-
Which of the following are valid modes of accessing the data plane? (Choose all that apply.)()
A . Serial connection
B . Secure Shell
C . RADIUS
D . Simple Network Management Protocol
E . HTTP
F . Telnet
-
Which of the following are policies applied to discount promotions?()
A . If multiple discounts could apply to a given product/item, the promotion with the highest priority will be chosen.
B . If multiple discounts could apply to a given product/item, the promotion with the largest amount off will be chosen.
C . If more than one order level discount could apply to an order, the discount with the highest priority will bechosen.
D . If more than one order level discount could apply to an order, the discount with the largest amount off will be chosen.
E . If discounted shipping and another type of order level discount could apply to the same order, both are applied.
-
Which of the following terms could be applied to the simple definition the energy of motion?()
A . Electrical energy
B . Thermal energy
C . Potential energy
D . Kinetic energy
-
To which of the following resources can a lock be applied?()
A . Row
B . Alias
C . Bitmap
D . Colum
-
Which of the following are not BGRP data structures? (Choose all that apply.)()
A . EIGRP database table
B . EIGRP CEF table
C . EIGRP neighbor table
D . EIGRP adjacency table
E . EIGRP interface table
F . EIGRP topology table
-
Under ISM Code the ship to which it applies has to carry ()
A . an International Ship Security Certificate
B . an International Oil Pollution Prevention Certificate
C . a Safety Management Certificate
D . an International Ballast Water Management Certificate
-
Which of the following statements applies to the x445 memory subsystem?()
A . With XA-32 architecture, addressing more than 64GB of RAM can be installed.
B . The amount of memory should be balanced across ports for best performance.
C . All DIMM slots should be populated in numerical order - slot 1 before slot 2, slot 2 before slot 3, etc.
D . All even number DIMM slots should be populated before odd number DIMM slots.
-
Which of the following characteristics describe the Root Guard feature?(Choose all that apply.)()
A . The port must be put into forwarding state manually after root-inconsistent state has beencorrected
B . A Root Guard port receiving superior BPDU goes into a root-inconsistent state
C . A Root Guard port receiving inferior BPDU goes into a root-inconsistent state
D . While the port is in a root-inconsistent state no user data is sent across that port
E . The port returns to a forwarding state if inferior BPDUs stop
F . It should be applied to all switch port
-
Findings in linguistic studies can often be applied to the settlement of some practical problems. The study of such applications is generally known as a()linguistics.
-
Which of the following characteristics describe the BPDU Guard feature?(Choose all that apply.)()
A . A BPDU Guard port should only be configured on ports with PortFast enabled
B . BPDU Guard and PortFast should not be enabled on the same port.
C . BPDU Guard is used to ensure that superior BPDUs are not received on a switch port
D . A BPDU Guard port receiving a BPDU will go into err-disable state
E . A BPDU Guard port receiving a BPDU will be disabled
F . BPDU Guard can be enabled on any switch port
-
Which of the following are TACACS+ characteristics?(Choose all that apply.)()
A . Cisco proprietary
B . Standards-based protocol
C . Provides separate services for authentication, authorization, and accounting
D . Encrypts only the password
E . Uses UDP for a transport layer
F . Encrypts the entire packet
-
Which of the following pieces of information will the command show interface provide?(Choose allthat apply.)()
A . Layer 1 status
B . Output queue drops
C . Interface CPU utilization
D . Cable type connected to interface
E . Layer 2 status
F . Input queue dro
-
Which of the following statements concerning IGMP are correct?(Choose all that apply.)()
A . With IGMPvl, queries are sent to a specific group
B . Hosts issuing IGMPvl requests will be correctly interpreted by IGMPv2 hosts due to backwardcompatibility
C . An IGMPv2 router will ignore IGMPv2 leave messages when IGMFVl hosts are present
D . With IGMFV2, a leave message is supported
E . An IGMPv2 host will send an IGMFVl report on an IGMFVl router
F . An IGMPv2 router can only allow IGMPv2 hosts to execute a join request
-
Which of the following statements is true about the 80/20 rule (Select all that apply)?()
A . 20 percent of the traffic on a network segment should be local.
B . no more than 20 percent of the network traffic should be able to move across a backbone.
C . no more than 80 percent of the network traffic should be able to move across a backbone.
D . 80 percent of the traffic on a network segment should be local.
-
Which of the following options applies to virtual Ethernet devices()
A . A virtual Ethernet adapter can only connect to other partitions within the same system.
B . A virtual Ethernet adapter needs to be connected to an external VLAN capable switch to be able to communicate with other partitions on the same system.
C . A partition can support an unlimited number of virtual Ethernet devices.
D . A virtual Ethernet adapter in the VIO Server that is part of a SEA should not have the "trunk flag" set
-
The syllabus ____ precisely which books should be studied.
-
Which one does not belong to the five dimensions through which we can approach the study of culture?
-
Which of the following is NOT typically part of the study of culture?
-
Which of the following sentences apply the rhetorical device of personification?
A、I had overlooked the necessity of having an “iron will,” … this peculiar metallic quality.
B、It is not so with me, to whom sleep is a coy mistress, …
C、I have herded imaginary sheep until they insisted on turning themselves into white bears or blue pigs, …
D、Discussing the question, … sleep drew the curtain.
-
Which of the following statement applies to the Enterprise Portal? Please choose the correct answer.()
A.The portal is an interface for managing variants of frequently-used transactions
B.The portal buffers all data so that work can continue in the portal if one of the assigned systems fails
C.The portal is a uniform. framework for accessing company data from different systems
D.The portal is only a source of information (display function) and is not used for processing data
-
Which of the following about the scientists‘ study is NOT true? 查看材料
A.They compared zoo-born elephants with wild elephants.
B.They analyzed the records of 800 elephants kept in zoos.
C.The zoo-bom elephants they studied were kept in European zoos.
D.They kept detailed records of all the elephants in their care.
-
Roger Rosenblatt's book Black Fiction, in attempting to apply literary rather than sociopolitical criteria to its subject, successfully alters the approach taken by most previous studies. As Rosenblatt notes, criticism of Black writing has often served as an excuse for expounding on Black history. Addison Gayle's recent work, for example, judges the value of Black fiction by overtly political standards, faring each work according to the notions of Black identity which it put forward.
Although fiction assuredly springs from political circumstances, its authors react to those circumstances in ways other than ideological, and talking about novels and stories .primarily as instruments of ideology limits much of the fictional enterprise. Rosenblatt's literary analysis discloses relations and connotations among works of Black fiction which solely political studies have overlooked or ignored.
Writing acceptable criticism of Black fiction, however, presupposes giving satisfactory answers to a number of questions. First of all, is there a sufficient reason, other than the racial identity of the authors, to group together works by Black authors? Second, how does Black fiction make itself distinct from other modern fiction with which it is largely contemporaneous? Rosenblatt's idea shows that Black fiction constitutes a distinct body of writing that has an identifiable, coherent literary tradition. Looking at novels written by Blacks over the last eighty years, lie discovers recurring concerns and designs independent of chronology. These structures are thematic, and they spring, not surprisingly, from the central fact that the Black characters in these novels exist in a predominantly White culture, whether they try to conform. to that culture or rebel against it.
Black Fiction does leave some aesthetic questions open. Rosenblatt's thematic analysis permits considerable objectivity; he even states that it is not his intention to judge the merit of the various works--yet his reluctance seems misplaced, especially since an attempt to appraise might have led to interesting results. For instance, some of the novels appear to be structurally diffused. Is this a defect, or are the authors working out of, or trying to create, a different kind of aesthetic? In addition, the style. of some Black novels, like Jean Toomer's Cane, verges on expressionism or surrealism; does this technique provide a counterpoint to the popular theme that describes the fate against which Black heroes are struggling, a theme usually conveyed by more naturalistic modes of expression?
In spite of such omissions, what Rosenblatt does include in his discussion makes for a keen and worthwhile study. Black Fiction surveys a wide variety of novels, bringing to our attention in the process some fascinating and little-known works like James Weldon Johnson's Autobiography of an Ex-Colored Man. Its argument is tightly constructed, and its forthright, clear style. exemplifies levelheaded and penetrating criticism.
Roger Rosenblatt looked at Addison Gayle's criticism of Black Fiction with a (n) __ attitude.
A.disapproving
B.consenting
C.objective
D.cautious
-
The company can apply to the FDA for permission to begin human studies when the results of animal studies indicate that the new drug is like to be ______.
-
Which of the following terms could be applied to the simple definition "the energy of motion?
A.Electrical energy
B.Thermal energy
C.Potential energy
D.Kinetic energy