-
Which of the following statements describes the functions of a reservoir used in a hydraulic system?()
A . Dissipate heat
B . Trap foreign matter
C . Separate air from the oil
D . All of the above
-
总成本函数(Total cost function)
-
已知阿科曼函数(Ackermann function)是一种递归函数,但该函数却是不可以计算的问题
A . 正确
B . 错误
-
传递函数(transfer function)
-
Which statement describes the FIP function of the FCoE Initiation Protocol? ()
A . It is required to establish the point-to-point FCoE links with the first switch in the path.
B . It is required to establish the point-to-point FCoE links with any switch across multiple Ethernet segments.
C . It is not used to build the FCoE links.
D . It is used to ensure lossless transport.
-
Which statement correctly describes the function of Oracle9i Cache Fusion feature?()
A . It provides each session with its own view of the database at a different point in the past.
B . It enables you to execute scalable applications on a clustered database without having to partition the users or the database tables.
C . It lets you dynamically reassign memory in your database buffer cache to different block buffer sizes.
D . It allows you to add new sites to multimaster replication environment without quiescing the master definition site.
-
Which of the following correctly describe the various functions and virtues of a router?()
A . Packet switching
B . Collision prevention on a LAN segment.
C . Packet filtering
D . Broadcast domain enlargement
E . Broadcast forwarding
F . Internetwork communicatio
-
Which three statements describe the functionality of the DO_KEY built-in?()
A . It accepts both a built-in and a key name as argument.
B . If no key trigger is defined, the specified built-in executes.
C . Its parameter must be specified in upper case, enclosed in single quotation marks.
D . It performs the same task as if you pressed the function key associated with the specified argument.
E . It executes the key trigger that corresponds to the built-in specified as its parameter.&e
-
Which statement best describes the relationships between AAA function and TACACS+, RADIUS based onthe exhibit shown?()https://assets.asklib.com/images/image2/2018072315554569775.jpg
A . TACACS+ - P4S1 and P4S4RADIUS - P4S2 and P4S3
B . TACACS+ - P4S2 and P4S4RADIUS - P4S1 and P4S3
C . TACACS+ - P4S1 and P4S3Actual RADIUS - P4S2 and P4S4
D . TACACS+ - P4S2 and P4S3RADIUS - P4S1 and P4S4
-
Which statement most accurately describes the function of the Cisco Unity Express Auto Attendant?()
A . Auto Attendant answers calls and directs them to voice mail if the extension entered does not answer the call.
B . Auto Attendant is designed to provide operator-like functionality for after-hour, weekend, and holiday operations.
C . Auto Attendant will answer calls and will allow the caller to self-direct by entering the extension, entering the name, or dialing 0 for the operator.
D . Auto Attendant will answer calls, collect digits, and forward calls to the operator for further processing.
-
Which of the following statements describes the function of an air compressor intake filter?()
A . Protects against suction valve float
B . Provides a positive pressure on the air inlet valves
C . Prevents lubricating oil contamination of the compressed air supply
D . Protects against the damaging effects of airborne solid particle
-
Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()
A . AirDefense for wireless IDS is required by autonomous APs.
B . 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
C . APs only monitor the RF channels that are servicing the clients.
D . Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
E . Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
-
Which four statements correctly describe functions that are available in SQL? ()
A . INSTR returns the numeric position of a named character.
B . NVL2 returns the first non-null expression in the expression list.
C . TRUNCATE rounds the column, expression, or value to n decimal places.
D . DECODE translates an expression after comparing it to each search value.
E . TRIM trims the heading or trailing characters (or both) from a character string.
F . NVL compares two expressions and returns null if they are equal, or the first expression if they are not equal.
G . NULLIF compares two expressions and returns null if they are equal, or the first expression if they are not equal.
-
A System x client is interested in IBM ToolsCenter Bootable Media Creator but is concerned about functions.Which of the following describes the functions of ToolsCenter Bootable Media ?()
A . Update Firmware, Update Drivers, Run Diagnostics, Install Windows
B . Update Firmware, Run Diagnostics, Install Windows, and Linux Operating Systems
C . Update Firmware, Run Diagnostics, Install Windows
D . Update Firmware, Update Drivers, Install Window
-
Production function生产函数
-
Which of the following describe router functions?()
A . Packet switching
B . Collision prevention on a LAN segment
C . Packet filtering
D . Broadcast domain enlargement
E . Broadcast forwarding
F . Internetwork communicatio
-
生产函数(Production function)
-
Which two statements describe the functions and operations of IDS and IPS systems?()
A . A network administrator entering a wrong password would generate a true-negative alarm.
B . A false positive alarm is generated when an IDS/IPS signature is correctly identified.
C . An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
D . Cisco IDS works inline and stops attacks before they enter the network.
E . Cisco IPS taps the network traffic and responds after an attack.
F . Profile-based intrusion detection is also known as "anomaly detection".
-
A System x client is interested in IBM ToolsCenter Bootable Media Creator but is concerned about functions Which describes the functions of ToolsCenter Bootable Media of the following?()
A . Updatefirmware, update drivers, run diagnostics, install Windows
B . Update firmware, run diagnostics, install Windows
C . Update firmware, run diagnostics, install Windows, and install Linux
D . Update firmware, update drivers, install Windows, and install Linux
-
Which three statements correctly describe the functions and use of constraints? ()
A . Constraints provide data independence.
B . Constraints make complex queries easy.
C . Constraints enforce rules at the view level.
D . Constraints enforce rules at the table level.
E . Constraints prevent the deletion of a table if there are dependencies.
F . Constraints prevent the deletion of an index if there are dependencies.
-
如下普通函数到箭头函数是否正确 var f = function()=>5; };
-
Which of the following best describes the function of the last paragraph in relation to the passage as a whole?
A.It summarizes the benefits that students can derive from the experimental scholarly methods course.
B.It provides additional reasons why Griffith's works raises issues having to do with the cannon of authors.
C.It provides an illustration of the immediate nature of the experiences students can derive from the experimental scholarly methods course.
D.It contrasts the experience of a student in the experimental scholarly methods course with the experience of a student in the traditional course.
此题为多项选择题。
-
_____describes functionality of the software to be constructed, the core of which is to describe the interaction between the actor and the system, but not the internal activity of the system._____描述了要
A.Use case diagram
B.Class diagram
C.Collaboration diagram
D.State diagram