单选题Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()Afile-> inport Btools->import Ctools->add tools Dshared resources->third party tools

题目
单选题
Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()
A

 file-> inport 

B

 tools->import 

C

 tools->add tools 

D

 shared resources->third party tools


相似考题
参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()A  file- inport B  tools-import C  tools-add tools D  shared resources-third party tools”相关问题
  • 第1题:

    You set the recovery window to seven days and the backup optimization to ON using the CONFIGURE command of Recovery Manager (RMAN). The most recent backup of the TOOLS tablespace to disk was taken on January 3. The TOOLS tablespace is read/x7fonly.  On February 21, when you execute a command to back up all the tablespaces to disk, you find that RMAN backs up the TOOLS tablespace also, even though the contents of the tablespace have not changed after the backup on January 3.  Because there are no changes made to the TOOLS tablespace, you decide that the tablespace should not be backed up by RMAN. What can you to do skip backing up the TOOLS tablespace without changing the current backup optimization setting?()

    • A、configure a default device for RMAN backups
    • B、temporarily disable the retention policy for RMAN backups
    • C、configure automatic channel allocation for RMAN backups
    • D、use the CONFIGURE command to reconfigure the recovery window to 60 days

    正确答案:B

  • 第2题:

    Which of the following tools can be used to identify the location of a network outage?()

    • A、traceroute
    • B、netstat
    • C、nslookup
    • D、ping

    正确答案:A

  • 第3题:

    Which of the following tools should be used to report in-depth information about file fragments?()

    • A、 defragfs
    • B、 istat
    • C、 filemon
    • D、 fileplace

    正确答案:D

  • 第4题:

    cindy has created a private agent. she wants her colleagues to be able to use it. which one of the following should she do to achieve this?()

    • A、 change the agent property to shared 
    • B、 copy the agent to a domino 6 server 
    • C、 change the agent property to shared code 
    • D、 delete the agent. She must create it again as a shared agent

    正确答案:A

  • 第5题:

    Consider the following scenario for your database: - Backup optimization is enabled in RMAN. - The recovery window is set to 7 days in RMAN. - The most recent backup to disk for the TOOLS tablespace was taken on November 3, 2007. - The TOOLS tablespace is read-only since November 4, 2007. On November 23, 2007, you issue the RMAN command to back up the database to disk. Which statement is true regarding the backup of the TOOLS tablespace?()

    • A、The RMAN backup fails because the TOOLS tablespace is read-only
    • B、The RMAN skips the backup of the tablespace because backup optimization is enabled
    • C、The RMAN makes backup because optimization can be enabled only for backups to disk
    • D、The RMAN makes the backup because no backup of the tablespace exists within the seven day window

    正确答案:D

  • 第6题:

    单选题
    Which of the following tools can be used to identify the location of a network outage?()
    A

    traceroute

    B

    netstat

    C

    nslookup

    D

    ping


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()
    A

    net view

    B

    ipconfig

    C

    dig

    D

    ifconfig


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Consider the following scenario for your database: - Backup optimization is enabled in RMAN. - The recovery window is set to 7 days in RMAN. - The most recent backup to disk for the TOOLS tablespace was taken on November 3, 2007. - The TOOLS tablespace is read-only since November 4, 2007. On November 23, 2007, you issue the RMAN command to back up the database to disk. Which statement is true regarding the backup of the TOOLS tablespace?()
    A

    The RMAN backup fails because the TOOLS tablespace is read-only

    B

    The RMAN skips the backup of the tablespace because backup optimization is enabled

    C

    The RMAN makes backup because optimization can be enabled only for backups to disk

    D

    The RMAN makes the backup because no backup of the tablespace exists within the seven day window


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You set the recovery window to seven days and the backup optimization to ON using the CONFIGURE command of Recovery Manager (RMAN). The most recent backup of the TOOLS tablespace to disk was taken on January 3. The TOOLS tablespace is read/x7fonly.  On February 21, when you execute a command to back up all the tablespaces to disk, you find that RMAN backs up the TOOLS tablespace also, even though the contents of the tablespace have not changed after the backup on January 3.  Because there are no changes made to the TOOLS tablespace, you decide that the tablespace should not be backed up by RMAN. What can you to do skip backing up the TOOLS tablespace without changing the current backup optimization setting?()
    A

    configure a default device for RMAN backups

    B

    temporarily disable the retention policy for RMAN backups

    C

    configure automatic channel allocation for RMAN backups

    D

    use the CONFIGURE command to reconfigure the recovery window to 60 days


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()
    A

     net view

    B

     ipconfig

    C

     dig

    D

     ifconfig


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()
    A

    Security Center

    B

    Event Viewer Security log

    C

    Windows Defender

    D

    Windows Firewall


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following tools should be used to report in-depth information about file fragments?()
    A

     defragfs

    B

     istat

    C

     filemon

    D

     fileplace


    正确答案: B
    解析: 暂无解析

  • 第13题:

    A technician wants to create a spanned volume on a set of hard drives. Which of the following tools will identify if the drives will support a spanned volume?()

    • A、System Information
    • B、Disk Management
    • C、Device Manager
    • D、Task Manager

    正确答案:B

  • 第14题:

    Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()

    • A、net view
    • B、ipconfig
    • C、dig
    • D、ifconfig

    正确答案:C

  • 第15题:

    Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()

    • A、 file-> inport 
    • B、 tools->import 
    • C、 tools->add tools 
    • D、 shared resources->third party tools

    正确答案:B

  • 第16题:

    Which of the following performance tools can be used to determine if a system is thrashing?()

    • A、 svmon and tprof
    • B、 vmtune and schedtune
    • C、 ps and schedtune
    • D、 vmstat and topas

    正确答案:D

  • 第17题:

    You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()

    • A、Control Panel >> Data Sources (ODBC).
    • B、Control Panel >> System Tools >> Shared Folders.
    • C、Computer Management >> System Tools >> System Information.
    • D、Computer Management >> System Tools >> Shared Folders >> Open Files.
    • E、Computer Management >> System Tools >> Shared Folders >> Sessions.
    • F、Computer Management >> System Tools >> Shared Folders >> Shares.

    正确答案:F

  • 第18题:

    单选题
    Which of the following tools can be used to schedule a backup operation that is to be run every Sunday evening?()
    A

    Journal

    B

    Task Center

    C

    Activity Monitor

    D

    Command Line Processor


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()
    A

     file-> inport 

    B

     tools->import 

    C

     tools->add tools 

    D

     shared resources->third party tools


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following tools should Mike, a technician, use when testing a serial port?()
    A

    Cable tester

    B

    Multimeter

    C

    Loopback plug

    D

    Logic probe


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()
    A

    Control Panel >> Data Sources (ODBC).

    B

    Control Panel >> System Tools >> Shared Folders.

    C

    Computer Management >> System Tools >> System Information.

    D

    Computer Management >> System Tools >> Shared Folders >> Open Files.

    E

    Computer Management >> System Tools >> Shared Folders >> Sessions.

    F

    Computer Management >> System Tools >> Shared Folders >> Shares.


    正确答案: C
    解析: The correct answer is “Computer Management >> System Tools >> Shared Folders >> Shares”. To see the complete list of shared folder you should go to Computer Management >> System Tools >> Shared Folders >> Shares. 
    Choice “Control Panel >> Data Sources (ODBC)” is incorrect because ODBC is used for database connectivity not for shared folders.  
    Choice “Control Panel >> System Tools >> Shared Folders”  does not exist.  
    Choice” Computer Management >> System Tools >> System Information”  is used to see the complete detail of system configuration not the list of shared folders.  
    Choice “Computer Management >> System Tools >> Shared Folders >>Open Files is used to see the list of open shared files.  
    Choice “Computer Management >> System Tools >> Shared Folders >> Sessions “ is used to see the current sessions of the users who are accessing the shared files and folders.

  • 第22题:

    单选题
    A technician wants to create a spanned volume on a set of hard drives. Which of the following tools will identify if the drives will support a spanned volume?()
    A

    System Information

    B

    Disk Management

    C

    Device Manager

    D

    Task Manager


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    A user reports that it takes a long time to boot up in Windows XP and that there are a lot of icons appearing in the right lower side of the Task Bar. Which of the following tools can be used to minimize startup time? ()
    A

    MSCONFIG

    B

    SCANDISK

    C

    DEBUG

    D

    DEFRAG


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    cindy has created a private agent. she wants her colleagues to be able to use it. which one of the following should she do to achieve this?()
    A

     change the agent property to shared 

    B

     copy the agent to a domino 6 server 

    C

     change the agent property to shared code 

    D

     delete the agent. She must create it again as a shared agent


    正确答案: C
    解析: 暂无解析