第1题:
method is the use of a data processing system to represent selected behavioral(67)of a physical or abstract system. For example, the representation of air streams around airfoils at various velocities, temperatures, and air pressures with such a system.Emulation method is slightly different, it uses a data processing system to imitate another data processing system, so that the imitating system accepts the same data, executes the same programs, and achieves the same(68) as the imitated system. Emulation is usually achieved(69) hardware or firmware. In a network, for example, microcomputers might emulate terminals(70) communicate with mainframe.
A.Assembly
B.Simultaneity
C.Fraud
D.Simulation
第2题:
The(71)has several major components, including the system kernel, a memory management system, the file system manager, device drivers, and the system libraries.
A.application
B.information system
C.operating system
D.information processing
第3题:
Word processing software is used to creat edit,save and print (74)
A.photos
B.graphics
C.documents
D.spreadsheets
第4题:
What is the purpose of a network mask?()
第5题:
Which of the following IBM solutions protect system operations from a hardware failure by automatically moving services from a failing system to another system?()
第6题:
The System Administrator has set up shared processors on three partitions in the p5 590 system. The shared processors have been set to uncapped. The system administrator notices that the logical partition is acting like it is capped. What is the most probable cause?()
第7题:
Change the language preference from English to Spanish within the word processing Program.
Install the Spanish version of Windows 2000 Professional. Reconfigure your language settings, and restart the word processing program.
Save and close the word processing program. Select Spanish by using the locate indicator on the taskbar, and restart the word processing program.
Save and close the word program. Log off and log on to the computer. Restart the Word processing program, and select Spanish by using the locale indicator on the taskbar.
第8题:
chilled water temperature
dew point temperature
primary air temperature
dry bulb temperature
第9题:
IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
IDP inspects traffic up to the Presentation layer.
IDP inspects traffic up to the Application layer.
第10题:
consists of 5 or more short blasts of the fog signal apparatus
consists of the raising and lowering of a large white flag
may be used individually or in conjunction with other distress signals
is used to indicate doubt about another vessel's intentions
第11题:
It is used in conjunction with the wildcard mask to determine the number of hosts on a network
It is used to define which parts of the IP address are allocated to host addresses and network prefixes
It is used to hide subnets from external networks by masking the subnets with NAT
It is used to differentiate a network as a classful network or a classless network
第12题:
The uncapped weight has been set to 0.
The uncapped weight has been set to 128.
The processing unit for that partition was set to .1 processing units. A full processor was assigned.
The processing unit for that partition was set to 0.50 processing units. A full processor was assigned.
第13题:
The program memory serves basically as a place(66)instructions, the coded pieces of data(67)direct the activities of the control processing unit(CPU). A group of(68)related in- structions stored in memory is referred to as a program. The CPU "read" each instruction from memory a logically(69)sequence and "use" it to initiate program action. If the program structure is coherent and(70), processing procedures produce intelligible and useful results.
A.stored
B.to store
C.to be stored
D.storing
第14题:
program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.
A.Worm
B.Virus
C.Disaster
D.Demon
第15题:
Transverse frames are more widely spaced on a ship that is designed with the ______.
A.Centerline system of framing
B.Isometric system of framing
C.Longitudinal system of framing
D.Transverse system of framing
第16题:
A user can no longer launch their word processing program. The program worked fine yesterday.Which of the following options could BEST be used to fix the word processing program?()
第17题:
When a system has both online transaction processing as well as large batch processing, which of the following common procedures will best help to improve system performance?()
第18题:
Which of the following can be used in conjunction with a Flashback Versions Query to filter the results?()
第19题:
Save the document and close the word processing program. Select German by using the locale indicator on the taskbar and restart the word processing program.
Save the document and close the word processing program. Log off and log on to the computer. Restart the word processing program and select German by using the locale indicator on the taskbar.
Install the German version of Windows 2000 Professional. Reinstall the word processing program.
Change the language preference from English to German within the word processing program.
第20题:
Safe Mode
Automated System Recovery
Last Known Good Configuration
System Restore
第21题:
Boost the priority of batch jobs.
Schedule batch runs to reduce contention with OLTP.
Schedule OS maintenance such that it includes frequent application of PTFs.
Perform incremental backups of transaction processing and full backups of batch processing.
第22题:
pulse
exhaust
fluctuating
hunting
第23题:
centerline system of framing
isometric system of framing
longitudinal system of framing
transverse system of framing