controls the operation of the computer and performs it's data processing functions.
A.CPU
B.Hard disk
C.Memory
D.Database system
第1题:
Morrris, an attorney, performs 5 hours of legal work for Andy. Morrris 's normal billing rate is $120 per hour. Andy, a software consultant, gives Morrris a new computer for his office in payment of the bill. The computer's adjusted basis was $500 and its fair market value is $550. Morrris ' basis in the computer is ().
A.$0
B.$500
C.$550
D.$600
E.$1,150
第2题:
Calculator is(66) for performing arithmetic operations, but that requires human intervention to alter its stored program, if any, and to initiate each operation or sequence of operations. A calculator performs some of the functions of a computer, but usually operates only with frequent human intervention.Microcomputer's processing unit consists of one or more microprocessors, and includes storage and input-output(67). Personal computer primarily intended for(68) use by an individual.(69) computer can be hand-carried for use in more than one location. Minicomputer is functionally intermediate between a microcomputer and a mainframe. And supercomputer has the highest processing speeds available at a given time for(70) scientific and engineering problems.
A.suitable
B.well-formed
C.applicable
D.usable
第3题:
Cloud computing is a type of Internetbased computing that provides shared computer processing resources and data to computers and other devices on demand. Advocates claim that cloud computing allows companies to avoid upfront infrastructure costs. Cloud computing now has few service form, but it is not including()
AIaaS
B.PaaS
C.SaaS
D.DaaS
第4题:
You install a custom application on a computer that runs Microsoft Windows XP. The application stores each user’s data in the %programfiles%\app1\data folder on the computer. You install the custom application on a computer that runs Windows Vista.On the Windows Vista computer, you back up the %programfiles%\app1\data folder and notice that the backup contains no data.You need to back up the application’s user data on the Windows Vista computer.What should you do?()
A.A
B.B
C.C
D.D
第5题:
program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.
A.Worm
B.Virus
C.Disaster
D.Demon
第6题:
第7题:
第8题:
A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?()
第9题:
Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use? ()
第10题:
records the token assertion
maps a STSUUSER input to a SAML token
looks up attributes in an external data source
maps a user’s alias during the account linkage operation in SAML 2.0 and Liberty 1.2 protocol
maps a GUI XML attributes into UI controls that are used by the IBM Tivoli Federated Identity Manager Console to collect the input data
第11题:
Copy Pierre’s documents and personal data to a shared folder on the network.
Reinstall Windows 98 and Pierre’s applications.
Copy the documents and personal data to the My Documents folder on Pierre’s computer.
On Pierre’s computer, run Setup.exe from a Windows 98 installation CD.
On Pierre’s computer, use the Add or Remove Programs Wizard to remove the Windows XP Professional Installation item.
On Pierre’s computer, use a third-party disk-imaging software utility to apply a disk image that contains Windows 98 and Pierre’s applications.
第12题:
It performs a label pop operation and an IP lookup.
It performs a label swap operation and an IP lookup.
It sends an error message toward the egress router.
It sends an error message toward the ingress router.
第13题:
A. It permanently switches to the low_group consumer group if the session exceeds 10,000 I/O requests or 2,500 MB of data transfer.
B. It performs the first 10000 I/O requests or 2,500 MB of data transfer in the LOW-GROUP consumer group, and then switches to the original group.
C. It switches to the LOW_GROUP consumer group if the session exceeds 10000 I/O requests or 2500 MB of data transfer and returns to the original group after the operation.
D. It switches to the LOW_GROUP consumer group if the session exceeds 10000 I/O requests or 2500MB of data transfer for queries, but not for data manipulation language (DML) operations.
第14题:
A. It performs a label pop operation and an IP lookup.
B. It performs a label swap operation and an IP lookup.
C. It sends an error message toward the egress router.
D. It sends an error message toward the ingress router.
第15题:
Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.
A.memory
B.control
C.monitor
D.charge
第16题:
Whenever new information is entered, it must be stored somewhere in the computer's(70). RAM only(71)the data temporarily. That is, all information stored in the RAM will disappear if you switch the computer off.
A.processor
B.keyboard
C.printer
D.memory
第17题:
第18题:
第19题:
第20题:
During a cluster synchronization, an administrator inadvertently performs al ctrl ’C’ causing the synchronization to fail. After restarting the resynchronization, the administrator notices a message stating that a previous dare operation has been detected. What is the best way to resolve this problem?()
第21题:
Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.
Uninstall the payroll software to ensure confidentiality.
Have the director remove sensitive data before the computer will be repaired.
Perform needed repairs while avoiding sensitive data.
第22题:
Default
SAFE
EXTERNAL ACCESS
UNSAFE
第23题:
when performing export and import using Oracle Data Pump
when performing backup and recovery operations using Oracle Recovery Manager
when performing batch processing and bulk loading operation in a data warehouse environment
in an online transaction processing (OLTP) system where large number of client sessions are idle most of the time