itgle.com
更多“ON-OFF information can be represented by _____ signal. A、a digitalB、an analogC、a discreteD、a control”相关问题
  • 第1题:

    Which two statements are correct about firewall filters in the Junos OS?()

    A. Firewall filters are stateless.

    B. Firewall filters are used to control routing information that is exchanged between devices.

    C. Firewall filters are used to control traffic passing through the device.

    D. Firewall filters can only be applied to traffic entering the device.


    参考答案:A, C

  • 第2题:

    Which statements are true regarding ISDN channels?()

    A. Each B channel can transmit up to 64 kbps

    B. The ISDN B channel carries voice or data

    C. The ISDN D channel transmits control information.

    D. The D channel transmission rate varies depending on the service used.

    E. HDLC or PPP can be used to encapsulate D channel information.


    参考答案:A, B, C

  • 第3题:

    Identity two advantages of using a recovery catalog in-load of the control File of the target database Recovery Manager (RMAN).()

    • A、 You can use RMAN stored scripts.
    • B、 Recovery is faster if data is stored in catalog in addition to the control file.
    • C、 You can store backup Information of all registered databases in one place.
    • D、 Database backups are automatically deleted when they are older than the specified time period.

    正确答案:A,C

  • 第4题:

    DCS中D代表的英文单词是()。

    • A、Digital
    • B、Distributed
    • C、Discrete
    • D、Diagnose

    正确答案:B

  • 第5题:

    In an iostat report, which of the following options best describes the value of % tm_act?()

    • A、 The total CPU usage for this drive
    • B、 The bandwidth utilization of the indicated drive
    • C、 It can best be represented by the equation (%iowait - %ioidle)
    • D、 It can best be represented by the equation (kilobytes read/kilobytes written) *100

    正确答案:B

  • 第6题:

    Which statements are true regarding ISDN channels?()

    • A、Each B channel can transmit up to 64 kbps
    • B、The ISDN B channel carries voice or data
    • C、The ISDN D channel transmits control information.
    • D、The D channel transmission rate varies depending on the service used.
    • E、HDLC or PPP can be used to encapsulate D channel information.

    正确答案:A,B,C

  • 第7题:

    After Microsoft Windows boots, a message appears stating that a service failed to start. Which of the following can be used to find more information about this error?()

    • A、Disk Manager
    • B、Control Panel
    • C、Start Menu
    • D、Event Viewer

    正确答案:D

  • 第8题:

    Where can you obtain information about full database backup set created using RMAN, if the control file was used as the repository?()

    • A、V$BACKUPSET
    • B、RC_DATABASE
    • C、V$BACKUP_SET
    • D、RC_BACKUP_SET

    正确答案:C

  • 第9题:

    Indentify two advantages of using recovery catalog instead of the control file of the database in Recovery Manager (RMAN).()

    • A、 You can use RMAN stored scripts
    • B、 Recovery is faster if data is stored in catalog in addition to the control file
    • C、 You can store backup information of all registered databases in one place
    • D、 Database backups are automatically deleted when they are older than the specified time period

    正确答案:A,C

  • 第10题:

    单选题
    Where can you obtain information about full database backup set created using RMAN, if the control file was used as the repository?()
    A

    V$BACKUPSET

    B

    RC_DATABASE

    C

    V$BACKUP_SET

    D

    RC_BACKUP_SET


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which statements are true regarding ISDN channels?()
    A

    Each B channel can transmit up to 64 kbps

    B

    The ISDN B channel carries voice or data

    C

    The ISDN D channel transmits control information.

    D

    The D channel transmission rate varies depending on the service used.

    E

    HDLC or PPP can be used to encapsulate D channel information.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    单选题
    Information on shipping movements can be()by radio from Dover Port Control.
    A

    got

    B

    made

    C

    obtained

    D

    taken


    正确答案: C
    解析: 暂无解析

  • 第13题:

    We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.

    The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)

    A.a binary code

    B.words

    C.registers

    D.positional values


    正确答案:A

  • 第14题:

    Information on shipping movements can be______by radio from Dover Port Control.

    A.got

    B.made

    C.obtained

    D.Taken


    正确答案:C
    船舶运输的信息能够通过Dover港口管制被获得。

  • 第15题:

    Which of the following utilities can be used to determine the current partition information on an attached storage device?()

    • A、Add Hardware Wizard
    • B、Device Manager
    • C、Disk Management
    • D、Control Panel

    正确答案:C

  • 第16题:

    DCS中D代表英文单词是()。

    • A、Digital
    • B、Distributed
    • C、Discrete
    • D、Diagnose

    正确答案:B

  • 第17题:

    机架式协议转换器(ERM01)表示近端打环的指示灯是()

    • A、local digital
    • B、local analog
    • C、remote
    • D、pattern

    正确答案:B

  • 第18题:

    What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()

    • A、The best match of the ACL entries will be used for granularity of control.
    • B、They use source IP information for matching operations.
    • C、They use source and destination IP information for matching operations.
    • D、They use source IP information along with protocol-type information for finer granularity of control.

    正确答案:B

  • 第19题:

    You are maintaining your database in Oracle10g. You are not using the recovery catalog to maintain the backup information of your database. Which file can be used as a repository to store information regarding the RMAN backup?()

    • A、 online redo log files
    • B、 alert log files
    • C、 control file
    • D、 datafiles associated with the SYSTEM tablespace

    正确答案:C

  • 第20题:

    Indentify two advantages of using recovery catalog instead of the control file of the database in RecoveryManager (RMAN).()(Choose two.)

    • A、You can use RMAN stored scripts
    • B、Recovery is faster if data is stored in catalog in addition to the control file
    • C、You can store backup information of all registered databases in one place
    • D、Database backups are automatically deleted when they are older than the specified time period

    正确答案:A,C

  • 第21题:

    单选题
    RMAN automatically propagate information about the database structure, archived redo logs, backup sets, and data file copies into the recovery catalog from the target database’s control file. This information can also be propagated to the catalog manually by using the ()command.
    A

    LIST

    B

    SWITCH

    C

    VALIDATE

    D

    CONFIGURE

    E

    RESYNC CATALOG

    F

    UPGRADE CATALOG


    正确答案: F
    解析: 暂无解析

  • 第22题:

    单选题
    In an iostat report, which of the following options best describes the value of % tm_act?()
    A

     The total CPU usage for this drive

    B

     The bandwidth utilization of the indicated drive

    C

     It can best be represented by the equation (%iowait - %ioidle)

    D

     It can best be represented by the equation (kilobytes read/kilobytes written) *100


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()
    A

    The best match of the ACL entries will be used for granularity of control.

    B

    They use source IP information for matching operations.

    C

    They use source and destination IP information for matching operations.

    D

    They use source IP information along with protocol-type information for finer granularity of control.


    正确答案: C
    解析: 暂无解析