单选题You have some compressed bitmap files in a directory of your Windows 2000 Professional computer. The file compression has reduced their size from 2 MB to 1 MB. You attempt to copy them to a floppy disk, but an error reports that the destination drive is full.  How can you copy the bitmap files to a 1.44 MB floppy disk? ()AUse a third-party file compression utility to create a compressed archive containing the bitmap files. Copy the compressed archive to the floppy disk.BCreate an empty compressed folder on the floppy disk, and copy the files to the new folder.CFormat the floppy disk as NTFS, and restart the copy operation.DConfirm that the cluster size on the NTFS volume is greater than 32k.

单选题
You have some compressed bitmap files in a directory of your Windows 2000 Professional computer. The file compression has reduced their size from 2 MB to 1 MB. You attempt to copy them to a floppy disk, but an error reports that the destination drive is full.  How can you copy the bitmap files to a 1.44 MB floppy disk? ()
A

Use a third-party file compression utility to create a compressed archive containing the bitmap files. Copy the compressed archive to the floppy disk.

B

Create an empty compressed folder on the floppy disk, and copy the files to the new folder.

C

Format the floppy disk as NTFS, and restart the copy operation.

D

Confirm that the cluster size on the NTFS volume is greater than 32k.


参考解析

解析: You should compress the files with the help of a third-party file compression utility.

相关考题:

Having acknowledged receipt of the interview letter,you must prepare for the interview. Firms usually take a good deal of trouble over interviews,and there may be three or more people present,which can be a little frightening. Very often the personnel officer will begin by some words of welcome and an invitation to you to tell them a little about yourself. This is really inviting you to repeat the information you have already supplied on the application form,and which they have already read,but it does have some point. It will put you at your ease,because at least you know all about your own level of achievement and can speak about it confidently. It helps them assess your ability to communicate and your serf-esteem. Some people have too high an opinion of themselves,some take an unduly pessimistic view of their achievements,while others have a nicely balanced assessment of their own abilities.

请在下列空白处填上适当的单词:Some common ______1____can help you in building effective document management. The files can be found easily when you [label] your files and folders with names such as ___2____ and school names. You can have a quick idea of the ___3___types if you search through folders in thumbnail view. You also need to remove __4____files to make it clear and put things similar together in a folder. And keeping files in ____5___ order is a good way to sort out all files. Of course, you should___6_____ and reorganize files from a certain period of time to make sure they are in the_____7_____ place.

You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?() A.Use the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesB.Execute the PURGE BINARY LOGE NOT USED commandC.Remove all of the binary log files that have a modification date earlier than todayD.Edit the .index file to remove the files you want to deleteE.Ensure that none of the attached slaves are using any of the binary logs you want to delete

According to your resume, you have had some experience working in a foreign company. May I ask you why you left?

You work as an application developer at Certkiller .com. You are currently in the process of creating a new application for Certkiller .com. You are required to read compressed data files that has been sent by Certkiller .com‘s sales offices.These data files are less than 4 GB in size, but was compressed without cyclic redundancy. You want to write a method that receives the compressed files and return the uncompressed data as a byte array.What should you do?()A.B.C.D.

While designing your database, you have created the EMPLOYEES table as an index/x7forganized table (IOT). You want to create a bitmap index on the JOB_ID column to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A、A primary key must have been created.B、A mapping table must have been created.C、An overflow tablespace must have been specified.D、The PCTTHRESHOLD option must have been specified.

You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

A folder on your Windows 2000 Professional computer contains bitmap files that have been compressed from 2MB to 1MB.  You want to copy one of the compressed bitmap files from the hard disk to 1.4-MBfloppy disk. When you attempt to copy, you receive the following error message ‘Destination drive is Full’.  What should to do?()A、Move, rather than copy, the compressed bitmap file to the floppy disk.B、Reformat the floppy disk.Then copy the compressed bitmap file to the floppy disk.C、Use another program to compress the bitmap file before copying it to the floppy disk.D、Copy an empty compressed folder to the floppy disk. Then copy the compressed bitmap file to the folder on the floppy disk.

You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()A、The JAR fileB、A directory called libC、A directory called tagsD、A directory called TLDsE、A directory called classesF、A directory called META-INF

If you create your database using Oracle Managed Files (OMF), what is true?()A、You must use Oracle predefined names to identify raw partitions that will hold OMF structures. B、You must define directories for two online redo log groups and three copies of the control file. C、If your CREATE DATABASE command fails, any OMF database files that have already been created will be dropped automatically. D、You must use only OMF data files when adding new tablespaces or data files to your database in the future.

While designing your database, you have created the EMPLOYEEStable as an index-organized (IOT). You want to create a bitmap index on the JOD_IDcolumn to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A、 A primary key must have been created.B、 A mapping table must have been created.C、 An overflow tablespace must have been specified.D、 The PCTTHRESHOLD option must have been specified.

The loss of the control file forced you to re-create the control file. After re-creating it and opening the database, you find that some of the data files are named as MISSINGnnnnn, where nnnnn is a five-digit number starting with 0. What could be the possible reason?()A、 These are the data files that are corrupted.B、 There is no SYSAUX tablespace in your databaseC、 There is a read-only tablespace in your database.D、 These are the data files that cannot be recovered.

You are using Recovery Manager (RMAN) to perform backups. In which three situations would you perform a compressed backup?()A、You are backing up to tape and your tape device performs its own compression.B、You are making image copies, and you have not enabled tablespace compression.C、You are using disk-based backups and disk space in your Flash Recovery Area, or other disk-based backup destinations are limited.D、You are performing your backups to some device over a network where reduced network bandwidth is more important than CPU usage.E、You are using some archival backup media, such as CD or DVD, where reducing backup sizes saves media costs and archival storage.

You are the administrator of your company’s network. You configure a local group named accounting to have a mandatory user profile. The mandatory profile has been configured to include a custom logo that was saved with 16-bit color and 1025x768 resolution. Some of the Windows 2000 Professional computers in the accounting department have standard VGA video adapters, and others have SVGA video adapters. Several users report that when they log on to certain Windows 2000 Professional computers, the custom bitmap becomes very pixilated and distorted, and does not reflect the proper color depth. You want users to be able to correctly view the custom bitmap on any computer in the accounting department. What should you do? ()A、Configure a roaming user profile for each user in the accounting groupB、Configure a separate user profile for each user in the accounting GroupC、Change the custom bitmap to a 16-color bitmap that has 640x480 resolution, and reconfigure  the mandatory user profileD、Reinstall the appropriate WDM-compliant drivers for the computers that do not display the  custom bitmap correctly.

Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()A、Group Policy is preventing the compression of encrypted files.B、The file is stored on a FAT32 partition.C、Only members of the Administrators and the Power Users groups can compress and encrypt files.D、Encrypted files cannot be compressed.

多选题You are using replication and the binary log files on your master server consume a lot of disk space. Which two steps should you perform to safely remove some of the older binary log files?()AUse the command PURGE BINARY LOGS and specify a binary log file name or a date and time to remove unused filesBExecute the PURGE BINARY LOGE NOT USED commandCRemove all of the binary log files that have a modification date earlier than todayDEdit the .index file to remove the files you want to deleteEEnsure that none of the attached slaves are using any of the binary logs you want to delete

单选题Your network contains a domain controller that runs Windows Server 2008 R2.  You need to change the location of the Active Directory log files.   Which tool should you use()ADsamainBDsmgmtCDsmoveDNtdsutil

多选题You are using Recovery Manager (RMAN) to perform backups. In which three situations would you perform a compressed backup?()AYou are backing up to tape and your tape device performs its own compression.BYou are making image copies, and you have not enabled tablespace compression.CYou are using disk-based backups and disk space in your Flash Recovery Area, or other disk-based backup destinations are limited.DYou are performing your backups to some device over a network where reduced network bandwidth is more important than CPU usage.EYou are using some archival backup media, such as CD or DVD, where reducing backup sizes saves media costs and archival storage.

单选题You are the administrator of your company’s network. You configure a local group named accounting to have a mandatory user profile. The mandatory profile has been configured to include a custom logo that was saved with 16-bit color and 1025x768 resolution. Some of the Windows 2000 Professional computers in the accounting department have standard VGA video adapters, and others have SVGA video adapters. Several users report that when they log on to certain Windows 2000 Professional computers, the custom bitmap becomes very pixilated and distorted, and does not reflect the proper color depth. You want users to be able to correctly view the custom bitmap on any computer in the accounting department. In addition to this, you also want to allow the users to modify, change and save their desktop settings. What should you do?()AConfigure a roaming user profile for each user in the accounting groupBConfigure a separate user profile for each user in the accounting Group. CChange the custom bitmap to a 16-color bitmap that has 640x480 resolution, and reconfigure the mandatory user profile DReinstall the appropriate WDM-compliant drivers for the computers that do not display the custom bitmap correctly.

问答题Practice 1  Suppose you have made an appointment with your friend at 5 p.m., but you have some urgent business to attend to and have to cancel your appointment. Write a note to your friend.  (1) explaining why you have to cancel your appointment  (2) making an apology for that  (3) telling him how you plan to make up for it  You should write approximately 100 words. Do not sign your own name at the end of your note. Use “Wang Lin” instead.

单选题Some decisions have to be ______; when gathering more information only worsens your dilemma, you must simply adhere to your instincts.AponderousBapprehensiveCtactfulDdoctrinaireEvisceral

多选题You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()AThe JAR fileBA directory called libCA directory called tagsDA directory called TLDsEA directory called classesFA directory called META-INF

单选题While designing your database, you have created the EMPLOYEES table as an index/x7forganized table (IOT). You want to create a bitmap index on the JOB_ID column to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()AA primary key must have been created.BA mapping table must have been created.CAn overflow tablespace must have been specified.DThe PCTTHRESHOLD option must have been specified.

单选题While designing your database, you have created the EMPLOYEEStable as an index-organized (IOT). You want to create a bitmap index on the JOD_IDcolumn to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()A A primary key must have been created.B A mapping table must have been created.C An overflow tablespace must have been specified.D The PCTTHRESHOLD option must have been specified.

单选题You have a large amount of historical data in an operating system file. Some analysts in your organization need to query this data. The file is too large to load into your current database. Which is the most effective method to accomplish the task?()AUpgrade the hardware/memory to accommodate the data.BLoad the data into your database by using the PARALLEL clause.CGive analysts DBA privilege, so that they can query DBA_EXTERNAL_TABLES.DUse an external table so you can have the metadata available in your database, but leave the data in the operating system files.

单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A Configure a directory service access audit policy. Increase the maximum size of the security log.B Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C Configure an object access audit policy for the directory. Increase the maximum size of the system log.D Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

单选题After a merger with another small business, your company has inherited a legacy WAR file but the originalsource files were lost. After reading the documentation of that web application,you discover that the WARfile contains a useful tag library that you want to reuse in your own webapp packaged as a WAR file. What do you need to do to reuse this tag library?()ASimply rename the legacy WAR file as a JAR file and place it in your webapp’s library directory.BUnpack the legacy WAR file, move the TLD file to the META-INF directory, repackage the whole thingas a JAR file, and place that JAR file in your webapp’s library directory.CUnpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the whole thing as a JAR file, and place that JAR file in your webapp’slibrary directory.DUnpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the WAR, and place that WAR file in your webapp’s WEB-INF directory.