更多"Which of the following statements i"的相关试题:
[单项选择]Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()
A. GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrp
B. GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1
C. GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrp
D. GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom
[单项选择]Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
A. REVOKE ALL PRIVILEGES FROM USER tom
B. REVOKE ALL ON EMPLOYEE FROM USER tom
C. REVOKE EXECUTE ON EMPLOYEE FROM USER tom
D. REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
[单项选择]If p and q are statements, which of the following formulas is tautological ( )
A. ┐ (p→∧q
B. (p∨→p∧q
C. (q∧(p→)→p
D. ((p→∧→q
[单项选择]Which of the following methods is used to provide a standard to measure performance
A. Benchmarkin
B. Samplin
C. Estimatin
D. Levelin
[单项选择]Which of the following protocols is used to encrypt data between web servers and web browsers?()
A. SMTP
B. SIP
C. HTTP
D. SSL
[单项选择]Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A. RIP
B. 0S:F
C. STP
D. EGP
[单项选择]Which of the following tools is used to consolidate files and folders on a local drive?()
A. CHKDSK
B. DEFRAG
C. DISK CLEANUP
D. Computer Management
[单项选择]Which of the following technologies is used on the backbone of an ISDN?()
A. VDSL
B. SDSL
C. OC3
D. ATM
[单项选择]Which of the following interfaces is used to connect analog devices to the Internet?()
A. POTS
B. ATM
C. VDSL
D. SDSL
[单项选择]Which of the following interfaces are used to simultaneously transfer video and audio at highrates?()
A. HDMI
B. DVI-D
C. S-Video
D. DVI-I
[单项选择]Which of the following should be used to restrict access to a wireless network?()
A. Port forwarding
B. Enable SSID broadcast
C. Wireless encryption
D. Enable DMZ
[单项选择]Which of the following techniques is used to extract the /usr/tmp directory from a mksysb backup?()
A. Use the tar command on the fifth image.
B. Use the restore command on the fourth image.
C. Use tctl -f /dev/rmt0.1 fsf 3 followed by the tar command on the fourth image.
D. Reboot using the mksysb tape and then use the dd command to extract the file.
[单项选择]Which of the following commands is used to display other computers running on the network?()
A. hostname
B. ipconfig
C. net view
D. nslookup
[单项选择]Which of the following computers are used for basic applications and meets the MINIMUMrequirements for running Windows?()
A. Virtualization workstation
B. Home server PC
C. CAD workstation
D. Thin client
[单项选择]Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()
A. Switch
B. Hub
C. Modem
D. Repeater
[单项选择]Which of the following commands is used to delete an empty directory?()
A. RD
B. EDIT
C. DIR
D. FORMAT
[单项选择]Which of the following tool is used for scope verification
A. Performance measuremen
B. Scope change control syste
C. Inspectio
D. Earned valu
[单项选择]Which of the following is primarily used for VoIP?()
A. TLS
B. RDF
C. NTP
D. RTP