装

考题 在linux系统中,以下软件包安装方式最复杂的是()。A、源码安装B、rpm包安装C、直接执行二进制文件安装D、利用yum工具安装

考题 V2.0开票系统安装过程中,提示“NSIS_Error”,是什么原因()。A、操作系统问题B、安装包不完整C、税号输入错误D、中病毒

考题 An administrator is configuring an application monitor. Upon encountering an unrecoverable error the administrator does not want the resource group to failover. How can the application monitor be configured toachieve this?()A、Configure the application monitor with a restart count of 0B、Configure the application monitor with a monitor mode of NotifyC、Configure the application monitor with a notify method of MonitorD、Configure the application monitor with a failure action of Notify

考题 安装源代码发布软件包时,在使用./configure命令配置时,如果需要将软件安装到指定的目录可以使用参数()。A、--prefixB、--directoryC、--temporaryD、--install

考题 包的不正确的共享名将带来什么样的结果()A、“Network path not found”(未找到网络路径)消息B、文件位置的提示C、没有任何警告信息,安装失败D、“Insufficient rights”(权限不足)消息

考题 安装源代码发布软件包时,以下命令顺序正确的是:()A、make;make install;make clean;./configureB、./configure;make install;make clean;makeC、make install;make clean;make;./configureD、./configure;make;make install;make clean

考题 In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic.    What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()A、Configure a Work Manager for the MDB with a Maximum Thread Constraint.B、Configure a Work Manager for the MDB with a Minimum Thread Constraint.  C、Configure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity Constraint. D、Configure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. E、Configure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.

考题 安装源代码发布软件包时,以下命令顺序正确的是()。A、./configure;make;makeinstall;makecleanB、./configure;makeinstall;makeclean;makeC、make;makeinstall;makeclean;./configureD、makeinstall;makeclean;make;./configure

考题 You are designing a Windows Azure web application that does not use ASP.NET.   The application requires a standalone Win32 interpreter.  You need to recommend an approach for allowing access to the interpreter.  What should you recommend?()A、 Use a web role.  Configure the interpreter as an ISAPI filter.B、 Use a web role.  Configure a FastCGI handler for the interpreter and set the path to the interpreter.C、 Use a worker role with an internal endpoint.  Enable native code execution.D、 Use a worker role with an external endpoint.  Configure a FastCGI handler for the interpreter and set the path to the root.

考题 You want to configure your Windows 2000 Professional computer to remotely access your company's Windows 2000 Routing and Remote Access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to Secure Server.  When you try to connect, you receive the following error message, "The encryption attempt failed because no valid certificate was found."  What should you do to connect to the server? ()A、Enable the VPN connection to use MS-CHAP.B、Change the data encryption setting toOptional Encryption.C、Specify a TCP/IP address in theNetworkproperties.D、Change the IPSec policy setting toClient.

考题 You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log  Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers, configure a custom view. Configure a custom task for the application error events.B、On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.D、On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.

考题 You configure a W2kPro with static IP. You found an error in DNS server address. You configure DNS address to 10.1.1.5. But the W2kPro is still unable to connect to the network resource by name. You run ipconfig /all and see that DNS server address is:0.0.0.0 What do you do? ()A、Stop and Restart DNS client service.B、Add 10.1.1.5 to DNS server list on TCP/IP advanced properties tab.  C、Add A (host) record for the computer to the DNS server zone file.  D、Configure DHCP server to have a DNS server address of 10.1.1.5

考题 You have a computer that runs Windows 7. You have a third-party application. You need to ensure that onlya specific version of the application runs on the computer. The solution must ensure that all applicationrestrictions are based on the application vendor s digital signature.  What should you do?()A、From Application Control Policies, configure a path rule.B、From Application Control Policies, configure a publisher rule.C、From Software Restriction Policies, configure a path rule.D、From Software Restriction Policies, configure a certificate rule.

考题 You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?() A、On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. B、Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. C、Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. D、On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive. 

考题 单选题You have a computer that runs Windows 7. You have a third-party application. You need to ensure that onlya specific version of the application runs on the computer. The solution must ensure that all applicationrestrictions are based on the application vendor s digital signature.  What should you do?()A From Application Control Policies, configure a path rule.B From Application Control Policies, configure a publisher rule.C From Software Restriction Policies, configure a path rule.D From Software Restriction Policies, configure a certificate rule.

考题 多选题在Red Hat Enterprise linux 5系统中,可以采用的软件包安装方式有()。A源码安装Brpm包安装C直接执行二进制文件D利用APT工具安装E利用yum工具安装

考题 单选题You want to configure your Windows 2000 Professional computer to remotely access your company’s Windows 2000 routing and remote access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to secure server. When you try to connect, you receive the following error message, “The encryption attempt failed because no valid certificate was found.” What should you do to connect to the server? ()A Enable the VPN connection to use MS-CHAP.B Change the data encryption setting to Optional Encryption.C Specify a TCP/IP address in the network properties.D Change the IPSec policy setting to Client.

考题 单选题在linux系统中,以下软件包安装方式最复杂的是()。A 源码安装B rpm包安装C 直接执行二进制文件安装D 利用yum工具安装

考题 单选题Your network consists of a single domain. All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You need to ensure that users’ personal settings are the same when they log on to different client computers in the domain. What should you do? ()A From the properties of each user account, configure a profile path.B From the properties of each user account, configure a home folder path.C From the Default Domain Policy, configure a logon script that runs Loadstate.exe.D From the Default Domain Policy, configure a logon script that runs Scanstate.exe.

考题 单选题You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log  Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()A On all the computers, configure a custom view. Configure a custom task for the application error events.B On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.C On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.D On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.

考题 单选题You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?()A On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. B Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. C Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. D On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive. 

考题 单选题安装源代码发布软件包时,以下命令顺序正确的是()。A ./configure;make;makeinstall;makecleanB ./configure;makeinstall;makeclean;makeC make;makeinstall;makeclean;./configureD makeinstall;makeclean;make;./configure