-
The system administrator has requested that all setuid/setgid bits be removed from executables in application filesystem. Which command will achieve this?()
A . chmod -R o-s /application
B . chmod -R ug-s /application
C . chmod -R -s -o /application
D . chmod -R -s -ug /applicatio
-
all of the following are function of crm system except ()
A . A、automation procurement
B . B、automation sales
C . C、automation marketing
D . D、automation customer service
-
The IBM XIV Storage System supports all of the following fiber channel speeds EXCEPT:().
A . 1Gbps
B . 2Gbps
C . 4Gbps
D . 8G
-
Which system may be useful for messages,such as local storm warnings or a shore-to-ship distress alert,for which it is inappropriate to alert all ships in the satellite coverage area?()
A . NAVTEX
B . EGC
C . AMVER
D . DSC
-
After "F.W.E" is given, the air system is shut down, the () gear put in, all drains and indicator cocks opened, and the cooling water kept running.
A . steering
B . timing
C . turning
D . running
-
Which of the following operating systems can be upgraded to Windows 2000 Professional in addition that all systems meet the minimum hardware requirements for the upgrade?()
A . Windows NT Workstation 3.5
B . Windows NT Workstation 3.51
C . Windows NT Workstation 4.0
D . Windows 95
E . Windows 98
F . Windows 3.11
-
For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. Which of the following options would enable a five minute timeout for all users()
A . Add the following line to /etc/environment: TMOUT=300
B . Add the following lines to /.profile TMOUT=5 export TMOUT
C . Run the following command: chuser -u ALL -a TIMEOUT=5M
D . Run the following command: chsec -u ALL -a TIMEOUT=600
-
The IBM XIV Storage System is designed to be cost-efficient in all aspects, while deliveringoutstanding and consistent performance. Which of these features is currently UNAVAILABLE onthe XIV system?()
A . single-tier architecture supports all kinds of storage in one environment and makes scaling easy
B . built-in thin-provisioning allows the acquisition and installation of additional capacity to bedelayed until needed.
C . innovative use of solid state disk drives offers excellent capacity-for-cost value while meetingenterprise performance standards
D . use of off-the-shelf components makes customized hardware unnecessary and makes itpossible to integrate state-of-the-art hardware assoon as it becomes available.
-
Most Computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP().
A . plan
B . requirement
C . implementation
D . design
-
When stand-by engine instructions have been received, it’s necessary to make it sure that all valves in the various systems are()
A . operational
B . open
C . closed securely
D . at middle positio
-
A customer claims that while redeploying a web application in the production system all their customers are having to log in again. What do you recommend? ()
A . Sessions can't be preserved when redeploying applications. The customer needs to consider redeployment during late nights when the traffic is low.
B . Change the flag responsible for the development mode of their environment. In the production mode, all sessions are preserved while redeploying application.
C . Change Hotspot to JRockit. Sessions can't be preserved on HotSpot when redeploying application.
D . Use flag -version when redeploying the application. This will switch on the Side By Side deployment feature and preserve existing sessions.
E . Open a service request with Oracle Support. This is unexpected behavior. Sessions are preserved without any extra settings.
-
For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()
A . Add the following line to /etc/environment: TMOUT=300
B . Add the following lines to /.profile TMOUT=5 export TMOUT
C . Execute the following command: chuser -u ALL -a TIMEOUT=5M
D . Execute the following command: chsec -u ALL -a TIMEOUT=600
-
Which command shows all the paging spaces available on a system?()
A . lsps -a
B . showps -a
C . psdisplay -l
D . swaplist -ALL
-
The function of () in a refrigeration plant using Freon is to move moisture from all refrigeration system.
A . filter
B . filter drier
C . heat exchanger
D . air cooler
-
Which command shows all the paging spaces available on a system?()
A . lsps -a
B . showps -a
C . psdisplay -l
D . swaplist -ALL
-
New AIX systems arrive without a CDROM drive. All systems do not have the system hardware configuration. Which of the following options is the most appropriate way to install AIX on the systems?()
A . Install CDROM drives or tape drives on the systems because that is the only way to install AIX.
B . Install one system. Take a mksysb from the first system and resotre the mksysb to the remaining systems.
C . Install one system. Mirror rootvg onto a disk from each of the remaining systems.
D . Setup and NIM master and resources.
-
All the countries in the world adopt the metric system, except ( )?
-
An effective system of disease prevention and treatment has been established in every country,all over the world.
A.Right
B.Wrong
C.Not mentioned
-
3:The suggestions or methods of improving the judicial system in the United States mentioned in the passage include all the following except______.
A.to allow districts that have an overabundance of pending cases to borrow judges from other districts
B.to establish small-claims courts
C.to request plaintiffs to waive the right to jury trial and the right to appeal the decision
D.to use pretrial conferences
-
You are the network administrator for The network consists of a single ActiveDirectory domain named All domain controllers run Windows Server 2003, and each one has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil the following requirements:System recovery must be possible in the event of server failure.The system configuration and all current dynamic disk configurations must be backed up.Other data partitions do not need to be backed up.What should you do?()
A. Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.
B. Use the Backup utility to back up the contents of all mounted drives.
C. Use the Backup utility to back up only the System State data.
D. Use the Copy command to copy C:\windows and its subfolders to a shared folder on the network.
E. Use the Xcopy command to copy C:\windows and its subfolders to a shared folder on the network.
-
In computing, passwords are commonly used to limit access to official users. Yet the widespread use of passwords has serious drawbacks. Office workers now have to remember an average of twelve system passwords. In theory they should use different passwords for each site, but in reality these would be impossible to remember, so many people use the same password for all.
An additional problem is that the majority use simple words such as "hello", or names of family members, instead of more secure combinations of numbers and letters, such as 6ANV76Y. This permits computer hackers to download dictionaries and quickly find the word that allows them access.
When system users forget their passwords there is extra expense in supplying new ones, while if people are forced to change passwords frequently they often write them down, making systems even less secure. Therefore, it is clear that the idea of passwords, which have been used as security devices for thousands of years, may need rethinking.
One possible alternative has been developed by the American firm Real User, and is called "passfaces". In order to access the system a worker has to select a series of photographs of faces from a randomly (随机地) generated sequence. If the pictures are selected in the correct order, access is granted. This concept depends on the human ability to recognize and remember a huge number of different faces, and the advantage is that such a sequence cannot be told to anyone or written down, so is more secure. It is claimed that the picture sequence, which used photographs of university students, is easier to remember than passwords, and it has now been adopted for the United States Senate.
What is the disadvantage of passwords as mentioned in Paragraph 1?
A.They do not ensure security.
B.They are difficult to remember.
C.They have to be changed frequently.
D.They limit computer accessibility.
-
If national health insurance would not cure the problems of the American healthcare system, what, then, is responsible for them? Suspicion falls heavily on hospitals, which make up the largest component of the system. In 1988 hospitals accounted for 39% of all health expenditures-more than doctor, nursing homes, drugs, and home health care combined.
Although U.S. hospitals provide outstanding research and frequently excellent care, they also exhibit the classic attributes of insufficient organizations: increasing costs and decreasing use. The average cost of a hospital stay in 1987—$3,850—was more than double the 1980 cost. A careful government analysis published in 1987 revealed the inflation of hospital costs, over and above general price inflation, as a major factor in their growth, even after allowances were made for increases in the population and in intensity of care. While the rate of increase for hospital costs was 2796 greater than that for all medical care and 163% greater than that for all other goods and services, demand for hospital services fell by 34%. But hospitals seemed oblivious of the decline: during this period the number of hospital beds shrank only by about 396, and the number of full-time employees grew by more than 240,000.
After yet another unexpectedly high hospital-cost increase last year, one puzzled government analyst asked: "Where's the money going?" Much of the increase in hospital costs—amounting to $180 billion from 1965 to 1987—went to duplicating medical technology available in nearby hospitals and maintaining excess beds. Modern Healthcare, a leading journal in the field, recently noted that "anecdotes of hospitals' unnecessary spending on technology abound". Medical technology is very expensive. An operating room outfitted to perform. open-heart surgery costs hundreds of thousands of dollars. From 1982 to 1989 the number of hospitals with open-heart-surgery facilities grew by 33%, and the most rapid growth occurred among smaller and moderate-sized hospitals. This growth was worrisome for reasons of both costs and quality. Underused technology almost inevitably decreases quality of care. In medicine, as in everything else, practice makes perfect. For example, most of the hospitals with the lowest mortality rates for coronary-bypass surgery perform. at least fifty to a hundred such procedures annually, and in some cases many more; the majority of those with the highest mortality rates perform. fewer than fifty a year.
According to the passage, the American health-care system______.
A.is working smoothly
B.is the best system in the world
C.is not working efficiently
D.in on the point of collapses
-
Attempts to ______this old system have been made in every presidentialelection in the past one hundred years, but the system has survived all assaults.
A、break down
B、break in
C、break up
D、break through
-
You are the network administrator for The network consists of asingle Active Directory domain named All domain controllers runWindows Server 2003, and all client computers run Windows XP Professional. Eachdomain server has a locally attached tape device.You need to back up each domain controller. Your backup process must fulfil thefollowing requirements:a. System recovery must be possible in the event of server failure.b. The system configuration and all current dynamic disk configurations must bebacked up.c. Other data partitions do not need to be backed up.What should you do?()
A. Use the Backup utility to back up the system files and to create an Automated System Recovery (ASR) disk.
B. Use the Backup utility to back up the contents of all mounted drives.
C. Use the Backup utility to back up only the System State data.
D. Use the Copy command to copy C:\windows and its subfolders to a shared folder on the network.
E. Use the Xcopy command to copy C:\windows and its subfolders to a shared folder on the network.