单选题A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()APreservationBMigrationCNew and complete overwriteDRepair

单选题
A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()
A

Preservation

B

Migration

C

New and complete overwrite

D

Repair


参考解析

解析: 暂无解析

相关考题:

For any information system to serve its purpose,the information must be ( ) when it is needed.A.integralB.availableC.irreplaceableD.confidential

describes how to interact with the information system to accomplish specific tasks.A.System specificationB.Program specificationC.User guideD.System document

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called( ). Requirements written from the developers perspective and describe how the system will be implemented are called( ). Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in which the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is( ). The requirement that the system should be able to work on any Web browser belongs to( ). That customer personal information is protected in compliance with the Data Protection Act is a requirement of( ).A.operational requirements B.business requirements C.technical requirements D.system requirements A.operational requirements B.business requirements C.technical requirements D.system requirements A.a functional requirements B.a technical requirements C.an operational requirements D.a service requirements A.functional requirements B.technical requirements C.operational requirements D.information requirements A.system constraint B.system performance C.secrity and control D.cultural and political

Accelerated analysis approaches emphasize the construction of (71) to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,(72) reads the program code and automatically generates the equivalent system model, and the code can be obtained from (73) All system analysis approaches require some form. of (74) which includes those techniques to be used to identify or extract system problems and solution requirements from user community.(75) is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities.A.object modelsB.prototypesC.use casesD.components

27、【单项选择题】☆收藏本题A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(73)应选?A.A.functional requirementsB.A.technical requirementsC.an operational requirementsD.A.service requirements

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(72)应选?A.operational requirementsB.business requirementsC.technical requirementsD.system requirements

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements evolve from broad statements of overall ( 71)from the system to detailed statements of the business capabilities that a system should support to detailed technical statements of the way in which the capabilities will be implemented in the new system. (72)focus on describing how to create the software product that will be produced from the project Nonfunctional requirements are primarily used in the design phase when decisions are made about the user interface, the hardware and software, and the system's underlying architecture. The system's physical and technical environments would be considered (73). The speed, capacity, and reliability of the system belong to (74).(75)describes that who has authorized access to the system under what circumstances. (72)处应选?A.User requirementsB.Business requirementsC.Function requirementsD.System requirements

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements evolve from broad statements of overall (71)from the system to detailed statements of the business capabilities that a system should support to detailed technical statements of the way in which the capabilities will be implemented in the new system. (72)focus on describing how to create the software product that will be produced from the project Nonfunctional requirements are primarily used in the design phase when decisions are made about the user interface, the hardware and software, and the system's underlying architecture. The system's physical and technical environments would be considered (73). The speed, capacity, and reliability of the system belong to (74).(75)describes that who has authorized access to the system under what circumstances.(74)应选?A.security requirementB.performance requirementC.technical requirementD.information requirement

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(75)应选?A..information requirementsB.system performanceC.secrity anD.controlD.cultural anD.political

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(74)应选?A.functional requirementsB.technical requirementsC.operational requirementsD.information requirements

Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,(请作答此空)reads the program code and automatically generates the equivalent system model, and the code can be obtained from ( ). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. eXtreme programmingB. model drivenC. reverse engineeringD. agile Method

Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from (请作答此空). All system analysis approaches require some form of( )which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. existing database and application programB. application program and user interfaceC. existing database and user interfaceD. existing database,application program and user interface

Accelerated analysis approaches emphasize the construction of( )to more rapidly identify business and user requirements for a new system. As an accelerated analysis technology,( )reads the program code and automatically generates the equivalent system model, and the code can be obtained from ( ). All system analysis approaches require some form of(请作答此空)which includes those techniques to be used to identify or extract system problems and solution requirements from user community. ( )is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. A. requirement discoveryB. business process redesignC. cause-and-effect analysisD. total quality management

A laser printer displays ‘perform user maintenance’. The manufacturer’s information was not available when the user performed the maintenance, and the laser printer continues to display the maintenance code. Which of the following items needs to be performed?()A、The printer needs to be sent to the manufacturer for maintenance.B、The printer’s firmware needs to be updated.C、A printer system reset must be performed.D、The maintenance page counter must be reset.

The company auditors require a System p administrator to archive detailed information from each of their systems.  Which of the following commands will accomplish this task()A、snap -aB、snap -iC、prtconfD、lsconf

A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()A、PreservationB、MigrationC、New and complete overwriteD、Repair

A System p administrator is reviewing root’s command history on a development server and finds that a junior adminstrator had been attempting to correct a full file system. One of the following commands caused damage that must be corrected.  Which command was it()A、rm /var/preserve/*B、cat /dev/null  /var/adm/cron/logC、 /var/adm/wtmpD、rm /var/adm/ras/errlog

A System p admistrator must document the date of the latest update of the development systems. Which of the following commands will provide this information ()A、lppchk -lB、lslpp -hC、installp -hD、lppchk -v

A System p distribution customer is very concerned about Reliability, Availability and  Serviceability (RAS). They are planning to install several p6 servers in their facilities and want to be able to move an LPAR from one System p to another.  Which of the following would accomplish this()A、System p servers using similar SAN storageB、System p servers must share an HMCC、System p servers must have the same level HMCD、System p servers with VIOS

A Sales Specialist receives an email from a customer, requesting information on IBM’s best Server Consolidation solution. How should the Sales Specialist proceed? ()A、Send the customer information on VMwareB、Send the customer information on IBM BladeCenter C、Call the customer to ask why they are consolidatingD、Send the customer information on IBM System P

You took the DATA1 tablespace offline at 10:00 A.M. At 12:30 P.M., a schema of a user is dropped and purged from the Recycle Bin. You noticed this at 2:00 P.M. and decided to perform an incomplete recovery.  Which datafiles will you recover?()A、 all the datafiles in the databaseB、 the datafiles associated with the SYSTEM tablespaceC、 the datafiles associated with the DATA1 tablespaceD、 all the datafiles in the database except those associated with the DATA1 tablespace

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. What actions must you take to stop a user named Mia Hamm from removing information from her mailbox?()A、You must use log transactions.B、You must use a legal hold.C、You must use Outlook Protection Rules.D、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true.

单选题You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()ASYSDBABSYSOPERCNo system privileges are required for the RMAN user.DOnly SYS user can connect and execute RMAN commands on a target database.

单选题A laser printer displays ‘perform user maintenance’. The manufacturer’s information was not available when the user performed the maintenance, and the laser printer continues to display the maintenance code. Which of the following items needs to be performed?()AThe printer needs to be sent to the manufacturer for maintenance.BThe printer’s firmware needs to be updated.CA printer system reset must be performed.DThe maintenance page counter must be reset.

单选题You lost the PRODSTD tablespace, which was read/write. The tablespace was read/x7fonly when the last backup was performed. How would you recover the tablespace?()Arestore the tablespace from the backup; there is no need to apply the redo information Brestore the full database to recover the data up to the point when you performed the backup Crestore the tablespace from the backup, and then perform a recovery using the backup control fileDrestore the tablespace from the backup, and then recover the tablespace; all the redo information from the point when the tablespace was made read/write is applied

单选题A System p distribution customer is very concerned about Reliability, Availability and  Serviceability (RAS). They are planning to install several p6 servers in their facilities and want to be able to move an LPAR from one System p to another.  Which of the following would accomplish this()ASystem p servers using similar SAN storageBSystem p servers must share an HMCCSystem p servers must have the same level HMCDSystem p servers with VIOS

单选题A customer called and indicated that their p690 system did not come with any installation and user manuals.  Which of the following sources can best provide this information? ()AIBM RedbooksBIBM SupportlineCpSeries LibraryDpSeries College

单选题You took the DATA1 tablespace offline at 10:00 A.M. At 12:30 P.M., a schema of a user is dropped and purged from the Recycle Bin. You noticed this at 2:00 P.M. and decided to perform an incomplete recovery.  Which datafiles will you recover?()A all the datafiles in the databaseB the datafiles associated with the SYSTEM tablespaceC the datafiles associated with the DATA1 tablespaceD all the datafiles in the database except those associated with the DATA1 tablespace