When using CHKDSK, which of the following parameters locks the volume, locates bad sectorsand recovers readable information?()A、/rB、/fC、/iD、/x

题目

When using CHKDSK, which of the following parameters locks the volume, locates bad sectorsand recovers readable information?()

  • A、/r
  • B、/f
  • C、/i
  • D、/x

相似考题
更多“When using CHKDSK, which of the ”相关问题
  • 第1题:

    In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()

    • A、PSK authentication
    • B、EAP authentication
    • C、WPA authentication
    • D、Web authentication

    正确答案:D

  • 第2题:

    When using Device Manager, a red ‘X” indicates which of the following?()

    • A、Device is disabled
    • B、Device conflict
    • C、No device driver found
    • D、Device has not been digitally signed

    正确答案:A

  • 第3题:

    Which of the following commands would be used to verify the integrity of critical system files?()

    • A、verify
    • B、nslookup
    • C、sfc
    • D、chkdsk

    正确答案:C

  • 第4题:

    Which of the following would BEST optimize a computer that is heavily used? ()

    • A、Scandisk
    • B、Defrag
    • C、Indexing
    • D、Chkdsk

    正确答案:B

  • 第5题:

    Which of the following menus are available when a user with the Seller role is using WebSphere Commerce Accelerator to manage a B2C store?()

    • A、Logistics
    • B、Merchandise
    • C、Operations
    • D、Products
    • E、Sales

    正确答案:B,C

  • 第6题:

    In which situation would you use static database registration for a listener()

    • A、when multiple databases are to be registered with the listener
    • B、when DBAs need to connect remotely to start up the database instance
    • C、when users need to connect the database instance using the host naming method
    • D、when the database instance that is to be registered with the listener is configured in shared server mode

    正确答案:B

  • 第7题:

    单选题
    A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()
    A

    Replace the computer.

    B

    Run chkdsk /f.

    C

    Update the virus signatures.

    D

    Run scandisk.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Which statement concerning the lashings of containers with solid bar or wire rope lashings is TRUE? ()
    A

    Stack weights should be less when using a solid bar lashing as compared to a wire lashing

    B

    Stack heights may be increased when using a solid bar lashing

    C

    Stack heights should be reduced when using a solid bar lashing

    D

    Solid bars should be used for lashing the first tier only,with wire lashings on the higher tier(s)


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    When using CHKDSK, which of the following parameters locks the volume, locates bad sectorsand recovers readable information?()
    A

    /r

    B

    /f

    C

    /i

    D

    /x


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    When defining resources for a concurrent resource group, which of the following is NOT  supported?()
    A

     Application Servers using disk

    B

     Definition of Multiple IP aliases

    C

     Volume Groups using raw logical volumes

    D

     Volume Groups supporting concurrent access


    正确答案: B
    解析: 暂无解析

  • 第11题:

    Two Company switches are connected via a trunk using VTP. Which VTP information does a  Catalyst switch advertise on its trunk ports when using VTP?()

    • A、STP root status
    • B、VTP mode
    • C、Negotiation status
    • D、Management domain
    • E、Configuration revision number

    正确答案:D,E

  • 第12题:

    A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()

    • A、Run chkdsk.
    • B、Run an antivirus program.
    • C、Replace the faulty mouse.
    • D、Remove any recently added hardware.

    正确答案:B

  • 第13题:

    Which of the following is eliminated when using SATA instead of PATA technology?()

    • A、Jumper selection
    • B、Power connector
    • C、Data port connector
    • D、Hard drive LEDs

    正确答案:A

  • 第14题:

    When defining resources for a concurrent resource group, which of the following is NOT  supported?()   

    • A、 Application Servers using disk
    • B、 Definition of Multiple IP aliases
    • C、 Volume Groups using raw logical volumes
    • D、 Volume Groups supporting concurrent access

    正确答案:B

  • 第15题:

    Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()

    • A、When using versions of Java technology earlier than 5.0.
    • B、When sharing a StringBuffer among multiple threads.
    • C、When using the java.io class StringBufferInputStream.
    • D、When you plan to reuse the StringBuffer to build more than one string.

    正确答案:A,B

  • 第16题:

    In which situation would you use the Oracle Shared Server configuration?()

    • A、when performing export and import using Oracle Data Pump
    • B、when performing backup and recovery operations using Oracle Recovery Manager
    • C、when performing batch processing and bulk loading operation in a data warehouse environment 
    • D、in an online transaction processing (OLTP) system where large number of client sessions are idle most of the time

    正确答案:D

  • 第17题:

    单选题
    When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()
    A

    snoop

    B

    tcpdump

    C

    monitor

    D

    tail


    正确答案: A
    解析: 暂无解析

  • 第18题:

    多选题
    Two Company switches are connected via a trunk using VTP. Which VTP information does a  Catalyst switch advertise on its trunk ports when using VTP?()
    A

    STP root status

    B

    VTP mode

    C

    Negotiation status

    D

    Management domain

    E

    Configuration revision number


    正确答案: A,C
    解析: 暂无解析

  • 第19题:

    多选题
    Which of the following menus are available when a user with the Seller role is using WebSphere Commerce Accelerator to manage a B2C store?()
    A

    Logistics

    B

    Merchandise

    C

    Operations

    D

    Products

    E

    Sales


    正确答案: E,B
    解析: 暂无解析

  • 第20题:

    单选题
    In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()
    A

    VIP is not required when using only agentless access for all endpoint platforms.

    B

    VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.

    C

    VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.

    D

    VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.


    正确答案: A
    解析: 暂无解析