更多"Which of the following statements i"的相关试题:
[单项选择]Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()
A. GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrp
B. GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1
C. GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrp
D. GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom
[单项选择]Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()
A. REVOKE ADD, DELETE FROM USER tom ON TABLE tab1
B. REVOKE ADD, DELETE ON TABLE tab1 FROM USER tom
C. REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1
D. REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom
[单项选择]If p and q are statements, which of the following formulas is tautological ( )
A. ┐ (p→∧q
B. (p∨→p∧q
C. (q∧(p→)→p
D. ((p→∧→q
[单项选择]Which of the following methods is used to provide a standard to measure performance
A. Benchmarkin
B. Samplin
C. Estimatin
D. Levelin
[单项选择]Which of the following tools is used to consolidate files and folders on a local drive?()
A. CHKDSK
B. DEFRAG
C. DISK CLEANUP
D. Computer Management
[单项选择]Which of the following interfaces is used to connect analog devices to the Internet?()
A. POTS
B. ATM
C. VDSL
D. SDSL
[单项选择]Which of the following techniques is used to extract the /usr/tmp directory from a mksysb backup?()
A. Use the tar command on the fifth image.
B. Use the restore command on the fourth image.
C. Use tctl -f /dev/rmt0.1 fsf 3 followed by the tar command on the fourth image.
D. Reboot using the mksysb tape and then use the dd command to extract the file.
[单项选择]Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()
A. BIOS password
B. Domain membership
C. EFS
D. Bitlocker
[单项选择]Which of the following tools is used to view historical information about tasks, database changes, messages, and notifications?()
A. Journal
B. Task Center
C. Control Center
D. Activity Monitor
[单项选择]Which of the following would be used to connect two IDFs in the same building with the LAN, whileminimizing crosstalk?()
A. RG-6
B. STP
C. CAT3
D. UTP
[单项选择]Which of the following protocols is used to encrypt data between web servers and web browsers?()
A. SMTP
B. SIP
C. HTTP
D. SSL
[单项选择]Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A. RIP
B. 0S:F
C. STP
D. EGP
[单项选择]Which of the following technologies is used on the backbone of an ISDN?()
A. VDSL
B. SDSL
C. OC3
D. ATM
[单项选择]Which of the following interfaces are used to simultaneously transfer video and audio at highrates?()
A. HDMI
B. DVI-D
C. S-Video
D. DVI-I
[单项选择]Which of the following should be used to restrict access to a wireless network?()
A. Port forwarding
B. Enable SSID broadcast
C. Wireless encryption
D. Enable DMZ
[单项选择]Which of the following commands is used to retrieve database names from the local catalog for DRDA host databases on System i and System z?()
A. LIST DB DIRECTORY
B. LIST DCS DIRECTORY
C. LIST NODE DIRECTORY
D. LIST ACTIVE DATABASES
[单项选择]Which of the following commands is used to display other computers running on the network?()
A. hostname
B. ipconfig
C. net view
D. nslookup
[单项选择]Which of the following devices is used to connect a WAN to a LAN?()
A. Basic router
B. Basic switch
C. Bridge
D. Repeater
[单项选择]Which of the following computers are used for basic applications and meets the MINIMUMrequirements for running Windows?()
A. Virtualization workstation
B. Home server PC
C. CAD workstation
D. Thin client