183 The actual configuration of a PERT/CPM network _____ the amount of resources that can be devoted to the project.A. Increases.B. Is not affected byC. Does not requireD. Is heavily dependent uponE. Is the only means of determining

题目

183 The actual configuration of a PERT/CPM network _____ the amount of resources that can be devoted to the project.

A. Increases.

B. Is not affected by

C. Does not require

D. Is heavily dependent upon

E. Is the only means of determining


相似考题
更多“183 The actual configuration of a PERT/CPM network _____ the amount of resources that can be devoted to the project.A. Increases.B. Is not affected byC. Does not requireD. Is heavily dependent uponE. Is the only means of determining”相关问题
  • 第1题:

    ● The critical path is calculated by

    A subtracting the end date of task one from the start date of task two.

    B determining which tasks have the least amount of total slack.

    C totaling the time for all activities.

    D determining the shortest path through the network.

    E Determining which tasks have the most slack


    正确答案:B

  • 第2题:

    ● The first step in building a PERT/CPM network is to:

    A Create a flow chart

    B Determine the critical path

    C Show task relationships

    D Create a work breakdown structure

    E None of the above.


    正确答案:D

  • 第3题:

    PERT和CPM的最根本区别是( )。

    A.CPM的工作逻辑关系肯定,PERT的工作逻辑关系不确定

    B.CPM使用最大可能工作时间估计,PERT使用加权平均时间估计

    C.CPM的工作必须进行,PERT的某些工作可以不进行

    D.CPM不允许存在回路,PERT中可以存在回路


    正确答案:B

  • 第4题:

    Kerberos is a form of user authentication that:()

    A. Provides users access to network resources.

    B. Performs router commands after user authentication.

    C. Provides users with remote access only capabilities.

    D. Does not require an authentication server


    参考答案:A

  • 第5题:

    Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

    A. NAC can authenticate using 802.1X and IBNS cannot

    B. NAC can ensure only compliant machines connect and IBNS cannot

    C. NAC can ensure access to the correct network resources and IBNS cannot

    D. NAC can manage user mobility and reduce overhead costs and IBNS cannot


    参考答案:B

  • 第6题:

    共用题干
    第二篇

    Human and the Earth

    In terms of the evolution of life on Earth,human beings have just arrived.Despite their shori time on Earth,however,people have brought about enormous changes to the surface of the planet一changes far out of proportion to the interval of time they have occupied it.
    People have more control over their surroundings than any other species on Earth.With the combination of intelligence and manual skill(allowing us to make and use tools),people have found ways to use plant and animal resources,mineral ores,fuels,and many other materials and resources from the Earth.
    As the number of people on Earth increases,it becomes increasingly difficult for the population to survive on the resources of the land.The amount of land is limited.Although agricultural production can be increased by use of machinery such as tractors and the addition of fertilizer,the land ultimately can produce only so much food and no more.
    As the human population grows,people consume more.Clearly,some locations on Earth already have too many people;in many of these areas,future increases will surely bring about more poverty and suffering. Yet people in rich nations use proportionally far more of the available resources than people in poorer nations.As they consume these resources without restraint,they also waste large amounts of them.
    People are only a very small fraction of all the living things on the planet.Yet their numbers create a drain on resources that can't be renewed.For example,the amount of water on Earth is limited,this water is cleaned through natural processes.However,the natural processes for filtering water can clean only a certain amount of water by removing the pollution.Likewise,a limited amount of petroleum can be found under the Earth's surface.Petroleum is a valuable resource.Should people use it up to manufacture petrol for automobiles?As people work to control the planet and make life comfortable,are they using up resources that are needed for their survival?

    Which of the following statements about resources on Earth is not correct?
    A:They can not be renewed.
    B:Water is a kind of resource which can not be renewed.
    C:Some of the resources are valuable.
    D:Many resources can be recycled so we don't need to worry about them.

    答案:D
    解析:
    文章第一段第一句话提到“就地球上生命的进化而言,人类是姗姗来迟者”,因此比较而言,人类的历史并不长。选项A是正确的。
    从文章第二段第二句话“With the combination of intelligence and manual skill...”我们知道选项A和B都是正确的,因此选择D项。
    文章第三段提到,土地的总量是有限的。虽然使用拖拉机等机械和施用化肥可以提高农业产量,但是土地最终所能产出的粮食只有那么多,不会再增加。因此只有选项C是正确的。
    文章第四段第三句说富裕国家的人们所使用的能源在比例上远远大于贫穷国家的人们。选项C中提到的“发达国家的人们”最符合题意。
    根据文章最后一段关于资源的描述我们可以发现选项A、B、C都是正确的,只有选项D的表述错误,因此选择D项。

  • 第7题:

    Which two statements are true about using IPv4 and IPv6 simultaneously on a network segment? ()

    • A、IPv6 allows a host to create its own IPv6 address that will allow it to communicate to other devices on a network configured via DHCP. IPv4 does not provide a similar capability for hosts.
    • B、IPv6 provides for more host IP addresses but IPv4 provides for more network addresses.
    • C、Hosts can be  configured to receive both IPv4 and IPv6 addresses via DHCP.
    • D、Host configuration options for IPv4 can be either statically assigned or assigned via DHCP.Host configuration options for IPv6 can be statically assigned only.
    • E、IPv4 and IPv6 addresses c an be simultaneously assigned to a host but not to a router interface.

    正确答案:A,C

  • 第8题:

    Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

    • A、NAC can authenticate using 802.1X and IBNS cannot
    • B、NAC can ensure only compliant machines connect and IBNS cannot
    • C、NAC can ensure access to the correct network resources and IBNS cannot
    • D、NAC can manage user mobility and reduce overhead costs and IBNS cannot

    正确答案:B

  • 第9题:

    Which three statements are true about Cisco IOS Firewall?()

    • A、It can be configured to block Java traffic.
    • B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
    • C、It can only examine network layer and transport layer information.
    • D、It can only examine transport layer and application layer information.
    • E、The inspection rules can be used to set timeout values for specified protocols.
    • F、The ip inspect cbac-name command must be configured in global configuration mode.

    正确答案:A,B,E

  • 第10题:

    A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?()

    • A、Incorrect DNS
    • B、Incorrect subnet mask
    • C、Duplicate IP address
    • D、Incorrect SSID

    正确答案:A

  • 第11题:

    多选题
    Which three statements are true about Cisco IOS Firewall?()
    A

    It can be configured to block Java traffic.

    B

    It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.

    C

    It can only examine network layer and transport layer information.

    D

    It can only examine transport layer and application layer information.

    E

    The inspection rules can be used to set timeout values for specified protocols.

    F

    The ip inspect cbac-name command must be configured in global configuration mode.


    正确答案: A,B,E
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement best describes ACL configuration using configuration session mode on Cisco Nexus switches?()
    A

     The verify command will validate commands entered for syntax errors.

    B

     The save command will save the commands entered to the startup configuration.

    C

     The network administrator can perform a dry-run ACL configuration by verifying the configuration against the hardware and software resources available before applying it.

    D

     Configuration sessions can be saved and resumed at any time, even after upgrading NX-OS Software on the switch with ISSU.

    E

     Configuration sessions are global for all VDCs on the Nexus 7000.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    ● The actual configuration of a PERT/CPM network _____ the amount of resources that can be devoted to the project.

    A Increases.

    B Is not affected by

    C Does not require

    D Is heavily dependent upon

    E Is the only means of determining


    正确答案:D

  • 第14题:

    短文理解

    听力原文: Spot transaction means the actual and variable amount of the currency of one country which at any given time, can be bought for a fixed sum in the currency of another country. It is a term meaning that these transactions are settled on the second working day from the date of the deal. For example, you buy $ 5,000.00 US dollars on October 10th( say Wednesday) , the purchased US dollars will value on October 12th.

    21. What does spot transaction mean?

    22.When are the spot transaction settled?

    23.What's the value date for purchase of $ 5,000.00 US dollars in the passage?

    (21)

    A.It means that at any time you can buy currency of one country for another currency.

    B.It means that the actual and variable amount of one currency can be bought for a fixed sum in another currency at any given time.

    C.It means that any kind of currency can be bought at any time for another currency.

    D.It means that the actual and fixed amount of the currency of one country at any time can be bought for a variable sum in the currency of another currency.


    正确答案:B
    解析:录音原文提到Spot transaction means…can be bought for a fixed sum in the currency of another country.现汇交易意味着一国货币可按照现行汇率确定的数额随时兑换固定数额的他国货币。

  • 第15题:

    Which statement is true for a customer that wants to deploy compression for a circuit rated at 155 Mbps?()

    A. A WX60 cluster can handle 155 Mbps.

    B. WX devices can handle only up to 45 Mbps.

    C. Only a WXC500 or WXC590 can handle this requirement.

    D. A WXC or WX stack configuration deployment is required.


    参考答案:D

  • 第16题:

    A customer needs to create a number of LPARs on a new POWER6 server with some LPARs requiring a dedicated network and other LPARs utilizing Virtual Ethernet via a VIO server.Which limitation must be considered when planning the system configuration?()

    A.A VIO server requires a dedicated LHEA port.

    B.There is a limit of 32 LPARs per virtual LAN.

    C.Two VIO servers will be required. A single VIO server can only provide virtual storage or virtual Ethernet.

    D.Two VIO servers will be required. One to provide virtual networking and another to provide dedicated networking.


    参考答案:A

  • 第17题:

    PERT和CPM的根本区别是( )。

    A.CPM的工作逻辑关系肯定,PERT的工作逻辑关系不确定
    B.PERT使用了加权平均时间估算
    C.CPM的工作必须进行,PERT的某些工作可以不进行
    D.CPM不允许存在回路,PERT中可以存在回路

    答案:B
    解析:
    本题考查的是制定进度计划的方法。PERT和CPM的根本区别在于PERT使用了加权平均时间估算,做出来的进度安排计划要比CPM使用最大可能估算做出的现实。

  • 第18题:

    Which statement best describes ACL configuration using configuration session mode on Cisco Nexus switches?()

    • A、 The verify command will validate commands entered for syntax errors.
    • B、 The save command will save the commands entered to the startup configuration.
    • C、 The network administrator can perform a dry-run ACL configuration by verifying the configuration against the hardware and software resources available before applying it.
    • D、 Configuration sessions can be saved and resumed at any time, even after upgrading NX-OS Software on the switch with ISSU.
    • E、 Configuration sessions are global for all VDCs on the Nexus 7000.

    正确答案:C

  • 第19题:

    A customer needs the ability to recover their data if a total system failure occurs.  Which two of the following are the most important considerations in determining the solution?()

    • A、Network utilization
    • B、Total amount of storage installed
    • C、Amount of open files in the backup
    • D、Amount of critical data in the backup or restore

    正确答案:D

  • 第20题:

    Which two statements are true about network voice traffic? (Choose two.)()

    • A、 Voice traffic is affected more by link speed than FTP traffic is.
    • B、 Voice traffic is affected more by packet delays than FTP traffic is.
    • C、 Voice streams involve larger packet sizes than most TCP network traffic involves.
    • D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.
    • E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

    正确答案:B,D

  • 第21题:

    Kerberos is a form of user authentication that:()

    • A、Provides users access to network resources.
    • B、Performs router commands after user authentication.
    • C、Provides users with remote access only capabilities.
    • D、Does not require an authentication server

    正确答案:A

  • 第22题:

    A customer needs to create a number of LPARs on a new POWER6 server with some LPARs requiring a dedicated network and other LPARs utilizing Virtual Ethernet via a VIO server. Which limitation must be considered when planning the system configuration?()

    • A、A VIO server requires a dedicated LHEA port.
    • B、There is a limit of 32 LPARs per virtual LAN.
    • C、Two VIO servers will be required. A single VIO server can only provide virtual storage or virtual Ethernet.
    • D、Two VIO servers will be required. One to provide virtual networking and another to provide dedicated networking.

    正确答案:A

  • 第23题:

    单选题
    Which statement is true for a customer that wants to deploy compression for a circuit rated at 155 Mbps?()
    A

    A WX60 cluster can handle 155 Mbps.

    B

    WX devices can handle only up to 45 Mbps.

    C

    Only a WXC500 or WXC590 can handle this requirement.

    D

    A WXC or WX stack configuration deployment is required.


    正确答案: A
    解析: 暂无解析