网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A machine’s ONLY external interface is configured with an address of 192.168.5.1 and a netmask of 255.255.255.0.  No slots are available for expansion. Which of the following procedures should be performed to make it function as a gateway?()

  • A、Enable ipforwarding only
  • B、Configure an alias on the same interface and enable ipforwarding
  • C、Add a second interface into the same subnet and enable ipforwarding
  • D、Add a second interface into a different subnet, and enable ipforwarding

参考答案

更多 “A machine’s ONLY external interface is configured with an address of 192.168.5.1 and a netmask of 255.255.255.0.  No slots are available for expansion. Which of the following procedures should be performed to make it function as a gateway?()A、Enable ipforwarding onlyB、Configure an alias on the same interface and enable ipforwardingC、Add a second interface into the same subnet and enable ipforwardingD、Add a second interface into a different subnet, and enable ipforwarding” 相关考题
考题 A computer’s microprocessor only understands _____ in binary form. A、high-level languagesB、machine languageC、human languagesD、assembly language

考题 关于HostMachine和Guest Machine关系描述正确的是() A、使用了虚拟化技术后,一台Guest Machine可以同时使用多台Host Machine的资源B、使用了虚拟化技术后,一台Guest Machine只能运行在创建它的Host Machine上C、使用了虚拟化技术后,一台Host Machine只能运行一个HypervisorD、使用了虚拟化技术后,一台Host Machine上能够运行多台Guest Machine

考题 ---What’s this machine for? ---It can ____clothes.

考题 The Turing machine is an abstract(71)of computer execution and storage introduced in 1936 by Alan Turing to give a mathematically precise definition of(72). or 'mechanical procedure'. As such it is still widely used in theoretical computer science, especially in(73)theory and the theory of computation. The thesis that states that Turing machines indeed capture the informal notion of effective or mechanical method in logic and mathematics is known as Turing's thesis.Every Turing machine computes a certain(74)partial function over the strings over its alphabet. In that sense it behaves like a computer with a fixed program. However, as Alan luring already described, we can encode the action table of every Turing machine in a string. Thus we might try to construct a Turing machine that expects on its tape a string describing an action table followed by a string describing the input tape, and then computes the tape that the encoded Turing machine would have computed. As Turing showed, such a luring machine is indeed possible and since it is able to simulate any other Turing machine it is called a(75)Turing machine.A universal Turing machine is Turing complete. It can calculate any recursive function, decide any recursive language, and accept any recursively enumerable language. According to the Church-Turing thesis, the problems solvable by a universal Turing machine are exactly those problems solvable by an algorithm or an effective method of computation, for any reasonable definition of those terms.A.implementB.patternC.toolD.model

考题 C is sometimes referred to as a 'high -level(66)language'. Some people think that's an insult, but it's actually a deliberate and significant aspect of the language. If you have(67)in assembly language, youll probably find C very natural and comfortable(although if you continue to focus too heavily on machine - level details, youll probably end up with unnecessarily non- portable programs). If you havent programmed in assembly language, you may be frustrated by C 's lack of certain higher - level features. In either case, you should understand why C was de- signed this way: so that seemingly - simple constructions expressed in C would not expand to arbitrarily expensive( in time or(68))machine language constructions when(69). If you write a C program simply and succinctly, it is likely to result in a succinct, efficient machine language executable. If you find that the(70)resulting from a C program is not efficient, it's probably because of something silly you did, not because of something the compiler did behind your back which you have no control over. In any case, there's no point in complaining about C's low - level flavor: C is what it is.A.assemblyB.combinationC.groupingD.compounding

考题 A technician needs to ping a client’s machine that the technician is working on, to ensure that thenetwork card is functioning correctly. Which of the following IP addresses should be used?() A.10.76.0.1B.127.0.0.1C.192.168.0.1D.255.255.255.0

考题 A virus has been removed from the user’s machine, but the user still cannot access the Internet.Which of the following should the technician check NEXT?()A、Disable port forwarding on the router.B、Reboot to Safe Mode and see if the Internet is accessible.C、Format the machine and reinstall the OS.D、Check the web browser’s proxy settings.

考题 A technician notices a machine’s performance has degraded. The machine has constant errorswhen trying to read data from the drive. Which of the following should be used to repair the disk errors?()A、DEFRAGB、MSCONFIGC、EDITD、CHKDSK

考题 Which of the following tools would a technician use to map a drive to a user’s machine?()A、SSHB、NETUSEC、NETSTATD、SSL

考题 A manager calls with an urgent issue and needs their machine fixed as soon as possible. Thetechnician arrives and the office is empty, however there are several confidential papers on the desk. Which of the following should the technician do NEXT?()A、Wait for the manager to return to clear the papers.B、Move the papers to the manager’s filing cabinet.C、Return to the work area with another employee.D、Begin work on the manager’s machine immediately.

考题 Which of the following commands would you run to add your machine to an NT4 domain?()A、 net rpc join -S PDC -UAdministrator%passwordB、 net ads join -s PDC -UAdministrator%passwordC、 net rpc join -s PDC -UAdministrator%passwordD、 net ads join -W PDC -nAdministrator%password

考题 The rmss command provides the facility to run an application over a range of memory sizes and display the performance statistics. How is the simulated memory reset to the real memory of the machine?()A、 rmss -cB、 rmss -pC、 rmss -rD、 rmss -s

考题 A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()A、ipforwarding turned on and two adaptersB、One adapter, with a route to a default gatewayC、An adapter in each network, and ipforwarding offD、An adapter in each network, with a route only to the default gateway

考题 When choosing a hostname, which of the following naming conventions is most important to consider?()A、The name is unique globallyB、The name is unique in a specified domainC、The name is not named after a person, place or thingD、The name has special meaning to the machine’s function

考题 When using a mksysb and base media to clone a system, which of the following will cause the installation to fail()A、mksysb made on a single processor machine but is being installed on a multiple processor machine, no editing of the image.data fileB、mksysb made on machine with mirrored rootvg and new machine only has one disk in rootvg, no editing of the image.data fileC、mksysb made on a machine with 32GB of RAM but being installed on a machine with only 8GB of RAMD、mksysb made on a machine with virtual Ethernet adapter but being installed on a machine which only has a physical Ethernet adapter

考题 Which information is required to get the feature activation codes()A、machine serial number, model, and machine signatureB、model, disk size, and machine serial numberC、model, Storage Managerversion, and machine signatureD、model, WWNN, and machine serial number

考题 An administrator performs a Live Partition Mobility operation. After the operation completes, the administrator runs errpt -a.  What is the machine ID reported by errpt command?()A、 The machine ID of the machine that logged the errorB、 The machine ID of the machine that it is currently running onC、 The administrator defined machine ID in the /etc/machineid fileD、 The machine ID of the machine that the operating system was originally started on

考题 单选题A technician needs to ping a client’s machine that the technician is working on, to ensure that thenetwork card is functioning correctly. Which of the following IP addresses should be used?()A 10.76.0.1B 127.0.0.1C 192.168.0.1D 255.255.255.0

考题 单选题What does the man’s company mainly produce?A Medical equipment.B Special machine.C Medicine for hospitals.

考题 单选题An administrator performs a Live Partition Mobility operation. After the operation completes, the administrator runs errpt -a.  What is the machine ID reported by errpt command?()A  The machine ID of the machine that logged the errorB  The machine ID of the machine that it is currently running onC  The administrator defined machine ID in the /etc/machineid fileD  The machine ID of the machine that the operating system was originally started on

考题 单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A Request the user to logoff and log back on.B Add the user as an administrator on their local machine.C Add the user as an administrator on the server.D Run an ipconfig /renew on the user’s machine.

考题 单选题Which of the following commands would you run to add your machine to an NT4 domain?()A  net rpc join -S PDC -UAdministrator%passwordB  net ads join -s PDC -UAdministrator%passwordC  net rpc join -s PDC -UAdministrator%passwordD  net ads join -W PDC -nAdministrator%password

考题 单选题What are customers told to do?A Read the warranty carefullyB Clean the machine with gentle chemicalsC Refrain from closing the machine by handD Dry the machine after cleaning

考题 单选题The company’s vehicles are equipped with _____.A up-to-date video playersB the latest computer systemsC a new model of card readerD an automatic quoting machine

考题 单选题A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()A ipforwarding turned on and two adaptersB One adapter, with a route to a default gatewayC An adapter in each network, and ipforwarding offD An adapter in each network, with a route only to the default gateway

考题 单选题Which information is required to get the feature activation codes()A machine serial number, model, and machine signatureB model, disk size, and machine serial numberC model, Storage Managerversion, and machine signatureD model, WWNN, and machine serial number

考题 单选题The rmss command provides the facility to run an application over a range of memory sizes and display the performance statistics. How is the simulated memory reset to the real memory of the machine?()A  rmss -cB  rmss -pC  rmss -rD  rmss -s

考题 单选题_____A l’ordinateurB la machine à écrireC la machine à laverD la machine à coudre