A. It enables an attacker to perform an IP sweep of devices.
B. It enables a hacker to know which operating system the system is running.
C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
D. It creates a ping of death and can cause the entire network to be infected with a virus.
第1题:
与“SELECT*FROM教师表INTO DBF A”等价的语句是( )。
A.SELECT*FROM教师表TO DBF A
B.SELECT*FROM教师表TO TABLE A
C.SELECT*FROM教师表INTO TABLE A
D.SELECT*FROM教师表INTO A ,
第2题:
People differ______one another______their ability to handle stress.
A.from…to
B.from…in
C.for…in
D.in…from
第3题:
下列SQL语句中,能够完成并运算的是()。
ASELECT * FROM 篮球爱好者 UNION SELECT * FROM 足球爱好者
BSELECT * FROM 篮球爱好者 INTERSECT SELECT * FROM 足球爱好者
CSELECT * FROM 篮球爱好者 EXCEPT SELECT * FROM 足球爱好者
DSELECT * FROM 篮球爱好者 ,足球爱好者
第4题:
( 30 )与 “ SELECT * FROM 教师表 INTO DBF A ” 等价的语句是
A ) SELECT * FROM 教师表 TO DBF A
B ) SELECT * FROM 教师表 TO TABLE A
C ) SELECT * FROM 教师表 INTO TABLE A
D ) SELECT * FROM 教师表 INTO A
第5题:
第6题:
设ADOrs为Recordset对象,从“学生基本情况表”中获取所有记录的语句是()。
AADOrs.Open“select * From 学生基本情况表”
BADOrs.Execute“select * From 学生基本情况表”
CADOrs.New“select * From 学生基本情况表”
DADOrs.Select “select * From 学生基本情况表”