In a tree directory of a file system, relative path name can be used to find files for improving directory retrieval.To do this, which directory of the followings should be set up?A.parent directoryB.child directoryC.working directoryD.home directory

题目

In a tree directory of a file system, relative path name can be used to find files for improving directory retrieval.To do this, which directory of the followings should be set up?

A.parent directory

B.child directory

C.working directory

D.home directory


相似考题
更多“In a tree directory of a file system, relative path name can be used to find files for improving directory retrieval.To do this, which directory of the followings should be set up?A.parent directoryB.child directoryC.working directoryD.home directory”相关问题
  • 第1题:

    A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()

    A. Set folder permissions to 760.

    B. Set folder permissions to 770.

    C. Set folder permissions to modify

    D. Set folder permissions to full control


    参考答案:B

  • 第2题:

    A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()

    • A、 Set folder permissions to 760.
    • B、 Set folder permissions to 770.
    • C、 Set folder permissions to modify.
    • D、 Set folder permissions to full control.

    正确答案:A

  • 第3题:

    A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()

    • A、Set folder permissions to 760.
    • B、Set folder permissions to 770.
    • C、Set folder permissions to modify
    • D、Set folder permissions to full control

    正确答案:B

  • 第4题:

    Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()

    • A、MANAGER can do a GET on resources in the /Bar/Baz directory.
    • B、MANAGER can do a POST on any resource in the /Bar/Baz directory.
    • C、MANAGER can do a TRACE on any resource in the /Bar/Baz directory.
    • D、DEVELOPER can do a GET on resources in the /Bar/Baz directory.
    • E、DEVELOPER can do only a POST on resources in the /Bar/Baz directory.
    • F、DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.

    正确答案:A,C,D,F

  • 第5题:

    Which determines if “prefs” is a directory and exists on the file system?()  

    • A、 Boolean exists=Directory.exists (“prefs”);
    • B、 Boolean exists=(new File(“prefs”)).isDir();
    • C、 Boolean exists=(new Directory(“prefs”)).exists();
    • D、 Boolean exists=(new File(“prefs”)).isDirectory();
    • E、 Boolean exists=true;  Try{  Directory d = new Directory(“prefs”);  } catch (FileNotFoundException e) {  exists = false;  }

    正确答案:D

  • 第6题:

    You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()

    • A、The JAR file
    • B、A directory called lib
    • C、A directory called tags
    • D、A directory called TLDs
    • E、A directory called classes
    • F、A directory called META-INF

    正确答案:B,C,E

  • 第7题:

    Given that file is a reference to a File object that represents a directory, which code fragments will succeed in obtaining a list of the entries in the directory?()  

    • A、Vector filelist = ((Directory) file).getList();
    • B、String[] filelist = file.directory();
    • C、Enumeration filelist = file.contents();
    • D、String[] filelist = file.list();
    • E、Vector filelist = (new Directory(file)).files();

    正确答案:D

  • 第8题:

    In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()

    • A、Modify the value for the UTL_FILE_DIR parameter in the parameter file
    • B、Grant read and write privilege on the operating system path to the database users
    • C、Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file
    • D、Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file
    • E、Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

    正确答案:A

  • 第9题:

    单选题
    A file named "core" exists in the current directory.  Which of the following commands should be used to determine what created the "core" file?()
    A

     dump -t core 

    B

     strings core 

    C

     trace -a core 

    D

     crash core /unix_up


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which determines if “prefs” is a directory and exists on the file system?()
    A

     Boolean exists=Directory.exists (“prefs”);

    B

     Boolean exists=(new File(“prefs”)).isDir();

    C

     Boolean exists=(new Directory(“prefs”)).exists();

    D

     Boolean exists=(new File(“prefs”)).isDirectory();

    E

     Boolean exists=true;  Try{  Directory d = new Directory(“prefs”);  } catch (FileNotFoundException e) {  exists = false;  }


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Given that the current directory is empty, and that the user has read and write privileges to the current directory, and the following: Which statement is true?()
    A

    Compilation fails.

    B

    Nothing is added to the file system.

    C

    Only a new file is created on the file system.

    D

    Only a new directory is created on the file system.

    E

    Both a new file and a new directory are created on the file system.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
    A

     Set folder permissions to 760.

    B

     Set folder permissions to 770.

    C

     Set folder permissions to modify.

    D

     Set folder permissions to full control.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    The basic function of the file system is accessing files by names. The function can be realized by(24).

    A.directory-managing

    B.boosting the speed of the file-accessing

    C.file-protecting

    D.improving the utilization of storage


    正确答案:A

  • 第14题:

    Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()

    • A、 Configure a directory service access audit policy. Increase the maximum size of the security log.
    • B、 Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
    • C、 Configure an object access audit policy for the directory. Increase the maximum size of the system log.
    • D、 Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

    正确答案:D

  • 第15题:

    A user reports that they cannot cd to /tmp/application. A system administrator entered the following    command: Is -Id /tmp/application   drw-r-r- 4 root system 512 Jan 15 14:09 application Which of the following is the most likely cause of the  problem()

    • A、The /tmp/application should be globally writable.
    • B、The /tmp/application directory should be executable.
    • C、The /tmp/application directory should be owned by the user.
    • D、The /tmp/application directory should have the sticky bit set

    正确答案:B

  • 第16题:

    A file named "core" exists in the current directory.  Which of the following commands should be used to determine what created the "core" file?()

    • A、 dump -t core 
    • B、 strings core 
    • C、 trace -a core 
    • D、 crash core /unix_up

    正确答案:B

  • 第17题:

    After a merger with another small business, your company has inherited a legacy WAR file but the originalsource files were lost. After reading the documentation of that web application,you discover that the WARfile contains a useful tag library that you want to reuse in your own webapp packaged as a WAR file. What do you need to do to reuse this tag library?()

    • A、Simply rename the legacy WAR file as a JAR file and place it in your webapp’s library directory.
    • B、Unpack the legacy WAR file, move the TLD file to the META-INF directory, repackage the whole thingas a JAR file, and place that JAR file in your webapp’s library directory.
    • C、Unpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the whole thing as a JAR file, and place that JAR file in your webapp’slibrary directory.
    • D、Unpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the WAR, and place that WAR file in your webapp’s WEB-INF directory.

    正确答案:C

  • 第18题:

    Which gets the name of the parent directory file “file.txt”?()

    • A、 String name= File.getParentName(“file.txt”);
    • B、 String name= (new File(“file.txt”)).getParent();
    • C、 String name = (new File(“file.txt”)).getParentName();
    • D、 String name= (new File(“file.txt”)).getParentFile();
    • E、 Directory dir=(new File (“file.txt”)).getParentDir();  String name= dir.getName();

    正确答案:B

  • 第19题:

    10. class MakeFile {  11. public static void main(String[] args) {  12. try {  13. File directory = new File(”d”);  14. File file = new File(directory,”f”);  15. if(!file.exists()) {  16. file.createNewFile();  17. }  18. } catch (IOException e) {  19. e.printStackTrace  20. }  21. }  22. }  The current directory does NOT contain a directory named “d.” Which three are true?()

    • A、 Line 16 is never executed.
    • B、 An exception is thrown at runtime.
    • C、 Line 13 creates a File object named “d”.
    • D、 Line 14 creates a File object named “f‟.
    • E、 Line 13 creates a directory named “d” in the file system.
    • F、 Line 16 creates a directory named “d” and a file  “f”  within it in the file system.
    • G、 Line 14 creates a file named "f " inside of the directory named “d” in the file system.

    正确答案:B,C,D

  • 第20题:

    You install a non-RAC Oracle Database. During Installation, the Oracle Universal Installer (OUI) prompts you to enter the path of the Inventory directory and also to specify an operating system group name. Which statement is true?()

    • A、The ORACLE_BASE base parameter is not set.
    • B、The installation is being performed by the root user.
    • C、The operating system group that is specified should have the root user as its member.
    • D、The operating system group that is specified must have permission to write to the inventory directory

    正确答案:D

  • 第21题:

    多选题
    You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()
    A

    The JAR file

    B

    A directory called lib

    C

    A directory called tags

    D

    A directory called TLDs

    E

    A directory called classes

    F

    A directory called META-INF


    正确答案: F,D
    解析: 暂无解析

  • 第22题:

    多选题
    Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()
    A

    MANAGER can do a GET on resources in the /Bar/Baz directory.

    B

    MANAGER can do a POST on any resource in the /Bar/Baz directory.

    C

    MANAGER can do a TRACE on any resource in the /Bar/Baz directory.

    D

    DEVELOPER can do a GET on resources in the /Bar/Baz directory.

    E

    DEVELOPER can do only a POST on resources in the /Bar/Baz directory.

    F

    DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.


    正确答案: A,C,D,F
    解析: 暂无解析

  • 第23题:

    单选题
    A user reports that they cannot cd to /tmp/application. A system administrator entered the following    command: Is -Id /tmp/application   drw-r-r- 4 root system 512 Jan 15 14:09 application Which of the following is the most likely cause of the  problem()
    A

    The /tmp/application should be globally writable.

    B

    The /tmp/application directory should be executable.

    C

    The /tmp/application directory should be owned by the user.

    D

    The /tmp/application directory should have the sticky bit set


    正确答案: A
    解析: 暂无解析