网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following technologies can detect and fix single bit memory errors?()
A

 RAID

B

 Registered memory

C

 SDRAM

D

 ECC


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following technologies can detect and fix single bit memory errors?()A  RAIDB  Registered memoryC  SDRAMD  ECC” 相关考题
考题 Which two statements are true about the RMAN validate database command?() A. It checks the database for intrablock corruptions.B. It can detect corrupt pfiles.C. It can detect corrupt spfiles.D. It checks the database for interblock corruptions.E. It can detect corrupt block change tracking files.

考题 Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?() A.802.11aB.802.11bC.802.11gD.802.11n

考题 Which of the following technologies can detect and fix single bit memory errors?() A. RAIDB. Registered memoryC. SDRAMD. ECC

考题 Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A、MPLS TE FRB、MPLS VPNC、BFDD、RSVPE、VPLSF、SNMP

考题 A WORM drive can be equated to which of the following common technologies?()A、 CDRWB、 CDRC、 Flash MediaD、 DVDRW

考题 Which two statements are true about the RMAN validate database command?()A、It checks the database for intrablock corruptions.B、It can detect corrupt pfiles.C、It can detect corrupt spfiles.D、It checks the database for interblock corruptions.E、It can detect corrupt block change tracking files.

考题 Which of the following wireless technologies can operate at only 5GHz?()A、802.11b/gB、802.11gC、802.11bD、802.11a

考题 Which of the following are storage technologies that can be hot swappable?()A、SCSIB、SASC、ATAD、IDEE、CMOS

考题 Which of the following Windows Server 2003 technologies can help with making backups of open files?()A、Differential backupB、SnapshotC、VSSD、Incremental backup

考题 Which of the following virtualization technologies can save time during provisioning?()A、CloningB、SnapshotsC、ClusteringD、Virtual memory

考题 Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning

考题 Which of the following technologies can detect and fix single bit memory errors?()A、RAIDB、Registered memoryC、SDRAMD、ECC

考题 Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()A、802.11aB、802.11bC、802.11gD、802.11n

考题 Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A、MulticastB、Active/passive clusterC、Active/active clusterD、DNS round robin

考题 A system administrator is deploying a new POWER5 server. The application requires AIX 5L V5.2.  Which of the following virtualization technologies can be used?()A、DLPARB、Micro-PartitioningC、Virtual StorageD、Virtual Ethernet

考题 Which of the following methods can be used to detect block corruption?()  A、 ANALYZE operationsB、 dbvC、 SQL queries that access the potentially corrupt blockD、 RMANE、 All of the above

考题 单选题Which of the following Windows Server 2003 technologies can help with making backups of open files?()A  Differential backupB  SnapshotC  VSSD  Incremental backup

考题 多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN

考题 单选题Which of the following nondestructive testing methods can be used to detect a suspected subsurface defect in a tail-shaft liner?()A Dye penetrantB Magnetic particleC UltrasonicD All of the above

考题 单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()A MPLS TE FRB MPLS VPNC BFDD RSVPE VPLSF SNMP

考题 单选题Which of the following technologies can save server space and cooling requirements?()A Energy star ratingsB Active solar panelsC Network storage arrayD Blade servers

考题 单选题A WORM drive can be equated to which of the following common technologies?()A  CDRWB  CDRC  Flash MediaD  DVDRW

考题 单选题Which of the following methods can be used to detect block corruption?()A  ANALYZE operationsB  dbvC  SQL queries that access the potentially corrupt blockD  RMANE  All of the above

考题 多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP

考题 多选题Which of the following are storage technologies that can be hot swappable?()ASCSIBSASCATADIDEECMOS

考题 单选题Which of the following wireless technologies can operate at only 5GHz?()A 802.11b/gB 802.11gC 802.11bD 802.11a

考题 单选题Which of the following statements is NOT a characteristic of a welfare state mentioned in this passage?A Free education is available to a child.B Laws are made to fix the minimum wage.C A jobless person can be insured.D There are regulations for rent.