参考答案和解析
正确答案:B
更多“Which files can be used together”相关问题
  • 第1题:

    A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()

    A.EDIT

    B.CHMOD

    C.ATTRIB

    D.CONVERT


    参考答案:C

  • 第2题:

    Which statement about two lines spliced together is TRUE ________.

    A.Splicing is used to increase the circumference of each line

    B.Splicing two lines together is stronger than knotting two lines together

    C.Splicing is used to increase the overall strength of the line

    D.Splicing is used to prevent rotting of the lines bitter end


    正确答案:B

  • 第3题:

    Designing the data storage architecture is an important activity in system design. There are two main types of data storage formats: files and databases. Files are electronic of data that have been optimized to perform a particular transaction. There are several types of files that differ in the way they are used to support an application. ( ) store core information that is important to the business and , more specifically , to the application , such as order information or customer mailing information. ( ) contain static values , such as a list of valid codes or the names of cities . Typically, the list is used for validation. A database is a collection of groupings of information that are related to each other in some way. There are many different types of databases that exist on the market today. ( ) is given to those databases which are based on older , sometimes outdated technology that is seldom used to develop new applications . (请作答此空) are collections of records that are related to each other through pointers In relational database , ( ) can be used in ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized.

    A. Hierarchical database
    B. Workgroup database
    C. Linked table database
    D .Network database

    答案:A
    解析:
    翻译:在系统设计中,数据存储架构设计是非常重要的一项工作。有两种主要类型的数据存储格式,即文件和数据库,文件是经过优化以执行特定事务的电子数据。( )存储的核心信息对业务很重要,更具体地说,对应用程序而言,如订单信息或客户邮件信息。( )包含静态值,如有效代码列表或城市名称,通常该列表用于验证。数据库是以某种方式彼此相关的信息分组的集合,目前市场上存在许多不同类型的数据库。( )用于那些基于较旧且过时技术的数据库,这些技术很少用于开发新的应用程序。(请作答此空)是通过指针彼此相关的记录集合在关系数据库中,( )可用于确保通过主键和外键将表链接在一起的值是有效且正确同步的。A.分层数据库 B.工作组数据库 C.链接表数据库 D.网络数据库

  • 第4题:

    Designing the data storage architecture is an important activity in system design. There are two main types of data storage formats: files and databases. Files are electronic of data that have been optimized to perform a particular transaction. There are several types of files that differ in the way they are used to support an application. ( ) store core information that is important to the business and , more specifically , to the application , such as order information or customer mailing information. ( ) contain static values , such as a list of valid codes or the names of cities . Typically, the list is used for validation. A database is a collection of groupings of information that are related to each other in some way. There are many different types of databases that exist on the market today. ( ) is given to those databases which are based on older , sometimes outdated technology that is seldom used to develop new applications . ( ) are collections of records that are related to each other through pointers In relational database , (请作答此空) can be used in ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized.

    A. identifying relationships
    B. normalization
    C. referential integrity
    D. store procedure

    答案:C
    解析:
    翻译:在系统设计中,数据存储架构设计是非常重要的一项工作。有两种主要类型的数据存储格式,即文件和数据库,文件是经过优化以执行特定事务的电子数据。( )存储的核心信息对业务很重要,更具体地说,对应用程序而言,如订单信息或客户邮件信息。( )包含静态值,如有效代码列表或城市名称,通常该列表用于验证。数据库是以某种方式彼此相关的信息分组的集合,目前市场上存在许多不同类型的数据库。( )用于那些基于较旧且过时技术的数据库,这些技术很少用于开发新的应用程序。( )是通过指针彼此相关的记录集合在关系数据库中,( 请作答此空)可用于确保通过主键和外键将表链接在一起的值是有效且正确同步的。A.识别关系 B.正常化 C.参照完整性 D.商店程序

  • 第5题:

    A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()

    • A、EDIT
    • B、CHMOD
    • C、ATTRIB
    • D、CONVERT

    正确答案:C

  • 第6题:

    A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect.  Which of the following commands can be used to determine the block size of the backup tape ()

    • A、dd
    • B、tar
    • C、cpio
    • D、restore

    正确答案:A

  • 第7题:

    which one of the following accurately describes field names?()

    • A、they must be unique in a database  
    • B、they can only be used once in a view  
    • C、they can only used once on each form  
    • D、they can be used mulriple times on a form 

    正确答案:C

  • 第8题:

    Which files can be used together to allow remote command execution on a server?()  

    • A、/etc/.rhosts and $HOME/hosts.equiv
    • B、/etc/hosts.equiv and $HOME/.rhosts
    • C、/etc/rhosts.equiv and $HOST/.rhosts
    • D、/etc/hosts.equiv and $HOME/.hosts.equiv

    正确答案:B

  • 第9题:

    单选题
    Which one of the Cisco IOS commands can be used to verify that either the Cisco IOS image, theconfiguration files,or both have been properly backed up and secured?()
    A

    show archive

    B

    show flash

    C

    show file systems

    D

    show secure bootset


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements about Recovery Manager (RMAN) backups are true? ()
    A

    Online redo log files can be backed up.

    B

    Archived redo log files are backed up.

    C

    Only used data blocks can be backed up as backup sets.

    D

    Only consistent database backups can be performed.

    E

    RMAN backup can be taken only if the database is configured in ARCHIVELOG mode.


    正确答案: C,E
    解析: 暂无解析

  • 第11题:

    多选题
    For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()
    A

    RMAN image copies

    B

    RMAN database backups

    C

    RMAN tablespace backups

    D

    user­managed backups placed in the flash recovery area

    E

    user­managed backups that have been cataloged with RMAN

    F

    user­managed data file backups for which the full path name is specified


    正确答案: E,A
    解析: 暂无解析

  • 第12题:

    单选题
    Which files can be used together to allow remote command execution on a server?()
    A

    /etc/.rhosts and $HOME/hosts.equiv

    B

    /etc/hosts.equiv and $HOME/.rhosts

    C

    /etc/rhosts.equiv and $HOST/.rhosts

    D

    /etc/hosts.equiv and $HOME/.hosts.equiv


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following methods can move files in clear text and can be easily intercepted?()

    A.RSH

    B.SNMP

    C.FTP

    D.TELNET


    参考答案:C

  • 第14题:

    Designing the data storage architecture is an important activity in system design. There are two main types of data storage formats: files and databases. Files are electronic of data that have been optimized to perform a particular transaction. There are several types of files that differ in the way they are used to support an application. (请作答此空) store core information that is important to the business and , more specifically , to the application , such as order information or customer mailing information. ( ) contain static values , such as a list of valid codes or the names of cities . Typically, the list is used for validation. A database is a collection of groupings of information that are related to each other in some way. There are many different types of databases that exist on the market today. ( ) is given to those databases which are based on older , sometimes outdated technology that is seldom used to develop new applications . ( ) are collections of records that are related to each other through pointers In relational database , ( ) can be used in ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized.

    A. Master files
    B. Look-up files
    C. Transaction files
    D. History files

    答案:A
    解析:
    翻译:在系统设计中,数据存储架构设计是非常重要的一项工作。有两种主要类型的数据存储格式,即文件和数据库,文件是经过优化以执行特定事务的电子数据。(请作答此空)存储的核心信息对业务很重要,更具体地说,对应用程序而言,如订单信息或客户邮件信息。( )包含静态值,如有效代码列表或城市名称,通常该列表用于验证。数据库是以某种方式彼此相关的信息分组的集合,目前市场上存在许多不同类型的数据库。( )用于那些基于较旧且过时技术的数据库,这些技术很少用于开发新的应用程序。( )是通过指针彼此相关的记录集合在关系数据库中,( )可用于确保通过主键和外键将表链接在一起的值是有效且正确同步的。A.主文件 B.查找文件 C.交易文件 D.历史档案

  • 第15题:

    Designing the data storage architecture is an important activity in system design. There are two main types of data storage formats: files and databases. Files are electronic of data that have been optimized to perform a particular transaction. There are several types of files that differ in the way they are used to support an application. ( ) store core information that is important to the business and , more specifically , to the application , such as order information or customer mailing information. (请作答此空) contain static values , such as a list of valid codes or the names of cities . Typically, the list is used for validation. A database is a collection of groupings of information that are related to each other in some way. There are many different types of databases that exist on the market today. ( ) is given to those databases which are based on older , sometimes outdated technology that is seldom used to develop new applications . ( ) are collections of records that are related to each other through pointers In relational database , ( ) can be used in ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized.

    A .Master files
    B .Look-up files
    C .Audit files
    D .History files

    答案:C
    解析:
    翻译:在系统设计中,数据存储架构设计是非常重要的一项工作。有两种主要类型的数据存储格式,即文件和数据库,文件是经过优化以执行特定事务的电子数据。( )存储的核心信息对业务很重要,更具体地说,对应用程序而言,如订单信息或客户邮件信息。(请作答此空)包含静态值,如有效代码列表或城市名称,通常该列表用于验证。数据库是以某种方式彼此相关的信息分组的集合,目前市场上存在许多不同类型的数据库。( )用于那些基于较旧且过时技术的数据库,这些技术很少用于开发新的应用程序。( )是通过指针彼此相关的记录集合在关系数据库中,( )可用于确保通过主键和外键将表链接在一起的值是有效且正确同步的。A.主文件 B.查找文件 C.审核文件 D.历史档案

  • 第16题:

    Which protocol is used to transfer files to on the ERX Edge Router?()

    • A、SCP
    • B、FTP
    • C、RCP
    • D、TFTP

    正确答案:B,D

  • 第17题:

    Which of the following methods can move files in clear text and can be easily intercepted?()

    • A、RSH
    • B、SNMP
    • C、FTP
    • D、TELNET

    正确答案:C

  • 第18题:

    A system administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape?()

    • A、dd
    • B、tar
    • C、cpio
    • D、restore

    正确答案:A

  • 第19题:

    Which two statements about Automatic Storage Management (ASM) are true?()

    • A、ASM provides mirroring on file by file basis.
    • B、ASM provides automatic load balancing across all ASM disks.
    • C、ASM supports the Oracle database and operating system files.
    • D、ASM can be used to store trace files, alert log files, and the server parameter file (SPFILE).

    正确答案:A,B

  • 第20题:

    多选题
    The RMAN BACKUP command using the DELETE INPUT option can be used with which three types of files? ()
    A

    data files

    B

    backup sets

    C

    control files

    D

    archived redo log files


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true about Oracle Managed Files (OMF)?()
    A

    OMF cannot be used in a database that already has data files created with user-specified directions.

    B

    The file system directions that are specified by OMF parameters are created automatically.

    C

    OMF can be used with ASM disk groups, as well as with raw devices, for better file management.

    D

    OMF automatically creates unique file names for table spaces and control files.

    E

    OMF may affect the location of the redo log files and archived log files.


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following files can be used to configure connection pooling in the shared server environment?()
    A

    INIT.ORA

    B

    SQLNET.ORA

    C

    TNSNAMES.ORA

    D

    SERVICES.ORA

    E

    LISTENER.ORA


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    A system administrator suspects that there were problems with the AIX installation on a pSeries server. Which of the following commands can be used, with the appropriate flags, to view the BOS installation output files?()
    A

    alog

    B

    errpt

    C

    lscfg

    D

    installp


    正确答案: B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true regarding Health Monitor checks in Oracle Database 11g?()
    A

    Health Monitor checks can be used to scan the contents of the redo log and archive logs for accessibility and corruption.

    B

    Health Monitor checks can be used to verify the integrity of database files and report failures if these files are inaccessible,corrupt or inconsistent.

    C

    Health Monitor checks can be used to verify the contents of dictionary entries for each dictionary object and fix it automatically.

    D

    Health Monitor checks are always initiated manually when there is some critical error.


    正确答案: C,B
    解析: 暂无解析