单选题which one of the following best where layer can be used?()A form B page C subform D all of the above

题目
单选题
which one of the following best where layer can be used?()
A

form 

B

page 

C

subform 

D

all of the above


相似考题
更多“单选题which one of the following best where layer can be used?()A form B page C subform D all of the above”相关问题
  • 第1题:

    Which one of the following is the most commonly used layer 2 network device?()

    A. Hub

    B. Bridge

    C. Switch

    D. Router

    E. Repeaters

    F. None of the above


    参考答案:C

  • 第2题:

    Which of the following assumptions fails to describe the nature of vocabulary or vocabularylearning


    A.Words are best learned in context.

    B.A lexical item can be more than one word.

    C.All words in one language have equivalents in another.

    D.Learning a word includes learning its form, meaning and use.

    答案:C
    解析:
    考查词汇教学。句意为“下列哪项说法没有正确描述词汇或词汇学习的性质”A项“最好在语境中学习单词”;B项“一个词条可以对应不止一个单词”:C项“在一门语言中的所有单词在另一门语言中都有对应的词汇”,但是事实上一门语言的词汇与另外一门语言的词汇并不是一一对应的关系,比如“巧克力”就是音译过来的一个原本在汉语里没有的词汇;D项“学习一个单词包括学习其形式、意义和用法”。故选C。

  • 第3题:

    Which of the following best describes a full backup? ()

    • A、All datafiles of a database 
    • B、All datafiles, archive logs, and control files 
    • C、All datafiles and control files 
    • D、All the used blocks in a datafile

    正确答案:D

  • 第4题:

    Which of the following are key characteristics of PPP?()

    • A、can be used over analog circuits
    • B、maps Layer 2 to Layer 3 address
    • C、encapsulates several routed protocols
    • D、supports IP only
    • E、provides error correction

    正确答案:A,C,E

  • 第5题:

    You are attempting to troubleshoot some problems within your local network.Which of the following are router IOS commands that can be used to troubleshoot LAN connectivity problems?()

    • A、ping
    • B、tracert
    • C、ipconfig
    • D、show ip route
    • E、winipcfg
    • F、show interfaces
    • G、All of the above

    正确答案:A,D,F

  • 第6题:

    Which of the following can be utilized from a Legacy form without additional coding?()

    • A、Field Validations
    • B、Query Save logic
    • C、Dialog forms
    • D、All of the above

    正确答案:A

  • 第7题:

    The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?()

    • A、Either the -a or flag -b may be used, but not both.
    • B、If the flag -a is used then the flag -b also must be used.
    • C、One of the -a or -b flags must be used, but not both at the same time.
    • D、Both the flags may be used together, but neither are mandatory.

    正确答案:D

  • 第8题:

    单选题
    Which of the following nondestructive testing methods can be used to detect a suspected subsurface defect in a tail-shaft liner?()
    A

    Dye penetrant

    B

    Magnetic particle

    C

    Ultrasonic

    D

    All of the above


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following assumptions fails to describe the nature of vocabulary or vocabulary learning?
    A

    Words are best learned in context.

    B

    A lexical item can be more than one word.

    C

    All words in one language have equivalents in another.

    D

    Learning a word includes learning its form, meaning and use.


    正确答案: D
    解析:

  • 第10题:

    单选题
    Which one of the following is the most commonly used layer 2 network device?()
    A

    Hub

    B

    Bridge

    C

    Switch

    D

    Router

    E

    Repeaters

    F

    None of the above


    正确答案: E
    解析: 暂无解析

  • 第11题:

    单选题
    Unicast Reverse Path Forwarding can perform all of these actions except which one?()
    A

    examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were received

    B

    check to see if any packet received at a router interface arrives on the best return path

    C

    combine with a configured ACL

    D

    log its events,if you specify the logging options for the ACL entries used by the unicast rpf command

    E

    inspect IP packets encapsulated in tunnels, such as GRE


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following methods can be used to detect block corruption?()
    A

     ANALYZE operations

    B

     dbv

    C

     SQL queries that access the potentially corrupt block

    D

     RMAN

    E

     All of the above


    正确答案: E
    解析: 暂无解析

  • 第13题:

    Which of the following are data layer categories to be displayed on ECDIS ________.

    A.ECDIS warnings and messages

    B.Hydrographic Office data

    C.Notice to Mariners information

    D.All of the above


    正确答案:D

  • 第14题:

    which one of the following best where layer can be used?()

    • A、form 
    • B、page 
    • C、subform 
    • D、all of the above

    正确答案:B

  • 第15题:

    Which of the following devices can an administrator use to segment their LAN?()

    • A、Hubs
    • B、Repeaters
    • C、Switches
    • D、Bridges
    • E、Routers
    • F、Media Converters
    • G、All of the above

    正确答案:C,D,E

  • 第16题:

    Which one of the following is the most commonly used layer 2 network device?()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router
    • E、Repeaters
    • F、None of the above

    正确答案:C

  • 第17题:

    which one of the following types of actions can be used on unopened doc?()

    • A、 form action 
    • B、 view action 
    • C、 hotspot action 
    • D、 db action

    正确答案:B

  • 第18题:

    which one of the following accurately describes field names?()

    • A、they must be unique in a database  
    • B、they can only be used once in a view  
    • C、they can only used once on each form  
    • D、they can be used mulriple times on a form 

    正确答案:C

  • 第19题:

    Which of the following methods can be used to detect block corruption?()  

    • A、 ANALYZE operations
    • B、 dbv
    • C、 SQL queries that access the potentially corrupt block
    • D、 RMAN
    • E、 All of the above

    正确答案:E

  • 第20题:

    单选题
    Which of the following pumps is used where a relatively high pressure and small capacity are required?()
    A

    Volute pump

    B

    Diffuser pump

    C

    Regenerative pump

    D

    All of the above


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following can be utilized from a Legacy form without additional coding?()
    A

    Field Validations

    B

    Query Save logic

    C

    Dialog forms

    D

    All of the above


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    which one of the following accurately describes field names?()
    A

    they must be unique in a database  

    B

    they can only be used once in a view  

    C

    they can only used once on each form  

    D

    they can be used mulriple times on a form 


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    which one of the following types of actions can be used on unopened doc?()
    A

     form action 

    B

     view action 

    C

     hotspot action 

    D

     db action


    正确答案: D
    解析: 暂无解析