单选题Terry is having lunch at a salad bar. There are two types of lettuce to choose from, as well as three types of tomatoes, and four types of olives. He must also choose whether or not to hare one of the two types of soup on the side. If Terry has decided to hare the salad and soup combo and he picks one type of lettuce, one type of tomato, and one type of olive for his salad, how many total options does he have for his lunch combo?A9B11C24D48E54

单选题
Terry is having lunch at a salad bar. There are two types of lettuce to choose from, as well as three types of tomatoes, and four types of olives. He must also choose whether or not to hare one of the two types of soup on the side. If Terry has decided to hare the salad and soup combo and he picks one type of lettuce, one type of tomato, and one type of olive for his salad, how many total options does he have for his lunch combo?
A

9

B

11

C

24

D

48

E

54


参考解析

解析:
根据全概率公式可知,组合数=2×3×4×2=48,故本题选择D项。

相关考题:

You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network? (Choose three)A. Congestion avoidanceB. WindowingC. Cut-throughD. BufferingE. Load BalacingF. Fast Forward

Which of the following are VLAN frame. encapsulation types that may be configured on a Catalyst switch? (Choose two.)A. VTPB. ISLC. CDPD. 802.1QE. 802.1pF. LLC

What are three valid Juniper Networks IPS attack object types?() (Choose three.) A. signatureB. anomalyC. trojanD. virusE. chain

Which two types of attacks are considered to be denial of service?() (Choose two.) A. zombie agentsB. SYN floodC. IP packet fragmentsD. WinNuke

Which two statistical data types are available on the statistics page of the WebUI? ()(Choose two.) A. cache statisticsB. client browser typeC. server response timeD. HTTP response codes

An RSVP session is maintained with the periodic exchange of which two message types?() (Choose two.) A.pathB.resvC.sessionD.keepalive

Which of the following three port types are valid Spanning Tree port types?(Choose the best threeanswers.)()A、Designated portB、Nonswitch portC、Switch portD、Nonroot portE、Nondesignated portF、Root port

In a RSTP implementation, which of the following two link types are used? ()(Choose two.)A、SharedB、Point-to-PointC、DesignatedD、Multiaccess non-broadcast

Which two types of nodes are included in an MPLS explicit route? ()(Choose two.)A、peerB、strictC、looseD、system

What are three valid LDP message types? ()(Choose three.)A、peer discoveryB、label distributionC、path initializationD、session managementE、connection establishment

What are two rulebase types within an IPS policy on an SRX Series device?() (Choose two.)A、rulebase-ipsB、rulebase-ignoreC、rulebase-idpD、rulebase-exempt

What are three valid Juniper Networks IPS attack object types?() (Choose three.)A、signatureB、anomalyC、trojanD、virusE、chain

Which two statistical data types are available on the statistics page of the WebUI? ()(Choose two.)A、cache statisticsB、client browser typeC、server response timeD、HTTP response codes

Which of the following are types of flow control (Choose three.)()。A、bufferingB、cut-throughC、windowingD、congestion avoidanceE、load balancing

A database administrator wants to design a multi-partition database that can take advantage of both intra-partition parallelism and inter-partition parallelism. Which configuration will allow the use of these types of parallelism while using the least number of hardware components (servers, processors)? ()A、one server having at least two processors  B、two servers having one processor and one logical database partition  C、one server having four processors and two logical database partitions  D、two servers each having four processors and two logical database partitions

What are two types of WebView monitoring statistics on the WX/WXC platforms?() (Choose two.)A、LANB、QoSC、trafficD、IPSec

Which two types of attacks are considered to be denial of service?() (Choose two.)A、zombie agentsB、SYN floodC、IP packet fragmentsD、WinNuke

Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)A、Packet Flow AccelerationB、Network Sequence CachingC、AppFlow's MAPI accelerationD、Molecular Sequence Reduction

多选题Which of the following are types of flow control (Choose three.)()。AbufferingBcut-throughCwindowingDcongestion avoidanceEload balancing

多选题Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。AHDLCBEthernetCToken RingDPPPEFDDIFFrame Relay

多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS

单选题A database administrator wants to design a multi-partition database that can take advantage of both intra-partition parallelism and inter-partition parallelism. Which configuration will allow the use of these types of parallelism while using the least number of hardware components (servers, processors)? ()Aone server having at least two processors  Btwo servers having one processor and one logical database partition  Cone server having four processors and two logical database partitions  Dtwo servers each having four processors and two logical database partitions

多选题Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()Aaccess point certification and software controlBcompression and Layer 3 address mappingCLayer 3 addressing and distributionDpacket encapsulation, fragmentation, and formattingESNMP monitoring services

单选题The litter on a ship must be able to().Acarry at least two injured personsBfloat for at least two hoursCbe used on the types of helicopters serving the unitDAll of the above

单选题For one or two types of engine, the piston and rod can be withdrawn downwards from the cylinder into the crankcase and then out through the ().Acylinder casingBcylinder boreCcrankcase doorDaperture in the cylinder block

多选题Which of the following three port types are valid Spanning Tree port types?(Choose the best threeanswers.)()ADesignated portBNonswitch portCSwitch portDNonroot portENondesignated portFRoot port

多选题What are three valid Juniper Networks IPS attack object types?() (Choose three.)AsignatureBanomalyCtrojanDvirusEchain