The most widely used LAN system is ______ which adopts a form. of access known as CSMA-CD.
A.Ethemet
B.ATM
C.FDDI
D.Wireless
第1题:
有如下SQL SELECT语句 SELECT*FORM. 工资表 WHERE 基本工资<=2000 AND 基本工资>=1500 下列与该语句等价的
A.SELECT*FORM. 工资表 WHERE 基本工资 BETWEEN 1500 AND 2000
B.SELECT*FORM. 工资表 WHERE 基本工资 BETWEEN 2000 AND 1500
C.SELECT*FORM. 工资表 WHERE 基本工资 FROM1500 INTO 2000
D.SELECT*FORM. 工资表 WHERE 基本工资 FROM 2000 INTO 1500
第2题:
有下列SQL SELECT语句: SELECT * FORM. 成绩表 WHERE 物理 BETWEEN 80 AND 90 下列与该语句等价的( )。
A.SELECT * FORM. 成绩表 WHERE 物理<=90 AND 物理 >=80
B.SELECT * FORM. 成绩表 WHERE 物理 <90 AND 物理>80
C.SELECT * FORM. 成绩表 WHERE 物理>=90 AND 物理<=80
D.SELECT * FORM. 成绩表 WHERE 物理>90 AND 物理<80
第3题:
Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an(66)from a friend who asks you to open it. This is what happens with Melissa and several other similar email(67).Upon running, such worms usually proceed to send themselves out to email addresses from the victim' s address book ,previous emails, web pages(68).
As administrators seek to block dangerous email attachments through the recognition of well- known (69), virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to . bat and . cnd plus a whole list of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the(70)access to your network.
A.attachment
B.paeket
C.datagram
D.message
第4题:
阅读下列代码 public class Test2005{ public static void main(String args[]){ String s="Test"; switch(s){ case"Java":System.out.print("Java"); break; case"Language":System.out.print("Lan- guage"); break; case"Test":System.out.print("Test"); break; } } } 其运行结果是( )。
A.Java
B.Language
C.Test
D.编译时出错
第5题:
CompanycomwantstoapplyaPTFtothep5590system.Afterdoingapreviewinstall,theoutputshowsthereisinsufficientspaceinthe/usrfilesystem.Therootvolumegrouphasnoavailablephysicalpartitionsleft.Theydonotwanttoaddadditionaldiskdrivestothesystem,buthaveajfs2filesystemthatisonly8%used.Whatcouldtheydotoutilizespaceinthejfs2filesystemtoapplythisPTF?()
A.Backupthefilesystemandrecreatesmaller
B.Usethechfstoreducethefilesystemsize
C.Usecplvtocopyfilesystemtosmallersize
D.Usemigratepvtocopyfilesystemtosmallersize
第6题: