网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

The(72)turns the source file into an object file and the(73)turns the object file into an executable file.

A.translator

B.compiler

C.interpreter

D.linker


参考答案

更多 “ The(72)turns the source file into an object file and the(73)turns the object file into an executable file.A.translatorB.compilerC.interpreterD.linker ” 相关考题
考题 You develop a serializable class for persisting objects as files.Every time an object is serialized, you have to update the database with the name of the object and location of that file.You elect to employ the OnSerialized attribute to achieve this objective.You now need to apply the OnSerialized attribute to a certain method.What should you do?()A.B.C.D.

考题 Certkiller.com has given you the task of serializing an object and writing it to a data file using binary serialization.You need to ensure that you meet these requirements.What should you do?() A.B.C.D.

考题 有以下程序: include include include intmain() {fstreamfil 有以下程序:include <iostream.h>include <fstream.h>include <stdlib.h>int main(){fstream filel,file2;char line[100];filel.open("source.txt",ios::in);if(!file1){cout<<"Can't open file source.txt!"<<end1;abort();}file2.open("dest.txt",ios::out);if(!file2){cout<<"Can't open file dest.txt!"<<end1;abort();}while(!file1.eof()){filel.getline(1ine,100);file2<<line;file2<<end1;}filel.close();file2.close();return 0;}此程序实现的功能是【 】。

考题 FileSystem Object有两个方法,分别为CreatText File方法和OpenText File方法。

考题 Which the two are concerning the objects available to developers creating tag files?()A、 The session object must be declared explicity.B、 The request and response objects are available implicity.C、 The output stream is available through the implicit outStream object.D、 The servlet context is available through the implicit servletContext object.E、 The JspContext for the tag file is available through the implicit jspContext object.

考题 With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()A、IETFB、PFCC、TCAMD、ASIC

考题 You completed your workflow definition. You want to save a copy of the definition to the file system for source control purposes. How does Oracle Workflow Builder save that file?()A、as a flat fileB、as a BPEL-compiled definitionC、as an XML file with an associated document type definition (DTD)D、as an XML file without an associated document type definition (DTD)

考题 Which tool in the layout model could you use to create an external boiler plate object?()A、Field B、Frame C、Button D、RectangleE、Link file

考题 Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.     You create a GPO. You need to track which employees access the Payroll files on the file  servers.   What should you do()    A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configureB、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing fC、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file seD、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, config

考题 You are designing a strategy for migrating the UNIX user accounts to Active Directory.  Which three actions should you perform?()A、 Import the user accounts as inetOrgPerson objects.B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.C、 Export all user accounts from the UNIX servers to a text file.D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.E、 Assign random passwords to each user object, and securely distribute the password to the users.F、 Create the same strong password for each user object, and require users to change their passwords at first logon.G、 Instruct users to use the same name and password as they used on the UNIX servers.

考题 Your company purchases a new application to deploy on 200 computers. The application requires  that you modify the registry on each target computer before you install the application.     The registry modifications are in a file that has an .adm extension.     You need to prepare the target computers for the application.     What should you do()A、Import the .adm file into a new Group Policy Object (GPO). Edit the GPO and link it to an organizational unit that computer.B、Create a Microsoft Windows PowerShell script to copy the .adm file to the startup folder of each target computer.C、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRUsr CONTAID、Create a Microsoft Windows PowerShell script to copy the .adm file to each computer. Run the REDIRCmp CONTA

考题 You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

考题 多选题You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()AImport the user accounts as inetOrgPerson objects.BImport the user accounts into Active Directory by using the Ldifde command-line tool.CExport all user accounts from the UNIX servers to a text file.DExport all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.EAssign random passwords to each user object, and securely distribute the password to the users.FCreate the same strong password for each user object, and require users to change their passwords at first logon.

考题 单选题You are creating a sales data template and need to add a picture to the margin. What is the best way to add this margin?()A Choose the margin code in the object navigator and select file-import-image. B Choose the margin node in the object navigator and use the tool bar button. C Click the margin button in the layout model and select file-import-image. D Click the margin button in the layout model and use the tool bar button.

考题 单选题Given that file is a reference to a File object that represents a directory, which code fragments will succeed in obtaining a list of the entries in the directory?()A Vector filelist = ((Directory) file).getList();B String[] filelist = file.directory();C Enumeration filelist = file.contents();D String[] filelist = file.list();E Vector filelist = (new Directory(file)).files();

考题 单选题Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do()A Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.B Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing for the Authenticated Users group in the Payroll folder.C Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.D Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.

考题 单选题You completed your workflow definition. You want to save a copy of the definition to the file system for source control purposes. How does Oracle Workflow Builder save that file?()A as a flat fileB as a BPEL-compiled definitionC as an XML file with an associated document type definition (DTD)D as an XML file without an associated document type definition (DTD)

考题 单选题Which statements are true, given the code new FileOutputStream("data", true) for creating an object of class FileOutputStream?()A FileOutputStream has no constructors matching the given arguments.B An IOExeception will be thrown if a file named data already exists.C An IOExeception will be thrown if a file named data does not already exist.D If a file named data exists, its contents will be reset and overwritten.E If a file named data exists, output will be appended to its current contents.

考题 多选题You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()ACreate the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.BCreate a new FileSecurity object.CApply the permissions by using the File class.DCreate a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.ECreate a new FileSystem Audit Rule object and add it to the FileSecurity object.

考题 单选题You create an unattended installation file named unattend.txt. You plan to use an answer file to perform an automated installation of Windows XP Professional. You need to ensure that a line-of-business application is installed automatically after the installation of Windows XP Professional is complete. What should you do?()A Add a [GuiUnattend] section to unattend.txt.B Include a [GuiRunOnce] section in unattend.txt.C Create an unattend.bat file. Place the file in the root of the installation source files.D Create a registry file named setup.reg. Place the file in the root of the installation source files.

考题 多选题Which the two are concerning the objects available to developers creating tag files?()AThe session object must be declared explicity.BThe request and response objects are available implicity.CThe output stream is available through the implicit outStream object.DThe servlet context is available through the implicit servletContext object.EThe JspContext for the tag file is available through the implicit jspContext object.

考题 单选题Which tool in the layout model could you use to create an external boiler plate object?()A Field B Frame C Button D RectangleE Link file

考题 单选题You create a Web application to process XML documents. The Web application receives XML document files from several sources, reads them, and stores them in a Microsoft SQL Server database. The Web application parses all incoming data files to ensure that they conform to an XML schema. You need to find all validation errors in the XML document. What should you do? ()A Load the XML data by using an instance of the XmlDocument class and specify a location for the application schema.B Configure the ValidationEventHandler in the XmlReaderSettings of the XmlReader object.C Read the XML file into a DataSet object and set the EnforceConstraints property to True.D Read the XML file into a DataSet object. Handle the DataSet.MergeFailed event to parse the data that does not conform to the XML schema.

考题 多选题10. class MakeFile {  11. public static void main(String[] args) {  12. try {  13. File directory = new File(”d”);  14. File file = new File(directory,”f”);  15. if(!file.exists()) {  16. file.createNewFile();  17. }  18. } catch (IOException e) {  19. e.printStackTrace  20. }  21. }  22. }  The current directory does NOT contain a directory named “d.” Which three are true?()ALine 16 is never executed.BAn exception is thrown at runtime.CLine 13 creates a File object named “d”.DLine 14 creates a File object named “f‟.ELine 13 creates a directory named “d” in the file system.FLine 16 creates a directory named “d” and a file “f”  within it in the file system.GLine 14 creates a file named f inside of the directory named “d” in the file system.

考题 单选题You are developing a report to allow customers in a department store to view product information. You added a button to the layout to allow customers to view the picture of the product. Which button property would you alter to specify the source of the .BMP file?()A Type B Multimedia file C Multi media file type D Label type