更多"Which of the following connectors i"的相关试题:
[单项选择]Which of the following connectors is MOST commonly used for UTP cable?()
A. RJ-45
B. RJ-11
C. LC
D. SC
[单项选择]Which of the following protocols is commonly used for VoIP technology?()
A. Telnet
B. SMTP
C. SIP
D. SNMP
[单项选择]Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?()
A. ST
B. RJ-11
C. RJ-45
D. MT-RJ
[单项选择]Which of the following are the most commonly used performance measures of evaluating whether or not work is being accomplished as planned at any given point of time ?()
A. PV & A
B. AC,EV & P
C. CV & S
D. SPI,EV & A
[单项选择]Which of the following methods is used to increase the number of processes sharing the CPU ?()
A. Interrupt
B. Scheduler
C. Swapping
D. Working Set
[单项选择]Which of the following methods is used to provide a standard to measure performance
A. Benchmarkin
B. Samplin
C. Estimatin
D. Levelin
[单项选择]Which of the following protocols is used to encrypt data between web servers and web browsers?()
A. SMTP
B. SIP
C. HTTP
D. SSL
[单项选择]Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()
A. RIP
B. 0S:F
C. STP
D. EGP
[单项选择]Which of the following tools is used to consolidate files and folders on a local drive?()
A. CHKDSK
B. DEFRAG
C. DISK CLEANUP
D. Computer Management
[单项选择]Which of the following technologies is used on the backbone of an ISDN?()
A. VDSL
B. SDSL
C. OC3
D. ATM
[单项选择]Which of the following interfaces is used to connect analog devices to the Internet?()
A. POTS
B. ATM
C. VDSL
D. SDSL
[单项选择]Which of the following interfaces are used to simultaneously transfer video and audio at highrates?()
A. HDMI
B. DVI-D
C. S-Video
D. DVI-I
[单项选择]Which of the following should be used to restrict access to a wireless network?()
A. Port forwarding
B. Enable SSID broadcast
C. Wireless encryption
D. Enable DMZ
[单项选择]Which of the following commands is used to retrieve database names from the local catalog for DRDA host databases on System i and System z?()
A. LIST DB DIRECTORY
B. LIST DCS DIRECTORY
C. LIST NODE DIRECTORY
D. LIST ACTIVE DATABASES
[单项选择]Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()
A. GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrp
B. GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1
C. GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrp
D. GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom
[单项选择]Which of the following techniques is used to extract the /usr/tmp directory from a mksysb backup?()
A. Use the tar command on the fifth image.
B. Use the restore command on the fourth image.
C. Use tctl -f /dev/rmt0.1 fsf 3 followed by the tar command on the fourth image.
D. Reboot using the mksysb tape and then use the dd command to extract the file.
[单项选择]Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
A. REVOKE ALL PRIVILEGES FROM USER tom
B. REVOKE ALL ON EMPLOYEE FROM USER tom
C. REVOKE EXECUTE ON EMPLOYEE FROM USER tom
D. REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
[单项选择]Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()
A. REVOKE ADD, DELETE FROM USER tom ON TABLE tab1
B. REVOKE ADD, DELETE ON TABLE tab1 FROM USER tom
C. REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1
D. REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom