单选题Which of the following describes how to calculate the amount of storage in a RAID 5 array?()ANumber of drives X capacity of the smallest driveB(Number of drives 2) X capacity of the smallest drive CNumber of drives X capacity of the largest driveD(Numb

题目
单选题
Which of the following describes how to calculate the amount of storage in a RAID 5 array?()
A

 Number of drives X capacity of the smallest drive

B

 (Number of drives 2) X capacity of the smallest drive 

C

 Number of drives X capacity of the largest drive

D

 (Number of drives 1) X capacity of the smallest drive


相似考题
更多“Which of the following describes how to calculate the amount”相关问题
  • 第1题:

    Which of the following describes how DB2 9 stores an XML document if the XML Extender is not used?()

    A.CLOB

    B.BLOB

    C.Hierarchically

    D.Rows and columns


    参考答案:C

  • 第2题:

    Which of the following describes how to calculate the amount of storage in a RAID 5 array?()

    • A、 Number of drives X capacity of the smallest drive
    • B、 (Number of drives 2) X capacity of the smallest drive 
    • C、 Number of drives X capacity of the largest drive
    • D、 (Number of drives 1) X capacity of the smallest drive

    正确答案:D

  • 第3题:

    Which of the following BEST describes RAID 10?()

    • A、 Mirroring with striping
    • B、 Mirroring with fault tolerance
    • C、 Striping
    • D、 Striping with distributed parity

    正确答案:A

  • 第4题:

    A server has a processor that allows it to calculate two applications at the same time. Which of the following describes this capability of the processor?()

    • A、Dual processing
    • B、Multi-processing
    • C、Multi-tasking
    • D、Multi-threading

    正确答案:D

  • 第5题:

    Which of the following BEST describes RAID 1?()

    • A、Mirroring
    • B、Striping
    • C、Striping with parity
    • D、Striping with mirroring

    正确答案:A

  • 第6题:

    A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

    • A、Worm
    • B、Smurf
    • C、Logic Bomb
    • D、Man-in-the-middle

    正确答案:B

  • 第7题:

    Which of the following best describes how locks are used in DB2?()

    • A、To maintain control of updated rows for commit processing
    • B、To ensure only committed changes are altered by another application
    • C、To allow two applications to update the same row of data simultaneously
    • D、To prevent multiple applications from accessing the same data simultaneously

    正确答案:B

  • 第8题:

    单选题
    In an iostat report, which of the following options best describes the value of % iowait?()
    A

     The amount of time taken to service an I/O interrupt

    B

     The percentage of time CPU(s) are waiting for page ins

    C

     The percentage of time the CPU9(s) are waiting on network

    D

     The percentage of time the CPU(s) are waiting for outstanding disk I/O requests


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which statement describes how RSVP guarantees bandwidth reservations?()
    A

    It polices each individual session to an explicit rate.

    B

    It does not police, but never allows link oversubscription.

    C

    It polices the aggregate rate of all sessions to an explicit rate.

    D

    It does not police, but limits the amount of reservable bandwidth.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    The amount of fuel delivered for each cycle must be in accordance with the engine load, and the same quantity of fuel must be delivered to each cylinder for each power stroke at that load.Which of the following statements describes this requirement?()
    A

    Proper timing

    B

    Accurate metering

    C

    Suitable injection rate

    D

    Suitable atomization rate


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    A server has a processor that allows it to calculate two applications at the same time. Which of the following describes this capability of the processor?()
    A

     Dual processing

    B

     Multi-processing

    C

     Multi-tasking

    D

     Multi-threading


    正确答案: A
    解析: 暂无解析

  • 第12题:

    Which of the following statements about a lesson plan is inappropriate?

    A.It is a teaching guide.
    B.It is a blueprint to be strictly followed.
    C.It takes into account syllabus and students.
    D.It describes in advance what and how to teach.

    答案:B
    解析:
    考查教案的内涵。此题是问:下列关于教案的表述,哪个是不恰当的 A项意为“它是一项教学指导”;B项意为“它是一项必须严格遵照的计划”;C项意为“它需要考虑到教学大纲和学生”:D项意为“它事先描述了要教什么和怎么教”。A、C、D项分别体现了教案的性质、要求和内容.但教案只是一份教学计划.在实际过程中会因为一些突发状况而随时进行调整,所以B项说“需要严格遵照执行”是不准确的。故选B.

  • 第13题:

    Which statement describes how RSVP guarantees bandwidth reservations?()

    • A、It polices each individual session to an explicit rate.
    • B、It does not police, but never allows link oversubscription.
    • C、It polices the aggregate rate of all sessions to an explicit rate.
    • D、It does not police, but limits the amount of reservable bandwidth.

    正确答案:D

  • 第14题:

    Which of the following describes how many VRM’s would be required in a system with quad Xeon CPU’s?()

    • A、1
    • B、2
    • C、3
    • D、4

    正确答案:D

  • 第15题:

    Which of the following describes how to calculate the amount of storage in a RAID 5 array?()

    • A、Number of drives X capacity of the smallest drive
    • B、(Number of drives 2) X capacity of the smallest drive
    • C、Number of drives X capacity of the largest drive
    • D、(Number of drives 1) X capacity of the smallest drive

    正确答案:A

  • 第16题:

    Which of the following describes an area where communications equipment is stored?()

    • A、HVAC
    • B、MDF
    • C、110 block
    • D、Demarc

    正确答案:B

  • 第17题:

    Which of the following describes how DB2 9 stores an XML document if the XML Extender is not used?()

    • A、CLOB
    • B、BLOB
    • C、Hierarchically
    • D、Rows and columns

    正确答案:C

  • 第18题:

    In an iostat report, which of the following options best describes the value of % iowait?()

    • A、 The amount of time taken to service an I/O interrupt
    • B、 The percentage of time CPU(s) are waiting for page ins
    • C、 The percentage of time the CPU9(s) are waiting on network
    • D、 The percentage of time the CPU(s) are waiting for outstanding disk I/O requests

    正确答案:D

  • 第19题:

    单选题
    A server has a processor that allows it to calculate two applications at the same time. Which of the following describes this capability of the processor?()
    A

    Dual processing

    B

    Multi-processing

    C

    Multi-tasking

    D

    Multi-threading


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following describes a secure connection over the Internet between two sites?()
    A

    FTP

    B

    VLAN

    C

    VPN

    D

    HTTP


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following describes how to calculate the amount of storage in a RAID 5 array?()
    A

    Number of drives X capacity of the smallest drive

    B

    (Number of drives 2) X capacity of the smallest drive

    C

    Number of drives X capacity of the largest drive

    D

    (Number of drives 1) X capacity of the smallest drive


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following describes how many VRM’s would be required in a system with quad Xeon CPU’s?()
    A

    1

    B

    2

    C

    3

    D

    4


    正确答案: C
    解析: 暂无解析