多选题Which of the following can be used to determine the amount of physical memory installed in a laptop? ()ACheck Device Manager Snap-in.BType WINVER in the command prompt.CCheck the BIOS.DCheck System Information in the Accessibility folder.ECheck System Information.
多选题
Which of the following can be used to determine the amount of physical memory installed in a laptop? ()
A
Check Device Manager Snap-in.
B
Type WINVER in the command prompt.
C
Check the BIOS.
D
Check System Information in the Accessibility folder.
E
Check System Information.
参考解析
解析:
暂无解析
相关考题:
Which of the following can be used to determine the amount of physical memory installed in a laptop? ()A、Check Device Manager Snap-in.B、Type WINVER in the command prompt.C、Check the BIOS.D、Check System Information in the Accessibility folder.E、Check System Information.
A basic cable tester can be used to do which of the following?()A、Assure end to end continuity of a UTP cable.B、Locate the distance to a cable break.C、Determine the CAT level of a UTP cable.D、Determine the distance to the nearest wiring closet.
Which of the following media types can hold the GREATEST amount of data?()A、 DVDB、 SDLTC、 LTOD、 Blu-Ray
Which of the following commands should be used to determine DNS name resolution performance?()A、 iptraceB、 vmstatC、 hostnameD、 ifconfig
An AIX system administrator needs to adjust the maximum amount of memory that can be pinned. Which of the following commands is used to make the change?()A、 vmtune -MB、 svmon -mC、 vmstat -sD、 schedtune -m
Which of the following utilities can be used to determine the current partition information on an attached storage device?()A、Add Hardware WizardB、Device ManagerC、Disk ManagementD、Control Panel
Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted
Which of the following utilities could be used to determine a subnet mask?()A、PINGB、NSLOOKUPC、TRACERTD、IPCONFIG
Which of the following metrics provided by the iostat report is used to initially determine if a disk is I/O bound?()A、 tinB、 toutC、 % idleD、 % tm_act
Which of the following commands should be used to determine whether a logical volume is contiguous across a disk?()A、 lslvB、 lsfsC、 lspvD、 fileplace
Which of the following metrics provided by the iostat report is used to initially determine if a system is I/O bound?()A、 % idleB、 % sysC、 % userD、 % iowait
A System p administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape ()A、ddB、tarC、cpioD、restore
Which of the following commands should be used to determine if a remote print queue is down?()A、 lsqdev B、 lpstat C、 lptest D、 prtconf
A system administrator is attempting to unmount filesystem /dev/data and receives the following message: umount: 0506-349 Cannot unmount /dev/data: The requested resource is busy. Which of the following commands can be used to determine which process has open references within the filesystem?()A、lsfsB、topasC、fuserD、mount
Which of the following commands is used to determine the route that the IP packets take to a network host?()A、 route B、 netstat C、 iptrace D、 traceroute
A system administrator is attempting to restore some files from a backup tape. The restore failed. The system administrator suspects the block size of the tape drive is incorrect. Which of the following commands can be used to determine the block size of the backup tape?()A、ddB、tarC、cpioD、restore
Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A、 filemonB、 istatC、 vmstatD、 iostat
which one of the following accurately describes field names?()A、they must be unique in a database B、they can only be used once in a view C、they can only used once on each form D、they can be used mulriple times on a form
Which of the following performance tools can be used to determine if a system is thrashing?()A、 svmon and tprofB、 vmtune and schedtuneC、 ps and schedtuneD、 vmstat and topas
单选题Which of the following metrics provided by the iostat report is used to initially determine if a system is I/O bound?()A % idleB % sysC % userD % iowait
单选题Which of the following performance tools can be used to determine if a system is thrashing?()A svmon and tprofB vmtune and schedtuneC ps and schedtuneD vmstat and topas
单选题An AIX system administrator needs to adjust the maximum amount of memory that can be pinned. Which of the following commands is used to make the change?()A vmtune -MB svmon -mC vmstat -sD schedtune -m
单选题Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A filemonB istatC vmstatD iostat
单选题Which of the following metrics provided by the iostat report is used to initially determine if a disk is I/O bound?()A tinB toutC % idleD % tm_act
单选题Which statement about HTTPS decryption on the WSA is true?()Aif enabled, all HTTPS traffic must be decryptedBif WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedCdecrypted HTTPS traffic is sent unencrypted across the enterprise intranetDobject size can be used to determine whether the HTTPS traffic is to be decrypted
单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()Aaaa authentication enable method defaultBaaa authentication enable defaultCaaa authentication enable levelDaaa authentication enable default local
单选题Which of the following commands should be used to determine whether a logical volume is contiguous across a disk?()A lslvB lsfsC lspvD fileplace