网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
A real-time operating system.(RTOS)is an operating system intended to serve(请作答此空)application process data as it comes in,typically without buffering delays.A key( )of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application’s task;the variability is jitter.A hard real-time operating system has( )jitter than a soft real-time operating system.The chief design goal is not high throughput,but rather a guarantee of a soft or hard performance category.A RTOS has an advanced algorithm for scheduling.( )flexibility enables a wider,computer-system orchestration of process priorities,but a real-time OS is more frequently dedicated to a narrow set of applications.Key factors in a real-time OS are minimal( )latency and minimal thread switching latency.

A.normal
B.real-time
C.user
D.kernel

参考答案

参考解析
解析:
更多 “A real-time operating system.(RTOS)is an operating system intended to serve(请作答此空)application process data as it comes in,typically without buffering delays.A key( )of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application’s task;the variability is jitter.A hard real-time operating system has( )jitter than a soft real-time operating system.The chief design goal is not high throughput,but rather a guarantee of a soft or hard performance category.A RTOS has an advanced algorithm for scheduling.( )flexibility enables a wider,computer-system orchestration of process priorities,but a real-time OS is more frequently dedicated to a narrow set of applications.Key factors in a real-time OS are minimal( )latency and minimal thread switching latency.A.normal B.real-time C.user D.kernel” 相关考题
考题 Windows is a GUI-based operating system.() 此题为判断题(对,错)。

考题 从供选择的答案中选出应填入英语文句中()的正确的答案。Software products may be (A) into four basic types: application programs, programming language processors, operating systems, and system utilities.Application programs are programs that (B) useful tasks such as solving statistical problems, or keeping your company's books.Programming language processors are programs that (C) the use if a computer language in a computer system. They are tools for the development of application programs.Operating systems are programs that (D) the system resources and enable you to run application programs.System utilities are special programs that (E) the usefulness of or add capabilities to a computer.A~E: ① manage ② perform ③ support ④ reduce⑤ divided ⑥ enhance ⑦ implemented ⑧ introduce⑨ ranked ⑩ run

考题 Only in this way ____ to make improvements in the operating system. A.you can hopeB.you did hopeC.can you hope

考题 Which two statements about Oracle Direct Network File System (NFS) are true?() A. It bypasses the OS file system cache.B. A separate NFS interface is required for use across Linux, UNIX, and Windows platforms.C. It uses the operating system kernel NFS layer for user tasks and network communication modules.D. File systems need not be mounted by the kernel NFS system when being served through Direct NFS.E. Oracle Disk Manager can manage NFS on its own, without using the operating system kernel NFS driver.

考题 For users, microkernel technology promises(90), compact and sophisticated operating systems that are typically(91)across a range of hardware platforms. These operating systems will be customizable to let users run multiple operating system and application "personalities" on top of a single microkernel(92).Microkernel based systems can provide this flexibility because the core operating system functions are(93)from the large number of utilities, features and extensions that are layered on top of them. As a result, updating and maintaining operating system is easier, since developers don't have to modify the(94)every time they must acid a new feature.A.slowB.fastC.quicklyD.speed

考题 Which component of VPN technology ensures that data can be read only by its intended recipient?() A. data integrityB. encryptionC. key exchangeD. authentication

考题 ●A disk scheduling mechanism in an operating system causes the disk arm to sweepback and forth across the disk surface servicing all requests in its path. This is a () :()A. First Come First Serve B. Shortest Seek Tn-ne FirstC. Scan D. None of the above

考题 ● (73) manages the other components of a computer system.(73)A.BusB.Application systemC.Operating systemD.Disk

考题 A real-time operating system.(RTOS)is an operating system intended to serve( )application process data as it comes in,typically without buffering delays.A key(请作答此空)of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application’s task;the variability is jitter.A hard real-time operating system has( )jitter than a soft real-time operating system.The chief design goal is not high throughput,but rather a guarantee of a soft or hard performance category.A RTOS has an advanced algorithm for scheduling.( )flexibility enables a wider,computer-system orchestration of process priorities,but a real-time OS is more frequently dedicated to a narrow set of applications.Key factors in a real-time OS are minimal( )latency and minimal thread switching latency.A.characteristic B.programming C.structure D.computer

考题 Together with the network layer,the transport layer is the heart of the protocol ( 请作答此空).The network layer provides end-to-end () delivery using datagrams or virtual circuits.The transport layer builds on the network layer to provide data transport from a process on a () machine to a process on a destination machine with a desired level of reliability that is independent of the physical () currently in use.It provides the abstractions that applications nedd to use the network..Without the () layer,the whole concept of layered protocols would make little sense.A.transport B.network C.hierarchy D.service

考题 (请作答此空)analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems.Ultimately,the system models become the( )for designing and constructing an improved system.( )is such a technique.The emphasis in this technique is process-centered.Systems analysts draw a series of process models called( )、( )is another such technique that integrates data and process concerns into constructs called objects.A.Prototyping B.Accelerated C.Model-driven D.Iterative

考题 ( )analysis emphasizes the drawing of pictorial system models to document and validate both existing and/or proposed systems.Ultimately,the system models become the( )for designing and constructing an improved system.( )is such a technique.The emphasis in this technique is process-centered.Systems analysts draw a series of process models called( )、(请作答此空)is another such technique that integrates data and process concerns into constructs called objects.A.Structured analysis B.Information Engineering C.Discovery Prototyping D.Object-Oriented analysis

考题 Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. existing database and application program B. application program and user interface C. existing database and user interface D. existing database,application program and user interface

考题 A server is having problems booting into the operating system. Which of the following can provide important information to begin to troubleshoot the cause?()A、System logsB、Firmware updatesC、POST messagesD、Application logs

考题 Which is a license scope option when managing activations for an IBM System Storage DS8100using the IBM Disk Storage Feature Activation (DSFA) application?()A、Operating environmentB、Parallel access volumesC、Point-in-time copyD、Count Key Data

考题 Which component of VPN technology ensures that data can be read only by its intended recipient?()A、data integrityB、encryptionC、key exchangeD、authentication

考题 A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A、 System logsB、 Firmware updatesC、 POST messagesD、 Application logs

考题 A system administrator completed an upgrade of the maintenance level of their AIX system. Which of the following commands should be run to verify that the operating system is in a consistent state?()A、instfix -iB、lslpp -lC、lppchk -vD、oslevel -r

考题 A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()A、Will the application require a database?B、Which operating system does the application require?C、Will the data need to be backed up in real time?D、Does the application share data among the servers?

考题 Which statement is true regarding the Junos OS?()A、The Junos kernel is based on the Solaris operating system.B、The Junos kernel is based on the GNU Zebra operating system.C、The Junos kernel is completely original and not based on any other operating system.D、The Junos kernel is based on the FreeBSD UNIX operating system.

考题 单选题A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()A Will the application require a database?B Which operating system does the application require?C Will the data need to be backed up in real time?D Does the application share data among the servers?

考题 单选题A server is having problems booting into the operating system.  Which of the following can provide important information to begin to trouble shoot the cause?()A  System logsB  Firmware updatesC  POST messagesD  Application logs

考题 单选题Which statement is true regarding the Junos OS?()A The Junos kernel is based on the Solaris operating system.B The Junos kernel is based on the GNU Zebra operating system.C The Junos kernel is completely original and not based on any other operating system.D The Junos kernel is based on the FreeBSD UNIX operating system.

考题 单选题You install the Web Server (IIS) role on a new server that runs Windows Server 2008.  You install a Microsoft .NET Framework 1.0 application on a Web site on the Web server. The company security policy states that all applications must run by using the minimum level of permission.  You need to configure the Web site application so that it has the permissions to execute without creating any other content and without accessing any operating system components. What should you do?()A Set the .NET Framework trust level to Full for the Web site.B Set the .NET Framework trust level to Low for the Web site.C Set the .NET Framework trust level to High for the Web site.D Set the .NET Framework trust level to Medium for the Web site.

考题 单选题Which of the following BEST describes the initial process of setting up a new operating system from a CD-ROM? ()A Format a partition, install device drivers, and install the operating system.B Create a partition, format the partition, and install the operating system.C Install the operating system, create a partition, and install device drivers.D Install the operating system, install device drivers, and create a partition.

考题 单选题You issue this SQL statement:  ALTER DATABASE RENAME FILE ’/ORADATA/u02/user_data01.dbf’ TO ’/ORADATA/u04/user_data01.dbf’;  What does this SQL statement do?()A It updates the control file with the new location of the data file. B It updates only the data dictionary with the new location of the data file. C It changes the location of the user_data01.dbf file in the operating system. D It changes the location of the user_data01.dbf file in the operating system and updates the control file with the new location of the data file.

考题 多选题You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   When the application is running, it must not be able to access protected registry keys.   You need to ensure that the application meets the outlined requirement. What are two possible ways to achieve this goal?()AUse Microsoft Windows Mobile 5.0 Pocket PC Phone Edition operating system.BUse Microsoft Windows Mobile 2003 for Pocket PC operating system.CUse Microsoft Windows Mobile 5.0 for Smartphone operating system.DUse Microsoft Windows Mobile 2003 for Smartphone operating system.

考题 多选题The current time zone for one of the user sessions is set to the database local time zone. For one application, the user session requires the time zone to be set to the local operating system time zone without affecting other user sessions. Which two solutions could the user implement to achieve this objective? ()Ause the ALTER SYSTEM command to change the time zoneBuse the ALTER SESSION command to change the time zoneCuse the ALTER DATABASE command to change the time zoneDset the value for the operating system variable ORA_SDTZ on the client machineEset the value for the operating system variable ORA_SDTZ on the database server machine